Develop Big Data Pipelines with R, Sparklyr & Power BI Course Overview: This course offers a comprehensive exploration of building and managing big data pipelines using R, Sparklyr, and Power BI. Learners will gain valuable insight into the entire process, from setting up and installing the necessary tools to creating effective ETL pipelines, implementing machine learning techniques, and visualising data with Power BI. The course is designed to provide a strong foundation in data engineering, enabling learners to handle large datasets, optimise data workflows, and communicate insights clearly using visual tools. By the end of this course, learners will have the expertise to work with big data, manage ETL pipelines, and use Sparklyr and Power BI to drive data-driven decisions in various professional settings. Course Description: This course delves into the core concepts and techniques for managing big data using R, Sparklyr, and Power BI. It covers a range of topics including the setup and installation of necessary tools, building ETL pipelines with Sparklyr, applying machine learning models to big data, and using Power BI for creating powerful visualisations. Learners will explore how to extract, transform, and load large datasets, and will develop a strong understanding of big data architecture. They will also gain proficiency in visualising complex data and presenting findings effectively. The course is structured to enhance learners' problem-solving abilities and their competence in big data environments, equipping them with the skills needed to manage and interpret vast amounts of information. Develop Big Data Pipelines with R, Sparklyr & Power BI Curriculum: Module 01: Introduction Module 02: Setup and Installations Module 03: Building the Big Data ETL Pipeline with Sparklyr Module 04: Big Data Machine Learning with Sparklyr Module 05: Data Visualisation with Power BI (See full curriculum) Who is this course for? Individuals seeking to understand big data pipelines. Professionals aiming to expand their data engineering skills. Beginners with an interest in data analytics and big data tools. Anyone looking to enhance their ability to analyse and visualise data. Career Path: Data Engineer Data Analyst Data Scientist Business Intelligence Analyst Machine Learning Engineer Big Data Consultant
Sage 50 (Updated v.29) Course Overview This updated Sage 50 (v.29) course offers a comprehensive guide to using the latest version of Sage 50 for accounting and financial management. Designed for learners at all levels, it covers essential functions such as setting up your company, managing invoices, reconciling accounts, and generating reports. With the focus on providing valuable insights into financial management software, this course helps learners develop the skills to manage and control financial data with efficiency. By the end of the course, learners will have a solid understanding of Sage 50’s features and be able to use it confidently in real-world applications. The course is ideal for professionals looking to expand their software skills or those pursuing a career in accounting or finance. Course Description In this updated Sage 50 (v.29) course, learners will delve into all aspects of the software, from installation and company setup to mastering functions like invoicing, payroll management, and producing detailed financial reports. Key topics include maintaining the chart of accounts, tracking expenses, and reconciling bank statements. Learners will also gain a thorough understanding of Sage 50's advanced features, including managing VAT returns and automating financial processes. This course offers an engaging experience where learners can explore the various capabilities of Sage 50, ensuring that they can apply their knowledge effectively in the workplace. Upon completion, learners will possess the expertise to confidently utilise Sage 50 for efficient financial management. Sage 50 (Updated v.29) Curriculum Module 01: Introduction to Sage 50 (Updated v.29) Module 02: Setting Up Your Company and Preferences Module 03: Managing Customers and Suppliers Module 04: Invoicing and Payments Management Module 05: Bank Reconciliation and VAT Returns Module 06: Producing Financial Reports Module 07: Advanced Features in Sage 50 Module 08: Troubleshooting and System Maintenance (See full curriculum) Who is this course for? Individuals seeking to enhance their accounting software knowledge. Professionals aiming to advance in finance or accounting roles. Beginners with an interest in accounting software and financial management. Business owners or administrators seeking to streamline financial processes. Career Path Accounts Assistant Financial Administrator Sage 50 Support Specialist Bookkeeper Payroll Officer Financial Analyst
Duration 5 Days 30 CPD hours This course is intended for Administrator Architect Database Administrator Overview To provide an acceptable response time to users and manage resources effectively, you learn how to monitor performance and manage resources within the multitenant container database and its pluggable databases, and within each pluggable database. Another important aspect is the data movement between non-CDBs and pluggable databases, and between pluggable databases. It is also important to understand the procedures of upgrading an Oracle Database multitenant container database or an Oracle Database pluggable database. Finally, students discover the way multitenant container database and pluggable databases are created and monitored in the Cloud. This course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database and its regular and application pluggable databases. You learn why and how to create and manage a multitenant container database and its regular and application pluggable databases, with storage structures appropriate for the business applications. You practice cold and hot cloning, plugging unplugged pluggable databases in multitenant container databases using various methods. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods
Duration 2 Days 12 CPD hours This course is intended for This course is geared toward development, engineering, and operations staff. Students in this class should have some familiarity and comfort with the following: 1. Writing code (of just about any flavor) in a text editor 2. Working on the command line 3. Basic system administration ? installing packages, configuring those packages, starting service Overview Get started with Chef by taking Chef Essentials. It?s a two-day instructor-led course that covers all the basics. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your servers. You?ll also learn about Chef Architecture and the set of tools included in the Chef Development Kit (ChefDK). Each of the core units includes hands-on exercises that will give you confidence in your new skills. At the end of the course, you?ll come away with a repo and the skills to start automating your own infrastructure. You?ll learn what it means to turn infrastructure into code so that you can automate the configuration, deployment and management of your Windows servers. IntroductionResourcesCookbooksOhaiTemplatesLabWorkstation installationSigning up for Managed ChefThe Chef serverCommunity cookbooksManaging multiple nodesRolesSearchEnvironmentsFurther resources
PHP for Beginners 2023 Guide: Develop a ECommerce Store Course Overview This course provides a comprehensive introduction to PHP programming through the development of a fully functional eCommerce store. Learners will explore core PHP concepts while building practical features such as product management, user authentication, shopping cart functionality, and payment integration using Stripe. Designed for beginners, the course emphasises clear, step-by-step instruction to equip learners with the skills needed to create dynamic, database-driven web applications. By the end of the course, participants will be confident in setting up a PHP environment, developing user and admin interfaces, and managing eCommerce workflows effectively. This guide is ideal for anyone looking to launch their journey into web development or expand their programming toolkit with essential PHP knowledge relevant to modern online retail solutions. Course Description Delving deeper into PHP fundamentals, this course guides learners through the full lifecycle of building an eCommerce website. It covers everything from installing the necessary tools to implementing secure authentication systems and managing product categories. Participants will learn how to structure their code efficiently, interact with databases, and integrate payment gateways like Stripe to process transactions securely. The curriculum balances foundational theory with project-based learning, ensuring students acquire not only programming syntax but also an understanding of real-world web application workflows. By mastering user-facing and admin panel functionalities, learners develop versatile skills applicable across various web development projects. Throughout the course, the focus remains on building scalable, maintainable code following best practices in PHP development. PHP for Beginners 2023 Guide: Develop a ECommerce Store Curriculum Module 01: Introduction Module 02: Installation Module 03: Getting Started with the Project and Authentication System Module 04: Preparing Products Module 05: Developing Cart and Payment with Stripe Module 06: Categories and Finishing Users Side Module 07: Getting Started with Admin Panel Module 08: Finishing Categories (Admin Side) Module 09: Finishing Products (Admin Side) Module 10: Update: Extra Lectures Module 11: Update - Creating a Wishlist System (See full curriculum) Who Is This Course For? Individuals seeking to learn web development with PHP. Professionals aiming to enhance their programming skills for career growth. Beginners interested in creating eCommerce websites. Anyone wanting to understand backend development and payment integration. Career Path Junior PHP Developer Web Developer (Front and Back End) ECommerce Developer Full Stack Developer Software Engineer in Web Technologies
Duration 4 Days 24 CPD hours This course is intended for This course is intended for Administrator, Architect, and Database Administrator Overview Upon successful completion of this course, students will be able to Manage PDB snapshots, Encrypt data in PDBs and isolate PDB keystore, Monitor performance in CDBs and PDBs, Audit users in CDB and PDBs, Protect data with Database Vault policies in CDB and PDBs, Manage a CDB fleet, and Manage resource allocation between PDBs and within a PDB. This Oracle Database: Managing Multitenant Architecture course covers all aspects of the multitenant architecture, providing detailed information on the components of an Oracle multitenant container database. CDB BasicsCDB and Regular PDBsApplication PDBs and Application InstallationPDB CreationCDB and PDB ManagementStorageSecurityBackup and DuplicateRecovery and FlashbackPerformance MonitoringResources AllocationData MovementUpgrade methods Additional course details: Nexus Humans Oracle Database - Managing Multitenant Architecture training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database - Managing Multitenant Architecture course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview At the end of this course you should be able to: Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum© Protect 8.1.6 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum© Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This course will focus on implementation and basic administration of a IBM Spectrum© Protect environment. The hands-on lab exercises are performed on a Windows 2012 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Components and conceptsInstallation and configurationInterfaces and monitoringStorage pools and devicesPolicy management, data movement, and explorationDatabase and storage pool managementClient configuration and managementClient data protectionDaily operations and maintenanceSchedules and reports Additional course details: Nexus Humans TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS617 IBM Spectrum Protect - Implementation and Administration (v8.1.6) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Carpentry Course Overview This Carpentry course provides a comprehensive understanding of the fundamentals of woodworking, construction techniques, and key carpentry processes. Learners will gain essential skills to build structural and decorative woodwork, such as floor systems, framing, and staircases, with a focus on precision and safety. The course equips students with a solid foundation in carpentry practices, enabling them to effectively work with various materials, tools, and building techniques. Course Description Throughout the course, learners will explore topics such as tool usage, building materials, and the essentials of carpentry, including adhesives and fasteners. Modules on framing, flooring, roof structures, and exterior installations such as windows and doors provide a well-rounded skillset. This course also covers advanced areas such as concrete construction and stair design. By the end of the course, learners will be proficient in the basics of carpentry and ready to apply their knowledge in real-world settings, having gained an in-depth understanding of construction systems and processes. Carpentry Curriculum Module 01: Introduction to Carpentry Module 02: Tool Checklist and Use Module 03: Building Materials Module 04: Adhesives and Fasteners Module 05: Floor Systems Module 06: Wall Framing Module 07: Roof Framing and Siding Module 08: Windows and Exterior Doors Module 09: Stair Construction Module 10: Concrete Construction (See full curriculum) Who is this course for? Individuals seeking to pursue a career in carpentry. Professionals aiming to develop expertise in construction and building techniques. Beginners with an interest in woodworking or construction. Those looking to enhance their knowledge in the building and construction industry. Career Path Carpenter Construction Worker Building Technician Joiner Site Supervisor Renovation Specialist
Duration 4.5 Days 27 CPD hours This course is intended for This intermediate course is for people who are new to the RACF component of the z/OS Security Server, and responsible for security administration. This includes people who are planning to implement RACF for the first time, and people who are security administrators in installations where RACF is already implemented. Those inexperienced z/OS users may find the course Basics of z/OS RACF Administration (ES19) more appropriate Overview Identify the security requirements of a system Evaluate the facilities and options of RACF Define users to RACF Set up a RACF group structure Use RACF to protect resources Select options to tailor RACF Evaluate and implement RACF database and performance options Identify tools available for auditing Administer the system so that it is consistent with the installation's security goals Be a more effective security administrator using the RACF component of the z/OS Security Server to define users, set up group structures, define general resources, protect z/OS data sets, & use several RACF utilities. Security and RACF overview . Administering groups and users . Protecting z/OS data sets . Introduction to user administration and delegation and general resources . RACF database, tables, and performance options . RACF utilities and exits . RACF options . Auditing the RACF environment . Storage management and RACF . Security for JES facilities . Security classification .
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options