• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3970 Courses in Cardiff delivered Live Online

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

OP25 IBM z/OS UNIX System Services Implementation

By Nexus Human

Duration 4.5 Days 27 CPD hours This course is intended for This is an intermediate course for experienced data professionals such as z/OS system programmers, who are responsible for the installation and maintenance of z/OS UNIX. Overview Execute the tasks required to prepare a z/OS installation for implementing z/OS UNIXExecute the tasks to install the z/OS UNIX software featuresUse the information provided in this class to perform the basic customization necessary to fully implement the z/OS UNIX kernel, the file system, the shell and utilities, and z/OS UNIX applicationsPut in place the RACF security required for z/OS UNIX resources and applicationsMake appropriate definitions for the activation of TCP/IP sockets by z/OS UNIXIdentify and use the processes and data required for monitoring and tuning the z/OS UNIX environment This course is designed to provide you with the skills required to install and customize z/OS UNIX (full name z/OS UNIX System Services), and to manage and monitor the z/OS UNIX environment. Day 1 Welcome Unit 1: z/OS UNIX implementation overview Unit 2: z/OS UNIX services initial installation Exercise 1: Move from default to full mode function Exercise 2: IPL in full function mode and enable a nonvolatile root HFS Unit 3: File system customization Day 2 Exercise 3: Customizing the file system Unit 4: Security customization Exercise 4: Defining and managing UNIX users, OMVS security Day 3 Unit 5: Shell customization Exercise 5: UNIX System Services and shell customization Unit 6: Customizing applications, daemons, and servers Exercise 6: UNIX processes Exercise 7: Access control list and enhanced ASCII support Day 4 Unit 7: File system management and system maintenance Exercise 8: Managing HFS and zFS data sets Unit 8: Managing z/OS UNIX operations Unit 9: Exploiting TCP/IP with z/OS UNIX Exercise 9: Managing z/OS UNIX Additional course details: Nexus Humans OP25 IBM z/OS UNIX System Services Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OP25 IBM z/OS UNIX System Services Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

OP25 IBM z/OS UNIX System Services Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

Finance for Non-Finance Managers (2 Day)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Those who need to understand the financial implications of their day-to-day decisions to increase the profitability and performance of their business. This course is suitable for managers with little or no financial knowledge. Overview Understanding of financial accounts and reports The ability to use and understanding of financial concepts Analytical skills to interpret financial results using ratios Ability to manage budgets more effectively This course shows how to interpret key financial statements highlighting the questions and areas that matter. It identifies warning signals that managers need to be aware of and shows how to understand key performance indicators to drive profitability. The course will also cover the essentials of budgeting and forecasting as well as addressing key financial terms such as goodwill and accruals & prepayments. Delegates will learn how to appraise capital projects with confidence, allowing them to make the best decisions for their business. Course Outline The basics of finance: How companies are financially structured Accrual v cash accounting The Business Cycle: understand how money flows in a business How businesses are financed: debt and equity Business objectives: using financial data to achieve business targets Key Financial Statements: Income Statement Balance Sheet Cash Flow Statement Key Financial Analysis Ratios Profitability: profit margins, EBIT & EBITDA, operational gearing Return on Investment: ROCE, ROA Leverage: financial gearing & interest cover Liquidity: current & quick ratios Cash Flow: working capital requirement Working capital management Cash flow management Key financial terms ? goodwill, accruals & prepayments, depreciation and amortization Cost analysis, control and reduction Capex v Opex Effective Budgeting and Forecasting to control the business Management Accounts and undertaking variance analysis Improving margins and sales in your business Break even analysis Capital Investment techniques ? NPV, IRR and discounted cash flows Asset Valuation Additional course details: Nexus Humans Finance for Non-Finance Managers (2 Day) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Finance for Non-Finance Managers (2 Day) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Finance for Non-Finance Managers (2 Day)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for network and software engineers who hold the following job roles: Network administrators Network operators Overview After taking this course, you should be able to: Explain the benefits of using Cisco DNA Center in a traditional, enterprise network Explain at a detailed level the Cisco DNA Center Assurance system architecture, functional components, features, and data-processing concepts Explain the health scores, metrics, and strategies that you use for monitoring network devices, clients, and applications with Cisco DNA Assurance Describe how Cisco DNA Center Assurance analyzes the streaming telemetry and collected data, correlates the data, performs root cause analysis, and displays detected issues, insights, and trends Describe the Cisco DNA Center Assurance troubleshooting tools, mechanisms, strategies, and scenarios to proactively detect and resolve wireless network, client, and application issues and pinpoint the root cause Deploy and configure Cisco DNA Center to use Assurance features for monitoring and troubleshooting network devices, clients, and applications The Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course provides you with the skills to monitor and troubleshoot a traditional brownfield network infrastructure by using Cisco© Digital Network Architecture (Cisco DNA?) Assurance. The course focuses on highlighting issues rather than on monitoring data. The advanced artificial intelligence and machine learning features within Cisco DNA Assurance enable you to isolate the root cause of a problem and to take appropriate actions to quickly resolve issues. Cisco DNA Assurance can be used to perform the work of a Level 3 support engineer. Course Outline Introducing Cisco DNA Center Assurance Monitoring Health and Performance with Cisco DNA Center Assurance Troubleshooting Issues, Observing Insights and Trends Troubleshooting Wireless Issues with Cisco DNA Center Assurance Tools Additional course details: Nexus Humans Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Leveraging Cisco Intent-Based Networking DNA Assurance (DNAAS) v2.1
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network engineer Systems engineer Wireless engineer Consulting systems engineer Technical solutions architect Network administrator Wireless design engineer Network manager Sales engineer Account manager Overview Upon completing this course, the learner will be able to meet these overall objectives: Get familiar with different API styles (REST, RPC) and synchronous and asynchronous API requests Learn how to use Postman software development tool in order to test the API calls Learn how to automate repetitive tasks using Ansible automation engine Explore a Python programming language, Python libraries and Python virtual environments and learn how can they be used for automation of network configuration tasks Get introduced to GIT version control system and its common operations Learn how to leverage the various models and APIs of the Cisco IOS XE platform to perform day-zero operations, improve troubleshooting methodologies with custom tools, augment the CLI using scripts, and integrate various workflows using Ansible and Python Learn about the paradigm shift of model-driven telemetry and the building blocks of a working solution Learn how to leverage the tools and APIs to automate Cisco DNA infrastructure managed by Cisco DNA Center™ Demonstrate workflows (configuration, verification, health checking, and monitoring) using Python, Ansible, and Postman Understand Cisco SD-WAN solution components, implement a Python library that works with the Cisco SD-WAN APIs to perform configuration, inventory management, and monitoring tasks, and implement reusable Ansible roles to automate provisioning new branch sites on an existing Cisco SD-WAN infrastructure Learn how to leverage the tools and APIs to automate Cisco Meraki managed infrastructure and demonstrate workflows (configuration, verification, health checking, monitoring) using Python, Ansible, and Postman Implementing Automation for Cisco Enterprise Solutions (ENAUI) v.1.2 teaches you how to implement Cisco Enterprise automated solutions, including programming concepts, orchestration, telemetry, and automation tools. This course highlights the tools and the benefits of leveraging programmability and automation in the Cisco-powered Enterprise Campus and WAN. You will also examine platforms including IOS XE software for device-centric automation, Cisco DNA Center for the intent-based enterprise network, Cisco Software-Defined WAN, and Cisco Meraki. Their current ecosystem of APIs, software development toolkits, and relevant workflows are studied in detail together with open industry standards, tools, and APIs, such as Python, Ansible, Git, JSON/YAML, NETCONF/RESTCONF, and YANG. The course qualifies for 24 Cisco Continuing Education credits (CE) towards recertification. This course will help you:Gain high-demand skills using modern programming languages, APIs, and systems such as Python, Ansible, and Git to automate, streamline, and enhance business operationsAcquire the skills and knowledge to customize tools, methods, and processes that improve network performance and agilityPrepare for the 300-435 ENAUTO exam Course Outline Network Programmability Foundation Automating APIs and Protocols Managing Configuration with Python and Ansible Implementing On-Box Programmability and Automation with Cisco IOS XE Software Implementing Model-Driven Telemetry Day 0 Provisioning with Cisco IOS-XE Software Implementing Automation in Enterprise Networks Building Cisco DNA Center Automation with Python Automating Operations using Cisco DNA Center Introducing Cisco SD-WAN Programmability Building Cisco SD-WAN Automation with Python Building Cisco SD-WAN Automation with Ansible Automating Cisco Meraki Implementing Meraki Integration APIs Additional course details: Nexus Humans Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Automation for Cisco Enterprise Solutions v1.2 (ENAUI)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to contract management (In-House)

By The In House Training Company

This very practical one-day IACCM-approved programme enables participants to manage the process of commercial contracting and contract management effectively and efficiently to ensure value for money, improved service, and appropriate relationships. It covers a wide range of contract types in terms of risk and value. The programme empowers participants with the tools and techniques needed to collaborate with all key stakeholders. By the end of the programme participants will be able to: Understand the total process of managing contracts Exploit opportunities to extract even more added value Develop appropriate relationships with contractors Understand and use a range of contracting strategies and options Measure and improve contract performance Understand the impact of legislation on contract performance 1 Welcome Introductions Aims and objectives Plan for the day 2 Contract management An overview of the contracting process, mapping the 'territory' 3 Contract managers Skills Knowledge Attributes Responsibilities 4 Critical success factors Defining successful outcomes Effective stakeholder engagement Creating a shared vision of the outcomes 5 Placing contracts How to develop an effective specification and scope of work documents How to develop a robust contracting strategy Appropriate types of contract 6 Customers and stakeholders Customer and stakeholder analysis Managing expectations and the 'shared vision' concept to ensure customer co-operation, satisfaction, and delight 7 Working with suppliers Creating and developing commercial relationships Types of relationship How to manage difficult relationships Contractor motivational issues How to use incentives 8 Negotiation and related skills Introduction to key negotiation skills Persuading and influencing skills to work with stakeholders to improve outcomes for all 9 Dealing with change Claims and variations How to challenge contractor claims and requests for variations by making use of contractual terms Specifications to prevent false claims 10 Performance improvement How to measure and improve contractor performance Developing KPI systems Using contractual terms and conditions and basic legal principles 11 Contract close The importance of effective contract close processes 12 Close Review of key learning points Personal action planning

Introduction to contract management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Advanced Coaching Course for Leaders

5.0(20)

By The Thinking Academy

This ilm recognised programme builds on the coaching fundamentals to focus on enhancing the coach’s self-awareness and coaching techniques, refining both practice and skill to develop a coaching style of leadership.

Advanced Coaching Course for Leaders
Delivered in Christchurch or UK Wide or OnlineFlexible Dates
Price on Enquiry

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cybersecurity analysts and engineers and security operations specialists, as well as administrators and product deployers. Overview Successful completion of this instructor-led course with hands-on lab activities should enable you to: Describe the architecture and components of the Cortex XDR family Use the Cortex XDR management console, including reporting Create Cortex XDR agent installation packages, endpoint groups, and policies Deploy Cortex XDR agents on endpoints Create and manage Exploit and Malware Prevention profiles Investigate alerts and prioritize them using starring and exclusion policies Tune Security profiles using Cortex XDR exceptions Perform and track response actions in the Action Center Perform basic troubleshooting related to Cortex XDR agents Deploy a Broker VM and activate the Local Agents Settings applet Understand Cortex XDR deployment concepts and activation requirements Work with the Customer Support Portal and Cortex XDR Gateway for authentication and authorization This instructor-led training enables you to prevent attacks on your endpoints. After an overview of the Cortex XDR components, the training introduces the Cortex XDR management console and demonstrates how to install agents on your endpoints and how to create Security profiles and policies. The training enables you to perform and track response actions, tune profiles, and work with Cortex XDR alerts. The training concludes with discussions about basic troubleshooting of the agent, the on-premises Broker VM component, and Cortex XDR deployment. Course Outline Module 1 - Cortex XDR Overview Module 2 - Cortex XDR Main Components Module 3 - Cortex XDR Management Console Module 4 - Profiles and Policy Rules Module 5 - Malware Protection Module 6 - Exploit Protection Module 7 - Cortex XDR Alerts Module 8 - Tuning Policies Using Exceptions Module 9 - Response Actions Module 10 - Basic Agent Troubleshooting Module 11 - Broker VM Overview Module 12 - Deployment Considerations Additional course details: Nexus Humans Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Palo Alto Networks : Cortex XDR 3.2: Prevention and Deployment (EDU-260)
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to Node.js (TT4153)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Incoming attendees are required to have current, hands-on experience in developing basic web applications. Student should have some experience with HTML and CSS and be well versed in JavaScript. Experience with coding for the server side would be helpful. Overview This skills-focused course is approximately 50% hands-on. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Learn server-side JavaScript coding through Node.js Explore the latest JavaScript features, and ECMAScript modules Walk through different stages of developing robust applications using Node.js Install and use Node.js for development Use the Express application framework Work with REST service development using the Restify framework Use data storage engines such as MySQL, SQLITE3, and MongoDB Node.js is a server-side JavaScript platform using an event-driven, non-blocking I/O model allowing users to build fast and scalable data-intensive applications running in real time.This fast-paced hands-on course provides the core skills required to develop web applications with Node.js. You will progress from a rudimentary knowledge of JavaScript and server-side development to being able to create, maintain and test your own Node.js applications. You will explore the importance of transitioning to functions that return Promise objects, and the difference between fs, fs/promises and fs-extra, as well as how to use the HTTP Server and Client objects, and data storage with both SQL and MongoDB databases. Overview of Node.js The capabilities of Node.js Why should you use Node.js? The Node.js event-driven architecture Embracing advances in the JavaScript language Developing microservices or maxiservices with Node.js Setting Up Node.js System requirements Installing Node.js using package managers Installing from the source on POSIX-like systems Installing multiple Node.js instances with nvm Requirements for installing native code modules Choosing Node.js versions to use and the version policy Choosing editors and debuggers for Node.js Running and testing commands Advancing Node.js with ECMAScript 2015, 2016, 2017, and beyond Using Babel to use experimental JavaScript features Exploring Node.js Modules Defining a Node.js module Finding and loading modules using require and import Using npm ? the Node.js package management system The Yarn package management system HTTP Servers and Clients Sending and receiving events with EventEmitter Understanding HTTP server applications HTTP Sniffer ? listening to the HTTP conversation Web application frameworks Getting started with Express Creating an Express application to compute Fibonacci numbers Making HTTPClient requests Calling a REST backend service from an Express application Your First Express Application Exploring Promises and async functions in Express router functions Architecting an Express application in the MVC paradigm Creating the Notes application Theming your Express application Scaling up ? running multiple Notes instances Implementing the Mobile-First Paradigm Understanding the problem ? the Notes app isn't mobile friendly Learning the mobile-first paradigm theory Using Twitter Bootstrap on the Notes application Flexbox and CSS Grids Mobile-first design for the Notes application Using third-party custom Bootstrap themes Data Storage and Retrieval Remembering that data storage requires asynchronous code Logging and capturing uncaught errors Storing notes in a filesystem Storing notes with the LevelDB datastore Storing notes in SQL with SQLite3 Storing notes the ORM way with Sequelize Storing notes in MongoDB Additional course details: Nexus Humans Introduction to Node.js (TT4153) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Node.js (TT4153) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Node.js (TT4153)
Delivered OnlineFlexible Dates
Price on Enquiry