• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

189 Memory courses in Ewell delivered Live Online

Cisco SD-WAN Cloud (SDWAN-CLD-CT)

By Nexus Human

Duration 5 Days 30 CPD hours Overview Upon completing this course, you will be able to meet the following objectives: SD-WAN Overview Cloud Concepts Cloud Technologies SD-WAN Direct Cloud Access (DCA) SD-WAN SaaS Cloud On-RAMP for IAAS (AWS) Cloud On-RAMP for IAAS (AZURE) Cloud Configuration for GCP Cloud On-RAMP for MULTI-CLOUD Cloud On-RAMP for CO-LOCATIONS This is a 5 day hands-on course on Cisco SD-WAN Cloud Configuration, Monitoring and Troubleshooting. This course provides the student with the knowledge to connect SD-WAN to SaaS Applications, as well as the ability to connect their Branches to AWS, AZURE, GCP Data Centers in the Cloud. Students will also learn how to Configure, Monitor, and Troubleshoot SD-WAN Co-Locations and SD-WAN Multicloud. SD-WAN Overview SD-WAN Controller SD-WAN WAN Edges supported in Cloud Instances Cloud Concepts Cloud Ops vs WAN Ops Cloud Connectivity Cloud Access Control Cloud Network Connectivity Cloud Regions Cloud Availability Zones Virtual Networks Cloud Routing Internet Gateways VS VPN Gateways VPC/VNET: IP Addressing Cloud Network Load Balancing Cloud Peering Cloud Transit Networks Cloud Technologies Azure Azure Basics Resource Groups vNets Availability zones Availability Set Workload and Public IP Network Virtual Appliance Load Balancer User Defined Routes Network Security Group VPN Gateway Express Routes Creating VNET for SDWAN AWS AWS Basics Region VPCs Availability zones Subnets EC2 Instance Elastic IPs Security Groups Internet Gateway NAT Gateway Route Table VPN Gateway Direct Connect Elastic Load Balancer Subscribe to Amazon machine images Setting AWS resource limits AWS Transit Gateways Creating VPC for SDWAN AWS IAM Role AWS Security Groups Service limits AWS SSH key pair Google Cloud GCP Basics Project Region Virtual Private Cloud Availability Zone Subnets Compute Engine Cloud Load Balancer Cloud DNS VPC Routing Cloud VPN & VPC peering VPC Firewall Rules SD-WAN Direct Cloud Access (DCA) DCA Prerequisites DNS on VPN 0 DIA Central Policy Configuration Match Traffic Set QOS Set External Access SD-WAN SaaS Supported Platforms and Versions SaaS Prerequisites DNS on VPN 0 DIA SaaS Access Methods Cloud Access through Direct Internet Access Links Cloud Access through a Gateway Site Hybrid Approach Supported SaaS Applications SaaS Security Options SaaS Configuration Common Scenarios for Using Cloud onRamp for SaaS Specify Office 365 Traffic Category Enable Cloud onRamp for SaaS, Cisco IOS XE SD-WAN Devices Configure Applications for Cloud onRamp for SaaS Using Cisco vManage Configure Sites for Cloud onRamp for SaaS Using Cisco vManage View Details of Monitored Applications Cloud On-RAMP for IAAS (AWS) Prerequisite AWS Configuration Verify prerequisites Configure AWS for Cisco SD-WAN Cloud On-RAMP for AWS Overview Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp AWS IAM Role Select Region Select CPU and Memory Transit Networking IP Addresses Discover and Map Host VPCs AWS to SD-WAN Security Monitor Cisco Cloud Onramp for AWS Troubleshoot Cisco Cloud Onramp for AWS Interconnecting Cisco SD-WAN with AWS Transit Gateway (TGW) Cloud On-RAMP for IAAS (AZURE) Prerequisite AZURE Configuration Cloud On-RAMP for AZURE Configure AWS for Cisco SD-WAN Define WAN Edge Type used Define Template Attach Devices to Template Deploy Cloud Onramp Select Region Discover and Map Host VPCs Monitor Cisco Cloud Onramp for Azure Troubleshoot Cisco Cloud Onramp for AZURE Azure Virtual Wan (VWAN) Integration Cloud Configuration for GCP Prerequisite GCP Configuration SD-WAN Configuration Configure Google Cloud for SD-WAN Google Cloud GCP Basics Deploy cEdge Catalyst 8000V Edges Setup IPSEC Connections Setup BGP Connections Cloud On-RAMP for MULTI-CLOUD AWS Transit Gateway Microsoft vWAN Create Cisco Cloud GW Discover host VPCs/VNets Map Branch nets to VPCs Cloud On-RAMP for CO-LOCATIONS SD-WAN CO-LOCATIONS Overview Colocation facilities Cisco Colocation Equipment Cisco Cloud Services Platform 5444 Cisco Network Function Virtualization Infrastructure Software (NFVIS) Virtual Network Functions Network Fabric Cisco Catalyst 9500-48Y4C switch Cisco Catalyst 9500-40X switch Device Configuration and Connectivity Sizing the Colocation Solution Devices Cisco Colocation Manager Deploy Network Services at the Network Edge Colocation Solution?Deployment Workflow Monitor Cisco SD-WAN Colocation Devices Cisco Colocation Manager States for Switch Configuration Cisco Colocation Manager States and Transitions from Host Cisco Colocation Manager Notifications VM Alarms Cloud Services Platform Real-Time Commands Colocation High Availability Troubleshoot Cisco SD-WAN Cloud onRamp for Colocation Solution Troubleshoot Catalyst 9500 Issues Troubleshoot Cloud Services Platform Issues DHCP IP Address Assignment Troubleshoot Cisco Colo Manager Issues Troubleshoot Service Chain Issues Troubleshoot Physical Network Function Management Issues Log Collection from CSP Troubleshoot vManage Issues Additional course details: Nexus Humans Cisco SD-WAN Cloud (SDWAN-CLD-CT) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco SD-WAN Cloud (SDWAN-CLD-CT) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco SD-WAN Cloud (SDWAN-CLD-CT)
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle 19c Database Administration II (DBA II) (TTOR20619)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs with basic Oracle 19c skills. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs andexercises. Working in a hands-on learning environment led by our expert facilitator, students will explore: Creating CDBs and Regular PDBs Managing CDBs and PDBs Backup and Duplicate Upgrading and Transporting CDBs and Regular PDBs Backup Strategies and Terminology Restore and Recovery Concepts Using Flashback Technologies Duplicating a Database Installing Grid Infrastructure and Oracle Database Patching Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Using General Overall Database Enhancements Monitoring and Tuning Database Performance Managing Application PDBs Managing Security in Multitenant databases Recovery and Flashback Configuring and Using RMAN Diagnosing Failures Performing Recovery Transporting Data RMAN Troubleshooting and Tuning Creating an Oracle Database by using DBCA Oracle Restart Upgrading the Oracle Database Installing Grid Infrastructure for a Standalone server Using Availability Enhancements Tuning SQL Statements Geared for participants experienced with Oracle 19c DBA essentials Oracle 19c Database Administration II (Oracle DBA II) expands their understanding of Oracle database administration. Throughout the course students will explore coverage of Multitenant (CDB/PDB), database tuning, SQL tuning, and backup and recovery: the skills needed to keep a database running reliably and efficiently. The current release of the database is used for exercises and demonstrations, and the content back-ported as necessary for previous releases. Creating CDBs and Regular PDBs Configure and create a CDB Create a new PDB from the CDB seed Explore the structure of PDBs Manage CDBs and PDBs Manage PDB service names and connections Manage startup, shutdown and availability of CDBs and PDBs Change the different modes and settings of PDBs Evaluate the impact of parameter value changes Performance management in CDBs and PDBs Control CDB and PDB resource usage with the Oracle Resource Manager Backup and Duplicate Perform Backup and Recover CDBs and PDBs Duplicate an active PDB Duplicate a Database Upgrading and Transporting CDBs and Regular PDBs Upgrade an Oracle Database Transport Data Backup Strategies and Terminology Perform Full and Incremental Backups and Recoveries Compress and Encrypt RMAN Backups Use a media manager Create multi-section backups of exceptionally large files Create duplexed backup sets Create archival backups Backup of recovery files Backup non database files Back up ASM meta data Restore and Recovery Concepts Employ the best Oracle Database recovery technology for your failure situation Describe and use Recovery technology for Crash, Complete, and Point-in-time recovery Using Flashback Technologies Configure your Database to support Flashback Perform flashback operations Duplicating a Database Duplicate Databases Install Grid Infrastructure and Oracle Database Install Grid Infrastructure for a Standalone server Install Oracle Database software Patching Grid Infrastructure and Oracle Database Patch Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Upgrade Oracle Grid Infrastructure Using General Overall Database Enhancements Install Oracle Database software Create, Delete and Configure Databases using DBCA Creating CDBs and Regular PDBs Use Miscellaneous 19c New Features Monitoring and Tuning Database Performance Managing Memory Components Understanding the Automatic Workload Repository (AWR) Understanding the Advisory Framework Monitoring Wait Events, Sessions, and Services Managing Metric Thresholds and Alerts Understanding and Using the Performance Tuning Methodology Performing Performance Planning Understanding the Automatic Database Diagnostic Monitor (ADDM) Manage Application PDBs Explain the purpose of application root and application seed Define and create application PDBs Install, upgrade and Patch applications Create and administer Application PDBS Clone PDBs and Application containers Plug and unplug operations with PDBs and application containers Comparing Local Undo Mode and Shared Undo Mode Manage Security in Multitenant databases Manage Security in Multitenant databases Manage PDB lockdown profiles Audit Users in CDBs and PDBs Manage other types of policies in application containers Recovery and Flashback Restore and Recovering Databases with RMAN Perform CDB and PDB flashback Configuring and Using RMAN Configure RMAN and the Database for Recoverability Configure and Using an RMAN recovery catalog Diagnosing Failures Detect and repair database and database block corruption Diagnosing Database Issues Performing Recovery Restore and Recovering Databases with RMAN Perform Non RMAN database recovery Transporting Data Transport Data RMAN Troubleshooting and Tuning Interpret the RMAN message output Diagnose RMAN performance issues Creating an Oracle Database by using DBCA Create, Delete and Configure Databases using DBCA Oracle Restart Configure and use Oracle Restart to manage components Upgrade the Oracle Database Plan for Upgrading an Oracle Database Upgrade an Oracle Database Perform Post-Upgrade tasks Install Grid Infrastructure for a Standalone server Rapid Home Provisioning Using Availability Enhancements Use an RMAN recovery catalog Use Flashback Database Tuning SQL Statements Understanding the Oracle Optimizer Using the SQL Tuning Advisor Managing Optimizer Statistics Using the SQL Access Advisor Understanding the SQL Tuning Process Additional course details: Nexus Humans Oracle 19c Database Administration II (DBA II) (TTOR20619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Administration II (DBA II) (TTOR20619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c Database Administration II (DBA II) (TTOR20619)
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for programmatic developers looking to write programmatic customizations to both business logic and UI layers using Apex and Visualforce. You should have a good understanding of core object-oriented programming concepts and experience building declarative solutions on the Salesforce Platform. This course is also a great foundation builder if you're looking to earn your Salesforce Platform Developer I credential. IMPORTANT: Students are expected to follow the steps detailed in the Computer Set-up Guide for this class if you'll be using your own computer when attending a virtual or in-person class. Overview Learn modern tools for developing on the Salesforce Platform using Visual Studio Code, the Salesforce Extension Pack, and the Salesforce CLI. Write business logic customizations using Apex triggers and classes; those customizations will use SOQL and DML. Design programmatic solutions that take advantage of declarative customizations. Describe how your trigger code works within the basics of the Save Order of Execution. Describe some of the fundamental aspects of designing programs on a multi-tenant platform. Write Visualforce markup and code to customize the user interface. Use the built-in testing framework to test Apex and Visualforce. Learn how to customize and design applications programmatically on the Salesforce Platform. In this 5-day class, our platform experts will introduce you to Apex (Salesforce?s programming language) and Visualforce markup, so you can customize your Salesforce applications using code and explore how Apex interacts with declarative customizations on the platform. Learn how to retrieve, manipulate, and store data programmatically in data objects (sObjects), write and test custom logic, write Visualforce pages to customize your user interface, and deploy your solutions to another environment. Get an overview of the declarative automation tools available on the platform and a brief introduction to the Lightning Component framework. Plus, explore the nuances of working on a multi-tenant platform so you can extend the platform to meet business demands. Declarative Automation Create Formula Fields Create Roll-Up Summary Fields Understand Record Types Review Other Automation Tools Build a Data Model on the Salesforce Platform Programming with Apex Describe Key Aspects of Apex That Differentiate It from Other Languages, Such as Java and C# Describe Why Apex Transactions and Governor Limits Must Be Considered When Writing Apex Execute Simple Apex Use the sObject Data Type, the Primitive Data Types, and Basic Control Statements in Apex Using SOQL and SOSL to Retrieve Your Org?s Data Write a Basic Query Using Salesforce?s Query Language, SOQL Process the Result of a Query in Apex Create a Query Dynamically at Run-Time Use SOQL to Query Parent-Child Relationships Describe a Relationship Query Write a Query That Traverses a Child-to-Parent Relationship Write a Query That Traverses a Parent-to-Child Relationship Use SOSL to Search Data Using DML to Manipulate Your Org?s Data List the Differences Between the Ways You Can Invoke DML Operations Write Apex to Invoke DML Operations and Handle DML Errors Deployment What Is Deployment? Deploy Code Using Change Sets Use the Ant Migration Tool Review Managed and Unmanaged Packages Explore Salesforce DX Trigger Essentials Describe What a Trigger Is Used For Describe the Syntax of a Trigger Definition Use Trigger Context Variables Apex Class Essentials Describe How Apex Classes Are Used Define an Apex Class Determine What Data an Apex Class Can Access The Save Order of Execution, Apex Transactions, and Platform Events Describe Key Points in the Order of Execution Describe How Triggers Fit Into and Can Be Impacted by the Order of Execution Describe the Lifecycle of an Apex Transaction Describe the Memory Lifecycle for Static Attributes Use Platform Events for Immediate Error Logging Apex Testing Describe the Apex Testing Framework Create Test Data Write and Run an Apex Test Test Best Practices Strategies for Designing Efficient Apex Solutions Describe Best Practices for Writing Code That Is Easy to Maintain and Extend Write Triggers and Classes That Assume Batches of Data as Input Write Code That Works Efficiently with the Database, Both in Querying and Using DML Trigger Design Strategies List Declarative Mechanisms You Can Use to Implement Complex Business Logic, What Types of Problems They?re Best Used for, and Their Limitations Describe Ways in Which You Can Use Declarative Functionality to Improve Your Programmatic Solutions Working with Visualforce Create a Visualforce Page Reference a Standard Controller Launch a Visualforce Page Using a Custom Button Display Data from a Record in a Visualforce Page Reference Custom Controllers and Controller Extensions Work with List Controllers Visualforce Development Considerations and Testing Describe Common Limit Issues and Security Concerns Describe Strategies for Testing Visualforce Controllers Write Tests for Controller Constructors Write Tests for Action Methods, Getters, Setters, and Properties Lightning Components Create and Surface an Aura Component Create and Surface a Lightning Web Component Additional course details: Nexus Humans Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Applications Programmatically on the Salesforce Platform (DEX450)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Developing Serverless Solutions on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Developers who have some familiarity with serverless and experience with development in the AWS Cloud Overview In this course, you will learn to: Apply event-driven best practices to a serverless application design using appropriate AWS services Identify the challenges and trade-offs of transitioning to serverless development, and make recommendations that suit your development organization and environment Build serverless applications using patterns that connect AWS managed services together, and account for service characteristics, including service quotas, available integrations, invocation model, error handling, and event source payload Compare and contrast available options for writing infrastructure as code, including AWS CloudFormation, AWS Amplify, AWS Serverless Application Model (AWS SAM), and AWS Cloud Development Kit (AWS CDK) Apply best practices to writing Lambda functions inclusive of error handling, logging, environment re-use, using layers, statelessness, idempotency, and configuring concurrency and memory Apply best practices for building observability and monitoring into your serverless application Apply security best practices to serverless applications Identify key scaling considerations in a serverless application, and match each consideration to the methods, tools, or best practices to manage it Use AWS SAM, AWS CDK, and AWS developer tools to configure a CI/CD workflow, and automate deployment of a serverless application Create and actively maintain a list of serverless resources that will assist in your ongoing serverless development and engagement with the serverless community This course gives developers exposure to and practice with best practices for building serverless applications using AWS Lambda and other services in the AWS serverless platform. You will use AWS frameworks to deploy a serverless application in hands-on labs that progress from simpler to more complex topics. You will use AWS documentation throughout the course to develop authentic methods for learning and problem-solving beyond the classroom. Introduction Introduction to the application you will build Access to course resources (Student Guide, Lab Guide, and Online Course Supplement) Thinking Serverless Best practices for building modern serverless applications Event-driven design AWS services that support event-driven serverless applications API-Driven Development and Synchronous Event Sources Characteristics of standard request/response API-based web applications How Amazon API Gateway fits into serverless applications Try-it-out exercise: Set up an HTTP API endpoint integrated with a Lambda function High-level comparison of API types (REST/HTTP, WebSocket, GraphQL) Introduction to Authentication, Authorization, and Access Control Authentication vs. Authorization Options for authenticating to APIs using API Gateway Amazon Cognito in serverless applications Amazon Cognito user pools vs. federated identities Serverless Deployment Frameworks Overview of imperative vs. declarative programming for infrastructure as code Comparison of CloudFormation, AWS CDK, Amplify, and AWS SAM frameworks Features of AWS SAM and the AWS SAM CLI for local emulation and testing Using Amazon EventBridge and Amazon SNS to Decouple Components Development considerations when using asynchronous event sources Features and use cases of Amazon EventBridge Try-it-out exercise: Build a custom EventBridge bus and rule Comparison of use cases for Amazon Simple Notification Service (Amazon SNS) vs. EventBridge Try-it-out exercise: Configure an Amazon SNS topic with filtering Event-Driven Development Using Queues and Streams Development considerations when using polling event sources to trigger Lambda functions Distinctions between queues and streams as event sources for Lambda Selecting appropriate configurations when using Amazon Simple Queue Service (Amazon SQS) or Amazon Kinesis Data Streams as an event source for Lambda Try-it-out exercise: Configure an Amazon SQS queue with a dead-letter queue as a Lambda event source Writing Good Lambda Functions How the Lambda lifecycle influences your function code Best practices for your Lambda functions Configuring a function Function code, versions and aliases Try-it-out exercise: Configure and test a Lambda function Lambda error handling Handling partial failures with queues and streams Step Functions for Orchestration AWS Step Functions in serverless architectures Try-it-out exercise: Step Functions states The callback pattern Standard vs. Express Workflows Step Functions direct integrations Try-it-out exercise: Troubleshooting a Standard Step Functions workflow Observability and Monitoring The three pillars of observability Amazon CloudWatch Logs and Logs Insights Writing effective log files Try-it-out exercise: Interpreting logs Using AWS X-Ray for observability Try-it-out exercise: Enable X-Ray and interpret X-Ray traces CloudWatch metrics and embedded metrics format Try-it-out exercise: Metrics and alarms Try-it-out exercise: ServiceLens Serverless Application Security Security best practices for serverless applications Applying security at all layers API Gateway and application security Lambda and application security Protecting data in your serverless data stores Auditing and traceability Handling Scale in Serverless Applications Scaling considerations for serverless applications Using API Gateway to manage scale Lambda concurrency scaling How different event sources scale with Lambda Automating the Deployment Pipeline The importance of CI/CD in serverless applications Tools in a serverless pipeline AWS SAM features for serverless deployments Best practices for automation Course wrap-up Additional course details: Nexus Humans AWS Developing Serverless Solutions on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Developing Serverless Solutions on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Developing Serverless Solutions on AWS
Delivered OnlineFlexible Dates
Price on Enquiry

Introduction to R Programming

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Business Analysts, Technical Managers, and Programmers Overview This intensive training course helps students learn the practical aspects of the R programming language. The course is supplemented by many hands-on labs which allow attendees to immediately apply their theoretical knowledge in practice. Over the past few years, R has been steadily gaining popularity with business analysts, statisticians and data scientists as a tool of choice for conducting statistical analysis of data as well as supervised and unsupervised machine learning. What is R ? What is R? ? Positioning of R in the Data Science Space ? The Legal Aspects ? Microsoft R Open ? R Integrated Development Environments ? Running R ? Running RStudio ? Getting Help ? General Notes on R Commands and Statements ? Assignment Operators ? R Core Data Structures ? Assignment Example ? R Objects and Workspace ? Printing Objects ? Arithmetic Operators ? Logical Operators ? System Date and Time ? Operations ? User-defined Functions ? Control Statements ? Conditional Execution ? Repetitive Execution ? Repetitive execution ? Built-in Functions ? Summary Introduction to Functional Programming with R ? What is Functional Programming (FP)? ? Terminology: Higher-Order Functions ? A Short List of Languages that Support FP ? Functional Programming in R ? Vector and Matrix Arithmetic ? Vector Arithmetic Example ? More Examples of FP in R ? Summary Managing Your Environment ? Getting and Setting the Working Directory ? Getting the List of Files in a Directory ? The R Home Directory ? Executing External R commands ? Loading External Scripts in RStudio ? Listing Objects in Workspace ? Removing Objects in Workspace ? Saving Your Workspace in R ? Saving Your Workspace in RStudio ? Saving Your Workspace in R GUI ? Loading Your Workspace ? Diverting Output to a File ? Batch (Unattended) Processing ? Controlling Global Options ? Summary R Type System and Structures ? The R Data Types ? System Date and Time ? Formatting Date and Time ? Using the mode() Function ? R Data Structures ? What is the Type of My Data Structure? ? Creating Vectors ? Logical Vectors ? Character Vectors ? Factorization ? Multi-Mode Vectors ? The Length of the Vector ? Getting Vector Elements ? Lists ? A List with Element Names ? Extracting List Elements ? Adding to a List ? Matrix Data Structure ? Creating Matrices ? Creating Matrices with cbind() and rbind() ? Working with Data Frames ? Matrices vs Data Frames ? A Data Frame Sample ? Creating a Data Frame ? Accessing Data Cells ? Getting Info About a Data Frame ? Selecting Columns in Data Frames ? Selecting Rows in Data Frames ? Getting a Subset of a Data Frame ? Sorting (ordering) Data in Data Frames by Attribute(s) ? Editing Data Frames ? The str() Function ? Type Conversion (Coercion) ? The summary() Function ? Checking an Object's Type ? Summary Extending R ? The Base R Packages ? Loading Packages ? What is the Difference between Package and Library? ? Extending R ? The CRAN Web Site ? Extending R in R GUI ? Extending R in RStudio ? Installing and Removing Packages from Command-Line ? Summary Read-Write and Import-Export Operations in R ? Reading Data from a File into a Vector ? Example of Reading Data from a File into A Vector ? Writing Data to a File ? Example of Writing Data to a File ? Reading Data into A Data Frame ? Writing CSV Files ? Importing Data into R ? Exporting Data from R ? Summary Statistical Computing Features in R ? Statistical Computing Features ? Descriptive Statistics ? Basic Statistical Functions ? Examples of Using Basic Statistical Functions ? Non-uniformity of a Probability Distribution ? Writing Your Own skew and kurtosis Functions ? Generating Normally Distributed Random Numbers ? Generating Uniformly Distributed Random Numbers ? Using the summary() Function ? Math Functions Used in Data Analysis ? Examples of Using Math Functions ? Correlations ? Correlation Example ? Testing Correlation Coefficient for Significance ? The cor.test() Function ? The cor.test() Example ? Regression Analysis ? Types of Regression ? Simple Linear Regression Model ? Least-Squares Method (LSM) ? LSM Assumptions ? Fitting Linear Regression Models in R ? Example of Using lm() ? Confidence Intervals for Model Parameters ? Example of Using lm() with a Data Frame ? Regression Models in Excel ? Multiple Regression Analysis ? Summary Data Manipulation and Transformation in R ? Applying Functions to Matrices and Data Frames ? The apply() Function ? Using apply() ? Using apply() with a User-Defined Function ? apply() Variants ? Using tapply() ? Adding a Column to a Data Frame ? Dropping A Column in a Data Frame ? The attach() and detach() Functions ? Sampling ? Using sample() for Generating Labels ? Set Operations ? Example of Using Set Operations ? The dplyr Package ? Object Masking (Shadowing) Considerations ? Getting More Information on dplyr in RStudio ? The search() or searchpaths() Functions ? Handling Large Data Sets in R with the data.table Package ? The fread() and fwrite() functions from the data.table Package ? Using the Data Table Structure ? Summary Data Visualization in R ? Data Visualization ? Data Visualization in R ? The ggplot2 Data Visualization Package ? Creating Bar Plots in R ? Creating Horizontal Bar Plots ? Using barplot() with Matrices ? Using barplot() with Matrices Example ? Customizing Plots ? Histograms in R ? Building Histograms with hist() ? Example of using hist() ? Pie Charts in R ? Examples of using pie() ? Generic X-Y Plotting ? Examples of the plot() function ? Dot Plots in R ? Saving Your Work ? Supported Export Options ? Plots in RStudio ? Saving a Plot as an Image ? Summary Using R Efficiently ? Object Memory Allocation Considerations ? Garbage Collection ? Finding Out About Loaded Packages ? Using the conflicts() Function ? Getting Information About the Object Source Package with the pryr Package ? Using the where() Function from the pryr Package ? Timing Your Code ? Timing Your Code with system.time() ? Timing Your Code with System.time() ? Sleeping a Program ? Handling Large Data Sets in R with the data.table Package ? Passing System-Level Parameters to R ? Summary Lab Exercises Lab 1 - Getting Started with R Lab 2 - Learning the R Type System and Structures Lab 3 - Read and Write Operations in R Lab 4 - Data Import and Export in R Lab 5 - k-Nearest Neighbors Algorithm Lab 6 - Creating Your Own Statistical Functions Lab 7 - Simple Linear Regression Lab 8 - Monte-Carlo Simulation (Method) Lab 9 - Data Processing with R Lab 10 - Using R Graphics Package Lab 11 - Using R Efficiently

Introduction to R Programming
Delivered OnlineFlexible Dates
Price on Enquiry

GCSE Tuition - Geography - Online

5.0(8)

By GLA Tutors Home or Online

Unlocking Success in GCSE Geography! At GLA Tutors, we are dedicated to helping students excel in their GCSE Geography examinations. Our experienced tutors are passionate about the subject and committed to providing comprehensive support tailored to the AQA examination board's specification. Let's dive into the breakdown of the AQA GCSE Geography specification: Paper 1: Living with the Physical Environment This paper focuses on understanding natural landscapes, such as rivers, coasts, and ecosystems. Our tutors will guide students through topics like the water cycle, coastal processes, and the impact of climate change. We offer in-depth explanations, interactive activities, and exam-style practice to build a solid foundation. Paper 2: Challenges in the Human Environment This paper explores the relationship between humans and their environment, including urban areas, development, and global issues. Our tutors will delve into concepts like population dynamics, urbanisation, sustainable development, and global inequalities. Through engaging discussions and real-world examples, we help students grasp the complexities of human geography. Paper 3: Geographical Applications In this paper, students apply their geographical skills to investigate real-world issues and carry out fieldwork. Our tutors will guide students through the process of designing and conducting fieldwork, collecting and analysing data, and presenting their findings. We provide practical guidance, research resources, and feedback to develop strong investigative skills. At GLA Tutors we go beyond the specification to nurture a deep understanding of geography. Our tutors create a supportive and engaging learning environment that encourages critical thinking, analysis, and effective exam techniques. We offer personalised one-on-one sessions, group discussions, and access to a range of learning materials to cater to each student's needs. Whether it's understanding the intricacies of physical processes or analysing the complexities of human interactions, our tutors are here to guide students towards success in their GCSE Geography journey. Join us and unlock your full potential in GCSE Geography! Feel free to explore our website for more information or reach out to us with any questions you may have. Let's embark on this exciting learning adventure together!  https://www.globallearners.academy/services/gcse We can provide assistance for everything you need to prepare students for exams, including: past papers, mark schemes and examiners’ reports specimen papers and mark schemes for new courses exemplar student answers with examiner commentaries high quality revision guides

GCSE Tuition - Geography - Online
Delivered OnlineFlexible Dates
£40

HA Webinar: Mastering the memory challenge: running successful interventions with students who are struggling to remember at GCSE

5.0(1)

By Historical Association

Historical Association webinar series: Making history accessible Presenters: Dale Banham This webinar will explore a range of proven strategies for helping students remember more at GCSE. This includes: How to avoid cognitive overload by maintaining an explicit focus on key takeaways How to use recent research from cognitive science and the 2024 International Revision Census to make those key takeaways stick How to apply the theory of ‘desirable difficulties’ to structuring schemes of work that regularly revisit previous learning How to help students visualise what is expected of them in the exam so that they remember exam technique tips To use your corporate recording offer on this webinar please fill in this form: https://forms.office.com/e/bdNUSwLNrL Image: A Squire "Old English" padlock on a gate latch in Devon (Image: Partonez/Wikimedia Commons)

HA Webinar: Mastering the memory challenge: running successful interventions with students who are struggling to remember at GCSE
Delivered OnlineJoin Waitlist
£31.67 to £55.83

Polymathic Training - Daily Live Training

By Council For Human Development Swiss Association

By engaging in polymathic training on a daily basis, we change the structure (neuroplasticity) — the platform of the mind — to run new programs of increased levels of confidence, creativity and communication.

Polymathic Training - Daily Live Training
Delivered OnlineFlexible Dates
£199

Midlife Opportunities Revealed!

By Antonia Varbanova - The Midlife Disruptor

"Midlife Opportunities Revealed!" is an interactive workshop that supports examining one's midlife to uncover hidden potential and open one's mind to hidden options and opportunities.

Midlife Opportunities Revealed!
Delivered OnlineJoin Waitlist
£12.50