• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1319 Integration courses

The Impact of Electric Vehicles (EVs) on the Grid

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT)  Electrification of the transportation sector will impact the power system in several ways. Besides the additional load, local impact on the grid needs to be managed by the grid operators. Simultaneously charging of many electric vehicles (EVs) might exceed the limits in specific locations. On the other hand, EVs can provide flexibility and other ancillary services that will help grid operators. This 3 half-day VILT course will provide a complete overview of integrating electric vehicles (EVs) into the power grid. It will cover the whole value chain from grid operations to the car battery. This includes the control room, possible grid reinforcement, demand side management and power electronics. This course will demonstrate the impact on the grid and solutions for a safe & cost-effective grid plan and operation, with examples of successful integration of EVs. The course will also provide vital knowledge about technology used for EVs such as power electronics, demand side management, communication and batteries. In this context, the focus will be on power electronics as it has the highest impact on the grid. The grid planning tool, pandapower, is introduced as an open source tool for power system modelling. The set-up of the training course allows for discussion and questions. Questions can be formulated by the participants upfront or during the training. This course is delivered in partnership with Fraunhofer IEE. Training Objectives At the end of this course, the participants will: Understand the charging options for EVs and its impact on the grid and batteries Identify system services for EVs with regards to voltage quality at the point of common coupling Discover what are the 'grid friendly' and grid supporting functions in EVs Uncover the different applications, standards and data researched on EVs Examine the application of a grid planning tool (pandapower) for power system modelling Be able to develop code snippets with pandapower Apply and execute a code example for power system modelling with pandapower Target Audience EV and grid project developers and administrators Power grid operators and planners EPC organisations involved in grid development EV/ battery manufacturers and designers EV transport planners and designers Government regulators and policy makers Training Methods The VILT will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes breaks per day, including time for lectures, discussion, quizzes and short interactive exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end of every session/day. Trainer Our first course expert is Head of Department Converters and Electrical Drive Systems at Fraunhofer IEE and Professor for Electromobility and Electrical Infrastructure at Bonn-Rhein-Sieg University of Applied Sciences. He received his engineering degree in automation in 2008 by the THM Technische Hochschule Mittelhessen (FH Giessen-Friedberg). Afterwards he studied power engineering at University of Kassel and received his diploma certificate in 2010. In 2016 he received the Ph.D. (Dr.-Ing.) from the University of Hannover. The title of his dissertation is Optimized multifunctional bi-directional charger for electric vehicles. He has been a researcher at the Fraunhofer IEE in Kassel since 2010 and deals with power converters for electric vehicles, photovoltaics and wind energy. His current research interests include the bidirectional inductive power transfer, battery charger and inverter as well as new power electronic components such as SiC MOSFETs and chokes. Additionally, our key expert is Chairman of the IEEE Joint IAS/PELS/IES German Chapter and a member of the International Scientific Committee of the EPE Association. Our second course expert is deputy head of energy storage department at Fraunhofer IEE. Prior to this he was the Director of Grid Integration department at SMA Solar Technology AG, one of the world's largest manufacturers of PV power converters. Before joining SMA, our course expert was manager of the Front Office System Planning at Amprion GmbH (formerly RWE TSO), one of the four German transmission system operators. He holds a degree of electrical engineering of the University of Kassel, Germany. In 2003 he finished his Ph.D. (Dr.-Ing.) on the topic of wind power forecasting at the 'Institute of Solar Energy Supply Technology' (now Fraunhofer IEE) in Kassel. In 2004 he started his career at RWE TSO with main focus on wind power integration and congestion management. Our course expert is chairman of the IEC SC 8A 'Grid Integration of Large-capacity Renewable Energy (RE) Generation' and has published several papers about grid integration of renewable energy source and forecasting systems on books, magazines, international conferences and workshops. Our third course expert is Research Associate at Fraunhofer IEE. He is actively working on different projects related to the integration of electric vehicle charging into the electric distribution grid. The focus of this work concerns time series based simulations for grid planning and operation in order to investigate the effect of a future rollout of electric vehicles and charging infrastructure on economics e.g. costs for grid reinforcement. He completed his master degree (MSc.) in Business Administration and Engineering: Electrical Power Engineering at RWTH Aachen University, Germany. Our trainers are experts from Fraunhofer Institute for Energy Economics and Energy System Technology (Fraunhofer, IEE), Germany. The Fraunhofer IEE researches for the national and international transformation of energy supply systems POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

The Impact of Electric Vehicles (EVs) on the Grid
Delivered in Internationally or OnlineFlexible Dates
£2,196 to £2,554

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Application Consultants and Technical Consultants Overview Understand and have a clear overview of SAP MIIUnderstand SAP MII data, service enablement, messaging, visualization, and business logic servicesUse SAP MII tool to integrate various data from different data sources (Synchronous and Asynchronous)Use SAP MII to connect manufacturing shop floor system and SAP ERP system in addition to XML functions and document buildingUse SAP MII new features: Self-Service Composition Environment, Manufacturing Data Objects, Plant Information Catalog, KPI and Alert Frameworks This is a fundamental course students should take in order to gain an understanding of the SAP MII product, which is the foundational product of SAP Connected Manufacturing. Course Outline Introduction to SAP MII SAP MII Administration and linkages to NetWeaver Administration Data Server and Enterprise Configuration Navigation and Home Page Themes Developing with SAP MII Workbench & Self-Service Composition Environment (SSCE) Query & HTML5 Display Templates Time Engine MII HTML5 JavaScript functions MII Reporting and Localization Business Logic Services (Basics) Plant Information Catalog and SAP Plant Connectivity KPI and Manufacturing Data Objects (MDO) Alerting Framework Additional course details: Nexus Humans SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCM380 SAP MII - Manufacturing Integration and Intelligence Fundamentals
Delivered OnlineFlexible Dates
Price on Enquiry

KM650 IBM What is New in IBM InfoSphere Data Integration and Governance? V11.3

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This basic course is for users and developers familiar with earlier versions of IBM InfoSphere Information Server or IBM InfoSphere MDM who want to learn about new features in V11.3 Overview The objectives of this course are as follows:- Learn about the new features of DataStage V11.3- Learn about the new features of Information Analyzer V11.3- Learn about the new features of Data Click V11.3- Learn about the new features of the Information Governance Catalog V11.3 This course is designed to introduce you to new features in data integration and governance in IBM InfoSphere Information Server V11.3 and IBM InfoSphere MDM V11.3. Outline Unit DS: New Features in IBM InfoSphere DataStage V11.3 Unit DC: New Features in IBM InfoSphere Data Click V11.3 Unit IA: New Features in IBM InfoSphere Information Analyzer V11.3 **All units are accompanied by hands-on lab exercises. Additional course details: Nexus Humans KM650 IBM What is New in IBM InfoSphere Data Integration and Governance? V11.3 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM650 IBM What is New in IBM InfoSphere Data Integration and Governance? V11.3 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

KM650 IBM What is New in IBM InfoSphere Data Integration and Governance? V11.3
Delivered OnlineFlexible Dates
Price on Enquiry

Green Hydrogen Production from Offshore Wind

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) Hydrogen will play an increasingly critical role in the future of energy system as it moves forward to supplement and potentially replace fossil fuels in the long run. Offshore wind offers a clean and sustainable renewable resource for green hydrogen production. However, it can also be volatile and presents inherent risks that need to be managed. Even though offshore production of hydrogen has yet to achieve a high state of maturity, many current projects are already dealing with the conditions and effects of offshore production of hydrogen and are grappling with the technological requirements and necessary gas transportation with grid integration. This 2 half-day Virtual Instructor Lead Training (VILT) course will examine the technological options for on-site production of hydrogen by electrolysis (onshore or offshore directly at the platform) as well as the transport of hydrogen (pipeline or ship). This VILT course will also explore the economic considerations and the outlook on future market opportunities. There will be exercises for the participants to work on over the two half-days. This course is delivered in partnership with Fraunhofer IEE. Training Objectives By the end of this VILT course, participants will be able to: Understand the technological attributes and options for green hydrogen production based on electricity from offshore wind. Explore the associated economic analysis for offshore wind hydrogen production, including CAPEX, OPEX, LCOE and LCOH Identify the critical infrastructure and technical configuration required for offshore green hydrogen including transportation networks and grid connectivity Learn from recent findings from current Research & Development projects concerning the differences between onshore and offshore hydrogen production. Target Audience This VILT course is intended: Renewable energy developers and operators Offshore oil & gas operators Energy transport and marine operators Energy policy makers and regulators IPPs and power utilities Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Trainer 1: Your expert course leader is Director of Energy Process Technology Division at the Fraunhofer Institute for Energy Economics and Energy System Technology, IEE. The research activities of the division link the areas of energy conversion processes and control engineering. The application fields covered are renewable energy technologies, energy storage systems and power to gas with a strong focus on green hydrogen. From 2006 - 2007, he worked as a research analyst of the German Advisory Council on Global Change, WBGU, Berlin. He has extensive training experience from Bachelor and Master courses at different universities as well as in the context of international training activities - recently on hydrogen and PtX for partners in the MENA region and South America. He holds a University degree (Diploma) in Physics, University of Karlsruhe (KIT). Trainer 2: Your expert course leader is Deputy Head of Energy Storage Department at Fraunhofer IEE. Prior to this, he was the director of the Grid Integration Department at SMA Solar Technology AG, one of the world's largest manufacturers of PV power converters. Before joining SMA, he was manager of the Front Office System Planning at Amprion GmbH (formerly RWE TSO), one of the four German transmission system operators. He holds a Degree of Electrical Engineering from the University of Kassel, Germany. In 2003, he finished his Ph.D. (Dr.-Ing.) on the topic of wind power forecasting at the Institute of Solar Energy Supply Technology (now known as Fraunhofer IEE) in Kassel. In 2004, he started his career at RWE TSO with a main focus on wind power integration and congestion management. He is Chairman of the IEC SC 8A 'Grid Integration of Large-capacity Renewable Energy (RE) Generation' and has published several papers about grid integration of renewable energy source and forecasting systems on books, magazines, international conferences and workshops. Trainer 3: Your expert course leader is Deputy Director of the Energy Process Technology division and Head of the Renewable Gases and Bio Energy Department at Fraunhofer IEE. His work is mainly focused on the integration of renewable gases and bioenergy systems into the energy supply structures. He has been working in this field since more than 20 years. He is a university lecturer in national and international master courses. He is member of the scientific advisory council of the European Biogas Association, member of the steering committee of the Association for Technology and Structures in Agriculture, member of the International Advisory Committee (ISAC) of the European Biomass Conference and member of the scientific committees of national bioenergy conferences. He studied mechanical engineering at the University of Darmstadt, Germany. He received his Doctoral degree on the topic of aerothermodynamics of gas turbine combustion chambers. He started his career in renewable energies in 2001, with the topic of biogas fired micro gas turbines. Trainer 4: Your expert course leader has an M. Sc. and she joined Fraunhofer IEE in 2018. In the Division of Energy Process Technology, she is currently working as a Research Associate on various projects related to techno-economic analysis of international PtX projects and advises KfW Development Bank on PtX projects in North Africa. Her focus is on the calculation of electricity, hydrogen and derivative production costs (LCOE, LCOH, LCOA, etc) based on various methods of dynamic investment costing. She also supervises the development of models that simulate different PtX plant configurations to analyze the influence of different parameters on the cost of the final product, and to find the configuration that gives the lowest production cost. She received her Bachelor's degree in Industrial Engineering at the HAWK in Göttingen and her Master's degree in renewable energy and energy efficiency at the University of Kassel. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Green Hydrogen Production from Offshore Wind
Delivered in Internationally or OnlineFlexible Dates
£1,977 to £2,299

Definitive Segment Routing for engineers

5.0(3)

By Systems & Network Training

Definitive Segment Routing course description This Segment Routing (SR) training course is a comprehensive program designed to equip network professionals with the knowledge and skills needed to implement and manage SR in modern networking environments. Segment Routing is a cutting-edge network architecture that enhances network flexibility, scalability, and efficiency. This course offers in-depth coverage of SR principles, protocols, and practical implementation techniques. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how Segment Routing works. Explain the relationship between SR and MPLS. Use SR for Traffic Engineering. Troubleshoot Segment Routing. Implement TI-LFA using Segment Routing Definitive Segment Routing course details Who will benefit: This course is ideal for network engineers, architects, and administrators who want to stay up-to-date with the latest networking technologies and enhance their expertise in Segment Routing. Prerequisites: Concise MPLS for engineers Duration 3 days Definitive Segment Routing course contents Introduction to Segment Routing (SR) What is SR? Source based routing, SPRING, history, segments, why SR? SR benefits.SR usage: Traffic Engineering, Shortest path, local protection. Relationship between SR and MPLS, SRv6. Hands on Investigating the base network. Segment Routing architecture SR domains, SR paths, SR segments. Segment types. Segment IDs, combining segments, IGP extensions, control plane components. Hands on Configuring SR, exploring how SR works, Segment Routing protocols SR-MPLS. MPLS label stack operations. Segment Routing Global Block (SRGB). SRLB. IS-IS and OSPF extensions for SR. Prefix segments, adjacency segments. SRGB/IGP interactions. Multidomain SR policies. SPF, Strict SPF. Hands on Analysing IGP SR extension operation. Investigating the SRGB. Segment Routing Traffic Engineering RSVP-TE versus SR-TE. SR policies. Anycast and binding SIDs. SR flexible algorithm flex-algo, Performance measurement delay. Hands on Optimising network paths for various applications. SR integration with 'older' technologies MPLS and LDP integration with SR. Hands on Integration. Topology Independent Loop Free Alternative Classic LFA and IP/MPLS protection mechanisms. TI-LFA protection options. Hands on TI-LFA operation with SR and LDP traffic. Scenarios SDN. Managing SR with SR controllers. Analyse, optimise, automate. Network slicing. BGP peering segments Path Computation Elements, BGP Link State. BGP prefix segments, BGP peer segments. Egress peer engineering. SR enabled VPNs. Hands onBGP segment routing. Troubleshooting Segment Routing IP toolkit: ping and traceroute. MPLS toolkit: MPLS ping, MPLS echo request/reply, MPLS ping, MPLS traceroute and path discovery. Router show commands. Hands on Used throughout the course during exercises. SRv6 Note this is an optional extra day. See our one day SRv6 course for details. IPv6 headers review, routing headers, IPv6 segment, SRv6 segment Identifiers. IPv6 Segment Routing Header. SRH procedures. Hands on Configuring SRv6, Analysing SRv6 operation.

Definitive Segment Routing for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Microsoft Dynamics 365 Finance and Operations Apps Developers Overview By the end of this course, you will learn to develop fully realized solutions by using standardized application coding patterns. In this course, you will learn the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps. The Dynamics 365 for Finance and Operations (FO) developer is a key technical resource that implements and extends the application to meet the requirements of the business. Module 1: Overview & Architecturen Explore the ecosystem and main components Explore the technical architecture Explore design and deployment considerations Module 2: Developer Tools Manage implementations by using Lifecycle Services Manage source code by using version control Customize by using Visual Studio Module 3: Solution Design Implement application lifecycle management Module 4: AOT Elements Build extended data types and enumerations Build tables Build forms and optimize form performance Create classes Create other user interface elements Module 5: Code Development & Testing Explore the test framework and use tools Get started with development using X++ Develop object-oriented code Use RSAT tool Module 6: Data Migration Prepare data for migration Module 7: Frameworks Introduction Explore extensions and the extension framework Extend elements SysOperationSandbox framework Summary Module 8: Integration Identify data integration patterns and scenarios Implement data integration concepts and solutions Implement the data management package API Data integrations Integrate with Microsoft Azure Connecting to Power Platform services Consume business events Integrate Finance and Operations apps with Microsoft Dataverse Module 9: Reporting Explore the reporting tools Build reports Build workspaces Manage data sources with external data stores Module 10: Security & Performance Work with performance and monitoring tools Implement role-based security Apply basic performance optimization techniques Additional course details: Nexus Humans MB-500T00 Dynamics 365 - Finance and Operations Apps Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-500T00 Dynamics 365 - Finance and Operations Apps Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer
Delivered OnlineFlexible Dates
£2,975

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture

AZ-400T00 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
£2,975

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

The Impact of Electric Vehicles (EVs) on the Grid – Virtual Instructor Led Training (VILT)

By EnergyEdge - Training for a Sustainable Energy Future

Dive into the world of electric vehicles and their impact on the grid with EnergyEdge's virtual instructor-led training course. Gain valuable knowledge and insights.

The Impact of Electric Vehicles (EVs) on the Grid – Virtual Instructor Led Training (VILT)
Delivered In-PersonFlexible Dates
£1,999 to £2,099
1...56789...132