Build Your Own PC: A Beginner's Guide Course Overview "Build Your Own PC: A Beginner's Guide" is designed for individuals looking to gain an understanding of computer hardware and the process of assembling a fully functional PC. The course covers the essential components involved in building a computer, from selecting the right hardware to installing software and ensuring network connectivity. Learners will also be introduced to building gaming PCs and maintaining their machines for optimal performance. Upon completion, learners will have the skills to confidently build, troubleshoot, and maintain their own PC, opening up opportunities for personal and professional growth in the IT sector. Course Description This course provides an in-depth look into the world of computer building, starting with the basics of understanding computer components and their roles in a functional system. Learners will explore key hardware, including processors, motherboards, RAM, and storage devices, while also learning the significance of peripheral devices. The course includes modules on software installation, networking, and even building a gaming PC. With a focus on providing clear, structured guidance, learners will gain a strong foundation in assembling and maintaining PCs, preparing them for various roles in the technology sector. The course is ideal for beginners and those looking to improve their technical expertise. Build Your Own PC: A Beginner's Guide Curriculum Module 01: Introduction to Computer & Building PC Module 02: Overview of Hardware and Parts Module 03: Building the Computer Module 04: Input and Output Devices Module 05: Software Installation Module 06: Computer Networking Module 07: Building a Gaming PC Module 08: Maintenance of Computers (See full curriculum) Who is this course for? Individuals seeking to understand how computers work and how to build one. Professionals aiming to enhance their IT skills for career development. Beginners with an interest in technology and computer systems. Hobbyists interested in assembling their own custom-built PCs. Career Path IT Support Technician Systems Administrator PC Hardware Specialist Network Technician Gaming PC Builder and Technician
UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.
Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.
Duration 4 Days 24 CPD hours This course is intended for Security engineers Security administrators Security architects Operations engineers Network engineers Network administrators Network or security technicians Network managers System designers Cisco integrators and partners Overview After taking this course, you should be able to: Describe and administer the Cisco Email Security Appliance (ESA) Control sender and recipient domains Control spam with Talos SenderBase and anti-spam Use anti-virus and outbreak filters Use mail policies Use content filters Use message filters to enforce email policies Prevent data loss Perform LDAP queries Authenticate Simple Mail Transfer Protocol (SMTP) sessions Authenticate email Encrypt email Use system quarantines and delivery methods Perform centralized management using clusters Test and troubleshoot This course shows you how to deploy and use Cisco© Email Security Appliance to establish protection for your email systems against phishing, business email compromise, and ransomware, and to help streamline email security policy management. This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss prevention. This course helps you prepare to take the exam, Securing Email with Cisco Email Security Appliance (300-720 SESA). Describing the Cisco Email Security Appliance Cisco Email Security Appliance Overview Technology Use Case Cisco Email Security Appliance Data Sheet SMTP Overview Email Pipeline Overview Installation Scenarios Initial Cisco Email Security Appliance Configuration Centralizing Services on a Cisco Administering the Cisco Email Security Appliance Distributing Administrative Tasks System Administration Managing and Monitoring Using the Command Line Interface (CLI) Other Tasks in the GUI Advanced Network Configuration Using Email Security Monitor Tracking Messages Logging Controlling Sender and Recipient Domains Public and Private Listeners Configuring the Gateway to Receive Email Host Access Table Overview Recipient Access Table Overview Configuring Routing and Delivery Features Controlling Spam with Talos SenderBase and Anti-Spam SenderBase Overview Anti-Spam Managing Graymail Protecting Against Malicious or Undesirable URLs File Reputation Filtering and File Analysis Bounce Verification Using Anti-Virus and Outbreak Filters Anti-Virus Scanning Overview Sophos Anti-Virus Filtering McAfee Anti-Virus Filtering Configuring the Appliance to Scan for Viruses Outbreak Filters How the Outbreak Filters Feature Works Managing Outbreak Filters Using Mail Policies Email Security Manager Overview Mail Policies Overview Handling Incoming and Outgoing Messages Differently Matching Users to a Mail Policy Message Splintering Configuring Mail Policies Using Content Filters Content Filters Overview Content Filter Conditions Content Filter Actions Filter Messages Based on Content Text Resources Overview Using and Testing the Content Dictionaries Filter Rules Understanding Text Resources Text Resource Management Using Text Resources Using Message Filters to Enforce Email Policies Message Filters Overview Components of a Message Filter Message Filter Processing Message Filter Rules Message Filter Actions Attachment Scanning Examples of Attachment Scanning Message Filters Using the CLI to Manage Message Filters Message Filter Examples Configuring Scan Behavior Preventing Data Loss Overview of the Data Loss Prevention (DLP) Scanning Process Setting Up Data Loss Prevention Policies for Data Loss Prevention Message Actions Updating the DLP Engine and Content Matching Classifiers Using LDAP Overview of LDAP Working with LDAP Using LDAP Queries Authenticating End-Users of the Spam Quarantine Configuring External LDAP Authentication for Users Testing Servers and Queries Using LDAP for Directory Harvest Attack Prevention Spam Quarantine Alias Consolidation Queries Validating Recipients Using an SMTP Server SMTP Session Authentication Configuring AsyncOS for SMTP Authentication Authenticating SMTP Sessions Using Client Certificates Checking the Validity of a Client Certificate Authenticating User Using LDAP Directory Authenticating SMTP Connection Over Transport Layer Security (TLS) Using a Client Certificate Establishing a TLS Connection from the Appliance Updating a List of Revoked Certificates Email Authentication Email Authentication Overview Configuring DomainKeys and DomainKeys Identified Mail (DKIM) Signing Verifying Incoming Messages Using DKIM Overview of Sender Policy Framework (SPF) and SIDF Veri?cation Domain-based Message Authentication Reporting and Conformance (DMARC) Verification Forged Email Detection Email Encryption Overview of Cisco Email Encryption Encrypting Messages Determining Which Messages to Encrypt Inserting Encryption Headers into Messages Encrypting Communication with Other Message Transfer Agents (MTAs) Working with Certificates Managing Lists of Certificate Authorities Enabling TLS on a Listener?s Host Access Table (HAT) Enabling TLS and Certi?cate Verification on Delivery Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Services Using System Quarantines and Delivery Methods Describing Quarantines Spam Quarantine Setting Up the Centralized Spam Quarantine Using Safelists and Blocklists to Control Email Delivery Based on Sender Configuring Spam Management Features for End Users Managing Messages in the Spam Quarantine Policy, Virus, and Outbreak Quarantines Managing Policy, Virus, and Outbreak Quarantines Working with Messages in Policy, Virus, or Outbreak Quarantines Delivery Methods Centralized Management Using Clusters Overview of Centralized Management Using Clusters Cluster Organization Creating and Joining a Cluster Managing Clusters Cluster Communication Loading a Configuration in Clustered Appliances Best Practices Testing and Troubleshooting Debugging Mail Flow Using Test Messages: Trace Using the Listener to Test the Appliance Troubleshooting the Network Troubleshooting the Listener Troubleshooting Email Delivery Troubleshooting Performance Web Interface Appearance and Rendering Issues Responding to Alerts Troubleshooting Hardware Issues Working with Technical Support References Model Specifications for Large Enterprises Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch O?ces Cisco Email Security Appliance Model Specifications for Virtual Appliances
Duration 4 Days 24 CPD hours This course is intended for This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the F5 Advanced Web Application Firewall. In this 4 day course, students are provided with a functional understanding of how to deploy, tune, and operate F5 Advanced Web Application Firewall to protect their web applications from HTTP-based attacks. The course includes lecture, hands-on labs, and discussion about different F5 Advanced Web Application Firewall tools for detecting and mitigating threats from multiple attack vectors such web scraping, Layer 7 Denial of Service, brute force, bots, code injection, and zero day exploits. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Traffic Processing with BIG-IP Identifying BIG-IP Traffic Processing Objects Overview of Network Packet Flow Understanding Profiles Overview of Local Traffic Policies Visualizing the HTTP Request Flow Module 3: Web Application Concepts Overview of Web Application Request Processing Web Application Firewall: Layer 7 Protection F5 Advanced WAF Layer 7 Security Checks Overview of Web Communication Elements Overview of the HTTP Request Structure Examining HTTP Responses How F5 Advanced WAF Parses File Types, URLs, and Parameters Using the Fiddler HTTP Proxy Module 4: Common Web Application Vulnerabilities A Taxonomy of Attacks: The Threat Landscape What Elements of Application Delivery are Targeted? Common Exploits Against Web Applications Module 5: Security Policy Deployment Defining Learning Comparing Positive and Negative Security Models The Deployment Workflow Policy Type: How Will the Policy Be Applied Policy Template: Determines the Level of Protection Policy Templates: Automatic or Manual Policy Building Assigning Policy to Virtual Server Deployment Workflow: Using Advanced Settings Selecting the Enforcement Mode The Importance of Application Language Configure Server Technologies Verify Attack Signature Staging Viewing Requests Security Checks Offered by Rapid Deployment Defining Attack Signatures Using Data Guard to Check Responses Module 6: Policy Tuning and Violations Post-Deployment Traffic Processing Defining Violations Defining False Positives How Violations are Categorized Violation Rating: A Threat Scale Defining Staging and Enforcement Defining Enforcement Mode Defining the Enforcement Readiness Period Reviewing the Definition of Learning Defining Learning Suggestions Choosing Automatic or Manual Learning Defining the Learn, Alarm and Block Settings Interpreting the Enforcement Readiness Summary Configuring the Blocking Response Page Module 7: Attack Signatures & Threat Campaigns Defining Attack Signatures Attack Signature Basics Creating User-Defined Attack Signatures Defining Simple and Advanced Edit Modes Defining Attack Signature Sets Defining Attack Signature Pools Understanding Attack Signatures and Staging Updating Attack Signatures Defining Threat Campaigns Deploying Threat Campaigns Module 8: Positive Security Policy Building Defining and Learning Security Policy Components Defining the Wildcard Defining the Entity Lifecycle Choosing the Learning Scheme How to Learn: Never (Wildcard Only) How to Learn: Always How to Learn: Selective Reviewing the Enforcement Readiness Period: Entities Viewing Learning Suggestions and Staging Status Violations Without Learning Suggestions Defining the Learning Score Defining Trusted and Untrusted IP Addresses How to Learn: Compact Module 9: Cookies and Other Headers F5 Advanced WAF Cookies: What to Enforce Defining Allowed and Enforced Cookies Configuring Security Processing on HTTP headers Module 10: Reporting and Logging Overview: Big Picture Data Reporting: Build Your Own View Reporting: Chart based on filters Brute Force and Web Scraping Statistics Viewing F5 Advanced WAF Resource Reports PCI Compliance: PCI-DSS 3.0 The Attack Expert System Viewing Traffic Learning Graphs Local Logging Facilities and Destinations How to Enable Local Logging of Security Events Viewing Logs in the Configuration Utility Exporting Requests Logging Profiles: Build What You Need Configuring Response Logging Module 11: Lab Project 1 Lab Project 1 Module 12: Advanced Parameter Handling Defining Parameter Types Defining Static Parameters Defining Dynamic Parameters Defining Dynamic Parameter Extraction Properties Defining Parameter Levels Other Parameter Considerations Module 13: Automatic Policy Building Overview of Automatic Policy Building Defining Templates Which Automate Learning Defining Policy Loosening Defining Policy Tightening Defining Learning Speed: Traffic Sampling Defining Track Site Changes Lesson 14: Web Application Vulnerability Scanner Integration Integrating Scanner Output Importing Vulnerabilities Resolving Vulnerabilities Using the Generic XML Scanner XSD file Lesson 15: Deploying Layered Policies Defining a Parent Policy Defining Inheritance Parent Policy Deployment Use Cases Lesson 16: Login Enforcement and Brute Force Mitigation Defining Login Pages for Flow Control Configuring Automatic Detection of Login Pages Defining Session Tracking Brute Force Protection Configuration Source-Based Brute Force Mitigations Defining Credentials Stuffing Mitigating Credentials Stuffing Lesson 17: Reconnaissance with Session Tracking Defining Session Tracking Configuring Actions Upon Violation Detection Lesson 18: Layer 7 DoS Mitigation Defining Denial of Service Attacks Defining the DoS Protection Profile Overview of TPS-based DoS Protection Creating a DoS Logging Profile Applying TPS Mitigations Defining Behavioral and Stress-Based Detection Lesson 19: Advanced Bot Protection Classifying Clients with the Bot Defense Profile Defining Bot Signatures Defining Proactive Bot Defense Defining Behavioral and Stress-Based Detection Defining Behavioral DoS Mitigation Lesson 20: Form Encryption using DataSafe Targeting Elements of Application Delivery Exploiting the Document Object Model Protecting Applications Using DataSafe The Order of Operations for URL Classification Lesson 21: Review and Final Labs Review and Final Labs
Description: The 70-640 - Configuring Windows Server 2008 R2 Active Directory course provides the required information that you should know about 70-640: Configuring Windows Server 2008 R2 Active Directory. The course will teach you how to install the Active Directory role, or how to work with Active Directory objects. In the course, you will also learn about the GPOs (Group Policy Adjectives), what Group Policy objects are, restricted Group Policies. You will know analysing security settings, using the Security Configuration Wizard, deploying software with Group Policy, understanding Group Policy Scope, how Group Policy settings are processed, verifying Group Policy settings, and enabling Auditing. You will also be able to manage users and groups with the AD, working With Domain Controllers, adding DNS, securing the authentication process, monitoring and supporting AD, planning Active Directory deployment, IDA solutions, and Active Directory Certificate Services. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-640 - Configuring Windows Server 2008 R2 Active Directory is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-640 - Configuring Windows Server 2008 R2 Active Directory is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installing the Active Directory Role What is IDA? FREE 00:16:00 How to Install the AD DS Role 00:11:00 Creating a Windows Server 2008 Forest 00:22:00 The New Windows 2008 Server Core 00:09:00 Installing AD DS Server Core 00:02:00 Domain Controller 00:20:00 Working With Active Directory Objects Working with the MMC 00:19:00 Custom MMC 00:14:00 Working with Objects in Active Directory 00:12:00 How to Search Through Active Directory 00:07:00 Using Active Directory 00:13:00 Securing and Delegating AD Objects 00:12:00 Delegation 00:05:00 Adding Computer Accounts to AD 00:08:00 Organizing AD with Container Objects 00:13:00 Joining the Demo 00:08:00 Working With Computer Objects and Accounts 00:17:00 Recycling the Computer Account 00:01:00 Automating Computer Account Creation 00:08:00 Automating Computer Creation 00:04:00 Understanding GPOs Using Group Policy 00:04:00 What Are Group Policy Objects 00:21:00 Group Policy 00:05:00 Restricted Group Policies 00:02:00 Restrcted Group 00:03:00 Analyzing Security Settings 00:12:00 Using The Security Configuration Wizard 00:05:00 SCW 00:08:00 Deploying Software with Group Policy 00:10:00 Software Deployment 00:02:00 Understanding Group Policy Scope 00:11:00 How Group Policy Settings are Processed 00:09:00 Group Policy Scope 00:11:00 Verifying Group Policy Settings 00:05:00 Verifying Group Policy 00:03:00 Enabling Auditing 00:13:00 Auditing 00:05:00 Managing Users and Groups with AD Automating User Account Creation 00:10:00 Automating User Accounts 00:07:00 Working with User Attributes 00:15:00 User Account Administrative Tasks 00:05:00 Supporting User Accounts 00:04:00 Using PowerShell to Create User Accounts 00:09:00 Creating Users with PowerShell 00:07:00 Creation and Management 00:08:00 The Basics of Groups 00:25:00 Managing Group 00:08:00 Best Practices for Using AD Groups 00:08:00 Automating Group Creation 00:05:00 Automating Creation of Groups 00:06:00 Advanced Group Options 00:09:00 Administering Groups 00:05:00 Working With Domain Controllers Installation Options 00:06:00 How to Install a Domain Controller 00:06:00 Introducing the Operations Masters 00:11:00 Designing Where to Deploy the Operation Masters 00:14:00 FSMO 00:03:00 SYSVOL Replication with DFS 00:02:00 Adding DNS DNS Basics 00:15:00 DNS Definitions and Terms 00:17:00 DNS 00:05:00 Setting up DNS for the Enterprise 00:09:00 Global Names 00:09:00 Securing the Authentication Process Password Security Policies 00:15:00 Passwords 00:03:00 Introducing the Read-Only Domain Controller 00:06:00 Installing the RODC 00:05:00 Auditing Authentication Events 00:03:00 Account Logging 00:03:00 Monitoring and Supporting AD Preparing for Recovery 00:10:00 Active Directory Tools 00:24:00 Monitoring Active Directory Performance 00:11:00 Performance Monitor 00:09:00 Planning Active Directory Deployment What Are Sites 00:27:00 Deciding on Site Boundaries 00:07:00 Sites and Subnets 00:08:00 Working with Global Catalog Placement with AD Partitions 00:09:00 Controlling Replication Between Sites 00:20:00 Managing the Global Catalog 00:04:00 Configuring AD Trust Relationships 00:32:00 Trusts 00:03:00 Choosing the Domain and Forest Functional Levels 00:07:00 IDA Solutions Understanding AD FS 00:10:00 Installing AD FS 00:01:00 Configuring and Using AD FS 00:03:00 Understanding AD RMS 00:10:00 Installing AD RMS 00:03:00 Configuring and Using AD RMS 00:07:00 Understanding AD LDS 00:08:00 Installing AD LDS 00:02:00 Installing AD LDS 00:05:00 Configuring and Using AD LDS 00:07:00 Security Review 00:04:00 Active Directory Certificate Services Understanding AD CS 00:29:00 Installing AD CS 00:02:00 Configuring and Using AD CS 00:08:00 Mock Exam Mock Exam- 70-640 - Configuring Windows Server 2008 R2 Active Directory 00:20:00 Final Exam Final Exam- 70-640 - Configuring Windows Server 2008 R2 Active Directory 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
PHP and MySQL Training Masterclass 2023 Course Overview This PHP and MySQL Training Masterclass 2023 offers a comprehensive guide to mastering dynamic web development using PHP and MySQL. Learners will explore essential programming concepts, database integration, and application building through progressive projects designed to enhance their coding capabilities. The course covers core skills such as user authentication, comment systems, ratings, and interactive applications, equipping students with the confidence to develop fully functional web solutions. By the end, participants will have the knowledge to build, customise, and manage robust web applications, boosting their employability and technical proficiency in today’s digital marketplace. Course Description This masterclass delves into key aspects of PHP programming and MySQL database management, providing learners with a structured learning experience. Starting with installation and configuration, it progresses through multiple project-based modules focusing on real-world applications such as authentication systems, comment and rating features, weather apps, and live search functionality. Each module deepens understanding of server-side scripting and database queries, enhancing problem-solving and coding fluency. Participants will gain expertise in integrating PHP scripts with MySQL databases, optimising application performance, and managing data securely. The course is designed to develop both foundational and advanced skills essential for web development careers, delivered in clear, concise UK English. PHP and MySQL Training Masterclass 2023 Curriculum Module 01: Introduction Module 02: Installation Module 03: First Project: Building an Authentication System Module 04: Second Project: Building a Comments System Module 05: Third Project: Creating a Rating System Module 06: Fourth Project: Creating a Weather App Module 07: Fifth Project: Build a Cool Like and Dislike System Module 08: Sixth Project: Building a Simple CV Builder Module 09: Seventh Project: QR Codes Generator Module 10: Eighth Project: Build a Full Live Search System (See full curriculum) Who Is This Course For? Individuals seeking to develop skills in dynamic web development. Professionals aiming to enhance their web programming career. Beginners with an interest in server-side scripting and databases. Web developers wanting to expand their expertise in PHP and MySQL. Career Path Web Developer Backend Developer PHP Developer Database Administrator Full-Stack Developer Software Engineer Digital Solutions Specialist
PHP and MySQL Training 2022: Build 5 Real World Projects Course Overview: "PHP and MySQL Training 2022: Build 5 Real World Projects" offers an in-depth exploration of web development using PHP and MySQL, empowering learners with the skills to create dynamic, database-driven websites. Through five real-world projects, learners will gain a practical understanding of PHP’s functionality, MySQL databases, and how to combine the two to build effective web applications. By the end of the course, participants will have the knowledge to develop robust and scalable systems, such as login and registration systems, CRUD apps, and email-sending features. This course equips learners with essential skills to launch their careers in web development or enhance their existing expertise. Course Description: In this comprehensive training course, learners will delve into core concepts of PHP and MySQL, with a focus on practical application. The course covers key areas such as installation and configuration of PHP, creating user authentication systems, developing CRUD applications, building a URL shortening service, and sending emails with PHP. Each module guides learners through building fully functional projects that address common real-world needs. Along the way, participants will enhance their coding proficiency, understand the importance of secure web applications, and learn the techniques required to build dynamic websites. By the end of this course, learners will be proficient in using PHP and MySQL to develop and manage complex web systems. PHP and MySQL Training 2022: Build 5 Real World Projects Curriculum: Module 01: Introduction Module 02: Installation Module 03: First Project: Login and Registration System Module 04: Second Project: Full Crud App Module 05: Third Project: URL Shortening Service Module 06: Fourth Project: PHP Gallery Module 07: Fifth Project: Sending Emails with PHP (See full curriculum) Who is this course for? Individuals seeking to build a strong foundation in web development. Professionals aiming to expand their knowledge of PHP and MySQL. Beginners with an interest in coding and web development. Aspiring web developers looking to work on real-world projects. Career Path Web Developer PHP Developer Backend Developer Database Administrator Full Stack Developer
Visual Studio Code is currently the number #1 IDE among the programmer's community. All the big companies are moving towards using VS Code for active development. Get ahead of the curve and learn to use Visual Studio Code with ease.
Duration 5 Days 30 CPD hours This course is intended for This course is recommended for administrators and engineers. Overview What you'll learn: Understand the differences between Citrix Virtual Apps and Desktops 2203 LTSR on-premises and the Citrix DaaS. Install, configure, and manage Citrix Cloud Connectors. Deploy and manage Virtual Delivery Agent machines to on-premises resource locations as well as in Microsoft Azure using MCS. Integrate Citrix Cloud and Citrix Virtual Apps and Desktops 2203 LTSR with Microsoft Azure Active Directory. Provide remote access with Citrix StoreFront and Citrix Gateway on Microsoft Azure. In this course you will learn how to create a new Citrix DaaS deployment on Citrix Cloud, with a resource location on Microsoft Azure. You will also learn how to migrate to Citrix DaaS from an on-premises Citrix Virtual Apps and Desktops Site. Get hands-on as the course guides you through the architecture, communications, management, installation, and configuration of Citrix DaaS on Citrix Cloud and a Microsoft Azure resource location that will host apps and desktops for your users. This course is a necessary step in enabling you with the right training and skills, to not only understand, manage, and deliver successfully, but also to make well-informed planning decisions along the way. Module 1: Introduction to Citrix DaaS New Citrix Workspace Packaging Citrix Virtual Apps and Desktops - On-Premises Site What is Citrix Cloud? Why Citrix DaaS? What is a Migration from Citrix Virtual Apps and Desktops to Citrix DaaS? Citrix Cloud Administration Module 2: Planning - Citrix DaaS Architecture, Security, and Operations Architecture and Deployment Options Citrix DaaS Security Citrix DaaS Operations Module 3: Planning - Citrix Cloud Connectors Cloud Connector Architecture Cloud Connector Services and Communications Overview Cloud Connector Operations in a Resource Location Cloud Connector Resiliency Installing, Updating, and Removing Cloud Connectors Supported Domain Scenarios for Cloud Connectors Securing Cloud Connector Communications Local Host Cache (LHC) Citrix Cloud Connector vs Delivery Controller Operations Module 4: Planning - Citrix DaaS Resource Locations Citrix DaaS Resource Locations Citrix DaaS Hosting Connections Zones Module 5: Active Directory, Authentication, and Authorization Active Directory Design Options Desktops from Non-Domain Joined VDAs Citrix Federated Authentication Service and Identity Provider Services Module 6: Planning - Provisioning VDA Workloads and Delivering Resources Master Images Machine Creation Services (MCS) in Citrix DaaS Citrix Provisioning in Citrix DaaS Machine Catalogs Delivery Groups Citrix Cloud Library Module 7: Planning - Provide Access in Citrix Cloud Selecting Between Citrix digital workspace experience and StoreFront Citrix StoreFront and Citrix digital workspace experience Communications Selecting Between Citrix Gateway Service and On-Premises Citrix Gateway Access Layer Communications User Authentication Module 8: Planning - Citrix DaaS Administration Citrix Cloud Manage and Monitor Delegated Administration Citrix DaaS Remote PowerShell Software Development Kit Manage Multiple Resource Locations Module 9: Planning - Public Cloud Considerations General Public Cloud Considerations Using Autoscale to Power Manage Machines in a Public Cloud Microsoft Azure as a Citrix DaaS Resource Location Amazon Web Services as a Citrix DaaS Resource Location Google Cloud as a Citrix DaaS Resource Location Module 10: Planning - Migrating to Citrix DaaS from Citrix Virtual Apps and Desktops Citrix Cloud Migration Options and Considerations Citrix Automated Configuration Tool Citrix Image Portability Service Module 11: Manage - Operations and Support in Citrix Cloud Citrix Cloud Connector Support Updating and Rolling Back Machine Catalogs VDA Restore Citrix Self-Help Strategy Monitor Your Environment Module 12: Introduction to Citrix DaaS on Microsoft Azure Partnering for Success Module 13: Planning - Citrix DaaS Resource Location on Microsoft Azure Overview of Citrix DaaS Components Creating a Citrix DaaS Deployment Overview Module 14: Planning - Microsoft Azure Overview Azure Virtual Network Structure Azure Virtual Network Connectivity Azure Virtual Resources Azure Active Directory Identity and Access Management Azure Active Directory Options and Considerations Module 15: Planning - Deploying Citrix DaaS on Microsoft Azure Citrix DaaS Resource Locations in Azure Citrix DaaS Components in Azure Creating and Managing Workloads in an Azure Resource Location Module 16: Planning - Provide Access to End Users Providing Access to Resources in Citrix Cloud Citrix Gateway Deployment Options Deploying Citrix Gateway or ADC in Azure GSLB and StoreFront Optimal Gateway in Hybrid Environments Module 17: Rollout - Citrix DaaS Deployment on Microsoft Azure Citrix Workspace App Rollout Preparing Migration of End-Users to Workspace Platform Module 18: Managing - Citrix DaaS Workloads on Microsoft Azure Maintaining Citrix Gateway Backup and Monitoring in Azure Maintaining Master Images in Azure Monitoring VDAs in Manage Console and Azure Module 19: Optimize - Citrix DaaS on Microsoft Azure Managing Azure Costs Using Azure Pricing Calculator - Instructor Demo Additional course details: Nexus Humans CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-252 Citrix DaaS Deployment and Administration on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.