• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

7273 Courses delivered Online

PostgreSQL for Database Developers (TTDB7024)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for this course includes database enthusiasts, IT professionals, and developers who are eager to expand their knowledge and skill set in database management and optimization. Roles that would greatly benefit from attending this course include: Database Developers: Those who design, implement, and maintain databases as part of their primary responsibilities and want to improve their expertise in schema design, query optimization, and advanced database features. Backend Developers: Professionals who work on server-side application logic and require a strong understanding of database management to integrate data storage and retrieval processes into their applications. Overview Upon completing this course, database developers will be able to: Design and implement efficient database schemas by employing normalization techniques, appropriate indexing strategies, and partitioning methods to optimize data storage and retrieval processes. Develop advanced SQL queries, including joining multiple tables, utilizing subqueries, and aggregating data, to extract valuable insights and facilitate decision-making processes. Implement stored procedures, functions, and triggers to automate common database tasks, enforce data integrity, and improve overall application performance. Apply database performance tuning techniques, such as query optimization, index management, and transaction control, to ensure optimal resource usage and enhanced system responsiveness. Integrate databases with various programming languages and platforms, enabling seamless data access and manipulation for web, mobile, and desktop applications. PostgreSQL is a powerful, open-source object-relational database management system that emphasizes extensibility, data integrity, and high performance. Its versatility and robust feature set make it an ideal choice for developers working on projects of all sizes, from small-scale applications to enterprise-level systems. By learning PostgreSQL, developers can tap into its advanced capabilities, such as full-text search, spatial data support, and customizable data types, allowing them to create efficient and scalable solutions tailored to their unique needs. PostgreSQL for Database Developers is a three-day hands-on course that explores the fundamentals of database management, covering everything from installation and management to advanced SQL functions. Designed for beginners and enthusiasts alike, this course will equip you with the knowledge and skills required to effectively harness the power of PostgreSQL in today's data-driven landscape. Throughout the course you?ll be immersed in a variety of essential topics, such as understanding data types, creating and managing indexes, working with array values, and optimizing queries for improved performance. You?ll gain valuable hands-on experience with real-world exercises, including the use of the psql client, writing triggers and stored procedures with PL/pgSQL, and exploring advanced SQL functions like Common Table Expressions (CTE), Window Functions, and Recursive Queries. You?ll exit this course with a solid foundation in PostgreSQL, enabling you to confidently navigate and manage your databases with ease and efficiency. Installing & Managing PostgreSQL PostgreSQL installation process Optimal configuration settings User and role management Database backup and restoration Overview of PostgreSQL Database PostgreSQL architecture overview Understanding database objects Efficient data storage Transaction management basics Using the psql client Introduction to psql Essential psql commands Executing queries effectively Managing databases with psql Understanding PostgreSQL data types Numeric data types explored Character and binary types Date, time, and boolean values Array and other types Understanding sequences Sequence creation and usage Customizing sequence behavior Implementing auto-increment columns Sequence manipulation and control Creating & managing indexes PostgreSQL index fundamentals Designing partial indexes Utilizing expression-based indexes Index management techniques Using COPY to load data COPY command overview Importing and exporting data Handling CSV and binary formats Performance considerations Working with Array Values Array value basics Array manipulation functions Querying arrays efficiently Multidimensional array handling Advanced SQL Functions Mastering Common Table Expressions Utilizing Window Functions Regular Expressions in SQL Crafting Recursive Queries Writing triggers & stored procedures with PL/pgSQL PL/pgSQL variables usage Implementing loop operations PERFORM and EXECUTE statements Developing PostgreSQL triggers Using the PostgreSQL query optimizer Query analysis and optimization EXPLAIN command insights PostgreSQL query operators Identifying performance bottlenecks Improving query performance Query performance tuning Index optimization strategies Efficient database partitioning Connection and resource management Wrap Up & Additional Resources Further learning opportunities Staying up-to-date with PostgreSQL Community engagement and support Additional course details: Nexus Humans PostgreSQL for Database Developers (TTDB7024) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL for Database Developers (TTDB7024) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PostgreSQL for Database Developers (TTDB7024)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Network Video Engineer Voice/UC/Collaboration/Communications Engineer Collaboration Tools Engineer Collaboration Sales/Systems Engineer Overview Implement and Configure Cisco Endpoints Implement and Configure Cisco Unified Communications Manager for Video Endpoints Implement and Configure Cisco IMP for Jabber Implement and Configure Cisco Expressway Implement and Configure Cisco Video Communications Server (VCS) Control Implement and Configure Cisco Video Communications Server (VCS) Expressway Implement and Configure connectivity between a Cisco VCS and Cisco UCM Implement and Configure a Cisco Conductor Implement, Configure, and Operate Cisco TelePresence Management Suite (TMS) and provision devices using Cisco TMS Provisioning Extension (TMSPE) Implement and Configure Cisco Meeting Server This one of kind Cisco Collaboration in-depth course takes student from initial endpoint configuration to a full solution deployment using all of the Cisco Collaboration Components. Students will have extensive labs in which they will configure and troubleshoot a full Cisco Telepresence Deployment. Participants will gain in-depth practical knowledge with exercises on installing, configuring, maintaining and troubleshooting of all Cisco Telepresence Components.The software applications that are covered in this course include:Cisco Unified Communications Manager (CUCM)Cisco Unified Communications Manager IM and PresenceCisco ExpresswayCisco Video Communication Server (VCS)Cisco ConductorCisco Telepresence Server (TS)Cisco Meeting Server (CMS)Cisco Telepresence Management Suite (TMS)Cisco TMS Extensions Understanding Cisco TelePresence Endpoints Cisco TelePresence Endpoint Solutions Overview Cisco DX Series Endpoint Characteristics Cisco TelePresence TC Software-Based Endpoint Characteristics Cisco TelePresence EX60 and EX90 Cisco TelePresence MX Series Cisco TelePresence SX Series Endpoints Cisco TelePresence Room Kits Cisco Intelligent Proximity Cisco TelePresence TC Software-Based Endpoint Peripherals Cisco TelePresence TC Software-Based Endpoint Deployments Cisco TelePresence Integrator C Series-Based Endpoints Cisco Jabber Video for TelePresence Characteristics Cisco Jabber Understanding the Cisco Video Network Network Overview H323 Overview SIP Overview VCS vs Unified Communications Manager Internetworking QOS Overview Implementing and Configuring Unified Communication Manager Unified Communications Manager Initial Settings Service Activation Enterprise and Service Parameters SIP Domains Configure IMP for Jabber Configure Jabber Settings Registering Endpoints Verifying Network Registration Cisco VCS / Expressway Overview and Configuration Configuring Initial VCS Setting Configuring Authentication Registration Conflict Policy Registration Restriction Policy Local Zone Components Membership Rules Transforms Purpose of Zones Search Priority Neighbor Zones Creating Neighbor Zones Need for Traversal Zones H.460 and Assent Protocols Traversal Zone Configuration Domain Name System Dialing E.164 Number Mapping Bandwidth Management Pipes Subzones and Zones Subzone Call Failure Call Processing Order Certificates Certificate Installation Clustering and the Cisco VCS Clustering Configuration Collecting Information Log Files Search History Connecting VCS-C to CUCM Connect VCS-C to VCS-E Connecting CUCM to VCS-C Understanding the Cisco TelePresence Conductor What is Conductor? Conductor ? How it works Installing Cisco Conductor Configuring Conductor Network Settings Configuring Conductor for a CUCM Configuration MCU Configuration Telepresence Server Telepresence Conductor Server Configuration Configuring TelePresence Conductor for ad hoc conferences Configuring TelePresence Conductor for rendezvous conferences Configuring Unified CM Configuring general settings on Unified CM Locations in Unified CM Unified CM trusts TelePresence Conductor's server certificate SIP trunk security profile Configuring Unified CM for rendezvous conferences Sip Trunk Configuration Conference Bridge Configuration MRG and MRGL Configuration Unified CM normalization scripts Configuring Unified CM for ad hoc conferences Sip Trunk Configuration Route pattern to match the SIP Trunk Configuration Unified CM normalization scripts Configuring the Cisco VCS with TelePresence Conductor Designing a Dial Plan MCU Configuration Telepresence Server Configuring the Cisco VCS Telepresence Conductor Server Configuration Backing Up Conductor Troubleshooting Conductor Overview of Cisco Telepresence Management Server (TMS) Windows Server Installation SQL Server Installation Server Pre-requisites and configuration Installing TMS Installing TMS Provisioning Extensions Initial Configuration Endpoint Configuration Adding Systems to TMS Configuration Templates Setting Configuration VCS Configuration for TMS Direct Endpoint Management VCS/TMS CUCM Configuration for TMS Direct Endpoint Management?CUCM Phonebooks & Phonebook Sources Conference Creation Advanced Conference Settings Booking & Scheduling Participant Types Methods Conference Monitoring Dial Plans, Configuration Templates Scheduler/Smart Scheduler Managing and Troubleshooting Cisco TMS Using the Logs Cisco TMS Ticketing System Troubleshooting VCS Registrations Troubleshooting CUCM Registrations System Maintenance Configuring Cisco Meeting Server (formerly Acano) Setting up CMS Installing Certificates Configuring CUCM with CMS Provision the RTC Client Configuring Meeting Spaces Additional course details: Nexus Humans Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced TP-CT - Implementing and Configuring Cisco TelePresence Video Suite
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-400 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. Overview After completing this course, students will be able to: Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Define Site Reliability Engineering Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms. Module 1: Get started on a DevOps transformation journey Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Module 2: Development for enterprise DevOps Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Module 3: Implement CI with Azure Pipelines and GitHub Actions Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Module 4: Design and implement a release strategy Introduction to continuous delivery Explore release strategy recommendations Build a high-quality release pipeline Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Create a release pipeline Provision and test environments Manage and modularize tasks and templates Automate inspection of health Manage application configuration data Integrate with identity management systems Implement application configuration Module 6: Manage infrastructure as code using Azure and DSC Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Module 7: Implement security and validate code bases for compliance Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Module 8: Design and implement a dependency management strategy Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Module 9: Implement continuous feedback Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Additional course details: Nexus Humans AZ-400 Designing and Implementing Microsoft DevOps Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-400 Designing and Implementing Microsoft DevOps Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-400 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network security engineers ISE administrators Wireless network security engineers Cisco integrators and partners Overview After taking this course, you should be able to: Describe Cisco ISE deployments, including core deployment components and how they interact to create a cohesive security architecture. Describe the advantages of such a deployment and how each Cisco ISE capability contributes to these advantages. Describe concepts and configure components related to 802.1X and MAC Authentication Bypass (MAB) authentication, identity management, and certificate services. Describe how Cisco ISE policy sets are used to implement authentication and authorization, and how to leverage this capability to meet the needs of your organization. Describe third-party Network Access Devices (NADs), Cisco TrustSec, and Easy Connect. Describe and configure web authentication, processes, operation, and guest services, including guest access components and various guest access scenarios. Describe and configure Cisco ISE profiling services, and understand how to monitor these services to enhance your situational awareness about network-connected endpoints. Describe best practices for deploying this profiler service in your specific environment. Describe BYOD challenges, solutions, processes, and portals. Configure a BYOD solution, and describe the relationship between BYOD processes and their related configuration components. Describe and configure various certificates related to a BYOD solution. Describe the value of the My Devices portal and how to configure this portal. Describe endpoint compliance, compliance components, posture agents, posture deployment and licensing, and the posture service in Cisco ISE. Describe and configure TACACS+ device administration using Cisco ISE, including command sets, profiles, and policy sets. Understand the role of TACACS+ within the Authentication, Authentication, and Accounting (AAA) framework and the differences between the RADIUS and TACACS+ protocols. Migrate TACACS+ functionality from Cisco Secure Access Control System (ACS) to Cisco ISE, using a migration tool. The Implementing and Configuring Cisco Identity Services Engine (SISE) v3.0 course shows you how to deploy and use Cisco© Identity Services Engine (ISE) v2.4, an identity and access control policy platform that simplifies the delivery of consistent, highly secure access control across wired, wireless, and VPN connections. This hands-on course provides you with the knowledge and skills to implement and use Cisco ISE, including policy enforcement, profiling services, web authentication and guest access services, BYOD, endpoint compliance services, and TACACS+ device administration. Through expert instruction and hands-on practice, you will learn how to use Cisco ISE to gain visibility into what is happening in your network, streamline security policy management, and contribute to operational efficiency. This course helps you prepare to take the exam, Implementing and Configuring Cisco Identity Services Engine (300-715 SISE), which leads to CCNP© Security and the Cisco Certified Specialist - Security Identity Management Implementation certifications. Introducing Cisco ISE Architecture and Deployment Using Cisco ISE as a Network Access Policy Engine Cisco ISE Use Cases Describing Cisco ISE Functions Cisco ISE Deployment Models Context Visibility Cisco ISE Policy Enforcement Using 802.1X for Wired and Wireless Access Using MAC Authentication Bypass for Wired and Wireless Access Introducing Identity Management Configuring Certificate Services Introducing Cisco ISE Policy Implementing Third-Party Network Access Device Support Introducing Cisco TrustSec Cisco TrustSec Configuration Easy Connect Web Authentication and Guest Services Introducing Web Access with Cisco ISE Introducing Guest Access Components Configuring Guest Access Settings Configuring Sponsor and Guest Portals Cisco ISE Profiler Introducing Cisco ISE Profiler Profiling Deployment and Best Practices Cisco ISE BYOD Introducing the Cisco ISE BYOD Process Describing BYOD Flow Configuring the My Devices Portal Configuring Certificates in BYOD Scenarios Cisco ISE Endpoint Compliance Services Introducing Endpoint Compliance Services Configuring Client Posture Services and Provisioning in Cisco ISE Working with Network Access Devices Review TACACS+ Cisco ISE TACACS+ Device Administration Configure TACACS+ Device Administration TACACS+ Device Administration Guidelines and Best Practices Migrating from Cisco ACS to Cisco ISE Lab outline Access the SISE Lab and Install ISE 2.4 Configure Initial Cisco ISE Setup, GUI Familiarization, and System Certificate Usage Integrate Cisco ISE with Active Directory Configure Basic Policy on Cisco ISE Configure Policy Sets Configure Access Policy for Easy Connect Configure Guest Access Configure Guest Access Operations Create Guest Reports Configure Profiling Customize the Cisco ISE Profiling Configuration Create Cisco ISE Profiling Reports Configure BYOD Blacklisting a Device Configure Cisco ISE Compliance Services Configure Client Provisioning Configure Posture Policies Test and Monitor Compliance-Based Access Test Compliance Policy Configure Cisco ISE for Basic Device Administration Configure TACACS+ Command Authorization Additional course details: Nexus Humans Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing and Configuring Cisco Identity Services Engine v3.0 (SISE)
Delivered OnlineFlexible Dates
Price on Enquiry

Google Cloud Fundamentals for AWS Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for AWS IaaS, AWS PaaS, AWS SQL, AWS Blob Storage, AWS Application Insights, and AWS Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing, storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This course with labs introduces AWS professionals to the core capabilities of Google Cloud Platform (GCP) in the four technology pillars: networking, compute, storage, and database. It is designed for AWS Solution Architects and SysOps Administrators familiar with AWS features and setup and want to gain experience configuring GCP products immediately. With presentations, demos, and hands-on labs, participants will get details of similarities, differences, and initial how-tos quickly. Introducing Google Cloud Explain the advantages of Google Cloud. Define the components of Google's network infrastructure,including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) Getting Started with Google Cloud Identify the purpose of projects on Google Cloud Platform. Understand how AWS?s resource hierarchy differs from Google Cloud?s. Understand the purpose of and use cases for Identity and Access Management. Understand how AWS IAM differs from Google Cloud IAM. List the methods of interacting with Google Cloud Platform. Launch a solution using Cloud Marketplace. Virtual Machines in the Cloud Identify the purpose and use cases for Google Compute Engine. Understand the basics of networking in Google Cloud Platform. Understand how Amazon VPC differs from Google VPC. Understand the similarities and differences between Amazon EC2 and Google Compute Engine. Understand how typical approaches to load-balancing in Google Cloud differ from those in AWS. Deploy applications using Google Compute Engine. Storage in the Cloud Understand the purpose of and use cases for: Cloud Storage,Cloud SQL, Cloud Bigtable and Cloud Datastore. Understand how Amazon S3 and Amazon Glacier compare to Cloud Storage. Compare Google Cloud?s managed database services with Amazon RDS and Amazon Aurora. Learn how to choose among the various storage options on Google Cloud Platform. Load data from Cloud Storage into BigQuery. Perform a query on the data in BigQuery. Containers in the Cloud Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Understand how Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS) differ from GKE. Provision a Kubernetes cluster using Kubernetes Engine. Deploy and manage Docker containers using kubectl Applications in the Cloud Understand the purpose of and use cases for Google App Engine. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand how App Engine differs from Amazon Elastic Beanstalk. Understand the purpose of and use cases for Google Cloud Endpoints. Developing, Deploying and Monitoring in the Cloud Understand options for software developers to host their source code. Understand the purpose of template-based creation and management of resources. Understand how Cloud Deployment Manager differs from AWS CloudFormation. Understand the purpose of integrated monitoring, alerting, and debugging. Understand how Google Monitoring differs from Amazon CloudWatch and AWS CloudTrail. Create a Deployment Manager deployment. Update a Deployment Manager deployment. View the load on a VM instance using Google Monitoring. Big Data and Machine Learning in the Cloud Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Understand how Google Cloud BigQuery differs from AWS Data Lake. Understand how Google Cloud Pub/Sub differs from AWS Event Hubs and Service Bus. Understand how Google Cloud?s machine-learning APIs differ from AWS's. Load data into BigQuery from Cloud Storage. Perform queries using BigQuery to gain insight into data. Summary and Review Review the products that make up Google Cloud and remember how to choose among them Understand next steps for training and certification Understand, at a high level, the process of migrating from AWS to Google Cloud. Additional course details: Nexus Humans Google Cloud Fundamentals for AWS Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Fundamentals for AWS Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google Cloud Fundamentals for AWS Professionals
Delivered OnlineFlexible Dates
Price on Enquiry

Symantec Management Suite 7.6 - Implementation

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for the professional tasked with implementing, designing, architecting, installing, and configuring Symantec Client Management Suite (CMS) to manage the software and hardware in their company. Overview At the completion of the course, you will be able to: Identify the types of information you need to collect to help determine what type of CMS configuration to implement. Install Client Management Suite. Discover and import computer and user resources that you want to manage. Deploy the Symantec Management Agent and plug-ins. Create Organizational Views and Groups and assign resources to them. Create and configure policies, tasks, and jobs and assign them to targets. Troubleshoot common problems with installation and managing of Client Management Suite. Creating reports and installing and configuring IT Analytics. This course teaches students theory and concepts, and provides technical know-how on implementing Client Management Suite. Course Introduction Course objectives Course overview Lab environment introduction Understanding the Symantec Management Platform Introducing the Symantec Management Platform Symantec management Platform components used by Client Management Suite Symantec Management Platform concepts How Client Management Suite works Architecture of Client Management Suite Understanding Architecture Hardware Recommendations Installing and configuring Client Management Suite Installing and using the Symantec Installation Manager Installing the Notification Server, suite and solution software The Symantec Management Console Accessing the Symantec Management Console Getting to know the Symantec Management Console Configuring the Notification Server after installation Getting to know the ITMS Management views Discovering resources Introducing resource discovery methods Importing resources from Microsoft Active Directory Discovering computers using domain resource discovery Discovering network resources using Network Discovery Creating and Managing Organizational Views and Groups Learning about organizational views and groups Creating custom organizational views and groups Managing organizational views and groups Installing and Configuring the Agents and Plug-ins Managing computers with the Symantec Management Agent Installing the Symantec Management Agent Verifying the Symantec Management Agent installation Configuring the Symantec Management Agent settings Introducing solution plug-ins for the Symantec Management Agent Upgrading Client Management Suite Introducing agent, Notification Server and site server communications Introducing Notification Server event queues Resource Filters Introducing resource filters Managing and working with existing filters Creating and modifying filters Filters and Targets Introducing targets Working with targets in the computer management view Policies Getting to know policies Understanding user-based policies Understanding how the Symantec Management Agent receives policies Configuring automation policies Managing shared schedules Creating and Managing Tasks and Jobs Overview of task management Creating and scheduling tasks and jobs Task management communication and processing Security Learning about security Managing user accounts, security roles, and privileges Managing permissions Reporting Introducing reports Using and creating classic reports Configuring and using IT Analytics Site Management Introducing site management Managing sites, subnets and site servers Reviewing site server plug-ins to the Symantec Management Agent Configuring site services Cloud-enabled Management (CeM) Introducing Cloud-enabled Management (CeM) Understanding the cloud-enabled agent Preparing the Notification Server and agents for CeM Configuring site management for CeM Installing and Configuring the SMP Internet Gateway and configuring a CeM Settings policy Configuring the SMP Internet Gateway with the SMP IG Manager Configuring the CeM Settings policy Creating a cloud-enabled agent installation package Installing a cloud-enabled agent from a package Replication Understanding replication Setting up and configuring replication Running replication Hierarchy Understanding hierarchy Setting up a Notification Server hierarchy Configuring hierarchy replication Changing the hierarchy topology Migration Migrating Symantec Management Platform Agent registration (trust)Post installation checklist Readiness checklist for CMS Migration Post migration checklist for a CMS Migration Migrating from 6.x to 7.6 Migrating from 7.x to 7.6 Troubleshooting Learning about Symantec Management Platform troubleshooting tools Using NSConfigurator Using Remote Altiris Agent Diagnostics Introducing Notification Server event queues Troubleshooting Cloud-enabled Management (CeM) Backing up the server and database Symantec Management Platform components needed for recovery Backing up the IIS default web site virtual directories Backing up the Configuration Management Database Customizing the Console Customizing the Symantec Management Console Personalizing the Symantec Management Console SQL Basics Learning SQL basics Obtaining Technical Support from Symantec Using self-help resources Obtaining customer support Additional course details: Nexus Humans Symantec Management Suite 7.6 - Implementation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Management Suite 7.6 - Implementation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Symantec Management Suite 7.6 - Implementation
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Telco Cloud: Day 2 Operate and Scale [V2.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: List the operational challenges for rolling out and operating telco services including 5G. Identify the role of VMware Telco Cloud products in supporting telco services. Discuss the role of VMware technologies such as vSphere, NSX, and Tanzu etc. in implementing telco services. Outline the role of native tools and other VMware monitoring tools such as vRealize Operations and vRealize Log Insight in maintaining network services. Choose the VMware Telco Cloud products that meet your application requirements. Deploy a solution architecture that meet VMware best practices for delivering services using VMware Telco Cloud products. Implement and maintain VMware Telco Cloud products in a secure manner. Identify the tools and remediation pathways for maintaining the availability and performance of your applications and infrastructure using VMware Telco Cloud and vRealize Suite products. Follow specific steps to resolve application performance and availability problems Scale your VMware Telco Cloud products to meet operational requirements in line with VMware best practices. Optimize the operation of VMware Telco Cloud products to ensure SLAs are met. This five-day, hands-on training course provides the knowledge to operate and scale VMware Telco Cloud version 2.x products in a Telco cloud provider environment. In this course, you are exposed to the entire VMware Telco Cloud portfolio, and the tools and methodologies available to ensure they operate effectively. In addition, you are presented with various scenarios where you will be guided through the process of identifying, analyzing, and formulating solutions to performance and other problems. Course Introduction Introductions and course logistics Course objectives Overview of Network Transformation Reviews the technologies that enable modern networks Lists the components of modern service provider networks Outlines characteristics of modern service provider networks in meeting customer application needs Service Delivery with VMware Telco Cloud Outlines the components of the VMware Telco Cloud portfolio Reviews the role each VMware Telco Cloud product plays in delivering telco services Specifies the dependencies each product has on underlying technologies Supporting VMware Telco Cloud Service Delivery Reviews the products that implements the virtualization, management, platform, and orchestration layers Outlines the role played by other VMware products such as NSX in delivering cloud services Outline opensource integration options with VMware Telco Cloud products Securing VMware Telco Cloud Reviews security threats that affect telco services Identifies the critical telco assets that are prone to attack Outlines best practice for securing VMware Telco Cloud products and underlying technology Provides overview of appropriate security controls for VMware Telco Cloud products Assessing Service Provision Reviews tools and methodologies used to gather requirements Outlines how to assess cloud-native capabilities Documenting findings Identifying security vulnerabilities with Helm. Reviews VMware?s Customer Engagement process Capturing infrastructure requirements from TCA Designing a VMware Telco Cloud Solution Selecting appropriate deployment topology Pros and cons of design choices How a design choice might be affected by other factors such as NSX and TKG deployment, or data center architecture Outlines typical scenarios where specific products align with identified requirements Documenting a design Designing for availability Ensuring a design aligns with best practice Specifying monitoring options Implementing VMware Telco Cloud Products Review deployment options for VMware products Integrating new products with existing ones Outline post-installation tasks Adding the new products as data sources in monitoring tools such as vRealize Operations and vRealize Operations Network Insight Ensuring products meet security requirements Configuring monitoring software Outlines the xNF onboarding process in TCA Maintaining Telco Services Outlines typical administrative tasks in ensuring services are maintained Use of native and other VMware performance monitoring tools Reviewing performance data Role of SLAs in service maintenance Reviews scenarios where known behaviors indicate problems Troubleshooting Deployed Telco Services Reviews the troubleshooting tools available Using tools to gather useful data Outlines how event correlation can be used to isolate problems Using a methodology to determine the root cause of a problem Steps to identify and resolve a problem Reviews scenarios where known problems are isolated and resolution steps identified Scaling VMware Telco Cloud Products Assessing if operations are impacted by lack of resources now or will be in the future Reviews performance optimization options Identifies implications for other products if you scale VMware Telco Cloud products Reviews VMware sizing guidelines Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Telco Cloud: Day 2 Operate and Scale [V2.x] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Telco Cloud: Day 2 Operate and Scale [V2.x] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Telco Cloud: Day 2 Operate and Scale [V2.x]
Delivered OnlineFlexible Dates
Price on Enquiry

Managing and Troubleshooting PCs - Part 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for If you are getting ready for a career as an entry-level information technology (IT) professional or personal computer (PC) service technician, the CompTIA© A+© Certification course is the first step in your preparation. Overview In this course, you will install, configure, optimize, troubleshoot, repair, upgrade, and perform preventive maintenance on personal computers, digital devices, and operating systems. You will:Identify the hardware components of personal computers and mobile digital devices.Identify the basic components and functions of operating systems.Identify networking and security fundamentals.Identify the operational procedures that should be followed by professional PC technicians.Install, configure, and troubleshoot display devices.Install and configure peripheral components.Manage system components.Manage data storage.Install and configure Microsoft Windows.Optimize and maintain Microsoft Windows.Work with other operating systems.Identify the hardware and software requirements for client environment configurations.Identify network technologies.Install and configure networking capabilities.Support mobile digital devices.Support printers and multifunction devices.Identify security threats, vulnerabilities, and controls.Implement security controls.Troubleshoot system-wide issues. In this course, you will acquire the essential skills and information you will need to install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative maintenance of basic personal computer hardware and operating systems. Hardware Fundamentals Topic A: Personal Computer Components Topic B: Storage Devices Topic C: Mobile Digital Devices Topic D: Connection Interfaces Operating System Fundamentals Topic A: PC and Mobile Operating Systems Topic B: PC Operating System Tools and Utilities Networking & Security Fundamentals Topic A: Network Types Topic B: Network Components Topic C: Common Network Services Topic D: Cloud Concepts Topic E: Security Fundamentals Safety & Operational Procedures Topic A: Basic Maintenance Tools and Techniques Topic B: Personal and Electrical Safety Topic C: Environmental Safety and Materials Handling Topic D: Professionalism and Communication Topic E: Organizational Policies and Procedures Topic F: Troubleshooting Theory Supporting Display Devices Topic A: Install Display Devices Topic B: Configure Display Devices Topic C: Troubleshoot Video and Display Devices Installing & Configuring Peripheral Components Topic A: Install and Configure Input Devices Topic B: Install and Configure Output Devices Topic C: Install and Configure Input/Output Devices Topic D: Install and Configure Expansion Cards Managing System Components Topic A: Identify Motherboard Components and Features Topic B: Install and Configure CPUs and Cooling Systems Topic C: Install Power Supplies Topic D: Troubleshoot System Components Managing Data Storage Topic A: Identify RAM Types and Features Topic B: Troubleshoot RAM Issues Topic C: Install and Configure Storage Devices Topic D: Configure the System Firmware Topic E: Troubleshoot Hard Drives and RAID Arrays Installing & Configuring Microsoft Windows Topic A: Implement Client-Side Virtualization Topic B: Install Microsoft Windows Topic C: Use Microsoft Windows Topic D: Configure Microsoft Windows Topic E: Upgrade Microsoft Windows Optimizing & Maintaining Microsoft Windows Topic A: Optimize Microsoft Windows Topic B: Back Up and Restore System Data Topic C: Perform Disk Maintenance Topic D: Update Software Working with Other Operating Systems Topic A: The OS X Operating System Topic B: The Linux Operating System Customized Client Enviroments Topic A: Types of Common Business Clients Topic B: Custom Client Environments Networking Technologies Topic A: TCP/IP Properties and Characteristics Topic B: TCP/IP Topic C: Internet Connections Topic D: Ports and Protocols Topic E: Networking Tools Installing & Configuring Networking Capabilities Topic A: Configure Basic Windows Networking Topic B: Configure Network Perimeters Topic C: Using Windows Networking Features Topic D: Install and Configure SOHO Networks Supporting Mobile Digital Devices Topic A: Install and Configure Exterior Laptop Components Topic B: Install and Configure Interior Laptop Components Topic C: Other Mobile Devices Topic D: Mobile Device Accessories and Ports Topic E: Mobile Device Connectivity Topic F: Mobile Device Synchronization Topic G: Troubleshoot Mobile Device Hardware Supporting Printers & Multifunction Devices Topic A: Printer and Multifunction Technologies Topic B: Install and Configure Printers Topic C: Maintain Printers Topic D: Troubleshoot Printers Security Threats, Vulnerabilities, and Controls Topic A: Common Security Threats and Vulnerabilities Topic B: General Security Controls Topic C: Mobile Security Controls Topic D: Data Destruction and Disposal Methods Implementing Security Controls Topic A: Secure Operating Systems Topic B: Secure Workstations Topic C: Secure SOHO Networks Topic D: Secure Mobile Devices Troubleshooting System-Wide Issues Topic A: Troubleshoot PC Operating Systems Topic B: Troubleshoot Mobile Device Operating Systems and Applications Topic C: Troubleshoot Wired and Wireless Networks Topic D: Troubleshoot Common Security Issues Additional course details: Nexus Humans Managing and Troubleshooting PCs - Part 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Managing and Troubleshooting PCs - Part 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Managing and Troubleshooting PCs - Part 2
Delivered OnlineFlexible Dates
Price on Enquiry

KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek techniques for working with complex types of data resources. Overview Use Connector stages to read from and write to database tables Handle SQL errors in Connector stages Use Connector stages with multiple input links Use the File Connector stage to access Hadoop HDFS data Optimize jobs that write to database tables Use the Unstructured Data stage to extract data from Excel spreadsheets Use the Data Masking stage to mask sensitive data processed within a DataStage job Use the Hierarchical stage to parse, compose, and transform XML data Use the Schema Library Manager to import and manage XML schemas Use the Data Rules stage to validate fields of data within a DataStage job Create custom data rules for validating data Design a job that processes a star schema data warehouse with Type 1 and Type 2 slowly changing dimensions This course is designed to introduce you to advanced parallel job data processing techniques in DataStage v11.5. In this course you will develop data techniques for processing different types of complex data resources including relational data, unstructured data (Excel spreadsheets), and XML data. In addition, you will learn advanced techniques for processing data, including techniques for masking data and techniques for validating data using data rules. Finally, you will learn techniques for updating data in a star schema data warehouse using the DataStage SCD (Slowly Changing Dimensions) stage. Even if you are not working with all of these specific types of data, you will benefit from this course by learning advanced DataStage job design techniques, techniques that go beyond those utilized in the DataStage Essentials course. Accessing databases Connector stage overview - Use Connector stages to read from and write to relational tables - Working with the Connector stage properties Connector stage functionality - Before / After SQL - Sparse lookups - Optimize insert/update performance Error handling in Connector stages - Reject links - Reject conditions Multiple input links - Designing jobs using Connector stages with multiple input links - Ordering records across multiple input links File Connector stage - Read and write data to Hadoop file systems Demonstration 1: Handling database errors Demonstration 2: Parallel jobs with multiple Connector input links Demonstration 3: Using the File Connector stage to read and write HDFS files Processing unstructured data Using the Unstructured Data stage in DataStage jobs - Extract data from an Excel spreadsheet - Specify a data range for data extraction in an Unstructured Data stage - Specify document properties for data extraction. Demonstration 1: Processing unstructured data Data masking Using the Data Masking stage in DataStage jobs - Data masking techniques - Data masking policies - Applying policies for masquerading context-aware data types - Applying policies for masquerading generic data types - Repeatable replacement - Using reference tables - Creating custom reference tables Demonstration 1: Data masking Using data rules Introduction to data rules - Using the Data Rules Editor - Selecting data rules - Binding data rule variables - Output link constraints - Adding statistics and attributes to the output information Use the Data Rules stage to valid foreign key references in source data Create custom data rules Demonstration 1: Using data rules Processing XML data Introduction to the Hierarchical stage - Hierarchical stage Assembly editor - Use the Schema Library Manager to import and manage XML schemas Composing XML data - Using the HJoin step to create parent-child relationships between input lists - Using the Composer step Writing Hierarchical data to a relational table Using the Regroup step Consuming XML data - Using the XML Parser step - Propagating columns Topic 6: Transforming XML data - Using the Aggregate step - Using the Sort step - Using the Switch step - Using the H-Pivot step Demonstration 1: Importing XML schemas Demonstration 2: Compose hierarchical data Demonstration 3: Consume hierarchical data Demonstration 4: Transform hierarchical data Updating a star schema database Surrogate keys - Design a job that creates and updates a surrogate key source key file from a dimension table Slowly Changing Dimensions (SCD) stage - Star schema databases - SCD stage Fast Path pages - Specifying purpose codes - Dimension update specification - Design a job that processes a star schema database with Type 1 and Type 2 slowly changing dimensions Demonstration 1: Build a parallel job that updates a star schema database with two dimensions Additional course details: Nexus Humans KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing
Delivered OnlineFlexible Dates
Price on Enquiry

Turbocharge Your Code! Generative AI Boot Camp for Developers (TTAI2305)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Attendee roles might include: Software Developers/Programmers Data Scientists Machine Learning Engineers AI Researchers User Interface (UI) and User Experience (UX) Designers Technical Product Managers Technical Team Leads Overview Working in an interactive learning environment, led by our engaging AI expert you'll: Develop a strong foundational understanding of generative AI techniques and their applications in software development. Gain hands-on experience working with popular generative AI models, including Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and Transformer models. Master the use of leading AI libraries and frameworks, such as TensorFlow, Keras, and Hugging Face Transformers, for implementing generative AI models. Acquire the skills to design, train, optimize, and evaluate custom generative AI models tailored to specific software development tasks. Learn to fine-tune pre-trained generative AI models for targeted applications and deploy them effectively in various environments, including cloud-based services and on-premises servers. Understand and address the ethical, legal, and safety considerations of using generative AI, including mitigating biases and ensuring responsible AI-generated content. Prompt Engineering offers coders and software developers a competitive edge by empowering them to develop more effective and efficient AI-driven solutions in their projects. By harnessing the capabilities of cutting-edge AI models like GPT-4, coders can automate repetitive tasks, enhance natural language understanding, and even generate code suggestions, boosting productivity and creativity. In addition, mastering prompt engineering can contribute to improved job security, as professionals with these in-demand skills are highly sought after in the rapidly evolving tech landscape. Quick Start to Prompt Engineering for Coders and Software Developers is a one day course designed to get you quickly up and running with the prompting skills required to out AI to work for you in your development efforts. Guided by our AI expert, you?ll explore key topics such as text preprocessing, data cleansing, GPT-4 tokenization, input formatting, prompt design, and optimization, as well as ethical considerations in prompt engineering. In the hands-on labs you?ll explore tasks such as formatting inputs for GPT-4, designing and optimizing prompts for business applications, and implementing multi-turn conversations with AI. You?ll work with innovative tools like the OpenAI API, OpenAI Codex, and OpenAI Playground, enhancing your learning experience while preparing you for integrating prompt engineering into your professional toolkit. By the end of this immersive course, you?ll have the skills necessary to effectively use prompt engineering in your software development projects. You'll be able to design, optimize, and test prompts for various business tasks, integrate GPT-4 with other software platforms, and address ethical concerns in AI deployment. Generative AI represents an exhilarating frontier in artificial intelligence, specializing in the creation of new data instances, imitation of real data, and content generation. Its remarkable capabilities facilitate automated content creation, enriched user experiences, and groundbreaking solutions across diverse industries, ultimately fueling efficiency and transcending technological limits. By harnessing the power of generative AI, developers can craft dynamic content, produce code and documentation, refine user interfaces, and devise customized recommendations, empowering them to construct highly efficient and custom solutions for a wide range of applications. Designed for experienced programmers, Turbocharge Your Code! Generative AI Boot Camp for Developers is a three-day workshop-style course that teaches you the latest skills and tools required to master generative AI models, transforming the way you approach software development. In today's fast-paced technological landscape, generative AI has emerged as a game-changer, with leading companies like NVIDIA, OpenAI, and Google leveraging its capabilities to push the boundaries of innovation. By learning how to harness the power of generative models such as GANs, VAEs, and Transformer models, you will be able to generate code, documentation, and tests, enhance user interfaces, and create dynamic content that adapts to user needs. Our comprehensive curriculum covers everything from the fundamentals of generative AI to advanced techniques and ethical considerations, including hands-on labs where you will develop and deploy custom models using state-of-the-art AI tools and libraries like TensorFlow and Hugging Face Transformers. Throughout the course you'll focus on practical application and collaboration, building confidence with personalized guidance and real-time feedback from our expert live instructor. Upon completion, you will be equipped with the knowledge and experience necessary to develop and implement innovative generative AI models across various industries, improving existing products, creating new applications, and gaining highly-valuable skills in the rapidly advancing field of AI. Additional course details: Nexus Humans Turbocharge Your Code! Generative AI Boot Camp for Developers (TTAI2305) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Turbocharge Your Code! Generative AI Boot Camp for Developers (TTAI2305) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Turbocharge Your Code! Generative AI Boot Camp for Developers  (TTAI2305)
Delivered OnlineFlexible Dates
Price on Enquiry