• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1525 Courses in Cardiff delivered Live Online

JL3V - Junos Layer 3 VPNs

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview Describe the value of MPLS VPNs. Describe the differences between provider-provisioned VPNs and customer-provisioned VPNs. Describe the differences between Layer 2 VPNs and Layer 3 VPNs. List the provider-provisioned MPLS VPN features supported by the JUNOS software. Describe the roles of a CE device, PE router, and P router in a BGP Layer 3 VPN. Describe the format of the BGP routing information, including VPN-IPv4 addresses and route distinguishers. Describe the propagation of VPN routing information within an AS. List the BGP design constraints to enable Layer 3 VPNs within a provider network. Explain the operation of the Layer 3 VPN data plane within a provider network. Create a routing instance, assign interfaces to a routing instance, create routes in a routing instance, and import/export routes from a routing instance using route distinguishers/route targets. Describe the purpose of BGP extended communities, configure extended BGP extended communities, and use BGP extended communities. List the steps necessary for proper operation of a PE-CE dynamic routing protocol. List the troubleshooting and monitoring techniques for routing instances. Explain the difference between the bgp.l3vpn table and the inet.0 table of a routing instance. Monitor the operation of a CE-PE dynamic routing protocol. Explain the operation of a PE mulit-access interface in a Layer 3 VPN and list commands to modify that behavior. Describe ways to support communication between sites attached to a common PE router. Provision and troubleshoot hub-and-spoke Layer 3 VPNs, Describe the flow of control traffic and data traffic in a hub-and-spoke Layer 3 VPN. Describe QoS mechanisms available in L3VPNs. Configure L3VPN over GRE tunnels. Describe the RFC 4364 VPN options. Describe the carrier-of-carriers model. Configure the carrier-of-carriers and ''Option C'' configuration. Describe the flow of control and data traffic in a draft-rosen multicast VPN. Describe the configuration steps for establishing a draft-rosen multicast VPN. Monitor and verify the operation of draft-rosen multicast VPNs. Describe the flow of control traffic and data traffic in a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Describe the configuration steps for establishing a next-generation multicast VPN. Monitor and verify the operation of next-generation multicast VPNs. This three-day course is designed to provide students with MPLS-based Layer 3 virtual private network (VPN) knowledge and configuration examples. Chapter 1: Course Introduction Course Introduction Chapter 2: MPLS VPNs MPLS VPNs Provider-Provisioned VPNs Chapter 3: Layer 3 VPNs Layer 3 VPN Terminology VPN-IPv4 Address Structure Operational Characteristics Chapter 4: Basic Layer 3 VPN Configuration Preliminary Steps PE Router Configuration Lab: Layer 3 VPN with Static and BGP Routing Chapter 5: Layer 3 VPN Scaling and Internet Access Scaling Layer 3 VPNs Public Internet Access Options Lab: LDP over RSVP Tunnels and Public Internet Access Chapter 6: Layer 3 VPNs ? Advanced Topics Exchanging Routes between Routing Instances Hub-and-Spoke Topologies Layer 3 VPN CoS Options Layer 3 VPN and GRE Tunneling Integration Layer 3 VPN and IPSec Integration Layer 3 VPN Egress Protection BGP prefix-independent convergence (PIC) edge for MPLS VPNs VRF Localization Provider Edge Link Protection Support for configuring more than 3 million L3VPN Labels Lab: GRE Tunneling Chapter 7: Interprovider Backbones for Layer 3 VPNs Hierarchical VPN Models Carrier-of-Carriers Model Option C Configuration Lab: Carrier of Carrier Layer 3 VPNs Chapter 8: Troubleshooting Layer 3 VPNs Working with Multiple Layers Troubleshooting Commands on a PE Device Multiaccess Interfaces in Layer 3 VPNs PE and CE-based Traceroutes Layer 3 VPN Monitoring Commands Lab: Troubleshooting Layer 3 VPNs Chapter 9: Draft Rosen Multicast VPNs Multicast Overview Draft Rosen MVPN Overvie Draft Rosen MVPN Operation Configuration Monitoring Chapter 10: Next Generation Multicast VPNs Multicast VPN Overview Next-Generation MVPN Operation Configuration Monitoring Internet Multicast Ingress Replication Internet Multicast Signaling and Data Plane Configuring MVPN Internet Multicast Monitoring MVPN Internet Multicast Lab: MVPN Internet Multicast

JL3V - Junos Layer 3 VPNs
Delivered OnlineFlexible Dates
Price on Enquiry

Corporate DEI Program

By Netwomen

Insightful leaders understand the importance of employee collaboration and a solid team ethos. Highly efficient and self-learning teams only achieve top performance when leaders and team members are aligned with regard to diversity, equity and inclusion. This is a highly interactive and tailored workshop with two tracks: Upper Management Track and Midde Management/Staff Track. Optimised for tailored audiences Built for groups of 20+ Led by experienced and certified professionals Specialised to address issues around inclusivity and equity in all industries Program Details For Upper Management Teams Module 1 – The Empowered Leader: 15 Characteristics Module 2 – Communication and Listening Skills Module 3 – Empowering and Respecting Employees Module 4 – (DEI) Principles for Full Cultural Inclusivity For Middle Management & Staff Teams Module 1 – Typical Struggles Module 2 – Support for Growth Module 3 – Get Inspired Module 4 – See What it Looks Like Investment Fee: £50,000 25 participants max per 12-week cohort TRAINING FORMAT : 16 - Week Cohorts Delivered in 1-hour sessions Virtually Facilitated Sessions Corporate DEI Program One Pager

Corporate DEI Program
Delivered OnlineFlexible Dates
£50,000

Health And Safety In The Workplace, Level 1

5.0(50)

By Pochat Training

QA Level 1 Award In Health And Safety In The Workplace (RQF) Face to Face: Half-day course Virtual Classroom: Spread over 2 sessions of 2½ hr duration A basic course to train your workers in basic health and safety Teaches workers how to keep themselves and others safe at work Course Contents: Roles and responsibilities of employers and employees The importance of health and safety in the workplace Workplace hazards and Risks, including:Slips, Trips and FallsManual HandlingFireWorking from HeightElectricityHazardous SubstancesMachinery and Vehicles Workplace conditions that can affect health and safety Health and Safety Signage Personal Protective Equipment and its uses Importance of Personal hygiene The Purpose of First Aid Provision The need for Reporting Incidents and ill Health Benefits of this course: In 2023/24, 1.7 million people suffered from a work-related illness 600,000 sustained a non-fatal injury 138 People lost their lives 776,000 Workers suffered from work-related stress, depression or anxiety The estimated cost of injuries and ill health last year was £21.6 billion 33.7 million working days, or 140,417 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk Our QA Level 1 Award in Health and Safety in the Workplace (RQF) course helps employs gain a bit more understanding of health and safety issues and their own role within that. Accredited, Ofqual regulated qualification: Our Health and Safety Training Course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Health and Safety Certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained in Health and Safety.The Ofqual Register number for this course is 603/0774/2

Health And Safety In The Workplace, Level 1
Delivered in Chesterfield or Online + more
£85

Online MA Business of Motorsport

5.0(1)

By National Motorsport Academy

Motorsport is as much a business as it is a sport. Our new master’s programme will provide students with a broad range of modules which examine the national and international aspects of the industry from a commercial perspective. From governance, structure and international sports law, through to the importance and interdependence of commercial rights holders, promoters, manufacturer, teams, sponsors and the role played by the media, this course is aimed at enhancing the professional and career prospects of those with an aspiration of working within this exciting and challenging global industry. Our programme will help you to develop as professionals with a strong grounding in ethics and a clear sense of how motorsport relates to various cultures, stakeholders and the sectors it interacts with.

Online MA Business of Motorsport
Delivered OnlineFlexible Dates
£10,750 to £14,950

HA Webinar: How can we prepare all pupils to achieve well in primary history?

5.0(1)

By Historical Association

Historical Association webinar series: Draft Ofsted toolkits; implications for primary history Presenter: Dan Hartley This session will focus on ways in which teachers can ensure pupils achieve and progress well in primary history, so they are prepared for the next stage of their education. This will also include ways to assess pupil progress to enable all groups of pupils to achieve strongly in history.   To use your corporate webinar offer for this webinar please complete this form: https://forms.office.com/e/qG8gK0CU8X

HA Webinar: How can we prepare all pupils to achieve well in primary history?
Delivered Online
£31.67 to £55.83

18th July Maddy Belton #Agent121. Looking for: MG, YA, CHILDREN'S NON-FICTION, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: MG, YA AND ADULT SCI-FI / FANTASY, CHILDREN'S NON-FICTION After graduating from St Andrews University with a degree in English Literature and Art History, Maddy followed her love of literature to an internship at non-fiction literary agency Graham Maw Christie. At GMC, Maddy worked her way up to Agent and built a list of authors who wrote for both for adults and children, spanning history, tarot, and nature writing. An avid reader of anything magical, Maddy joined Madeleine Milburn in 2022 to build a list specialising in SFF. Maddy would like to see SFF across all genres for all ages, including: grim dark, thriller, historical, romance, cosy fantasy, sci-fi, epic, YA fantasy, dark academia, contemporary fantasy, fantasy middle-grade, mythology, fairy tale and queer fantasy. Inspiring children’s non-fiction. She loves worlds to get lost in, adventures that transform what it means to be a hero, and unique magic that offers as many problems as solutions. She likes books that make her cry and books that change her mind. Above all, when she finishes a story about another world, she wants it to have taught her a lesson which helps her live in this one. She loves all fantasy, but favours richly imagined, complex worlds with a history to discover and a future to protect. Worldbuilding is one of her favourite aspects of this genre and she is always looking for a new, dense world with series potential. Think Brandon Sanderson’s Cosmere or the Marvel Cinematic Universe – the bigger the better! Maddy also likes character-driven fantasy with a diverse cast to root for (or root against) and she wants to see a range of different relationships depicted authentically. She particularly like epics that dip into big, universal themes such as grief, climate change, or war and which ask impossible questions in the vein of R.F. Kuang or N.K. Jemisin. She is also excited by authors that play with form and language in a fantasy setting. In YA, she is looking for much the same as in an adult fantasy, but with younger protagonists and a closer focus on relationships. She wants to see the tropes she knows and loves in new and exciting forms and her favourite YA books often centre around belonging and becoming. She likes a dash of romance in everything, because she is sentimental that way, but it’s particularly important in the YA space. Sci-fi is a big passion of hers, especially when it comes with a strong hook. She is a huge fan of Becky Chamber’s The Long Way to a Small Angry Planet and Michaiah Johnson’s The Space Between Worlds. She likes space as a metaphor, and would love something that explores different alien species. Please send her your space operas and sci-fi romances which combine space, magic and mayhem! In fantasy middle grade, she favours whimsy and animal companions; she would love to follow a group of kids through magic school. She tends to look for plenty of humour with a strong friendship at the centre, and she wants middle grade stories which engage with the concerns of children growing up as well as offering an all-important escape (preferably on a dragon/unicorn’s back). She is also looking for children’s non-fiction for all ages. In this space, she wants something as creative as it is informative, and thinks diverse voices are increasingly important. Maddy would like you to submit a covering letter, one page synopsis and the first three chapters (Max 5000 words) of your completed manuscript in a single word document. (In addition to the paid sessions, Maddy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 11th July 2025

18th July Maddy Belton #Agent121. Looking for: MG, YA, CHILDREN'S NON-FICTION, ADULT FICTION
Delivered Online + more
£72

Oracle Data Integrator 19c Configuration and Administration (TTOR30319)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This intermediate-level hands-on course is geared for experienced Administrators, Analysts, Architects, Data Scientists, Database Administrators and Implementers Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Oracle Data Integrator is a comprehensive data integration platform that covers all data integration requirements from high-volume, high-performance batch loads, to event-driven integration processes and SOA-enabled data services. Oracle Data Integrator's Extract, Load, Transform (E-LT) architecture leverages disparate RDBMS engines to process and transform the data - the approach that optimizes performance, scalability and lowers overall solution costs. Throughout this course participants will explore how to centralize data across databases, performing integration, designing ODI Mappings, and setting up ODI security. In addition, Oracle Data Integrator can interact with the various tools of the Hadoop ecosystem, allowing administrators and data scientists to farm out map-reduce operations from established relational databases to Hadoop. They can also read back into the relational world the results of complex Big Data analysis for further processing. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: Administer ODI resources and setup security with ODI Apply ODI Topology concepts for data integration Describe ODI Model concepts Describe architecture of Oracle Data Integrator Design ODI Mappings, Procedures, Packages, and Load Plans to perform ELT data transformations Explore, audit data, and enforce data quality with ODI Implement Changed Data Capture with ODI Introduction to Integration and Administration Oracle Data Integrator: Introduction Oracle Data Integrator Repositories Administering ODI Repositories Create and connect to the Master Repository Export and import the Master Repository Create, connect, and set a password to the Work Repository ODI Topology Concepts ODI Topology: Overview Data Servers and Physical Schemas Defining Topology Agents in Topology Planning a Topology Describing the Physical and Logical Architecture Topology Navigator Creating Physical Architecture Creating Logical Architecture Setting Up a New ODI Project ODI Projects Using Folders Understanding Knowledge Modules Exporting and Importing Objects Using Markers Oracle Data Integrator Model Concepts Understanding the Relational Model Understanding Reverse-Engineering Creating Models Organizing ODI Models and Creating ODI Datastores Organizing Models Creating Datastores Constraints in ODI Creating Keys and References Creating Conditions Exploring Your Data Constructing Business Rules ODI Mapping Concepts ODI Mappings Expressions, Join, Filter, Lookup, Sets, and Others Behind the Rules Staging Area and Execution Location Understanding Knowledge Modules Mappings: Overview Designing Mappings Multiple Sources and Joins Filtering Data Overview of the Flow in ODI Mapping Selecting a Staging Area Configuring Expressions Execution Location Selecting a Knowledge Module Mappings: Monitoring and Troubleshooting Monitoring Mappings Working with Errors Designing Mappings: Advanced Topics 1 Working with Business Rules Using Variables Datasets and Sets Using Sequences Designing Mappings: Advanced Topics 2 Partitioning Configuring Reusable Mappings Using User Functions Substitution Methods Modifying Knowledge Modules Using ODI Procedures Procedures: Overview Creating a Blank Procedure Adding Commands Adding Options Running a Procedure Using ODI Packages Packages: Overview Executing a Package Review of Package Steps Model, Submodel, and Datastore Steps Variable Steps Controlling the Execution Path Step-by-Step Debugger Starting a Debug Session New Functions Menu Bar Icons Managing ODI Scenarios Scenarios Managing Scenarios Preparing for Deployment Using Load Plans What are load plans? Load plan editor Load plan step sequence Defining restart behavior Enforcing Data Quality with ODI Data Quality Business Rules for Data Quality Enforcing Data Quality with ODI Working with Changed Data Capture CDC with ODI CDC implementations with ODI CDC implementation techniques Journalizing Results of CDC Advanced ODI Administration Setting Up ODI Security Managing ODI Reports ODI Integration with Java

Oracle Data Integrator 19c Configuration and Administration (TTOR30319)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vRealize Automation: Orchestration and Extensibility [v8.6]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced VMware administrators, automation and orchestration specialists, system integrators, and private cloud and public cloud administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the features and benefits of integrating vRealize Orchestrator and vRealize Automation Describe the role of vRealize Orchestrator workflows and content elements in automation Use the vRealize Orchestrator client to access and navigate the vRealize Orchestrator platform Use the vRealize Orchestrator client to import and run vRealize Orchestrator library workflows Design, develop, and run custom reusable vRealize Orchestrator workflows Integrate vRealize Automation with vRealize Orchestrator to deliver custom IT services Use the vRealize Automation event broker service to trigger specific vRealize Orchestrator workflows or ABX Actions Leverage the event broker to extend IaaS (Infrastructure-as-a-Service) machine lifecycle processes Use XaaS to extend vRealize Automation into other enterprise systems Use VMware APIs to run vRealize Orchestrator workflows Use the vSphere Client Code Capture feature During this five-day course, you focus on using VMware vRealize© Orchestrator? to extend the functionality of VMware vRealize© Automation?. You learn how to provide XaaS (Anything as a Service) and implement Machine Lifecycle Extensibility using the VMware vRealize© Automation? Event Broker. You also learn how to create vRealize Orchestrator workflows and vRealize Automation ABX actions. You learn about various features, including basic scripting implementation along with logic processing to implement a variety of functions to use in your environment. This course teaches implementing debugging, loops, conditions, and user interactions in vRealize Orchestrator. The course introduces the new vRealize Orchestrator HTML 5 interface, along with API calls and REST functions, to give you the groundwork to implement a variety of plugins and scripts. This course is designed to give you the tools to craft custom solutions in the product. Course Introduction Introductions and course logistics Course objectives Overview of vRealize Automation and vRealize Orchestrator Define the purpose of vRealize Automation Outline the purpose of vRealize Orchestrator Describe the main components of vRealize Automation Describe the main components of vRealize Orchestrator Creating Schema Elements Invoking JavaScript from a vRealize Orchestrator workflow Invoking a vRealize Orchestrator Workflow from a vRealize Orchestrator workflow Invoking an action from a vRealize Orchestrator workflow Using vRealize Orchestrator workflows both synchronously and asynchronously Working with Variables Defining inputs, outputs, and variables in vRealize Orchestrator workflows Binding variables in vRealize Orchestrator workflows Wrapping vRealize Orchestrator workflows Using APIs and the API Explorer Creating actions in vRealize Orchestrator Using vRealize Orchestrator input forms Handling user interactions in vRealize Orchestrator Handling Exceptions, Logging, and Debugging Handling exceptions in vRealize Orchestrator workflows Using logs in vRealize Orchestrator workflows Debugging vRealize Orchestrator workflows Branching and Looping Using branching in vRealize Orchestrator workflows Using loops in vRealize Orchestrator workflows Working with Assets Using configuration elements in vRealize Orchestrator Using resources in vRealize Orchestrator Using packages in vRealize Orchestrator Working with Plug-Ins Downloading and installing Plug-Ins Using the SSH plug-In in vRealize Orchestrator Using the REST plug-in in vRealize Orchestrator Using the vRealize Automation plug-in in vRealize Orchestrator Using the PowerShell plug-in in vRealize Orchestrator Working with Versioning and Git Using versioning in vRealize Orchestrator Using Git in vRealize Orchestrator Scheduling, Sleeping, and Waiting Using scheduling in vRealize Orchestrator Using sleeping in vRealize Orchestrator Using waiting in vRealize Orchestrator Introduction to vRealize Automation Extensibility Introduction to extensibility Using ABX actions Using Python Using Nodejs Using PowerShell Using vRealize Automation Lifecycle Extending vRealize Automation with Event Broker Overview of vRealize Automation Event Broker Creating vRealize Automation subscriptions Data exchange between vRealize Automation and vRealize Orchestrator Using ABX Actions Overview of Action Based Extensibility (ABX) Comparison of vRealize Orchestrator and ABX Creating ABX Actions scripts, REST, and flows Using Day-2 Actions in vRealize Automation Describe the visualization capabilities of NSX Network Detection and Response Working with Services, Custom Resources, and Resource Actions Using vRealize Orchestrator as a content source in vRealize Automation Creating custom resources in vRealize Automation Creating resource actions in vRealize Automation Using Day-2 Actions in vRealize Automation Using vSphere Client Code Capture Enabling vSphere Client code capture Using vSphere Client code capture to capture code in vRO, Javascript, PowerCLI or other languages. Using the captured code in vRealize Orchestrator workflows or actions.

VMware vRealize Automation: Orchestration and Extensibility [v8.6]
Delivered OnlineFlexible Dates
Price on Enquiry

Nodes and Links Project Insights and Managing Risk

By Underscore Group

Learn how to use this innovative tool to analyse and validate your schedule, to add and model uncertainty and risk and to work with updated plans to compare project progress. Course overview Duration: 1 day (6.5 hours) This course looks at the powerful features of Nodes and Links. It looks at analysing and validating your schedule, adding uncertainty and risk and working with updated plans to compare project progress. Hands on practice will be gained throughout the course to ensure you can confidentially put your new skills into practice back in the workplace. This course is designed for new users of Nodes and links, no previous experience is required. You should however be familiar with risk management processes and terminology. Objectives  By the end of the course you will be able to: Import and validate plans Analyse and review plans Add and model uncertainty Add and model risk Load updated schedules Re run analysis on updated schedules Content Validating your plan Importing a baseline plan Running a health check Analysing the results Reviewing the plan Analysing critical paths Reviewing activities Reviewing resources Adding Uncertainty Setting uncertainty templates Distributions Adding uncertainty Using Inherit Using AI Reviewing activity distributions Modelling Uncertainty Running the Analysis Reviewing the results Reviewing activity results Risk Drivers Filtering for activities Setting up the Risk Register Setting Risk Templates Adding Risks to the Risk Register Independent vs Dependant Events Setting Probability and Impact Modelling Uncertainty and Risk Mapping risks to activities Running the Analysis Reviewing the results Updated Plans Importing a new plan version Comparing plans Tracking progress Trend analysis Analysing Updated Plans Using updated plans Synchronising uncertainly and risk Rerunning analysis

Nodes and Links Project Insights and Managing Risk
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Introduction to Node.js (TT4153)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Incoming attendees are required to have current, hands-on experience in developing basic web applications. Student should have some experience with HTML and CSS and be well versed in JavaScript. Experience with coding for the server side would be helpful. Overview This skills-focused course is approximately 50% hands-on. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Learn server-side JavaScript coding through Node.js Explore the latest JavaScript features, and ECMAScript modules Walk through different stages of developing robust applications using Node.js Install and use Node.js for development Use the Express application framework Work with REST service development using the Restify framework Use data storage engines such as MySQL, SQLITE3, and MongoDB Node.js is a server-side JavaScript platform using an event-driven, non-blocking I/O model allowing users to build fast and scalable data-intensive applications running in real time.This fast-paced hands-on course provides the core skills required to develop web applications with Node.js. You will progress from a rudimentary knowledge of JavaScript and server-side development to being able to create, maintain and test your own Node.js applications. You will explore the importance of transitioning to functions that return Promise objects, and the difference between fs, fs/promises and fs-extra, as well as how to use the HTTP Server and Client objects, and data storage with both SQL and MongoDB databases. Overview of Node.js The capabilities of Node.js Why should you use Node.js? The Node.js event-driven architecture Embracing advances in the JavaScript language Developing microservices or maxiservices with Node.js Setting Up Node.js System requirements Installing Node.js using package managers Installing from the source on POSIX-like systems Installing multiple Node.js instances with nvm Requirements for installing native code modules Choosing Node.js versions to use and the version policy Choosing editors and debuggers for Node.js Running and testing commands Advancing Node.js with ECMAScript 2015, 2016, 2017, and beyond Using Babel to use experimental JavaScript features Exploring Node.js Modules Defining a Node.js module Finding and loading modules using require and import Using npm ? the Node.js package management system The Yarn package management system HTTP Servers and Clients Sending and receiving events with EventEmitter Understanding HTTP server applications HTTP Sniffer ? listening to the HTTP conversation Web application frameworks Getting started with Express Creating an Express application to compute Fibonacci numbers Making HTTPClient requests Calling a REST backend service from an Express application Your First Express Application Exploring Promises and async functions in Express router functions Architecting an Express application in the MVC paradigm Creating the Notes application Theming your Express application Scaling up ? running multiple Notes instances Implementing the Mobile-First Paradigm Understanding the problem ? the Notes app isn't mobile friendly Learning the mobile-first paradigm theory Using Twitter Bootstrap on the Notes application Flexbox and CSS Grids Mobile-first design for the Notes application Using third-party custom Bootstrap themes Data Storage and Retrieval Remembering that data storage requires asynchronous code Logging and capturing uncaught errors Storing notes in a filesystem Storing notes with the LevelDB datastore Storing notes in SQL with SQLite3 Storing notes the ORM way with Sequelize Storing notes in MongoDB Additional course details: Nexus Humans Introduction to Node.js (TT4153) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Node.js (TT4153) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Node.js (TT4153)
Delivered OnlineFlexible Dates
Price on Enquiry