• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

6411 Courses in Milnrow delivered Live Online

Cisco Understanding Cisco Wireless Foundations v1.0 (WLFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network engineer Systems engineer Wireless engineer Technical solutions architect Network administrator Wireless design engineer Network manager Overview After taking this course, you should be able to: Describe and implement foundational wireless theory Describe and implement basic wireless security and client access Describe and implement a Cisco wireless network architecture Configure Cisco centralized wireless networks Describe and implement WLAN maintenance and troubleshooting Thisÿcourse gives you the knowledge and skills you need to position, plan, implement, operate, and manage a Cisco WLAN network. This course teaches you how to design, install, configure, monitor, and conduct basic troubleshooting tasks on a Cisco WLAN network of any size. Course Outline DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS THEORY DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS MATH AND ANTENNAS DESCRIBING AND IMPLEMENTING FOUNDATIONAL WIRELESS OPERATION DESCRIBING AND IMPLEMENTING BASIC WIRELESS SECURITY DESCRIBING AND IMPLEMENTING 802.1X AND EAP IMPLEMENTING WIRELESS GUEST ACCESS AND CONFIGURING WIRELESS SECURITY DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK ARCHITECTURE DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK DESCRIBING AND IMPLEMENTING CISCO WIRELESS NETWORK WIRED SUPPORT CONFIGURING CISCO CENTRALIZED WIRELESS NETWORKS DESCRIBING AND IMPLEMENTING WLAN MAINTENANCE AND TROUBLESHOOTING

Cisco Understanding Cisco Wireless Foundations v1.0 (WLFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course will help you: Prepare for entry-level job roles in the high-demand area of data center environments Prepare for courses that support the Cisco Certified Network Professional Data Center certification exams Gain knowledge and hands-on skills through Cisco's unique combination of lessons and hands-on practice using enterprise-grade Cisco learning technologies, data center equipment, and software Overview After taking this course, you should be able to: Describe the foundations of data center networking Describe Cisco Nexus products and explain the basic Cisco NX-OS functionalities and tools Describe Layer 3 first-hop redundancy Describe Cisco Fabric Extender (FEX) connectivity Describe Ethernet port channels and virtual port channel (VPCs) Introduce switch virtualization, machine virtualization, and network virtualization Compare storage connectivity options in the data center Describe Fibre Channel communication between the initiator server and the target storage Describe Fibre Channel zone types and their uses Describe N-Port Virtualization (NPV) and N-Port Identifier Virtualization (NPIV) Describe data center Ethernet enhancements that provide a lossless fabric Describe Fibre Channel over Ethernet FCoE Describe data center server connectivity Describe Cisco UCS Manager Describe the purpose and advantages of APIs Describe Cisco ACI Describe the basic concepts of cloud computing The Understanding Cisco Data Center Foundations (DCFNDU) v1.0 course helps you prepare for entry-level data center roles. In this course, you will learn the foundational knowledge and skills you need to configure Cisco© data center technologies including: networking, virtualization, storage area networking, and unified computing. You will get an introduction to Cisco Application Centric Infrastructure (Cisco ACI), automation and cloud computing. You will get hands-on experience with configuring features on Cisco Nexus Operating System (Cisco NX-OS) and Cisco Unified Computing System (Cisco UCS). This course also earns you 30 Continuing Education (CE) credits towards recertification. Describing the Data Center Network Architectures Cisco Data Center Architecture Overview Three-Tier Network: Core, Aggregation, and Access Spine-and-Leaf Network Two-Tier Storage Network Describing the Cisco Nexus Family and Cisco NX-OS Software Cisco Nexus Data Center Product Overview Cisco NX-OS Software Architecture Cisco NX-OS Software CLI Tools Cisco NX-OS Virtual Routing and Forwarding Describing Layer 3 First-Hop Redundancy Default Gateway Redundancy Hot Standby Router Protocol Virtual Router Redundancy Protocol Gateway Load Balancing Protocol Describing Cisco FEX Server Deployment Models Cisco FEX Technology Cisco FEX Traffic Forwarding Cisco Adapter FEX Describing Port Channels and VPCs Ethernet Port Channels Virtual Port Channels Supported VPC Topologies Describing Switch Virtualization Cisco Nexus Switch Basic Components Virtual Routing and Forwarding Cisco Nexus 7000 Virtual Device Contexts (VDCs) VDC Types VDC Resource Allocation VDC Management Describing Machine Virtualization Virtual Machines Hypervisor VM Manager Describing Network Virtualization Overlay Network Protocols Virtual Extensible LAN (VXLAN) Overlay VXLAN Border Gateway Protocol (BGP) Ethernet VPN (EVPN) Control Plane VXLAN Data Plane Cisco Nexus 1000VE Series Virtual Switch VMware vSphere Virtual Switches Introducing Basic Data Center Storage Concepts Storage Connectivity Options in the Data Center Fibre Channel Storage Networking Virtual Storage Area Network (VSAN) Configuration and Verification Describing Fibre Channel Communication Between the Initiator Server and the Target Storage Fibre Channel Layered Model Fabric Login (FLOGI) Process Fibre Channel Flow Control Describing Fibre Channel Zone Types and Their Uses Fibre Channel Zoning Zoning Configuration Zoning Management Describing Cisco NPV Mode and NPIV Cisco NPV Mode NPIV Mode Describing Data Center Ethernet Enhancements Institute of Electrical and Electronic Engineers (IEEE) Data Center Bridging Priority Flow Control Enhanced Transmission Selection Data Center Bridging Exchange (DCBX) Protocol Congestion Notification Describing FCoE Cisco Unified Fabric FCoE Architecture FCoE Initialization Protocol FCoE Adapters Describing Cisco UCS Components Physical Cisco UCS Components Cisco Fabric Interconnect Product Overview Cisco I/O Module (IOM) Product Overview Cisco UCS Mini Cisco Integrated Management Controller (IMC) Supervisor Cisco Intersight? Describing Cisco UCS Manager Cisco UCS Manager Overview Identity and Resource Pools for Hardware Abstraction Service Profiles and Service Profile Templates Cisco UCS Central Overview Cisco HyperFlex? Overview Using APIs Common Programmability Protocols and Methods How to Choose Models and Processes Describing Cisco ACI Cisco ACI Overview Multitier Applications in Cisco ACI Cisco ACI Features VXLAN in Cisco ACI Unicast Traffic in Cisco ACI Multicast Traffic in Cisco ACI Cisco ACI Programmability Common Programming Tools and Orchestration Options Describing Cloud Computing Cloud Computing Overview Cloud Deployment Models Cloud Computing Services Additional course details: Nexus Humans Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Understanding Cisco Data Center Foundations v1.1 (DCFNDU)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco UCS Director Foundation (UCSDF) v6.6

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Data center architects Cloud infrastructure architects Network engineers System administrators Storage administrators System engineers who work in data center solutions and manage data center management policies Cisco integrators and partners Overview After taking this course, you should be able to: Understand Cisco UCS Director architecture Understand deployment models of Cisco UCS Director Configure virtual data centers, policies, and catalogs Understand the unified infrastructure management capabilities of Cisco UCS Director Understand orchestration and build advanced workflows Understand application containers The Cisco UCS Director Foundation (UCSDF) v6.6 course helps you understand concepts, architecture, and deployment use cases for Cisco UCS© Director. You will gain hands-on experience in deploying basic Cisco UCS Director solutions. You will also practice using core features that most implementations require, such as services design, using the self-service portal for provisioning services, creating workflows that enable cloud automation and standardize IT services, and more. Introducing Cisco UCS Director Understanding Data Center Challenges Understanding the Benefits of Cisco UCS Director Understanding Cisco UCS Director Components Explaining Cisco UCS Director Architecture Explaining Bare-Metal Agent Understanding Cisco UCS Director Deployment Explaining Cisco UCS Director Deployment Explaining Global System Settings Understanding Site and Pod Management Understanding Cisco UCS Director Infrastructure Management Understanding Cisco UCS Director Deployment Understanding the Design Phase Understanding Policies Understanding vDC and Groups Use Case Understanding Deployment Through the Self-Service Portal Understanding the Self-Service Provisioning Portal Understanding Service Request Introducing Orchestration Understanding Orchestration Reporting and Monitoring in Cisco UCS Director Understanding Chargeback in Cisco UCS Director Understanding Reports in Cisco UCS Director Introducing Application Containers Understanding Application Containers

Cisco UCS Director Foundation (UCSDF) v6.6
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Account manager Deployment engineer Deployment project manager Sales engineer Overview After taking this course, you should be able to: Describe CCE flows and processes required to support and troubleshoot the PCCE deployment Introduce the many diagnostic tools available to the engineer responsible for troubleshooting a PCCE environment Apply troubleshooting tools and techniques to address issues with CCE Certificates, Cisco Finesse, and PCCE Deployment The Troubleshooting Cisco Contact Center Enterprise (CCET) v1.0 course is focused on Day 2 support of a Packaged Contact Center Enterprise (PCCE) deployment by Tier 3 support personnel. Cisco© PCCE provides an enterprise-class contact center in a prepackaged deployment model that offers simplified deployment, operation, and maintenance. You will learn to identify the processes and tools used to diagnose common deployment issues so that support personnel can select optimal methods to resolve those issues CCE Flows and Process Review Troubleshooting and Support Methodology PCCE Component Review PCCE Call Flow Review CCE Diagnostic Tools Diagnostic Framework Suite Run Analysis Manager Run Unified System Command-Line Interface (CLI) Troubleshooting CCE Troubleshoot Certificates Troubleshoot Cisco Finesse Troubleshoot a PCCE Deployment Additional course details: Nexus Humans Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Troubleshooting Cisco Contact Center Enterprise v1.0 (CCET)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security administrators Security consultants Network administrators Systems engineers Technical support personnel Cisco integrators, resellers, and partners Overview Identify the key components and methodologies of Cisco Advanced Malware Protection (AMP) Recognize the key features and concepts of the AMP for Endpoints product Navigate the AMP for Endpoints console interface and perform first-use setup tasks Identify and use the primary analysis features of AMP for Endpoints Use the AMP for Endpoints tools to analyze a compromised host Analyze files and events by using the AMP for Endpoints console and be able to produce threat reports Configure and customize AMP for Endpoints to perform malware detection· Create and configure a policy for AMP-protected endpoints Plan, deploy, and troubleshoot an AMP for Endpoints installation Use Cisco Orbital to pull query data from installed AMP for Endpoints connectors Describe the AMP Representational State Transfer (REST) API and the fundamentals of its use Describe all the features of the Accounts menu for both public and private cloud installations This course shows you how to deploy and use Cisco AMP for Endpoints, a next-generation endpoint security solution that prevents, detects, and responds to advanced threats. Through expert instruction and hands-on lab exercises, you will learn how to implement and use this powerful solution through a number of step-by-step attack scenarios. You?ll learn how to build and manage a Cisco AMP for Endpoints deployment, create policies for endpoint groups, and deploy connectors. You will also analyze malware detections using the tools available in the AMP for Endpoints console, Cisco Threat Grid, and the Cisco Orbital Advanced Search Tool. Course Outline Introducing Cisco AMP Technologies Introducing AMP for Endpoints Overview and Architecture Navigating the Console Interface Using Cisco AMP for Endpoints Identifying Attacks Analyzing Malware Managing Outbreak Control Creating Endpoint Policies Working with AMP for Endpoint Groups Using Orbital for Endpoint Visibility Introducing AMP REST API Navigating Accounts

Cisco Protecting Against Malware Threats with Cisco AMP for Endpoints v6.0 (SSFAMP)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Although there are no mandatory prerequisites, the course is particularly suited for the following audiences: Cybersecurity engineer Cybersecurity investigator Incident manager Incident responder Network engineer SOC analysts currently functioning at entry level with 2+ years of experience Overview After taking this course, you should be able to: Describe the types of service coverage within a SOC and operational responsibilities associated with each. Compare security operations considerations of cloud platforms. Describe the general methodologies of SOC platforms development, management, and automation. Explain asset segmentation, segregation, network segmentation, micro-segmentation, and approaches to each, as part of asset controls and protections. Describe Zero Trust and associated approaches, as part of asset controls and protections. Perform incident investigations using Security Information and Event Management (SIEM) and/or security orchestration and automation (SOAR) in the SOC. Use different types of core security technology platforms for security monitoring, investigation, and response. Describe the DevOps and SecDevOps processes. Explain the common data formats, for example, JavaScript Object Notation (JSON), HTML, XML, CommaSeparated Values (CSV). Describe API authentication mechanisms. Analyze the approach and strategies of threat detection, during monitoring, investigation, and response. Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs). Interpret the sequence of events during an attack based on analysis of traffic patterns. Describe the different security tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools). Analyze anomalous user and entity behavior (UEBA). Perform proactive threat hunting following best practices. The Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course guides you through cybersecurity fundamentals and prepares you for the role of Information Security Analyst on a Security Operations Center team. You?ll learn to automate for security using cloud platforms and how to apply your knowledge to real-world scenarios Course Outline Understanding Risk Management and SOC Operations Understanding Analytical Processes and Playbooks Investigating Packet Captures, Logs, and Traffic Analysis Investigating Endpoint and Appliance Logs Understanding Cloud Service Model Security Responsibilities Understanding Enterprise Environment Assets Threat Tuning Threat Researching and Threat Intelligence Practices Understanding APIs Understanding SOC Development and Deployment Models Performing Security Analytics and Reports in a SOC Malware Forensics Basics Threat Hunting Basics Additional course details: Nexus Humans Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Performing CyberOps Using Cisco Security Technologies (CBRCOR) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

Lean Six Sigma Yellow Belt

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This Yellow Belt training is intended for managers and employees from companies or government institutions who want to get acquainted with Lean Six Sigma or (soon) will have to deal with Lean Six Sigma in their own organization Overview During this training you will become acquainted with the essence of Lean Six Sigma and the importance of improvement management. It discusses how a Lean Six Sigma improvement project is approached, who plays an important role in an improvement project, what it yields as an employee or manager if this methodology is introduced in the organization and what should be taken into account when implementing. Theory and practice go hand in hand. The training encourages you to think about the value for your customer and which methodology best suits your role and your value in a process. This makes Lean and Six Sigma understandable and applicable. We also show what is involved in the introduction of LeanSix Sigma and there are various discussions about the introduction and the 'do's and don'ts of Lean Six Sigma. Course Outline Lean & Six Sigma Overview Basic Statistics Lean Six Sigma: the DMAIC Roadmap Lean Six Sigma: Tools Additional course details: Nexus Humans Lean Six Sigma Yellow Belt training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Lean Six Sigma Yellow Belt course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Lean Six Sigma Yellow Belt
Delivered OnlineFlexible Dates
Price on Enquiry

Kubernetes Bootcamp (CKAD)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Anyone who plans to work with Kubernetes at any level or tier of involvement Any company or individual who wants to advance their knowledge of the cloud environment Application Developers Operations Developers IT Directors/Managers Overview All topics required by the CKAD exam, including: Deploy applications to a Kubernetes cluster Pods, ReplicaSets, Deployments, DaemonSets Self-healing and observable applications Multi-container Pod Design Application configuration via Configmaps, Secrets Administrate cluster use for your team A systematic understanding of Kubernetes architecture Troubleshooting and debugging tools Kubernetes networking and services Kubernetes is a Cloud Orchestration Platform providing reliability, replication, and stability while maximizing resource utilization for applications and services. By the conclusion of this hands-on training, you will go back to work with all necessary commands and practical skills to empower your team to succeed, as well as gain knowledge of important concepts like Kubernetes architecture and container orchestration. We prioritize covering all objectives and concepts necessary for passing the Certified Kubernetes Application Developer (CKAD) exam. You will command and configure a high availability Kubernetes environment (and later, build your own!) capable of demonstrating all ?K8s'' features discussed and demonstrated in this course. Your week of intensive, hands-on training will conclude with a mock CKAD exam that matches the real thing. Kubernetes Architecture Components Understand API deprecations Containers Define, build and modify container images Pods Master Services Node Services K8s Services YAML Essentials Creating a K8s Cluster kubectl Commands Kubernetes Resources Kubernetes Namespace Kubernetes Contexts Pods What is a Pod? Create, List, Delete Pods How to Access Running Pods Kubernetes Resources Managing Cloud Resource Consumption Multi-Container Pod Design Security Contexts Init Containers Understand multi-container Pod design patterns (e.g. sidecar, init and others) Pod Wellness Tracking Networking Packet Forwarding ClusterIP and NodePort Services Provide and troubleshoot access to applications via services Ingress Controllers Use Ingress rules to expose applications NetworkPolicy resource Demonstrate basic understanding of NetworkPolicies Network Plugins Defining the Service Mesh Service mesh configuration examples ReplicaSets Services ReplicaSet Function Deploying ReplicaSets Deployments Deployment Object Updating/Rolling Back Deployments Understand Deployments and how to perform rolling updates Deployment Strategies Use Kubernetes primitives to implement common deployment strategies (e.g. blue/green or canary) Scaling ReplicaSets Autoscaling Labels and Annotations Labels Annotations Node Taints and Tolerations Jobs The K8s Job and CronJob Understand Jobs and CronJobs Immediate vs. scheduled internal use Application Configuration Understanding and defining resource requirements, limits and quotas Config Maps Create & consume Secrets Patching Custom Resource Definition Discover and use resources that extend Kubernetes (CRD) Managing ConfigMaps and Secrets as Volumes Storage Static and dynamic persistent volumes via StorageClass K8s volume configuration Utilize persistent and ephemeral volumes Adding persistent storage to containers via persistent volume claims Introduction to Helm Helm Introduction Charts Use the Helm package manager to deploy existing packages Application Security Understand authentication, authorization and admission control Understand ServiceAccounts Understand SecurityContexts Application Observability and Maintenance Use provided tools to monitor Kubernetes applications How to Troubleshoot Kubernetes Basic and Advanced Logging Techniques Utilize container logs Accessing containers with Port-Forward Debugging in Kubernetes Hands on Labs: Define, build and modify container images Deploy Kubernetes using Ansible Isolating Resources with Kubernetes Namespaces Cluster Access with Kubernetes Context Listing Resources with kubectl get Examining Resources with kubectl describe Create and Configure Basic Pods Debugging via kubectl port-forward Imperative vs. Declarative Resource Creation Performing Commands inside a Pod Understanding Labels and Selectors Insert an Annotation Create and Configure a ReplicaSet Writing a Deployment Manifest Perform rolling updates and rollbacks with Deployments Horizontal Scaling with kubectl scale Implement probes and health checks Understanding and defining resource requirements, limits and quotas Understand Jobs and CronJobs Best Practices for Container Customization Persistent Configuration with ConfigMaps Create and Consume Secrets Understand the Init container multi-container Pod design pattern Using PersistentVolumeClaims for Storage Dynamically Provision PersistentVolumes with NFS Deploy a NetworkPolicy Provide and troubleshoot access to applications via services Use Ingress rules to expose applications Understand the Sidecar multi-container Pod design pattern Setting up a single tier service mesh Tainted Nodes and Tolerations Use the Helm package manager to deploy existing packages A Completed Project Install Jenkins Using Helm and Run a Demo Job Custom Resource Definitions (CRDs) Patching Understanding Security Contexts for Cluster Access Control Utilize container logs Advanced Logging Techniques Troubleshooting Calicoctl Deploy a Kubernetes Cluster using Kubeadm Monitoring Applications in Kubernetes Resource-Based Autoscaling Create ServiceAccounts for use with the Kubernetes Dashboard Saving Your Progress With GitHub CKAD Practice Drill Alta Kubernetes Course Specific Updates Sourcing Secrets from HashiCorp Vault Example CKAD Test Questions

Kubernetes Bootcamp (CKAD)
Delivered OnlineFlexible Dates
Price on Enquiry

Java Fundamentals

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Java Fundamentals is designed for tech enthusiasts who are familiar with some programming languages and want a quick introduction to the most important principles of Java. Overview After completing this course, you will be able to: Create and run Java programs Use data types, data structures, and control flow in your code Implement best practices while creating objects Work with constructors and inheritance Understand advanced data structures to organize and store data Employ generics for stronger check-types during compilation Learn to handle exceptions in your code Since its inception, Java has stormed the programming world. Its features and functionalities provide developers with the tools needed to write robust cross-platform applications. Java Fundamentals introduces you to these tools and functionalities that will enable you to create Java programs. The course begins with an introduction to the language, its philosophy, and evolution over time, until the latest release. You'll learn how the javac/java tools work and what Java packages are - the way a Java program is usually organized. Once you are comfortable with this, you'll be introduced to advanced concepts of the language, such as control flow keywords. You'll explore object-oriented programming and the part it plays in making Java what it is. In the concluding lessons, you'll be familiarized with classes, typecasting, and interfaces, and understand the use of data structures, arrays, strings, handling exceptions, and creating generics. Introduction to Java The Java Ecosystem Our First Java Application Packages Variables, Data Types, and Operators Variables and Data Types Integral Data Types Type casting Control Flow Conditional Statements Looping Constructs Object-Oriented Programming Object-Oriented Principles Classes and Objects Constructors The this Keyword Inheritance Overloading Constructor Overloading Polymorphism and Overriding Annotations References OOP in Depth Interfaces Typecasting The Object Class Autoboxing and Unboxing Abstract Classes and Methods Data Structures, Arrays, and Strings Data Structures and Algorithms Strings The Java Collections Framework and Generics Reading Data from Files The Java Collections Framework Generics Collection Advanced Data Structures in Java Implementing a Custom Linked List Implementing Binary Search Tree Enumerations Set and Uniqueness in Set Exception Handling Motivation behind Exceptions Exception Sources Exception Mechanics Best Practices

Java Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

ISO 45001 Lead Implementer

By Nexus Human

Duration 4.125 Days 24.75 CPD hours This course is intended for The job roles best suited to the material in this course are: Individuals responsible for maintaining and improving the workplace safety, Occupational health and safety officers, consultants, and advisors, Professionals wishing to acquaint themselves with PECB's IMS2 Methodology for implementing an OH&S MS, Individuals responsible for maintaining the conformity of OH&S MS to ISO 45001 requirements, Members of OH&S teams, Individuals aspiring to pursue a career as OH&S MS implementers, consultants, or officers Overview Explain the fundamental concepts and principles of an occupational health and safety management system (OH&S MS) based on ISO 45001 Interpret the ISO 45001 requirements for an OH&S MS from the perspective of an implementer Initiate and plan the implementation of an OH&S MS based on ISO 45001, by utilizing PECB's IMS2 Methodology and other best practices Support an organization in operating, maintaining, and continually improving an OH&S MS based on ISO 45001 Prepare an organization to undergo a third-party certification audit This course is designed to equip you with the competence to establish, implement, manage, and maintain an occupational health and safety management system (OH&S MS) in accordance with ISO 45001:2018 requirements and guidance. This training course aims to provide an in-depth understanding of ISO 45001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of an OH&S MS. The ultimate ambition of this training course is to enable you to create the conditions for a safer workplace. Introduction to ISO 45001 and initiation of an OH&S MS implementation Training course objectives and structure Standards and regulatory frameworks Fundamental concepts and principles of OH&S Initiation of the OH&S MS implementation The organization and its context Implementation plan of an OH&S MS Leadership and worker participation OH&S MS scope OH&S policy and objectives Hazard identification and assessment of risks and opportunities Implementation of an OH&S MS Resource management Awareness and communication Documented information management Operations management Emergency preparedness and response OH&S MS performance evaluation, continual improvement, and preparation for the certification audit Monitoring, measurement, analysis, and evaluation Internal audit Management review Treatment of nonconformities and incidents Continual improvement Preparation for the certification audit Closing of the training course

ISO 45001 Lead Implementer
Delivered OnlineFlexible Dates
Price on Enquiry