• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5686 Computing & IT courses in Dunstable delivered Online

Database Administrator

By Compliance Central

***Want to Unlock the Secrets of Data? Become a Database Mastermind!*** The world runs on data, and Database Administrators (DBAs) are the heroes behind the scenes ensuring its smooth operation. Database administrators in the UK are in high demand, with an average salary of £41,501 per year. The job market is expected to grow by 9% in the next few years, so now is a great time to start a career as a database administrator. As a database administrator, you will be responsible for the design, implementation, and maintenance of databases. You will also be responsible for ensuring the security and integrity of the data. If you are interested in a challenging and rewarding career in technology, then database administration is a great option for you. Our Database Administrator course starts with the basics of Database Administrator and gradually progresses towards advanced topics. Therefore, each lesson of this Database Administrator course is intuitive and easy to understand. Learning Outcomes By the end of this Database Administrator course, you'll be able to: Install and configure MySQL Server and MySQL Workbench. Create, manage, and manipulate databases and tables using SQL. Insert, update, and delete data efficiently. Design and implement database relationships to ensure data integrity. Utilize aggregate functions to summarize and analyze data. Reverse engineer existing databases and forward engineer data models. Why would you choose the Database Administrator course from Compliance Central: Lifetime access to Database Administrator course materials Full tutor support is available from Monday to Friday with the Database Administrator course Learn Database Administrator skills at your own pace from the comfort of your home Gain a complete understanding of Database Administrator course Accessible, informative Database Administrator learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with the Database Administrator Study Database Administrator in your own time through your computer, tablet or mobile device A 100% learning satisfaction guarantee with your Database Administrator Course Database Administrator Curriculum Breakdown of the Database Administrator Course Unit 01: Introduction Gain foundational knowledge of MySQL Server and databases, including installation and initial setup. Module 01: Introduction to MySQL Server and Databases Module 02: Download and Install MySQL Server and MySQL Workbench Unit 02: Manipulating Tables and Data - CRUD Operations Learn to manage databases through creating, reading, updating, and deleting (CRUD) data in SQL and MySQL Workbench. Module 01: Connect and Create a Database Module 02: Drop or Remove Database Module 03: Create an SQL Database Table Module 04: Insert Data into the Table with SQL Script Module 05: Insert Data into the Table with Workbench Module 06: Select Data from the Table with SQL Script Module 07: Select Data with Filters Module 08: Update Data in the Table Module 09: Delete Data from the Table Module 10: Reverse Engineer Database into Model Module 11: Forward Engineer Data Model into Database Unit 03: Relationships and Foreign Keys Understand and implement relationships, foreign keys, and normalization in databases, enhancing data integrity and querying capabilities.ys Module 01: What are Relationships, Foreign Keys and Normalization? Module 02: Create Relationships with Data Modeling Module 03: Create Relationships with Workbench Table Design Tool Module 04: Insert Records in Related Tables Module 05: Run Queries on Related Tables (Inner Joins) Module 06: Left, Right and Cross-Joins Unit 04: Aggregate Functions Explore aggregate functions to perform calculations on data sets, including grouping, averaging, counting, and summing data. Module 01: Grouping Data using SQL GROUP BY Clause Module 02: SQL AVG Aggregate Function Module 03: SQL COUNT Aggregate Function Module 04: SQL MIN & MAX Aggregate Functions Module 05: SQL SUM Aggregate Function Module 06: Splitting Groups using HAVING Clause CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Database Administrator course is ideal for: Individuals with an interest in data management and database systems. IT professionals seeking to expand their skillset and transition into a Database Administrator role. Business analysts who want to gain a deeper understanding of data structures and manipulation techniques. Anyone passionate about building and maintaining robust and efficient databases. Those looking to enhance their career prospects in the ever-growing field of data. Requirements To enrol in this Database Administrator course, all you need is a basic understanding of the English Language and an internet connection. Career path A successful career as a Database Administrator can open doors to exciting opportunities. Here are some potential career paths to consider: Database Administrator Database Analyst Database Architect Data Warehouse Specialist Business Intelligence Analyst Data Scientist (with further specialization) Database Security Specialist Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Database Administrator
Delivered Online On Demand4 hours
£12

Certificate in Compliance and Risk Management

5.0(5)

By Online Training Academy

Just as a detective meticulously investigates a case, equips you with the skills to manage Compliance Systems. You become the Sherlock Holmes of corporate structure, ensuring every element aligns seamlessly with our Certificate in Compliance and Risk Management. Step into the shoes of an auditor, peeling back layers to unveil any lurking irregularities. The narrative takes an ethical turn, where you grapple with the moral compass guiding compliance. Uncover the many faces of risk management, and later modules act as your guide through the intricate process of risk management, transforming you into a vigilant guardian of corporate stability. Join us on this riveting adventure, where knowledge becomes your compass and resilience your armour. Key Features This Certificate in Compliance and Risk Management Course Includes: This Certificate in Compliance and Risk Management Course is CPD Certified Free Certificate Developed by Specialist Lifetime Access Course Curriculum Module 01 Overview of Compliance Module 02 The 5 Core Components of Compliance Module 03 Managing Compliance Systems (CMS) Module 04 Conducting Compliance Audits Module 05 Ethics in Compliance Module 06 Understanding Risk and Its Types Module 07 Basics of Risk Management Module 08 The Process of Risk Management Learning Outcomes After completing this Compliance and Risk Management Course, you will be able to: Demonstrate understanding of compliance principles through practical application in scenarios. Identify core components of compliance and integrate them into organisational processes. Implement and manage Compliance Management Systems (CMS) for effective regulatory adherence. Conduct thorough compliance audits using established methodologies and reporting techniques for risk management. Evaluate ethical considerations within compliance frameworks and make informed ethical decisions. Apply risk management principles to identify, assess, and mitigate potential risks. Certification After completing this Compliance and Risk Management Course, you will get a free Certificate. CPD 10 CPD hours / points Accredited by The CPD Quality Standards (CPD QS) Who is this course for? This Certificate in Compliance and Risk Management course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Compliance and Risk Management. Moreover, this course is ideal for: Professionals seeking comprehensive knowledge in compliance and risk management. Individuals aiming to enhance their skills for regulatory compliance roles. Managers responsible for implementing compliance systems within their organisations. Auditors looking to specialise in compliance audit procedures and methodologies. Ethical decision-makers committed to incorporating ethical practices into compliance frameworks. Requirements There are no requirements needed to enrol into this Certificate in Compliance and Risk Management course. We welcome individuals from all backgrounds and levels of experience to enrol into this Certificate in Compliance and Risk Management course. Career path After finishing this Certificate in Compliance and Risk Management course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Compliance and Risk Management are: Compliance Officer Risk Analyst Regulatory Affairs Specialist Audit Manager Ethics and Compliance Manager Risk Management Consultant Certificates Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.

Certificate in Compliance and Risk Management
Delivered Online On Demand1 hour 42 minutes
£10

Certified Penetration Testing Professional (CPENT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Penetration Testing Professional (CPENT)
Delivered OnlineFlexible Dates
Price on Enquiry

C)DFE - Certified Digital Forensics Examiner Mile 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Virtualization Engineers and Managers Cloud Security Managers Overview Upon completion, the Certified Digital Forensics Examiner candidate will be able to competently take the CDFE exam. The Certified Digital Forensics Examiner, C)DFE certification is designed to train Cyber Crime and Fraud Investigators. Students are taught electronic discovery and advanced investigation techniques.ÿ This course is essential to anyone encountering digital evidence while conducting an investigation. Mile2?s Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination. Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-ðcustody, and write a findings report. Through the use of a risk-based approach, the C)DFE is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline Computer Forensic Incidents Investigative Theory Investigative Process Digital Acquisition and Analysis Disks and Storages Live Acquisitions Windows Forensics Linux Forensics Mac Forensics Examination Protocols Digital Evidence Protocols Digital Evidence Presentation Laboratory Protocols Specialized Artifact Recovery eDiscovery and ESI Mobile Forensics Incident Handling Reporting Additional course details: Nexus Humans C)DFE - Certified Digital Forensics Examiner Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)DFE - Certified Digital Forensics Examiner Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)DFE - Certified Digital Forensics Examiner Mile 2
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin 2 with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals who have attended Red Hat System Administration I and want the skills to be full-time enterprise Linux administrators and/or earn RHCSA certifications This course focuses on the key tasks needed to become a full time Linux administrator and goes deeper into enterprise Linux administration including file systems and partitioning, logical volumes, SELinux, firewalling, and troubleshooting. Automate installation with Kickstart Automate the installation of Red Hat Enterprise Linux systems with Kickstart Use regular expressions with grep Write regular expressions that, when partnered with grep, will allow you to quickly isolate or locate content within text files. Create and Edit text files with vim Introduce the vim text editor, with which you can open, edit, and save text files. Schedule future Linux tasks Schedule tasks to automatically execute in the future. Manage priority of Linux processes Influence the relative priorities at which Linux processes run. Control access to files with access control lists (ACL) Manage file security using POSIX access control lists. Manage SELinux security Manage the Security Enhanced Linux (SELinux) behavior of a system to keep it secure in case of a network service compromise. Connect to network-defined users and groups Configure systems to use central identity management services. Add disks, partitions, and file systems to a Linux system Manage simple partitions and file systems. Manage logical volume management (LVM) storage Manage logical volumes from the command line. Access networked attached storage with network file system (NFS) Access (secure) NFS shares. Access networked storage with SMB Use autofs and the command line to mount and unmount SMB file systems. Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall, Configure a basic firewall. Comprehensive review Practice and demonstrate knowledge and skills learned in this course.

Enterprise Linux System Admin 2 with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Data Ethics for Business Professionals (DEBIZ)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for business leaders and decision makers, including C-level executives, project and product managers, HR leaders, Marketing and Sales leaders, and technical sales consultants, who have a vested interest in the representation of ethical values in technology solutions. Other individuals who want to know more about data ethics are also candidates for this course. This course is also designed to assist learners in preparing for the CertNexus DEBIZ™ (Exam DEB-110) credential. The power of extracting value from data utilizing Artificial Intelligence, Data Science and Machine Learning exposes the learning differences between humans and machines. Humans can apply ethical principles throughout the decision-making process to avoid discrimination, societal harm, and marginalization to maintain and even enhance acceptable norms. Machines make decisions autonomously. So how do we train them to apply ethical principles as they learn from decisions they make? This course provides business professionals and consumers of technology core concepts of ethical principles, how they can be applied to emerging data driven technologies and the impact to an organization which ignores ethical use of technology. Introduction to Data Ethics Defining Data Ethics The Case for Data Ethics Identifying Ethical Issues Improving Ethical Data Practices Ethical Principles Ethical Frameworks Data Privacy Accountability Transparency and Explainability Human-Centered Values and Fairness Inclusive Growth, Sustainable Development, and Well-Being Applying Ethical Principles to Emerging Technology Improving Ethical Data Practices Sources of Ethical Risk Mitigating Bias Mitigating Discrimination Safety and Security Mitigating Negative Outputs Data Surveillance Assessing Risk Ethical Risks in sharing data Applying professional critical judgement Business Considerations Data Legislation Impact of Social and Behavioral Effects Trustworthiness Impact on Business Reputation Organizational Values and the Data Value Chain Building a Data Ethics Culture/Code of Ethics Balancing organizational goals with Ethical Practice Additional course details: Nexus Humans CertNexus Data Ethics for Business Professionals (DEBIZ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Data Ethics for Business Professionals (DEBIZ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Data Ethics for Business Professionals (DEBIZ)
Delivered OnlineFlexible Dates
Price on Enquiry

Managing and Troubleshooting PCs - Part 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing and Troubleshooting PCs - Part 2
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for #NAME? Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. If you are an experienced Linux© system administrator and hold a Red Hat Certified System Administrator (RHCSA©) credential or possess equivalent skills and want to broaden your ability to administer Linux systems at an enterprise level, this is the perfect course.The course will empower you to deploy and manage network servers running caching domain name service (DNS), MariaDB, Apache HTTPD, Postfix SMTP null clients, network file sharing with network file system (NFS) and server message block (SMB), iSCSI initiators and targets, advanced networking and firewall configurations, and to use bash shell scripting to help automate, configure, and troubleshoot your system. Through lectures and hands-on labs, you will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300), supplementing what you have already learned in earning your RHCSA credential.This course is based on Red Hat© Enterprise Linux 7. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode

Red Hat System Administrator III - Data Center Services for RHEL7 (RH254)
Delivered OnlineFlexible Dates
Price on Enquiry

Building Web Applications With TypeScript, Angular, and React

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is for web developers who are well-versed in JavaScript and want to take their TypeScript knowledge to the next level. No prior TypeScript knowledge is required. Overview By completing this course, you will be able to build interesting TypeScript projects. This course will take your current TypeScript knowledge to the next level. Here are the important topics that this course will cover: - Learn the fundamentals of TypeScript - Build a weather forecast widget with Angular - Create building a note-taking client/server application using Angular, Node.js, and MongoDB - Create a real-time chat application with React In this course, you will begin by learning the fundamentals of TypeScript and then move toward advanced concepts. Then, learn how TypeScript relates to JavaScript that you may have written before. and understand the benefits of TypeScript and how it can help you avoid software defects. You will also learn to use type guards, check null and undefined, create tagged union types, and compare the performance of algorithms. Additionally, you will use TypeScript to build a weather forecast widget with Angular and then progress by building a note-taking client/server application using Angular, Node.js, and MongoDB, and finally create a real-time chat application with React. TypeScript Fundamentals Introduction to TypeScript Type Checking Advanced Type Analysis Features Comparing Performance of Algorithms Building a Weather Forecast Widget with Angular 4 Using Modules Creating the First Component Using the Component in Other Components Using the Main Component Note-Taking Client/Server App Setting up the Server Integrating with MongoDB Creating the Client Side with Angular Real-Time Chat Setting up the Project Writing the Server Creating the Chat Room Additional course details: Nexus Humans Building Web Applications With TypeScript, Angular, and React training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Web Applications With TypeScript, Angular, and React course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Web Applications With TypeScript, Angular, and React
Delivered OnlineFlexible Dates
Price on Enquiry

Enterprise Linux System Admin Fast Track with Exam Prep

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Practiced Linux system administrators who currently manage Linux servers at the enterprise level - Skilled Linux system administrators who who want or are required to demonstrate competencies by earning the RHCSA This course is designed for experienced Linux System Administrators who want to harden their technical skill sets and become accredited with the RHCSA certification. Accessing the command line Log in to a Linux system and run simple commands using the shell. Managing Files from the command line Work with files from the bash shell prompt. Managing local Linux users and groups Manage Linux users and groups and administer local password policies. Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. Monitoring and managing Linux processes Monitor and control processes running on the system. Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Controlling services and daemons Control and monitor network services and system daemons using systemd. Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Enterprise Linux System Admin Fast Track with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin Fast Track with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Enterprise Linux System Admin Fast Track with Exam Prep
Delivered OnlineFlexible Dates
Price on Enquiry