• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

35301 Design courses delivered Online

Red Hat Application Development I: Programming in Java EE (AD183)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for Java developers who want to learn more about the specifications that comprise the world of Java Enterprise Edition (Java EE), Proficiency in developing Java SE applications, with 2+ years of experience required, Proficiency in using an IDE such as Red Hat Developer Studio or Eclipse, Experience with Maven is recommended but not required. Overview Red Hat Application Development I: Programming in Java EE Virtual Training exposes experienced Java Standard Edition (Java SE) developers to the world of Java Enterprise Edition (Java EE). As an experienced Java Standard Edition (Java SE) developer, this course introduces you to the world of Java Enterprise Edition (Java EE). You will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application. This course is based on Red Hat© Enterprise Application Platform 7.0. 1 - TRANSITION TO MULTI-TIERED APPLICATIONS Describe Java EE features and distinguish between Java EE and Java SE applications. 2 - PACKAGE AND DEPLOY APPLICATIONS TO AN APPLICATION SERVER Describe the architecture of a Java EE application server, package an application, and deploy the application to an EAP server. 3 - CREATE ENTERPRISE JAVA BEANS Develop Enterprise Java Beans, including message-driven beans. 4 - MANAGE PERSISTENCE Create persistence entities with validations. 5 - MANAGE ENTITY RELATIONSHIPS Define and manage JPA entity relationships. 6 - CREATE REST SERVICES Create REST APIs using the JAX-RS specification. 7 - IMPLEMENT CONTEXTS AND DEPENDENCY INJECTION Describe typical use cases for using CDI and successfully implement it in an application. 8 - SECURE JAVA EE APPLICATIONS Use JAAS to secure a Java EE application. 9 - SECURE JAVA EE APPLICATIONS Use JAAS to secure a Java EE application. 10 - COMPREHENSIVE REVIEW OF RED HAT JBOSS DEVELOPMENT I: JAVA EE Demonstrate proficiency of the knowledge and skills obtained during the course. Additional course details: Nexus Humans Red Hat Application Development I: Programming in Java EE (AD183) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Application Development I: Programming in Java EE (AD183) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Application Development I: Programming in Java EE (AD183)
Delivered OnlineFlexible Dates
Price on Enquiry

Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an Intermediate and beyond-level Tableau course geared for experienced Tableau users who wish to leverage Tableau's more advanced capabilities. Overview This skills-focused course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our expert facilitator, students will learn how to: Understand what data works best with Tableau Desktop and how to shape and clean it appropriately to get Learn how to maximize flexibility from Tableau Desktop. Learn how Tableau Prep folds into the analytic cycle, and when to prep data in Tableau Prep vs. Tableau Desktop. Understand the terminology used in Tableau Prep. Know how Tableau Prep approaches data sampling. Create and understand data prep flows that address common scenarios encountered in data preparation, as applied to common data use cases Know how to view data prepared in Tableau Prep using Tableau Desktop. Understand data exploration and validation in Tableau Prep and Tableau Desktop. Geared for experienced Tableau Users, Tableau Prep Building (Tableau Data Prep) for Experienced Users is a two-day hands-on course designed to provide you with the tools and knowledge of how to prepare and shape data in Tableau Prep. It?s best suited for people who have 3-6 months experience in Tableau Desktop and are somewhat familiar with writing calculations. Throughout the course, our instructors will take you from conceptual data preparation material to creating useful Tableau Prep flows that can be output to Tableau Desktop for analysisNOTE: The Tableau Training Series is independent-format training that can be tuned and adjusted to best meet your needs. Our materials are flexible, comprehensive, and are always instructed by a senior instructor with a deep understanding of Tableau and its most current features, benefits and functionality in a wide array of uses. This is not Official Tableau Training. Course Outline Introduction to the workspace Introduction to the workflow Data literacy concepts Connecting to and configuring data Exploring data Cleaning data Preferred data structures in Tableau Shaping data Combining data Opening a data sample and creating an output file Best practices for data preparation Complex flows Starting with a question Hands-on data preparation Additional course details: Nexus Humans Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Tableau Prep Building (Tableau Data Prep) for Experienced Users (TTDTAB010)
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Data Science for Marketing Analytics

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Data Science for Marketing Analytics is designed for developers and marketing analysts looking to use new, more sophisticated tools in their marketing analytics efforts. It'll help if you have prior experience of coding in Python and knowledge of high school level mathematics. Some experience with databases, Excel, statistics, or Tableau is useful but not necessary. Overview By the end of this course, you will be able to build your own marketing reporting and interactive dashboard solutions. The course starts by teaching you how to use Python libraries, such as pandas and Matplotlib, to read data from Python, manipulate it, and create plots, using both categorical and continuous variables. Then, you'll learn how to segment a population into groups and use different clustering techniques to evaluate customer segmentation.As you make your way through the course, you'll explore ways to evaluate and select the best segmentation approach, and go on to create a linear regression model on customer value data to predict lifetime value. In the concluding sections, you'll gain an understanding of regression techniques and tools for evaluating regression models, and explore ways to predict customer choice using classification algorithms. Finally, you'll apply these techniques to create a churn model for modeling customer product choices. Data Preparation and Cleaning Data Models and Structured Data pandas Data Manipulation Data Exploration and Visualization Identifying the Right Attributes Generating Targeted Insights Visualizing Data Unsupervised Learning: Customer Segmentation Customer Segmentation Methods Similarity and Data Standardization k-means Clustering Choosing the Best Segmentation Approach Choosing the Number of Clusters Different Methods of Clustering Evaluating Clustering Predicting Customer Revenue Using Linear Regression Understanding Regression Feature Engineering for Regression Performing and Interpreting Linear Regression Other Regression Techniques and Tools for Evaluation Evaluating the Accuracy of a Regression Model Using Regularization for Feature Selection Tree-Based Regression Models Supervised Learning: Predicting Customer Churn Classification Problems Understanding Logistic Regression Creating a Data Science Pipeline Fine-Tuning Classification Algorithms Support Vector Machine Decision Trees Random Forest Preprocessing Data for Machine Learning Models Model Evaluation Performance Metrics Modeling Customer Choice Understanding Multiclass Classification Class Imbalanced Data Additional course details: Nexus Humans Data Science for Marketing Analytics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Data Science for Marketing Analytics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Data Science for Marketing Analytics
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System installersSystem integratorsSystem administratorsNetwork administratorsSolution designers Overview After taking this course, you should be able to:Describe the Cisco IOS XR software architecture, high availability components, and scalability featuresPerform basic configurations on a Cisco IOS XR routerDescribe Cisco IOS XR software operationsDescribe the configuration file systemPerform Cisco IOS XR software installationsConfigure AAA servicesConfigure NTPConfigure Simple Network Management Protocol (SNMP), telemetry, and loggingConfigure routing protocolsMonitor processesUse error messages and core dumps he Introduction to Cisco IOS XR (IOSXR100) v2.0 course introduces you to the features and functions of the Cisco© Internetwork Operating System (Cisco IOS©) XR Software operating system. You learn the fundamental concepts on which the operating system is based and Cisco IOS XR basic operations, system administration, and troubleshooting. Cisco IOS XR Software Overview Platform Overview Cisco IOS XR Architecture Cisco IOS XR High Availability Cisco IOS XR Software Configuration Basics Cisco IOS XR Configuration Operations Cisco IOS XR Initial Configuration Reviewing the Configuration Cisco IOS XR Software Operations Examining Configuration Operations Examining Configuration Rollback and Recovery Configuration File System Overview Examining the Binary Configuration Examining the Commit Database Examining the ASCII Configuration Examining the Nonvolatile Generation (NVgen) Files Verifying Cisco Fabric Services (CFS) Integrity Cisco IOS XR Software Installation Software Package Basics Installing Software Packages AAA Security AAA Fundamentals Task-Based Security Configuring a User Security Policy Authentication with Remote Servers Configuring Router to AAA Server Communication Configuring Authentication Terminal Access Controller Access-Control System Plus (TACACS+) Command Authorization Configuring Accounting AAA Troubleshooting Network Time Synchronization Network Time Protocol SNMP, Telemetry, and Logging Examining SNMP Examining Telemetry Examining Logging Basic Routing Configuration Configuring Intermediate System to Intermediate System (IS-IS) Configuring Open Shortest Path First (OSPF) Configuring Border Gateway Protocol (BGP) Configuring Routing Protocol for LLN (RPL) Policy Packet Filtering Access Control Lists Unicast Reverse Path Forwarding Management Plane Protection Monitoring Process Examining Processes and Threads Process Crashes Commands for Debugging Processes Restartability of Processes Process Monitoring Identifying Memory Problems Memory Depletion Core Dumps Core Dump Fundamentals Using Core Dump Information Additional course details: Nexus Humans Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Introduction to Cisco IOS XR v2.0 (IOSXR100)
Delivered OnlineFlexible Dates
Price on Enquiry

EC-Council Certified Security Specialist (ECSS)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for ECSS is designed for anyone who wants to enhance their skills and make a career in information security, network security, and computer forensics fields. It can be IT Specialists, Network Administrators, or System Administrators. Overview Upon successful completion of this course, students will learn: Key issues plaguing the information security, network security, and computer forensics. Fundamentals of networks and various components of the OSI and TCP/IP model. Various network security protocols. Various types of information security threats and attacks, and their countermeasures. Social engineering techniques, identify theft, and social engineering countermeasures. Different stages of the hacking cycle Identification, authentication, and authorization concepts Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypot. Fundamentals of IDS and IDS evasion techniques. Data backup techniques and VPN security. Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security. Different types of web server and web application attacks, and countermeasures. Fundamentals of ethical hacking and pen testing. Incident handling and response process. Cyber-crime and computer forensics investigation methodology. Different types of digital evidence and digital evidence examination process. Different type of file systems and their comparison (based on limit and features). Gathering volatile and non-volatile information from Windows and network forensics analysis mechanism. Steganography and its techniques. Different types of log capturing, time synchronization, and log capturing tools. E-mails tracking and e-mail crimes investigation. Writing investigation report. This is an entry-level security program covering the fundamental concepts and giving a holistic overview of the key components of information security, computer forensics, and network security. Course Outline Information Security Fundamentals Networking Fundamentals Secure Network Protocols Information Security Threats and Attacks Social Engineering Hacking Cycle Identification, Authentication, and Authorization Cryptography Firewalls Intrusion Detection System Data Backup Virtual Private Network Wireless Network Security Web Security Ethical Hacking and Pen Testing Incident Response Computer Forensics Fundamentals Digital Evidence Understanding File Systems Windows Forensics Network Forensics and Investigating Network Traffic Steganography Analyzing Logs E-mail Crime and Computer Forensics Writing Investigative Report Additional course details: Nexus Humans EC-Council Certified Security Specialist (ECSS) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Security Specialist (ECSS) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Security Specialist (ECSS)
Delivered OnlineFlexible Dates
Price on Enquiry

AZ-020T00 - Microsoft Azure solutions for AWS Developers

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Students in this course are experienced AWS developers interested in Azure development. A three-day course designed to teach AWS (Amazon Web Services) developers how to prepare end-to-end solutions in Microsoft Azure. In this course you will construct Azure App Service Web App solutions and Azure Functions, use blob or Cosmos DB storage in solutions, implement secure cloud solutions that include user authentication and authorization, implement API management, and develop event- and message-based solutions, and monitor, troubleshoot, and optimize your Azure solutions. You will learn how developers use Azure services, with additional focus on features and tasks that differ from AWS, and what that means for you as you develop applications that will be hosted by using Azure services Create Azure App Service Web Apps Azure App Service core concepts Creating an Azure App Service Web App Configuring and Monitoring App Service apps Scaling App Service apps Azure App Service staging environments Implement Azure functions Azure Functions overview Developing Azure Functions Implement Durable Functions Develop solutions that use blob storage Azure Blob storage core concepts Managing the Azure Blob storage lifecycle Working with Azure Blob storage Create an Azure Resource Manager Template Develop solutions that use Cosmos DB storage Azure Cosmos DB overview Azure Cosmos DB data structure Working with Azure Cosmos DB resources and data Create and deploy ARM templates Implement user authentication and authorization Microsoft Identity Platform v2.0 Authentication using the Microsoft Authentication Library Using Microsoft Graph Authorizing data operations in Azure Storage Implement secure cloud solutions Manage keys, secrets, and certificates by using the KeyVault API Implement Managed Identities for Azure resources Secure app configuration data by using Azure App Configuration Implement API Management API Management overview Defining policies for APIs Securing your APIs Develop event-based solutions Implement solutions that use Azure Event Grid Implement solutions that use Azure Event Hubs Implement solutions that use Azure Notification Hubs Develop message-based solutions Implement solutions that use Azure Service Bus Implement solutions that use Azure Queue Storage queues Monitor and optimize Azure solutions Overview of monitoring in Azure Instrument an app for monitoring Analyzing and troubleshooting apps Implement code that handles transient faults Additional course details: Nexus Humans AZ-020T00 - Microsoft Azure solutions for AWS Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-020T00 - Microsoft Azure solutions for AWS Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-020T00 - Microsoft Azure solutions for AWS Developers
Delivered OnlineFlexible Dates
Price on Enquiry

WM646 IBM Integration Bus V10 System Administration

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for IBM Integration Bus administrators and developers who administer IBM Integration Bus. Overview After completing this course, you should be able to:Install and configure an IBM Integration Bus instanceEstablish, maintain, and manage an integration nodeAdminister IBM Integration Bus components and message flow applications by using the IBM Integration web user interface and command interfaceConfigure connectivity to IBM MQ to enable IBM Integration Bus to get messages from, or put messages to, queues on a local or remote queue managerImplement IBM Integration Bus administration and message flow securityUse problem determination aids to diagnose and solve development and runtime errorsUse the IBM Integration web user interface to generate and display message flow statisticsUse IBM MQ or MQTT to publish and subscribe to IBM Integration Bus topicsImplement an IBM Integration Bus global cache to store, reuse, and share data between integration nodesUse workload management policies to adjust the processing speed of messages and control the actions that are taken on unresponsive flows and threadsUse the IBM Integration web user interface and a database to record events and replay messagesEnable an integration node to connect to a database with ODBC and JDBCConfigure a Java Message Services (JMS) provider for use with the JMS nodesConfigure IBM Integration Bus for the secure file transfer protocol (SFTP)Find and install IBM Integration Bus SupportPac components In this course, students learn how to administer IBM Integration Bus on distributed operating systems, such as Windows and AIX, by using the IBM Integration Bus administrative interfaces. Course Outline Course introduction IBM Integration Bus overview Product installation, configuration, and security planning Exercise: Integration node setup and customization Connecting to IBM MQ Exercise: Connecting to IBM MQ Administration in the IBM Integration Toolkit Exercise: Using the IBM Integration Toolkit Administration basics Exercise: Administering the IBM Integration Bus runtime components Implementing IBM Integration Bus administration security Exercise: Using file-based security to control administration access Exercise: Using queue-based security to control administration access Implementing IBM Integration Bus message flow security Administering web services and web service security Exercise: Implementing web services and web services security Diagnosing problems Exercise: Using problem diagnosis tools Exercise: Identifying runtime problems Monitoring the integration node and message flow performance Publish/subscribe implementation overview Exercise: Viewing runtime statistics Configuring IBM Integration Bus for high availability Exercise: Administering workload management policies Monitoring, recording, and replaying message flow events Exercise: Recording and replaying message flow data Extending IBM Integration Bus Course summary Additional course details: Nexus Humans WM646 IBM Integration Bus V10 System Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM646 IBM Integration Bus V10 System Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM646 IBM Integration Bus V10 System Administration
Delivered OnlineFlexible Dates
Price on Enquiry

Building Data Lakes on AWS

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake architectures. Module 1: Introduction to data lakes Describe the value of data lakes Compare data lakes and data warehouses Describe the components of a data lake Recognize common architectures built on data lakes Module 2: Data ingestion, cataloging, and preparation Describe the relationship between data lake storage and data ingestion Describe AWS Glue crawlers and how they are used to create a data catalog Identify data formatting, partitioning, and compression for efficient storage and query Lab 1: Set up a simple data lake Module 3: Data processing and analytics Recognize how data processing applies to a data lake Use AWS Glue to process data within a data lake Describe how to use Amazon Athena to analyze data in a data lake Module 4: Building a data lake with AWS Lake Formation Describe the features and benefits of AWS Lake Formation Use AWS Lake Formation to create a data lake Understand the AWS Lake Formation security model Lab 2: Build a data lake using AWS Lake Formation Module 5: Additional Lake Formation configurations Automate AWS Lake Formation using blueprints and workflows Apply security and access controls to AWS Lake Formation Match records with AWS Lake Formation FindMatches Visualize data with Amazon QuickSight Lab 3: Automate data lake creation using AWS Lake Formation blueprints Lab 4: Data visualization using Amazon QuickSight Module 6: Architecture and course review Post course knowledge check Architecture review Course review Additional course details: Nexus Humans Building Data Lakes on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Data Lakes on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Data Lakes on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

WM156G IBM MQ V9.1 System Administration (using Windows for labs)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technical professionals who require the skills to administer IBM MQ. Overview After completing this course, you should be able to: Describe the IBM MQ deployment options Create and manage queue managers, queues, and channels Use the IBM MQ sample programs and utilities to test the IBM MQ network Configure distributed queuing Configure MQ client connections to a queue manager Define and administer a queue manager cluster Administer Java Message Service (JMS) in MQ Implement basic queue manager restart and recovery procedures Use IBM MQ troubleshooting tools to identify the cause of a problem in the IBM MQ network Manage IBM MQ security Monitor the activities and performance of an IBM MQ system This course is also available as self-paced virtual (e-learning) course IBM MQ V9.1 System Administration (ZM156G). This option does not require any travel.This course teaches you how to customize, operate, administer, and monitor IBM MQ on-premises on distributed operating systems. The course covers configuration, day-to-day administration, problem recovery, security management, and performance monitoring. In addition to the instructor-led lectures, the hands-on exercises provide practical experience with distributed queuing, working with MQ clients, and implementing clusters, publish/subscribe messaging. You also learn how to implement authorization, authentication, and encryption, and you learn how to monitor performance. Introducing IBM MQ Exercise Getting started with IBM MQ Working with IBM MQ administration tools Exercise Working with IBM MQ administration tools Configuring distributed queuing Exercise Implementing distributed queuing Managing clients and client connections Exercise Connecting an IBM MQ client Advanced IBM MQ client features Working with queue manager clusters Exercise Implementing a basic cluster Publish/subscribe messaging Exercise Configuring publish/subscribe message queuing Implementing basic security in IBM MQ Exercise Controlling access to IBM MQ Securing IBM MQ channels with TLS Exercise Securing channels with TLS Authenticating channels and connections Exercise Implementing connection authentication Supporting JMS with IBM MQ Diagnosing problems Running an IBM MQ trace Backing up and restoring IBM MQ messages and object definitions Using a media image to restore a queue Backing up and restoring IBM MQ object definitions High availability Monitoring and configuring IBM MQ for performance Monitoring IBM MQ for performance Monitoring resources with the IBM MQ Console Additional course details: Nexus Humans WM156G IBM MQ V9.1 System Administration (using Windows for labs) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the WM156G IBM MQ V9.1 System Administration (using Windows for labs) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

WM156G IBM MQ V9.1 System Administration (using Windows for labs)
Delivered OnlineFlexible Dates
Price on Enquiry