Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server
Duration 3 Days 18 CPD hours This course is intended for This course is intended for a programmer or web developer who is new to mobile app development in iOS. The student has experience using a computer running Mac OS X and developing applications or websites using object-oriented programming languages and tools, but may not have experience using the languages and tools specific to the iOS development environment. Overview In this course, you will develop, test, and package applications for devices that run the iOS operating system, including iPad and iPhone. You will: •Use Xcode to create and run an iOS application. •Write Objective-C code to enable iOS app user interface elements to interact with users. •Identify and describe common iOS design patterns and user interface standards. •Lay out and program apps to provide navigation among multiple views. •Access data from various locations, including app resources, user preferences, private app storage, and web services. •Enable an app to present graphics and multimedia. •Enable an app to interact well with other apps, the iOS system, and the mobile device it runs on. •Debug an app and implement runtime error handling. •Prepare an app for release, including configuration to support internationalization, and to run on multiple devices and different screen dimensions. This Logical Operations courseware is no longer available on the LO Store, but can be purchased by phone orderIn this course, students will learn how to develop and publish iOS apps, focusing on developing business apps for iPhones and iPads. Using Xcode to Develop an iOS App Set Up and Configure Xcode Create an App Project Create a User Interface Run an App in Simulator Programming in the iOS Development Environment Write Code to Handle User Interaction Organize and Maintain Code Use Predefined Classes Identifying Design Requirements for iOS Apps Design an App to Meet User Expectations iOS Design Patterns and Templates Implementing Multiple View Navigation Create an iOS App with Multiple Views Add a Custom View Controller Class Show Temporary Views Working with Data Select an Appropriate Data Storage Approach Load App Data from Property Lists Access Web Data and Services Store and Retrieve Preferences Working with Graphics and Media Load Graphic Images Draw Graphics Through Code Add Animation Effects Integrating with the App Ecosystem Manage App State Changes Map a Location Support Multiple Devices and Orientations Making Code More Robust and Maintainable Debug an App in Xcode Write Code to Handle Runtime Errors Finalizing an App Enable an App to Support Multiple Languages Prepare an App for Release
Duration 5 Days 30 CPD hours This course is intended for Motivations: Quickly learn the foundations of containerization and orchestration with Docker Swarm, and become familiar with all the features of Docker Enterprise. Roles: System Operators & Administrators Overview This course combines all topics of CN100 , CN110 , CN210 In this intense cloud native bootcamp, you?ll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible. In this intense cloud native bootcamp, you'll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Docker Enterprise. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of the Docker Enterprise platform as soon as possible.
Duration 5 Days 30 CPD hours This course is intended for This basic course is for IT personnel with a theoretical background of z/OS. Overview Review the main concepts of z/OS Log on to TSO and start ISPF/PDF Navigate through ISPF/PDF dialogs and use the basic ISPF/PDF functions and the ISPF Editor Use ISPF/PDF to allocate data sets and edit data sets (including hierarchical file system (HFS) files) via the ISPF Editor primary and line commands Use ISPF to create and manipulate (copy, rename, delete, list, sort and merge) data sets Identify security considerations for Multiple Virtual Storage (MVS) data sets and HFS files Describe and use TSO/E commands Perform simple modifications to existing ISPF/PDF panels Invoke a REXX exec and TSO CLIST Tailor existing JCL and submit batch jobs Review job status and job output using SDSF Invoke UNIX processes Manipulate HFS directories and file systems using the UNIX System Services ISHELL This course is designed to teach students the fundamental practical skills to navigate and work in a z/OS environment. This includes the use of ISPF/PDF dialogs, TSO/E commands, JCL, UNIX System Services shell, and BookManager. Review of the z/Architecture and z/OS An Introduction to ISPF, ISPF/PDF, and RACF System familiarization Working with ISPF/PDF (Part 1 & 2) Allocate new data sets ISPF editor primary commands ISPF editor line command Copy/move/rename/delete data sets and members Data set lists Working with TSO/E Using TSO/E commands Working with JCL Submit a job JCL exercises Working with UNIX System Services Procedures ISHELL and hierarchical file system Additional course details: Nexus Humans ES10 IBM Fundamental System Skills in z/OS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ES10 IBM Fundamental System Skills in z/OS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Lab Technician with Food Microbiology Diploma Master the essentials of medical and food microbiology as a Lab Technician. Elevate your analytical skills with state-of-the-art microscope techniques. Achieve excellence in healthcare and food safety with our comprehensive Lab Technician with Food Microbiology Diploma. Learning Outcomes: Operate medical laboratory equipment as a Lab Technician. Utilize microscope techniques in Lab Technician tasks. Analyze hematological samples proficiently as a Lab Technician. Conduct clinical chemistry assays in a Lab Technician role. Investigate food spoilage mechanisms as a specialized Lab Technician. More Benefits: LIFETIME access Device Compatibility Free Workplace Management Toolkit Key Modules from Lab Technician with Food Microbiology Diploma: Medical Laboratory Services Execute precise medical tests, reinforcing your expertise as a Lab Technician in healthcare settings. Microscope and How to Use It Master microscope operations to excel in your role as a Lab Technician across multiple fields. Haematology Perform thorough hematological assessments, cementing your standing as a proficient Lab Technician. Clinical Chemistry Conduct detailed clinical chemistry tests to facilitate medical diagnostics as a skilled Lab Technician. Food Spoilage and Preservation Explore mechanisms of food spoilage and apply effective preservation methods as a Lab Technician. Probiotic Foods and Gut Health Analyze probiotic foods and their impact on gut health, broadening your capabilities as a Lab Technician in food microbiology.
Overview With the ever-increasing demand for Google Workspace in personal & professional settings, this online training aims at educating, nurturing, and upskilling individuals to stay ahead of the curve - whatever their level of expertise in Google Workspace may be. Learning about Google Workspace or keeping up to date on it can be confusing at times, and maybe even daunting! But that's not the case with this course from Compete High. We understand the different requirements coming with a wide variety of demographics looking to get skilled in Google Workspace . That's why we've developed this online training in a way that caters to learners with different goals in mind. The course materials are prepared with consultation from the experts of this field and all the information on Google Workspace is kept up to date on a regular basis so that learners don't get left behind on the current trends/updates. The self-paced online learning methodology by compete high in this Google Workspace course helps you learn whenever or however you wish, keeping in mind the busy schedule or possible inconveniences that come with physical classes. The easy-to-grasp, bite-sized lessons are proven to be most effective in memorising and learning the lessons by heart. On top of that, you have the opportunity to receive a certificate after successfully completing the course! Instead of searching for hours, enrol right away on this Google Workspace course from Compete High and accelerate your career in the right path with expert-outlined lessons and a guarantee of success in the long run. Who is this course for? While we refrain from discouraging anyone wanting to do this Google Workspace course or impose any sort of restrictions on doing this online training, people meeting any of the following criteria will benefit the most from it: Anyone looking for the basics of Google Workspace , Jobseekers in the relevant domains, Anyone with a ground knowledge/intermediate expertise in Google Workspace , Anyone looking for a certificate of completion on doing an online training on this topic, Students of Google Workspace , or anyone with an academic knowledge gap to bridge, Anyone with a general interest/curiosity Career Path This Google Workspace course smoothens the way up your career ladder with all the relevant information, skills, and online certificate of achievements. After successfully completing the course, you can expect to move one significant step closer to achieving your professional goals - whether it's securing that job you desire, getting the promotion you deserve, or setting up that business of your dreams. Course Curriculum Module 01 Getting Started with Google Workspace Getting Started with Google Workspace 00:00 Module 02 Managing Files and Folders in Google Drive Managing Files and Folders in Google Drive 00:00 Module 03 Performing Common Tasks in Google Docs, Google Sheets, and Google Slides Performing Common Tasks in Google Docs, Google Sheets, and Google Slides 00:00 Module 04 Working in Google Docs Working in Google Docs 00:00 Module 05 Sharing and Collaborating on Files Sharing and Collaborating on Files 00:00 Module 06 Working in Google Sheets Working in Google Sheets 00:00 Module 07 Working in Google Slides Working in Google Slides 00:00 Module 08 Organising Your Life Organising Your Life 00:00
Data speaks volumes—if you know how to listen. This course offers a clever route into the world of MySQL, showing you how structured data can turn into smart decisions. Whether you're sifting through figures, building dashboards, or deciphering patterns, understanding SQL isn’t just helpful—it’s essential. You’ll be guided through the foundations of MySQL with clarity and precision, making sense of tables, queries, joins, and more—all without the fluff or confusion. Designed with the analytical mind in focus, this course shines a light on how MySQL powers insights behind the scenes in data science and analytics. It's tailored for learners who prefer clarity over jargon and structure over noise. If you're curious about how databases work and how data fuels smart outcomes, this course is your ideal stepping stone—organised, engaging and purposefully built for those who appreciate logic and clean learning paths. Expert Support Dedicated tutor support and 24/7 customer support are available to all students with this premium quality course. Key Benefits Learning materials of the Design course contain engaging voiceover and visual elements for your comfort. Get 24/7 access to all content for a full year. Each of our students gets full tutor support on weekdays (Monday to Friday) Course Curriculum: Section 01: Getting Started Introduction How to get course requirements Getting started on Windows, Linux or Mac How to ask great questions FAQ's What is Source Code? Section 02: SQL Server setting up Section Introduction MySQL Server Installation Connect MySQL Server Instance MySQL Workbench overview Download and Restore Sample Database Section 03: SQL Database basics Section Introduction Overview of Databases Creating Database SQL Data Types Column Data Types on Workbench Creating Table Overview of Primary and Foreign Key Primary Key Foreign Key Creating Temporary tables EER - Enhanced Entity Relationship Diagrams Section 04: SQL DML (Data Manipulation Language) Section Introduction Insert statement Update statement Delete statement Section 05: SQL DDL (Data Definition Language) Section Introduction CREATE table statement DROP statement ALTER statement TRUNCATE statement COMMENT in query RENAME table Section 06: SQL DCL (Data Control Language) Create Database user GRANT permissions REVOKE permissions Section 07: SQL Statement Basic Section Introduction SQL Statement basic SELECT Statement SELECT DISTINCT SELECT with column headings Column AS statement DASHBOARD Analytics Section 08: Filtering Data rows SELECT WHERE Clause - theory SELECT WHERE Clause - practical Section 09: Aggregate functions for Data Analysis Sum() Min()-Max() Section 10: SQL Data Analyticstatements Order By statement SELECT TOP 3 records BETWEEN command IN operator Search Data usingLIKE cards Section 11: SQL Group by statement Section Introduction Group by - theory Data Analytics with Group By HAVING statement Section 12: JOINS Overview of Joins What are Joins Inner join Left outer join Right outer join Union CERTESIAN Product or Cross Join Query Exercise Solution for Query Exercise Section 13: SQL Constraints Section introduction Check constraint NOT NULL constraint UNIQUE constraint Section 14: Views Creating Views Data Analytic Viewsfrom multiple tables Section 15: Advanced SQL Functions Section Introduction Timestamp Extract from timestamp Mathematical scalar functions String functions Advanced functions Sub Queries SELECT with calculations Section 16: SQL Stored procedures Create stored procedure Stored procedure with parameter Drop Procedure Section 17: Import & Export data Section Introduction Import .csv file Export Data to .csv file Section 18: Backup and Restore Database Section Introduction Creating Database backup Restoring Database backup Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). Who is this course for? This Learn MySQL from Scratch for Data Science and Analytics course is designed to enhance your expertise and boost your CV. Learn key skills and gain a certificate of achievement to prove your newly-acquired knowledge. Requirements This Learn MySQL from Scratch for Data Science and Analytics course is open to all, with no formal entry requirements. Career path Upon successful completion of The Learn MySQL from Scratch for Data Science and Analytics Course, learners will be equipped with many indispensable skills and have the opportunity to grab.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing ScreenOS products. Overview After successfully completing this course, you should be able to: Configure attack prevention features, including: ?SCREEN options; Deep Inspection (DI); and Antivirus (AV) scanning. Configure URL filtering. Configure antispam filters. This course meets the business needs of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Concepts Review Configuration Review Lab: ScreenOS Basics Review Chapter 3: SCREEN Options Multilayer Network Protection Types of Attacks SCREEN Options Configuration SCREEN Best Practices Lab: SCREEN Options Configuration Chapter 4: Deep Inspection Deep Inspection Overview Attack Database Configuration Policy Configuration Logging and Monitoring Lab: Deep Inspection Configuration Chapter 5: Antivirus Antivirus Operations Antivirus Configuration?Kaspersky Antivirus Configuration?ICAP Verifying Operations Lab: Antivirus Configuration Chapter 6: Web Filtering Web-Filtering Options Web-Filtering Configuration Verifying Operations Lab: Configuring Web Filtering Chapter 7: Antispam Antispam Concepts Antispam Configuration Verifying Operations Lab: Antispam Configuration Additional course details: Nexus Humans Attack Prevention with Juniper Networks Firewalls training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Attack Prevention with Juniper Networks Firewalls course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is recommended for technical professionals who need to deploy and manage Endpoint Security within their security environment. Overview Explain how Endpoint Security works to enforce corporate security compliance for end users and their devices. Become familiar with the Check Point Endpoint Security Solution architecture and how it integrates with Check Point Network Security Management. Identify and describe key elements of the SmartEndpoint Management console. Discuss Endpoint Security Software Blade options and how they are managed from the SmartEndpoint Management console. Explain how to create and assign security policies for Endpoint clients using Endpoint Security. Understand deployment methods and server considerations for Endpoint Security Management installation. Identify the different ways to install and configure Endpoint clients. Recognize how to configure VPN connectivity to allow clients connecting outside of the network perimeter to securely access corporate resources. Understand how Endpoint Security authenticates and verifies clients connecting to the Endpoint Security Management Server. Describe additional server configurations that are available to help manage Endpoint clients. Recognize the different types of data security protections available to deploy on end user machines. Describe how Full Disk Encryption technology protects and recovers data accessed and stored on Endpoint computers. Understand how to secure removable media devices. Become familiar with the Remote Help tool and how it supports clients experiencing FDE and Media Encryption issues. Recognize the types of threats that target Endpoint computers. Describe Check Point SandBlast Agent and how to deploy it in the Endpoint Security environment. Explain how SandBlast Agent technology prevents malware from infiltrating Endpoint machines and corporate resources. Identify SmartEndpoint reporting tools used to monitor and respond quickly to security events. Understand how to troubleshoot and debug issues. The goal of this course is to provide a comprehensive understanding of Check Point Endpoint Security and how to deploy it within the corporate network environment. Course Topics Introduction to Endpoint Security Endpoint Security Management Deploying Endpoint Security Additional Endpoint Server Configurations Data Security Protection Advanced Threat Prevention Reporting and Troubleshooting LAB EXERCISES Installing the Endpoint Security Management Solution Deploying Endpoint Client Packages Deploying Endpoint Policy Servers Configuring High Availability for Endpoint Security Modifying Client Installations Working with Deployment Rules Working with SandBlast Agent Additional course details: Nexus Humans CCES Check Point Certified Endpoint Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCES Check Point Certified Endpoint Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.