• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1237 Courses in Cardiff delivered Live Online

Building ASP.net applications

5.0(3)

By Systems & Network Training

ASP.Net training course description Our hands on ASP.NET training course that will teach students how to create a simple ASP.NET application that delivers dynamic content to the web. The course is applicable for those using C# or VB.NET with ASP.NET. What will you learn Create a web form with server controls Separate page code from content with code-behind pages, page controls, and components. Display dynamic data from a data source by using ADO.NET and data binding. Debug ASP.NET pages by using trace. ASP.Net training course details Who will benefit: Programmers working with ASP.NET. Prerequisites: HTML5 development fundamentals VBNet_course.htm or C++ programming foundation Duration 3 days ASP.Net training course contents Working with ASP.NET Introducing ASP.NET. Creating web forms. Adding ASP.NET code to a page. Handling page events. Using Web Controls Web controls and HTML controls compared. Using intrinsic controls. Using input validation controls. Introduction to user controls. Using trace in ASP.NET pages Overview of tracing. Trace information. Page-level trace and application-level trace. Separating code from content Advantages of partitioning an ASP.NET page. Creating and using code-behind pages. Creating and using components and classes. Inheritance of classes. Interfaces. Using ADO .NET to access data Accessing text files. Overview of ADO .NET Connecting to a data source. Accessing data with DateSets. Using DataViews. Accessing data with DataReaders. Using XML data with a DataSet. Creating an ASP.NET Web Application Requirements of a web application. Sharing information between pages. Securing an ASP.NET application. Web services. Creating a simple web service using Visual Studio.NET Calling a web service using Visual Studio.NET

Building ASP.net applications
Delivered in Internationally or OnlineFlexible Dates
£2,367

Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 3

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for students who want to use more advanced functionalities in Microsoft Word, including image manipulation, collaboration and revision tracking, cross- referencing and linking, document security, forms, and process automation through macros. Overview In this course, you will explore advanced functionalities in Word. You will: Use images in a document. Create custom graphic elements. Collaborate on documents. Add reference marks and notes. Secure a document. Create and manipulate forms. Create macros to automate tasks. Word for Microsoft 365 enables you to do far more than simple word processing. Word includes advanced image manipulation tools, collaboration features, cross-referencing and linking tools, entry forms and data collection, security features, and tools to automate document production.Being able to manipulate graphics and efficiently create, manage, revise, and distribute long documents and forms can help your organization create important and interesting documents. Implementing time-saving features that enable you to work well in a collaborative mode will benefit both you and your organization. Constructing document elements that ensure your readers have access to pertinent information at the click of a button, while at the same time protecting sensitive information, is another important skill. Mastering these skills and techniques will make you a valued employee in your organization.Note: Most Office users perform the majority of their daily tasks using the desktop version of the Office software, so that is the focus of this training. The course material will alsoenable you to access and effectively utilize many web-based resources provided with your Microsoft 365? subscription. Helpful notes throughout the material alert you to caseswhere the online version of the application may function differently from the primary, desktop version.This course may be a useful component in your preparation for theMicrosoft Word (Microsoft 365 Apps and Office 2019): Exam MO-100 and Microsoft Word Expert (Microsoft 365 Apps and Office 2019): Exam MO-101 certification exams. Lesson 1: Manipulating Images Topic A: Integrate Pictures and Text Topic B: Adjust Image Appearance Lesson 2: Using Custom Graphic Elements Topic A: Create Text Boxes and Pull Quotes Topic B: Add WordArt and Other Text Effects Topic C: Draw Shapes Topic D: Create Complex Illustrations with SmartArt Lesson 3: Collaborating on Documents Topic A: Share and Co-Author a Document Topic B: Mark Up a Document Topic C: Review Markups Topic D: Merge Changes from Other Documents Lesson 4: Adding Document References and Links Topic A: Add Captions Topic B: Add Cross-References Topic C: Add Bookmarks Topic D: Add Links Topic E: Insert Footnotes and Endnotes Topic F: Add Citations and a Bibliography Lesson 5: Securing a Document Topic A: Suppress Information Topic B: Set Formatting and Editing Restrictions Topic C: Restrict Document Access Topic D: Add a Digital Signature to a Document Lesson 6: Using Forms to Manage Content Topic A: Create Forms Topic B: Modify Forms Lesson 7: Automating Repetitive Tasks with Macros Topic A: Automate Tasks by Using Macros Topic B: Create a Macro Additional course details: Nexus Humans Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Microsoft Word for Office 365 (Desktop or Online) (v1.1) Part 3
Delivered OnlineFlexible Dates
Price on Enquiry

CCTV Operator Course

By NextGen Learning

Course Overview The CCTV Operator Course is designed to equip learners with the knowledge and skills required to operate CCTV systems effectively and efficiently. This comprehensive course covers the essential aspects of CCTV operations, focusing on the operational requirements, technical guidance, and regulatory standards. Learners will gain an understanding of how to monitor surveillance systems, ensure data protection compliance, and meet job requirements. By the end of the course, learners will be prepared to manage surveillance systems with confidence, supporting security operations across various industries. Course Description This course delves into the various aspects of CCTV operations, from understanding basic system components to applying data protection regulations in practice. Key topics include the operational requirements of CCTV systems, the technical aspects of monitoring and surveillance, and the necessary skills for effective performance in the role. Learners will also gain an understanding of data protection regulations, such as GDPR, and learn the requirements specific to CCTV operators. Throughout the course, learners will be introduced to the different job responsibilities and the critical competencies required to succeed in this field. Course Modules Module 01: Operational Requirement Module 02: CCTV Operator Skills and Ability Module 03: Basics of CCTV Module 04: Technical Guidance Module 05: Monitoring CCTV Cameras Module 06: Watch Surveillance Module 07: Data Protection Regulations Module 08: Job Requirements of a CCTV Operator (See full curriculum) Who is this course for? Individuals seeking to pursue a career in security operations. Professionals aiming to enhance their expertise in CCTV monitoring. Beginners with an interest in surveillance and security. Anyone interested in gaining qualifications in security operations. Career Path CCTV Operator Security Surveillance Specialist Security Manager Facility Security Supervisor Operations Manager in Security Systems Compliance Officer in Security Operations

CCTV Operator Course
Delivered OnlineFlexible Dates
£9.99

B6098 IBM Cognos Analytics - Author Active Reports (v11.0)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Report authors wanting to develop interactive report content, or content disconnected from IBM Cognos servers. In this course, participants increase their IBM Cognos Analytics experience by building interactive reports using Active Report controls, which can be distributed to and consumed by users in a disconnected environment, including mobile devices. Introduction to IBM Cognos Active Reports Examine IBM Cognos Active Reports Convert an existing report into an Active Report Add interactions in Active Reports using Active Report connections Create a basic Active Report Examine interactive behavior of Active Report controls Save a report in the IBM Cognos Analytics portal Save an Active Report to an MHT file Save an Active Report as a report template Use an Active Report as a prompt page Understand Active Report security Use Active Report Connections Examine Active Report connections Filter and select in controls using Active Report connections Examine variables Use a single variable to control multiple controls Use multiple variables to show different data in different controls Use Active Report controls to support mobile device usage Active Report Charts & Decks Add charts to active reports Understand and optimize chart behavior Examine decks and data decks Optimize use of decks Review Master Detail relationships Examine RAVE visualizations

B6098 IBM Cognos Analytics - Author Active Reports (v11.0)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Information Privacy Professional (CIPP/E)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Lawyers Records Managers Information Officers Compliance Officers Human Resource Officers Anyone who uses, processes and maintains personal data Overview The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There's a lot to know, there's a lot at stake and there's a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe-and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation's data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. The General Data Protection Regulation (GDPR) took effect in 2018. Are you in compliance? There?s a lot to know, there?s a lot at stake and there?s a lot of opportunity for data protection professionals with the right training and education. Achieving a CIPP/E credential shows you have the comprehensive GDPR knowledge, perspective and understanding to ensure compliance and data protection success in Europe?and to take advantage of the career opportunity this sweeping legislation represents. The Certified Information Privacy Manager (CIPM) credential provides the practical day-to-day information to lead an organisation?s data protection programme. Adding the CIPM to your CIPP/E puts you at the forefront of ensuring you are ready for the GDPR. Data protection laws Key European data protection laws and regulatory bodies Evolving toward a harmonised legislative framework Personal Data Understanding and differentiating between types of data as defined by the GDPR Personal, anonymous, pseudonymous and special categories Controllers and Processors Roles and relationships of controllers and processors as defined by the GDPR Processing Personal Data Data processing and GDPR processing principles Applying the GDPR Legal grounds for processing personal data Data subject rights Data subject rights Applying rights Controller and processor obligations Information provision obligations Controller obligations for providing information about data processing activities to data subjects Supervisory authorities as set out in the GDPR Cross-border data transfers Options and obligations under the GDPR for transferring data outside the European Economic Area Adequacy decisions Safeguards and derogations Compliance considerations Applying European data protection laws Legal bases and compliance requirements for processing personal data in practice Processing employee data Surveillance Direct marketing Internet technology and communications Security of processing Considerations and duties of controllers and processors for ensuring security of personal data GDPR specifications for providing notification of data breaches Accountability Accountability requirements Data protection management systems Data protection impact assessments Data protection policies Role of the data protection officer Supervision and enforcement Role, powers and procedures of supervisory authorities Composition and tasks of the European Data Protection Board Role of the European Data Protection Supervisor Remedies, liabilities and penalties for noncompliance as set out in the GDPR Additional course details: Nexus Humans Certified Information Privacy Professional (CIPP/E) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Professional (CIPP/E) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Information Privacy Professional (CIPP/E)
Delivered OnlineFlexible Dates
Price on Enquiry

CWS-250 Citrix DaaS Deployment and Administration

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Create Citrix DaaS workloads. Deliver app and desktop resources to users. Migrate existing on-premises Citrix Virtual Apps and Desktops 2203 LTSR infrastructure to Citrix Cloud. In this course you will learn how to create a new Citrix DaaS deployment and how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and resource locations that the host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. Module 1: Introduction to Citrix DaaS New Citrix Workspace Packaging Citrix Virtual Apps and Desktops - On- Premises Site What is Citrix Cloud? Why Citrix DaaS? What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? Citrix Cloud Administration Module 2: Planning - Citrix DaaS Architecture, Security, and Operations Architecture and Deployment Options Citrix DaaS Security Citrix DaaS Operations Module 3: Planning - Citrix Cloud Connectors Cloud Connector Architecture Cloud Connector Services and Communications Overview Cloud Connector Operations in a Resource Location Cloud Connector Resiliency Installing, Updating, and Removing Cloud Connectors Supported Domain Scenarios for Cloud Connectors Securing Cloud Connector Communications Local Host Cache (LHC) Citrix Cloud Connector vs Delivery Controller Operations Module 4: Planning - Citrix DaaS Resource Locations Citrix DaaS Resource Locations Citrix DaaS Hosting Connections Zones Module 5: Active Directory, Authentication, and Authorization Active Directory Design Options Desktops from Non-Domain Joined VDAs Citrix Federated Authentication Service and Identity Provider Services Module 6: Planning - Provisioning VDA Workloads and Delivering Resources Master Images Machine Creation Services (MCS) in Citrix DaaS Citrix Provisioning in Citrix DaaS Machine Catalogs Delivery Groups Citrix Cloud Library Module 7: Planning - Provisioning VDA Workloads and Delivering Resources Selecting Between Citrix digital workspace experience and StoreFront Citrix StoreFront and Citrix digital workspace experience Communications Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway Access Layer Communications User Authentication Module 8: Planning - Citrix DaaS Administration Citrix Cloud Manage and Monitor Delegated Administration Citrix DaaS Remote PowerShell Software Development Kit Manage Multiple Resource Locations Module 9: Planning - Public Cloud Considerations General Public Cloud Considerations Using Autoscale to Power Manage Machines in a Public Cloud Microsoft Azure as a Citrix DaaS Resource Location Amazon Web Services as a Citrix DaaS Resource Location Google Cloud as a Citrix DaaS Resource Location Module 10: Planning - Migrating to Citrix DaaS from Citrix Virtual Apps and Desktops Citrix Cloud Migration Options and Considerations Citrix Automated Configuration Tool Citrix Image Portability Service Module 11: Manage - Operations and Support in Citrix Cloud Citrix Cloud Connector Support Updating and Rolling Back Machine Catalogs VDA Restore Citrix Self-Help Strategy Monitor Your Environment Additional course details: Nexus Humans CWS-250 Citrix DaaS Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-250 Citrix DaaS Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-250 Citrix DaaS Deployment and Administration
Delivered OnlineFlexible Dates
Price on Enquiry

GRC300 SAP Access Control Implementation and Configuration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course are Application Consultants, Business Process Architects, and Business Process Owners/Team Leads/Power Users. Overview This course will prepare you to:Describe tasks performed by a typical SAP Access Control userDiscuss Harmonization topics as they relate to SAP Access ControlExplain how SAP GRC helps you to address business challengesIdentify authorization risks in typical business processesDescribe the Segregation of Duties Risk Management ProcessDescribe and configure functionality and features for SAP Access Control 10.1Use the SAP Access Control 10.1 application to analyze and manage risk, design and manage roles, and provision and manage usersDescribe the SAP Access Control 10.1 architecture and landscape, SAP Access Control Repository, and Object Level SecurityDescribe the Periodic Access Review processPlan for and manage emergency accessDiscuss the reporting frameworkConfigure workflows, including multi-stage multi-path (MSMP) workflows and BRF+Describe how the different applications of the SAP GRC Solution integrate with each otherDiscuss key steps in the SAP Access Control implementation process In this course, students gain hands-on configuration and implementation experience of SAP Access Control 10.1, as well as important concepts they will need to know in order to prepare for implementation and ongoing access risk prevention. Introduction to SAP Access Control Discussing Business Challenges and Solutions Using SAP Access Control Architecture, Security, and Authorizations Describing the System Architecture Describing Security and Authorizations Shared Configuration Settings Configuring Shared GRC Settings Configuring Shared SAP Access Control Settings Authorization Risks and the Segregation of Duties (SoD) Management Process Identifying Authorization Risks Managing Risk by Segregating Duties SAP Access Control Repository Synchronizing Objects into the Repository Scheduling and Viewing Background Jobs Risk Analysis Maintaining Shared Master Data Configuring and Maintaining the Rule Set Configuring and Using Audit Trail Tracking Using the Risk Analysis Framework Remediating Risks Mitigating Risks Mitigating Multiple Risks at One Time Business Rule Framework Creating Rules in the Business Rule Framework (BRF) Defining Business Rules Multi-Stage, Multi-Path (MSMP) Workflow Describing Multi-Stage, Multi-Path (MSMP) Workflow Maintaining MSMP Workflow Building MSMP Workflow User Provisioning Configuring User Provisioning Settings Configuring Access Request Forms Requesting Access Preparing Roles and Owner Data for MSMP Workflow Creating Simplified Access Requests Reviewing Search Request Results SAP Fiori User Experience (UX) for GRC Describing SAP Fiori UX Role Design and Management Configuring Role Management Configuring Role Methodology Configuring Role Search Attributes Planning for Technical Role Definition Planning for Business Role Definition Consolidating Roles Through Role Mining Performing Role Mass Maintenance Operations Emergency Access Management Describing Emergency Access Management Planning for Emergency Access Monitoring Emergency Access Periodic Access Review Process Planning Periodic Review Monitoring Periodic Review Reports and Custom Fields Use the Reporting Framework SAP Access Control Implementation Using the SAP Access Control Implementation Process Designing the SAP Access Control Solution Planning Upgrade and Migration Configuring SAP Access Control Implementing the SAP Access Control solution Optimizing the SAP Access Control Suite Additional course details: Nexus Humans GRC300 SAP Access Control Implementation and Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the GRC300 SAP Access Control Implementation and Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

GRC300 SAP Access Control Implementation and Configuration
Delivered OnlineFlexible Dates
Price on Enquiry

SAP HANA Training | Online Courses | UK Provider

By Osborne Training

SAP HANA Training | Online Courses | UK Provider Stay Ahead of the competition by gaining skills on SAP HANA with Osborne Training. SAP HANA training builds the foundation for seamless SAP applications, which helps deliver ground-breaking innovations without disruption. SAP HANA provides powerful features like significant processing speed, predictive capabilities, the ability to handle large amount of data, and text mining capabilities. SAP HANA course is designed to make you ready for SAP certification and Job market. Introduction In-Memory Computing Evolution of In-Memory computing at SAP History of SAP HANA HANA compare to BWA In-Memory Basics HANA Use cases Architecture Hana Engine Overview Different HANA Engine Types Row Store Column Store Persistency Layer Business Impact of new architecture Backup & Recovery Modeling Key Concepts in Data Modeling Components of HANA data model & Views Analytical ViewsAttribute viewsCalculation ViewsJoins Measures Filters Real Time Scenarios HANA SQL Intro Functions & Expressions Procedures Data Provisioning Overview Trigger Based Replication ETL Based Replication Log Based Replication Intro to BODS 4 Basic Data service Connection types Flat File upload in to HANA Reporting Connectivity options Business Objects BI 4 Security Creating Users Creating Roles Privileges User Administration

SAP HANA Training | Online Courses | UK Provider
Delivered OnlineFlexible Dates
Price on Enquiry

Adobe Acobat Pro DC - Advanced

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The target students for this course are office professionals with a foundational understanding of Adobe Acrobat Pro DC who want to use the advanced productivity features and the creative features of Acrobat Pro DC. Overview In this course you will create and manage PDF documents.Students will: ?Customize the Acrobat Pro DC workspace.?Create PDFs from technical documents.?Enhance PDF documents.?Create interactive PDF forms.?Finalize PDF files for commercial printing. In this course, students will use Adobe Acrobat Pro DC to convert technical documents to PDF files, enhance PDF documents, create interactive PDF forms, and prepare PDF files for commercial printing. Customizing the Acrobat Pro DC Workspace Customize the Toolbars Create Custom Tool Sets Creating PDFs from Technical Documents Create PDF Documents by Using Autodesk AutoCAD Measure Technical Drawings Create PDF Documents by Using Autodesk AutoCAD Embed Multimedia Enhance PDF Document Accessibility Use Actions Manage the Security of PDF Documents Creating Interactive PDF Forms Create a PDF Form Compile and Manage PDF Form Data Finalizing PDF Files for Commercial Printing Apply Color Management Settings Preview Printed Effects Perform Preflight on a PDF Document Create PDF/X, PDF/A, and PDF/E Compliant Files Create a Composite and Color Separations Export a PDF Document to Other Formats

Adobe Acobat Pro DC - Advanced
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu RabbitMQ: Install, Configure, Manage

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers Architects Administrators Overview By the end of the course, you should be able to meet the following objectives: Install and configure RabbitMQ Activate and use plugins such as the web management console Implement messaging patterns and applications using the Java client Set up a cluster of RabbitMQ nodes Configure high availability appropriately Tune and optimize RabbitMQ for better performance Secure RabbitMQ This intensive instructor-led course in RabbitMQ provides a deep dive into how to install, configure, and develop applications which leverage RabbitMQ messaging. The course begins with RabbitMQ installation and general configuration. It continues with developing messaging applications using the Java APIs, and delves into more advanced topics including clustering, high availability, performance, and security. Modules are accompanied by lab exercises that provide hands-on experience Introduction to Spring Essentials Kubernetes Overview BOSH Introduction Deploy, Patch & Upgrade Deploy a simple release Inside the VM Persistent Disks Patch the OS Upgrade Nginx Entry Point Set up a jumpbox Platform Infrastructure Pave the IaaS Deploy ops manager Deploy BOSH director Containerized Workloads Deploy Pivotal Container Service Provision a Kubernetes Cluster Harbor Container Registry Application Deployment Helm Advanced BOSH Deploy a distributed system Deploy Concourse CredHub Troubleshooting Concourse Deployment Concourse Day 2 Operations

VMware Tanzu RabbitMQ: Install, Configure, Manage
Delivered OnlineFlexible Dates
Price on Enquiry