• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5318 Courses in Cardiff delivered Live Online

Health & Safety Level 2

By Prima Cura Training

This Health & Safety in the Care Sector Course works alongside, and helps, learners understand Standard 13 of the Care Certificate. This Standard touches on the legislation, policies & responsibilities relating to Health & Safety in the care sector, as well as looking at accidents and sudden illnesses.

Health & Safety Level 2
Delivered in person or OnlineFlexible Dates
Price on Enquiry

EXIN Kanban Foundation

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Die Schulung ist zugeschnitten auf die Bedarfe von: Entwickler:innen, Menschen, die die Rollen Scrum Master oder Product Owner ausüben. Projekt- und Prozessexpertinnen und -experten. Manager:innen sowie Teams, die Kanban für das Managen von täglichen operativen Aktivitäten einsetzen, z. B. Mitglieder von DevOps-Teams. Fachleute aus Bereichen wie z. B. Personal, Finanzen, Marketing, Produktion und Support. Alle, die irgendwo den Arbeitsfluss optimieren möchten. Overview Kanban umfasst sechs Grundpraktiken: Arbeitsfluss visualisieren Work-in-Progress (WIP) begrenzen Arbeitsfluss kontrollieren Prozessregeln explizit machen Feedback-Schleifen implementieren Gemeinsam verbessern, experimentell weiterentwickeln Im Mittelpunkt der Schulung steht das Verständnis der Kanban-Prinzipien und wie man diese mit Hilfe der Kanban-Werkzeuge (Tools) in der Praxis anwendet. Der Kurs bereitet auf die entsprechende Zertifizierung EXIN Kanban Foundation vor. Kanban: Methode zur kontinuierlichen Verbesserung des Arbeitsflusses in kollaborativen Teams. Zentrales Mittel ist die Visualisierung und Begrenzung der parallel in Arbeit befindlichen Aufgaben. Einsatzgebiete: SW-Entwicklung, IT-Betrieb, Produktion. Vorteile von Kanban 1.1 Die Flexibilit„t von Kanban 1.2 Die Kanban-Kultur Kontinuierliche Verbesserung 2.1 Kaizen einfhren 2.2 Prozesse visualisieren und verbessern 2.3 Rahmenbedingungen fr Ver„nderungen Kanban implementieren 3.1 Arbeit visualisieren 3.2 Tickets erstellen 3.3 Work-in-Progress (WIP) begrenzen 3.4 Fluss und Lieferrhythmus kontrollieren 3.5 Priorisierung 3.6 Variabilit„t reduzieren Kanban skalieren 4.1 Kanban mit verteilten Teams 4.2 Kanban in Groáprojekten

EXIN Kanban Foundation
Delivered OnlineFlexible Dates
Price on Enquiry

GW100 SAP Gateway - Building OData Services

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for DevelopersConsultants Overview Explore SAP Gateway architecture and deployment optionsPerform OData queries and operations with SAP GatewayDefine data model and implement CRUD operationsExtend SAP Gateway services and build new ones with CDS ViewsConfigure routing, multiple origin, and SAP Workflow supportImplement advanced OData operations and introduce OData V4Handle security and consume OData services using SAP Web IDE Students will explore SAP Gateway architecture and deployment options. SAP Gateway Overview SAP Gateway Architecture SAP Gateway Deployment Options OData Overview OData and REST OData Operations OData Queries Consuming OData using SAP Web IDE SAP Gateway Service Implementation Defining a Data Model Implementing Read Operations Implementing Navigation Implementing Query Options Implementing Change Operations SAP Gateway Service Generation RFC/BOR Generator Search Help Generator SAP Gateway Service Redefinition Redefining a Data Service Redefining a Gateway Service SAP Gateway and CDS Views SAP Fiori Programming Model CDS/SADL Generator Data Source Reference CDS View Annotations SAP Gateway Hub Functionalities Multiple Back-End Systems Support Configuring Routing Capabilities Multiple Origin Composition SAP Workflow Support Advanced OData Options Implementing Function Imports Implementing Expand Operations Implementing Deep Insert Operations Handling ETags Batch Requests Media Links Offline Support Server Side Caching SAP Gateway Security Authentication Data Security SAP Gateway OData V4 Support OData V4 Implementation OData V4 Publishing

GW100 SAP Gateway - Building OData Services
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

HABC Level 2 Award in Customer Service (QCF)

5.0(7)

By Safehouse Health And Safety Consultants Ltd

This accredited qualification has been designed for delivery to all learners working or preparing to work in a customer service role or where using the telephone is a part of their role. This qualification covers the principles of customer service, including how to meet customer expectations, the importance of appropriate behaviour and communication techniques, as well as ways to deal with problem customers. How long will it take me to achieve this qualification? This qualification is classroom-based and usually achieved by taking a one-day course. However, it can also be achieved through a variety of other methods including blended and distance learning, as long as the recommended learning hours are completed. How is the qualification assessed? Through a 1-hour 30-question multiple-choice examination. Learners must achieve a score of at least 20 out of 30 in order to pass.

HABC Level 2 Award in Customer Service (QCF)
Delivered in Barnsley or OnlineFlexible Dates
Price on Enquiry

AR-CXF: ArubaOS-CX Switching Fundamentals (Delivered by Fast Lane)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Ideal candidates are IT Professionals who deploy small-to-medium scale enterprise network solutions based on Aruba products and technologies. Overview Network Fundamentals Review Aruba Switching portfolio ArubaOS-CX Network Operating System VLANs Spanning Tree Protocol VRRP Link Aggregation IP Routing Subnetting OSPFv2 - Single Area Stacking using VSF Secure Management and Maintenance Aruba NetEdit Teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing & switching technologies. This course consists of approximately 60% lecture and 40% hands-on lab exercises Network Fundamentals What is a network? What is a Protocol? OSI Reference Model Encapsulation, frames, packets, segments Layer 2 to Layer 7 headers Media, cabling, Ethernet/wifi headers Binary/Hex/Decimal theory and conversion TCP/IP Stack (IP addressing & Transport Protocols TCP/UDP) Types of traffic: Unicast, Broadcast, Multicast TCP/IP Stack Overview Ethernet frames IPv4 Header TCP Header ? Three-way Handshake TCP Header ? Sequence Numbers TCP Header ? Port Numbers TCP Header UPD Header Basic Networking with Aruba Solutions Networking devices: Switches, Routers, Multilayer Switches, APs, Mobility Controllers, Firewalls, Servers (HTTP, DHCP, DNS, Telnet, FTP) 2-Tier vs 3-Tier hierarchy Switching Portfolio (AOS switches & AOS-CX switches) is this introducing both portfolio on a couple of slide and few slides on AOS-CX hardware architecture, software architecture and intro to NAE high level. Introduction to AOS-CX and feature set Port numbering Accessing Aruba OS-CX CLI Prompt modes/levels and navigation Context sensitive help Show logs, configuration, interfaces, transceivers, flash, version Hostname/interface name, enabling interfaces Link Layer Discovery Protocol ICMP and reachability testing tools: Ping and Traceroute PoE (standards one slide and what we support and one or two slide on configuration VLANs Broadcast/collision domains VLAN benefits VLAN creation DHCP server configuration in switches (optional) 802.1Q tagging Switchports vs. Routed ports MAC address table ARP table Packet Delivery part 1 Spanning Tree Protocol Redundant network L2 loops 802.1D Common Spanning Tree 802.1s 802.1w overview 802.1w load balancing 802.1w region configuration Link Aggregation Static Aggregation LACP Load Balancing IP Routing - Part 1 Default Gateway DHCP IP Helper Address IP Routing Service Inter-VLAN routing Packet Delivery Part 2 Need for layer 3 redundancy Introduction to VRF VRRP VRRP overview VRRP basic operation VRRP failover and preempt VRRP and MSTP coordination IP Routing - Part 2 Subnetting CIDR Static routes Administrative Distance Floating routes Scalability issues IP Routing - Part 3 IGP vs EGP Distance Vector vs Link State OSPF Router-ID and Hello Messages Passive interfaces States DR and BDR LSDB: LSA 1 and 2 Path selection and convergence Using cost to manipulate routes Stacking Control Plane, Management Plane, and Data Plane Introduction to Stacking technologies Stacking Benefits Centralized control and management plane Distributed Data Plane and Distributed Link Aggregation VSF VSF requirements VSF Link and member roles VSF member IDs and port numbers VSF Configuration VSF Provisioning use cases Tracing Layer 2 traffic: Unicast Tracing Layer 2 traffic: Broadcast, Multicast, and Unknown Unicast VSF Failover and OSFP Graceful-Restart VSF Link failure without MAD MAD VSX Introduction Secure Management and Maintenance OOBM port Management VRF Secure Management Protocols: AAA, SSH, HTTPS, RBAC Radius-based management auth (VSA) SNMP Web interface Configuration file management (Backup, restore, checkpoint and roll back) Operating System image management (backup and restore) Factory default/password recovery AOS-CX Management tools Intro to NetEdit NetEdit installation Basic monitoring with NetEdit AOS-CX Mobile App

AR-CXF: ArubaOS-CX Switching Fundamentals (Delivered by Fast Lane)
Delivered OnlineFlexible Dates
Price on Enquiry

Parents of adult children at risk

By Huntington's Disease Association

Virtual course for parents of adult children at risk/pre manifest. We are pleased to invite you to our virtual course for parents of adult children at risk/pre manifest. This is an opportunity to improve your knowledge of the issues surrounding your adult child at risk, share your experiences and gain ideas of support available for yourself and your adult child. This is a 5 week course running from Thursday 22 February 2024 10am -11.30am until Thursday 21 March, with the final session being an extended session narrative therapy session facilitated by Riverbank Psychology. There will be the opportunity to join a follow up support group. Week 1 – Thursday 22 February 2024 10am Welcome and overview of support available from the Huntington Disease Association. Speaker: James O’Connor – Team Leader HDYES – Huntington’s Disease Association Week 2 – Thursday 29 February 2024 10am Genetics: How to access testing, the process and family planning options Speaker: Chris Platt – SHDA – Huntington’s Disease Association Week 3 – Thursday 7 March 2024 10am Research update and what next Speaker: Nataile Saad - Research Sister - Welcome Trust Southampton University Hospital Week 4 – Thursday 14 March 2024 10am Finances planning ahead Speaker: Lisa Pearson - Financial Advisor - Asset management Week 5 – Thursday 21 March 2024 9.30 -12.30pm (note longer session)* Narrative Therapy: Coping with Feelings, supporting a loved one and self-care. Mariangels Ferrer – Clinical Psychologist – Riverbank Psychology * We will invite previous course participants to this part of the course but can only accommodate a maximum of 12/14 people on the day. The focus of Narrative Therapy in this group is to participate in a creative activity that explores identity through values, beliefs, and support systems, enabling us to make connections to our external lives which will be sustainable in our everyday lives. Mariangels Ferrer Duch is a Clinical Psychologist trained in Narrative Therapy who will be facilitating a three-hour Narrative Therapy session. The focus of the session will be upon the many small things that are important to us in life which can often be overlooked in times of stress. We hope the conversation will help to mutually inspire us all! We take your privacy seriously and promise to never sell your data. You can find out more about your rights, how we use your personal information and how we keep your details safe and secure by reading our privacy policy here. For more information email info@hda.org.uk or call 0151 331 5444.

Parents of adult children at risk
Delivered OnlineFlexible Dates
FREE

Keeping Yourself in Mind - JHD parents / family carers

By Huntington's Disease Association

Keeping Yourself in Mind: An ACT-informed programme for people supporting a family member with JHD We are pleased to invite you to our virtual course for parents and family carers of people living with Juvenile Huntington’s disease. The course will be run by Sarah Gunn, a clinical psychologist and researcher at the University of Leicester, and will be based on the principles of Acceptance and Commitment Therapy. Acceptance and Commitment Therapy is a therapeutic approach which focuses on learning to manage difficult thoughts and feelings, and to live a life which feels valuable and meaningful despite the struggles we encounter. This is an opportunity to explore the difficulties that can be associated with caring for a person with JHD (for you and within the family), to identify the values that matter most to you, and for you to think about how to move towards a more rich and valued life than you may have now. This is an eight-week course running from Wednesday 7 February to Wednesday 27 March 2024. The sessions will be on a Wednesday afternoon 1-2.30pm. Here is a very brief session outline: Week 1: Introductions: To ACT, to the programme, and to each other Week 2: Impacts of Juvenile Huntington’s on the “carer”* and wider family Week 3: Psychological wellbeing when supporting a person with Juvenile Huntington’s Week 4: Coping and adjustment: Living with, not battling against Week 5: What matters to you: Finding your values Week 6: Moving forward: Taking steps to align with your values Week 7: Living a valued life alongside Huntington’s: Plans and coping strategies Week 8: Reflection and ending: What’s next? *Note: Some people don’t like this term, so here we’re using it in quote marks. During the course, we will discuss which term would be preferred by the people attending. For more information on what information we collect and how we use it when booking onto one of our events, please see our privacy policy on our website.

Keeping Yourself in Mind - JHD parents / family carers
Delivered OnlineFlexible Dates
FREE

Get Smart With QuickBooks 2022 for Windows

By Nexus Human

Duration 2 Days 12 CPD hours Overview At course completion, you will be able to: Set up a company Set up and manage inventory Invoice and process payments Customize forms Create reports Track and pay sales tax Prepare payroll In this course you will learn the features in QuickBooks Pro and Premier 2022. First-time QuickBooks users will learn the basic features of the software. Experienced QuickBooks users will quickly learn the new features and functionality of QuickBooks 2022. Getting Started Starting QuickBooks Setting QuickBooks Preferences Components of the QuickBooks Operating Environment Using QuickBooks Help Identifying Common Business Terms Exiting QuickBooks Setting Up a Company Creating a QuickBooks Company Using the Chart of Accounts Working with Lists Creating Company Lists Working with the Customers & Jobs List Working with the Employees List Working with the Vendors List Working with the Item List Working with Other Lists Managing Lists Setting Up Inventory Entering Inventory Ordering Inventory Receiving Inventory Paying for Inventory Manually Adjusting Inventory Selling Your Product Creating Product Invoices Applying Credit to Invoices Emailing Invoices Setting Price Levels Creating Sales Receipts Invoicing for Services Setting Up a Service Item Changing the Invoice Format Creating a Service Invoice Editing an Invoice Voiding an Invoice Deleting an Invoice Entering Statement Charges Creating Billing Statements Automated Send Statements Processing Payments Displaying the Open Invoices Report Using the Income Tracker Receiving Payments for Invoices Making Deposits Handling Bounced Checks Working with Bank Accounts Writing a QuickBooks Check Voiding a QuickBooks Check Using Bank Account Registers Entering a Handwritten Check Transferring Funds Between Accounts Reconciling Checking Accounts Entering and Paying Bills Using QuickBooks for Accounts Payable Using the Bill Tracker Entering Bills Paying Bills Entering Vendor Credit Handling Expenses Managing Receipts Memorizing Transactions Entering a New Memorized Transaction Editing a Memorized Transaction Deleting a Memorized Transaction Grouping Memorized Transactions Using a Memorized Transaction Printing the Memorized Transaction List Customizing Forms Creating a Custom Template Modifying a Template Printing Forms Using Other QuickBooks Accounts Other QuickBooks Account Types Working with Credit Card Transactions Working with Fixed Assets Working with Long-Term Liability Accounts Using the Loan Manager Creating Reports Working with QuickReports Working with Preset Reports Sharing Reports Exporting Reports to Microsoft Excel Printing Reports Creating Graphs Creating QuickInsight Graphs Using QuickZoom with Graphs Working with the Sales Graph Customizing Graphs Printing Graphs Tracking and Paying Sales Tax Using Sales Tax in QuickBooks Setting Up Tax Rates and Agencies Indicating Who and What Gets Taxed Applying Tax to Each Sale Determining What You Owe Paying Your Tax Agencies Preparing Payroll with QuickBooks Using Payroll Tracking Setting Up for Payroll Setting Up Employee Payroll Information Setting Up a Payroll Schedule Writing a Payroll Check Printing Paycheck Stubs Tracking Your Tax Liabilities Paying Payroll Taxes Preparing Payroll Tax Form Using the EasyStep Interview Using the EasyStep Interview Using Online Banking Setting Up an Internet Connection Setting Up Bank Feeds for Accounts Viewing, Downloading, and Adding Online Transactions Creating Online Payments Transferring Funds Online Canceling Online Payments Managing Company Files Using QuickBooks in Multi-user Mode Setting Up Users and Passwords Setting a Closing Date Sharing Files with an Accountant Updating QuickBooks Backing Up and Restoring a Company File Condensing a Company File Estimating, Time Tracking, and Job Costing Creating Job Estimates Creating an Invoice from an Estimate Displaying Reports for Estimates Updating the Job Status Tracking Time Displaying Reports for Time Tracking Tracking Vehicle Mileage Displaying Vehicle Mileage Reports Displaying Other Job Reports Writing Letters Using the Letters and Envelopes Wizard Customizing Letter Templates

Get Smart With QuickBooks 2022 for Windows
Delivered OnlineFlexible Dates
Price on Enquiry

Networking in Google Cloud

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is intended for network engineers and network admins that are either using Google Cloud Platform or are planning to do so. The class is also for individuals that want to be exposed to software-defined networking solutions in the cloud. Overview Configure Google VPC networks, subnets, and routers Control administrative access to VPC objects Control network access to endpoints in VPCsInterconnect networks among GCP projects Interconnect networks among GCP VPC networks and on-premises or other-cloud networks Choose among GCP load balancer and proxy options and configure them Use Cloud CDN to reduce latency and save money Optimize network spend using Network TiersConfigure Cloud NAT or Private Google Access to provide instances without public IP addresses access to other services Deploy networks declaratively using Cloud Deployment Manager or Terraform Design networks to meet common customer requirements Configure monitoring and logging to troubleshoot networks problems Learn about the broad variety of networking options on Google Cloud. This course uses lectures, demos, and hands-on labs to help you explore and deploy Google Cloud networking technologies, including Virtual Private Cloud (VPC) networks, subnets, and firewalls; interconnection among networks; load balancing; Cloud DNS; Cloud CDN; and Cloud NAT. You'll also learn about common network design patterns and automated deployment using Cloud Deployment Manager or Terraform. Google Cloud VPC Networking Fundamentals Recall that networks belong to projects. Explain the differences among default, auto, and custom networks. Create networks and subnets. Explain how IPv4 addresses are assigned to Compute Engine instances. Publish domain names using Google Cloud DNS. Create Compute Engine instances with IP aliases. Create Compute Engine instances with multiple virtual network. Controlling Access to VPC Networks Outline how IAM policies affect VPC networks. Control access to network resources using service accounts. Control access to Compute Engine instances with tag-based firewall rules. Sharing Networks across Projects Outline the overall workflow for configuring Shared VPC. Differentiate between the IAM roles that allow network resources to be managed. Configure peering between unrelated VPC Networks. Recall when to use Shared VPC and when to use VPC Network Peering. Load Balancing Recall the various load balancing services. Configure Layer 7 HTTP(S) load balancing. Whitelist and blacklist IP traffic with Cloud Armor. Cache content with Cloud CDN. Explain Layer 4 TCP or SSL proxy load balancing. Explain regional network load balancing. Configure internal load balancing. Recall the choices for enabling IPv6 Internet connectivity for Google Cloud load balancers. Determine which Google Cloud load balancer to use when. Hybrid Connectivity Recall the Google Cloud interconnect and peering services available to connect your infrastructure to Google Cloud. Explain Dedicated Interconnect and Partner Interconnect. Describe the workflow for configuring a Dedicated Interconnect. Build a connection over a VPN with Cloud Router. Determine which Google Cloud interconnect service to use when. Explain Direct Peering and Partner Peering. Determine which Google Cloud peering service to use when. Networking Pricing and Billing Recognize how networking features are charged for. Use Network Service Tiers to optimize spend. Determine which Network Service Tier to use when. Recall that labels can be used to understand networking spend. Network Design and Deployment Explain common network design patterns. Configure Private Google Access to allow access to certain Google Cloud services from VM instances with only internal IP addresses. Configure Cloud NAT to provide your instances without public IP addresses access to the internet. Automate the deployment of networks using Deployment Manager or Terraform. Launch networking solutions using Cloud Marketplace. Network Monitoring and Troubleshooting Configure uptime checks, alerting policies and charts for your network services. Use VPC Flow Logs to log and analyze network traffic behavior.

Networking in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry