Duration 3 Days 18 CPD hours This course is intended for Java Fundamentals is designed for tech enthusiasts who are familiar with some programming languages and want a quick introduction to the most important principles of Java. Overview After completing this course, you will be able to: Create and run Java programs Use data types, data structures, and control flow in your code Implement best practices while creating objects Work with constructors and inheritance Understand advanced data structures to organize and store data Employ generics for stronger check-types during compilation Learn to handle exceptions in your code Since its inception, Java has stormed the programming world. Its features and functionalities provide developers with the tools needed to write robust cross-platform applications. Java Fundamentals introduces you to these tools and functionalities that will enable you to create Java programs. The course begins with an introduction to the language, its philosophy, and evolution over time, until the latest release. You'll learn how the javac/java tools work and what Java packages are - the way a Java program is usually organized. Once you are comfortable with this, you'll be introduced to advanced concepts of the language, such as control flow keywords. You'll explore object-oriented programming and the part it plays in making Java what it is. In the concluding lessons, you'll be familiarized with classes, typecasting, and interfaces, and understand the use of data structures, arrays, strings, handling exceptions, and creating generics. Introduction to Java The Java Ecosystem Our First Java Application Packages Variables, Data Types, and Operators Variables and Data Types Integral Data Types Type casting Control Flow Conditional Statements Looping Constructs Object-Oriented Programming Object-Oriented Principles Classes and Objects Constructors The this Keyword Inheritance Overloading Constructor Overloading Polymorphism and Overriding Annotations References OOP in Depth Interfaces Typecasting The Object Class Autoboxing and Unboxing Abstract Classes and Methods Data Structures, Arrays, and Strings Data Structures and Algorithms Strings The Java Collections Framework and Generics Reading Data from Files The Java Collections Framework Generics Collection Advanced Data Structures in Java Implementing a Custom Linked List Implementing Binary Search Tree Enumerations Set and Uniqueness in Set Exception Handling Motivation behind Exceptions Exception Sources Exception Mechanics Best Practices
Duration 5 Days 30 CPD hours This course is intended for This course is intended for application developers, business analysts, project managers and anyone who needs an introduction to application development in the IBM TRIRIGA Application Platform. Overview After completing this course you should be able to: Perform moderate-level IBM TRIRIGA application customizations by using the Platform Create and modify business objects by using the Data Modeler Create and modify user interfaces by using the Form Builder tool Define lists and classifications Import data by using the Data Integrator Implement business logic with workflows Create reports and queries by using the Report Manager and the IBM TRIRIGA Reporting Dashboard The course provides an introduction to the TRIRIGA Application platform and how to modify the existing TRIRIGA applications and processes or create new ones. The course covers navigation and mechanics of the TRIRIGA Application Platform toolset that is used for creating and modifying objects. Students are also provided background on importing data to TRIRIGA, how to use the Form Builder and the Reporting Dashboard. Course Outline Perform moderate-level IBM TRIRIGA application customizations by using the Platform Create and modify business objects by using the Data Modeler Create and modify user interfaces by using the Form Builder tool Define lists and classifications Import data by using the Data Integrator Implement business logic with workflows Create reports and queries by using the Report Manager and the IBM TRIRIGA Reporting Dashboard Additional course details: Nexus Humans 8D612 IBM TRIRIGA Application Platform v3.7 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 8D612 IBM TRIRIGA Application Platform v3.7 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate -level programming course, designed for experienced Java developers who wish to get up and running on developing well defended software applications. Familiarity with Java and JEE is required and real world programming experience is highly recommended. Ideally students should have approximately 6 months to a year of Java and JEE working knowledge. Overview Students who attend Attacking and Securing Java Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a Java/JEE perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on Java / JEE security training that offers a unique look at Java application security. Beginning with penetration testing and hunting for bugs in Java web applications, you embrace best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, allowing you to experience the mechanics of how to secure JEE web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? Making Application Security Real
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Duration 3 Days 18 CPD hours This course is intended for This is an introductory level course for experienced software developers seeking to enhance and extend their core web development skillset leveraging JavaScript. Attendees should have practical experience developing basic software applications. This course provides an excellent foundation for continued learning to gain in-demand skills in in-demand skills and technologies such as NodeJS, Angular, React, Redux and more. This course can also be tailored for less experienced or non-developers as needed. Please inquire for details. Overview Throughout this course, students will explore the practical use of the umbrella of technologies that work in conjunction with JavaScript as well as some of the tools, toolkits, and frameworks that can be used in conjunction with web development and deployment. The course thoroughly explores JavaScript and how it is used within the context of web applications, walking students through the different technologies that are used with JavaScript and exploring core aspects of JavaScript in terms of web applications, security, tools, and frameworks. This skills-focused course is approximately 50% hands-on lab to lecture ratio. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment guided by our expert team, attendees will learn to: Understand what JavaScript is and how it is used within the context of web applications Work with the different technologies that are the foundation for web applications. Understand and work with the fundamental aspects of JavaScript in terms of web applications, security, tools, and frameworks Learn to how to effectively work with the newest advances in JavaScript such as ES6 and TypeScript Develop code using conventions and optimal constructs for performance Introduction to JavaScript | Modern JavaScript Essentials is a hands-on geared for web developers who need to learn basic JavaScript to use with today's systems and architectures to build sophisticated web interfaces. The training will guide students through a balanced mixture of theory and practical labs to gain core JavaScript development skills and have them explore its related technologies through to the use of tools and libraries to ease the development of advanced web applications. Course attendees will be able to hit the ground running right after class, applying essential JavaScript to projects at both an architectural as well as a line by line coding level. HTML Refresher (optional) HTMLÿ HTML5 CSS Refresher (optional) CSSÿ CSS3 Overview Introduction to JavaScript JavaScript Basics Debugging Tools JavaScript Functions JavaScript Arrays, Math and Date JavaScript Event Handling and the DOM Object-Oriented JavaScript Advanced JavaScript Topics The Next Step TypeScript Introduction to JSON and Ajax JavaScript Best Practices JavaScript Scheduling, Execution, and Security HTML5 JavaScript API Working with XML (Optional) XML DOM Mechanics XSLT Applied Additional course details: Nexus Humans Introduction to JavaScript | Modern JavaScript Essentials (TT4110) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to JavaScript | Modern JavaScript Essentials (TT4110) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course has been expressly designed for the Business Analyst, Business System Analyst, System Analyst, and/or Requirements Engineer. The Designer, Developer and Tester who are actively involved in utilizing use cases may also benefit from this workshop. Overview Employ use cases to elicit requirements, at a business, system or subsystem levelEmploy use cases to document the scope of a projectWrite use cases in a clear and unambiguous way.Model use cases with workflow diagramsPlan and divide up the project work based on your use casesManage a use case as it evolves over time and goes through many changes This course provides a strong foundation in the mechanics of use case diagramming and writing textual descriptions of use cases. In this highly interactive workshop, you will learn how to enhance and refine your use case skills, how to involve your stakeholders in the use case process, and how to develop use cases that provide valuable information to the designers and testers. Use cases that meet the needs of designers can be too technical and too detailed for other stakeholders. Use cases that satisfy business users are usually not very helpful to designers and testers. How do you satisfy these two disparate interests? And how do you handle the details like business rules, data validations and user interface specifications? Introduction Course objectives Understanding of business analysis Knowledge areas of BABOK© Guide Overview of Use Cases Describe the purpose and value of a use case approach Use case terminology Introducing a use case approach Needs Assessment Purpose of Needs Assessment Needs Assessment and use cases Defining and understanding the strategic goals and objectives Understanding the business process Identifying actors Identifying business information Analyzing locations and operations Drawing the business use case diagram Building the business architecture Defining solution options Defining System Scope Product scope/project scope System actors versus business actors Analyzing the business process model Analyzing business use cases Identifying candidate use cases Identifying scenarios Diagramming use cases Draw a use case diagram Create a use case catalog Evaluating, Prioritizing, and Packaging Use Cases Iterative nature of this work Evaluating use cases Use case priority Use case risk Use case complexity Use case dependencies Evaluate and Prioritize use cases Dividing work up between releases Packaging A process for how to perform packaging Writing the Main Success Scenario Use case descriptions Primary and secondary goals Assumptions Pre-conditions Triggers Post-conditions Scenario example Main success scenario Conditional execution Use cases and requirements Best practices for writing a use case description Writing the Other Scenarios Scenarios and flows Alternate scenarios and flows Alternate vs. basic flow Guidelines for alternate flows Exception flows Failed post conditions Write alternate and exception flows Process Modeling to Describe Use Case Flows UML© Activity Diagram Notation Sequencing activities Developing an activity diagram Facilitated sessions Draw a UML© Activity Diagram Using Advanced Diagramming Techniques Commonality Dependency Relationships Identify relationships Comparing the different relationships Developing a Requirements Specification Requirements and use cases Detailed requirements Common approaches to specifications Non-functional requirements Write non-functional requirements User interface requirements UI data descriptions Business rules Decision tables and inference rules How to document simple calculations Reporting requirements Data requirements Data accessibility requirements Traceability Course Summary Wrap-up Finding more information Additional course details: Nexus Humans BA28 - Requirements Analysis and Use Cases training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA28 - Requirements Analysis and Use Cases course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This is an introductory-level XML training course, designed for those needing an introduction to concepts and technologies associated with XML and its related recommendations. Previous experience or knowledge of HTML is helpful but not essential. Overview This course is an intensive, hands-on introduction to XML, XPath, and XSLT. The course is a balanced mixture of theory and practical labs designed to take students from the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with the fundamentals of XML, including coverage of DTDs and XML Schema. It then moves on to the XPath and XSLT standards, and how to use them to transform XML documents into other documents such as HTML documents or other XML documents. This course provides indoctrination in the practical use of W3C standards (including XSL and XML Schema) and of implementing tools and technologies. This course is programming language independent, making it useful for Java, .NET, C++, and any other programming orientation. Graduates will hit the ground running, applying XML to projects at both an architectural as well as a line by line coding level. We can easily adapt this course to industry and client specific needs.In addition to valuable knowledge and working examples, students receive a copy of the 'Xtensil' product. This unique software was developed to assist in implementing, testing, and fielding XML applications. Xtensil is used as both a teaching aid and a straightforward, basic, fully functional XML toolkit that students can use on Windows and Linux platforms. Working in a hands-on learning environment student will learn to: Write well-formed XML documents Model business requirements using XML Handle XML reserved characters Validate an XML document with a DTD and with a Schema Centralize data and markup definition with entities Create DTDs and Schemas using XML tools Generate XML documents from databases Write XSL templates to transform XML documents into HTML Integrate XML, XSL and the DOM to implement a complete solution The Extensible Markup Language (XML) is a standard that is enabling a revolution in web applications and business to business interactions. XML is the basis for Wireless Markup Language (WML), Voice Markup Language (VoiceML), Simple Object Access Protocol (SOAP), Web Services, and numerous industry initiatives such as ACORD (insurance), PXML (proposal/RFP) and OTA (travel). Introduction to XML is a three-day, hands-on course geared for software developers who need to understand what XML is and how to use in with today's systems and architectures. This course covers the topics from tags to architectures. The course is a balanced mixture of theory and practical labs designed to take students from a quick review of the basic fundamentals of XML through to the related advanced technologies. The students walk through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced in the lab exercises. The course starts with a quick review of the fundamentals of XML before covering XML Schema in detail. It then moves on to the XPath and XSLT covering advanced topics in both. Finally, XML and Web Services security mechanisms and issues are addressed. XML Content Introduction to XML XML Mechanics XML Structure Namespaces Structure Using Schemas XML Formatting CSS and Rendering XML XSL Transformations XSLT and XPath XPath 2.0 and XSLT 2.0 Overview XSL FO (Formatting Objects) Applying XML XML Interoperability XML Performance Improvements Web Services Overview XML Applications Additional course details: Nexus Humans Introduction to XML (TT4300) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to XML (TT4300) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This introductory-level course is for experienced DBAs who will be working with MongoDB. In order to gain the most from this course you should have: Prior practical experience in Database Administration Experience working with Linux and be comfortable working with command line Overview This skills-focused course is approximately 50% hands-on. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will explore: The MongoDB Basic Architecture and Installation MongoDB administration User Management MongoDB security Indexes Backup & Recovery High Availability / Replication Diagnostics & Troubleshooting MongoDB is fast becoming the database of choice for big data applications, being one of the most popular and widely implemented NoSQL databases. Its scalability, robustness, and flexibility have made it extremely popular among business enterprises who use it to implement a variety of activities including social communications, analytics, content management, archiving and other activities. This has led to an increased demand for MongoDB administrators who have the skills to handle cross functional duties. Geared for experienced DBAs, MongoDB for DBAs is a three-day hands-on course that explores the concepts, architecture and pitfalls of managing a MongoDB installation. This course is targeted to the DBA who is familiar with the concepts and tasks of working with a Relational database and is not responsible for a NoSQL MongoDB database. You will learn the critical aspects of MongoDB and use it to solve data management challenges. You will learn to manage MongoDB effectively by gaining expertise in MongoDB administration tools, syntax, MongoDB installations, configurations, security, troubleshooting, backup, scaling and many other features. The focus of this course is on practical skills and applying the DBA existing database knowledge to a MongoDB installation. Introduction to MongoDB Basic Architecture and Installation Differentiate database categories Learn MongoDB design goals List MongoDB tools Describe JSON and BSON Understanding the basic concepts of a Database Database categories: What is NoSQL? Why NoSQL? Benefit over RDBMS Types of NoSQL Database, and NoSQL vs. SQL Comparison, ACID & Base Property CAP Theorem, implementing NoSQL and what is MongoDB? Graph Database Overview of MongoDB, Design Goals for MongoDB Server and Database, MongoDB tools Understanding the following: Collection, Documents and Key/Values, etc., Introduction to JSON and BSON documents Environment setup (live Handson) and using various MongoDB tools available in the MongoDB Package MongoDB Administration Take database backup and restore MongoDB© Export and import data from/ to a MongoDB© instance Check server status and DB status Monitor various resource utilization of a mongod instance Understand various optimization strategies Administration concepts in MongoDB Monitoring issues related to Database Monitoring at Server, Database, Collection level, and various Monitoring tools related to MongoDB Database Profiling, Locks, Memory Usage, No of connections, page fault etc., Backup and Recovery Methods for MongoDB Export and Import of Data to and from MongoDB Run time configuration of MongoDB Production notes/ best practices Data Managements in MongoDB (Capped Collections/ Expired data from TTL), TTL Collection Features GridFS Memory-Mapped Files Journaling Mechanics Storage Engines Power of 2-Sized Allocations No Padding Allocation Strategy Diagnosing Performance Issues Optimization Strategies for MongoDB Configure Tag Sets for Replica Set. Optimize Query Performance Monitoring Strategies for MongoDB . MongoDB Utilities MongoDB Commands MongoDB Management Service (MMS) Data Backup Strategies in MongoDB Copying Underlying Data Files Backup with MongoDump Fsync and Lock MongoDB Ops Manager Backup Software Security Strategies in MongoDB Authentication Implementation in MongoDB . Authentication in a Replica set Authentication on Sharded Clusters Authorization End-to-End Auditing for Compliance User Management Create a User Administrator. Add a User to a Database. Create/Assign User a Role. Verify/Modify a User Access/Privileges. Change a User?s Password MongoDB Security Knowing security concepts in MongoDB Understand how Authentication and Authorisation works Security Introduction Security Concepts Indexes Index Introduction, Index Concepts, Index Types Index Properties Index Creation and Indexing Reference Introduction to Aggregation Aggregation Approach to Aggregation sort Order Pipeline Operators and Indexes Text Indexes Aggregate Pipeline Stages Text Search MapReduce Index Creation Aggregation Operations Index Creation on Replica Set Remove, Modify, and Rebuild Indexes Listing Indexes Measure Index Use Control Index Use Index Use Reporting Geospatial Indexes MongoDB?s Geospatial Query Operators GeoWith Operator Backup & Recovery Import and Export MongoDB Data Restore and recovery of MongoDB(Including point in time Recovery) Restore a Replica Set from MongoDB Backups Recover Data after an Unexpected Shutdown Backup and Restore with Filesystem Snapshots Back Up and Restore with MongoDB Tools Backup and Restore Sharded Clusters High Availability (Replication ) Understand the concept of Replication in MongoDB© ? Create a production like Replica Set Introduction to Replication (High Availability), Concepts around Replication What is Replica Set and Master Slave Replication? Type of Replication in MongoDB How to setup a replicated cluster & managing replica sets etc., Master-Slave Replication Replica Set in MongoDB Automatic Failover Replica Set Members Write Concern Write Concern Levels Write Concern for a Replica Set Modify Default Write Concern Read Preference Read Preference Modes Blocking for Replication Tag Set Configure Tag Sets for Replica set. Replica Set Deployment Strategies . Replica Set Deployment Patterns Oplog File Replication State and Local Database, Replication Administration Diagnostics & Troubleshooting Troubleshoot slow queries Diagnose connectivity problems Understand diagnostic tools Learn common production issues Learn fixes and solutions. Additional course details: Nexus Humans Introduction to MongoDB for DBAs (TTDB4680) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to MongoDB for DBAs (TTDB4680) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Training Course Asset maintenance and equipment reliability teams play a significant role to ensure that there is no room for downtime and losses in production. They are often recognised for their contribution and ability to keep assets running productively in today's organisations. This 4 full-day Certificate in Asset Management course will provide those involved in Asset Management with a full explanation of the key processes to manage assets across their lifecycle. This course has been designed to equip participants with practical skills to take back to work. This course enables participants to ensure their organisation's assets are realising their full value in support of the organisation's objectives. Accredited by the Institute of Asset Management (IAM), this course will prepare participants to sit for the IAM Asset Management Certificate qualification. The IAM exam is offered as an option for participants of this course. Training Objectives Upon completion of this course, the participants will be able to: Understand the key principles, tools and terminology of Asset Management, and demonstrate how it will benefit their organisation Gain familiarity in the application of ISO 55000 in practice Access a range of models that will support the implementation of asset management in their organisation Have their understanding of Asset Management tools and concepts assessed Learn new Asset Management skills and models that will enhance their current performance Be better prepared for the Institute of Asset Management (IAM) Certificate Examination Target Audience This course will benefit maintenance managers, operations managers, asset managers and reliability professionals, planners and functional specialists. It will also be useful for facilities engineers, supervisors/managers and structural engineers/supervisors/ and managers. Course Level Basic or Foundation Training Methods Other than world-class visuals and slides, this course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of exercises & quizzes to demonstrate key points and to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Trainer Your expert course leader is a is a highly experienced in maintenance and turnaround specialist. He is a Chartered Mechanical Engineer, having spent 19 years working for BP in engineering, maintenance and turnaround management roles. During this time, he worked on plants at all ages in the lifecycle, from construction, commissioning and operating new assets to maintaining aging assets and decommissioning. He has taken roles in Projects, Human Resources and Integrity Management which give real breadth to his approach. He also specialized in Continuous Improvement, gaining the award of International Petrochemical Coach of the year. He stays up to date with the latest industrial developments through his consulting support for major clients. He is also the Asset Management lead and a VILT specialist, having delivered over 70 days of VILT training in the last year. He has an engaging style and will bring his current industrial experience, proficiency of VILT techniques and diverse content, gathered from a comprehensive training portfolio, to deliver a distinctive training experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Virtual Instructor Led Certificate Training Course (VILT) Asset maintenance and equipment reliability teams play a significant role to ensure that there is no room for downtime and losses in production. They are often recognised for their contribution and ability to keep assets running productively in today's organisations. The Certificate in Asset Management Virtual Instructor Led Training (VILT) course will provide those involved in Asset Management with a full explanation of the key processes to manage assets across their lifecycle. This recognised VILT course has been designed to equip participants with practical skills to take back to work. This VILT course enables participants to ensure their organisation's assets are realising their full value in support of the organisation's objectives. Accredited by the Institute of Asset Management (IAM), this VILT course will prepare participants to sit for the IAM Asset Management Certificate qualification. The IAM exam is offered as an option for participants of this VILT course. Training Objectives By the end of this VILT course, participants will be able to: Understand the key principles, tools and terminology of Asset Management, and demonstrate how it will benefit your organisation Gain familiarity in the application of ISO 55000 in practice Access a range of models that will support the implementation of asset management in your organisation Assess your understanding of the current tools and concepts applied in Asset Management Capture new ideas and skills that will enhance performance and be better prepared for the Institute of Asset Management (IAM) Certificate Examination Target Audience This VILT course will benefit maintenance managers, operations managers, asset managers and reliability professionals, planners and functional specialists. It will also be useful for facilities engineers, supervisors/managers and structural engineers/supervisors/ and managers. IAM Qualifications Syllabi This document details the scope of the individual topics which comprise the examination modules, and how the exams are assessed. It is important that prospective candidates understand the scope of the modules to determine the preparation required. Download here IAM Qualifications Candidate Handbook This handbook provides more detailed information on registering as a candidate, learning resources, training courses, booking an exam, exam regulations and what happens after an exam - whether you are successful or unsuccessful. Download here Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 15 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total) Other than world-class visuals and slides, this VILT course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of exercises & quizzes to demonstrate key points and to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Examples of the exercises that are used in this VILT course are as follows: Exercises: Aligning Assets to Business Objectives, Planning for Contingencies, Understanding Function and Failure. Group exercises: Asset Management Decision Making, Incident Review & Operations Optimisation. The workshop content will be adjusted based on the discussions, interests and needs of the participants on the course. Trainer Your expert course leader is a is a highly experienced in maintenance and turnaround specialist. He is a Chartered Mechanical Engineer, having spent 19 years working for BP in engineering, maintenance and turnaround management roles. During this time, he worked on plants at all ages in the lifecycle, from construction, commissioning and operating new assets to maintaining aging assets and decommissioning. He has taken roles in Projects, Human Resources and Integrity Management which give real breadth to his approach. He also specialized in Continuous Improvement, gaining the award of International Petrochemical Coach of the year. He stays up to date with the latest industrial developments through his consulting support for major clients. He is also the Asset Management lead and a VILT specialist, having delivered over 70 days of VILT training in the last year. He has an engaging style and will bring his current industrial experience, proficiency of VILT techniques and diverse content, gathered from a comprehensive training portfolio, to deliver a distinctive training experience. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations