Duration 3 Days 18 CPD hours This course is intended for This is an introductory level React development course for web developers. Overview Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn about and explore: A basic and advanced understanding of React components An advanced, in-depth knowledge of how React works A complete understanding of using Redux How to build, validate, and populate interactive forms How to use inline styles for perfect looking components How to test React components How to build and use components How to get control of your build process Introduction to React | React Basics is a three-day hands-on course designed to get students quickly up and running with Core React skills. Geared for more experienced web developers new to React, this course provides students with the core knowledge and hands-on skills they require to build reliable, powerful React apps.Throughought the course students will explore React fundamentals with a progressive, example-driven approach. You?ll create your first apps, learn how to write components, start handling user interaction, and manage rich forms. We end the first part by exploring the inner workings of Create React App (Facebook?s tool for running React apps), and building a multi-page app that uses client-side routing.Every project in this course was built using Create React App. Create React App is based on Webpack, a tool which helps process and bundle our various JavaScript, CSS, HTML, and image files. We explore Create React App in-depth in the module ?Using Webpack with Create React App.?Students will build Single Page Applications (SPA), create robust routing with error handling, and both class and functional reusable components.The lab project will also include the use of form validation.NOTE: This is a foundational course that explores how to build your first React application. Students who want a deeper dive, withmore intermediate level topics such as Redux, REST, Unit Testing and more might consider the TT4195 Mastering React five-daysuperset of this class as an alternative. ES6 Primer Prefer const and let over var Arrow functions Modules Object.assign() Template literals The spread operator and Rest parameters Enhanced object literals Default arguments Destructuring assignments Your First React Web Application Setting up your development environment JavaScript ES6 /ES7 What?s a component? Building The App Making The App data-driven Your app?s first interaction JSX and the Virtual DOM React Uses a Virtual DOM Why Not Modify the Actual DOM? What is a Virtual DOM? Virtual DOM Pieces ReactElement JSX
Whetstone Communications and comms2point0 are pleased to bring you the Data Bites series of free webinars. Our aim is to boost interest and levels of data literacy among not-for-profit communicators.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for Cisco Partner Sales Engineers and Field engineers supporting customers with 802.1x solutions. The primary audience for this course is Cisco Channel Partner SEs and FEs that are seeking to meet the education requirements to attain ATP authorization to sell Cisco ISE. The secondary audience for this course is security architects, design engineers, and others seeking hands-on experience with Cisco TrustSec 802.1X deployments with Cisco ISE Overview Upon completing this course, students will be able to meet these objectives:- Describe identity-based networking concepts and components - Define the components and processes of port-based authentication - Identify the 802.1X components and their interrelation at a high level - Identify requirements and options for non-supplicant devices - Position individual components of an 802.1X network and identify compatibilities Students will gain the foundational knowledge of IEEE 802.1X protocol; the skills that are needed to configure the Cisco Identity Services Engine (ISE) for 802.1X operation; hands-on experience configuring a network for 802.1X-based network services. Cisco TrustSec Surveying Cisco TrustSec Surveying Cisco TrustSec Architecture Components Port-Based Authentication Surveying the IEEE 802.1X Standard Surveying 802.1X and EAP Surveying 802.1X and EAP Configure Devices for 802.1X Operation Identifying 802.1X Components and Topologies Identifying 802.1X Components and Topologies Configuring Network Devices for 802.1X Configuring Supplicants for 802.1X Operation Configure Guest Access Configuring Cisco TrustSec for Non-Supplicant Devices Configuring Cisco WebAuth for Non-Supplicant Devices Design Cisco TrustSec Networks with Cisco ISE and 802.1X Identifying Component Compatibilities with 802.1X Reviewing 802.1X Design Considerations that Impact Implementation Reviewing Scalable 802.1X Architectures Additional course details: Nexus Humans Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Introduction to 802.1X Operations for Cisco Security Professionals v1.0 (8021X) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for Ethical Hackers, Penetration Testers, Network Server Administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment Professionals, Cybersecurity Forensic Analyst, Cyberthreat Analyst, Cloud Security, Analyst Information Security Consultant, Application Security Analyst, Cybersecurity Assurance Engineer, Security Operations Center (SOC) Analyst, Technical Operations Network Engineer, Information Security Engineer, Network Security Penetration Tester, Network Security Engineer, Information Security Architect. Overview Upon successful completion of this course, students will master their Penetration Testing skills, perform the repeatable methodology, become committed to the code of ethics, and present analyzed results through structured reports. The main course outcomes include: 100% mapped with the NICE framework. Maps to the job role of a Penetration Tester and security analyst, based on major job portals. 100% methodology-based Penetration Testing program. Provides strong reporting writing guidance. Blended with both manual and automated Penetration Testing approaches. Gives a real-world experience through an Advanced Penetration Testing Range. Designed based on the most common Penetration Testing services offered by the best service providers in the market. Offers standard templates that can help during a Penetration test. This is a multidisciplinary course with extensive hands-on training in a wide range of crucial skills, including advanced Windows attacks, Internet of Things (IoT) and Operational Technology (OT) systems, filtered network bypass techniques, exploit writing, single and double pivoting, advanced privilege escalation, and binary exploitation. Course Outline Introduction to Penetration Testing Penetration Testing Scoping and Engagement Open Source Intelligence (OSINT) Social Engineering Penetration Testing Network Penetration Testing ? External Network Penetration Testing ? Internal Network Penetration Testing - Perimeter Devices Web Application Penetration Testing Wireless Penetration Testing IoT Penetration Testing OT/SCADA Penetration Testing Cloud Penetration Testing Binary Analysis and Exploitation Report Writing and Post-Testing Actions Additional course details: Nexus Humans Certified Penetration Testing Professional (CPENT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Penetration Testing Professional (CPENT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is intended for data warehouse engineers, data platform engineers, and architects and operators who build and manage data analytics pipelines. Completed either AWS Technical Essentials or Architecting on AWS Completed Building Data Lakes on AWS Overview In this course, you will learn to: Compare the features and benefits of data warehouses, data lakes, and modern data architectures Design and implement a data warehouse analytics solution Identify and apply appropriate techniques, including compression, to optimize data storage Select and deploy appropriate options to ingest, transform, and store data Choose the appropriate instance and node types, clusters, auto scaling, and network topology for a particular business use case Understand how data storage and processing affect the analysis and visualization mechanisms needed to gain actionable business insights Secure data at rest and in transit Monitor analytics workloads to identify and remediate problems Apply cost management best practices In this course, you will build a data analytics solution using Amazon Redshift, a cloud data warehouse service. The course focuses on the data collection, ingestion, cataloging, storage, and processing components of the analytics pipeline. You will learn to integrate Amazon Redshift with a data lake to support both analytics and machine learning workloads. You will also learn to apply security, performance, and cost management best practices to the operation of Amazon Redshift. Module A: Overview of Data Analytics and the Data Pipeline Data analytics use cases Using the data pipeline for analytics Module 1: Using Amazon Redshift in the Data Analytics Pipeline Why Amazon Redshift for data warehousing? Overview of Amazon Redshift Module 2: Introduction to Amazon Redshift Amazon Redshift architecture Interactive Demo 1: Touring the Amazon Redshift console Amazon Redshift features Practice Lab 1: Load and query data in an Amazon Redshift cluster Module 3: Ingestion and Storage Ingestion Interactive Demo 2: Connecting your Amazon Redshift cluster using a Jupyter notebook with Data API Data distribution and storage Interactive Demo 3: Analyzing semi-structured data using the SUPER data type Querying data in Amazon Redshift Practice Lab 2: Data analytics using Amazon Redshift Spectrum Module 4: Processing and Optimizing Data Data transformation Advanced querying Practice Lab 3: Data transformation and querying in Amazon Redshift Resource management Interactive Demo 4: Applying mixed workload management on Amazon Redshift Automation and optimization Interactive demo 5: Amazon Redshift cluster resizing from the dc2.large to ra3.xlplus cluster Module 5: Security and Monitoring of Amazon Redshift Clusters Securing the Amazon Redshift cluster Monitoring and troubleshooting Amazon Redshift clusters Module 6: Designing Data Warehouse Analytics Solutions Data warehouse use case review Activity: Designing a data warehouse analytics workflow Module B: Developing Modern Data Architectures on AWS Modern data architectures
Duration 3 Days 18 CPD hours This course is intended for Program / Project ManagerSystem ArchitectSystem Administrator Overview Learn about the elements, strategies, and tools of the SAP authorization conceptCreate and assign authorizations using the Role Administration / Profile GeneratorLearn about the principle usage of the NetWeaver Identity Management and Central User Administration (CUA) In this course, students will learn about the elements, strategies, and tools of the SAP authorization concept, create and assign authorizations using the Role Administration/Profile Generator, & learn about the Central User Administration role. Authorizations Describing Authorization Authorization Concepts for Compliant Identity Management Designing Authorization for an AS ABAP-Based System Implementing Authorization for an AS ABAP-Based System Authorization Terminology Defining the Authorization Elements and Terms Checking Authorizations in ABAP Systems User Maintenance Maintaining User Data Basic Role Maintenance Defining a Role Defining Authorizations in a Role Defining Customizing Roles Creating Composite Roles Creating Reference and Derived Roles Maintaining Roles for SAP NetWeaver Business Client Advanced Role Maintenance Applying the Special Functions of Authorization Maintenance Defining Authorizations for a System User Authorization Environment Configuration Installing and Upgrading Role Maintenance Configuring Role Maintenance Defining System Settings Analyzing Missing Authorizations Transporting Authorizations Integration of Authorization Systems into an Organization's Landscape Creating Users with the Central User Administration (CUA) Migrating the CUA into SAP NetWeaver Identity Management (ID Management) Identifying Non-Standard Authorization Concepts in the SAP Business Suite Integrating Authorization Assignments with Organizational Management SAP Systems for Identity Management Identifying Different User Sources Describing SAP NetWeaver Identity Management (ID Management) Planning SAP Governance, Risk, and Compliance (SAP GRC) Describing Compliant Identity Management (CIM) Additional course details: Nexus Humans ADM940 SAP AS ABAP - Authorization Concept training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADM940 SAP AS ABAP - Authorization Concept course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for System Administrator System Architect Technology Consultant Overview This course will prepare you to: start and stop SAP systems perform system configuration tasks describe the architecture of database systems explain fundamental user administration concepts create RFC destinations implement SAP notes and SAP Support Packages configure printers in SAP systems schedule and monitor background jobs In this five-day training, you will learn how to perform various administrative tasks to keep the SAP system running. This course provides you with fundamental knowledge on how to ensure a smooth operation of SAP systems running on Application Server ABAP (AS ABAP). AS ABAP is the technological foundation of SAP Business Suite as well as SAP S/4HANA systems. You will also learn the theoretical administration concepts within AS ABAP and work practically in an SAP system and on the operating system level. Course Content AS ABAP Fundamentals Starting and Stopping SAP Systems Technical System Configuration Setting profile parameters Setting up and working with operation modes Working with task lists Architecture of database systems Understanding basic database administration Fundamentals of User Administration Understanding the user administration concept Understanding the AS ABAP authorization concept RFC Communication Setting up RFC connections Software Maintenance Implementing SAP Notes and SAP Support Packages Preparing a software maintenance process Working with the Support Package Manager (SPAM) Understanding the Software Update Manager (SUM) Output Management Configuring printers Background Processing Scheduling background jobs System Monitoring and Troubleshooting Monitoring architecture Monitoring with SAP Solution Manager Additional course details: Nexus Humans ADM100 System Administration I of SAP S/4HANA and SAP Business Suite training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADM100 System Administration I of SAP S/4HANA and SAP Business Suite course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Practiced Linux system administrators who currently manage Linux servers at the enterprise level - Skilled Linux system administrators who who want or are required to demonstrate competencies by earning the RHCSA This course is designed for experienced Linux System Administrators who want to harden their technical skill sets and become accredited with the RHCSA certification. Accessing the command line Log in to a Linux system and run simple commands using the shell. Managing Files from the command line Work with files from the bash shell prompt. Managing local Linux users and groups Manage Linux users and groups and administer local password policies. Controlling access to files with Linux file system permissions Set access permissions on files and interpret the security effects of different permission settings. Managing SELinux security Use SELinux to manage access to files and interpret and troubleshoot SELinux security effects. Monitoring and managing Linux processes Monitor and control processes running on the system. Installing and updating software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Controlling services and daemons Control and monitor network services and system daemons using systemd. Managing Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Analyzing and storing logs Locate and interpret relevant system log files for troubleshooting purposes. Managing storage and file systems Create and use disk partitions, logical volumes, file systems, and swap spaces. Scheduling system tasks Schedule recurring system tasks using cron and systemd timer units. Mounting network file systems Mount network file system (NFS) exports and server message block (SMB) shares from network file servers. Limiting network communication with firewalld Configure a basic local firewall. Additional course details: Nexus Humans Enterprise Linux System Admin Fast Track with Exam Prep training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Enterprise Linux System Admin Fast Track with Exam Prep course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Software developers, system administrators, and IT professionals who are focused on Microsoft Windows Overview Configuring Microsoft Windows and Microsoft SQL Server in Google Compute Engine. Deploying ASP.NET MVC applications to Google Compute Engine. Deploying .NET Core applications to Google Compute Engine, Google Compute Engine, and Google Container Engine Learn how to create Windows virtual machines on Google Cloud so that you can deploy and run Microsoft Windows applications. In this course, you'll learn how to run SQL Server in Compute Engine, how to deploy instances across Google Cloud zones, and how to get more out of ASP.NET on Compute Engine, Google Container Engine, and App Engine. Introduction to Google Cloud Platform Scope and structure of GCP. Options for Windows deployment on GCP. GCP interfaces. Windows Workloads on Google Compute Engine Google Compute Engine virtual machine options. Integrating Active Directory with Google Compute Engine virtual machines. Options for running SQL Server in Google Compute Engine. Configuring SQL Server for high availability. Developing ASP.NET MVC applications Model-view-controller structure. Using Microsoft Visual Studio?s Web Project template to develop in ASP.NET. Deploying applications to Microsoft Internet Information Server (IIS) in GCE. Configuring Resilient Workloads Deploying instances across GCP zones. Using instance groups to create pools of virtual machines. Load balancing Windows applications. Delivering Next-Generation ASP.NET Core on GCP Understanding .NET Core and EF Core. Options for deploying ASP.NET Core applications on Google Cloud Platform. Deploying ASP.NET Core applications on Google Compute Engine. Deploying ASP.NET Core applications on Google Container Engine. Deploying ASP.NET Core applications on Google App Engine. Additional course details: Nexus Humans Develop and Deploy Windows Applications on Google Cloud Platform training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Develop and Deploy Windows Applications on Google Cloud Platform course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who are new to IBM Spectrum Protect data management. Overview Describe the purpose of IBM Spectrum Protect Install and configure the IBM Spectrum Protect components Use the administrative and client interfaces Discuss storage methodology options and create storage pool Customize data movement and retention policies to meet business requirements Configure the IBM Spectrum Protect database and storage pools for protection Optimize client configuration Perform backup, restore, archive and retrieve operations Organize daily tasks required to protect the IBM Spectrum Protect environment Automate and monitor client and administrative tasks and events IBM Spectrum Protect 8.1.12 is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using object-based data management and policy driven retention.This five-day course will focus on implementation and basic administration of an IBM Spectrum Protect environment. The hands-on lab exercises are performed on a Windows 2016 environment. The course materials include examples of AIX and Linux commands, when different from Windows. Unit 1 Concepts and components Unit 2 Installation and configuration Unit 3 Interfaces and monitoring Unit 4 Storage pools and devices Unit 5 Policy management, data movement, and expiration Unit 6 Server database and storage pool management Unit 7 Client configuration and management Unit 8 Client data protection Unit 9 Daily operations and maintenance Unit 10 Schedules and reports Additional course details: Nexus Humans TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the TS619G IBM Spectrum Protect version 8.1.12 Implementation and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.