• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

307 History courses in Saltash delivered Live Online

Continuous Delivery Ecosystem Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for #NAME? Overview The learning objectives for CDA include a practical understanding of: Goals, history, terminology, and pipeline The importance, practices, and transformation of a DevOps collaborative culture Design practices, such as modular design and microservices Continuous Integration (Cl), such as version control, builds, and remediation Tenets and best practices of Continuous Testing (CT) Continuous Delivery and Deployment (CD): packaging, containers, and release Continuous Monitoring (CM): monitoring and analysis infrastructure, process, and apps Infrastructure and tools: frameworks, tools, and infrastructure as code Security Assurance: DevSecOps The opportunity to hear and share real-life scenarios This course is designed for participants who are engaged in the design, implementation, and management of DevOps deployment pipelines and toolchains that support Continuous Integration, Continuous Delivery, Continuous Testing and potentially Continuous Deployment. The course highlights underpinning processes, metrics, APls and cultural considerations with Continuous Delivery. Key benefits of Continuous Delivery will be covered including increased velocity to assist organizations to respond to market changes rapidly, thus being able to outmaneuver competition, reduce risk and lower costs while releasing higher quality solutions. Increased productivity and employee morale by having more activities performed by pipelines instead of humans so teams can focus on vision while pipelines do the execution.This course prepares you for the Continuous Delivery Ecosystem Foundation(CDEF) certification. Course Introduction Course goals Course agenda CDA Concepts Continuous delivery (CD) definition Architecting for continuous delivery Continuous delivery and DevOps Relationships between CD, Waterfall, Agile, ITIL, and DevOps Benefits of continuous delivery CDA Culture Importance of culture to the CD Architect What a CD Architect can do about culture How to maintain culture Assignment: DevOps culture and practices to create flow Design Practices for Continuous Delivery Why design is important to continuous delivery CD Architect?s role in design Key design principles CD best practices Microservices and containers Continuous Integration Continuous integration (CI) defined CD Architect?s role in CI Importance of CI Benefits of CI CI best practices Assignment: Optimizing CI workflows Continuous Testing Continuous testing (CT) defined Importance of CT Benefits of CT CD Architect?s role in CT Five tenets of CT CT best practices Assignment: Handling environment inconsistencies Continuous Delivery and Deployment Continuous delivery defined Continuous deployment defined Benefits of continuous delivery and deployment CD Architect?s role in continuous delivery and deployment Continuous delivery and deployment best practices Assignment: Distinguishing continuous delivery and deployment Continuous Monitoring Continuous monitoring defined Importance of continuous monitoring CD Architect?s role in continuous monitoring Continuous monitoring best practices Assignment: Monitoring build progress Infrastructure and Tools Importance of infrastructure and tools CD Architect?s role in infrastructure and tools Building a DevOps toolchain Infrastructure/tools best practices Assignment: identifying common infrastructure/tool components Security Assurance Importance of security assurance DevSecOps and Rugged DevOps defined CD Architect?s role in security Security best practices Assignment: Applying security practices Capstone exercise Identifying toolchain and workflow improvements Summary Additional Sources of Information Exam Preparations Exam requirements Sample exam review

Continuous Delivery Ecosystem Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Cybersecurity Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety. Overview After completing this course, students will be able to: Identify and reduce human errors that put organizations at risk for a cyber-attacks. Define Ransomware, Phishing, and Data Breaches to understand the differences. Identify the motives of hackers. Assess how data breaches occur. Develop a plan on how to protect accounts and privacy. Create a strong and secure password. Work in a secure manner while using remote Wi-Fi access. Safely use Virtual Private Networks (VPN). Identify vulnerabilities in home networks to keep them secure. Identity different social engineering techniques e.g. phishing, vishing. Detect social engineering attempts and prevent potential breaches. Prevent hackers from accessing a Mobile phone. Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats. INTRODUCTION TO CYBERSECURITY Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks. ACCOUNTS & CREDENTIALS SECURITY One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords. REMOTE SECURITY: WI-FI & VPN Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments. SOCIAL ENGINEERING How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches. MOBILE SECURITY Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more. Additional course details: Nexus Humans Cybersecurity Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cybersecurity Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cybersecurity Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Web Essentials | Introduction to HTML5, CSS3 and Responsive Design (TT4002)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This Introductory-level course is targeted for aspiring web developers who have software development experience or background. The course can also be adjusted for non-developers upon request. Overview This 'skills-focused' course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Introduction to HTML5/ CSS3 and Responsive Design Basics is a hands-on basic web development course geared for developers who need to understand what the latest in web technologies and responsive design practices that are central to targeting the entire spectrum of user platforms and browsers. This comprehensive course provides a balanced mixture of theory and practical labs designed to take students through HTML5 and CSS3. Students who attend this course will leave this course armed with the new skills to design, implement, and deploy robust, flexible, and safe web applications. HTML Define HTML and review its history Look at XHTML and its relationship to HTML Identify HTML limitations and improvements HTML5 HTML5 Overview HTML5 Semantic Structure HTML5 Forms HTML5 Media Delivery CSS Learn the basics of CSS Meaning of cascading in CSS Declaring CSS within your HTML page Creating styles in an external CSS file Control how to display and position HTML elements Overriding standard tag behavior Adding new classes Using custom classes in your page CSS3 Overview What is new in CSS3 The Advantages of CSS3 Browser Support for CSS3 CSS3 Advanced Selectors Selecting Using Attributes Selecting Using DOM Structure Complex Selecting using Pseudo-Classes Selecting Using UI Components and State CSS3 Visual Effects Font Options, Opacity, and Color Distributing Content Across Columns Working with Borders and Boxes Working with Vendor Prefixes Functional Techniques HTML5 JavaScript API Cross-Domain Messaging Working with Web Storage Offline with Application Cache Geolocation: What, Why, and How Responsive Web Design (RWD) Adapting to Varying Screen Sizes Scaling Page and Text Content Scaling and Adapting for Media Options for Adjusting Media Additional course details: Nexus Humans Web Essentials | Introduction to HTML5, CSS3 and Responsive Design (TT4002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Web Essentials | Introduction to HTML5, CSS3 and Responsive Design (TT4002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Web Essentials | Introduction to HTML5, CSS3 and Responsive Design (TT4002)
Delivered OnlineFlexible Dates
Price on Enquiry

Blockchain Architecture Training

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Technical Leaders Overview What is BlockchainHow does Blockchain workTypes of BlockchainsHow is Blockchain different from what we have todayWhat are use cases for BlockchainWhat does a Blockchain app look likeHow do I design a Blockchain appHow do I develop a Blockchain appHow do I test a Blockchain app This instructor-led 3 day Blockchain Architecture training is for technical leaders who need to make decisions about architecture, environment, and development platforms. What is Blockchain? A record keeping system Trust Decentralization Trustless environment How does Blockchain work? Announcements Blocks Nodes Chaining Verification Consensus Scalability Privacy Crypto Hashing Digital Fingerprinting PoW vs PoS Types of Blockchains Public vs Private Open vs closed Smart Contracts Blockchain as History Tokens / Coins Gas How is Blockchain different from what we have today? Decentralized Peer-to-peer architecture Software vs Firmware Database vs Blockchain Distributed database or other technology? Data Sovereignty Group Consensus What are Use Cases for Blockchain? Use Case Examples Currency Banking Services Voting Medical Records Supply Chain / Value Chain Content Distribution Verification of Software Updates (cars, planes, trains, etc) Law Enforcement Title and Ownership Records Social Media and Online Credibility Fractional asset ownership Cable Television billing High fault tolerance DDoS-proof Public or Private Blockchain? Who are the participants? What does a Blockchain app look like? DApp Resembles typical full stack web application Any internal state changes and all transactions are written to the blockchain Node.js IDE Public Blockchain visibility Private Blockchain solutions Oracles How do I design a Blockchain app? What does this solution need to let users do? Will the proposed solution reduce or remove the problems and pain points currently felt by users? What should this solution prevent users from doing? Do you need a solution ready for heavy use on day 1? Is your solution idea enhanced by the use of Blockchain? Does the use of Blockchain create a better end-user experience? If so, how? Has your business developed custom software solutions before? What level of support are you going to need? How big is the developer community? Does your vision of the future align with the project or platform's vision of the future? Does the platform aim to make new and significant contributions to the development space, or is it an efficiency / cost play? Should the solution be a public or private Blockchain? Should the solution be an open or closed Blockchain? Create a plan for contract updates and changes! Hybrid solutions Monetary exchanges? How do I develop a Blockchain app? AGILE approach pre-release Define guiding principles up front Software vs Firmware Announcements, not transactions! Classes, not contracts Link contracts to share functions Use calling contracts to keep contract address the same Hyperledger vs Ethereum CONSIDER No of Users * Avg No of Transactions (state changes) per User Should a Blockless solution be applied? Performance Security Anonymity Security Monolithic vs Modular Sandwich complexity model How do I test a Blockchain app? Recommend 5x to 10x traditional application testing time Security Networks

Blockchain Architecture Training
Delivered OnlineFlexible Dates
Price on Enquiry

Site Reliability Engineering (SRE) Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the SRE Foundation course are professionals including. Anyone starting or leading a move towards increased reliability. Anyone interested in modern IT leadership and organizational change approaches. Business Managers, Business Stakeholders, Change Agents, Consultants, DevOps Practitioners, IT Directors, IT Managers, IT, Team Leaders, Product Owners, Scrum Masters, Software Engineers, Site Reliability Engineers, System Integrators, Tool Providers will benefit from this course. Overview The learning objectives for the SRE Foundation course include a practical understanding of. The history of SRE and its emergence at Google. The inter-relationship of SRE with DevOps and other popular frameworks. The underlying principles behind SRE Service Level Objectives (SLO's) and their user focus Service Level Indicators (SLI's) and the modern monitoring landscape. Error budgets and the associated error budget policies. Toil and its effect on an organization's productivity. Some practical steps that can help to eliminate toil. Observability as something to indicate the health of a service SRE tools. Automation techniques and the importance of security. Anti-fragility, our approach to failure and failure testing. The organizational impact that introducing SRE brings. The SRE (Site Reliability Engineering) Foundation course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms. This course prepares you for the SRE Foundation (SREF) certification. Course Introduction Course Goals Course Agenda SRE Principles & Practices What is Site Reliability Engineering? SRE & DevOps: What is the Difference? SRE Principles & Practices Service Level Objectives & Error Budgets Service Level Objectives (SLO?s) Error Budgets Error Budget Policies Reducing Toil What is Toil? Why is Toil Bad? Doing Something About Toil Monitoring & Service Level Indicators Service Level Indicators (SLI?s) Monitoring Observability SRE Tools & Automation Automation Defined Automation Focus Hierarchy of Automation Types Secure Automation Automation Tools Anti-Fragility & Learning from Failure Why Learn from Failure Benefits of Anti-Fragility Shifting the Organizational Balance Organizational Impact of SRE Why Organizations Embrace SRE Patterns for SRE Adoption On-Call Necessities Blameless Post-Mortems SRE & Scale SRE, Other Frameworks, The Future SRE & Other Frameworks The Future Exam Preparations Exam Requirements, Question Weighting, and Terminology List Sample Exam Review Additional course details: Nexus Humans Site Reliability Engineering (SRE) Foundation (DevOps Institute) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Site Reliability Engineering (SRE) Foundation (DevOps Institute) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Site Reliability Engineering (SRE) Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

Value Stream Management Foundation (DevOps Institute)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for People working in an organization aiming to improve performance, especially in response to digital transformation or disruption. Any roles involved in the creation and delivery of products or services: Leadership and CXO, especially CIO, CTO, CPO, and CVO Transformation and evolution leads and change agents Value stream architects, managers, engineers Scrum Masters, agile and DevOps coaches and facilitators Portfolio, product and project managers, and owners Business analysts Architects, developers, and engineers Release and environment managers IT Ops, service and support desk workers Customer experience and success professionals Overview After completing this course, students will be able to: Describe the origins of value stream management and key concepts such as flow, value, and delivery Describe what value stream management is, why it's needed and the business benefits of its practice Describe how lean, agile, DevOps, and ITSM principles contribute to value stream management Identify and describe value streams, where they start and end, and how they interconnect Identify value stream roles and responsibilities Express value streams visually using mapping techniques, define current and target states and hypothesis backlog Write value stream flow and realization optimization hypotheses and experiments Apply metrics such as touch/processing time, wait/idle time, and cycle time to value streams Understand flow metrics and how to access the data to support data-driven conversations and decisions Examine value realization metrics and aligning to business outcomes, and how to sense and respond to them (outcomes versus outputs) Architect a DevOps toolchain alongside a value stream and data connection points Design a continuous inspection and adaptation approach for organizational evolution The Value Stream Management Foundation course from Value Stream Management Consortium, and offered in partnership with DevOps Institute, is an introductory course taking learners through a value stream management implementation journey. It considers the human, process, and technology aspects of this way of working and explores how optimizing value streams for flow and realization positively impacts organizational performance. History and Evolution of Value Stream Management and its Application Value stream management?s origins Definitions of value stream management Flow Lean and systems thinking and practices Agile, DevOps and other frameworks Research and analysis Identifying Value Streams What is a value stream? Identifying value streams Choosing a value stream Digital value streams Value stream thinking Mapping Value Streams Types of maps Value stream mapping The fuzzy front end Artifacts 10 steps to value stream mapping Mapping and management VSM investment case Limitations of value stream mapping Connecting DevOps Toolchains CICD and the DevOps toolchain Value stream management processes Value stream management platforms DevOps tool categories Building an end-to-end DevOps toolchain Common data model and tools integrations Value Stream Metrics The duality of VSM Downtime in technology Lean, DORA and Flow metrics Definition of Done Value metrics Benefits hypotheses Value streams as profit centers KPIs and OKRs Inspecting the Value Stream 3 Pillars of Empiricism Organizational performance Visibility When to inspect Data and discovery Insights and trends Organizing as Value Streams Value stream alignment Team types and topologies Project to product Hierarchy to autonomy Target Operating Model Value stream people Value stream roles Value stream funding Evolving Value Streams Why now? Transitions VSM capability matrix VSM culture iceberg Learning Making local discoveries global improvements Managing value stream interdependencies

Value Stream Management Foundation (DevOps Institute)
Delivered OnlineFlexible Dates
Price on Enquiry

AS24 IBM System Operator Workshop for IBM i

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is intended for the person who has responsibility for daily system operations. Overview Send, display, and respond to messages Use the online help and reference materials Monitor and control job queues, active jobs, and output queues Create and change user profiles Use authorization lists and group profiles Start and stop Power Systems with IBM i Manage system devices, user display stations, and printers Save and restore objects and libraries Monitor job and history logs Diagnose a system problem Order, receive, and install PTFs This course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i Power Systems and IBM i concepts and overview . Reference material and support . Overview of 5250 emulation and help . Overview of System i Navigator . Overview of IBM Navigator for i . Messaging concepts . Messaging with 5250 emulation . Messaging with System i Navigator . Messaging with IBM Navigator for i . CL command concepts . CL commands with 5250 emulation . Concepts: Object, library, and the IFS . Object management with 5250 emulation . Object management with System i Navigator . Object management with IBM Navigator for i . Introduction to work management . Work management with 5250 emulation . Job control with 5250 emulation . Job control with System i Navigator . Job control with IBM Navigator for i . Print concepts . Print control with 5250 emulation . Print control with System i Navigator . Print control with IBM Navigator for i . Starting and stopping the system . System security concepts . System security with 5250 emulation . System security with System i Navigator . System security with IBM Navigator for i . System configuration overview . Configuration with 5250 emulation . Configuration with System i Navigator . Configuration with IBM Navigator for i . Save concepts . Save with 5250 emulation . Save with System i Navigator . Save with IBM Navigator for i . Restore concepts and overview . Problem determination with 5250 emulation . Problem determination with System i Navigator . Overview of the PTF process . PTFs with 5250 Emulation . Class summary . Additional course details: Nexus Humans AS24 IBM System Operator Workshop for IBM i training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AS24 IBM System Operator Workshop for IBM i course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AS24 IBM System Operator Workshop for IBM i
Delivered OnlineFlexible Dates
Price on Enquiry

The Hot Cinematography Course + INTRO to Directing

4.0(1)

By JJFILMworks London Ltd Film School

Course Overview: This course provides in-depth knowledge of cinematography and directing, including the use of different cameras, lighting setups, metering techniques, and creative direction. Students will learn to master key elements of production and post-production processes. Hourly Session Breakdown: 8 one-hour sessions on Skype.

The Hot Cinematography Course + INTRO to Directing
Delivered OnlineFlexible Dates
£449 to £850

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is recommended for technical professionals who support, install, deploy or administer Check Point products. This course is recommended for technical professionals who perform advanced deployment configurations of Check Point products. Overview CCSA Know how to perform periodic administrator tasks. Describe the basic functions of the Gaia operating system. Recognize SmartConsole features, functions, and tools. Understand how SmartConsole is used by administrators to give user access. Learn how Check Point security solutions and products work and how they protect networks. Understand licensing and contract requirements for Check Point security products. Describe the essential elements of a Security Policy. Understand the Check Point policy layer concept. Understand how to enable the Application Control and URL Filtering software. Blades to block access to various applications. Describe how to configure manual and automatic NAT. Identify tools designed to monitor data, determine threats and recognize opportunities for performance improvements. Describe different Check Point Threat Prevention solutions for network attacks. Articulate how the Intrusion Prevention System is configured, maintained and tuned. Understand the Infinity Threat Prevention system. Knowledge about Check Point's IoT Protect. CCSE Provide an overview of the upgrade service and options available. Explain how to perform management upgrade and migration. Articulate the process using CPUSE features. Articulate the purpose and function of Management High Availability. Explain Primary vs Secondary, Active vs Standby and Synchronization. Explain disaster recovery steps in case the primary management server becomes unavailable. Provide overview of Central Deployment in SmartConsole. Articulate an understanding of Security Gateway cluster upgrade methods. Explain about Multi Version Cluster (MVC) upgrades. Discuss Gaia Commands and how they are used. Explain the main processes on s and s. Describe how to work with scripts and SmartTasks to configure automatic actions. Explain the Management Data Plane Separation (MDPS) Explain kernel operations and traffic flow Articulate Dynamic and Updatable Objects in Security Gateways Explain the policy installation flow and files used. Describe the use of policy installation history. Explain concurrent and accelerated install policy. Describe an overview of APIs and ways to use and authenticate. Explain how to make changes in GAIA and management configuration. Explain how to install policy using API. Explain how the SecureXL acceleration technology enhances and optimizes Security Gateway performance. Learn basic concepts and develop skills necessary to administer IT security fundamental tasks. CCSA Outline Configure the Security Management Server. Use the WebUI to run the First Time Wizard. Install the Smart Console. Install the Alpha Gateway using the network detailed in the course topology. Demonstrate how the Security Management Server and Gateway communicate. Test SIC Status. Create multiple administrators and apply different roles and permissions for simultaneous administration. Validate existing licenses for products installed on the network. Create and configure host, network and group objects. Create a simplified Security Policy. Demonstrate how to use Security Zones in policy. Demonstrate how to share a layer between Security Polices. Configure Network Address Translation for server and network objects. Enable Identity Awareness. Deploy user access roles for more granular control of the security Policy. Generate network Traffic and use traffic visibility tools to monitor the data. Use SmartConsole and SmartView Monitor to view status, alerts, and block suspicious traffic. CCSE Outline Prepare for a Security Management Server Upgrade Upgrade the Security Management Server Deploy a Secondary Security Management Server Configure a Distributed Log Server Upgrade a Security Gateway from SmartConsole Work with the Command Line Use Scripts and SmartTasks Configure Dynamic Objects Monitor Traffic Verify Policy Installation and Status Work with Gaia and Management APIs Work with Acceleration Features Configure a Locally Managed Site to Site VPN Configure a Site to Site VPN with an Interoperable Device Configure Remote Access VPN Configure Mobile Access VPN Configure a High Availability Cluster Work with ClusterXL Configure Policy Compliance Deploy SmartEvent

CCSA PlusCCSE Check Point Certified Security Administrator and Expert Bundle
Delivered OnlineFlexible Dates
Price on Enquiry

Deep Learning with Vision Systems (TTAI3040)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is geared for attendees with Intermediate IT skills who wish to learn Computer Vision with tensor flow 2 Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Computer Vision expert instructor, students will learn about and explore how to Build, train, and serve your own deep neural networks with TensorFlow 2 and Keras Apply modern solutions to a wide range of applications such as object detection and video analysis Run your models on mobile devices and web pages and improve their performance. Create your own neural networks from scratch Classify images with modern architectures including Inception and ResNet Detect and segment objects in images with YOLO, Mask R-CNN, and U-Net Tackle problems faced when developing self-driving cars and facial emotion recognition systems Boost your application's performance with transfer learning, GANs, and domain adaptation Use recurrent neural networks (RNNs) for video analysis Optimize and deploy your networks on mobile devices and in the browser Computer vision solutions are becoming increasingly common, making their way into fields such as health, automobile, social media, and robotics. Hands-On Computervision with TensorFlow 2 is a hands-on course that thoroughly explores TensorFlow 2, the brandnew version of Google's open source framework for machine learning. You will understand how to benefit from using convolutional neural networks (CNNs) for visual tasks. This course begins with the fundamentals of computer vision and deep learning, teaching you how to build a neural network from scratch. You will discover the features that have made TensorFlow the most widely used AI library, along with its intuitive Keras interface. You'll then move on to building, training, and deploying CNNs efficiently. Complete with concrete code examples, the course demonstrates how to classify images with modern solutions, such as Inception and ResNet, and extract specific content using You Only Look Once (YOLO), Mask R-CNN, and U-Net. You will also build generative dversarial networks (GANs) and variational autoencoders (VAEs) to create and edit images, and long short-term memory networks (LSTMs) to analyze videos. In the process, you will acquire advanced insights into transfer learning, data augmentation, domain adaptation, and mobile and web deployment, among other key concepts Computer Vision and Neural Networks Computer Vision and Neural Networks Technical requirements Computer vision in the wild A brief history of computer vision Getting started with neural networks TensorFlow Basics and Training a Model TensorFlow Basics and Training a Model Technical requirements Getting started with TensorFlow 2 and Keras TensorFlow 2 and Keras in detail The TensorFlow ecosystem Modern Neural Networks Modern Neural Networks Technical requirements Discovering convolutional neural networks Refining the training process Influential Classification Tools Influential Classification Tools Technical requirements Understanding advanced CNN architectures Leveraging transfer learning Object Detection Models Object Detection Models Technical requirements Introducing object detection A fast object detection algorithm YOLO Faster R-CNN ? a powerful object detection model Enhancing and Segmenting Images Enhancing and Segmenting Images Technical requirements Transforming images with encoders-decoders Understanding semantic segmentation Training on Complex and Scarce Datasets Training on Complex and Scarce Datasets Technical requirements Efficient data serving How to deal with data scarcity Video and Recurrent Neural Networks Video and Recurrent Neural Networks Technical requirements Introducing RNNs Classifying videos Optimizing Models and Deploying on Mobile Devices Optimizing Models and Deploying on Mobile Devices Technical requirements Optimizing computational and disk footprints On-device machine learning Example app ? recognizing facial expressions

Deep Learning with Vision Systems (TTAI3040)
Delivered OnlineFlexible Dates
Price on Enquiry