Duration 5 Days 30 CPD hours This course is intended for This course is designed for: IT Professionals in the BC/DR or system administration domain, business continuity and disaster recovery consultants, individuals wanting to establish themselves in the field of IT business, continuity and disaster recovery, IT risk managers and consultants, and CISOs and IT directors. Before taking this course, some experience in the IT BC/DR domain is recommended. More info can be found here: https://www.eccouncil.org/wp-content/uploads/2017/05/edrpv3-brochure.pdf Overview EC-Council Disaster Recovery Professional (EDRP) is a comprehensive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. EDRP teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization's critical data in the aftermath of a disaster. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization?s critical data in the aftermath of a disaster. The program is designed to provide much needed step-by-step guidance to attendees and then tests their knowledge through case studies. EDRPv3 addresses gaps in other BC/DR programs by providing helpful templates that are applied to BC/DR efforts in an enterprise. Course Outline Introduction to Disaster Recovery and Business Continuity Business Continuity Management (BCM) Risk Assessment Business Impact Analysis (BIA) Business Continuity Planning (BCP) Disaster Recovery Planning Process Data Backup Strategies Data Recovery Strategies Virtualization-Based Disaster Recovery System Recovery Centralized and Decentralized System Recovery BCP Testing, Maintenance, and Training Additional course details: Nexus Humans EC-Council Disaster Recovery Professional (EDRP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Disaster Recovery Professional (EDRP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The audience for this course is an AWS Sysops Administrator Associate or equivalent. This person has one to two years of experience in AWS deployment, management, and operations. Students taking this course are interested in learning how Azure is different from AWS, and how Azure is administered. Students may also be interested in taking the AZ-103 Microsoft Azure Administrator certification exam, or the AZ-900 Azure Fundamentals exam. This two-day course is designed for AWS Sysops administrators interested in learning how Azure is administered. In this workshop which combines lecture with hands-on practical exercises and discussion/review, you will be introduced to Azure Administration, Azure Networking, Azure Compute, Azure Storage, and Azure Governance. During the workshop, you will apply this knowledge - building end-to-end architecture that demonstrates the main features discussed. Azure Administration In this module, you?ll learn about the tools and principle concepts needed to administer Azure. Topics include: Resource Manager, Resource Groups, Azure Portal, Azure CLI, Azure Templates, Cloud Shell, Azure Marketplace, and Azure PowerShell. Azure Networking In this module, you?ll learn about Azure networking features. Topics include: Azure Regions, Virtual Networks and Subnets, IP Addressing, Network Security Groups, Virtual Network Peering, VNet-to-VNet Connections, ExpressRoute, Load Balancers, and Network Watcher. Azure Compute In this module, you?ll learn about configuring and monitoring Azure virtual machines. Topics include: Azure Virtual Machines, Creating Virtual Machines, Virtual Machine Sizes, Virtual Machine Disks, Availability Zones, Availability Sets, Windows VM Connections, Linux VM Connections, Azure Monitor, and Azure Alerts. Azure Storage In this module, you?ll learn about Azure storage features and implementation. Topics include: Storage Accounts, Blob Storage, Blob Performance Tiers, File Shares, File Sync, Data Box, Content Delivery Network, Shared Access Signatures, and Service Endpoints. Azure Identity In this module, you?ll learn about Azure identity solutions. Topics include: Azure Domains, Role-based Access Control, Azure Active Directory, Multi-Factor Authentication, Azure AD Identity Protection, and Azure Policy. Additional course details: Nexus Humans AZ-010T00 Azure Administration for AWS SysOps training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-010T00 Azure Administration for AWS SysOps course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This class is targeted towards the professional developer new to HTML, self-taught HTML developers, graphics designers and those new to HTML development. Overview After completing this course, you will be able to: Create HTML5 compliant web pages. Test and validate HTML and CSS code. Create CSS for style pages. Work with experimental vendor prefixes. Work with fonts and CSS font effects. Work with color and color tools. Layout pages and content using DIVs, iFrames and Tables. Add and format images and CSS sprites. Create HTML5 forms. Embed and manage video and audio content. This course is an in-depth hands-on study of HTML5, CSS3 and modern web and mobile development. The course includes detailed hands-on labs and Q&A labs. The labs include multiple projects, including one beginning to end web site.This material updates and replaces course Microsoft course 20480 which was previously published under the title Programming in HTML5 with JavaScript and CSS3. Module 1: A Brief History of HTML and the Web Welcome! History Details, Details, Details? The Life of a Web Page HTTP Status Codes Definitions Most Important Things to Know as a Web Developer Module 2: Core HTML Elements HTML and CSS Editors Text, Spaces and Tabs Working with Tags Attributes Comments Non-Standard Tags Every Page Includes? File Extensions Core Page Elements Nesting Testing HTML HTML and Text Module 3: Cascading Style Sheets Before CSS With CSS Cascading Style Sheets (CSS) Adding CSS to a Page Order of CSS Processing Experimental Vendor Prefixes CSS Units The CSS Box Mode Module 4: Fonts and Text Fonts CSS for Text CSS Text Ticks! Working with Lists Upgrading and to Windows 7 Module 5: Colors and Backgrounds Specifying Colors Applying Colors Gradients Module 6: Anchors and Hyperlinks HTML and CSS Hyperlinks with Images and Other Objects Buttons Module 7: Page Layout Page Layout Options Tables for Data DIVs Float SPAN HTML 5 DIV-like Tags IFRAMES Module 8: Images Favicon Preparing Images Image Files The IMG Tag Background Images Image Best Practices CSS Sprites Module 9: HTML Forms A Basic Form POST vs. GET name vs. id Basic Form Elements Basic Form Attribute Select Uploading Files HTML 5 Form Enhancements DataList Module 10: Multimedia Video and Audio HTML 5 Video CSS JavaScript Audio Hosting Videos in the Cloud Working with Animated GIFs
This ilm recognised programme builds on the coaching fundamentals to focus on enhancing the coach’s self-awareness and coaching techniques, refining both practice and skill to develop a coaching style of leadership.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Linux Professional Institute Certification (LPIC-2) 202 training is suitable for individuals with roles of: System administrator Network administrator Technician DevOps Overview Upon successful completion of this course, students will be able to: configure BIND to function as an authoritative and as a recursive, caching-only DNS server install and configure a web server install and configure a proxy server, including access policies, authentication and resource usage set up a Samba server for various clients configure a DHCP server configure PAM to support authentication using various available methods perform queries and updates to an LDAP server configure a basic OpenLDAP server including knowledge of LDIF format and essential access controls manage an e-mail server, including the configuration of e-mail aliases, e-mail quotas and virtual e-mail domains configure an FTP server for anonymous downloads and uploads receive security alerts from various sources, install, configure and run intrusion detection systems and apply security patches and bugfixes configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This course prepares students to take the 202 exam of the LPI level 2 certification. To gain LPIC-2 certification, an individual should have an active LPIC-1 certification. Domain Name Server Basic DNS server configuration Create and maintain DNS zones Securing a DNS server HTTP Services Basic Apache configuration Apache configuration for HTTPS Implementing Squid as a caching proxy Implementing Nginx as a web server and a reverse proxy File Sharing Samba Server Configuration NFS Server Configuration Network Client Management DHCP configuration PAM authentication LDAP client usage Configuring an OpenLDAP server E-Mail Services Using e-mail servers Managing E-Mail Delivery Managing Mailbox Access System Security Configuring a router Managing FTP servers Secure shell (SSH) Security tasks OpenVPN Additional course details: Nexus Humans Linux Professional Institute Certification (LPIC-2) 202 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Linux Professional Institute Certification (LPIC-2) 202 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is for network managers, resellers, systems administrators, client security administrators, systems professionals, and consultants who are charged with the configuration and day-to-day management of Symantec Endpoint Protection in a variety of network environments. Overview By the completion of this course, you will be able to: Manage Virus and Spyware Protection policies. Manage SONAR scans. Manage Firewall and Intrusion Prevention policies. Manage Application and Device Control policies. Manage System Lockdown. Manage Host Integrity. Manage Virtualized clients. This course is designed for the network, IT security, and systems administration professional tasked with implementing and monitoring virus and spyware protection, zero-day protection, and network threat protection solutions. Introduction Course overview The classroom lab environment Introducing Antivirus, Insight, and SONAR Virus and spyware protection needs and solutions Reputation and Insight Administrator-defined scans Auto-Protect Download Insight SONAR Included Virus and Spyware Protection policies Managing Virus and Spyware Protection Policies for Windows Configuring administrator-defined scans Configuring protection technology settings and scans Configuring e-mail scans Configuring advanced options Managing scanned clients Managing Virus and Spyware Protection Policies for Mac and Linux Configuring Virus and Spyware settings for Mac Configuring Virus and Spyware settings for Linux Configuring advanced options Managing Exception Policies Exceptions and exclusions Configuring the Exceptions policy Introducing Network Threat Protection The OSI model and network threats Network threat tools and attack methods Attack and mitigation Managing Firewall Policies Firewall policy overview Defining rule components Modifying firewall rules Configuring built-in rules Configuring protection and stealth settings Configuring Windows integration settings Managing Intrusion Prevention Policies Configuring network and browser intrusion prevention Managing custom signatures Compliance Management Application and Device Control System Lockdown Host Integrity Virtualization Introducing virtualization features Virtual image exception Network and vShield Shared Insight Cache Virtual client tagging Offline image scanner Windows Azure support Additional course details: Nexus Humans Symantec Endpoint Protection 12.X - Manage And Administer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Endpoint Protection 12.X - Manage And Administer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours Overview At the completion of this course, students already familiar with the RHCT/RHCSA administration skills will have exposure to all competencies tested by the RHCSA and RHCE exams. This course is designed for experienced Linux administrators who require networking and security administration skills. Getting Started with the Classroom Environment Given a virtualized environment, begin to administrate multiple systems using prerequisite skills Enhance User Security Configure system to use Kerberos to verify credentials and grant privileges via sudo Bash Scripting and Tools Automate system administration tasks utilizing Bash scripts and text-based tools File Security with GnuPG Secure files with GnuPG. Software Management Use yum plugins to manage packages and understand the design of packages to build a simple package Network Monitoring Profile running services then capture and analyze network traffic Route Network Traffic Configure system to route traffic and customize network parameters with sysctl Secure Network Traffic Secure network traffic through SSH port forwarding and iptables filtering/network address translation (NAT) NTP Server Configuration Configure an NTP server Filesystems and Logs Manage local file system integrity, monitor system over time, and system logging Centralized and Secure Storage Access centralized storage (iSCSI) and encrypt filesystems SSL-encapsulated Web Services Understand SSL certificates and deploy an SSL encapsulated web service Web Server Additional Configuration Configure web server with virtual hosts, dynamic content, and authenticated directories Basic SMTP Configuration Configure an SMTP server for basic operation (null client, receiving mail, smarthost relay) Caching-Only DNS Server Understand DNS resource records and configure a caching-only name server File Sharing with NFS Configure file sharing between hosts with NFS File Sharing with CIFS Configure file and print sharing between hosts with CIFS File Sharing with FTP Configure file sharing with anonymous FTP Troubleshooting Boot Process Understand the boot process and recover unbootable systems with rescue mode Additional course details: Nexus Humans Enterprise Linux System Admin 3 with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin 3 with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This certification is appropriate for anyone who is interested in working as a Scrum Master or for someone who is already a Scrum master in his organization. Scrum Master is an important role in any Scrum team and need not be a technology expert to be effective. Moreover, although Scrum is popular in the IT industry, it can be used effectively across different industries. The SBOK Guide, on which the SMC course is based on, can be used as an effective guide for implementation. Overview The participants will be prepared to take SMC⢠certification exam and pass. Also they will be able to apply the concepts in their day to day job. This course guides & teaches Scrum practices to everyone involved in the project; clears impediments for the team; and, ensures that Scrum processes are being followed. Successful candidates will be awarded the Scrum Master Certified (SMC?) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. Introduction Course Objectives Course Methodology Certification Schema Exam Format Overview of Agile Agile Manifesto Agile Principles What has Changed Agile Methods Overview of Scrum Definition and brief history of Scrum Why Scrum Scrum vs. Traditional Project Management Benefits of Scrum Overview of A Guide to the Scrum Body of Knowledge (SBOK? Guide) Framework of the SBOK? Guide Who uses the SBOK? Guide How to use the SBOK? Guide Scrum Flow Principles Empirical Process Control Self-organization Collaboration Value-based Prioritization Time-boxing Iterative Development Scrum Aspects Organization Business Justification Quality Change Risk Scrum Phases and Processes Initiate Plan and Estimate Implement Review and Retrospect Release Scaling Scrum Scaling Scrum for Large Projects Scaling Scrum for the Enterprise Transition to Scrum Mapping Traditional Roles To Scrum Maintaining Stakeholder Involvement Importance Of Executive Support Additional course details: Nexus Humans Scrum Master Certified (SMC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Scrum Master Certified (SMC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek an understanding of the parallel framework architecture. In this course, students will develop a deeper understanding of the DataStage architecture, including a deeper understanding of the DataStage development and runtime environments. Introduction to the Parallel Framework Architecture Describe the parallel processing architecture Describe pipeline and partition parallelism Describe the role of the configuration file Design a job that creates robust test data Compiling & Executing Jobs Describe the main parts of the configuration file Describe the compile process and the OSH that the compilation process generates Describe the role and the main parts of the Score Describe the job execution process Partitioning & Collecting Data Understand how partitioning works in the Framework Viewing partitioners in the Score Selecting partitioning algorithms Generate sequences of numbers (surrogate keys) in a partitioned, parallel environment Sorting Data Sort data in the parallel framework Find inserted sorts in the Score Reduce the number of inserted sorts Optimize Fork-Join jobs Use Sort stages to determine the last row in a group Describe sort key and partitioner key logic in the parallel framework Buffering in Parallel Jobs Describe how buffering works in parallel jobs Tune buffers in parallel jobs Avoid buffer contentions Parallel Framework Data Types Describe virtual data sets Describe schemas Describe data type mappings and conversions Describe how external data is processed Handle nulls Work with complex data Reusable Components Create a schema file Read a sequential file using a schema Describe Runtime Column Propagation (RCP) Enable and disable RCP Create and use shared containers Balanced Optimization Enable Balanced Optimization functionality in Designer Describe the Balanced Optimization workflow List the different Balanced Optimization options. Push stage processing to a data source Push stage processing to a data target Optimize a job accessing Hadoop HDFS file system Understand the limitations of Balanced Optimizations Additional course details: Nexus Humans KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.