Duration 3 Days 18 CPD hours This course is intended for This is an introductory level course, designed for web developers that need to upgrade core skills leveraging modern scripting and web development languages and standards. This course provides an excellent foundation for continued learning to gain in-demand skills in in-demand skills and technologies such as Angular, React, NodeJS, JQuery and more. This course can also be tuned for non-developers. Please inquire for details. Overview This 'skills-focused' course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our instructors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working within in a hands-on learning environment guided by our expert team, attendees will explore: HTML5: How to effectively meet requirements using the full range of HTML5 semantic and structural elements To work with technologies such as web storage, application caching, and cross-domain messaging to improve performance and the user experience CSS: What features CSS3 supports and how they can be effectively used with HTML5 and other technologies To adapt to varying degrees of browser support for HTML5 and CSS3 JavaScript: What JavaScript is, how it relates to other programming languages, and how to script your web pages with it To traverse and manipulate the DOM and handle events in ways that work in all browsers To work with closures and prototypes and other exotic features of JavaScript Debugging What is needed to effectively debug these web technologies How to use both browser-based and proxy-based debuggers and tools Introduction to HTML5, CSS3 & JavaScript is geared for developers who need to understand the latest web technologies and responsive design practices central to targeting the entire spectrum of user platforms and browsers. This jumpstart style course provides a balanced mixture of theory and practical labs designed to take students through HTML5, CSS3 and JavaScript. Students who attend this course will leave this course armed with the new skills to begin to design, implement, and deploy robust, flexible, and safe web applications HTML Refresher HTML Review Introduction to HTML5 Introduction to CSS CSS Basics CSS3 Overview CSS3 Advanced Selectors CSS3 Visual Effects Introduction to JavaScript JavaScript Basics Debugging Tools JavaScript Functions JavaScript Arrays, Math and Date JavaScript Event Handling and the DOM Object-Oriented JavaScript
Duration 2 Days 12 CPD hours This course is intended for This course is intended for network engineers, network support personnel, reseller support personnel and anyone else needing a working knowledge of Network and Security Manager. Overview After successfully completing this course, you should be able to: Explain Network and Security Manager concepts and terminology. Set up and administer Network and Security Manager servers. Configure domains and administrators. Add devices using modeling and importing. Work with objects and templates. Configure policies. Perform routine device management tasks Work with logs and reports Configure VPNs with the VPN Manager tool This course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Labs will be done on a ScreenOS platform Chapter 1: Course IntroductionChapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains and Administrators Chapter 5: Adding Devices Chapter 6: Abstraction Objects and TemplatesChapter 7: Abstraction Policies Chapter 8: Managing Devices Chapter 9: Logging, Reporting and Monitoring Chapter 10: Central ManagerChapter 11: Virtual Private Networks Additional course details: Nexus Humans Network and Security Manager Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network and Security Manager Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. Course Outline The Process of Auditing Information Systems Risk-Based Auditing Audit Planning and Performance IS Systems Auditor reports IT Governance and Management Systems Acquisition, Development and Implementation Systems Development Models Types of Specialized Business Applications Application Controls Information Systems Operations, Maintenance, and Support System and Communications Hardware Additional course details: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for Coders Web Application Engineers IS Managers Application Engineers Developers Programmers Overview Upon completion, Certified Secure Web Application Engineer students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the CSWAE exam. Secure Web Application Engineers work to design information systems that are secure on the web. Organizations and governments fall victim to internet-based attacks every day. In many cases, web attacks could be thwarted but hackers, organized criminal gangs, and foreign agents are able to exploit weaknesses in web applications. The Secure Web programmer knows how to identify, mitigate and defend against all attacks through designing and building systems that are resistant to failure. With this course you will learn how to develop web applications that aren?t subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack. Course Outline Web Application Security OWASP Top 10 Threat Modeling & Risk Management Application Mapping Authentication and Authorization Attacks Session Management Attacks Application Logic Attacks Data Validation AJAX Attacks Code Review And Security Testing Web Application Penetration Testing Secure SDLC Cryptography Additional course details: Nexus Humans Certified Secure Web Application Engineer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Secure Web Application Engineer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for: C|ASE-certified professionals Application security professionals DevOps engineers IT security professionals Cybersecurity engineers and analysts Software engineers and testers Anyone with prior knowledge of application security who wants to build a career in DevSecOps Overview This course empowers you with the knowledge and skills to: Understand DevOps security bottlenecks and remediation Understand the DevSecOps toolchain and implement tools Integrate Eclipse and GitHub with Jenkins to build applications Align security practices Integrate threat modeling tools Understand and implement continuous security testing Integrate runtime application self-protection tools Integrate automated security testing Perform continuous vulnerability scans Use AWS and Azure tools to secure applications. Integrate compliance-as-code tools EC-Council Certified DevSecOps Engineer (E|CDE) is a hands-on, instructor-led comprehensive DevSecOps certification program that helps professionals build the essential skills to design, develop, and maintain secure applications and infrastructure. Course Outline Module 1: Understanding DevOps Culture Module 2: Introduction to DevSecOps Module 3: DevSecOps Pipeline?Plan Stage Module 4: DevSecOps Pipeline?Code Stage Module 5: DevSecOps Pipeline?Build and Test Stage Module 6: DevSecOps Pipeline?Release and Deploy Stage Module 7: DevSecOps Pipeline?Operate and Monitor Stage Additional course details: Nexus Humans EC-Council Certified DevSecOps Engineer (E|CDE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified DevSecOps Engineer (E|CDE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is designed for those who have little or no experience with Linux and whoare seeking a fundamental understanding of the SUSE Linux Enterprise 15 operatingsystem. It is also ideal for those who want to begin preparing for the SUSE CertifiedAdministrator in Enterprise Linux 15 certification exam. Overview Attendees will be taught the following concepts and skills that are fundamental inadministering the SLES Operating System:Install SLES 15 and perform basic Linux configurationBecome familiar with the command line interface & commonly usedcommandsConfigure and use Remote AdministrationManage the boot process and understand systemsManage processes and jobsManage users and permissionsManage softwareConfigure basic networkingManage storageMonitor SUSE Linux Enterprise This course is designed for those who are seeking a fundamental understanding of the SUSE Linux Enterprise Server (SLES) operating system.Students will be able to install and configure a SLES 15 server and integrate it into an existing network. They will be able to perform the most important system administration tasks. Overview of SUSE Linux Enterprise Flavors of SUSE Linux SLE Maintenance Model YaST The Linux Filesystem Understand the Filesystem Hierarchy Standard (FHS) Understand the Linux File Types Work with the Command Line Getting Help at the Command Line Understand the Shell Environment The Vim EditorRemote Administration Understand Remote Administration with OpenSSH Understand Remote Administration with VNC System Initialization Understand the Boot Process Understand the GRUB2 Boot Loader Define and Describe systems Process Management Understand Process Administration Understand Background Processes Understand Process Scheduling Understand xinet Identify and Security Understand User Management Understand Filesystem Permissions Understand Privilege Delegation Software Management Understand Compiling Software from Source Understand Management of RPM Packages Understand Software Management with Libzypp Network Management Understand Network Management in SLE Understand Network Management with Wicked Understand firewall Storage Management Understand the Linux I/O Stack Recognize Traditional Linux File Systems Configure Logical Volume Management (LVM) Configure Software RAID Define and Describe BtrFS Understand NFSv4 Administration and Monitoring Understand Time Sync with chrony Configure System Logging Understand Supportconfig Installing SUSE Linux Enterprise Understand the Unified Installer Understand Extensions and Modules Understand AutoYaST
Duration 4 Days 24 CPD hours This course is intended for DevOps engineers Integration engineers Network and software architects Network engineers Software engineers System administrators Overview After completing this course, you should be able to: Describe network and IT convergence Describe Cisco NSO architecture Describe Linux Configure Cisco NSO Set up access control to Cisco NSO system Describe Cisco NSO Integration Options Explain version control systems and basic git concepts Describe the purpose of continuous integration and continuous delivery Implement Cisco NSO high availability Describe scalable system management Describe software development methodologies Describe service maintenance Perform NED upgrades Use Cisco NSO for managing services and their associated device configurations Describe Cisco NSO change management Explain service problem management Use Cisco NSO for service monitoring and compliance reporting Describe Cisco NSO inventory management Describe Cisco NSO use cases The Cisco Network Services Orchestrator (NSO) Administration and DevOps (NSO303) v4.0 course continues the learning journey of the NSO Essentials for Programmers and Network Architects (NSO201) v4.0 and NSO Advanced for Python Programmers (NSO300) v4.0 courses by introducing you to the system administration and DevOps focusing on NSO; the robust bridge linking network automation and orchestration tools, examining the development, operation, and administration task functions. You will learn how to set up, configure, deploy, and maintain a Cisco Network Services Orchestrator solution, and learn best practices for using DevOps. The examples shown in this course demonstrate real-world scenarios to prepare you for deployment and management of new or existing NSO instances. The course guides you through the setup of a production ready NSO instances using system installation with access control settings, the deployment of NSO in Docker containers, and introduces modern DevOps concepts and tools such as Git and Continuous Delivery/Continuous Deployment (CI/CD). You will learn how to migrate CDM devices, how to build NETCONF NEDs from the NSO CLI, how to handle NSO Alarms, and many more features that benefit you in your journey with Cisco NSO. Course Outline Introducing Network and IT Convergence Introducing Cisco NSO Architecture Introducing Linux Explaining Cisco NSO Setup Exploring Access Control Describing Integration Options Explaining Version Control System Describing Continuous Integration and Continuous Delivery Introducing Scalability and High Availability Describing Scalable System Management Describing Software Development Methodologies Introducing Service Maintenance Performing Network Element Driver (NED) Upgrades Introducing Configuration Management Describing Change Management Explaining Service Problem Management Explaining Service Monitoring and Compliance Reporting Introducing Inventory Management Describing Cisco NSO Use Cases
Duration 3 Days 18 CPD hours This course is intended for IT Professionals who deploy small-to- medium scale enterprise network solutions based on Aruba products and technologies Overview Upon completion of this course, you will be able to:Explain how Aruba networking solutions meet customers? requirementsExplain how Aruba AirWave provides unified wireless and wired network managementDescribe in-band management and out-of-band managementComplete the initial setup on ArubaOS switchesControl access to switches for both in-band and out-of-band managementManage software and configuration files on ArubaOS switchesExplain use cases for VLANs and configure port-based VLANs on ArubaOS switchesUnderstand and configure Rapid Spanning Tree Protocol (RSTP)Understand and configure Multiple Spanning Tree Protocol (MSTP)Differentiate between different types of link aggregation and understand the benefits of Link Aggregation Control Protocol (LACP)Configure and troubleshoot link aggregation on ArubaOS switchesConfigure static routes on ArubaOS switches and interpret IP routing tablesConfigure a basic Open Shortest Path First (OSPF) solutionDescribe how Virtual Switching Framework (VSF) works and the advantages that it providesConfigure and verify a simple VSF fabricDescribe the basics of wireless communications and 802.11 standardsDefine a wireless LAN (WLAN) and differentiate between wireless security optionsConfigure basic settings on Aruba Instant APsConfigure AirWave management settings on an IAP clusterConfigure SNMP v2c settings on ArubaOS switchesDiscover ArubaOS switches in AirWave and bring switches and IAPs under monitoring and managementImplement zero touch provisioning (ZTP) for Aruba IAPs and ArubaOS switches This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions. This course consists of approximately 20% lecture and 80% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 3-day course prepares network professionals for the HPE ATP - Aruba Mobile First Solutions V1 certification exam.In this course, participants learn about ArubaOS switch technologies including: VLANs, securing access, redundancy technologies such as MSTP, link aggregation techniques including LACP, and switch virtualization with Aruba?s Virtual Switching Framework (VSF). You also learn about IP Routing including static and dynamic IP routing with OSPF. This course teaches you how to deploy Aruba wireless Access Points and configure Aruba Clustering technology. It also teaches you how to configure, manage and monitor the network with the Aruba AirWave management solution. Introduction to Aruba, a Hewlett Packard Enterprise companySwitch CLI (Command Line Interface) NavigationProtecting Management AccessManagement of Software and ConfigurationsVLANSSpanning Tree Protocol (STP)Link AggregationIP RoutingVirtual Switching Framework (VSF)Wireless for Small-to-Medium Businesses (SMBs)Aruba AirWave
Duration 3 Days 18 CPD hours This course is intended for Application Developer Data Modeler BI / BW Consultant Data Scientist Database Administrator SAP HANA Support Personnel Overview This course will prepare you to: Push down data intensive tasks to the SAP HANA database using SQL and SQLScript Understand how to code using advanced SQLScript techniques Follow recommended practices for writing optimal SQL and SQLScript Debug and analyze SQL and SQLScript code This course provides students with basic SQL knowledge or refreshes their SQL knowledge, and enables them to use basic and some advanced SQL techniques for querying and manipulating data in an SAP HANA database. Getting Started What is SQL and SQLScript? Understanding how ABAP developers work with SQLScript Understanding XS Advanced and HDI Working with Web IDE for SAP HANA Understanding the course data SQL Logic Container Creating user-defined functions Creating database procedures Trapping errors in SQLScript User defined libraries Declarative Logic Using declarative logic Imperative Logic Using imperative Logic Transactional Savepoints How to implement transactional savepoints Analytic Operations Using OLAP Analytic features Implementing Temporal Tables Working with Hierarchies Working with Hierarchies Troubleshooting and Best Practices Tools for troubleshooting Best Practices Appendix Starting from the beginning with SQL fundamentals Additional course details: Nexus Humans HA150 SAP HANA 2.0 SPS05 SQLScript for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA150 SAP HANA 2.0 SPS05 SQLScript for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialist Anyone who builds and develops IT systems Overview Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to preempt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal The Principles of Privacy in Technology training is the how to course on privacy and data protection practices in the development, engineering, deployment and auditing of IT products and services. Those taking the course will develop an understanding of privacy-related issues and practices in the context of the design and implementation of information and communication technologies and systems. The training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Technologist (CIPT) certification program. Fundamentals of information privacy Reviewing the modern history of privacy Foundational privacy concepts Data protection roles and fair information practices Exploring the impacts of privacy and data protection regulations on information management Privacy in the IT environment Compliance requirements IT risks Stakeholder privacy expectations Differentiating between privacy and security Core privacy concepts Foundational elements for embedding privacy in IT Common privacy principles Data protection by design and default Privacy considerations in the information life cycle Privacy considerations throughout the stages of the information life cycle Privacy in systems and applications Examining the risks inherent in the IT environment and options for addressing them Identity and access management Credit card information and processing Remote access BYOD and telecommuting Data encryption Additional privacy-enhancing technologies in the enterprise environment Privacy techniques Strengths and weaknesses of authentication techniques Using identifiers Privacy by design Online privacy issues Unique challenges that come from online privacy issues Laws and regulations Online threats Social media E-commerce Tracking technologies Web security protocols Technologies with privacy considerations Privacy considerations associated with a variety of technologies Cloud computing Wireless IDs Location-based services ?Smart? technologies Video/data/audio surveillance Biometric recognition