Duration 3 Days 18 CPD hours In this 3 day customized Intermediate SQL course students will learn additional commands and functions using labs/activities/content that correlates with this content. By understanding SQL, you get the knowledge of fundamental queries associated with data management so that you can verify, monitor, and control all the activities operating in the database. Lesson 1 Substring Instr / CharIndex Convert (data types and with Formatting) Replace RowCount / RowNum / Top )n) ÿ(Oracle/SQL Server functions) Case / If Then Else statements Exists Clause Find Duplicates using Group by and have clause (and other tips for analyzing data) Lesson 2 Set operations (UNION, UNION ALL, INTERSECT, MINUS) GROUP BY extensions (ROLLUP, CUBE, and GROUPING SETS) Loops / Cursors Common Table Expressions (CTEs) Lesson 3 Temp Tables / Views Advanced Subqueries Regular Expressions (RegEx) Linked Server Queries Qualified subquery predicates Aggregate functions Optimizing queries SQL Injection Lesson 4 JSON Parsing With Partition By With Over Fuzzy Logic - MDS.mdq.[Similarity]ÿ Additional course details: Nexus Humans Intermediate SQL Custom 3-Day Private Class Outline training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate SQL Custom 3-Day Private Class Outline course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is aimed at IT professionals who support Windows 11 desktops, devices, users, and associated network and security resources. The secondary audience for this course is Desktop/Device Support Technicians (DSTs) who provide Tier 2 support to users with computers that are running the Windows 11 operating system (OS) in a on-premises environment. Overview After completing this course, you will be able to: Install and configure Windows 11 desktops and devices in a Windows Server domain corporate environment Install and customize Windows 11 operating systems and apps Configure local and remote network connectivity and storage Configure data security, device security, and network security Maintain, update, and recover Windows 11. This is a 4-day ILT course designed to provide you with the knowledge and skills required to install and configure Windows 11 desktops and devices in an on-premises Windows Server Active Directory domain environment. Module 1: Installing Windows 11 Introducing Windows 11 Installing Windows 11 Module 2: Upgrading and updating Windows 11 Upgrading to Windows 11 Migrating user state Managing Windows 11 updates Module 3: Configuring Windows 11 devices Local configuration tools in Windows 11 Using Windows Admin Center Using Windows PowerShell Implementing Remote Management Module 4: Configuring network connectivity Configuring network connectivity Implementing name resolution Implementing remote access Module 5: Managing storage Overview of storage options Managing local storage Managing Storage Spaces Module 6: Managing resources Configuring and managing file access Configuring and managing shared folders Implementing Work Folders Managing printers Module 7: Managing apps in Windows 11 Deploying apps Managing access to the Microsoft Store Configuring Microsoft Edge Module 8: Implementing and managing security Managing user and group accounts Configuring User Account Control Implementing BitLocker Implementing Windows 11 security features Securing against network threats Module 9: Monitoring Windows 11 Monitoring Windows 11 Optimizing Windows 11 performance Module 10: Troubleshooting Windows 11 Managing Windows 11 startup Recovering Windows 11 Managing devices and drivers Understanding the registry Recovering files
Duration 5 Days 30 CPD hours This course is intended for This course is designed for business analysts. Overview After completing this course, you should be able to:Describe the benefits of implementing an Operational Decision Manager solution, and the collaboration that is required between the business and development teamsIdentify the main user roles that are involved in designing and developing an Operational Decision Manager solution, and the tasks that are associated with each roleExplain modeling concepts and the UML notation that is relevant to modeling for business rules and eventsDefine and implement object models for business rulesSet up the rule authoring environment in Designer by working with decision services and synchronizing across development and business environmentsCustomize the vocabulary that is used in rulesDiscover and analyze business rules for implementationUse the Operational Decision Manager rule editors to author business rules and decision tablesRun tests and simulations in the Decision Center Enterprise console to validate decision logic and rule changesExplain governance issues and work with Operational Decision Manager features that support decision governance This course introduces business analysts to IBM Operational Decision Manager V8.7.1. You learn the concepts and skills that are necessary to capture, author, validate, and manage business rules with Operational Decision Manager. Course Outline Course introduction Introducing IBM Operational Decision Manager V8.7.1 Exercise: Operational Decision Manager in action Modeling for business rules Exercise: Building the model on paper Exercise: Implementing the model Understanding decision services Exercise: Setting up a decision service Working with the BOM Exercise: Working with the BOM Introducing Decision Center Exercise: Exploring the Decision Center Business console Exercise: Exploring the Decision Center Enterprise console Introducing rule authoring Exercise: Understanding the case study Discovering and analyzing rules Exercise: Discovering rules Exercise: Analyzing rules Working with conditions in rules Exercise: Working with conditions in rules Working with definitions in rules Exercise: Working with definitions in rules Writing complete rules Exercise: Writing complete rules Authoring decision tables and trees Exercise: Authoring decision tables and trees Exercise: Authoring rules: Putting it all together Running tests and simulations in the Enterprise console Exercise: Running tests and simulations in the Enterprise console Introducing decision governance Exercise: Working with the decision governance framework Course summary
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition
Duration 0.5 Days 3 CPD hours This course is intended for This 4-hour course is intended for business leads in project management, marketing and sales who are seeking to grow their organization through IoT technology solutions. This course prepares students for taking the CertNexus IoTBIZ Credential (IOZ-110). Overview This course and associated credential (IOZ-110) will validate your knowledge of IoT terminology and your ability to understand the components of IoT infrastructure, help you uncover challenges for consideration and understand the impact that IoT has on your organization. This includes being able to identify what IoT can do for your organization and the various business and technical challenges that you must address. The Internet of Things (IoT) allows organization to collect an extraordinary volume of data and new analysis tools can enable you to use this data to make well-informed decisions to be made quickly. But before you can successfully plan and implement an IoT solution, you must understand the various factors that will drive your decisions. Putting IoT systems into place can be a complicated proposition with unique considerations distinctly different from traditional IT solutions. This course will familiarize you with IoT components, understand the challenges that you may face, and make design decisions about your IoT projects. Course includes an exam voucher for the IoTBIZ exam (exam IOZ-110). Planning an IoT Implementation Defining IoT IoT Infrastructure Identify Benefits and Challenges of IoT Undertaking an IoT Project Identify Real World Applications for IoT The IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Internet of Things for Business Professionals (IoTBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Internet of Things for Business Professionals (IoTBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions architects Developers Cost-optimization leads System administrators Overview In this course, you will learn to: Explain the cost of core AWS services Determine and predict costs associated with current and future cloud workloads Use strategies and best practices to reduce AWS costs Use AWS tools to manage, monitor, alert, and optimize your AWS spend Apply strategies to monitor service costs and usage Implement governance standards, including resource tagging, account structure, provisioning,permissions, and access This course is for individuals who seek an understanding of how to manage, optimize, and predict costs as you run workloads on AWS. You learn how to implement architectural best practices, explore cost optimization strategies, and design patterns to help you architect cost-efficient solutions on AWS. Module 0: Couse Overview Course introduction Module 1: Introduction to Cloud Financial Management Introduction to Cloud Financial Management Four pillars of Cloud Financial Management Module 2: Resource Tagging Tagging resources Hands-On Lab: Cost optimization: Control Resource Consumption Using Tagging and AWS Config Module 3: Pricing and Cost Fundamentals of pricing AWS Free Tier Volume discounts Savings plans and Reserved Instances Demonstration: AWS Pricing Calculator Module 4: AWS Billing, Reporting, and Monitoring Understanding AWS invoices Reporting and planning AWS Cost Explorer AWS Budgets Demonstration: AWS Billing Console Demonstration: AWS Cost Explorer Demonstration: Trusted Advisor Hands-On Lab: Cost optimization: Deploy Ephemeral Environments Using Amazon EC2 Auto Scaling Module 5: Architecting for Cost: Compute Evolution of compute efficiency Amazon EC2 right-sizing Purchasing options Architect for Amazon EC2 Spot Instance Impact of software licensing Demonstration: Compute Optimizer Demonstration: Spot Instance Advisor Hands-On Lab: Cost optimization: Right Size Amazon EC2 Instances Using Amazon CloudWatch Metrics Module 6: Architecting for Cost: Networking Data transfer costs Understand data costs for different services How to triage network costs Hands-On Lab: Cost optimization: Reduce Data Transfer Costs Using Amazon CloudFront and Endpoints Module 7: Architecting for Cost: Storage Amazon EBS cost, pricing, and best practices Amazon S3 cost, pricing, and best practices Amazon EFS cost, pricing, and best practices Hands-On Lab: Cost optimization: Reduce Storage Costs Using Amazon S3 Lifecycle Management Module 8: Architecting for Cost: Databases Amazon RDS cost, pricing, and best practices Amazon Aurora cost, pricing, and best practices Amazon DynamoDB cost, pricing, and best practices Amazon ElastiCache cost, pricing, and best practices Amazon Redshift cost, pricing, and best practices Module 9: Cost Governance Setting up AWS Organizations AWS Systems Manager Hands-On Lab: Cost optimization: Reduce Compute Costs Using AWS Instance Scheduler Module 10: Course Summary Course review
Are you an EDI Officer, HR Specialist, Leader or Manager? Or the nominated EDI champion for your team? Maybe you've been given the EDI portfolio on behalf of your Board or department? Or if you're aiming to make a difference via your diverse staff network or union, all change-makers are welcome!
Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. Introduction to Threat Intelligence Understanding Intelligence Understanding Cyber Threat Intelligence Overview of Threat Intelligence Lifecycle and Frameworks Cyber Threats and Kill Chain Methodology Understanding Cyber Threats Understanding Advanced Persistent Threats (APTs) Understanding Cyber Kill Chain Understanding Indicators of Compromise (IoCs) Requirements, Planning, Direction, and Review Understanding Organization?s Current Threat Landscape Understanding Requirements Analysis Planning Threat Intelligence Program Establishing Management Support Building a Threat Intelligence Team Overview of Threat Intelligence Sharing Reviewing Threat Intelligence Program Data Collection and Processing Overview of Threat Intelligence Data Collection Overview of Threat Intelligence Collection Management Overview of Threat Intelligence Feeds and Sources Understanding Threat Intelligence Data Collection and Acquisition Understanding Bulk Data Collection Understanding Data Processing and Exploitation Data Analysis Overview of Data Analysis Understanding Data Analysis Techniques Overview of Threat Analysis Understanding Threat Analysis Process Overview of Fine-Tuning Threat Analysis Understanding Threat Intelligence Evaluation Creating Runbooks and Knowledge Base Overview of Threat Intelligence Tools Intelligence Reporting and Dissemination Overview of Threat Intelligence Reports Introduction to Dissemination Participating in Sharing Relationships Overview of Sharing Threat Intelligence Overview of Delivery Mechanisms Understanding Threat Intelligence Sharing Platforms Overview of Intelligence Sharing Acts and Regulations Overview of Threat Intelligence Integration
Duration 2 Days 12 CPD hours This course is intended for System administrators tasked with maintaining a vRealize Operations cluster Overview By the end of the course, you should be able to meet the following objectives: Identify the vRealize Operations components affected in typical troubleshooting scenarios List the environmental and operational factors that can generate problems in vRealize Operations Use self-monitoring tools to assess and troubleshoot operational issues in vRealize Operations Access CLI-based tools to assess and troubleshoot operational issues in vRealize Operations Use the vRealize Operations API tool to retrieve cluster data and perform actions Retrieve and review log files associated with specific vRealize Operations components Use available tools to troubleshoot problem scenarios in vRealize Operations Identify the best practices to ensure a vRealize Operations instance remains in a healthy state Locate resources to help you troubleshoot vRealize Operations This two-day course gives VMware vRealize© Operations? administrators the skills to perform basic troubleshooting tasks. The course also gives administrators the skills to ensure that their vRealize Operations instance meets its use-case objectives of continuous performance optimization, app-aware intelligent remediation, and integrated compliance. Course Introduction Introduction and course logistics Course objectives Running a vRealize Operations Instance Identify the components of a vRealize Operations cluster Identify common problems that affect vRealize Operations List the environmental and operational factors that can affect vRealize Operations Identify the affected components vRealize Operations Troubleshooting Tools Use vRealize Operations self-monitoring tools to troubleshoot problems Use CLI tools to troubleshoot vRealize Operations problems Identify the log files used by individual vRealize Operations components Run commands to analyze vRealize Operations log files Use the vRealize Operations API tool vRealize Operations Troubleshooting Scenarios Use relevant tools to troubleshoot problem scenarios Maintaining vRealize Operations Use best practices to ensure the vRealize Operations cluster remains in a healthy state Back up and restore vRealize Operations Identify vRealize Operations troubleshooting resources Additional course details: Nexus Humans Troubleshooting VMware vRealize Operations [V8.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Troubleshooting VMware vRealize Operations [V8.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is best suited to developers, engineers, and architects who want to use use Hadoop and related tools to solve real-world problems. Overview Skills learned in this course include:Creating a data set with Kite SDKDeveloping custom Flume components for data ingestionManaging a multi-stage workflow with OozieAnalyzing data with CrunchWriting user-defined functions for Hive and ImpalaWriting user-defined functions for Hive and ImpalaIndexing data with Cloudera Search Cloudera University?s four-day course for designing and building Big Data applications prepares you to analyze and solve real-world problems using Apache Hadoop and associated tools in the enterprise data hub (EDH). IntroductionApplication Architecture Scenario Explanation Understanding the Development Environment Identifying and Collecting Input Data Selecting Tools for Data Processing and Analysis Presenting Results to the Use Defining & Using Datasets Metadata Management What is Apache Avro? Avro Schemas Avro Schema Evolution Selecting a File Format Performance Considerations Using the Kite SDK Data Module What is the Kite SDK? Fundamental Data Module Concepts Creating New Data Sets Using the Kite SDK Loading, Accessing, and Deleting a Data Set Importing Relational Data with Apache Sqoop What is Apache Sqoop? Basic Imports Limiting Results Improving Sqoop?s Performance Sqoop 2 Capturing Data with Apache Flume What is Apache Flume? Basic Flume Architecture Flume Sources Flume Sinks Flume Configuration Logging Application Events to Hadoop Developing Custom Flume Components Flume Data Flow and Common Extension Points Custom Flume Sources Developing a Flume Pollable Source Developing a Flume Event-Driven Source Custom Flume Interceptors Developing a Header-Modifying Flume Interceptor Developing a Filtering Flume Interceptor Writing Avro Objects with a Custom Flume Interceptor Managing Workflows with Apache Oozie The Need for Workflow Management What is Apache Oozie? Defining an Oozie Workflow Validation, Packaging, and Deployment Running and Tracking Workflows Using the CLI Hue UI for Oozie Processing Data Pipelines with Apache Crunch What is Apache Crunch? Understanding the Crunch Pipeline Comparing Crunch to Java MapReduce Working with Crunch Projects Reading and Writing Data in Crunch Data Collection API Functions Utility Classes in the Crunch API Working with Tables in Apache Hive What is Apache Hive? Accessing Hive Basic Query Syntax Creating and Populating Hive Tables How Hive Reads Data Using the RegexSerDe in Hive Developing User-Defined Functions What are User-Defined Functions? Implementing a User-Defined Function Deploying Custom Libraries in Hive Registering a User-Defined Function in Hive Executing Interactive Queries with Impala What is Impala? Comparing Hive to Impala Running Queries in Impala Support for User-Defined Functions Data and Metadata Management Understanding Cloudera Search What is Cloudera Search? Search Architecture Supported Document Formats Indexing Data with Cloudera Search Collection and Schema Management Morphlines Indexing Data in Batch Mode Indexing Data in Near Real Time Presenting Results to Users Solr Query Syntax Building a Search UI with Hue Accessing Impala through JDBC Powering a Custom Web Application with Impala and Search