Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real
Duration 3 Days 18 CPD hours
Duration 5 Days 30 CPD hours This course is intended for This course is for IT Professionals with expertise in designing and implementing solutions running on Microsoft Azure. They should have broad knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platform, budgeting, and governance. Azure Solution Architects use the Azure Portal and as they become more adept they use the Command Line Interface. Candidates must have expert-level skills in Azure administration and have experience with Azure development processes and DevOps processes. Overview Secure identities with Azure Active Directory and users and groups. Implement identity solutions spanning on-premises and cloud-based capabilities Apply monitoring solutions for collecting, combining, and analyzing data from different sources. Manage subscriptions, accounts, Azure policies, and Role-Based Access Control. Administer Azure using the Resource Manager, Azure portal, Cloud Shell, and CLI. Configure intersite connectivity solutions like VNet Peering, and virtual network gateways. Administer Azure App Service, Azure Container Instances, and Kubernetes. This course teaches Solutions Architects how to translate business requirements into secure, scalable, and reliable solutions. Lessons include virtualization, automation, networking, storage, identity, security, data platform, and application infrastructure. This course outlines how decisions in each theses area affects an overall solution. Implement Azure Active Directory Overview of Azure Active Directory Users and Groups Domains and Custom Domains Azure AD Identity Protection Implement Conditional Access Configure Fraud Alerts for MFA Implement Bypass Options Configure Guest Users in Azure AD Configure Trusted IPs Manage Multiple Directories Implement and Manage Hybrid Identities Install and Configure Azure AD Connect Configure Password Sync and Password Writeback Configure Azure AD Connect Health Implement Virtual Networking Virtual Network Peering Implement VNet Peering Implement VMs for Windows and Linux Select Virtual Machine Size Configure High Availability Implement Azure Dedicated Hosts Deploy and Configure Scale Sets Configure Azure Disk Encryption Implement Load Balancing and Network Security Implement Azure Load Balancer Implement an Application Gateway Understand Web Application Firewall Implement Azure Firewall Implement Azure Front Door Implementing Azure Traffic Manager Implement Storage Accounts Storage Accounts Blob Storage Storage Security Managing Storage Accessing Blobs and Queues using AAD Implement NoSQL Databases Configure Storage Account Tables Select Appropriate CosmosDB APIs Implement Azure SQL Databases Configure Azure SQL Database Settings Implement Azure SQL Database Managed Instances High-Availability and Azure SQL Database In this module, you will learn how to Create an Azure SQL Database (single database) Create an Azure SQL Database Managed Instance Recommend high-availability architectural models used in Azure SQL Database Automate Deployment and Configuration of Resources Azure Resource Manager Templates Save a Template for a VM Evaluate Location of New Resources Configure a Virtual Hard Disk Template Deploy from a template Create and Execute an Automation Runbook Implement and Manage Azure Governance Create Management Groups, Subscriptions, and Resource Groups Overview of Role-Based Access Control (RBAC) Role-Based Access Control (RBAC) Roles Azure AD Access Reviews Implement and Configure an Azure Policy Azure Blueprints Manage Security for Applications Azure Key Vault Azure Managed Identity Manage Workloads in Azure Migrate Workloads using Azure Migrate VMware - Agentless Migration VMware - Agent-Based Migration Implement Azure Backup Azure to Azure Site Recovery Implement Azure Update Management Implement Container-Based Applications Azure Container Instances Configure Azure Kubernetes Service Implement an Application Infrastructure Create and Configure Azure App Service Create an App Service Web App for Containers Create and Configure an App Service Plan Configure Networking for an App Service Create and Manage Deployment Slots Implement Logic Apps Implement Azure Functions Implement Cloud Infrastructure Monitoring Azure Infrastructure Security Monitoring Azure Monitor Azure Workbooks Azure Alerts Log Analytics Network Watcher Azure Service Health Monitor Azure Costs Azure Application Insights Unified Monitoring in Azure
Duration 3 Days 18 CPD hours This course is intended for Students in this course are experienced AWS developers interested in Azure development. A three-day course designed to teach AWS (Amazon Web Services) developers how to prepare end-to-end solutions in Microsoft Azure. In this course you will construct Azure App Service Web App solutions and Azure Functions, use blob or Cosmos DB storage in solutions, implement secure cloud solutions that include user authentication and authorization, implement API management, and develop event- and message-based solutions, and monitor, troubleshoot, and optimize your Azure solutions. You will learn how developers use Azure services, with additional focus on features and tasks that differ from AWS, and what that means for you as you develop applications that will be hosted by using Azure services Create Azure App Service Web Apps Azure App Service core concepts Creating an Azure App Service Web App Configuring and Monitoring App Service apps Scaling App Service apps Azure App Service staging environments Implement Azure functions Azure Functions overview Developing Azure Functions Implement Durable Functions Develop solutions that use blob storage Azure Blob storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Create an Azure Resource Manager Template Develop solutions that use Cosmos DB storage Azure Cosmos DB overview Azure Cosmos DB data structure Working with Azure Cosmos DB resources and data Create and deploy ARM templates Implement user authentication and authorization Microsoft Identity Platform v2.0 Authentication using the Microsoft Authentication Library Using Microsoft Graph Authorizing data operations in Azure Storage Implement secure cloud solutions Manage keys, secrets, and certificates by using the KeyVault API Implement Managed Identities for Azure resources Secure app configuration data by using Azure App Configuration Implement API Management API Management overview Defining policies for APIs Securing your APIs Develop event-based solutions Implement solutions that use Azure Event Grid Implement solutions that use Azure Event Hubs Implement solutions that use Azure Notification Hubs Develop message-based solutions Implement solutions that use Azure Service Bus Implement solutions that use Azure Queue Storage queues Monitor and optimize Azure solutions Overview of monitoring in Azure Instrument an app for monitoring Analyzing and troubleshooting apps Implement code that handles transient faults Additional course details: Nexus Humans AZ-020T00 - Microsoft Azure solutions for AWS Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-020T00 - Microsoft Azure solutions for AWS Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. Overview After completing this course, students will be able to: Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Define Site Reliability Engineering Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms. Module 1: Get started on a DevOps transformation journey Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Module 2: Development for enterprise DevOps Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Module 3: Implement CI with Azure Pipelines and GitHub Actions Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Module 4: Design and implement a release strategy Introduction to continuous delivery Explore release strategy recommendations Build a high-quality release pipeline Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Create a release pipeline Provision and test environments Manage and modularize tasks and templates Automate inspection of health Manage application configuration data Integrate with identity management systems Implement application configuration Module 6: Manage infrastructure as code using Azure and DSC Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Module 7: Implement security and validate code bases for compliance Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Module 8: Design and implement a dependency management strategy Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Module 9: Implement continuous feedback Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Additional course details: Nexus Humans AZ-400 Designing and Implementing Microsoft DevOps Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-400 Designing and Implementing Microsoft DevOps Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours
Duration 2 Days 12 CPD hours This course is intended for This course is ideal for beginners and intermediate frontend developers who want to become full-stack developers. You will need some prior working knowledge of JavaScript and MongoDB as we skim over its basics and get straight to work. Overview At the end of this day, students should be able to: Understand the MEAN architecture Create RESTful APIs to complete CRUD tasks Build a blogging application with basic features Describe best practices to secure node applications Implement authentication and authorization Create simple animations using Angular Perform unit testing on Angular applications MongoDB, Express, Angular and Node.js Fundamentals begins by demystifying the MEAN architecture. You will review the features of the JavaScript technologies, frameworks, or libraries that make up a MEAN stack. You will also understand how to develop a RESTful API using Node.js, Express.js, and MongoDB Atlas. This course will enable you to discover how to build a blogging application using the MEAN stack. Next, you will learn about authentication using MEAN, and explore the features of Angular, such as pipes, reactive forms, modules and optimizing apps, animations and unit testing, and much more. By the end of the course, you will have all of the knowledge you need to become a pro at developing efficient web applications using JavaScript technologies. Introduction to the MEAN stack MEAN Architecture Demystification Getting Started with Node Activity 1: Creating an HTTP Server for a Blogging Application Understanding Callbacks, Event loop and EventEmitters in Node Understanding Buffers, Streams and Filesystem in Node Activity 2: Streaming Data to a File Developing RESTful APIs to perform CRUD operations Getting Started with RESTful APIs Getting started with MongoDB Atlas Activity 3: Connecting the Node Application with MongoDB Atlas Getting Started with Express Activity 4: Creating Express API Route and Controller Activity 5: Testing Fully Functional RESTful API Beginning Frontend Development with Angular CLI Getting Started with Angular CLI Using Components, Directives, Services, and Making HTTP Requests in Angular Activity 6: Designing the Frontend and Components for the Blogging Application Activity 7: Writing Services and Making HTTP Request Calls to an API Understanding Angular Forms and Routing Activity 8: Creating a Form Application Using the Reactive/Model-Driven Method Activity 9: Creating and Validating Different Forms Using the Template and Reactive Driven Method Activity 10: Implementing a Router for the Blogging Application Understanding MEAN Stack Security Node Security and Best Practices Node Application Authentication with JSON Web Token (JWT) Activity 11: Securing the RESTful API Node Application Authentication with Passport Activity 12: Creating a Login Page to Allow Authentication with Twitter Using Passport Strategies Angular Declarables, Bootstrapping, and Modularity Using Inbuilt Pipes, Custom Pipes, Custom Directives, and Observables Activity 13: Communicating Between Two Components Using Observable Angular Bootstrapping and Modularity Activity 14: Creating a Lazy Loaded Application Testing and Optimizing Angular Applications Angular Animations and Latest Angular Features Activity 15: Animating the Route Transition Between the Blog Post Page and View Post Page of the Blogging Application Optimizing Angular Applications Testing Angular Applications Activity 16: Performing Unit Testing on the App Root Component and Blog-Post Component Overview on the new features in Angular
Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, site reliability engineers, and other IT professionals with some Ansible experience who are interested in learning how to manage and automate the deployment, configuration, and operation of key network services included with Red Hat Enterprise Linux 8. Overview Provide key network services using software included with Red Hat Enterprise Linux 8, including DNS with Unbound and BIND9, DHCP and DHCPv6, client e-mail transmission, printing service, NFS and SMB protocol file sharing, SQL database service with MariaDB, and web services using Apache HTTPD, nginx, Varnish, and HAProxy. Configure advanced networking for server use cases, including device teaming. Use Red Hat Ansible Engine to automate the manual deployment and configuration tasks covered in this course. Learn how to configure, manage, and scale key services used in the data center Red Hat Services Management and Automation (RH358) is designed for IT professionals with some experience managing Linux© systems and want to learn more about how to manage and deploy network services included with Red Hat© Enterprise Linux which are particularly important in the modern IT data center. You will learn how to install, configure, and manage basic configurations of these services manually, and then use Red Hat Ansible© Engine to automate your work in a scalable, repeatable manner. This course is based on Red Hat Ansible Engine 2.9 and Red Hat Enterprise Linux 8.1. 1 - Manage network services Discuss and review key tools and skills needed to manage network services. 2 - Configure link aggregation Improve the redundancy or throughput of network connections of servers by configuring Linux network teaming between multiple network interfaces. 3 - Manage DNS and DNS servers Explain the operation of DNS service, troubleshoot DNS issues, and configure servers to act as a DNS caching nameserver or as an authoritative name server. 4 - Manage DHCP and IP address assignment Explain and configure services used for IPv4 and IPv6 address assignment including DHCP, DHCPv6, and SLAAC. 5 - Manage printers and printing files Configure systems to print to a network printer that supports IPP Everywhere, as well as manage existing printer queues. 6 - Configure email transmission Discuss how mail servers operate, then configure a server to use system tools and Postfix to send email messages through an outbound mail relay. 7 - Configure MariaDB SQL databases Discuss the basic operation of SQL-based relational databases, perform basic SQL queries for troubleshooting, and be able to set up a simple MariaDB database service. 8 - Configure web servers Provide web content from Apache HTTPD or Nginx web servers, then configure them with virtual hosts and TLS-based encryption. 9 - Optimize web server traffic Improve performance of your web servers by using Varnish to cache static content being served and HAProxy to terminate TLS connections and balance load between servers. 10 - Provide file-based network storage Deliver simple file-based network shares to clients using the NFS and SMB protocols. 11 - Access block-based network storage Configure iSCSI initiators on your servers to access block-based storage devices provided by network storage arrays or Ceph storage clusters.
Duration 5 Days 30 CPD hours This course is intended for Security administrators Security consultants Network administrators System engineers Technical support personnel Cisco integrators and partners Overview After taking this course, you should be able to: Describe key concepts of NGIPS and NGFW technology and the Cisco Firepower Threat Defense system, and identify deployment scenarios Perform initial Cisco Firepower Threat Defense device configuration and setup tasks Describe how to manage traffic and implement Quality of Service (QoS) using Cisco Firepower Threat Defense Describe how to implement NAT by using Cisco Firepower Threat Defense Perform an initial network discovery, using Cisco Firepower to identify hosts, applications, and services Describe the behavior, usage, and implementation procedure for access control policies Describe the concepts and procedures for implementing security intelligence features This course gives you knowledge and skills to use and configure Cisco© Firepower Threat Defense technology, beginning with initial device setup and configuration and including routing, high availability, Cisco Adaptive Security Appliance (ASA) to Cisco Firepower Threat Defense migration, traffic control, and Network Address Translation (NAT). You will learn how to implement advanced Next-Generation Firewall (NGFW) and Next-Generation Intrusion Prevention System (NGIPS) features, including network intelligence, file type detection, network-based malware detection, and deep packet inspection. You will also learn how to configure site-to-site VPN, remote-access VPN, and Secure Sockets Layer (SSL) decryption before moving on to detailed analysis, system administration, and troubleshooting. Cisco Firepower Threat Defense Overview Examining Firewall and IPS Technology Firepower Threat Defense Features and Components Examining Firepower Platforms Examining Firepower Threat Defense Licensing Cisco Firepower Implementation Use Cases Cisco Firepower NGFW Device Configuration Firepower Threat Defense Device Registration FXOS and Firepower Device Manager Initial Device Setup Managing NGFW Devices Examining Firepower Management Center Policies Examining Objects Examining System Configuration and Health Monitoring Device Management Examining Firepower High Availability Configuring High Availability Cisco ASA to Firepower Migration Migrating from Cisco ASA to Firepower Threat Defense Cisco Firepower NGFW Traffic Control Firepower Threat Defense Packet Processing Implementing QoS Bypassing Traffic Cisco Firepower NGFW Address Translation NAT Basics Implementing NAT NAT Rule Examples Implementing NAT Cisco Firepower Discovery Examining Network Discovery Configuring Network Discovery Implementing Access Control Policies Examining Access Control Policies Examining Access Control Policy Rules and Default Action Implementing Further Inspection Examining Connection Events Access Control Policy Advanced Settings Access Control Policy Considerations Implementing an Access Control Policy Security Intelligence Examining Security Intelligence Examining Security Intelligence Objects Security Intelligence Deployment and Logging Implementing Security Intelligence File Control and Advanced Malware Protection Examining Malware and File Policy Examining Advanced Malware Protection Next-Generation Intrusion Prevention Systems Examining Intrusion Prevention and Snort Rules Examining Variables and Variable Sets Examining Intrusion Policies Site-to-Site VPN Examining IPsec Site-to-Site VPN Configuration Site-to-Site VPN Troubleshooting Implementing Site-to-Site VPN Remote-Access VPN Examining Remote-Access VPN Examining Public-Key Cryptography and Certificates Examining Certificate Enrollment Remote-Access VPN Configuration Implementing Remote-Access VPN SSL Decryption Examining SSL Decryption Configuring SSL Policies SSL Decryption Best Practices and Monitoring Detailed Analysis Techniques Examining Event Analysis Examining Event Types Examining Contextual Data Examining Analysis Tools Threat Analysis System Administration Managing Updates Examining User Account Management Features Configuring User Accounts System Administration Cisco Firepower Troubleshooting Examining Common Misconfigurations Examining Troubleshooting Commands Firepower Troubleshooting
Duration 5 Days 30 CPD hours This course is intended for This course is designed for application developers. Overview Deploy microservice applications on Red Hat© OpenShift Container Platform. Build a microservice application with Quarkus. Implement unit and integration tests for microservices. Use the config specification to inject data into a microservice. Secure a microservice using OAuth. Build and deploy native Quarkus applications. Develop microservice-based applications with Quarkus and OpenShift. Many enterprises are looking for a way to take advantage of cloud-native architectures, but many do not know the best approach. Quarkus is an exciting new technology that brings the reliability, familiarity, and maturity of Java Enterprise with a container-ready lightning fast deployment time. Red Hat Cloud-native Microservices Development with Quarkus (DO378) emphasizes learning architectural principles and implementing microservices based on Quarkus and OpenShift. You will build on application development fundamentals and focus on how to develop, monitor, test, and deploy modern microservices applications.. This course is based on OpenShift 4.5 and Quarkus 1.7L 1 - Describe microservice architectures Describe components and patterns of microservice-based application architectures. 2 - Implement a microservice with Quarkus Describe the specifications in Quarkus, implement a microservice with some of the specifications, and deploy it to an OpenShift cluster. 3 - Build microservice applications with Quarkus Build a persistent and configurable distributed quarkus microservices application. 4 - Implement fault tolerance Implement fault tolerance in a microservice architecture. 5 - Build and deploy native Quarkus applications Describe Quarkus in native mode and describe its deployment on OpenShift Container Platform. 6 - Test microservices Implement unit and integration tests for microservices. 7 - Create application health checks Create a health check for a microservice. 8 - Secure microservices Secure microservice endpoints and communication. 9 - Monitor microservices Monitor the operation of a microservice using metrics and distributed tracing. Additional course details: Nexus Humans Red Hat Cloud-native Microservices Development with Quarkus (DO378) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Cloud-native Microservices Development with Quarkus (DO378) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.