Duration 4 Days 24 CPD hours This course is intended for This basic course is intended for anyone who requires basic AIX/UNIX user skills to be able to work in an AIX environment. This course is also a prerequisite for many courses in the AIX Systems Administration curriculum. Overview Log in to an AIX system and set a user password Use AIX online documentation Manage AIX files and directories Describe the purpose of the shell Use the vi editor Execute common AIX commands and manage AIX processes Customize the working environment Use common AIX utilities Write simple shell scripts Use the AIXWindows Environment Use the Common Desktop Environment This course enables you to perform everyday tasks using the AIX operating system. Day 1 Introduction to AIX Using the System AIX Documentation Files and Directories Using Files Day 2 File Permissions The vi Editor Shell Basics Using Shell Variables Day 3 Processes Controlling Processes Customizing the User Environment AIX Utilities, Part I AIX Utilities, Part I (Continued) AIX Utilities, Part II Day 4 AIX Utilities, Part II (Continued) Additional Shell Features The AIX Graphical User Interface
Duration 2 Days 12 CPD hours This course is intended for Technical professionals who need to install, configure, and manage Virtual Security Extension (VSX) solutions within their network security environment. Overview Explain the benefits of virtual network security. Understand the basic functions, components, and advantages of VSX technology. Examine the VSX management infrastructure and understand how traffic flows within a VSX network. Discuss options for deploying VSX technology within various types of organizations. Understand how to install and configure VSX Gateways and Virtual Systems. Describe different routing schemes and features that are available to use within the VSX environment. Understand how to deploy additional VSX networking configurations that may be required in the environment. Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters. Understand how Virtual System Load Sharing works to enhance VSX network performance. Understand how to use the VSX Provisioning Tool to add and remove virtual devices. Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment. Understand how to employ tools for optimizing resources allocated in a VSX environment. Identify various VSX command line tools commonly used to retrieve information and perform configuration changes. Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment. Understand how to troubleshoot and debug issues that may occur in a VSX environment. This course provides a comprehensive understanding of the Check Point VSX solution and describes how to deploy it within the corporate network environment. Course Topics VSX Overview Virtual System Installation and Configuration VSX Clustering Advanced VSX Features Troubleshooting VSX LAB EXERCISES Configuring the VSX Environment Deploying a Virtual System with a Physical Interface Deploying a VS with Bonded VLAN Interfaces Configuring Virtual System HA Converting VSX High Availability to Virtual System Load Sharing Maintaining the VSX Environment Using the CLI to Manage VSX Performance Tuning in VSX Troubleshooting VSX Issues Upgrading a VSX Environment Additional course details: Nexus Humans CCVS Check Point Certified VSX Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCVS Check Point Certified VSX Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs with basic Oracle 19c skills. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs andexercises. Working in a hands-on learning environment led by our expert facilitator, students will explore: Creating CDBs and Regular PDBs Managing CDBs and PDBs Backup and Duplicate Upgrading and Transporting CDBs and Regular PDBs Backup Strategies and Terminology Restore and Recovery Concepts Using Flashback Technologies Duplicating a Database Installing Grid Infrastructure and Oracle Database Patching Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Using General Overall Database Enhancements Monitoring and Tuning Database Performance Managing Application PDBs Managing Security in Multitenant databases Recovery and Flashback Configuring and Using RMAN Diagnosing Failures Performing Recovery Transporting Data RMAN Troubleshooting and Tuning Creating an Oracle Database by using DBCA Oracle Restart Upgrading the Oracle Database Installing Grid Infrastructure for a Standalone server Using Availability Enhancements Tuning SQL Statements Geared for participants experienced with Oracle 19c DBA essentials Oracle 19c Database Administration II (Oracle DBA II) expands their understanding of Oracle database administration. Throughout the course students will explore coverage of Multitenant (CDB/PDB), database tuning, SQL tuning, and backup and recovery: the skills needed to keep a database running reliably and efficiently. The current release of the database is used for exercises and demonstrations, and the content back-ported as necessary for previous releases. Creating CDBs and Regular PDBs Configure and create a CDB Create a new PDB from the CDB seed Explore the structure of PDBs Manage CDBs and PDBs Manage PDB service names and connections Manage startup, shutdown and availability of CDBs and PDBs Change the different modes and settings of PDBs Evaluate the impact of parameter value changes Performance management in CDBs and PDBs Control CDB and PDB resource usage with the Oracle Resource Manager Backup and Duplicate Perform Backup and Recover CDBs and PDBs Duplicate an active PDB Duplicate a Database Upgrading and Transporting CDBs and Regular PDBs Upgrade an Oracle Database Transport Data Backup Strategies and Terminology Perform Full and Incremental Backups and Recoveries Compress and Encrypt RMAN Backups Use a media manager Create multi-section backups of exceptionally large files Create duplexed backup sets Create archival backups Backup of recovery files Backup non database files Back up ASM meta data Restore and Recovery Concepts Employ the best Oracle Database recovery technology for your failure situation Describe and use Recovery technology for Crash, Complete, and Point-in-time recovery Using Flashback Technologies Configure your Database to support Flashback Perform flashback operations Duplicating a Database Duplicate Databases Install Grid Infrastructure and Oracle Database Install Grid Infrastructure for a Standalone server Install Oracle Database software Patching Grid Infrastructure and Oracle Database Patch Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Upgrade Oracle Grid Infrastructure Using General Overall Database Enhancements Install Oracle Database software Create, Delete and Configure Databases using DBCA Creating CDBs and Regular PDBs Use Miscellaneous 19c New Features Monitoring and Tuning Database Performance Managing Memory Components Understanding the Automatic Workload Repository (AWR) Understanding the Advisory Framework Monitoring Wait Events, Sessions, and Services Managing Metric Thresholds and Alerts Understanding and Using the Performance Tuning Methodology Performing Performance Planning Understanding the Automatic Database Diagnostic Monitor (ADDM) Manage Application PDBs Explain the purpose of application root and application seed Define and create application PDBs Install, upgrade and Patch applications Create and administer Application PDBS Clone PDBs and Application containers Plug and unplug operations with PDBs and application containers Comparing Local Undo Mode and Shared Undo Mode Manage Security in Multitenant databases Manage Security in Multitenant databases Manage PDB lockdown profiles Audit Users in CDBs and PDBs Manage other types of policies in application containers Recovery and Flashback Restore and Recovering Databases with RMAN Perform CDB and PDB flashback Configuring and Using RMAN Configure RMAN and the Database for Recoverability Configure and Using an RMAN recovery catalog Diagnosing Failures Detect and repair database and database block corruption Diagnosing Database Issues Performing Recovery Restore and Recovering Databases with RMAN Perform Non RMAN database recovery Transporting Data Transport Data RMAN Troubleshooting and Tuning Interpret the RMAN message output Diagnose RMAN performance issues Creating an Oracle Database by using DBCA Create, Delete and Configure Databases using DBCA Oracle Restart Configure and use Oracle Restart to manage components Upgrade the Oracle Database Plan for Upgrading an Oracle Database Upgrade an Oracle Database Perform Post-Upgrade tasks Install Grid Infrastructure for a Standalone server Rapid Home Provisioning Using Availability Enhancements Use an RMAN recovery catalog Use Flashback Database Tuning SQL Statements Understanding the Oracle Optimizer Using the SQL Tuning Advisor Managing Optimizer Statistics Using the SQL Access Advisor Understanding the SQL Tuning Process Additional course details: Nexus Humans Oracle 19c Database Administration II (DBA II) (TTOR20619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Administration II (DBA II) (TTOR20619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Overview This comprehensive course on Ruby on Rails 5 - Become a Professional Developer will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Ruby on Rails 5 - Become a Professional Developer comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Ruby on Rails 5 - Become a Professional Developer. It is available to all students, of all academic backgrounds. Requirements Our Ruby on Rails 5 - Become a Professional Developer is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 23 sections • 225 lectures • 16:47:00 total length •Course Introduction: 00:06:00 •The Application We're Going to Build: 00:09:00 •Section Introduction gg: 00:01:00 •Introduction to the Command Line Interface in Mac and Linux: 00:10:00 •Installing the X-Code Command Line Tools for Mac: 00:02:00 •Installing Git for Source Code Version Control: 00:03:00 •How to install Homebrew on a Mac: 00:04:00 •Installing GPG Security Systems on a Mac: 00:02:00 •Guide to RVM for Ruby Management: 00:09:00 •Configuring RubyGems and Installing Rails: 00:07:00 •Installing the Postgres Database on a Mac: 00:05:00 •Installing and Working with the Sublime Text Editor: 00:17:00 •Deep Dive into the Command Line - Part 1 of 2: 00:14:00 •Deep Dive into the Command Line - Part 2 of 2: 00:12:00 •PC Environment Setup: Installing Virtual Box: 00:03:00 •Guide to Installing Ubuntu Linux in VirtualBox: 00:10:00 •How to Reboot a Linux Virtual Machine from Terminal: 00:02:00 •Installing Desktop Applications and Ubuntu Navigation Tips and Tricks: 00:09:00 •How to Sign Up for a GitHub Account: 00:03:00 •How to install Git on Linux and Connect to GitHub via SSH: 00:20:00 •How to Securely Install Node and NPM on Linux via NVM: 00:09:00 •Installing the Heroku CLI and the Full Deployment Lifecycle: 00:14:00 •How to install and Work with Sublime Text in Linux: 00:08:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 1 of 2: 00:10:00 •PC Setup: Guide for Ruby on Rails and Postgres on Linux - Part 2 of 2: 00:15:00 •Fixing the Role Does Not Exist Error: 00:05:00 •Section Introduction ee: 00:01:00 •Signing Up for a Project Management Account: 00:03:00 •Managing the Project Management Dashboard: 00:08:00 •Importing Project Management Tasks into Pivotal Tracker: 00:01:00 •Creating a Rails Application: 00:11:00 •Generating a Blog for the Portfolio Application Using Rails Scaffolds: 00:11:00 •Analyzing the Rails Process: Index and Show Actions: 00:12:00 •Analyzing the Rails Process: New, Create, Update, Edit, and Destroy Actions: 00:14:00 •Analyzing the Rails Process: Routing with Resources: 00:07:00 •Rails File System Overview: 00:13:00 •Updating the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing the Application Generator - Part 1: 00:12:00 •Deep Dive: Analyzing the Application Generator - Part 2: 00:17:00 •Section Introduction bb: 00:02:00 •How to Sign Up for a Github Account: 00:03:00 •Generating SSH Keys to Securely Communicate with Github: 00:04:00 •Guide to GitHub: 00:12:00 •How to Update a .gitignore File to Securely Store Secret Credentials: 00:11:00 •Guide to the Markdown Syntax: 00:10:00 •Updating the Git Sprint in the Project Management Dashboard: 00:01:00 •Deep Dive: Analyzing Version Control and Git - Part 1: 00:18:00 •Deep Dive: Analyzing Version Control and Git - Part 2: 00:13:00 •Section Introduction aa: 00:01:00 •Guide to the Rails Controller Generator to Build Pages Part 1: 00:16:00 •Guide to the Rails Controller Generator to Build Pages Part 2: 00:05:00 •Guide to the Rails Model Generator to Build out Data Specific Features: 00:17:00 •Guide to the Rails Model Generator for Building Out the Portfolio Feature: 00:10:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 1: 00:15:00 •Deep Dive: Analyze Rails Generators and How to Customize a Generator - Part 2: 00:11:00 •Section Introduction SS: 00:02:00 •Building out a Seeds File for Generating Dynamic Sample Data: 00:15:00 •Implement an Index Action from Scratch in Rails: 00:12:00 •Build the New and Create Functionality from Scratch in Rails: 00:20:00 •Implement the Ability to Edit Database Records from Scratch in Rails: 00:13:00 •How to Use the Link to Method in Rails for Creating Dynamic Links: 00:13:00 •How to Implement the Show Action from Scratch in Rails: 00:12:00 •Building the Ability to Delete Items in Rails: 00:15:00 •How to Implement Custom Routes for Pages in Rails: 00:09:00 •How to Override the Rails Resources Routes for the Show Action: 00:07:00 •How to Implement Permalinks in a Rails Application - Part 1: 00:17:00 •How to Implement Permalinks in a Rails Application - Part 2: 00:05:00 •How to Use Enums in Rails to Manage Data Stages: 00:13:00 •How to Implement a Custom Action in Rails via a Button Click - Part 1: 00:12:00 •How to Implement a Custom Action in Rails via a Button Click - Part 2: 00:10:00 •Updating the Project Management Dashboard and Performing a Pull Request: 00:05:00 •Deep Dive: Rails Routing and Data Flow - Part 1: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 2: 00:13:00 •Deep Dive: Rails Routing and Data Flow - Part 3: 00:16:00 •Section Introduction RR: 00:01:00 •Implementing Data Validations in Rails 5: 00:12:00 •Guide to Data Relationships in Rails: 00:16:00 •How to Implement Custom Scopes in Rails 5: 00:16:00 •How to Set Default Values in Rails 5: 00:13:00 •How to Use Concerns in Rails 5: 00:13:00 •Building an Additional Parent/Child Relationship in Rails 5: 00:10:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Model: 00:17:00 •Rails 5 Complex Forms: Configuring Nested Attributes in the Form: 00:17:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 1: 00:16:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 2: 00:14:00 •Deep Dive: Working with SQL and ActiveRecord in Rails 5 - Part 3: 00:15:00 •Section Introduction QQ: 00:01:00 •How to Install Devise in Rails 5: 00:08:00 •Using Devise to Implement Registrations and Login Functionality: 00:18:00 •Building Custom Routes for Authentication Pages with Devise in Rails 5: 00:03:00 •Enable Users to Logout and Dynamically Render View Content in Rails 5: 00:07:00 •How to Add Custom Attributes to a Devise Based Authentication System: 00:15:00 •How to Use Controller Concerns in Rails 5 for Devise Custom Attributes: 00:15:00 •Integrate Virtual Attributes to Extract First and Last Name Data from a User: 00:17:00 •Deep Dive: Using BCrypt to Implement Encryption in Ruby: 00:19:00 •Section Introduction PP: 00:01:00 •Rails Data Flow Review and Working with Params: 00:14:00 •Using Rails Sessions to Share Data between Pages: 00:19:00 •Refactoring the Session Tracker into a Controller Concern: 00:07:00 •Working with Strong Params in a Rails 5 Controller: 00:13:00 •Deep Dive: Building a Guest User Feature in Rails - Part 1: 00:14:00 •Deep Dive: Building a Guest User Feature in Rails - Part 2: 00:18:00 •Section Introduction OO: 00:03:00 •How to Customize the Rails Master Layout File - Part 1: 00:15:00 •How to Customize the Rails Master Layout File - Part 2: 00:09:00 •Guide to Using Multiple Layout Files in Rails 5: 00:14:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Introduction to Partials in Rails 5: 00:08:00 •How to Send Data to Partials to Generate Custom Behavior in Rails 5: 00:15:00 •Guide to View Helpers in Rails 5: 00:17:00 •How to Use the Rails Content Tag Helper to Auto Generate HTML Code: 00:15:00 •Introduction to Rendering Collections via Partials in Rails 5: 00:09:00 •Guide to Manually Configuring Partials to Work with Collections in Rails: 00:07:00 •Guide to Helpful ActionView Helper Methods in Rails 5: 00:15:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 1: 00:12:00 •Deep Dive: Tips and Tricks to Working with ActionView in Rails 5 - Part 2: 00:15:00 •Section Introduction NN: 00:01:00 •How to Utilize Puts Debugging in Rails: 00:08:00 •Guide to Byebug in Rails 5: 00:09:00 •Guide to Debugging with Pry in Rails 5: 00:19:00 •Proper Way to Implement Error Management in a Rails Application - Part 1: 00:15:00 •Proper Way to Implement Error Management in a Rails Application - Part 2: 00:06:00 •Section Introduction MM: 00:01:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 1: 00:10:00 •How to Install Bootstrap 4 into a Rails 5 Application - Part 2: 00:12:00 •Section Strategy for Building a Custom RubyGem: 00:11:00 •How to Build a RubyGem from Scratch - Part 1: 00:06:00 •How to Build a RubyGem from Scratch - Part 2: 00:15:00 •Section Introduction hh: 00:02:00 •Introduction to Authorization and How to Install the Petergate Gem: 00:08:00 •How to Add Roles to the User Model in Rails 5: 00:05:00 •Guide to Implementing Petergate in Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Petergate in Rails 5 Application - Part 2: 00:12:00 •Workplace Facilities: 00:35:00 •Portfolio Design Planning for Layout Specific Styles: 00:09:00 •Implementing the Initial Homepage Design in Rails 5 with Bootstrap 4: 00:09:00 •Building a Navigation Partial for the Master Application Layout with Bootstrap: 00:11:00 •Implement a Footer Along with Adding Method Arguments to a Rails View Helper: 00:14:00 •How to Embed a Google Map into a Rails Application: 00:06:00 •Guide to Updating the Styles for the Devise Edit Account Page in Rails: 00:16:00 •How to Override Default Bootstrap Styles for Text Alignment in the Card Class: 00:06:00 •Implementing Styles for the Devise Registration Page with Bootstrap 4: 00:14:00 •How to Design the Login and Password Pages with Bootstrap 4 Form Styles: 00:15:00 •How to Set Default Values for View Helper Method Arguments in Rails 5: 00:04:00 •Integrating a Different Design for a Separate Blog Layout in Rails 5: 00:04:00 •How to Use Bootstrap 4 to Add a Custom Nav Bar to a Blog Layout in Rails: 00:07:00 •Customizing the Design for the Blog Index Page with Bootstrap 4: 00:19:00 •Guide to Adding Styles to the Blog Show and Form Pages with Bootstrap 4: 00:12:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 1: 00:23:00 •Implementing Partials, Pagination, and Font Awesome Icons - Part 2: 00:23:00 •Initial Design for the Portfolio Index Page with Bootstrap 4: 00:17:00 •Integrating the Portfolio Animated Navigation Slider, Footer, and Index: 00:14:00 •Using the Bootstrap 4 Grid Layout to Style the Portfolio Show Page in Rails: 00:06:00 •Implementing Bootstrap 4 Forms for the Portfolio Form Pages: 00:13:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 1: 00:20:00 •How to Build a View Helper to Dynamically Generate a Nav Bar - Part 2: 00:19:00 •Deep Dive: Rails Asset Pipeline Part 1: 00:01:00 •Deep Dive: Rails Asset Pipeline Part 2: 00:19:00 •Section Introduction LL: 00:01:00 •How to Integrate a Position Attribute and Custom Scope in Rails: 00:12:00 •Installing the jQuery UI and html5sortable JavaScript Libraries in Rails 5: 00:09:00 •Initial Implementation of Drag and Drop Interface in Rails 5: 00:13:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 1: 00:18:00 •Implementing Drag and Drop Functionality into a Ruby on Rails 5 App Part 2: 00:11:00 •Implementing Authorization Rules for Drag and Drop Feature with Petergate: 00:07:00 •Deep Dive: jQuery CoffeeScript in Rails: 00:19:00 •Section Introduction jj: 00:01:00 •Introduction to Using Images and the Rails Asset Pipeline: 00:12:00 •How to Set a Full Size Video Background in Rails with Bootstrap 4: 00:08:00 •Deep Dive: Installing and Configuring Carrierwave for Image Uploads in Rails 5: 00:20:00 •Deep Dive: Integrating Connection to AWS S3 for File Hosting with Carrierwave: 00:14:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 1: 00:06:00 •Implementing File Upload Button Styles and Refactoring Placeholder - Part 2: 00:19:00 •Section Introduction ii: 00:01:00 •Difference Between form_form and form_tag in Rails - Part 1: 00:15:00 •Difference Between form_form and form_tag in Rails - Part 2: 00:16:00 •How to Integrate Cocoon in Rails 5 for jQuery Nested Forms: 00:20:00 •Guide to Integrating Alerts that Automatically Fade Away in Rails 5: 00:15:00 •Refactoring Alert Notifications to Use a Shared View Helper in Rails: 00:13:00 •Deep Dive: How to Build an HTML Form from Scratch the Works with Rails: 00:17:00 •Section Introduction ff: 00:03:00 •Integrating the Twitter Gem to Pull in Tweets in Rails 5: 00:20:00 •How to Render Tweets on a Rails View Page: 00:07:00 •Building a Parser View Helper Method to Make Twitter Links Clickable in Rails: 00:15:00 •Customizing the Styles for the Tech News Page with Bootstrap 4: 00:07:00 •Section Introduction cc: 00:01:00 •Running the Comment Generator and Installing the NoSQL Redis Database in Rails 5: 00:18:00 •Building the Comment Form and Required Controller Actions - Part 1: 00:14:00 •Building the Comment Form and Required Controller Actions - Part 2: 00:08:00 •Refactoring the Comment Form into a Partial and Implementing Data Validations: 00:05:00 •Building the jQuery Functions for Processing Comments - Part 1: 00:19:00 •Building the jQuery Functions for Processing Comments - Part 2: 00:05:00 •How to Create a Broadcast with ActionCable in Rails 5: 00:14:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 1: 00:15:00 •Guide to Implementing Live Data Updates in a Rails 5 Application - Part 2: 00:06:00 •Styling the Comment Section and Implementing Gravatar Based Thumbnails in Rails: 00:16:00 •Section Introduction dd: 00:01:00 •Planning Final Project Updates and Assignment: 00:11:00 •Building a Scope to Show the Most Recent Blog Posts and Hiding Draft Posts: 00:09:00 •Hiding the Show Page for Blogs in Draft Mode in Rails 5: 00:04:00 •How to Add a Drop Down Form Element in Rails 5 for Parent/Child Relationships: 00:09:00 •Using the Controller Generator to Build the Topic Features - Part 1: 00:10:00 •Using the Controller Generator to Build the Topic Features - Part 2: 00:11:00 •How to Build a Widget for the Blog to Render Topics in Rails 5: 00:17:00 •How to Implement Radio Buttons in a Rails Form to Update Enum Values: 00:09:00 •Guide to Integrating Markdown and Syntax Highlighting in a Rails 5 Application: 00:13:00 •Integrating Breadcrumbs and Icons for the Blog Show Pages: 00:12:00 •Building a Partial for Managing Admin Actions for Blog Posts: 00:15:00 •How to Implement a Responsive Navigation Bar with Bootstrap 4: 00:11:00 •Updating the Source/Session Tracking System for the New Layouts: 00:14:00 •How to Integrate a Favicon in Rails 5: 00:08:00 •Implementing Responsive Image Components for the Portfolio Layout: 00:06:00 •Adding Card Styles to the About and Contact Pages: 00:09:00 •How to Implement Collapsable Content Components in a Rails 5 Application: 00:09:00 •How to Integrate Bootstrap Progress Bars in a Rails Application: 00:13:00 •How to Integrate Custom Fonts in a Rails 5 Application: 00:17:00 •Updating the Seeds File in Rails: 00:07:00 •Signing Up for and Creating a New Heroku Application: 00:04:00 •How to Deploy a Rails 5 Application to Heroku: 00:13:00 •Working with the Rails Console on Heroku: 00:11:00 •Installing Redis on Heroku for ActionCable Commenting Feature: 00:04:00 •Configuring Action Cable to Work on Heroku: 00:11:00 •How to Implement the Typed.js Library into a Rails 5 Application: 00:12:00 •How to Install and Configure Webpack, Yarn, and jQuery into a Rails 5.1+ App: 00:19:00 •How to Work with Encrypted Credentials in Rails 5.2+: 00:24:00
Duration 0.5 Days 3 CPD hours This course is intended for This course is primarily designed for business leaders, consultants, product and project managers, and other decision-makers who are interested in growing the business by leveraging the power of AI. Other individuals who wish to explore basic AI concepts are also candidates for this course. This course is also designed to assist students in preparing for the CertNexus AIBIZ⢠(Exam AIZ-210) credential. Overview In this course, you will identify ways in which AI can bring significant value to the business. You will: Describe AI fundamentals. Identify the functions of AI in business. Implement business requirements for AI. Artificial intelligence (AI) is not just another technology or process for the business to consider?it is a truly disruptive force, one that delivers an entirely new level of results across business sectors. Even organizations that resist adopting AI will feel its impact. If the organization wants to thrive and survive in this transforming business landscape, it will need to harness the power of AI. This course is designed to help business professionals conquer and move beyond the basics of AI to apply AI concepts for the benefit of the business. It will give you the essential knowledge of AI you'll need to steer the business forward. Lesson 1: AI Fundamentals Topic A: A Brief History of AI Topic B: AI Concepts Lesson 2: Functions of AI in Business Topic A: Improve User Experiences Topic B: Segment Audiences Topic C: Secure Assets Topic D: Optimize Processes Lesson 3: Implementing Business Requirements for AI Topic A: Identify Design Requirements Topic B: Identify Data Requirements Topic C: Identify Risks in Implementing AI Topic D: Develop an AI Strategy
Are you ready to embark on an enlightening journey of wisdom with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle, and pave your way to an enriched personal and professional future? If so, then Step into a world of knowledge with our bundle - Functional Skills IT with Microsoft Excel, IoT & ICT Training. Delve into eight immersive CPD Accredited courses, each a simple course: Course 1: IT Administration and Networking Course 2: Microsoft Excel Course Course 3: ICT: Information and Communication Technology Course 4: Start an IT Asset Department Course 5: CompTIA IT Fundamentals ITF+ (FCO-U61) Course 6: Recruitment: IT Basics for IT Recruiters Course 7: Web Application Penetration Testing Course Course 8: Internet of Things Traverse the vast landscapes of theory, unlocking new dimensions of understanding at every turn. Let the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle illuminate your path to wisdom. The Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle offers a comprehensive exploration into a rich tapestry of vast knowledge across eight carefully curated courses. The journey is designed to enhance your understanding and critical thinking skills. Each course within the bundle provides a deep-dive into complex theories, principles, and frameworks, allowing you to delve into the nuances of the subject matter at your own pace. In the framework of the Functional Skills IT with Microsoft Excel, IoT & ICT Training package, you are bestowed with complimentary PDF certificates for all the courses included in this bundle, all without any additional charge. Adorn yourself with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle, empowering you to traverse your career trajectory or personal growth journey with self-assurance. Register today and ignite the spark of your professional advancement! So, don't wait further and join the Functional Skills IT with Microsoft Excel, IoT & ICT Training community today and let your voyage of discovery begin! Learning Outcomes: Upon completion of the Functional Skills IT with Microsoft Excel, IoT & ICT Training Bundle, you will be able to: Attain a holistic understanding in the designated areas of study with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle. Establish robust bases across each course nestled within the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle. Decipher intricate concepts through the articulate content of the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle. Amplify your prowess in interpreting, scrutinising, and implementing theories. Procure the capacity to engage with the course material on an intellectual and profound level. Become proficient in the art of problem-solving across various disciplines. Stepping into the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle is akin to entering a world overflowing with deep theoretical wisdom. Each course within this distinctive bundle is an individual journey, meticulously crafted to untangle the complex web of theories, principles, and frameworks. Learners are inspired to explore, question, and absorb, thus enhancing their understanding and honing their critical thinking skills. Each course invites a personal and profoundly enlightening interaction with knowledge. The Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle shines in its capacity to cater to a wide range of learning needs and lifestyles. It gives learners the freedom to learn at their own pace, forging a unique path of discovery. More than just an educational journey, the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle fosters personal growth, enabling learners to skillfully navigate the complexities of the world. The Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle also illuminates the route to a rewarding career. The theoretical insight acquired through this bundle forms a strong foundation for various career opportunities, from academia and research to consultancy and programme management. The profound understanding fostered by the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle allows learners to make meaningful contributions to their chosen fields. Embark on the Functional Skills IT with Microsoft Excel, IoT & ICT Training journey and let knowledge guide you towards a brighter future. CPD 100 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals keen on deepening their firm understanding in the respective fields. Students pursuing higher education looking for comprehensive theory modules. Professionals seeking to refresh or enhance their knowledge. Anyone with a thirst for knowledge and a passion for continuous learning. Requirements Without any formal requirements, you can delightfully enrol in this Functional Skills IT with Microsoft Excel, IoT & ICT Training Bundle. Career path Armed with the Functional Skills IT with Microsoft Excel, IoT & ICT Training bundle, your professional journey can reach new heights. The comprehensive theoretical knowledge from this bundle can unlock diverse career opportunities across several fields. Whether it's academic research, consultancy, or programme management, this bundle lays a solid groundwork. Certificates CPD Certificate Of Completion Digital certificate - Included 8 Digital Certificates Are Included With This Bundle CPD Quality Standard Hardcopy Certificate (FREE UK Delivery) Hard copy certificate - £9.99 Hardcopy Transcript: £9.99
Unlock the power of SQL with the Mastering SQL Programming course. This comprehensive program takes you from the fundamentals to advanced techniques in SQL programming. Starting with setting up your tools, you'll delve into browsing, filtering, and sorting data. Explore complex operations, including mathematical calculations and string concatenation, while learning to manage NULL values and use CASE statements effectively. Dive into SQL functions, nested queries, and join operations, gaining mastery over data manipulation and database definition. Whether you're a beginner or seeking to enhance your SQL skills, this course equips you with the knowledge to become a proficient SQL programmer. Learning Outcomes: Establish a solid foundation in SQL programming principles. Efficiently browse, filter, and sort data for data retrieval. Utilize AND, OR, and NOT operators for precise data filtering. Perform mathematical operations and string concatenation in SQL. Apply sorting, alias names, and record limiting to enhance result readability. Handle NULL values and implement DISTINCT and CASE statements. Master multiple-row and single-row functions for complex data processing. Create nested queries and perform data manipulation using SQL. Why buy this Mastering SQL Programming? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Mastering SQL Programming you will be able to take the MCQ test that will assess your knowledge. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Mastering SQL Programming course is ideal for Aspiring database administrators and SQL developers. Individuals looking to enhance their data management skills. Business analysts seeking SQL proficiency for data analysis. Anyone interested in learning SQL programming from basics to advanced concepts. Prerequisites This Mastering SQL Programming was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path SQL Developer: £30,000 - £60,000 per year. Database Administrator (DBA): £35,000 - £70,000 per year. Data Analyst: £25,000 - £55,000 per year. Business Intelligence Analyst: £35,000 - £65,000 per year. SQL Instructor/Trainer: Earnings vary based on experience and location.
Immerse yourself in the realm of database administration with the SQL Database Administrator at QLS Level 5 course. Gain mastery over SQL environment setup, statement fundamentals, advanced commands, and database creation. From optimizing queries to managing databases and tables, this course equips you with the skills to excel as a proficient SQL Database Administrator. Learning Outcomes Establish a strong foundation in SQL database administration, covering setup and configuration. Master SQL statement basics, including querying, filtering, and sorting data effectively. Utilize GROUP BY statements for data aggregation and summarization. Navigate the intricacies of table joins to extract meaningful insights from complex datasets. Demonstrate proficiency in advanced SQL commands and statements for enhanced database management. Why choose this SQL Database Administrator at QLS Level 5 course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this SQL Database Administrator at QLS Level 5 course for? Aspiring Database Administrators and SQL Professionals. Software Developers Seeking to Expand Their Database Management Skills. IT Professionals Interested in Database Administration. Data Analysts and Data Engineers Looking to Enhance Their SQL Knowledge Career path SQL Database Administrator - $60,000 to $110,000/year. Database Developer - $70,000 to $120,000/year. Data Engineer - $80,000 to $130,000/year. Database Manager - $90,000 to $150,000/year. Database Architect - $100,000 to $160,000/year Prerequisites This SQL Database Administrator at QLS Level 5 does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for only £115 to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Please Note: Studyhub is a Compliance Central approved resale partner for Quality Licence Scheme Endorsed courses. Course Curriculum Course Introduction Introduction 00:04:00 Course Curriculum Overview 00:05:00 Overview of Databases 00:10:00 SQL Environment Setup MySQL Installation 00:16:00 MySQL Workbench Installation 00:09:00 Connecting to MySQL using Console 00:09:00 SQL Statement Basics Overview of Challenges 00:04:00 SQL Statement Basic 00:16:00 SELECT Statement 00:09:00 SELECT DISTINCT 00:05:00 Column AS Statement 00:12:00 COUNT built-in Method usage 00:11:00 SELECT WHERE Clause - Part One 00:05:00 SELECT WHERE Clause - Part Two 00:11:00 SQL Statement Basic 00:16:00 SQL Limit Clause Statement 00:09:00 SQL Using BETWEEN with Same Column Data 00:11:00 How to Apply IN Operator 00:11:00 Wildcard Characters with LIKE and ILIKE 00:11:00 GROUP BY Statements Overview of GROUP BY 00:06:00 Aggregation function SUM() 00:09:00 Aggregation MIN() and MAX() 00:05:00 GROUP BY - One 00:09:00 GROUP BY - Two 00:12:00 HAVING Clause 00:05:00 JOINS Overview of JOINS 00:04:00 Introduction to JOINS 00:04:00 AS Statement table 00:03:00 INNER Joins 00:14:00 FULL Outer Join 00:11:00 LEFT Outer JOIN 00:08:00 RIGHT JOIN 00:08:00 Union 00:07:00 Advanced SQL Commands / Statements Timestamps 00:12:00 EXTRACT from timestamp 00:10:00 Mathematical Functions 00:12:00 String Functions 00:22:00 SUBQUERY 00:13:00 Creating Database and Tables Basic of Database and Tables 00:06:00 DataTypes 00:10:00 Primarykey and Foreignkey 00:06:00 Create Table in SQL Script 00:13:00 Insert 00:11:00 Update 00:07:00 Delete 00:04:00 Alter Table 00:09:00 Drop Table 00:05:00 NOT NULL Constraint 00:08:00 UNIQUE Constraint 00:09:00 Databases and Tables Creating a Database backup 00:12:00 10a Overview of Databases and Tables 00:05:00 10c Restoring a Database 00:07:00 Assignment Assignment - SQL Database Administrator at QLS Level 5 04:00:00 Order your QLS Endorsed Certificate Order your QLS Endorsed Certificate 00:00:00