• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1098 Operator courses

BA10 - Understanding Root Cause Analysis

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, corrective action coordinators or managers; supervisors, team leaders, and process operators; anyone who wants to improve their ability to solve recurring problems. Overview Learn how to initiate a root cause analysis and gather data for investigating process and non-process incidentsDemonstrate how to collect data through interviews and analysisApply powerful techniques to identify and know the difference between symptoms and root causesLearn to know when to use the appropriate technique in root cause identification Learn how to avoid future incidents by developing appropriate recommendations to address causal factors and root causes Develop a process to identify systemic problem areas In this course, participants will learn to apply several practical, systematic methods for analyzing incidents and problems to uncover root causes. Understanding of these techniques will be reinforced by classroom exercises. Introduction & Objectives What is a 'Problem?' Why Problems Persist What is A Root Cause? Why Root Causes are important How to Organize for an RCA RCA Roles and Responsibilities Assemble your RCA Team Modes of Communication How to Resolve Conflict Case Study Exercise Select the Problem to Analyze Define the selection criteria Plan and estimate tasks for the team Finalize the plan and gain agreement among your stakeholders Case Study Exercise Define the Problem What to look for - Problem-as-Given (PAG) vs. Problem-as-Understood (PAU) Developing your problem statement Refining the problem specification Case Study Exercise Identify the Source of the Problem Discuss when to use the appropriate analysis technique to determine the problem source Process Diagram Forms & Checklists Statistical Sampling Fishbone Diagram Surveys Charts - Line, Scatter, Bar, & Pie Case Study Exercise Solution Options Analysis & Selecting the 'Best Fit' How to approach different solution options Brainstorming Weighted Evaluation Selecting the appropriate option Hold an Retrospective on your approach Planning the proposal Case Study Exercise Putting RCA into Practice Create a Root Cause Analysis program within your organization How to develop appropriate recommendations to address root causes at various levels to avoid future incidents Additional course details: Nexus Humans BA10 - Understanding Root Cause Analysis training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BA10 - Understanding Root Cause Analysis course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

BA10 - Understanding Root Cause Analysis
Delivered OnlineFlexible Dates
Price on Enquiry

F5 Networks Developing iRules for BIG-IP

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for system administrators, network administrators and application developers responsible for the customization of traffic flow through a BIG-IP system. This course provides networking professionals a functional understanding of iRules development. The course builds on the foundation of the Administering BIG-IP or Configuring LTM course, demonstrating how to logically plan and write iRules to help monitor and manage common tasks involved with processing traffic on the BIG-IP system. Extensive course labs consist of writing, applying and evaluating the effect of iRules on local traffic. This hands-on course includes lectures, labs, and discussions. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP System Configuration Leveraging F5 Support Resources and Tools Module 2: Getting Started with iRules Customizing Application Delivery with iRules Triggering an iRule Leveraging the DevCentral Ecosystem Creating and Deploying iRules Module 3: Exploring iRule Elements Introducing iRule Constructs Understanding iRule Events and Event Context Working with iRule Commands Logging from an iRule Using SYSLOG-NG (LOG Command) Working with User-Defined Variables Working with Operators and Data Types Working with Conditional Control Structures (IF and SWITCH) Incorporating Best Practices in iRules Module 4: Developing and Troubleshooting iRules Mastering Whitespace and Special Symbols Grouping Strings Developing and Troubleshooting Tips Using Fiddler to Test and Troubleshoot iRules Module 5: Optimizing iRule Execution Understanding the Need for Efficiency Measure iRule Runtime Efficiency Using Timing Statistics Modularizing iRules for Administrative Efficiency Using Procedures to Modularize Code Optimizing Logging Using High-Speed Logging Commands in an iRule Implementing Other Efficiencies Using Looping Control Structures (WHILE, FOR, FOREACH Commands) Module 6: Securing Web Applications with iRules Integrating iRules into Web Application Defense Mitigating HTTP Version Attacks Mitigating Path Traversal Attacks Using iRules to Defends Against Cross-Site Request Forgery (CSRF) Mitigating HTTP Method Vulnerabilities Securing HTTP Cookies with iRules Adding HTTP Security Headers Removing Undesirable HTTP Headers Module 7: Working with Numbers and Strings Understanding Number Forms and Notation Working with Strings (STRING and SCAN Commands) Combining Strings (Adjacent Variables, CONCAT and APPEND Commands) Using iRule String Parsing Functions (FINDSTR, GETFIELD, and SUBSTR Commands) Module 8: Processing the HTTP Payload Reviewing HTTP Headers and Commands Accessing and Manipulating HTTP Headers (HTTP::header Commands) Other HTTP commands (HTTP::host, HTTP::status, HTTP::is_keepalive, HTTP::method, HTTP::version, HTTP::redirect, HTTP::respond, HTTP::uri) Parsing the HTTP URI (URI::path, URI::basename, URI::query) Parsing Cookies with HTTP::cookie Selectively Compressing HTTP Data (COMPRESS Command) Module 9: Working with iFiles and Data Groups Working with iFiles Introducing Data Groups Working with Old Format Data Groups (MATCHCLASS, FINDCLASS) Working with New Format Data Groups (CLASS MATCH, CLASS SEARCH) Module 10: Using iRules with Universal Persistence, Stream, and Statistics Profiles Implementing Universal Persistence (PERSIST UIE Command) Working with the Stream Profile (STREAM Command) Collecting Statistics Using a Statistics Profile (STATS Command) Collecting Statistics Using iStats (ISTATS Command) Module 11: Incorporating Advanced Variables Reviewing the Local Variable Namespace Working with Arrays (ARRAY Command) Using Static and Global Variables Using the Session Table (TABLE Command) Processing Session Table Subtables Counting ?Things? Using the Session Table

F5 Networks Developing iRules for BIG-IP
Delivered OnlineFlexible Dates
Price on Enquiry

VMware App Volumes and Dynamic Environment Manager: Configure and Manage

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators, administrators, and architects for VMware Horizon who are responsible for the creation, maintenance, and delivery of remote and virtual desktop services Overview By the end of the course, you should be able to meet the following objectives: Describe the features, functions, and architecture of App Volumes Create and deliver application packages in App Volumes Deliver App Volumes published applications to virtual desktops and on-demand, using Horizon Run the App Volumes Application Capture Command-Line Program using appcapture.exe Perform advanced configuration of App Volumes Scale App Volumes to multiple locations and sites Describe the features, functions, and architecture of VMware Dynamic Environment Manager Manage application configurations, user environment settings, and personalization settings using VMware Dynamic Environment Manager Create predefined configurations for applications by using the Application Profiler Create predefined configurations for applications by using the Application Profiler Manage multiple environments using VMware Dynamic Environment Manager. Enable and synchronize the offline use of VMware Dynamic Environment Manager by using SyncTool Using VMware Horizon Smart Policies on the VMware Horizon platform This three-day course builds your skills in application management with VMware App Volumes? and VMware Dynamic Environment Manager?. You learn how to use App Volumes to deliver applications and data to desktops and users in seconds and at scale. You gain skills in managing application life cycles across installation, update, and replacement. You also learn how to use VMware Dynamic Environment Manager to provide personalization and dynamic policy configuration across virtual, physical, and cloud-based environments to simplify end-user profile management. Course Introduction Introductions and course logistics Course objectives Overview of App Volumes Explain features and benefits of App Volumes Identify benefits of VMware ThinApp© Identify App Volumes components and architecture Manage application management stages using App Volumes. Working with Application Packages Differentiate between Application, Package and Program Create an Application Package Assign an Application to an entity Use markers to assign the new version of an Application Package Differentiate between Classic and On-Demand delivery of applications Update an Application with a new Package Published Applications Identify the benefits of delivering Published Applications On-Demand List the steps and prerequisites for creating Published Applications on Demand Integrate Horizon Connection Server and App Volumes Manager Associate App Volumes Manager with an automated farm Add Application Pools from App Volumes Manager Advanced App Volumes Configuration Perform advanced configuration of App Volumes Scale App Volumes to multiple locations and sites Run the App Volumes Application Capture Command-Line Program using appcapture.exe Overview of VMware Dynamic Environment Manager Explain features and benefits of Dynamic Environment Manager Identify the components of Dynamic Environment Manager architecture Differentiate between user profile scenarios Management Console User Interface Configure Personalization settings Create Condition sets Perform Application migration Configure User environment settings Advanced Dynamic Environment Manager Configuration Scale Dynamic Environment Manager to multiple locations and sites Use Silos Run the App Volumes Application Capture Command-Line Program using appcapture.exe Application Configuration Management Predefined and user-customized application settings Using Application Profiler Privilege Elevation SyncTool Identify the features of SyncTool Implement SyncTool VMware Horizon Smart Policies Identify the scope of Horizon Smart Policies Configure Horizon Smart Policies settings Define Smart Policies Conditions

VMware App Volumes and Dynamic Environment Manager: Configure and Manage
Delivered OnlineFlexible Dates
Price on Enquiry

Terraform 101

By Nexus Human

Duration 3 Days 18 CPD hours Overview VMware vSphere: What's New [V8] https://lms.nhcms.neYou will learn essential Terraform concepts including: Writing Terraform HCL code Deploying into common clouds such as AWS, Azure, Docker, Kubernetes, and VMWare Where Terraform fits in the Enterprise CI/CD model Differences between Terraform and Ansible As enterprises seek to deploy and maintain increasingly complex cloud infrastructure, there is a necessity to use ?Infrastructure as Code? (IaC) tools, like Terraform. An open-source, state management tool developed by HashiCorp, Terraform allows developers to use a common coding interface to work through their various clouds safely and efficiently. Attendees will leave being able to write and understand Terraform code (HCL), have a clear understanding of Terraform?s various components and supporting tools, as well as when to reach for Terraform over another IaC tool, such as Ansible. This class prepares you for Terraform Certifcation. Up and Running with Terraform Terraform Overview Defining ?declarative? How to think about Terraform (versus Ansible) Reviewing the Terraform Configuration Running the Terraform Configuration Provisioners Syntax Low Level? HCL syntax Style Conventions Comments Blocks Arguments JSON Configuration Syntax Resources Meta-Arguments depends_on count for_each provider lifecycle Data Sources Variables and Output Input Variables Output Values Local Values Functions String Collection Numeric Encoding Filesystem Date and Time Hash and Crypto IP Network Type Conversion Modules Module Blocks Module Sources Meta Arguments Terraform Templates templatefile Function Template Demonstration Introducing Data Sources Creating an External Data Source Building tftpl template files Expressions Types and Values Strings and Templates Reference to Values Operators Function Calls Conditionals For Expressions Splat Expressions Dynamic Blocks Type Constraints Version Constraints State Understanding the importants of states state storage and locking importing existing resources Remote State What to do when local state is lost CICD Piplines with Terraform Terraform and GitLab pipelines Terraform and Jenkins pipelines Enterprise Case Studies Terraform and Docker Terraform and Kubernetes Terraform and Amazon AWS Terraform and Azure Terraform and VMWare Understanding how to apply Terraform to your unique infrastructure Beyond Basics Intro to Go Programming Terraform Cloud Additional HashiCorp Offerings Backends Secrets Additional course details: Nexus Humans Terraform 101 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Terraform 101 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Terraform 101
Delivered OnlineFlexible Dates
Price on Enquiry

E2E200 -SAP Change Control Management

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Change Managers: Responsible for documentation, approval and change processes System Landscape Architects: Responsible for the design of the transport landscape topology System Administrators: Responsible for executing transports Development Managers: Responsible for performing development changes Application Manager: Responsible for approving and performing changes in an application Support Manager and members of the customer's SAP competence center: Responsible for Reporting and Diagnostics capabilities Partners and System Integrators Overview This course will prepare you to: Describe the concept and methods of E2E Change Control Management. Leverage the SAP Solution Manager 7.2 as application platform for E2E Change Control Management. In this course you will learn how change control management coordinates changes that are introduced into a software landscape so that the changes do not conflict with each other and how to make sure the changes are executed without disrupting ongoing business. This results in improved quality of the software landscape, higher availability of IT solutions, and lower total cost of ownership. Also important, change control management ensures that the changes introduced remain transparent, traceable and are made available for reporting and change analysis. Becoming adept at change control management requires skill in the efficient use of standardized methods and procedures. In this ?how to use? training, SAP imparts best-in-class knowledge of solution operations. The End-to-End Change Control Management course introduces participants to what change control management is and the standard tools used to accomplish it, tools provided by SAP Solution Manager. Introduction to E2E Change Control Management Explain the scope of End-to-End Change Control Management Explain the role of SAP Solution Manager to manage changes in your solution landscape Enhanced Change and Transport System Explain how the Enhanced Change and Transport System (CTS+) works Understand the basic concepts of Enterprise Portal and how it is supported by CTS+ Describe the best practices for the setup and usage of CTS+ in different scenarios Configuration Validation Understand the concepts and architecture of E2E Change Diagnostics Find current configuration information with the Change Reporting tool Find recent changes in the solution landscape with the E2E Change Analysis tool Compare multiple systems with the Configuration Validation tool Create targets, use operators and run validation reports Know how to use predefined reports in the report directory Transport and Execution Analysis Service and Transport and Execution Analysis Service for Projects Know how to run and use this self-check services within SAP Solution Manager Understand how to interpret the software change management KPIïs that are collected for your landscape Software Change Strategy Understand the limitations of a three-system landscape Understand the benefits of bundling changes in cycles and synchronized releases Transport Management with SAP Solution Manager Understand the change control landscape concept for transport management in SAP Solution Manager 7.2 Understand the usage of critical objects, cross system object locking and downgrade protection Know how to use retrofit in a dual landscape Understand the features of cCTS, which can be used for Quality Gate Management and Change Request Management parallel to CTS. Quality Gate Management Explain the concept of Solution Transports and Track Synchronization Setup and use Quality Gate Scenario as a central Transport Management Tool Create and release transport requests centrally in SAP Solution Manager for ABAP and Non-ABAP environments Know how to work within the Quality Gate Scenario Change Request Management Understand the different use cases for Change Request Management Describe the various elements of Change Request Management as part of SAP Solution Manager Understand SAP?s best practices for transport management which are implemented in Change Request Management Know how to work with Change Request Management Release Management Learn how to manage Release Management with SAP Solution Manager Understand how to manage the successful deployment of all related changes into the productive environment.

E2E200 -SAP Change Control Management
Delivered OnlineFlexible Dates
Price on Enquiry

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

BA20 - Business Process Improvement

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for It is appropriate for Managers, Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators. Overview Describe business process improvement (BPI) business drivers.Plan, manage and close requirements for a Business Process Improvement project Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Apply a methodology to business process improvement projects. This 2-day course aims at introducing its attendees to the core values, principles, and practices of Business Process Improvement. Introduction - A Business Process Improvement (BPI) Overview Why are we here today? What is BPI? Benefits of BPI Specific challenges/obstacles and successes Process improvement examples: Industry specific examples Famous debacles to avoid and successes to emulate Your role in helping to identify problems Overview of the Joiner 7-Step Method What is the Joiner 7-Step Method? Walkthrough of the Joiner 7-Step Method Template: Introduce and review Process Improvement Template Case Study Exercise: Read and discuss introduction to the Case Study Step #1: Initiate the Project Types of business problems typically encountered at insurance companies and banks How to recognize a business-related problem Identifying the gaps (delta between current and future states) Ownership of the project and the business problem Defining measurable success criteria Case Study Exercise: Complete the Problem Statement section (Step #1) of the template Step #2: Define Current Situation What are symptoms of a problem? Looking for symptoms of the problem Performing Stakeholder Analysis Technique: View a RACI Matrix Defining the impacts caused by the problem Technique: Business Process Modeling (As-Is) Understand how to draw an As-Is Business Process Model Case Study Exercise: Complete the Define Current Situation section (Step #2) of the template Step #3: Identify Root Causes What are root causes? Performing Root Cause Analysis Technique: Fishbone Diagram using the cafeteria example Case Study Exercise: Discuss a Fishbone Diagram Technique: Pareto Chart (discuss and show example) Case Study Exercise: Complete the Identify Root Causes section (Step #3) of the template Step #4: Develop Solutions Identifying options for problem resolution Avoid jumping to conclusions Technique: Brainstorming Case Study Exercise: Conduct a Brainstorming Session Recognizing pros and cons for each option Technique: Kempner-Tregoe (?Must-Have? vs. ?Nice-to-Have?) Case Study Exercise: Determine best solution using a ?simple? Kempner-Tregoe model Case Study Exercise: Complete the Develop Solutions section (Step #4) of the template Step #5: Define Measurable Results Prototyping the solution Technique: Business Process Modeling (To-Be) Measuring results against the success criteria (Step #1) Case Study Exercise: Review changes to an As-Is Business Process Model Case Study Exercise: Complete the Define Measurable Results section (Step #5) of the template Step #6: Standardize Process Defining how the process will be documented Plan and understand organizational readiness Discuss how employees are empowered to identify and act upon their ideas Identifying follow-up needs (i.e., training) for the staff that will be impacted Technique: Communication Plan Case Study Exercise: Complete the Standardize Process section (Step #6) of the template Step #7: Determine Future Plans Monitoring the process for Continuous Process Improvement (The ?Plan-Do-Check-Act? Cycle) Understand how to sustain the improvements made by the Joiner 7-Step Method Technique: PDCA form Case Study Exercise: Complete the Determine Future Plans section (Step #7) of the template Going Forward with a Plan of Action Identifying process problems in your organization Individual Exercise: Name three (3) possible areas for improvement Prioritize and define the next steps Individual Exercise: Using a new template complete Step 2 & Step 3 for one possible area for improvement you have identified

BA20 - Business Process Improvement
Delivered OnlineFlexible Dates
Price on Enquiry

Intermediate Linux (TTLX2104)

By Nexus Human

Duration 2 Days 12 CPD hours Overview This skills-focused course combines expert instructor-led discussions with practical hands-on labs that emphasize useful, current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, you'll learn about and explore: Review of the File System Introduction to Shells: sh, bash, and ksh Shell Programming Advanced Shell Features Text Manipulation Utilities File Processing Utilities Multitasking and Batch Processing Regular Expressions Intermediate Linux: Shell, Bash, Text Manipulation, Multitasking & More is a two-day course designed to provide you with hands on experience using standard Linux commands and utilities used for day-to-day tasks including file manipulation, program execution and control, and effective use of the shell and desktop environments. Throughout the course you?ll explore key concepts to Linux core functionality, while learning the system's most commonly used commands. You?ll also learn the Bourne shell, Bash shell and Korn shell programming techniques you?ll need to read and modify existing shell scripts, and create your own. Data manipulation utilities and shell syntax for synthesizing command pipelines are also emphasized throughout the course. Review of the File System File System Organization File Types File and Directory Naming Rules and Conventions Commands for Navigating the File System Introduction to Inodes Ownership, Permissions, and Dates Manipulating Files and Links Manipulating Directories Determining Disk Usage Other File System Utilities Introduction to Shells: sh, bash, and ksh Shell Functions I/O Redirection and Pipes Command Separation and Grouping Background Execution Filename Expansion Shell Variables Command Substitution Quoting and Escaping Metacharacters Bash Shell Features Korn Shell Features Command Execution Startup Files Customizing the User Environment Shell Programming Shell Script Features and Capabilities Creating and Running a Script Working With Variables Environment Variables Working With Data Types Formatting Base Conversion Setting Special Attributes Input/Output Techniques Conditional Constructs if/then else/elif Looping Constructs for, while, until Math Operators Advanced Shell Features Manipulating Strings Writing and Calling Functions Controlling Process Priorities Interpreting Command Line Arguments Making Scripts Interactive Special Shell Variables Advanced I/O with Streams Improving Performance of Scripts Text Manipulation Utilities Editing a File from a Script Scripting with ed or sed UNIX and Linux Utilities to Manipulate Files Regular Expressions grep and egrep The Stream Editor sed Sorting in Scripts Generating Reports with awk Splitting Large Files Counting Words, Lines, and Characters Transforming File Contents File Processing Utilities Examining and Comparing Files Reporting Differences Between Files Comparing Files of Any Format Displaying Data in Octal and Hex Compressing Data Converting File Formats Extracting Text Strings Multitasking and Batch Processing Multitasking Scheduled Execution Using cron The at and batch Commands Regular Expressions Regular Expression Overview Regular Expression Implementations Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis Additional course details: Nexus Humans Intermediate Linux (TTLX2104) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate Linux (TTLX2104) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Intermediate Linux (TTLX2104)
Delivered OnlineFlexible Dates
Price on Enquiry

VBA in Excel - Part 2

By Underscore Group

Expand your VBA knowledge further and learn some of the more advanced coding features. Course overview Duration: 2 days (13 hours) This course is aimed at experienced VBA users or those who have attended our Part 1 course and have started to use the language. Part 2 expands on the huge array of commands and elements of the data model that can be used and looks at building more complex VBA models Objectives  By the end of the course you will be able to: Use comparison operators and system functions Use Arrays Work with ranges Work with the worksheets and workbooks collections and objects Use application objects Use the FileSystemObject Create function procedures Import and save text files Connect to other applications Content Comparison operators Using Comparison operators and functions The LIKE function Wildcards Using SELECT Case System functions The VAL function Case functions Trim functions Text functions Date functions Excel worksheet functions Using Excel functions in VBA Arrays Creating arrays Using arrays Ubound and Lbound Single and multi dimensional arrays Static vs dynamic arrays Working with ranges Creating range objects Passing data between range objects and arrays Using Transpose The Excel object model The object browser Working with collections Collections Creating object variables Setting object variables The For Each . . . Next Loo Sheet collections The worksheets collection The worksheet object The sheets collection Using object Grouping worksheets Using Typename The Workbook collection The workbooks collection Setting workbook variables Application objects Excel default information Display/alerts Screen updating Status bar On Time Using Wait Systems dialog boxes Showing dialog boxes Using dialog boxes Working with files Searching for files and folders The DIR function The FileSystemObject Function procedures Creating functions Adding arguments Calling functions Working with text files Searching for files and folders The DIR function The FileSystemObject Using the FILE and FOLDER collections Sharing data with other applications Early vs Late Binding Setting references to other applications Creating application variables Setting application variables

VBA in Excel - Part 2
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

iPhone Mobile App Development

By Nexus Human

Duration 5 Days 30 CPD hours The iPhone combines technologies of smartphones and personal computing. With a multitouch screen, built-in accelerometer and virtual keyboard, the iPhone also requires the mobile application developer to adopt a vastly different software design philosophy. With over a billion mobile apps sold, iPhone Programming is a critical part of the future of mobile technology. This five day course teaches the attendee all aspects of iOS mobile app development Introduction and Setup Joining the Apple iOS Developer Program Installing Xcode and the iOS SDK A Guided Tour of Xcode An Introduction to Xcode Playgrounds Swift Programming Language Swift Data Types, Constants, and Variables Swift Operators and Expressions Swift Flow Control The Swift Switch Statement Overview of Swift Functions The Basics of Object Oriented Programming in Swift Swift Subclassing and Extensions Arrays and Dictionary Collections in Swift Understanding Error Handling in Swift Views, Layouts, and Storyboards Creating an Interactive iOS App Auto Layout in iOS Working with iOS Auto Layout Constraints in Interface Builder Implementing iOS Auto Layout Constraints in Code Implementing Cross-Hierarchy Auto Layout Constraints in iOS Understanding the iOS Auto Layout Visual Format Language Using Size Classes to Design Adaptable Universal iOS User Interfaces Using Storyboards in Xcode Organizing Scenes over Multiple Xcode Storyboard Files Using Xcode Storyboards to Create an iOS Tab Bar Application Working with the iOS Stack View Class iOS Stack View Tutorial iOS Split View Master-Detail Example Multitasking in iOS Implementing a Page based iOS Application using UIPageViewController iOS UIPageViewController Application Data Storage with Files, iCloud, and Databases Working with Directories in Swift on iOS Working with Files in Swift on iOS iOS Directory Handling and File I/O in Swift Preparing an iOS App to use iCloud Storage Managing Files using the iOS UIDocument Class Using iCloud Storage in an iOS Application Synchronizing iOS Key-Value Data using iCloud iOS Database Implementation using SQLite SQLite based iOS Application using Swift and FMDB Working with iOS Databases using Core Data iOS Core Data Introduction to CloudKit Data Storage on iOS iOS CloudKit Example iOS CloudKit Subscription Example Touch, Taps, and Gestures An Overview of iOS Multitouch, Taps and Gestures iOS Touch, Multitouch and Tap Application Detecting iOS Touch Screen Gesture Motions Identifying Gestures using iOS Gesture Recognizers iOS Gesture Recognition iOS 3D Touch Force Handling iOS 3D Touch Quick Actions iOS 3D Touch Peek and Pop Advanced View Options Basic iOS Animation using Core Animation iOS UIKit Dynamics ? An Overview Introduction to iOS Sprite Kit Programming iOS Sprite Kit Level Editor Game iOS Sprite Kit Collision Handling Extensions Introduction to Extensions in iOS iOS Today Extension Widget Creating an iOS Photo Editing Extension Creating an iOS Action Extension Receiving Data from an iOS Action Extension Multimedia, Facebook, and Twitter Accessing the iOS Camera and Photo Library iOS Camera Application iOS Video Playback using AVPlayer and AVPlayerViewController iOS Multitasking Picture in Picture Tutorial Playing Audio on iOS using AVAudioPlayer Recording Audio on iOS with AVAudioRecorder The App Store Preparing and Submitting an iOS Application to the App Store Additional course details: Nexus Humans iPhone Mobile App Development training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the iPhone Mobile App Development course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

iPhone Mobile App Development
Delivered OnlineFlexible Dates
Price on Enquiry