Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Business Relationship Management Professional (BRMP)®: Virtual In-House Training Business Relationship Management (BRM) embodies a set of competencies (knowledge, skills, and behaviors) to foster an effective business value-producing relationship between a service provider and its business partners. The BRM Discipline rests on solid research-based foundations verified and enhanced over a decade of successful implementations in leading organizations across the world. Proven to be equally effective for shared services including Human Resources, Finance, Legal, external service providers and others, BRM practices have enjoyed widespread adaptation in IT. The Business Relationship Management Professional (BRMP) training and certification program provides a foundational understanding of business relationship management (BRM) for individuals at every experience level, with the training and certification designed to provide a solid baseline level of knowledge. In other words, this course provides the 'why' and the 'what' - 'why' business relationship management is important to your organization and 'what' a BRM capability does to add value to your organization. This interactive course, with discussions, partnering activities, and periodic knowledge checks, will provide you with the opportunity to apply learning to your unique organizational situations, creating solutions that you can use immediately upon returning to your workplace. This practical knowledge will allow you to demonstrate immediate value in your role, as well as prepare you for the BRMP Certification exam.
Game design training face to face training customised and bespoke.
Earn up to 85k as a 'Cyber Security Analyst' or Your 100% Money Back Are you concerned about the rising threat of cybercrime? In the UK alone, cyberattacks cost businesses an estimated £3.1 billion annually, and the demand for skilled cybersecurity professionals is booming. With an average salary of £45,000, a career in cybersecurity offers promising opportunities for those seeking stability and growth. Are you looking to join the high-demand field of cyber security and earn a handsome salary? Our Network and Cyber Security Traineeship Program is here to guide you all the way until you get the job you want. This Network and Cyber Security Traineeship Program is your all-in-one solution to learn cyber security from scratch and also secure a job in this exciting industry. With our unique blend of comprehensive courses and career support, your dream job is within reach. We understand the challenges of transitioning into a new field, which is why our program is tailored to guide you every step of the way - from mastering core skills to landing your first job as a Cyber Security Analyst. By choosing our Cyber Security Job Guarantee Programme, you're not just gaining skills; you're gaining a lifelong career partner. Our mission is simple - to be your trusted partner every step of the way, from training to employment. In addition to teaching you the technical skills you need, we will also provide you with career mentoring and support. We will help you build your resume, prepare for interviews, and land your dream job. We also have partnerships with many companies that are hiring Programmers, so we can help you get your foot in the door. If you are not happy with our service, we also offer a 100% money-back guarantee. So what are you waiting for? Enrol in our Cyber Security Job Guarantee Programme today and start your journey to become successful in Cyber Security field! Why Choose Us? So, what sets us apart from other programs? Let's dive into the exceptional benefits you'll experience when you join our Certified Cyber Security Job Guarantee Programme: Personalised Guidance: We believe in the power of individual attention. Our experienced mentors will provide one-on-one counselling sessions tailored to your specific needs. Whether you're a beginner or have some Cyber Security experience, we will guide you towards honing your skills and developing a strong foundation in Cyber Security. One-On-One Consultation: Gain invaluable insights and guidance from seasoned professionals who have thrived in the Cyber Security field. Our consultation sessions provide you with insider tips, tricks, and advice, empowering you to navigate the industry with confidence and expertise. Extensive Job Opportunities: We have established partnerships with numerous companies actively seeking Certified Cyber Security Job Guarantee Programme. Through our network, we'll connect you with exclusive job openings that are not easily accessible elsewhere. Interview Preparation: No more stress over unexpected interview questions. We provide you with access to a comprehensive database of potential interview questions curated over years of industry experience. Walk into your interviews confident, well-prepared, and ready to impress. Courses we will provide once you enrol in the program: Course 01: Cyber Security Programming Course 02: Cyber Security Advanced Training Course 03: Cyber Security Incident Handling and Incident Response Course 04: IT Support Technician Course 05: General Data Protection Regulation (GDPR) & Cyber Security Management Course 06: CompTIA Security+ (SY0-601) Course 07: CompTIA A+ (220-1001) Course 08: CompTIA A+ (220-1002) Course 09: Cloud Computing / CompTIA Cloud+ (CV0-002) Course 10: CompTIA CySA+ Cybersecurity Analyst (CS0-002) Course 11: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 12: CompTIA Network+ Certification (N10-007) Course 13: Diploma in CompTIA Network+ Training at QLS Level 7 Course 14: CompTIA PenTest+ (Ethical Hacking) Course 15: Cisco ASA Firewall Training Course 16: Cryptography Course 17: IT Administration and Networking Course 18: IGCSE ICT: Network Essentials Course 19: Cyber Security Law Course 20: Cyber Security Awareness Training How Can We Offer Job Guarantees? HF Online provides consultancy, professional and educational services to many of the companies in the UK. During our intense exclusive training program, you will not just gain and complete the industry valuable certification but will gain industry experience as well, which is imperative to get your 1st job in the sector. The Network and Cyber Security Traineeship Program Programme is completed in 9 easy steps: Step 1: Enrol in the Programme Begin your exciting journey with us by enrolling in the Cyber Security Job Guarantee Programme. Complete your registration and make a secure online payment. Remember, we offer a 14-day money-back guarantee if you're not completely satisfied. After you enrol in the Program, you will get lifetime access to 20 Premium Courses related to Cyber Security Job Guarantee Programme. These courses will teach you the knowledge and skills required to become successful in Cyber Security field. Our customer service team will help you and keep in contact with you every step of the way. So you won't have to worry about a thing! Step 2: Initial One-On-One Counselling Session Once enrolled, you will be paired with a dedicated career mentor. Schedule your first one-on-one session to discuss your career aspirations, skills, experience, and any areas for potential growth. This conversation will shape your learning and development path. Step 3 - Certification upon Course Completion After learning from the courses, you must obtain certificates for each course. There will be exams for every course, and you have to pass them to get your certificate. To pass successfully, you must get 90% marks. Once you pass the exams, you will receive hardcopy certificates. These certificates will prove that you're an expert in the subject. Step 4: CV Revamping Our team of professionals will build you a compelling CV and LinkedIn profile. We'll ensure it presents your skills and qualifications effectively and is tailored to the needs and expectations of the programming/development industry. With these powerful tools in hand, you'll be fully prepared to tackle job interviews confidently. Step 5: Building Network and Submitting CV We understand the power of casting a wide net. We'll strategically submit your CV to various platforms and networks, expanding your reach and connecting you with valuable opportunities that align with your career goals. We will also make connections with many high-profile individuals and companies through your LinkedIn profile. Step 6: Interview Preparation With your CV ready, we'll move on to interview preparation. Gain exclusive access to our database of potential interview questions. Through simulated interviews with your mentor, you'll practice your responses and receive valuable feedback to further refine your skills. Step 7: Securing Job Interviews Leveraging our partnerships with leading companies, we'll secure job interviews for you. We'll ensure you get the opportunity to showcase your skills to potential employers and get the dream job you want. Step 8: Post-Interview Support Post-interview, we'll provide a debriefing session to reflect on your performance and identify areas of improvement for future interviews if necessary. Remember, our commitment extends until you land your dream job. Step 9: Celebrate Your New Job! Once you've secured your dream job in Cyber Security, it's time to celebrate! However, our support doesn't end there. We'll provide you with ongoing career advice to ensure you continue to thrive in your new role. We're excited to accompany you on this journey to success. Enrol today, and let's get started! Your path to a successful career in Cyber Security field begins with us. CPD 1000 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Cyber Security Job Guarantee Programme Course is suitable for: Beginners with no prior programming experience who are looking to enter the world of coding. Intermediate programmers who wish to expand their skills and explore Cyber Security's extensive usage. IT professionals seeking to diversify their skill sets and stay relevant in today's tech-driven market. Data analysts and scientists who want to leverage Cyber Security's powerful libraries for their data processing needs. Students and recent graduates looking to enhance their employability in the thriving tech industry. Entrepreneurs who wish to understand and utilise Cyber Security to automate tasks and analyse data for their businesses. Anyone with a keen interest in Cyber Security and a desire to delve into its applications in diverse fields like web development, data science, machine learning, and more. Requirements No experience required. Just enrol & start learning. Career path Cyber Security Analyst: £35,000 - £85,000 annually Incident Response Specialist: £40,000 - £90,000 annually IT Support Technician: £25,000 - £55,000 annually GDPR Compliance Officer: £30,000 - £70,000 annually Cloud Security Architect: £50,000 - £120,000 annually Ethical Hacker/Penetration Tester: £35,000 - £95,000 annually Network Security Engineer: £40,000 - £100,000 annually Certificates CPD Accredited e-Certificate Digital certificate - Included CPD Accredited Framed (Hardcopy) Certificate Hard copy certificate - Included Enrolment Letter Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included Student ID Card Digital certificate - Included
Landscape training face to face training customised and bespoke.
Asterisk training course description This 3 day hands on Asterisk training course covers all the ground for you to get an Asterisk PBX installed and configured. After installation the course progresses from a simple first configuration onto VoIP and PSTN integration along with the provision of PBX features such as ACD and IVR. Practical sessions follow each major section to reinforce the theory. What will you learn Install and configure Asterisk. Connect Asterisk to the Internet and PSTN. Integrate VoIP and the PSTN. Configure Asterisk for PBX features such as voicemail, ACD and IVR. Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: None although hands on experience of UNIX systems would be beneficial, as would knowledge of VoIP. Duration 3 days Asterisk training course contents What is Asterisk? PBXs, what Asterisk does, Asterisk features, Asterisk VoIP support, Asterisk and the Internet, Asterisk and the PSTN, hosted VoIP systems. Asterisk installation Linux installation, Asterisk package compilation and installation. Timing sources. Hands on Installing Asterisk Managing Asterisk Starting/stopping Asterisk, command arguments, Asterisk commands, log files, logger.conf, remote management. Hands on Controlling Asterisk. First Asterisk configuration The role of SIP, IP phones, DHCP, IP addressing, sip.conf, extensions.conf. Hands on Simple SIP configuration Asterisk architecture Server hardware, interfaces, channels, Zaptel, Digium, Asterisk filesystem, connections. The configuration files, syntax, asterisk.conf. Hands on Adding hardware for Asterisk, exploring the configuration files. DAHDI configuration Digium hardware, DAHDI architecture, DAHDI installation, DAHDI configuration, system.conf, FXS, FXO, E1, chan_dahdi.conf, dahdi_cfg, DAHDI tools. Hands on Connecting Asterisk to the PSTN. Dial plans extensions.conf detail, contexts, priorities. Hands on Configuring dial plans. SIP configuration sip.conf in detail, defining SIP channels, incoming SIP channels, outgoing SIP channels, SIP variables, Asterisk as a SIP client and SIP server. Hands on SIP configuration. IAX configuration What is IAX, IAX server, IAX client, IAX channels, iax.conf, IAX syntax in extensions.conf, IAX trunking. Hands on Linking Asterisk systems. Implementing PBX functions Voicemail, voicemail trees, voicemail passwords, Music on hold, meetme conferencing, call parking. ACD, IVR, fax. Hands on Configuring PBX features.
About this Training Course Within the energy industry, it is a requirement, both contractual and in some areas legislative, to ensure effective internal systems are in place which support employee development and provide evidence of their competence. A Competence Management and Assurance process - if correctly developed and applied - provides employees and organisations with the tools to demonstrate competence and contributes to career development of the individual. The 3 full-day course focuses on Competence Management Systems (CMS) which are typically in use within the Energy Industry, their structure and process development requirements. In addition, the course details the assessment process, the role of the competency assessors within the organisation and the relationship between competence management and training provision. For impactful learning, the course instructor uses a variety of instructional methodologies such as lectures, discussions, individual reflection, games, mystery puzzles, video, case studies, team syndication, group presentations, sharing and feedback. Training Objectives This course will provide attendees with an understanding of: The role of competencies in the Energy industry The benefits of Competency Management System to the organisation The components of a Competency of Competency Management System The know how to implement the Competency Management System The roles and responsibilities within a Competency Management System The know how to develop Competency Models The relationship between Competency Management and Capability Development The know how to conduct Organisational Analysis The know how to conduct Job Analysis and Task Analysis The know how to develop Competency Standards and Development Guides using the 70:20:10 principle The competency assessment process, tools and methodologies The know how to package and communicate the Competency Assessment Reports to Management Competency Management Case Studies in the Energy Industry Target Audience This course will benefit professionals from Human Resource and Capability Development as well as Line Managers. Course Level Basic or Foundation Trainer Your expert course leader is an independent consultant trainer with more than 30 years of experience in People & Organizational Development. She has retired from her full-time job and is currently serving as an Associate Consultant / Trainer with several Learning & Development organizations operating in Malaysia and Singapore. A chemist by training, her interest in People & Organizational Development was so intense that she decided to switch profession during her earlier years of employment, and she has never looked back since. She has gathered extensive hands-on experience, leading key projects and delivering learning programs in her field of expertise with numerous leading organizations in South East Asia, the Middle East and Europe. A project that she is particularly proud in completing was the transformation of PETRONAS Management Training Institute into a regional Leadership Centre. While leading this project, she was given the opportunity to be seconded to General Electric (GE), a Fortune 500 multinational known for its cutting-edge leadership development innovation. She was instrumental in the development of the existing leadership model for PETRONAS. In addition, she was also extensively involved in the development and implementation of Technical Competency Development process that is currently being used by more than 20 disciplines in the organization. Another massive project that she was heavily involved in was the creation of the quality culture for PETRONAS. The project saw the establishment of PETRONAS' own quality principles where she played a key role in propagating the desired mindset towards the creation of a high performing culture. Her involvement in this project took her to many PETRONAS Operating Companies which spanned into several countries across the globe including Malaysia, Indonesia, Vietnam, Sudan, South Africa and Switzerland, creating awareness through learning programs and consultancy services. The PETRONAS Quality Principles have since evolved into shared values that are now known as the PETRONAS Culture Beliefs. In keeping her expertise current after retiring from full-time employment since 2017, she has continued to deliver learning programs, providing coaching and consultancy services to selected Oil & Gas companies in Malaysia, Indonesia, Singapore, India, Oman and Thailand. Among her most recent work are virtual learning deliveries and consultancies during the COVID-19 pandemic to some government linked companies / agencies in Malaysia and PTT Exploration & Production Company of Thailand. Outside her professional circle, she is an avid cyclist, a jungle tracker and a mount climber. She is also an accredited trainer from the Human Resource Development Corporation (HRD CORP). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
PMI's Authorized PMP Prep Course: Virtual In-House Training If you are taking this course, you probably have some professional exposure to the duties of a project manager, or you may be considering embarking on a career in professional project management. Your ability as a project manager to demonstrate best practices in project management-both on the job and through professional certification-is becoming the standard to compete in today's fast-paced and highly technical workplace. In this course, you will apply the generally recognized practices of project management acknowledged by the Project Management Institute (PMI)® to successfully manage projects. Project managers who have proven skills and experience can find exciting, high-visibility opportunities in a wide range of fields. This course is specifically designed to provide you with the proven, practical body of project management knowledge and skills that you need to demonstrate project management mastery on the job. Additionally, this course can be a significant part of your preparation for the Project Management Professional (PMP)® Certification Exam. The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge in the project management profession.
MySQL for developers training course description This MySQL Developers training course is designed for MySQL Developers who have a good understanding of a MySQL database and experience of using SQL commands. The course provides further practical experience in more advanced MySQL commands and SQL statements including Stored Routines, Triggers and Event Scheduling. What will you learn Provide the skills needed to write more advanced queries and database maintenance statements on a MySQL database. Use advanced features of the MySQL Client. Use advanced data types. Manage the structure of databases and tables. Manage and using indexes. Write complex SQL query statements. Use advanced SQL expressions. Use advanced SQL functions. Perform advanced Insert, Update, Delete, Replace and Truncate Operations. Use user variable syntax and properties. Import and export data from within MySQL. Import and export data from the command line. Perform complex joins to access multiple tables. Perform complex subqueries. Create, manage and us views. Use prepared statements. Create and use stored routines. Create and use triggers. Obtain database metadata. Optimize queries. Work with the main storage engines. Debug MySQL applications. MySQL for developers training course details Who will benefit: MySQL Developers who have a basic understanding of a MySQL database and SQL commands as covered on the Introduction to MySQL course. Prerequisites: MySQL foundation Duration 5 days MySQL for developers training course contents Introduction Administration and Course Materials, Course Structure and Agenda, Delegate and Trainer Introductions. Client/server concepts MySQL client/server architecture, Server modes, Using client programs, Logging in options, Configuration files, Precedence of logging in options Hands on Using client/server The MySQL client program Using MySQL interactively, The MySQL prompts, Client commands and SQL statements, Editing, Selecting a database, Help, Safe updates, Using script files, Using a source file, Redirecting output into a file, Command line execution, Mysql output formats, Overriding the defaults, Html and xml output, MySQL Utilities. Hands on Using the MySQL client program Data types Bit data type, Numeric data types, Auto_increment, Character string data types, Character sets and collation, Binary string data types, Enum and Set data types, Temporal data types, Timezone support, Handling Missing Or Invalid Data Values, SQL_MODE options. Hands on Using data types Identifiers Using Quotes with identifier naming, Case sensitivity in Identifier naming, Qualifying columns with table and database names, Using reserved words as identifiers, Function names Hands on Using identifiers Databases Database properties, Creating a database, Selecting a database, Altering databases, Dropping databases, Obtaining database metadata, The SHOW command, The INFORMATION_SCHEMA database, The SHOW CREATE command Hands on Using databases Tables and indexes Table properties, Creating tables, Create table using Select or Like, Temporary tables and memory tables, Altering tables, Adding columns, Changing column widths and types, Renaming columns, Dropping columns, Adding constraints, Dropping constraints, Renaming tables, Change the table storage engine, Multiple alterations, Dropping tables, Emptying tables, Obtaining table metadata, Show create table, The information_schema, Index introduction, Structure of a mysql index, Creating and dropping indexes, Creating an index, Altering a table to add an index, Specifying index type, Dropping indexes, Obtaining Index Metadata. Hands on Creating, altering and dropping tables/indexes Querying for data The SQL select statement and MySQL differences, Advanced order by, Order by and collation, Order by with enum datatype, Order by with Set datatype, Ordering with distinct and group by Special features of union, Limit and order by clauses, Group By clause, Group_concat, Using Rollup in a Group By clause. Hands on Querying for data SQL Expressions and functions Components of expressions, Nulls, Numeric expressions, String expressions, Temporal expressions, Comparison functions, Flow control functions, Numeric functions, String functions, Temporal functions. Hands on Using expressions and functions Updating data Update operations and privileges, Inserting rows, Insert using a set clause, Inserting duplicate values, Replacing rows, Updating rows, Update using the order by and limit clauses, Deleting rows, The delete and truncate statements. Exercise: Inserting, updating, replacing and deleting data Connectors MySQL client interfaces, MySQL connectors, Oracle and community conectors, Connecting to MySQL server using Java and PHP connectors, MySQL and NoSQL, Innodb integration with memcached. Obtaining database metadata What is metadata?, The mysqlshow utility, The show and describe commands, Describing tables, The information_schema, Listing tables, Listing columns, Listing views, Listing key_columns_usage. Hands on Obtaining database metadata Debugging Mysql error messages, The show statement, Show errors, Show count(*) errors, Show warnings, Show count(*) warnings, Note messages, The perror utility. Hands on Debugging Joins Overview of inner joins, Cartesian product, Inner joins with original syntax, Non equi-join, Using table aliases to avoid name clashes, Inner Joins With ISO/ANSI Syntax, Outer Joins, Left outer joins, Right outer joins, Full outer joins, Updating multiple tables simultaneously, Updating rows in one table based on a condition in another, Updating rows in one table reading data from another, Deleting from multiple tables simultaneously, Deleting rows in one table based on a condition in another. Hands on Coding joins Subqueries Types of subquery, Multiple-column subqueries, Correlated subqueries, Using the ANY, ALL and SOME operators, Using the EXISTS operator, Subqueries as scalar expressions, Inline views, Converting subqueries to joins, Using subqueries in updates and deletes. Hands on Coding subqueries Views Why views are used, Creating views, View creation restrictions, View algorithms, Updateable views, Altering and dropping views, Displaying information about views, Privileges for views. Hands on Using views Import and Export Exporting using SQL, Privileges required to export data, Importing using SQL, Messages when loading data, Privileges required to load data, Exporting from the command line, Mysqldump main options, Importing from the command line, Mysqlimport main options. Hands on Importing and exporting User variables and prepared statements Creating User variables, User variables in a select, Prepared statements, The prepare statement, The execute statement, The deallocate statement, Using prepared statements in code, with connectors. Hands on Using variables and prepared statements Introduction to stored routines Types of stored routines, Benefits of stored routines, Stored routine features, Differences between procedures and functions, Introduction to the Block, Declaring variables and constants, Assigning values to variables, Definer rights and invoker rights, Using SELECT in stored routines, Altering and dropping stored routines, Obtaining stored routine metadata, Stored routine privileges and execution security. Hands on Writing simple stored routines Stored routines - program logic The IF .. THEN .. ELSEIF construct, The CASE statement, The basic loop, The while loop, The repeat loop, The iterate statement, Nested loops. Hands on Writing stored routines with program logic Stored routines - exception handlers and cursors Dealing with errors using Exception handlers, Cursors, What is a cursor?, Cursor operations, Declaring cursors, Opening and closing cursors, Fetching rows, Status checking. Hands on Writing stored routines with program logic Procedures with parameters Creating procedures with parameters, Calling Procedures With Parameters. Hands on Writing stored routines with parameters Functions What is a function?, The create function statement, Executing functions, Executing functions from code, Executing functions from SQL statements, The deterministic and SQL clauses. Hands on Writing functions Triggers Trigger creation, Restrictions on triggers, The create trigger statement, Using the old and new qualifiers, Managing triggers, Destroying triggers, Required privileges. Hands on Writing triggers Basic optimizations Normalisation of data to third normal form, Using indexes for optimization, General query enhancement, Using Explain to analyze queries, Choosing an INNODB or MYISAM storage engine, Using MySQL Enterprise Monitor in query optimization. Hands on Making use of basic optimizations More about indexes Indexes and joins Hands on Investigating indexes and joins