• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

730 Computing & Software Development Tools courses

Architecting on AWS - Accelerator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs Module 1: Introduction The real story of AWS Well-Architected Framework Six advantages of the cloud Global infrastructure Module 2: The Simplest Architectures S3 Glacier Choosing your regions Hands-on lab: Static Website Module 3: Adding a Compute Layer EC2 Storage solutions for instances Purchasing options such as dedicated host vs instances Module 4: Adding a Database Layer Relational vs non-relational Managed databases RDS Dynamo DB Neptune Hands-on lab: Deploying a web application on AWS Module 5: Networking in AWS Part 1 VPC CIDR and subnets Public vs private subnets NAT and internet gateway Security groups Module 6: Networking in AWS Part 2 Virtual Private Gateway VPN Direct Connect VPC peering Transit Gateway VPC Endpoints Elastic Load Balancer Route 53 Hands-on lab: Creating a VPC Module 7: AWS Identity and Access Management (IAM) IAM Identity federation Cognito Module 8: Organizations Organizations Multiple account management Tagging strategies Module 9: Elasticity, High Availability, and Monitoring Elasticity vs inelasticity Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs Auto scaling Scaling databases Hands-on lab: Creating a highly available environment Module 10: Automation Why automate? CloudFormation AWS Quick Starts AWS Systems Manager AWS OpsWorks AWS Elastic Beanstalk Module 11: Deployment Methods Why use a deployment method? Blue green and canary deployment Tools to implement your deployment methods CI/CD Hands-on lab: Automating infrastructure deployment Module 12: Caching When and why you should cache your data Cloudfront Elasticache (Redis/Memcached) DynamoDB Accelerator Module 13: Security of Your Data Shared responsibility model Data classification Encryption Automatic data security Module 14: Building Decoupled Architecture Tight coupling vs loose coupling SQS SNS Module 15: Optimizations and Review Review questions Best practices Activity: Design and architecture - two trues and one lie Module 16: Microservices What is a microservice? Containers ECS Fargate EKS Module 17: Serverless Why use serverless? Lambda API Gateway AWS Step Functions Hands-on lab: Implementing a serverless architecture with AWS Managed Services Module 18: Building for Resilience Using managed services greatly increases resiliency Serverless for resiliency Issues with microservices to be aware of DDoS Hands-on lab: Amazon CloudFront content delivery and automating WAF rules Module 19: Networking in AWS Part 3 Elastic Network Adapter Maximum transmission units Global Accelerator Site to site VPN Transit Gateway Module 20: Understanding Costs Simple monthly calculator Right sizing your instances Price sensitive architecture examples Module 21: Migration Strategies Cloud migration strategies Planning Migrating Optimizing Hands-on lab: Application deployment using AWS Fargate Module 22: RTO/RPO and Backup Recovery Setup Disaster planning Recovery options Module 23: Final Review Architecting advice Service use case questions Example test questions Additional course details: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS - Accelerator
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. Course Introduction Introductions and course logistics Course objectives SaltStack Config Architecture Identify the SaltStack Config deployment types Identify the components of SaltStack Config Describe the role of each SaltStack Config component SaltStack Config Security Describe local user authentication Describe LDAP and Active Directory authentication Describe the roles and permissions in vRealize Automation for SaltStack Config Describe the roles and permissions in SaltStack Config Describe the SecOps permissions in SaltStack Config Describe the advanced permissions available in SaltStack Config Targeting Minions Describe targeting and its importance Target minions by minion ID Target minions by glob Target minions by regular expressions Target minions by lists Target minions by compound matching Target minions by complex logical matching Remote Execution and Job Management Describe remote execution and its importance Describe functions and arguments Create and manage jobs Use the Activities dashboard Configuration Control Through States, Pillars, Requisites, and Declarations Define the SaltStack states Describe file management in SaltStack Config Create the SaltStack state files Identify the components of a SaltStack state Describe pillar data and the uses of pillar data Configure pillar data on the SaltStack Config master server Use pillar data in variables in the state files Describe the difference between IDs and names in the state files Use the correct execution order Use requisites in the state files Using Jinja and YAML Describe the SaltStack Config renderer system Use YAML in the state files Use Jinja in the state files Use Jinja conditionals, lists, and loops Using SaltStack SecOps Comply Describe the SaltStack SecOps Comply architecture Describe CIS and DISA STIG benchmarks Describe the SaltStack SecOps Comply security library Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© Create and manage the policies Create and manage the custom checks Run assessments on the minion systems Use SaltStack SecOps to remediate the noncompliant systems Manage the SaltStack SecOps Comply configuration options Manage the benchmark content ingestion Using SaltStack SecOps Protect Describe Common Vulnerabilities and Exposures (CVEs) Use the Protect dashboard Create and manage the policies Update the vulnerability library Run the vulnerability scans Remediate the vulnerabilities Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Internet of Things Practitioner (CIoTP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IT professionals with baseline skills in computer hardware, software support, and development who want to learn how to design, develop, implement, operate, and manage Internet of Things devices and related systems. It is for those interested in learning more about embedded systems, microcontroller programming, IoT security, and the development life cycle for IoT projects. While students will gain hands-on experience assembling a prototype IoT device and using software development tools, these activities are closely guided, so previous experience in electronics assembly and programming are not required. This course prepares students for taking the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110). Overview In this course, you will learn how to apply Internet of Things technologies to solve real-world problems. You will: Construct and program an IoT device. Communicate with an IoT device using wired and wireless connections. Process sensor input and control an actuator on an IoT device. Manage security, privacy, and safety risks on IoT projects. Plan an IoT prototyping and development project. In this course, you will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. You will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption. The instructor led course includes an exam voucher for the Certified Internet of Things Practitioner (CIoTP) exam (exam ITP-110). Planning an IoT Implementation Select a General Architecture for an IoT Project Identify Benefits and Challenges of IoT Constructing and Programming an IoT Device Select and Configure a Processing Unit Select a Microcontroller Power Source Use a Software Development Kit to Program an IoT Device Communicating with an IoT Device Communicate Using Wired Connections Communicate Using Wireless Connections Communicate Using Internet Protocols Processing IoT Data Process IoT Device Input and Output Process Data in the Cloud Provide Machine to Machine Communication Managing Risks on IoT Projects Identify IoT Security and Privacy Risks Manage IoT Security and Privacy Risks Manage IoT Safety Risks Undertaking an IoT Project Identify Real World Applications for IoT Follow the IoT Development Lifecycle Additional course details: Nexus Humans CertNexus Certified Internet of Things Practitioner (CIoTP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified Internet of Things Practitioner (CIoTP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified Internet of Things Practitioner (CIoTP)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Kubernetes Security Specialist (CKS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Security Professionals working with Kubernetes Clusters Container Orchestration Engineers DevOps Professionals Overview In this course, students will learn and practice essential Kubernetes concepts and tasks in the following sections: Cloud Security Fundamentals Cluster Hardening System Hardening Minimize Microservice Vulnerabilities Supply Chain Security Disaster Recovery Secure Back-up and Restore This class prepares students for the Certified Kubernetes Security Specialist (CKS) exam. Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stabilitywhile maximizing resource utilization for applications and services. By the conclusion of this hands-on, vendor agnostic training you will be equipped with a thorough understanding ofcloud security fundamentals, along with the knowledge, skills and abilities to secure a Kubernetes cluster, detect threats, and properly resolve a security catastrophe. This courseincludes hands-on instruction which develops skills and knowledge for securing container-based applications and Kubernetes platforms, during build, deployment, and runtime. We prioritizecovering all objectives and concepts necessary for passing the Certified Kubernetes Security Specialist (CKS) exam. You will be provided the components necessary to assemble your ownhigh availability Kubernetes environment and harden it for your security needs. Learning Your Environment Underlying Infrastructure Using Vim Tmux Cloud Security Primer Basic Principles Threat Analysis Approach CIS Benchmarks Securing your Kubernetes Cluster Kubernetes Architecture Pods and the Control Plane Kubernetes Security Concepts Install Kubernetes using kubeadm Configure Network Plugin Requirements Kubeadm Basic Cluster Installing Kubeadm Join Node to Cluster Kubeadm Token Manage Kubeadm Tokens Kubeadm Cluster Upgrade Securing the kube-apiserver Configuring the kube-apiserver Enable Audit Logging Falco Deploy Falco to Monitor System Calls Enable Pod Security Policies Encrypt Data at Rest Encryption Configuration Benchmark Cluster with Kube-Bench Kube-Bench Securing ETCD ETCD Isolation ETCD Disaster Recovery ETCD Snapshot and Restore Purge Kubernetes Purge Kubeadm 3Purge Kubeadm Image Scanning Container Essentials Secure Containers Creating a Docker Image Scanning with Trivy Trivy Snyk Security Manually Installing Kubernetes Kubernetes the Alta3 Way Deploy Kubernetes the Alta3 Way Validate your Kubernetes Installation Sonobuoy K8s Validation Test Kubectl (Optional) Kubectl get and sorting kubectl get kubectl describe Labels (Optional) Labels Labels and Selectors Annotations Insert an Annotation Securing your Application Scan a Running Container Tracee Security Contexts for Pods Understanding Security Contexts AppArmor Profiles AppArmor Isolate Container Kernels gVisor Pod Security Pod Security Policies Deploy a PSP Pod Security Standards Enable PSS Open Policy Agent (OPA) Admission Controller Create a LimitRange Open Policy Agent Policy as Code Deploy Gatekeeper User Administration Contexts Contexts Authentication and Authorization Role Based Access Control Role Based Access Control RBAC Distributing Access Service Accounts Limit Pod Service Accounts Securing Secrets Secrets Create and Consume Secrets Hashicorp Vault Deploy Vault Securing the Network Networking Plugins NetworkPolicy Deploy a NetworkPolicy mTLS Linkerd mTLS with istio istio Threat Detection Active Threat Analysis Host Intrusion Detection Deploy OSSEC Network Intrusion Detection Deploy Suricata Physical Intrusion Detection Disaster Recovery Harsh Reality of Security Deploy a Response Plan Kasten K10 Backups Deploy K10

Certified Kubernetes Security Specialist (CKS)
Delivered OnlineFlexible Dates
Price on Enquiry

DevOps Engineering on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: DevOps engineers DevOps architects Operations engineers System administrators Developers Overview In this course, you will learn to: Use DevOps best practices to develop, deliver, and maintain applications and services at high velocity on AWS List the advantages, roles and responsibilities of small autonomous DevOps teams Design and implement an infrastructure on AWS that supports DevOps development projects Leverage AWS Cloud9 to write, run and debug your code Deploy various environments with AWS CloudFormation Host secure, highly scalable, and private Git repositories with AWS CodeCommit Integrate Git repositories into CI/CD pipelines Automate build, test, and packaging code with AWS CodeBuild Securely store and leverage Docker images and integrate them into your CI/CD pipelines Build CI/CD pipelines to deploy applications on Amazon EC2, serverless applications, and container-based applications Implement common deployment strategies such as 'all at once,' 'rolling,' and 'blue/green' Integrate testing and security into CI/CD pipelines Monitor applications and environments using AWS tools and technologies DevOps Engineering on AWS teaches you how to use the combination of DevOps cultural philosophies, practices, and tools to increase your organization?s ability to develop, deliver, and maintain applications and services at high velocity on AWS. This course covers Continuous Integration (CI), Continuous Delivery (CD), infrastructure as code, microservices, monitoring and logging, and communication and collaboration. Hands-on labs give you experience building and deploying AWS CloudFormation templates and CI/CD pipelines that build and deploy applications on Amazon Elastic Compute Cloud (Amazon EC2), serverless applications, and container-based applications. Labs for multi-pipeline workflows and pipelines that deploy to multiple environments are also included. Module 0: Course overview Course objective Suggested prerequisites Course overview breakdown Module 1: Introduction to DevOps What is DevOps? The Amazon journey to DevOps Foundations for DevOps Module 2: Infrastructure automation Introduction to Infrastructure Automation Diving into the AWS CloudFormation template Modifying an AWS CloudFormation template Demonstration: AWS CloudFormation template structure, parameters, stacks, updates, importing resources, and drift detection Module 3: AWS toolkits Configuring the AWS CLI AWS Software Development Kits (AWS SDKs) AWS SAM CLI AWS Cloud Development Kit (AWS CDK) AWS Cloud9 Demonstration: AWS CLI and AWS CDK Hands-on lab: Using AWS CloudFormation to provision and manage a basic infrastructure Module 4: Continuous integration and continuous delivery (CI/CD) with development tools CI/CD Pipeline and Dev Tools Demonstration: CI/CD pipeline displaying some actions from AWS CodeCommit, AWS CodeBuild, AWS CodeDeploy and AWS CodePipeline Hands-on lab: Deploying an application to an EC2 fleet using AWS CodeDeploy AWS CodePipeline Demonstration: AWS integration with Jenkins Hands-on lab: Automating code deployments using AWS CodePipeline Module 5: Introduction to Microservices Introduction to Microservices Module 6: DevOps and containers Deploying applications with Docker Amazon Elastic Container Service and AWS Fargate Amazon Elastic Container Registry and Amazon Elastic Kubernetes service Demonstration: CI/CD pipeline deployment in a containerized application Module 7: DevOps and serverless computing AWS Lambda and AWS Fargate AWS Serverless Application Repository and AWS SAM AWS Step Functions Demonstration: AWS Lambda and characteristics Demonstration: AWS SAM quick start in AWS Cloud9 Hands-on lab: Deploying a serverless application using AWS Serverless Application Model (AWS SAM) and a CI/CD Pipeline Module 8: Deployment strategies Continuous Deployment Deployments with AWS Services Module 9: Automated testing Introduction to testing Tests: Unit, integration, fault tolerance, load, and synthetic Product and service integrations Module 10: Security automation Introduction to DevSecOps Security of the Pipeline Security in the Pipeline Threat Detection Tools Demonstration: AWS Security Hub, Amazon GuardDuty, AWS Config, and Amazon Inspector Module 11: Configuration management Introduction to the configuration management process AWS services and tooling for configuration management Hands-on lab: Performing blue/green deployments with CI/CD pipelines and Amazon Elastic Container Service (Amazon ECS) Module 12: Observability Introduction to observability AWS tools to assist with observability Hands-on lab: Using AWS DevOps tools for CI/CD pipeline automations Module 13: Reference architecture (Optional module) Reference architectures Module 14: Course summary Components of DevOps practice CI/CD pipeline review AWS Certification

DevOps Engineering on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Application Development I: Programming in Java EE with exam (AD184)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE). Overview As a result of attending this course, you should be able to describe most of the specifications in Java EE 7 and create a component with each specification. You will be able to convert a Java SE program into a multi-tiered Java EE application. You should be able to demonstrate these skills: Describe the architecture of multi-tiered Java EE applications. Package Java EE applications and deploy to Red Hat JBoss Enterprise Application Platform with various tools. Create an Enterprise Java Bean instance. Manage the persistence of data using Java Persistence API. Create a web service using JAX-RS. Properly apply context scopes to beans and inject resources into Java Beans. Store and retrieve messages using the Java Messaging Service. Secure a Java EE application. Red Hat Application Development I: Programming in Java EE with exam (AD184) exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). This course is based on Red Hat© Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183). In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. Transition to multi-tiered applications Describe Java EE features and distinguish between Java EE and Java SE applications. Package and deploying applications to an application server Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server. Create Enterprise Java Beans Develop Enterprise Java Beans, including message-driven beans. Manage persistence Create persistence entities with validations. Manage entity relationships Define and manage JPA entity relationships. Create REST services Create REST APIs using the JAX-RS specification. Implement Contexts and Dependency Injection Describe typical use cases for using CDI and successfully implement it in an application. Create messaging applications with JMS Create messaging clients that send and receive messages using the JMS API. Secure Java EE applications Use JAAS to secure a Java EE application. Comprehensive review of Red Hat JBoss Development I: Java EE Demonstrate proficiency of the knowledge and skills obtained during the course. Additional course details: Nexus Humans Red Hat Application Development I: Programming in Java EE with exam (AD184) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Application Development I: Programming in Java EE with exam (AD184) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Application Development I: Programming in Java EE with exam (AD184)
Delivered OnlineFlexible Dates
Price on Enquiry

CV852 IBM DB2 11 for zOS System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This is an intermediate course for system administrators, database administrators, and other technical individuals, who manage and implement DB2 10 for z/OS. Administrators of DB2 11 for z/OS can acquire a view of the architecture and fundamental processes required to manage a DB2 11 for z/OS subsystem. Course Outline Start and stop the DB2 subsystem Explain the allocation CLIST used at logon for DB2 data sets Use Set SYSPARM command Locate the Command recognition character for the DB2 subsystem Query the system log to gain knowledge about the IPL process and information in the system log when DB2 is initialized or stopped Explore DB2 Address Spaces information Select the DB2 functions that best satisfy your site requirements Explain the use of RACF for DB2 connection security Explain the use of Roles and Trusted Context Implement security procedures for a DB2 environment Describe the components and address space structure of a DB2 subsystem Explain DB2 Program Flow for all environments Invoke and use DB2 TSO Facilities Use the DB2 Catalog to monitor authorizations Increase the size of the Active Log data sets Explain DB2 Logging Use SET LOG SUSPEND and SET LOG RESUME Use DSNJU004 to Print Log Map Interpret the output of the Print Log Map Utility DSNJU004 Use DSNJU003 to rename DB2 data sets Plan for recovery of a BSDS failure Monitor and control DB2 Explain transaction flow in IMS and CICS Describe the CICS and DB2 environment Make use and implement the extended 10-byte RBA and LRSN

CV852 IBM DB2 11 for zOS System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Building Data Lakes on AWS

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake Introduction to data lakes Describe the value of data lakes Compare data lakes and data warehouses Describe the components of a data lake Recognize common architectures built on data lakes Data ingestion, cataloging, and preparation Describe the relationship between data lake storage and data ingestion Describe AWS Glue crawlers and how they are used to create a data catalog Identify data formatting, partitioning, and compression for efficient storage and query Lab 1: Set up a simple data lake Data processing and analytics Recognize how data processing applies to a data lake Use AWS Glue to process data within a data lake Describe how to use Amazon Athena to analyze data in a data lake Building a data lake with AWS Lake Formation Describe the features and benefits of AWS Lake Formation Use AWS Lake Formation to create a data lake Understand the AWS Lake Formation security model Lab 2: Build a data lake using AWS Lake Formation Additional Lake Formation configurations Automate AWS Lake Formation using blueprints and workflows Apply security and access controls to AWS Lake Formation Match records with AWS Lake Formation FindMatches Visualize data with Amazon QuickSight Lab 3: Automate data lake creation using AWS Lake Formation blueprints Lab 4: Data visualization using Amazon QuickSight Architecture and course review Post course knowledge check Architecture review Course review

AWS Building Data Lakes on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Developing on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Intermediate software developers Overview In this course, you will learn to: Set up the AWS SDK and developer credentials for Java, C#/.NET, Python, and JavaScript Interact with AWS services and develop solutions by using the AWS SDK Use AWS Identity and Access Management (IAM) for service authentication Use Amazon Simple Storage Service (Amazon S3) and Amazon DynamoDB as data stores Integrate applications and data by using AWS Lambda, Amazon API Gateway, Amazon Simple Queue Service (Amazon SQS), Amazon Simple Notification Service (Amazon SNS), and AWS Step Functions Use Amazon Cognito for user authentication Use Amazon ElastiCache to improve application scalability Leverage the CI/CD pipeline to deploy applications on AWS In this course, you learn how to use the AWS SDK to develop secure and scalable cloud applications using multiple AWS services such as Amazon DynamoDB, Amazon Simple Storage Service, and AWS Lambda. You explore how to interact with AWS using code and learn about key concepts, best practices, and troubleshooting tips. Module 0: Course Overview Agenda Introductions Student resources Module 1: Introduction to AWS Introduction to the AWS Cloud Cloud scenarios Infrastructure overview Introduction to AWS foundation services Module 2: Introduction to Developing on AWS Getting started with developing on AWS Introduction to developer tools Introduction to management tools Module 3: Introduction to AWS Identity and Access Management Shared responsibility model Introduction to IAM Use authentication and authorization Module 4: Introduction to the Lab Environment Introduction to the lab environment Lab 1: Getting started and working with IAM Module 5: Developing Storage Solutions with Amazon Simple Storage Service Overview of AWS storage options Amazon S3 key concepts Best practices Troubleshooting Scenario: Building a complete application Lab 2: Developing storage solutions with Amazon S3 Module 6: Developing Flexible NoSQL Solutions with Amazon DynamoDB Introduction to AWS database options Introduction to Amazon DynamoDB Developing with DynamoDB Best practices Troubleshooting Scenario: Building an end-to-end app Lab 3: Developing flexible NoSQL solutions with Amazon DynamoDB Module 7: Developing Event-Driven Solutions with AWS Lambda What is serverless computing? Introduction to AWS Lambda Key concepts How Lambda works Use cases Best practices Scenario: Build an end-to-end app Module 8: Developing Solutions with Amazon API Gateway Introduction to Amazon API Gateway Developing with API Gateway Best practices Introduction to AWS Serverless Application Model Scenario: Building an end-to-end app Lab 4: Developing event-driven solutions with AWS Lambda Module 9: Developing Solutions with AWS Step Functions Understanding the need for Step Functions Introduction to AWS Step Functions Use cases Module 10: Developing Solutions with Amazon Simple Queue Service and Amazon Simple Notification Service Why use a queueing service? Developing with Amazon Simple Queue Service Developing with Amazon Simple Notification Service Developing with Amazon MQ Lab 5: Developing messaging solutions with Amazon SQS and Amazon SNS Module 11: Caching Information with Amazon ElastiCache Caching overview Caching with Amazon ElastiCache Caching strategies Module 12: Developing Secure Applications Securing your applications Authenticating your applications to AWS Authenticating your customers Scenario: Building an end-to-end app Module 13: Deploying Applications Introduction to DevOps Introduction to deployment and testing strategies Deploying applications with AWS Elastic Beanstalk Scenario: Building an end-to-end app Lab 6: Building an end-to-end app Module 14: Course wrap-up Course overview AWS training courses Certifications Course feedback

Developing on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Database Design - A Modern Approach

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who need to learn database design essentials, typically in preparation for, or as a supplement to, a course on SQL such as SQL Querying: Fundamentals and courses on specific relational database platforms. Overview In this course, you will perform steps to design a relational database, including gathering requirements, data modeling, and planning implementation. You will: - Follow an efficient process for designing a relational database - Define the database conceptual model - Define the database logical model - Apply database normalization methods to improve the initial design of a database - Complete the database design, including controls to ensure its referential integrity and data integrity This course introduces you to a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential, and prevents the extra work of fixing data maintenance problems later on. The concepts are not specific to a particular software application and can be applied to any relational database management system. Getting Started with Relational Database Design Identify Database Components Identify Common Database Design Problems Follow a Database Design Process Gather Requirements Defining the Database Conceptual Model Create the Conceptual Model Identify Entity Relationships Defining the Database Logical Model Identify Columns Identify Primary Keys Identify and Diagram Relationships Normalizing Data Avoid Common Database Design Errors Comply with Higher Normal Forms Finalizing the Database Design Adapt the Physical Model for Different Systems Ensure Referential Integrity Ensure Data Integrity at the Column Level Ensure Data Integrity at the Table Level Design for the Cloud Additional course details: Nexus Humans Database Design - A Modern Approach training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Database Design - A Modern Approach course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Database Design - A Modern Approach
Delivered OnlineFlexible Dates
Price on Enquiry