Accelerate Your Cyber Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! Study methodOnline Duration9 months · Self-paced Access to content5 years CertificationsCompTIA A+CompTIA Network+CompTIA Security+CompTIA IT Fundamentals CertificationCompTIA CySA+CompTIA PenTest+ Certificates Official CompTIA Certification - Free Additional info Exam(s) / assessment(s) is included in price Tutor is available to students TOTUM card included in price Job guarantee programme is included in this course Overview Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy With the increase in cyberattacks and the number of new connected devices, the need for skilled cybersecurity professionals is growing at a rapid pace, and cybersecurity professionals must nurture their practical, hands-on skills. If you are looking for employment in cybersecurity, then this programme will provide you with an endorsement of your skills that is respected globally and industry-wide. Certifications CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA IT Fundamentals Certification CompTIA CySA+ CompTIA PenTest+ Awarded by CompTIA Description With a national shortage of Cyber Security Engineers, starting salaries of up to £25,000 per annum (average UK Salary £72,500) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Cyber Security Programme. What you can expect from our Fast Track Programme: World Class Education Energetic and unlimited 24/7 Student Support Real, tangible Career Outcomes 5 Years Career Support What our programme includes: Industry Recognised Qualifications CompTIA ITF+ (IT Fundamentals) CompTIA A+ CompTIA Network+ CompTIA Security+ CompTIA CySA+ OR CompTIA PenTest+ Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: CV writing Expert careers advice Interview preparation Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our AdvancedCareer Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. Who is this course for? This course is open to anyone interested in pursuing a Career in Cyber Security. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. Requirements This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. Career path Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £72.5K). Our Career Support Guarantee gives you exclusive access to our dedicated Career Support Team and Advanced Career Skills Academy for 5 Years following Graduation. Certificates Official CompTIA Certification Hard copy certificate - Included We provide Official CompTIA Certificates for all courses included (ITF+, A+(2), Network+, Security+, CySA+ or PenTest+.
SAFe® for Architects: In-House Training Enable continuous value flow by aligning technical strategy with business goals, communicating that strategy to development teams, and applying Agile architecture practices. Attendees can improve collaboration and alignment in a SAFe® Lean-Agile enterprise when they become a SAFe® 5 Architect. The SAFe® for Architects course prepares System, Solution, and Enterprise Architects to engage across the organization as effective leaders and change agents who collaboratively deliver architectural solutions. During this course, attendees will explore the roles, responsibilities, and mindset of Agile Architects, and appreciate how to align architecture with business value and drive continuous flow to large systems of systems while supporting SAFe® program execution. What you will Learn To perform the role of a SAFe® Architect, you should be able to: Architect using SAFe® principles Align architecture with business value Develop and communicate architecture vision and intent Plan architectural runway to enable delivery success Architect for continuous delivery and Release on Demand Lead and coach architects and team members during Program Increment (PI) Planning and execution Provide leadership during a Lean-Agile transformation Exemplifying Lean-Agile architecture Architecting for DevOps and Release on Demand Aligning architecture with business value Developing Solution Vision, Solution Intent, and Roadmaps Preparing architecture for Program Increment (PI) Planning Coordinating architecture throughout PI Planning Supporting Continuous Delivery during PI execution Supporting new Strategic Themes and Value Streams Leading as an architect during a Lean-Agile transformation
ITIL® 4 Foundation: In-House Training ITIL® 4 is built on the established core of best practice in the ITIL® guidance. ITIL® 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services. ITIL® 4 also provides a holistic end-to-end picture that integrates frameworks such as Lean IT, Agile, and DevOps. The ITIL® 4 Foundation is based on the exam specifications specified by AXELOS for the ITIL® 4 Foundation certification. The fundamental objective of this course is to help the participants understand the key concepts of service management and the ITIL® 4 service management framework and prepare for the ITIL® 4 Foundation exam. In addition, this course offers a rich learning experience that helps the participants relate ITIL® to their own work environment. The course includes a case study (based on a fictitious organization, 'Axle Car Hire') that will help the participants understand and experience the ITIL® guiding principles, service value, practices through real-world challenges and opportunities. The rich learning experience is supported by additional learning tools such as pre-course reading materials, post-course reading material, and a set of quick reference cards. What You Will Learn At the end of this program, you will be able to: Understand the key concepts of ITIL® service management Understand how ITIL® guiding principles can help an organization to adopt and adapt ITIL® service management Understand the four dimensions of ITIL® service management Understand the purpose and components of the ITIL® service value system, and activities of the service value chain, and how they interconnect Understand the key concepts of continual improvement Learn the various ITIL® practices and how they contribute to value chain activities Course Introduction Let's Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to IT Service Management in the Modern World Introduction to ITIL® 4 Structure and Benefits of ITIL® 4 Case Study: Axle Car Hire Case Study: Meet the Key People at Axle Case Study: The CIOs Vision for Axle Exam Details ITIL® 4 Certification Scheme Service Management - Key Concepts Intent and Context Key Terms Covered in the Module Module Learning Objectives Value and Value Co-Creation Value: Service, Products, and Resources Service Relationships Value: Outcomes, Costs, and Risks Exercise: Multiple-Choice Questions The Guiding Principles Intent and Context Identifying Guiding Principles Key Terms Covered in the Module Module Learning Objectives The Seven Guiding Principles Applying the Guiding Principles Exercise: Multiple-Choice Questions The Four Dimensions of Service Management Intent and Context The Four Dimensions Key Terms Covered in the Module The Four Dimensions and Service Value System Module Learning Objectives Organizations and People Information and Technology Partners and Suppliers Value Streams and Processes External Factors and Pestle Model Exercise: Multiple-Choice Questions Service Value System Intent and Context Service Value System and Service Value Chain Module Learning Objectives Overview of Service Value System Overview of the Service Value Chain Exercise: Multiple-Choice Questions Continual Improvement Intent and Context Key Terms Covered in the Module Introduction to Continual Improvement Module Learning Objectives The Continual Improvement Model Relationship between Continual Improvement and Guiding Principles Exercise: Multiple-Choice Questions The ITIL® Practices Intent and Context ITIL® Management Practices Key Terms Covered in the Module Module Learning Objectives The Continual Improvement Practice The Change Control Practice The Incident Management Practice The Problem Management Practice The Service Request Management Practice The Service Desk Practice The Service Level Management Practice Purpose of ITIL® Practices Exercise: Crossword Puzzle
Regular expressions training course description Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Python and MySQL. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Once you've mastered regular expressions, they'll become an invaluable part of your toolkit. You will wonder how you ever got by without them. What will you learn Use Regular Expressions. Troubleshoot Regular Expressions. Compare RE features among different versions. Explain how the regular expression engine works. Optimize REs. Match what you want, not what you don't want. Regular expressions training course details Who will benefit: Anyone looking to use regular expressions. Prerequisites: None. Duration 1 day Regular expressions training course contents Introduction to Regular Expressions Solving real problems, REs as a language, the filename analogy, language analogy, RE frame of mind, searching text files: egrep, egrep metacharacters, start and end of the line, character classes, matching any character with dot, alternation, ignoring differences in capitalization, word boundaries, optional items, other quantifiers: repetition, parentheses and backreferences, the great escape, expanding the foundation, linguistic diversification, the goal of a RE, more examples, RE nomenclature, Improving on the status quo. Extended introductory examples A short introduction to Perl, matching text with regular expressions, toward a more real-world example, side effects of a successful match, Intertwined regular expression, intermission, modifying text with regular expressions, example: form letter, example: prettifying a stock price, automated editing, a small mail utility, adding commas to a number with lookaround, text-to-HTML conversion, that doubled-word thing. Regular expression features and flavours The regex landscape, origins of REs, care and handling of REs, Integrated handling, procedural and object-oriented handling, search-and-replace example. strings character encodings and modes, strings as REs, character-encoding issues, unicode, regex modes and match modes, common metacharacters and features, character representations, character classes and class-like constructs, anchors and other 'zero-width assertions', comments and mode modifiers, grouping capturing conditionals and control. The mechanics of expression processing Two kinds of engines, new standards, regex engine types, from the department of redundancy department, testing the engine type, match basics, about the examples, rule 1: the match that begins earliest wins, engine pieces and parts, rule 2: the standard quantifiers are greedy, regex-directed versus text-directed, NFA engine: regex-directed, DFA engine: text-directed, first thoughts: NFA and DFA in comparison, backtracking, two important points on backtracking, saved states, backtracking and greediness, more about greediness and backtracking, problems of greediness, multi-character 'quotes', lazy quantifiers, greediness and laziness, laziness and backtracking, possessive quantifiers and atomic grouping, possessive quantifiers ?, +, *+, ++ and {m,n}+, the backtracking of lookaround, is alternation greedy? taking advantage of ordered alternation, NFA DFA and posix, the longest-leftmost', posix and the longest-leftmost rule, speed and efficiency. Practical regex techniques Continuation lines, matching an IP address, working with filenames, matching balanced sets of parentheses, watching out for unwanted matches, matching delimited text, knowing your data and making assumptions, stripping leading and trailing whitespace, matching and HTML tag, matching an HTML link, examining an HTTP URL, validating a hostname, plucking a hostname, plucking a URL, parsing CSV files. Crafting an efficient expression Efficiency vs. correctness, localizing greediness, global view of backtracking, more work for POSIX NFA, work required during a non-match, being more specific, alternation can be expensive, benchmarking, know what you re measuring, benchmarking with Python, common optimisations, the mechanics of regex application, pre-application optimizations, optimizations with the transmission, optimization of the regex itself, techniques for faster expressions, common sense techniques, expose literal text, expose anchors, lazy versus greedy: be specific, split into multiple REs, mimic initial-character discrimination, use atomic grouping and possessive quantifiers, lead the engine to a match, unrolling the loop, observations, using atomic grouping and possessive quantifiers, short unrolling examples, unrolling C comments, the free flowing regex, a helping hand to guide the match, a well-guided regex is a fast regex.
DevOps demystified training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps demystifieds training course details Who will benefit: Non-technical staff involved with DevOps. Prerequisites: None. Duration 1 day DevOps demystified training course contents Why DevOps? From a business perspective From an IT perspective Stereotypes of Dev and Ops: perception and reality What is DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture Implementation Challenges, risks and critical success factors Measuring DevOps successes
Duration 3 Days 18 CPD hours This course is intended for System administrators and operators who are operating in the AWS Cloud Informational technology workers who want to increase the system operations knowledge. Overview Identify the AWS services that support the different phases of Operational Excellence, an AWS Well-Architected Framework pillar Manage access to AWS resources using AWS accounts and organizations and AWS Identity and Access Management (IAM) Maintain an inventory of in-use AWS resources by using AWS services, such as AWS Systems Manager, AWS CloudTrail, and AWS Config Develop a resource deployment strategy using metadata tags, Amazon Machine Images (AMIs), and AWS Control Tower to deploy and maintain an AWS cloud environment Automate resource deployment by using AWS services, such as AWS CloudFormation and AWS Service Catalog Use AWS services to manage AWS resources through CloudOps lifecycle processes, such as deployments and patches Configure a highly available cloud environment that uses AWS services, such as Amazon Route 53 and Elastic Load Balancing, to route traffic for optimal latency and performance Configure AWS Auto Scaling and Amazon EC2 Auto Scaling to scale out your cloud environment based on demand Use Amazon CloudWatch and associated features, such as alarms, dashboards, and widgets, to monitor your cloud environment Manage permissions and track activity in your cloud environment by using AWS services, such as AWS CloudTrail and AWS Config Deploy your resources to an Amazon Virtual Private Cloud (Amazon VPC), establish necessary connectivity to your Amazon VPC, and protect your resources from disruptions of service State the purpose, benefits, and appropriate use cases for mountable storage in your AWS Cloud environment Explain the operational characteristics of object storage in the AWS Cloud, including Amazon Simple Storage Service (Amazon S3) and Amazon S3 Glacier Build a comprehensive cost model to help gather, optimize, and predict your cloud costs by using services such as AWS Cost Explorer and the AWS Cost & Usage Report This course teaches systems operators and anyone performing cloud operations functions how to manage and operate automatable and repeatable deployments of networks and systems on AWS. You will learn about cloud operations functions, such as installing, configuring, automating, monitoring, securing, maintaining, and troubleshooting these services, networks, and systems. The course also covers specific AWS features, tools, and best practices related to these functions. Prerequisites Successfully completed the AWS Technical Essentials course Background in either software development or systems administration Proficiency in maintaining operating systems at the command line, such as shell scripting in Linux environments or cmd/PowerShell in Windows Basic knowledge of networking protocols (TCP/IP, HTTP) 1 - Introduction to Cloud Operations on AWS What is Cloud Operations AWS Well-Architected Framework AWS Well-Architected Tool 2 - Access Management AWS Identity and Access Management (IAM) Resources, accounts, and AWS Organizations 3 - System Discovery Methods to interact with AWS services Tools for automating resource discovery Inventory with AWS Systems Manager and AWS Config Hands-On Lab: Auditing AWS Resources with AWS Systems Manager and AWS Config 4 - Deploy and Update Resources Cloud Operations in deployments Tagging strategies Deployment using Amazon Machine Images (AMIs) Deployment using AWS Control Tower 5 - Automate Resource Deployment Deployment using AWS CloudFormation Deployment using AWS Service Catalog Hands-On Lab: Infrastructure as Code 6 - Manage Resources AWS Systems Manager Hands-On Lab: Operations as Code 7 - Configure Highly Available Systems Distributing traffic with Elastic Load Balancing Amazon Route 53 8 - Automate Scaling Scaling with AWS Auto Scaling Scaling with Spot Instances Managing licenses with AWS License Manager 9 - Monitor and Maintain System Health Monitoring and maintaining healthy workloads Monitoring AWS infrastructure Monitoring applications Hands-On Lab: Monitor Applications and Infrastructure 10 - Data Security and System Auditing Maintaining a strong identity and access foundation Implementing detection mechanisms Automating incident remediation 11 - Operate Secure and Resilient Networks Building a secure Amazon Virtual Private Cloud (Amazon VPC) Networking beyond the VPC 12 - Mountable Storage Configuring Amazon Elastic Block Store (Amazon EBS) Sizing Amazon EBS volumes for performance Using Amazon EBS snapshots Using Amazon Data Lifecycle Manager to manage your AWS resources Creating backup and data recovery plans Configuring shared file system storage Hands-On Lab: Automating with AWS Backup for Archiving and Recovery 13 - Object Storage Deploying Amazon Simple Storage Service (Amazon S3) Managing storage lifecycles on Amazon S3 14 - Cost Reporting, Alerts, and Optimization Gaining AWS cost awareness Using control mechanisms for cost management Optimizing your AWS spend and usage Hands-On Lab: Capstone lab for CloudOps Additional course details: Nexus Humans Cloud Operations on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cloud Operations on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.
IPv6 demystified training course description IPv6 is the next generation Internet Protocol. This course looks at the benefits and features of the new protocol along with an assessment of the likely impact of the protocol and migration strategies. What will you learn Explain the benefits and disadvantages of IPv6 Recognise the impact of IPv6 on existing networks. Plan migration strategies for IPv6 Integrate IPv6 and IPv4 networks IPv6 demystified training course details Who will benefit: Sales staff, managers and other non technical staff. Prerequisites: None. Duration 1 day IPv6 demystified training course contents What's wrong with IPv4 IPv4 works, NAT, carrier grade NAT, addresses running out. Current state of IPv4 addressing. Why IPv6 Reasons for IPv6, what is IPv6? the origins of IPv6. IPv6 addressing IPv6 address allocation, address format, prefixes, address categories, scope zones, global unicast, link local. Plug and play. Migration techniques A migration plan, Dual stack, DNS, tunnelling, tunnel establishment, tunnel brokers, Tunnel types. IPv6 steps How IPv6 can affect the following: Firewalls, routers, switches!, DNS, Web services, Email. Current state of IPv6 IPv6 release 1996, 3G, World IPv6 day 2011, World IPv6 launch 2012.
BGP training course description A study of BGP for non engineers working in the Internet. The course starts with a review of the basics of routers and routing tables and then moves on to a simple overview of how BPG works with a focus on BGP metrics influencing the route traffic takes through the Internet. Hands on with routers follow the major sessions to reinforce the theory. Note these hands on sessions are more demonstrations by the trainer but some can be followed along and done by delegates (e.g. looking at Internet routing tables.) What will you learn Explain how routing tables influence Internet traffic. Describe how BGP works. Explain the methods BGP can use to influence Internet traffic. Use traceroute, peeringdb, route collectors and looking glasses to analyse traffic flows. Explain the difference between bi lateral and multilateral peering using a route server. BGP training course details Who will benefit: Non technical staff wishing to know more about BGP. Prerequisites: None. Duration 1 day BGP training course contents Networks, routers and routing tables What is a network, what is a router, routing tables, static routes, routing protocols. When an ISP uses static routes and when they use BGP. IP addresses, subnet masks, groups of IP addresses. IPv6. Hands on: Showing a full routing table. Seeing traceroute being used. Basic BGP What's BGP? BGP versus other routing protocols, ASs, AS numbers. RIPE database, peeringdb. Hands on: Finding AS numbers. Showing simple BGP configuration and routing tables in an EVENG example. How BGP works Simple walk through of BGP incremental updates and how routes change when links go down. Hands on: Showing packets and route changes when a link goes down/comes up. BGP path selection Transit, peering, routing policy and route filtering. Longest matching rule in routing tables, route selection order, Local preference, AS prepend, MEDs. Hands on: Seeing BGP influencing traffic. Looking at peering policies in RIPE and peeringdb. Route servers What are route servers? LINX route servers, route server policy control and communities, What are route collectors, Looking glasses. Hands on: Seeing the LINX route server details in peeringdb, using a looking glass.
Peering demystified training course description A concise overview course covering The Internet and peering. Particular emphasis is placed on the structure of the Internet, how IXs benefit the Internet, IX architectures, peering and the technical buzzwords behind the IX services. What will you learn Describe the structure of the Internet Explain the role of RIPE, ARIN and IXs in the Internet Explain how IXs connect ISPs and the benefits of using IXs. Describe peering from a technical perspective including the role of BGP and AS's. Peering demystified training course details Who will benefit: Non technical staff working for Internet companies. Prerequisites: None. Duration 1 day Peering demystified training course contents IP and routers IP as glue. What is a router? How routers join networks, benefits and disadvantages of routers, default gateways, routing tables, routing protocols. Addressing IP address format, rules of IP addressing, where to get IP addresses. Subnetting and groups of IP addresses. The Internet What is the Internet? The big picture, IP basics, registering IP addresses, DNS and registering domain names, whois, The IAB, IANA, ICANN, RIPE and other Internet organisations. ISPs Top ISPs, Tier 1, Tier 2 and Tier 3 ISPs, backbone providers, circuit providers, content providers, virtual ISPs, the internal network of ISPs. Customer connections to ISPs (DSL, Leased lines, MPLSâ¦) ISP to ISP connections: Peering points Public peering versus private peering, NAPs, Internet Exchanges, Metropolitan Area Exchanges, LINX, other major peering points, the geography of the Internet. BGP and ASNs. How to peer. IRRs. IX architecture Ethernet switching.