• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3 Flux courses in Glasgow

Advanced Satellite communications

5.0(3)

By Systems & Network Training

Satellite communications training course description This course starts by recaping some of the essential satellite knowledge required and proceeds to explore the deeper aspects of satellite communications, including hardware, communications and error control coding. What will you learn Explain how satellite communications work. Explain how RF works Explain the architecture of satellite systems. Use spectrum analysers. Satellite communications training course details Who will benefit: Anyone working with satellite systems. Prerequisites: None. Duration 3 days Satellite communications training course contents Basic Principles of Satellite Communications GEO, MEO and LEO satellites. Launching and orbits. Frequency bands and polarisation. Satellite footprints. Multibeam coverage. Power spectra. Link budgets. Modulation and coding. Access technologies. Earth station components. Space segment components. Satellite system services. Satellite operators. Radio frequency propagation Electromagnetic waves principles and generation. Reception of the EM wave. Space wave, sky wave and surface wave theory. The isotropic radiator. Types of antennae and their basic properties. Polar diagrams. International frequency allocation. Spectrum management and utilisation. Radio wave propagation. Line of sight propagation. Propagation for satellite comms. Free space path loss. Path attenuation. Noise and Interference. Power and its measurement. Satellite antennae and other hardware Power flux density. Effective aperture. Horn antennae. Parabolic reflector. Offset feed. Cassegrain and Gregorian antennae. Antenna feed systems - Horn, TMC, OMJ and polarizer. Antenna steering and mount systems. Array antennae. LNA, LNB, LNC. Microwave tubes - TWT and Klystron. Polarizers. Earth and Space Segments and the link Earth station antennae. Transponders. Antennae sub systems. Power supplies. Link budgets. System noise. System losses. Interference. Satellite switching. Ground Communications Equipment Baseband signals. Analogue and Digital systems. Overview of modulation - AM, FM, PM. Digital Modulation. Frequency conversion -up and down conversion. Filters, mixers, local oscillators, IF amplifiers and group delay equalisers. Access methods - single and multiple access systems. Data networks. Television transmission - analogue and digital. Digital signal compression. MPEG processing. Satellite Navigation Longitude, latitude, altitude, GPS, How GPS works, timing, alternatives to GPS. Mobile satellite services Voice and Phones, BGAN, TV, GPS to program aerial, VSAT. Error Control Coding The need for coding. Linear block codes. Cyclic codes. Convolution codes. Interleaving and concatenated codes. Coding gain. Turbo codes. Test and measurement Theory and practice of Spectrum Analysers.

Advanced Satellite communications
Delivered in Internationally or OnlineFlexible Dates
£4,997

Managers at all levels have to be able to introduce, lead and manage change to ensure the organisational objectives of change are met.

Managing Change
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£378

Electrical Generators, Excitation Systems and Governing Systems

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 5 full-day course provides a comprehensive understanding of the various types of generators, exciters, automatic voltage regulators (AVRs), governing systems, and protective systems. The focus will be on maximizing the efficiency, reliability and longevity of these equipment by providing an understanding of the characteristics, selection criteria, common problems and repair techniques, preventive and predictive maintenance. The emphasis of this course is on protective systems, inspection methods, diagnostic testing, troubleshooting, modern maintenance techniques, refurbishment, rewind and upgrade options, as well as advanced methods for preventing partial discharge and other failures. Training Objectives Equipment Operation: Gain a thorough understanding of the operating characteristics of generators, exciters, AVR's and protective systems Equipment Diagnostics and Inspection: Learn in detail all the diagnostic techniques and inspections required of critical components of generators, exciters, AVR's and protective systems Equipment Testing: Understand thoroughly all the tests required for the various types of generators, exciters, AVR's and protective systems Electrical Generator Protective Systems: Gain a thorough understanding of all Electrical generator protective systems including: all electrical relays, tripping mechanisms, protective systems for negative phase sequence (unbalance loading), loss of excitation, over fluxing protection (over-voltage and underfrequency), reverse power (generator monitoring), over-speeding, pole slipping / out of step (sudden increase in torque or weakness in excitation), Class A protection, Class B protection Equipment Maintenance and Troubleshooting: Determine all the maintenance and troubleshooting activities required to minimize the downtime and operating cost of generators, exciters, AVR's and protective systems Equipment Repair and Refurbishment: Gain a detailed understanding of the various methods used to repair and refurbish generators, exciters, AVR's and protective systems Equipment Rewind and Upgrade Options: Discover all options available to rewind and upgrade the generator rotor and stator to enhance the output and reduce downtime Efficiency, Reliability, and Longevity: Learn the various methods used to maximize the efficiency, reliability, and longevity of generators, exciters, AVR's and protective systems Advanced Methods to Prevent Failure: Gain a thorough understanding of all the methods used to prevent partial discharge, and other failures in generators, exciters, AVR's and protective systems Equipment Sizing: Gain a detailed understanding of all the calculations and sizing techniques used for generators, exciters, AVR's and protective systems Design Features: Understand all the design features that improve the efficiency, reliability of generators, exciters, AVR's and protective systems Equipment Selection: Learn how to select generators, exciters, AVR's and protective systems by using the performance characteristics and selection criteria that you will learn in this course Equipment Enclosures and Sealing Methods: Learn about the various types of enclosures and sealing arrangements used for generators, exciters, AVR's and protective systems Equipment Commissioning: Understand all the commissioning requirements for generators, exciters, AVR's and protective systems Equipment Codes and Standards: Learn all the codes and standards applicable for generators, exciters, AVR's and protective systems Equipment Causes and Modes of Failures: Understand causes and modes of failures of generators, exciters, AVR's and protective systems System Design: Learn all the requirements for designing different types of generators, exciters, AVR's and protective systems Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: ELECTRICAL EQUIPMENT HANDBOOK' published by McGraw-Hill in 2003 (600 pages) Generator Inspection, Testing, Maintenance, Protective Systems and Refurbishment Manual (this manual covers all the inspection and maintenance activities as well as all protective systems required for generators - 400 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Electrical Generators, Excitation Systems and Governing Systems
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Online Options

Show all 26

Mastering React | React Foundation (TT4195)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This introductory-level, fast-paced course is for skilled web developers new to React who have prior experienced working HTML5, CSS3 and JavaScript. Overview Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore: A basic and advanced understanding of React components An advanced, in-depth knowledge of how React works A complete understanding of using Redux How to build, validate, and populate interactive forms How to use inline styles for perfect looking components How to test React components How to build and use components How to get control of your build process A deep understanding of data-driven modeling with props and state How to use client-side routing for pages in your apps How to debug a React application Mastering React is a comprehensive hands-on course that aims to be the single most useful resource on getting up to speed quickly with React. Geared for more experienced web developers new to React, this course provides students with the core knowledge and hands-on skills they require to build reliable, powerful React apps. After the first few modules, you?ll have a solid understanding of React?s fundamentals and will be able to build a wide array of rich, interactive web apps with the framework. The first module is an introduction to the new functionality in ECMAScript 6 (JavaScript). Client-side routing between pages, managing complex state, and heavy API interaction at scale are also covered. This course consists of two parts. In the first part of the course students will explore all the fundamentals with a progressive, example-driven approach. You?ll create your first apps, learn how to write components, start handling user interaction, and manage rich forms. We end the first part by exploring the inner workings of Create React App (Facebook?s tool for running React apps), writing automated unit tests, and building a multi-page app that uses client-side routing. The latter part of the course moves into more advanced concepts that you?ll see used in large, production applications. These concepts explore strategies for data architecture, transport, and management: Redux is a state management paradigm based on the Flux architecture. Redux provides a structure for large state trees and allows you to decouple user interaction in your app from state changes. GraphQL is a powerful, typed, REST API alternative where the client describes the data it needs. Hooks is the powerful, new way to maintain state and properties with functional components and the future of React according to Facebook. ES6 Primer (Optional) Prefer const and let over var Arrow functions Modules Object.assign() Template literals The spread operator and Rest parameters Enhanced object literals Default arguments Destructuring assignments Your first React Web Application Setting up your development environment JavaScript ES6 /ES7 Getting started What?s a component? Our first component Building the App Making the App data-driven Your app?s first interaction Updating state and immutability Refactoring with the Babel plugin transform-class-properties JSX and the Virtual DOM React Uses a Virtual DOM Why Not Modify the Actual DOM? What is a Virtual DOM? Virtual DOM Pieces ReactElement JSX JSX Creates Elements JSX Attribute Expressions JSX Conditional Child Expressions JSX Boolean Attributes JSX Comments JSX Spread Syntax JSX Gotchas JSX Summary Components A time-logging app Getting started Breaking the app into components The steps for building React apps from scratch Updating timers Deleting timers Adding timing functionality Add start and stop functionality Methodology review Advanced Component Configuration with props, state, and children ReactComponent props are the parameters PropTypes Default props with getDefaultProps() context state Stateless Components Talking to Children Components with props.children Forms Forms 101 Text Input Remote Data Async Persistence Redux Form Modules Unit Testing & Jest Writing tests without a framework What is Jest? Using Jest Testing strategies for React applications Testing a basic React component with Enzyme Writing tests for the food lookup app Writing FoodSearch.test.js Routing What?s in a URL? React Router?s core components Building the components of react-router Dynamic routing with React Router Supporting authenticated routes Intro to Flux and Redux Why Flux? Flux is a Design Pattern Flux implementations Redux & Redux?s key ideas Building a counter The core of Redux The beginnings of a chat app Building the reducer() Subscribing to the store Connecting Redux to React Intermediate Redux Using createStore() from the redux library Representing messages as objects in state Introducing threads Adding the ThreadTabs component Supporting threads in the reducer Adding the action OPEN_THREAD Breaking up the reducer function Adding messagesReducer() Defining the initial state in the reducers Using combineReducers() from redux React Hooks Motivation behind Hooks How Hooks Map to Component Classes Using Hooks Requires react 'next' useState() Hook Example useEffect() Hook Example useContext() Hook Example Using Custom Hooks Using Webpack with Create React App JavaScript modules Create React App Exploring Create React App Webpack basics Making modifications Hot reloading; Auto-reloading Creating a production build Ejecting Using Create React App with an API server When to use Webpack/Create React App Using GraphQL Your First GraphQL Query GraphQL Benefits GraphQL vs. REST GraphQL vs. SQL Relay and GraphQL Frameworks Chapter Preview Consuming GraphQL Exploring With GraphiQL GraphQL Syntax 101 . Complex Types Exploring a Graph Graph Nodes ; Viewer Graph Connections and Edges Mutations Subscriptions GraphQL With JavaScript GraphQL With React

Mastering React | React Foundation (TT4195)
Delivered OnlineFlexible Dates
Price on Enquiry

React JS Online Course

By React Masters

Best React Training in Hyderabad with 100% placement assistance. React Masters Institute offers online course on HTML, CSS, JavaScript, React js.

React JS Online Course
Delivered Online On Demand9 weeks
£350

Educational Technology Course

3.5(2)

By Elearncollege

Description Educational Technology Diploma Introducing the Educational Technology Diploma, a comprehensive online course meticulously crafted to guide learners through the dynamic realm of educational technology. This course promises to offer students profound insights into the ever-evolving world of tech-driven education. A blend of theory and practical understanding, it strives to produce individuals who are not only well-versed in educational technology but can also adeptly implement these learnings in real-world scenarios. The course begins with an 'Introduction to Educational Technology', giving students a holistic understanding of the field's nuances. As the journey progresses, one will uncover the 'Theories and Models of Educational Technology'. These foundational concepts ensure that students understand the principles and practices that govern this domain. No educational technology course would be complete without exploring the tangible and intangible tools. With 'Hardware and Software in Educational Technology', learners are introduced to the core technical components, and their educational applications. The next step in this digital adventure is understanding 'The Internet and Digital Literacy'. In the digital age, it is imperative for educators to be internet-savvy and understand the intricacies of digital literacy. With the rise in smartphone usage, 'Mobile Learning and Educational Apps' has seen an unprecedented surge. This course segment guides learners on harnessing the power of mobile devices to enhance the learning experience. On a similar note, 'Social Media and Collaboration Tools' enlightens students about the potential of social media in education. From fostering collaboration to enhancing engagement, social media brings a new dimension to modern-day teaching methods. The Educational Technology Diploma also sheds light on the exciting world of 'Gamification and Game-based Learning'. Engaging and interactive, this module introduces techniques to make learning enjoyable and retention-focused. The subsequent section, 'Learning Analytics and Data-Driven Instruction', provides a deep understanding of how data can inform teaching strategies, helping educators personalise the learning journey for each student. 'E-Learning and Distance Learning' is undeniably one of the most pertinent topics today. The course walks students through the methodologies and strategies to create effective e-learning modules, ensuring learners remain engaged and motivated despite physical distances. Finally, the course culminates with 'Future of Educational Technology'. As the landscape of education and technology is in constant flux, this section propels learners into the possible advancements and innovations that the future might hold. It encourages students to think ahead, ensuring that they remain at the forefront of educational technology advancements. To summarise, the Educational Technology Diploma is more than just an online course; it is a gateway to the future of education. This meticulously designed curriculum guarantees that upon completion, learners will be armed with the knowledge and skills required to navigate and innovate in the digital education arena. Enrol today to embark on this enlightening journey into the world of educational technology. What you will learn 1:Introduction to Educational Technology 2:Theories and Models of Educational Technology 3:Hardware and Software in Educational Technology 4:The Internet and Digital Literacy 5:Mobile Learning and Educational Apps 6:Social Media and Collaboration Tools 7:Gamification and Game-based Learning 8:Learning Analytics and Data-Driven Instruction 9:E-Learning and Distance Learning 10:Future of Educational Technology Course Outcomes After completing the course, you will receive a diploma certificate and an academic transcript from Elearn college. Assessment Each unit concludes with a multiple-choice examination. This exercise will help you recall the major aspects covered in the unit and help you ensure that you have not missed anything important in the unit. The results are readily available, which will help you see your mistakes and look at the topic once again. If the result is satisfactory, it is a green light for you to proceed to the next chapter. Accreditation Elearn College is a registered Ed-tech company under the UK Register of Learning( Ref No:10062668). After completing a course, you will be able to download the certificate and the transcript of the course from the website. For the learners who require a hard copy of the certificate and transcript, we will post it for them for an additional charge.

Educational Technology Course
Delivered Online On Demand9 days
£99

Julia Programming Language - From Zero to Expert

By Packt

In the fast-paced world of data science and machine learning, you have to stay up-to-date and keep ahead of the competition. For this, you have to constantly be on the lookout for the latest trends in tools and techniques for data science and machine learning. You don't want to miss out on the latest trend and the tool of the future! Right now, that tool is the Julia programming language. It's the hot new language that all ML and data science experts are very excited about. Learning Julia will open up several doors for you in your career!

Julia Programming Language - From Zero to Expert
Delivered Online On Demand3 hours 31 minutes
£68.99

Attacking and Securing Java / JEE Web Applications (TT8320-J)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real

Attacking and Securing Java / JEE Web Applications (TT8320-J)
Delivered OnlineFlexible Dates
Price on Enquiry

Attacking and Securing .Net Web Applications (TT8320-N)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services

Attacking and Securing .Net Web Applications (TT8320-N)
Delivered OnlineFlexible Dates
Price on Enquiry

Finance and Corporate Finance - QLS Level 3 & 4

By Imperial Academy

2 QLS Endorsed Courses | CPD Certified | Free PDF & Hard Copy QLS Certificates | 180 CPD Points | Lifetime Access

Finance and Corporate Finance - QLS Level 3 & 4
Delivered Online On Demand
£150

VMware Tanzu Mission Control: Management and Operations 2024

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Administrators or application owners who are responsible for deploying and managing Kubernetes clusters and workloads Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create and manage Kubernetes clusters Control access Create image registry, network, quota, security, custom and mutation policies Connect your on-premises vSphere with Tanzu Supervisor to VMware Tanzu Mission Control Create, manage, and back up VMware Tanzu Kubernetes Grid™ clusters Create and manage Amazon Elastic Kubernetes Service clusters Perform cluster inspections Manage packages in your clusters Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply image registry, network, security, quota, custom, and mutation policies to Kubernetes environments. It focuses on how to deploy, upgrade, back up, and monitor Kubernetes clusters on VMware vSphere© with VMware Tanzu©, and it also covers package management using the VMware Tanzu Mission Control catalog. Course Introduction Introduction and course logistics Course Objectives What Is VMware Tanzu Mission Control Describe VMware Tanzu Mission Control Describe vSphere with Tanzu Describe Tanzu Kubernetes Grid Describe VMware Tanzu© for Kubernetes Operations Explain how to request access to VMware Tanzu Mission Control Describe VMware Cloud? services Describe the VMware Cloud services catalog Explain how to access VMware Tanzu Mission Control Identify the components of VMware Tanzu Mission Control Explain the resource hierarchy of VMware Tanzu Mission Control Access, Users, and Groups Explain VMware Cloud services and enterprise federation Describe VMware Cloud services roles Explain multifactor authentication Describe the VMware Tanzu Mission Control UI List the components of the VMware Tanzu Mission Control UI Describe the VMware Tanzu CLI Describe the VMware Tanzu Mission Control API Cluster Lifecycle Management Outline the steps for registering a management cluster to VMware Tanzu Mission Control Discuss what a management cluster is Describe provisioners Explain the purpose of a cloud provider account Describe Amazon Elastic Kubernetes Service Describe Azure Kubernetes Service Workload Clusters Describe Tanzu Kubernetes Grid workload clusters Explain how to create a cluster Explain how to configure a cluster Describe Amazon Elastic Kubernetes Service workload clusters Describe Azure Kubernetes Service workload clusters Explain how to attach a Kubernetes cluster Explain how to verify the connections to the cluster Describe cluster health Policy Management Explain how access policies grant users access to different resources Describe the policy model Describe the available policy types Explain how image registry policies restrict from which image registries container images can be pulled Outline how network policies are applied to clusters Discuss how security policies control deployment of pods in a cluster Discuss how quota policies manage resource consumption in your clusters Discuss how custom policies implement specialized policies that govern your Kubernetes clusters Describe mutation policies Explain how Policy Insights reports VMware Tanzu Mission Control policy issues Control Catalog Describe the VMware Tanzu Mission Control catalog Explain how to install packages Describe cert-manager Explain Service Discovery and ExternalDNS Describe Multus CNI and Whereabouts Describe Fluent-Bit Explain Prometheus and Grafana Describe Harbor Describe Flux Describe Helm Describe Git repositories Tanzu Mission Control Day 2 Operations Describe data protection Describe cluster inspections Explain life cycle management Describe VMware Aria Operations? for Applications Discuss VMware Tanzu© Service Mesh? Advanced edition Describe VMware Aria Cost? powered by CloudHealth©

VMware Tanzu Mission Control: Management and Operations 2024
Delivered OnlineFlexible Dates
Price on Enquiry