Duration 3 Days 18 CPD hours This course is intended for The ideal audience for this course includes database enthusiasts, IT professionals, and developers who are eager to expand their knowledge and skill set in database management and optimization. Roles that would greatly benefit from attending this course include: Database Developers: Those who design, implement, and maintain databases as part of their primary responsibilities and want to improve their expertise in schema design, query optimization, and advanced database features. Backend Developers: Professionals who work on server-side application logic and require a strong understanding of database management to integrate data storage and retrieval processes into their applications. Overview Upon completing this course, database developers will be able to: Design and implement efficient database schemas by employing normalization techniques, appropriate indexing strategies, and partitioning methods to optimize data storage and retrieval processes. Develop advanced SQL queries, including joining multiple tables, utilizing subqueries, and aggregating data, to extract valuable insights and facilitate decision-making processes. Implement stored procedures, functions, and triggers to automate common database tasks, enforce data integrity, and improve overall application performance. Apply database performance tuning techniques, such as query optimization, index management, and transaction control, to ensure optimal resource usage and enhanced system responsiveness. Integrate databases with various programming languages and platforms, enabling seamless data access and manipulation for web, mobile, and desktop applications. PostgreSQL is a powerful, open-source object-relational database management system that emphasizes extensibility, data integrity, and high performance. Its versatility and robust feature set make it an ideal choice for developers working on projects of all sizes, from small-scale applications to enterprise-level systems. By learning PostgreSQL, developers can tap into its advanced capabilities, such as full-text search, spatial data support, and customizable data types, allowing them to create efficient and scalable solutions tailored to their unique needs. PostgreSQL for Database Developers is a three-day hands-on course that explores the fundamentals of database management, covering everything from installation and management to advanced SQL functions. Designed for beginners and enthusiasts alike, this course will equip you with the knowledge and skills required to effectively harness the power of PostgreSQL in today's data-driven landscape. Throughout the course you?ll be immersed in a variety of essential topics, such as understanding data types, creating and managing indexes, working with array values, and optimizing queries for improved performance. You?ll gain valuable hands-on experience with real-world exercises, including the use of the psql client, writing triggers and stored procedures with PL/pgSQL, and exploring advanced SQL functions like Common Table Expressions (CTE), Window Functions, and Recursive Queries. You?ll exit this course with a solid foundation in PostgreSQL, enabling you to confidently navigate and manage your databases with ease and efficiency. Installing & Managing PostgreSQL PostgreSQL installation process Optimal configuration settings User and role management Database backup and restoration Overview of PostgreSQL Database PostgreSQL architecture overview Understanding database objects Efficient data storage Transaction management basics Using the psql client Introduction to psql Essential psql commands Executing queries effectively Managing databases with psql Understanding PostgreSQL data types Numeric data types explored Character and binary types Date, time, and boolean values Array and other types Understanding sequences Sequence creation and usage Customizing sequence behavior Implementing auto-increment columns Sequence manipulation and control Creating & managing indexes PostgreSQL index fundamentals Designing partial indexes Utilizing expression-based indexes Index management techniques Using COPY to load data COPY command overview Importing and exporting data Handling CSV and binary formats Performance considerations Working with Array Values Array value basics Array manipulation functions Querying arrays efficiently Multidimensional array handling Advanced SQL Functions Mastering Common Table Expressions Utilizing Window Functions Regular Expressions in SQL Crafting Recursive Queries Writing triggers & stored procedures with PL/pgSQL PL/pgSQL variables usage Implementing loop operations PERFORM and EXECUTE statements Developing PostgreSQL triggers Using the PostgreSQL query optimizer Query analysis and optimization EXPLAIN command insights PostgreSQL query operators Identifying performance bottlenecks Improving query performance Query performance tuning Index optimization strategies Efficient database partitioning Connection and resource management Wrap Up & Additional Resources Further learning opportunities Staying up-to-date with PostgreSQL Community engagement and support Additional course details: Nexus Humans PostgreSQL for Database Developers (TTDB7024) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL for Database Developers (TTDB7024) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Learn JavaScript from Scratch: JavaScript for Everyone is a hands-on course that teaches the ins and outs of modern JavaScript. It is the perfect course for anyone who wants to learn the programming language from scratch and wants to develop engaging, interactive websites that leverage all the latest features JavaScript comes with.
This course is structured to give you both the theoretical and coding experience of developing Kafka Streams applications using Streams API. It also covers the techniques to use Enterprise Standard Kafka Streams application using Spring Boot and Streams API. You will build a real-time Kafka Streams application by the end of this course. Prior experience building Kafka applications is necessary.
Accelerate Your Full Stack Developer Career: Fast-Track Program with Exams, TOTUM Card & 5-Year Support. Enrol Today! Study methodOnline Duration12months · Self-paced Access to content5 years CertificationsCompTIA IT Fundamentals CertificationPearson IT Specialist HTML5 Application DevelopmentPearson IT Specialist HTML and CSSPearson IT Specialist PythonPearson IT Specialist AI (Artificial Intelligence)Pearson IT Specialist DatabasesPearson IT Specialist JavaScript Additional info Exam(s) / assessment(s) is included in price Tutor is available to students TOTUM card included in price Job guarantee programme is included in this course Overview Learn the most in-demand digital skills in the world today with the Nuyew Tech Academy A Full Stack Developer is someone who is familiar and comfortable with all layers in computer software development. Full Stack Developers have the functional knowledge and ability to take a concept and turn it into a finished product. They understand how everything works from top to bottom and can anticipate problems accordingly. Becoming a Full Stack Developer has many advantages over being a specialist in either front-end or back-end development with one of the main advantages being the fact that they tend to find themselves very much in demand as they have more of the key skills desired by the leading Tech Companies. Certifications CompTIA IT Fundamentals Certification Awarded by CompTIA Pearson IT Specialist HTML5 Application Development Pearson IT Specialist HTML and CSS Pearson IT Specialist Python Pearson IT Specialist AI (Artificial Intelligence) Pearson IT Specialist Databases Pearson IT Specialist JavaScript Awarded by Pearson Description With a national shortage of Full Stack Developers, starting salaries of up to £25,000 per annum (average UK Salary £52,500) and amazing future employed and self-employed career prospects, take the next step today with our Fast Track Full Stack Developer Programme. What you can expect from our Fast Track Programme: World Class Education Energetic and unlimited 24/7 Student Support Real, tangible Career Outcomes 5 Years Career Support and Course Access What our programme includes: Foundation Awards CompTIA ITF+ (IT Fundamentals) Industry Recognised Qualifications Pearson IT Specialist HTML5 Application Development Pearson IT Specialist HTML and CSS Pearson IT Specialist JavaScript Pearson IT Specialist Python Pearson IT Specialist AI (Artificial Intelligence) Pearson IT Specialist Databases Exams Includes all Exams and Unlimited Re-Sits 5 Years Career Support Guarantee As part of our unique Support Guarantee, our Career Support Team will assist you with: CV writing Expert careers advice Interview preparation Identifying and applying for the best opportunities in your area As a student in the Nuyew Tech Academy you will also be given exclusive access to our Career Skills Academy which includes advanced courses on Employability, CV Preparation, Interview Skills and Technique and everything else you need to get ready for your new Career. Who is this course for? This course is open to anyone interested in pursuing a Career in Full Stack Web Development. Our Foundation Level provides the flexibility for us to accommodate students with any level of previous knowledge and experience. Requirements This course is open to all and has no pre-requisites All you need is a passion for technology and a strong desire to succeed. Career path Our programme is designed to enable you to achieve an Entry Level/Helpdesk role during training (£18k-£24K) ensuring that you also have the vital work experience required to enter the Tech Industry at a higher level (Av Salary £52.5K). Our Career Support Guarantee gives you exclusive access to our dedicated Career Support Team and Advanced Career Skills Academy for 5 Years following Graduation.
Overview of Functional Skills - IT In today's digital age, the world of IT (Information Technology) is a realm of endless possibilities. The UK's IT sector is booming, with a projected growth rate of 3.9% annually through 2024. This Functional Skills - IT course opens doors to a thriving industry that's shaping our future. From the intricate workings of hardware to the complexities of cloud computing, this comprehensive program covers it all. Dive into the heart of IT systems and uncover the secrets behind the technology that powers our modern world. You'll explore everything from basic components to advanced concepts like virtualisation and database management. This Functional Skills - IT course isn't just about understanding technology; it's about positioning yourself at the forefront of innovation. The UK's tech sector is valued at over £184 billion and growing. By mastering IT functional skills, you're not just learning; you're investing in a future-proof career. Whether you're a curious beginner or looking to upgrade your skills, this course provides the foundation you need to thrive in the digital economy. Don't miss this opportunity to become part of the UK's digital revolution. Enrol now and transform your understanding of IT! Get a Quick Look at The Course Content: This course in Functional Skills - IT covers the following learning points: This course in Functional Skills - IT covers the following learning points: Identify and describe various hardware elements in IT infrastructure. Explain operating systems and their role in computing. Explain operating systems and their role in computing. Grasp concepts of data storage, databases, and cloud computing. Recognise different IT management roles and career opportunities. This course covers the topic you must know to stand against the tough competition. The future is truly yours to seize with this Functional Skills - IT. Enrol today and complete the course to achieve a certificate that can change your career forever. Details Perks of Learning with IOMH One-To-One Support from a Dedicated Tutor Throughout Your Course. Study Online - Whenever and Wherever You Want. Instant Digital/ PDF Certificate. 100% Money Back Guarantee. 12 Months Access. Process of Evaluation After studying the course, an MCQ exam or assignment will test your skills and knowledge. You have to get a score of 60% to pass the test and get your certificate. Certificate of Achievement Certificate of Completion - Digital / PDF Certificate After completing the Functional Skills - IT course, you can order your CPD Accredited Digital / PDF Certificate for £5.99. Certificate of Completion - Hard copy Certificate You can get the CPD Accredited Hard Copy Certificate for £12.99. Shipping Charges: Inside the UK: £3.99 International: £10.99 Who Is This Course for? Individuals seeking to enhance their basic IT knowledge and skills. Students preparing for further education in information technology. Professionals aiming to transition into IT-related roles. Job seekers looking to improve their employability in tech sectors. Anyone interested in understanding modern IT systems and practices. Requirements There is no prerequisite to enrol in this course. You don't need any educational qualification or experience to enrol in the Functional Skills - IT course. Do note: you must be at least 16 years old to enrol. Any internet-connected device, such as a computer, tablet, or smartphone, can access this online course. Career Path IT Support Technician: £18K to £35K/year. Network Administrator: £25K to £40K./year Systems Analyst: £28K to £62K/year. IT Manager: £45k to £90k/year. Cyber Security Analyst: £35k to £60k/year. Course Curriculum Section 1: Introduction Unit 1: Introduction 00:01:00 Unit 2: Course Outline 00:06:00 Section 2: Information Technology Unit 1: Facts about Information Technology (IT) 00:05:00 Unit 2: What is Information Technology & How IT Works 00:02:00 Section 3: Components of IT Unit 1: IT Components 00:02:00 Section 4: Hardware Unit 1: What is Hardware 00:02:00 Unit 2: Examples of Computer 00:02:00 Unit 3: Computer Hardware Manufacturers 00:04:00 Unit 4: Hardware Jobs 00:05:00 Section 5: Operating System Unit 1: What is Operating System 00:02:00 Unit 2: Examples of Operating System 00:08:00 Unit 3: Operating System Jobs 00:10:00 Unit 4: OS Tools Related Jobs 00:02:00 Section 6: Application/Software Unit 1: What is Application/Software 00:03:00 Unit 2: Software Building Tools and Languages 00:03:00 Unit 3: Software/Application Building Jobs 00:03:00 Unit 4: Software/Application User Jobs 00:03:00 Section 7: Networking Unit 1: What is Computer Networking 00:02:00 Unit 2: Computer Network Companies 00:02:00 Unit 3: Network Jobs 00:04:00 Section 8: Security Unit 1: What is Computer Security 00:02:00 Unit 2: Security Companies 00:01:00 Unit 3: Security Jobs 00:03:00 Section 9: Traffic Flow & Enterprise Level IT Components Unit 1: How Information Flow within IT 00:02:00 Unit 2: Enterprise Level IT Components 00:02:00 Section 10: Storage Unit 1: What is Storage 00:05:00 Unit 2: Storage Companies and Technologies 00:02:00 Unit 3: Jobs in Storage 00:02:00 Section 11: Database Unit 1: What is Database 00:02:00 Unit 2: Database Type and Technologies 00:04:00 Unit 3: Database Jobs 00:02:00 Section 12: Virtualisation & Cloud Unit 1: What is Virtualisation 00:03:00 Unit 2: What is Cloud Technology 00:02:00 Unit 3: Virtualisation and Cloud Companies 00:02:00 Unit 4: Virtualisation and Cloud Jobs 00:02:00 Section 13: Management & Other IT Jobs Unit 1: IT Management Jobs 00:03:00 Unit 2: Other IT Jobs 00:09:00
Blockchain revolutionizes industries, offering decentralized, secure digital asset storage and transfer. This course explores fundamental blockchain and Web3 concepts-architecture, consensus, and benefits. Delve into blockchain economics, crucial for understanding network incentives and sustainability.
Register on the CompTIA A+ (220-1002) today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The CompTIA A+ (220-1002) is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The CompTIA A+ (220-1002) Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the CompTIA A+ (220-1002), all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: All About the CompTIA A+ 2019 Core 2 Exam CompTIA A+ 2019 Core 2 (220-1002) Course Introduction 00:02:00 What is the CompTIA A+ 00:02:00 Why Get A+ Certified? 00:03:00 What is on the CompTIA A+ Core 2 (220-1002) Exam? 00:04:00 How to Pass the CompTIA A+ Exam 00:04:00 How to use this Video Course 00:03:00 Section 02: Safety and Professionalism Professional Communication Part 1 00:06:00 Professional Communication Part 2 00:07:00 Physical Safety 00:07:00 Section 03: The Visible Computer What is an Operating System? 00:09:00 Users and Super Users 00:05:00 Why Windows? 00:08:00 Windows Editions and Versions 00:12:00 Touring the macOS 00:06:00 Touring Linux 00:08:00 Section 04: CPUs 32-Bit vs. 64-Bit Processing 00:12:00 Section 05: RAM Virtual Memory 00:06:00 Section 06: Power Supply Power Protection 00:10:00 Section 07: Implementing Mass Storage Understanding Partitioning 00:04:00 MBR Partitioning 00:12:00 GPT Partitioning 00:09:00 Understanding File Systems 00:12:00 Popular File Systems 00:07:00 Formatting in Action 00:11:00 Dynamic Disks 00:09:00 Software RAID in Storage Spaces 00:10:00 Encrypting Mass Storage 00:09:00 Section 08: Building a PC Boot from Everything 00:12:00 Installing Windows 00:12:00 Post-Installation Tasks 00:12:00 Windows Installation options 00:07:00 Section 09: Windows under the Hood What is the Registry? 00:11:00 Processes 00:07:00 Services 00:04:00 Your Windows Toolset 00:08:00 Windows 7 Task Manager 00:09:00 Windows 10 Task Manager 00:06:00 Information and Configuration Tools 00:11:00 Performance Monitor 00:12:00 Event Viewer 00:07:00 Tools for Programmers 00:08:00 Section 10: Users, Groups, and Permissions Introduction to Users and Groups 00:06:00 Managing Users and Groups 00:12:00 NTFS Permissions 00:08:00 Linux and macOS Permissions 00:05:00 File Explorer 00:14:00 Sharing Resources 00:11:00 Security Policies 00:08:00 Section 11: Maintaining and Optimizing Operating Systems Patch Management 00:11:00 Working with Disks 00:06:00 Working with Applications 00:07:00 System Restore 00:05:00 Backing up Your Files 00:07:00 Task Scheduler 00:07:00 Section 12: Working with the Command-Line Interface Understanding the CLI 00:11:00 Navigating the CLI 00:14:00 Working with Folders 00:07:00 Working with Files 00:11:00 Working with Drives 00:13:00 Super Copy Commands 00:09:00 Advanced Windows Command Line 00:08:00 Advanced Linux Commands 00:13:00 Command-Line Permissions 00:08:00 Introduction to Scripting 00:10:00 Interpreted Languages 00:12:00 Section 13: Troubleshooting Operating Systems Windows Recovery Environment 00:05:00 Advanced Windows Startup Options 00:07:00 Troubleshooting Boot Problems 00:10:00 Troubleshooting at the GUI 00:11:00 Troubleshooting Applications 00:07:00 Kernel Panic 00:05:00 Section 14: Display Technologies Resolutions and Aspect Ratios 00:06:00 Multiple Monitors 00:05:00 Section 15: Essentials of Networking Network Card Troubleshooting 00:09:00 Section 16: Local Area Networking Working with Connections 00:09:00 Working with Workgroups 00:08:00 Working with Active Directory 00:14:00 Windows Sharing with Mac and LInux 00:07:00 Net Command 00:04:00 Firewall Configuration 00:11:00 Windows Firewall 00:08:00 Port Forwarding 00:07:00 Section 17: Wireless Networking Wireless Encryption 00:11:00 Enterprise Wireless 00:16:00 Section 18: The Internet Telnet and SSH 00:07:00 Remote Desktop Connections 00:06:00 The World Wide Web 00:09:00 Troubleshooting Internet Connections 00:07:00 Section 19: Portable Computing Power Management 00:11:00 Section 20: Care and Feeding of Mobile Devices Mobile Device Security 00:08:00 Mobile Security Troubleshooting 00:06:00 Mobile Device Troubleshooting 00:10:00 Section 21: Securing Computers Threats 00:10:00 Physical Security 00:08:00 Passwords and Authentication 00:14:00 Malware 00:14:00 Anti-Malware 00:11:00 Social Engineering 00:06:00 Licensing 00:10:00 Incident Response 00:05:00 Environmental Controls 00:06:00 Section 22: Operational Procedures Documents You Need to Know 00:09:00 Data You Need to Know 00:04:00 Change Management 00:06:00 The Zen of Backup 00:11:00 Recycling and Data Destruction 00:07:00
Register on the Ethereum Blockchain DApp using Solidity today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The Ethereum Blockchain DApp using Solidity is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The Ethereum Blockchain DApp using Solidity Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the Ethereum Blockchain DApp using Solidity, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content Section 01: What is Blockchain? Introduction to Building an Ethereum Blockchain App 00:02:00 The Beginning of Blockchain 00:05:00 Currency and Cryptocurrency 00:05:00 Why Use the Blockchain? 00:06:00 Blockchain Data and Blocks 00:06:00 Blockchain Immutability 00:03:00 Blockchain Consensus 00:02:00 Building the Blockchain Story 00:03:00 Hashes 00:06:00 What is a Chain of Blocks? 00:04:00 Finding the Nonce 00:05:00 Blockchain Mining 00:03:00 Arriving at Consensus 00:05:00 Public vs. Private Blockchains 00:03:00 Distributed Processing and Blockchain Solutions 00:06:00 Section 02: What is Ethereum? Introduction to Ethereum 00:03:00 Ethereum in Financial Services 00:07:00 Ethereum in Digital Identity Management 00:05:00 Ethereum in Industry Applications 00:06:00 Ethereum in Government 00:03:00 Ethereum Smart Contracts 00:03:00 Ether and the Initial Coin Offering (ICO) 00:06:00 Decentralized Autonomous Organization (DAO) 00:03:00 The Ethereum Ecosystem 00:06:00 Building Blockchain Apps 00:05:00 Section 03: The Ethereum Ecosystem & the Development Lifecycle Parts of the Ethereum Blockchain 00:11:00 Smart Contracts 00:05:00 Smart Contract Languages 00:04:00 What are Virtual Machines? 00:06:00 The Ethereum Virtual Machine (EVM) 00:03:00 Fueling Your Code with Gas 00:05:00 Tools for Ethereum SDLC 00:03:00 Blockchain Client 00:03:00 Writing and Testing Your Code, Part 1 00:05:00 Writing and Testing Your Code, Part 2 00:07:00 Section 04: Ethereum Development Tools Your Ethereum Development Toolbox 00:04:00 Installing Geth Lab (CLI Blockchain Client) 00:04:00 Installing Ganache Lab (Test Blockchain) 00:06:00 Installing Truffle Lab (Development Environment and Testing Framework) 00:06:00 Installing Microsoft Visual Studio Code Lab (IDE) 00:05:00 Section 05: Your Ethereum Wallet What is an Ethereum Wallet? 00:02:00 Types of Ethereum Wallets 00:06:00 Web and Desktop Wallets 00:07:00 Mobile, Hardware, and Paper Wallets 00:09:00 Installing MetaMask 00:05:00 Section 06: Building Your First Ethereum App Preparing Your First Truffle Project 00:07:00 Writing a Simple Smart Contract 00:11:00 Compiling Your Simple Smart Contract 00:10:00 Deploying Code and Invoking Functions 00:09:00 Section 07: Learning about Smart Contracts Smart Contracts Review 00:03:00 What is Supply Chain? 00:07:00 Supply Chain Challenges and Blockchain Solutions 00:07:00 Blockchain Solution Examples 00:04:00 Ethereum Tokens 00:06:00 Your Supply Chain Project 00:08:00 Exploring Solidity 00:11:00 Defining Types of Data 00:05:00 Data Types Lab 00:09:00 Solidity Data Modifiers, Part 1 00:04:00 Solidity Data Modifiers, Part 2 00:06:00 Revisiting Gas 00:06:00 Controlling Flow 00:12:00 Handling Errors 00:05:00 Section 08: Your Supply Chain Smart Contract dApp Designing Your Supply Chain App 00:04:00 What are dApps? 00:06:00 Token Smart Contract Details 00:08:00 Supply Chain Smart Contract Details 00:06:00 Smart Contract Road Map 00:02:00 Token Smart Contract Data Lab, Part 1 00:07:00 Token Smart Contract Data Lab, Part 2 00:09:00 Supply Chain Smart Contract Data Lab, Part 1 00:05:00 Supply Chain Smart Contract Data Lab, Part 2 00:03:00 Token Smart Contract Functions Lab, Part 1 00:05:00 Token Smart Contract Functions Lab, Part 2 00:04:00 Supply Chain Smart Contract Functions Lab, Part 1 00:10:00 Supply Chain Smart Contract Functions Lab, Part 2 00:09:00 Using Events 00:07:00 Implementing Events 00:05:00 More on Ownership 00:08:00 Designing for Security 00:09:00 Implementing Minimal Functionality 00:06:00 Section 09: Testing Ethereum Apps Blockchain dApp Testing 00:10:00 Deploying Your dApp to a Test Blockchain Lab 00:08:00 Writing Tests for Ethereum dApps 00:06:00 Command-Line Testing Lab, Part 1 00:04:00 Command-Line Testing Lab, Part 2 00:11:00 Command-Line Testing Lab, Part 3 00:03:00 JavaScript Testing 00:08:00 Logging and Handling Errors 00:07:00 Logging Activity in Smart Contracts 00:05:00 Fixing Bugs in a dApp 00:05:00 Section 10: Deploying and Maintaining Ethereum Apps Test Blockchains 00:08:00 The Live Blockchain (Mainnet) 00:05:00 Connecting to Multiple Blockchains and Infura Lab 00:05:00 Configuring Truffle and Infura Lab 00:06:00 Funding Your Account Lab 00:04:00 Deploying to the Live Blockchain 00:08:00 Section 11: Integrating Non-Blockchain Apps with Ethereum Blockchain and Database Storage 00:11:00 Execution and Flow in dApps and Traditional Applications 00:05:00 Blockchain Incorporation Design Goals 00:06:00 Integration Considerations for Incorporating Blockchain 00:06:00 Interface Considerations for Incorporating Blockchain 00:04:00 Resources Resources - Ethereum Blockchain DApp Using Solidity 00:00:00
This course will transform you from someone who has never thought of coding a website to someone who can create a professional website in an hour using ChatGPT. If you are already a web designer, this will exponentially enhance your productivity. What would take days of work by a professional can now be done by any individual in just a few hours.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options