• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5599 Computing & IT courses in Clydebank delivered Online

Security in Google Cloud

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following job roles: [Cloud] information security analysts, architects, and engineers Information security/cybersecurity specialists Cloud infrastructure architects Additionally, the course is intended for Google and partner field personnel who work with customers in those job roles. The course should also be useful to developers of cloud applications Overview This course teaches participants the following skills: Understanding the Google approach to security Managing administrative identities using Cloud Identity. Implementing least privilege administrative access using Google Cloud Resource Manager, Cloud IAM. Implementing IP traffic controls using VPC firewalls and Cloud Armor Implementing Identity Aware Proxy Analyzing changes to the configuration or metadata of resources with GCP audit logs Scanning for and redact sensitive data with the Data Loss Prevention API Scanning a GCP deployment with Forseti Remediating important types of vulnerabilities, especially in public access to data and VMs This course gives participants broad study of security controls and techniques on Google Cloud Platform. Through lectures, demonstrations, and hands-on labs, participants explore and deploy the components of a secure Google Cloud solution. Participants also learn mitigation techniques for attacks at many points in a Google Cloud-based infrastructure, including Distributed Denial-of-Service attacks, phishing attacks, and threats involving content classification and use. Foundations of GCP Security Google Cloud's approach to security The shared security responsibility model Threats mitigated by Google and by GCP Access Transparency Cloud Identity Cloud Identity Syncing with Microsoft Active Directory Choosing between Google authentication and SAML-based SSO GCP best practices Identity and Access Management GCP Resource Manager: projects, folders, and organizations GCP IAM roles, including custom roles GCP IAM policies, including organization policies GCP IAM best practices Configuring Google Virtual Private Cloud for Isolation and Security Configuring VPC firewalls (both ingress and egress rules) Load balancing and SSL policies Private Google API access SSL proxy use Best practices for structuring VPC networks Best security practices for VPNs Security considerations for interconnect and peering options Available security products from partners Monitoring, Logging, Auditing, and Scanning Stackdriver monitoring and logging VPC flow logs Cloud audit logging Deploying and Using Forseti Securing Compute Engine: techniques and best practices Compute Engine service accounts, default and customer-defined IAM roles for VMs API scopes for VMs Managing SSH keys for Linux VMs Managing RDP logins for Windows VMs Organization policy controls: trusted images, public IP address, disabling serial port Encrypting VM images with customer-managed encryption keys and with customer-supplied encryption keys Finding and remediating public access to VMs VM best practices Encrypting VM disks with customer-supplied encryption keys Securing cloud data: techniques and best practices Cloud Storage and IAM permissions Cloud Storage and ACLs Auditing cloud data, including finding and remediating publicly accessible data Signed Cloud Storage URLs Signed policy documents Encrypting Cloud Storage objects with customer-managed encryption keys and with customer-supplied encryption keys Best practices, including deleting archived versions of objects after key rotation BigQuery authorized views BigQuery IAM roles Best practices, including preferring IAM permissions over ACLs Protecting against Distributed Denial of Service Attacks: techniques and best practices How DDoS attacks work Mitigations: GCLB, Cloud CDN, autoscaling, VPC ingress and egress firewalls, Cloud Armor Types of complementary partner products Application Security: techniques and best practices Types of application security vulnerabilities DoS protections in App Engine and Cloud Functions Cloud Security Scanner Threat: Identity and Oauth phishing Identity Aware Proxy Content-related vulnerabilities: techniques and best practices Threat: Ransomware Mitigations: Backups, IAM, Data Loss Prevention API Threats: Data misuse, privacy violations, sensitive/restricted/unacceptable content Mitigations: Classifying content using Cloud ML APIs; scanning and redacting data using Data Loss Prevention API Additional course details: Nexus Humans Security in Google Cloud training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Security in Google Cloud course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Security in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network Engineers, Network Administrators, Network Security Engineers, and NOC Administrators. Overview Successful completion of this five-day, instructor-led course will help enhance your understanding of how to design, implement, and effectively operate a Prisma SDWAN solution. You will get hands-on experience configuring Prisma SD-WAN with a branch and datacenter, configure policies, and use Prisma SD-WAN services. The Prisma SD-WAN Design and Operation (EDU-238) course describes the next generation Prisma SD-WAN solution, the capability and value it provides over legacy WAN and SD-WAN implementations, and how to configure, operate, and troubleshoot the solution. This course is intended for people who must configure, maintain, and use wide area networks, from data centers, to branches, to the cloud. Course Outline 1 - Solution Overview 2 - Branch Design 3 - Routing 4 - Policy Module #1 - Application Path and QoS Policy 5 - Policy Module #2 - NAT, ZBFW and Security 6 - Event Policy Management Services 7 - DNS and DHCP Services 8 - Operations and Troubleshooting 9 - CloudBlades 10 - Integrating Prisma SD-WAN and Prisma Access for SASE Implementation 11 - DevOps 12 - Next Steps Additional course details: Nexus Humans Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks :Prisma SD-WAN : Design and Operation EDU-238 (6.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

CL487 IBM Db2 11.1 Quickstart for Experienced Relational DBAs

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate course for experienced DBAs and technical individuals, with experience on other relational database platforms, who plan, implement, and maintain Db2 11.1 for Linux, UNIX, and Windows databases. These skills can also be utilize to support cloud based databases using Db2 on Cloud or Db2 Hosted environments. Overview Please refer to course overview This course teaches you to perform, basic and advanced, database administrative tasks using Db2 11.1. These tasks include creating and populating databases and implementing a logical design to support recovery requirements. The access strategies selected by the Db2 Optimizer will be examined using the Db2 Explain tools. Various diagnostic methods will be presented, including using various db2pd command options. Students will learn how to implement automatic archival for database logs and how to plan a redirected database restore to relocate either selected table spaces or an entire database. The REBUILD option of RESTORE, which can build a database copy with a subset of the tablespaces, will be discussed. We will also cover using the TRANSPORT option of RESTORE to copy schemas of objects between two Db2 databases. The selection of indexes to improve application performance and the use of SQL statements to track database performance and health will be covered. This course provides a quick start to Db2 database administration skills for experienced relational Database Administrators (DBA). Overview of Db2 11Command Line Processor (CLP) and GUI UsageThe Db2 EnvironmentCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryLocks and ConcurrencyDatabase Maintenance, Monitoring and Problem DeterminationSecurityDatabase Rebuild SupportDb2 Database and Table Space RelocationUsing Explain ToolsUsing Indexes for PerformanceAdvanced Monitoring

CL487 IBM Db2 11.1 Quickstart for Experienced Relational DBAs
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database 12c R2 - Administration Workshop Ed 3

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Data Warehouse Administrator Database Administrators Database Designers Support Engineer Technical Administrator Overview Back up, restore, and patch DBCS database deployments Describe the DBaaS and on-premises Oracle Database architectures Manage database instances Manage UNDO data Move data between databases Implement basic backup and recovery procedures Monitor and tune database performance Tune SQL to improve performance Manage resources with Oracle Database Resource Manager Create pluggable databases (PDBs) Configure the Oracle network environment Administer user security and implement auditing Create and manage tablespaces Manage storage space Create and manage Database as a Cloud Service (DBCS) database deployments Register databases and manage performance with Enterprise Manager Cloud Control The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide students with a firm foundation in administration of an Oracle Database. In this course students will gain a conceptual understanding of Oracle Database architecture and learn how to manage an Oracle Database in an effective and efficient manner. Exploring Oracle Database Architecture Introducing Oracle Database Relation Database Models Oracle SQL and PL/SQL Oracle Database Server Architecture Connecting to Oracle Databases Oracle Database Tools Oracle-Supplied User Accounts Querying the Oracle Data Dictionary Managing Database Instances Initialization Parameter Files Starting Up Oracle Databases Shutting Down Oracle Databases Opening and Closing PDBs Working with the Automatic Diagnostic Repository (ADR) Querying Dynamic Performance Views Creating PDBs Methods and Tools to Create PDBs Creating PDBs from Seed with SQL*Plus Cloning PDBs with SQL*Plus Unplugging and Pluggin In PDBs with SQL*Plus Dropping PDBs with SQL*Plus Configuring the Oracle Network Environment Oracle Net Services How Listeners Work Configuring Listeners for Dynamic Service Registration Configuring Listeners for Static Service Registration Configuring Local Naming for Connections Testing Oracle Net Connectivity with tnsping Configuring Communication Between Databases Dedicated Versus Shared Server Configurations Administering User Security Creating Users Granting Privileges Creating and Granting Roles Revoking Privileges and Roles Creating and Assigning Profiles Authenticating Users Assigning Quotas to Users Applying the Principal of Least Privilege Creating and Managing Tablespaces How Table Data is Stored Creating Tablespaces in SQL*Plus Altering and Dropping Tablespaces in SQL*Plus Viewing Tablespace Information in SQL*Plus Implementing Oracle Managed Files Moving and Renaming Online Data Files in SQL*Plus Managing Storage Space Oracle Database Space Management Features Block Space Management Row Chaining and Migration Free Space Management Within Segments Types of Segments Allocating Extents Understanding Deferred Segment Creation Space-Saving Features Managing UNDO Data Undo Data: Overview Transactions and Undo Data Storing Undo Information Comparing Undo Data and Redo Data Managing Undo Local Undo Mode Versus Shared Undo Mode Configuring Undo Retention Categories of Undo Moving Data Moving Data: General Architecture Oracle Data Pump: Overview Oracle Data Pump: Benefits Data Pump Export and Import Clients Data Pump Utility: Interfaces and Modes Data Pump Import: Transformations SQL*Loader Overview Loading Methods Backup and Recovery Concepts DBA Responsibilities Categories of Failure Understanding Instance Recovery Understanding Types of Backups Comparing Complete and Incomplete Recovery Oracle Data Protection Solutions Flashback Technology Monitoring and Tuning Database Performance Managing Performance Activities Performance Planning Considerations Database Maintenance Automatic Workload Repository (AWR) Automatic Database Diagnostic Monitor Performance Monitoring Performance Tuning Methodology Database Server Statistics and Metrics SQL Tuning SQL Tuning Process Oracle Optimizer Optimizer Statistics SQL Plan Directives Adaptive Execution Plans SQL Tuning Advisor SQL Access Advisor SQL Performance Analyzer Oracle Database Resource Manager Oracle Database Resource Manager: Overview Resource Manager Elements Using Resource Manager to Allocate Resources Creating a Simple Resource Plan Creating a Complex Resource Plan Using the Active Session Pool Feature Limiting CPU Utilization at the Database Level Limiting CPU Utilization at the Server Level Enterprise Manager Cloud Control Controlling the Enterprise Manager Cloud Control Framework Starting the Enterprise Manager Cloud Control Framework Stopping the Enterprise Manager Cloud Control Framework Introduction to Oracle Database Cloud Service Oracle Cloud: Overview Database Cloud Service Offerings DBCS Architecture Features and Tooling Additional Database Configuration Options Creating DBCS Database Deployments Automated Database Provisioning Creating a Database Deployment How SSH Key Pairs are Used Creating an SSH Key Pair Storage Used for Database Files Managing DBCS Database Deployments Cloud Tooling Accessing Tools and Features from the DBCS Console Managing the Compute Node Associated With a Database Deployment Managing Network Access to DBCS Enabling Access to a Compute Node Port Scaling a Database Deployment Backing Up and Restoring DBCS Database Deployments Backing Up and Recovering Databases on DBCS Backup Destination Choices Backup Configuration Creating an On-Demand Backup Customizing the Backup Configuration Performing Recovery by Using the Console Performing Recovery by Using the dbaascli Utility Patching DBCS Database Deployments Patching DBCS Using the DBCS Console to Manage Patches Using the dbaascli Utility to Manage Patches Creating Master Encryption Keys for PDBs CDB and PDB Master Encryption Keys Determining Whether You Need to Create and Activate and Encryption Key for a PDB Creating and Activating an Encryption Key Tablespace Encryption by Default Tablespace Encryption by Default in DBCS Transparent Data Encryption (TDE) Overview Components of TDE Using TDE Defining the Keystore Location Controlling Tablespace Encryption by Default Managing the Software Keystore and Master Encryption Key Managing the Keystore in CDBs and PDBs Additional course details: Nexus Humans Oracle Database 12c R2 - Administration Workshop Ed 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database 12c R2 - Administration Workshop Ed 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database 12c R2 - Administration Workshop Ed 3
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Customer Success Manager v2.2 (DTCSM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Individuals preparing for the Cisco Customer Success ManagerSpecialist certification Individuals who have experience working with customers to determine, measure, and deliver business outcomes through the implementation of technology Overview After taking this course, you should be able to: Describe the role of the Customer Success Manager Describe the tools that the Customer Success Manager uses to ensure customer experience Describe the lifecycle approach to customer experience The Cisco Customer Success Manager (DTCSM) v2.2 course gives you the confidence and competence to fulfill the Customer Success Manager (CSM) role successfully, helping your customers realize value from their solutions and achieve their business outcomes. The course offers experiential learning through practical exercises using situations based on real-life use cases and case studies. In this highly interactive course, you can practice and gain confidence in fulfilling core tasks using best-practice tools and methodologies while receiving feedback from the facilitator and your peers.This course is based on understanding the customer lifecycle and how to optimize that journey, increasing the value realized by the customer, and maximizing your likelihood to maintain their loyalty and renew or expand their business opportunities. The course helps you prepare for the 820-605 Cisco Customer Success Manager (CSM) exam. By passing this exam, you earn the Cisco Customer Success Manager Specialist certification. Course Outline Transition to Subscription Economy Customer and Industry Trends Defining Customer Success and the CSM Role Engaging the Customer for Success Engaging the Customer for Success Addressing Barriers Customer Success Management Activities Success Plan Elements Customer Success Management Activities Additional course details: Nexus Humans Cisco Customer Success Manager v2.2 (DTCSM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Customer Success Manager v2.2 (DTCSM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Customer Success Manager v2.2 (DTCSM)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database: Managing Multitenant Architecture

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Administrator Architect Database Administrator Overview To provide an acceptable response time to users and manage resources effectively, you learn how to monitor performance and manage resources within the multitenant container database and its pluggable databases, and within each pluggable database. Another important aspect is the data movement between non-CDBs and pluggable databases, and between pluggable databases. It is also important to understand the procedures of upgrading an Oracle Database multitenant container database or an Oracle Database pluggable database. Finally, students discover the way multitenant container database and pluggable databases are created and monitored in the Cloud. This course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database and its regular and application pluggable databases. You learn why and how to create and manage a multitenant container database and its regular and application pluggable databases, with storage structures appropriate for the business applications. You practice cold and hot cloning, plugging unplugged pluggable databases in multitenant container databases using various methods. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods

Oracle Database: Managing Multitenant Architecture
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes Bootcamp (CKAD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions

Kubernetes Bootcamp (CKAD)
Delivered OnlineFlexible Dates
Price on Enquiry

55355 SharePoint 2016 Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for an IT person wanting to learn about administrating SharePoint 2016. Overview After completing this course, you will be able to: The Installation and configure a SharePoint 2016 Farm How to manage a SharePoint 2016 Farm through the GUI and PowerShell How to create site collections via GUI and PowerShell How to create and configure the all the required service applications for SharePoint 2016 How to backup and restore in SharePoint 2016 This SharePoint 2016 Administrator course is design for Administrators who are new to SharePoint Server Administration or who are upgrading from previous versions of SharePoint.This course covers content that was in retired Microsoft Course 20339-1. Module 1: Hardware, Installation and Patching How to build a Min Role Farm How to View ULS Logs How to document and check IIS Settings for SharePoint 2016 Module 2: Farm Management How to manage the SharePoint Farm Administors group How to configure Outgoing Email How to configure Incoming Email How to Configure Diagnostic and Usage Log Options Module 3: Web Applications How to define a new Managed Account How to add new IP Addresses to a SharePoint Server How to create a claims based web application in SharePoint Central Administration How to create a claims based web application in PowerShell How to create a hosting web application in PowerShell Module 4: Site Collections How to create a managed path How to create a site collection using SharePoint Central Administration How to create a site collection using PowerShell How to create a site collection in its own database using SharePoint Central Administration How to create a site collection in its own database using PowerShell How to create a host named site collection using PowerShell Module 5: Service Applications How to create a State Service Application How to create a Search Service Application How to create the Managed Metadate Service Module 6: Application Management How to add a new IP and Certificate to a SharePoint Web Application How to configure DNS for SharePoint Web Application How to Create a Subscription Settings Service Application How to create the Application Management Application Service How to configure the application URLs How to create the App Catalog Site Colleciton How to Add Apps to the catalog Module 7: Managing the User Profile Service How to create the My Site Web Application How to create the User Profile Service Application How to Configure the User Profile Synchronization Permissions How to create the Active Directory Import Connection How to assign permissions for the AD Group to create a My Site How to create a My Site Module 8: Search How to view the currenty Search Topology How to create an Enterprise Search Centre How to configure a new search schema property How to create a site collection-level result source How to create a new content source Module 9: Office Online Server How to install the pre-requisites for Office Online Server How to install the Office Online Server Binaries How to create the Office Online Server SSL Certifcate How to create the Office Online Server Farm How to connect to the farm from SharePoint How to test the connectivity Module 10: Enterprise Content Management How to create and Apply a site policy How to create discovery sets How to configure In Place records management How to configure the records centre How to configure DLP Module 11: Web Content Management How to configure cross-site publication How to configure content deployment Module 12: Workflow Server How to install Workflow Manger server and Client Binaires How to configure the workflow farm How to patch the workflow farm manager and clients How to register the workflow service in SharePoint How to test Workflow creation Module 13: Business Connectity Services and Secure Store How to configure the secure store service How to create the BCS service Application How to setup the products database How to import the BCS Definition How to use the BDC file in a list web part Module 14: Hybrid SharePoint Shown and Demonstrated the Hybrid features of SharePoint 2016 Module 15: Backup and Restore How to backup SharePoint 2016 Content How to delete SharePoint 2016 Content How to restore SharePoint 2016 Content via PowerShell How to recover a unattached content database Module 16: Upgrade How to restore and attach a SharePoint 2013 Database How to upgrade a SharePoint 2013 MMS Service Application Additional course details: Nexus Humans 55355 SharePoint 2016 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55355 SharePoint 2016 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55355 SharePoint 2016 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

DP-050T00 Migrate SQL workloads to Azure

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The audience for this course is data professionals and data architects who want to learn about migrating data platform technologies that exist on Microsoft Azure and how existing SQL based workloads can be migrated and modernized. The secondary audience for this course is individuals who manage data platforms or develop applications that deliver content from the existing data platform technologies. Overview Understand Data Platform Modernization Choose the right tools for Data Migration Migrate SQL Workloads to Azure Virtual Machines Migrate SQL Workloads to Azure SQL Databases Migrate SQL Workloads to Azure SQL Database Managed Instance In this course, the students will explore the objectives of data platform modernization and how it is suitable for given business requirements. They will also explore each stage of the data platform modernization process and define what tasks are involved at each stage, such as the assessment and planning phase. Students will also learn the available migration tools and how they are suitable for each stage of the data migration process. The student will learn how to migrate to the three target platforms for SQL based workloads; Azure Virtual Machines, Azure SQL Databases and Azure SQL Database Managed Instances. The student will learn the benefits and limitations of each target platform and how they can be used to fulfil both business and technical requirements for modern SQL workloads. The student will explore the changes that may need to be made to existing SQL based applications, so that they can make best use of modern data platforms in Azure. Introducing Data Platform Modernization Understand Data Platform Modernization Understanding the stages of migration Data Migration Paths Choose the right tools for Data Migration Discover the Database Migration Guide Build your data estate inventory using Map Toolkit Identify Migration candidates using Data Migration Assistant Evaluate a Data workload using Database Experimentation Assistant Data Migration using Azure Database Migration Service Migrate non-SQL Server workloads to Azure using SQL Migration Assistant Migrating SQL Workloads to Azure Virtual Machines Considerations of SQL Server to Azure VM Migrations SQL Workloads to Azure VM Migration Options Implementing High Availability and Disaster Recovery Scenarios Migrate SQL Workloads to Azure SQL Databases Choose the right SQL Server Instance option in Azure Migrate SQL Server to Azure SQL DB offline Migrate SQL Server to Azure SQL DB online Load and Move data to Azure SQL Database Migrate SQL Workloads to Azure SQL Database Managed Instance Evaluate migration scenarios to SQL Database Managed Instance Migrate to SQL Database Managed instance Load and Move data to SQL Database Managed instance Application Configuration and Optimization

DP-050T00 Migrate SQL workloads to Azure
Delivered OnlineFlexible Dates
Price on Enquiry