Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.
SNMP training course description A hands-on generic look at the technical operation of SNMP. The course starts with an overview of all the components, which make up SNMP. Hands on starts early with configuration of a managed network. The major versions of SNMP are then put into perspective followed by a look at the SNMP protocol. MIBs are then studied both from the perspective of reading MIBs and writing MIBs. The course finishes with a look at the security implications of SNMP. What will you learn Describe the SNMP architecture. Analyse SNMP packets. Recognise the MIB structure. Describe the SMI. Recognise the strengths and weaknesses of SNMPv2 and SNMPv3. SNMP training course details Who will benefit: Network administrators. Network operators. Programmers writing MIBs and agents. Prerequisites: TCP/IP Foundation for engineers Hands on experience of an SNMP management station would also be beneficial. Duration 3 days SNMP training course contents Network management What is network management? Benefits, issues. What is SNMP? SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security, alternatives to SNMP: CMIP, web based management. Configuring SNMP Auto discovery for management stations, NMS configuration, agent configuration, traps. Hands on Configuring agents and an NMS. SNMP background SNMP history, RFCs, standards, SNMP protocol versions, SNMPv1, SNMPv2, SNMPv3, SNMP SMI versions, which version should you use? Futures. SNMPv1 packets SNMP in the 7 layer model, port numbers, general packet format, BER, GET, GET-NEXT, tables, SET, TRAP, bandwidth issues, in band versus out of band management. Hands on Analysing SNMPv1 packets. SNMPv2 packets SNMPv2 improvements, error handling, GETBULK, v2traps, INFORM. Hands on Analysing SNMPv2 packets. SNMPv3 packets SNMPv3 packet format, use of SNMPv2 messages, REPORT PDU. MIB structure The internet MIB branch, standard mib-2, extra parts of mib-2, private enterprise MIBs, loading extra MIBs. Hands on MIB browsing. mib-2 The mib-2 groups, system group, interfaces group, IP group, ICMP group, TCP group, UDP group, transmission group, SNMP group, RMON. Hands on mib-2 browsing in detail. SMI The MIB layout, obtaining a private enterprise number, MIB definitions, IMPORT, Module identity, Textual conventions, object definitions, notifications, compliance statements, object groups, base SMI data types, application data types, scalars, instances, tables, table definition, writing agents, SMIng. SNMP security Community strings, SNMPv1 and SNMPv2c security practices, SNMPv3 security, SNMPv3 architecture, SNMP applications, the SNMP engine, the EngineID, security fields in SNMPv3 packets, USM, authentication, encryption, timeliness, VBAC, SNMPv3 configuration.
OpenView training course description A hands-on course focusing on network management using HP OpenView network node manager on Microsoft Windows or UNIX. What will you learn Recognise the benefits of ADSL. Describe the network management architecture. Use HP OpenView. Diagnose faults using HP OpenView. Recognise the MIB structure. OpenView training course details Who will benefit: Technical staff wanting to learn DNS. Prerequisites: TCP/IP Foundation Duration 2 days OpenView training course contents Network management What is network management?, Benefits, issues, demonstration. Getting started with HP OpenView Starting HP OpenView, IP discovery, IP monitoring, controlling IP discovery. Using HP OpenView Mapping devices, map layouts, maps and submaps, objects and symbols, object attributes, colour codings, polling. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Parts of SNMP SNMP architecture, MIB's, The protocol. HP OpenView SNMP configuration HP OpenView alarm browser HP OpenView alarms, alarm categories, filtering alarms, alarm details window. MIB's MIB1, MIB2, The MIB2 groups, additional MIB's, MIB compilers, vendor MIB's. HP OpenView MIB loader and browser. Monitoring devices Polling, obtaining MIB information. Diagnostic tools Poll node, the ping window, protocol test, locate route HP OpenView fault management Alarms, polling, fault management, setting thresholds and configuring traps.
C++ training course description A hands on introduction to programming in the C++ language. The course concentrates on aspects that will be new to experienced C programmers and so is not suitable for those without C knowledge. What will you learn Write C++ programs Debug C++ programs. Examine existing code and determine its function. Use classes, function overloading, operator overloading, inheritance and virtual functions within C++ programs. C++ training course details Who will benefit: Programmers needing to write C++ code. Programmers needing to maintain C++ code. Prerequisites: C programming foundation. Duration 5 days C++ training course contents The origins of C++ C++ as a better C, C++ and Object Oriented Programming, encapsulation, polymorphism, inheritance. C++ standards. Getting started Simple C++ programs. Classes Basics, constructor and destructor functions, member and friend functions. Using objects. Default, copy and conversion constructors. A better C Arrays, pointers and references, new and delete. Improved safety with smart pointers, Resource Acquisition in Initialization (RAII). Functions in C++ Function overloading, default arguments, inline functions, Lambda functions. Templates Template classes and functions. Standard Library Containers, Iterators, algorithms, function objects. Operator overloading Basics, binary operators, the this pointer, relational operators, unary operators. Members versus friends. Inheritance Base class access control, protected members, multiple inheritance, virtual base classes. More I/O Manipulators, customising inserters, extractors. File I/O. Virtual functions Pointers to derived classes, run time polymorphism. Exception handling Throwing errors, trying code and catching errors.
NNMi for engineers training course description A hands on course focusing on network management using Network Node Manager (NNMi) on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use NNMi. Diagnose faults using NNMi. Recognise the MIB structure. NNMi for engineers training course details Who will benefit: Network administrators. Network operators. Those wishing to find out more about how their NNMi works. Prerequisites: TCP/IP foundation for engineers Duration 2 day NNMi for engineers training course content Network management What is network management? Benefits, issues, demonstration. Getting started with NNMi Starting NNMi, IP discovery, IP monitoring, controlling IP discovery. Using NNMi Mapping devices, map layouts, maps and submaps, objects and symbols, object attributes, colour codings, polling. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Parts of SNMP SNMP architecture, MIBs, The protocol. NNMi SNMP configuration NNMi alarm browser NNMi alarms, alarm categories, filtering alarms, alarm details window. MIBs MIB1, MIB2, The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. NNMi MIB loader and browser. Monitoring devices Polling, obtaining MIB information. Diagnostic tools Poll node, the ping window, protocol test, locate route NNMi fault management Alarms, polling, fault management, setting thresholds and configuring traps.
Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.
ADO.NET training course description This ADO.net training course is designed to enable developers to use the toolset provided with.NET for data access including ADO.net objects, data controls, designers and interoperability with earlier ADO objects. The course is applicable for those using C# or VB.NET with ADO.NET What will you learn Retrieve and manipulate data using Microsoft's ADO.NET library. Work with the ADO.NET object model. Update data, including handling stored procedures, parameters, and return value. Search, sort and filter data. Leverage the power of XML. ADO.NET training course details Who will benefit: Programmers working with ADO.Net. Prerequisites: Effective programming with VB.NET or Concise introduction to C# Duration 2 days ADO.NET training course contents Introducing ADO.Net Traditional Data Access Architecture. ADO.Net Disconnected Data Access Architecture. Different components of ADO.Net. A review of basic SQL queries SQL SELECT Statement. SQL INSERT Statement. SQL UPDATE Statement. SQL DELETE Statement. Common data access tasks with ADO.Net Accessing Data using ADO.Net. Defining the connection string. Defining a Connection. Defining the command or command string. Defining the Data Adapter. Creating and filling the DataSet. A Demonstration Application The Interface. Loading the table. Filling the controls on the Form. Navigating through the records. Updating Data Steps for updating the table. Building the Application. Loading the table and displaying data in the form's controls. Initialising Commands. Adding Parameters to the commands. The ToggleControls() method of our application. Editing (or Updating) Records. Event Handler for the Save Button. Event Handler for the Cancel Button. Inserting Records. Deleting a Record. Using Stored Procedures Sample Stored Procedures. UPDATE Stored Procedure. INSERT Stored Procedure. DELETE Stored Procedure. SELECT Stored Procedure. Using Stored Procedures with ADO.Net.
Use Cases for Business Analysis: In-House Training The use case is a method for documenting the interactions between the user of a system and the system itself. Use cases have been in the software development lexicon for over twenty years, ever since it was introduced by Ivar Jacobson in the late 1980s. They were originally intended as aids to software design in object-oriented approaches. However, the method is now used throughout the Solution Development Life Cycle from elicitation through to specifying test cases, and is even applied to software development that is not object oriented. This course identifies how business analysts can apply use cases to the processes of defining the problem domain through elicitation, analyzing the problem, defining the solution, and confirming the validity and usability of the solution. What you will Learn You'll learn how to: Apply the use case method to define the problem domain and discover the conditions that need improvement in a business process Employ use cases in the analysis of requirements and information to create a solution to the business problem Translate use cases into requirements Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Overview of use case modeling What is a use case model? The 'how and why' of use cases When to perform use case modeling Where use cases fit into the solution life cycle Use cases in the problem domain Use cases in the solution domain Use case strengths and weaknesses Use case variations Use case driven development Use case lexicon Use cases Actors and roles Associations Goals Boundaries Use cases though the life cycle Use cases in the life cycle Managing requirements with use cases The life cycle is use case driven Elicitation with Use Cases Overview of the basic mechanics and vocabulary of use cases Apply methods of use case elicitation to define the problem domain, or 'as is' process Use case diagrams Why diagram? Partitioning the domain Use case diagramming guidelines How to employ use case diagrams in elicitation Guidelines for use case elicitation sessions Eliciting the problem domain Use case descriptions Use case generic description template Alternative templates Elements Pre and post conditions Main Success Scenario The conversation Alternate paths Exception paths Writing good use case descriptions Eliciting the detailed workflow with use case descriptions Additional information about use cases Analyzing Requirements with Use Cases Use case analysis on existing requirements Confirming and validating requirements with use cases Confirming and validating information with use cases Defining the actors and use cases in a set of requirements Creating the scenarios Essential (requirements) use case Use case level of detail Use Case Analysis Techniques Generalization and Specialization When to use generalization or specialization Generalization and specialization of actors Generalization and specialization of use cases Examples Associating generalizations Subtleties and guidelines Use Case Extensions The <> association The <> association Applying the extensions Incorporating extension points into use case descriptions Why use these extensions? Extensions or separate use cases Guidelines for extensions Applying use case extensions Patterns and anomalies o Redundant actors Linking hierarchies Granularity issues Non-user interface use cases Quality considerations Use case modeling errors to avoid Evaluating use case descriptions Use case quality checklist Relationship between Use Cases and Business Requirements Creating a Requirements Specification from Use Cases Flowing the conversation into requirements Mapping to functional specifications Adding non-functional requirements Relating use cases to other artifacts Wire diagrams and user interface specifications Tying use cases to test cases and scenarios Project plans and project schedules Relationship between Use Cases and Functional Specifications System use cases Reviewing business use cases Balancing use cases Use case realizations Expanding and explaining complexity Activity diagrams State Machine diagrams Sequence diagrams Activity Diagrams Applying what we know Extension points Use case chaining Identifying decision points Use Case Good Practices The documentation trail for use cases Use case re-use Use case checklist Summary What did we learn, and how can we implement this in our work environment?
Complete Ruby programming training course description This course starts with a quick-start session and then explains the language in detail from the bottom up. Hands on sessions follow all the major sessions to reinforce the theory. What will you learn Read Ruby programs. Write Ruby programs. Debug Ruby programs. Complete Ruby programming training course details Who will benefit: Anyone wishing to program in Ruby. Prerequisites: Software development fundamentals Duration 3 days Complete Ruby programming training course contents Introduction A tour of Ruby, Try Ruby, A suduko solver in Ruby. The Structure and execution of Ruby Lexical structure, Syntactic structure, Files structure, Program encoding, Program execution. Datatypes and objects Numbers, text, Arrays, Hashes, Ranges, Symbols, True, false, and nil, Objects. Expressions and operators Literals and keyword literals, Variable references, Constant references, Method invocations, Assignments, Operators. Statements and control structures Conditionals, loops, Iterators and enumerable objects, Blocks, Altering flow control, Exceptions and exception handling, BEGIN and END, Threads, fibres and continuations. Methods, Procs, Lambdas and closures Defining simple methods, Method names, Methods and parentheses, Method arguments, Procs and lambdas, Closures, Method objects, Functional programming. Classes and modules Defining a simple class, Method visibility: public, protected, privates, Subclassing and inheritance, Object creation and initialization, Modules, Loading and requiring modules, Singleton methods and Eigenclass, Method lookup, Constant lookup. Reflection and metaprogramming Types, classes and modules, Evaluating strings and blocks, Variables and constants, Methods, Hooks, Tracing, ObjectSpace and GV, Custom control structures, Missing methods and missing constants, Dynamically creating methods, Alias chaining. The Ruby platform Strings, Regular expressions, Numbers and Math, Dates and times, Collections, Files and directories, Input/output, Networking, Threads and concurrency. The Ruby environment Invoking the Ruby interpreter, The Top-level environment, Practical extraction and reporting shortcuts, Calling the OS, Security.
Database fundamentals training course description This three-day training course helps you prepare for Microsoft Technology Associate Exam 98-364, and build an understanding of these topics: Core Database Concepts, Creating Database Objects, Manipulating Data, Data Storage, and Administering a Database. What will you learn Describe core database concepts. Create database objects. Manipulate data. Describe data storage. Administer a database. Create a relational database consisting of 3 related tables. Database fundamentals training course details Who will benefit: Those working with databases. Prerequisites: None. Duration 3 days Database fundamentals training course contents Understanding core database concepts Flat-type databases, hierarchical databases, relational databases, database fundamentals, relational database concepts, using the SQL Server Management Studio Interface. Data Manipulation Language (DML), Data Definition Language (DDL), using DDL statements. Creating database objects Defining data types, using built-in data types, using exact numeric data types, using approximate numeric data types. Creating and using tables. Creating views. Creating stored procedures, SQL injections. Manipulating data Using Queries to select data, combining conditions, using the BETWEEN clause, using the NOT clause, using the UNION clause, using the EXCEPT and INTERSECT clauses, using the JOIN clause. Using Queries to insert data, Inserting data. Updating data and databases, Using the UPDATE statement. Deleting data, Using the DELETE statement, truncating a table with TRUNCATE TABLE, deleting a table with DROP TABLE, using referential integrity. Understanding data storage Normalising a database, normalization, first normal form, second normal form, third normal form, fourth normal form, fifth normal form. Primary, foreign and composite keys, clustered and non-clustered indexes, creating a non-clustered table. Administering a Database Securing Databases, server-level security, database-level security, Windows security, SQL authentication, database server roles, granting access to a database, fixed database roles, object permissions, managing roles, ownership chains, reviewing a sample security model. Backing up and restoring databases, recovery models, backup devices.