Duration 5 Days 30 CPD hours This course is intended for This course is designed for programmatic developers looking to write programmatic customizations to both business logic and UI layers using Apex and Visualforce. You should have a good understanding of core object-oriented programming concepts and experience building declarative solutions on the Salesforce Platform. This course is also a great foundation builder if you're looking to earn your Salesforce Platform Developer I credential. IMPORTANT: Students are expected to follow the steps detailed in the Computer Set-up Guide for this class if you'll be using your own computer when attending a virtual or in-person class. Overview Learn modern tools for developing on the Salesforce Platform using Visual Studio Code, the Salesforce Extension Pack, and the Salesforce CLI. Write business logic customizations using Apex triggers and classes; those customizations will use SOQL and DML. Design programmatic solutions that take advantage of declarative customizations. Describe how your trigger code works within the basics of the Save Order of Execution. Describe some of the fundamental aspects of designing programs on a multi-tenant platform. Write Visualforce markup and code to customize the user interface. Use the built-in testing framework to test Apex and Visualforce. Learn how to customize and design applications programmatically on the Salesforce Platform. In this 5-day class, our platform experts will introduce you to Apex (Salesforce?s programming language) and Visualforce markup, so you can customize your Salesforce applications using code and explore how Apex interacts with declarative customizations on the platform. Learn how to retrieve, manipulate, and store data programmatically in data objects (sObjects), write and test custom logic, write Visualforce pages to customize your user interface, and deploy your solutions to another environment. Get an overview of the declarative automation tools available on the platform and a brief introduction to the Lightning Component framework. Plus, explore the nuances of working on a multi-tenant platform so you can extend the platform to meet business demands. Declarative Automation Create Formula Fields Create Roll-Up Summary Fields Understand Record Types Review Other Automation Tools Build a Data Model on the Salesforce Platform Programming with Apex Describe Key Aspects of Apex That Differentiate It from Other Languages, Such as Java and C# Describe Why Apex Transactions and Governor Limits Must Be Considered When Writing Apex Execute Simple Apex Use the sObject Data Type, the Primitive Data Types, and Basic Control Statements in Apex Using SOQL and SOSL to Retrieve Your Org?s Data Write a Basic Query Using Salesforce?s Query Language, SOQL Process the Result of a Query in Apex Create a Query Dynamically at Run-Time Use SOQL to Query Parent-Child Relationships Describe a Relationship Query Write a Query That Traverses a Child-to-Parent Relationship Write a Query That Traverses a Parent-to-Child Relationship Use SOSL to Search Data Using DML to Manipulate Your Org?s Data List the Differences Between the Ways You Can Invoke DML Operations Write Apex to Invoke DML Operations and Handle DML Errors Deployment What Is Deployment? Deploy Code Using Change Sets Use the Ant Migration Tool Review Managed and Unmanaged Packages Explore Salesforce DX Trigger Essentials Describe What a Trigger Is Used For Describe the Syntax of a Trigger Definition Use Trigger Context Variables Apex Class Essentials Describe How Apex Classes Are Used Define an Apex Class Determine What Data an Apex Class Can Access The Save Order of Execution, Apex Transactions, and Platform Events Describe Key Points in the Order of Execution Describe How Triggers Fit Into and Can Be Impacted by the Order of Execution Describe the Lifecycle of an Apex Transaction Describe the Memory Lifecycle for Static Attributes Use Platform Events for Immediate Error Logging Apex Testing Describe the Apex Testing Framework Create Test Data Write and Run an Apex Test Test Best Practices Strategies for Designing Efficient Apex Solutions Describe Best Practices for Writing Code That Is Easy to Maintain and Extend Write Triggers and Classes That Assume Batches of Data as Input Write Code That Works Efficiently with the Database, Both in Querying and Using DML Trigger Design Strategies List Declarative Mechanisms You Can Use to Implement Complex Business Logic, What Types of Problems They?re Best Used for, and Their Limitations Describe Ways in Which You Can Use Declarative Functionality to Improve Your Programmatic Solutions Working with Visualforce Create a Visualforce Page Reference a Standard Controller Launch a Visualforce Page Using a Custom Button Display Data from a Record in a Visualforce Page Reference Custom Controllers and Controller Extensions Work with List Controllers Visualforce Development Considerations and Testing Describe Common Limit Issues and Security Concerns Describe Strategies for Testing Visualforce Controllers Write Tests for Controller Constructors Write Tests for Action Methods, Getters, Setters, and Properties Lightning Components Create and Surface an Aura Component Create and Surface a Lightning Web Component Additional course details: Nexus Humans Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Why do you need CPD Courses? CPD stands for Continuous Professional Development. As an accountant, it is vital to gain CPD points to comply with Professional Accounting Bodies (such as ACCA, AAT, CIMA, ICAEW etc.) requirement and to retain your membership. CPD Course Overview You can join various practical accounting cpd courses designed to build the bridge between knowledge and practical aspects of accounting and tax. With this cpd courses many modules of tax and accounting are covered in addition to Computerised Accounting & Payroll. After completing the cpd training you will have the chance to get hands on experience which will open the door for highly paid jobs in Accounting, Tax & Payroll sector. CPD Training Method Classroom Based - Osborne Training offers Daytime or Weekend sessions for accounting CPD Training Courses in London. Online Live - Osborne Training offers Evening or Weekend sessions for online CPD Training Courses through Virtual Learning Campus. A course certificate from Osborne Training, confirming CPD Points and Completion. Total Accounting Training with Job Placement Total Taxation Training Corporation Accounting and Tax Return Income Tax Return Advanced Excel Training
Duration 3.5 Days 21 CPD hours This course is intended for This course is aimed at students new to the language who may or may not have experience with other programming languages. Overview Learn how Python works and what it's good for. Understand Python's place in the world of programming languages Learn to work with and manipulate strings in Python. Learn to perform math operations with Python. Learn to work with Python sequences: lists, arrays, dictionaries, and sets. Learn to collect user input and output results. Learn flow control processing in Python. Learn to write to and read from files using Python. Learn to write functions in Python. Learn to handle exceptions in Python. Learn to work with dates and times in Python. In this Python training course by Webucator, Inc, students learn to program in Python. Python Basics Running Python Hello, World! Literals Python Comments Data Types Variables Writing a Python Module print() Function Named Arguments Collecting User Input Getting Help Functions and Modules Defining Functions Variable Scope Global Variables Function Parameters Returning Values Importing Modules Math Arithmetic Operators Modulus and Floor Division Assignment Operators Built-in Math Functions The math Module The random Module Seeding Python Strings Quotation Marks and Special Characters String Indexing Slicing Strings Concatenation and Repetition Common String Methods String Formatting Built-in String Functions Iterables: Sequences, Dictionaries, and Sets Definitions Sequences Unpacking Sequences Dictionaries The len() Function Sets *args and **kwargs Flow Control Conditional Statements The is and is not Operators Python's Ternary Operator Loops in Python The enumerate() Function Generators List Comprehensions File Processing Opening Files The os and os.path Modules Exception Handling Wildcard except Clauses Getting Information on Exceptions The else Clause The finally Clause Using Exceptions for Flow Control Exception Hierarchy Dates and Times Understanding Time The time Module The datetime Module Running Python Scripts from the Command Line The sys Module sys.argv
Duration 5 Days 30 CPD hours This course is intended for This class is designed for experienced BizTalk Server Developers who have at least one year of hands-on experience developing BizTalk Server applications. Overview In this 5-day course, you will learn how to apply best practices and design patterns to build smarter BizTalk Server applications. Furthermore, this course provides extensive coverage of BizTalk Server's extensibility, including such topics as: custom functoids, custom pipeline components, and invoking external .NET methods. This course is designed specifically for experienced BizTalk Server developers and focuses on best practices & pattern-based design while pulling back the curtain on some of BizTalk Server's eccentricities. Review of BizTalk Server Fundamentals The BizTalk Server Architecture Inner Workings of the Messaging Engine Messaging Engine Deep Dive Two-way Messaging Without Orchestrations Designing and Testing Schemas Schema Design Enabling Unit Testing for BizTalk Projects Data Translation and Transformation Custom Data Transformation Creating Custom Pipeline Components Working with Message Interchanges Debatching Message Interchanges Advanced Concepts of WCF Adapters Connecting to External Systems Using WCF LOB Adapters in BizTalk Server Publishing and Consuming WCF and RESTful Services Overview of Service Integration Using WCF Implementing WCF Services Preprocessing Messages with IIS Modules Consuming Services Advanced Orchestration Communication Patterns Orchestration Engine Deep Dive Splitting and Aggregating Messages using Orchestrations Orchestration Communication Bridging the Synchronous/Asynchronous Gap Across Multiple Channels Correlating Messages in Orchestration Instances Building Convoy Orchestrations Handling Orchestration Faults and Exceptions Exception Handling in Orchestrations Implementing Transactions and Compensation Creating Transactional Processes Designing Custom Tracking Models for BizTalk Applications Introduction to Business Activity Monitoring Enabling Business Activity Monitoring Extending BAM Beyond BizTalk Building Declarative Logic Using the Business Rules Engine Concepts of Declarative Logic Fundamentals of BizTalk BRE Integrating Policies with BizTalk Advanced Concepts of the Business Rules Engine Advanced Business Rule Concepts Working with Advanced Facts Integrating Across Business Boundaries Using Parties, Roles, and EDI Port Binding Option Review Role-Based Integration What is EDI? Enabling EDI-Based Messaging
Learn how to support employees living with chronic health conditions and get answers to your workplace wellbeing questions from recognised experts in the field.
Duration 2 Days 12 CPD hours This course is intended for Managers of software development Software team leads Specialists in software development processes and quality assurance Overview An understanding of how to maintain a regular cadence when delivering working software during each iterationGaining a practical appreciation on how to follow the team approach; start as a team, finish as a teamKnowledge and understanding of Agile principles with context on why they are so important for each teamEmbracing planning from Vision down to Daily activities, recognizing the value of continuous planning over following a planBuilding a backlog of prioritized stories that provide emergent requirements for analysis that also fosters customer engagement and understandingAn engaging technique for more effective estimating (planning poker) and become more accurate by being less preciseKnowledge of pulling together Agile release plans that connect you back to business expectations ? including hard date commitments and fixed price models This boot camp-style workshop prepares you to manage, lead, or participate on Scrum projects by learning how to apply the practices of Scrum on an actual project. This boot camp-style workshop prepares you to manage, lead, or participate on Scrum projects by learning how to apply the practices of Scrum on an actual project. Additional course details: Nexus Humans BA16 - Managing Software Projects Using Scrum training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA16 - Managing Software Projects Using Scrum course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Administrators, implementers and managers who are responsible for implementing, configuring and administering Service Manager 9.30. Overview At the end of the course, you will be able to:? Describe Service Manager environment andarchitecture? Install the various components of Service Manager? Learn the various implementation options (i.e.default ports, load balancing, components)? Perform tasks and set-up activities that are generallyperformed prior to moving the system to Production.? Perform daily administrative tasks such asperforming backups and monitoring log files,background processor activity, email activity, andschedule record activity.? Perform weekly administrative tasks such asarchiving and purging data? Perform monthly administrative tasks such ascleaning up the audit record, monitoring serverperformance statistics? Perform quarterly and annual administrative taskssuch as regenerating the work and holiday schedulerecords.? Additional administrative tasks, such as importing orexporting records.RECOMMENDED This class is targeted at system administrators responsible for the day to day management of the Service Manager application. The course focuses on the daily, weekly, monthly, quarterly, and annual tasks required to keep the system running efficiently. This class is targeted at system administrators responsible for the day to day management of the Service Manager application. The course focuses on the daily, weekly, monthly, quarterly, and annual tasks required to keep the system running efficiently. Additional course details: Nexus Humans SM320 - Service Manager 9.x Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SM320 - Service Manager 9.x Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours PostgreSQL is a powerful, open-source, object-relational database system known for being reliable, secure, and flexible. For administrators, learning PostgreSQL equips you with the skills needed to handle complex and high-performance databases in our data-driven world. Big-name companies like Apple, Cisco, Fujitsu, and IBM trust PostgreSQL for their critical applications, which highlights its significance and broad industry adoption. By getting the hang of PostgreSQL, administrators can boost their career opportunities and play a key role in the success of data-focused businesses. PostgreSQL Server Administration is a three-day hands-on course geared for administrators seeking to sharpen their skills and elevate their database management capabilities. Throughout the course you?ll explore a wide range of essential topics, from server architecture and user accounts to monitoring and routine maintenance. Throughout the course, you'll gain invaluable insights and practical techniques that will empower you to optimize, secure, and manage your PostgreSQL environment effectively. As you navigate through server configuration, database reporting, backup and restore procedures and more, you'll have the opportunity to apply your newfound knowledge to real-world scenarios. By the end of the course, you'll be equipped with the confidence and skillset required to tackle a wide array of administrative challenges and to effectively manage your PostgreSQL databases. Additional course details: Nexus Humans PostgreSQL Server Administration (TTDB7020) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL Server Administration (TTDB7020) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is recommended for:OperatorsDevelopersAdministrators Overview After completing this course, you should be able to:Run and manage automated workflows using HP Operations Orchestration (OO) 10.xPerform a wide range of system administration, monitoring, and management tasks using OO CentralAuthor, maintain, document, and package new automated workflows using the OO Studio applicationTest and debug the flows locally and remotelyWork with Looping and Iteration operationsApply parallel processing methods to your flows in HP Operations Orchestration (OO)Use responses, rules, and transitions to control flow runUse XML operations and XML filters for processing XML content in OOWork with JavaScript Object Notation (JSON) operationsUse the file system content in the OO libraryAdd email notifications to your flowsExecute scriptlet methods in OO to manage flow data and flow executionInstall, configure, and update OO This four-day course introduces students to the essential concepts and usage, as well as to more advanced features of the HP Operations Orchestration (OO) software. OO is part of HP Cloud Automation solutions. This four-day course introduces students to the essential concepts and usage, as well as to more advanced features of the HP Operations Orchestration (OO) software. OO is part of HP Cloud Automation solutions. Additional course details: Nexus Humans OO220 - Operations Orchestration 10.x Flow Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the OO220 - Operations Orchestration 10.x Flow Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.