• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1907 Organ courses in Cardiff delivered Live Online

Business Analysis - Practice

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The course is designed for individuals who want to gain in-depth knowledge and practice in the discipline of Business Analysis (Business Analysts, Requirements Engineers, Product manager, Product Owner, Chief Product Owner, Service Manager, Service Owner, Project manager, Consultants) Overview Students should be able to demonstrate knowledge and understanding and application of Business Analysis principles and techniques. Key areas are: The breath of the role of a Business Analyst The processes and techniques of strategy analysis Investigation of an organization's business systems Techniques used within stakeholder analysis and the need for analyzing perspectives Conceptual modelling and business activity models Business improvements through gap analysis The Business case within the business change lifecycle The Business Analyst role analyzes, understands and manages the requirements in a customer-supplier relationship and ensures that the right products are delivered.The course provides in-depth knowledge and practice in Business Analysis Course Introduction Let?s Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to Business Analysis Practice Exam Details Business Analysis Certification Scheme Rationale for Business Analysis The role of the BA throughout the stages of the Business change lifecycle The scope of the BA role within the context of the range of analysis activities Three areas of competencies Understanding the Strategic Context Techniques in practice: MOST Resource audit PESTLE Porter's Five Forces SWOT analysis CSF, KPI and Performance target Balanced Business Score Card Understanding the Current Situation Identification of stakeholder categories Identification of relevant investigation techniques The rationale for taking a holistic view Rich pictures, Mind Maps and Fishbone diagrams Stakeholder Analysis and Management Power/interest and level of interest Appropriate stakeholder management strategy Stakeholder perspectives and CATWOE technique Analysing and Modelling Business Activities Conceptual models of a business situation Five types of high level activity Planning activities Enabling activities Doing activities Monitoring and control activities Three types of business events The consensus business activity model Identifying Potential Solutions Different categories of business rules Gap analysis (through conceptual business activity model and as-is business situation) Components of a new business model Building the Business Case Rationale for the development of a business case Contents of a business case Identification of tangible/intangible costs and benefits, risks and impacts Rationale for the financial case and appraisal techniques Business case review in the business change lifecycle Additional course details: Nexus Humans Business Analysis - Practice training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Analysis - Practice course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Analysis - Practice
Delivered OnlineFlexible Dates
Price on Enquiry

Project Management Essentials

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for any individual who might need to perform project management activities in their job role on either a formal or informal basis, or any individual who wants to build upon their current project management knowledge to be more productively involved on a project team. This course is not specifically designed for students who are seeking project management-related certification. Rather, it is designed to introduce a structure to help students more effectively manage projects as well as participate fully on a project team. Overview In this course, you will apply recognized practices of project management to manage a project from start to finish. You will: - Identify the basic concepts of project management. - Launch a project. - Estimate project work. - Create a project schedule. - Plan project costs. - Plan for project risks. - Plan for project quality and compliance. - Manage human and physical resources for the project. - Manage project procurements. - Plan for change management and monitor the project scope. - Monitor and optimize project schedule and cost. - Monitor the quality of the project work and the risks involved. - Plan communication strategies and manage stakeholder relationships. - Close a project. If you are taking this course, you probably have some exposure to managing projects, or you may be considering embarking on a career as a professional project manager. Your ability as a project manager to demonstrate best practices in project management on the job is becoming the standard to compete in today's fast-paced and highly technical workplace. In this course, you will apply the generally recognized practices of project management to successfully manage projects. Project managers are always under severe pressure to complete projects on time and within budget. However, most projects fail to meet these demands, and, as a result, many projects are terminated early. Successful project management requires knowledge and experience. This course is designed to provide you with the skills needed to be a successful project manager in today's rapidly changing world. The skills and knowledge you gain in this course will help you avoid making costly mistakes and increase your competitive edge in the project management profession. Getting Started with Project Management Define Project Management Basics Identify Influencing Factors Define Project Management Certifications Launching Projects How Organizations Choose the Right Project Identify Project Stakeholders and Their Expectations Authorize a Project Identify the Project Scope Estimating Project Work Develop a WBS Identify the Relationships Between Work Packages Identify Resources Estimate Time Creating a Project Schedule Develop a Project Schedule Create a Schedule Baseline Planning Project Costs Establish Project Costs Establish the Cost Baseline Reconcile Funding and Costs Planning for Risk Create a Risk Management Plan Identify Risks and Their Causes Analyze Risks Develop a Risk Response Plan Planning for Quality and Compliance Deliver the Desired Project Results Verify Compliance Requirements Managing the Project Team Plan Your Project Team Assemble the Team Develop the Team Manage the Team Managing Project Procurements Plan for Project Procurements Obtain Responses from Vendors Select the Right Vendor Manage Vendors and Procurements Managing Change During Project Execution Prepare for Project Execution Manage Project Changes Monitor the Project Scope Monitoring and Controlling Project Schedule and Cost Monitor and Control the Project Schedule Optimize the Project Schedule Monitor and Control Project Cost Monitoring and Controlling Risk and Quality Monitor and Control Risks Put Quality Plans into Action Control Project Quality Communicating and Reporting Communicate During a Project Distribute Project Information Manage Stakeholder Relationships and Expectations Report on Project Performance Closing the Project Deliver the Final Product Close Project Procurements Close the Project

Project Management Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB)
Delivered OnlineFlexible Dates
Price on Enquiry

20742 Identity with Windows Server 2016

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to:Install and configure domain controllers.Manage objects in AD DS by using graphical tools and Windows PowerShell.Implement AD DS in complex environments.Implement AD DS sites, and configure and manage replication.Implement and manage Group Policy Objects (GPOs).Manage user settings by using GPOs.Secure AD DS and user accounts.Implement and manage a certificate authority (CA) hierarchy with AD CS.Deploy and manage certificates.Implement and administer AD FS.Implement and administer Active Directory Rights Management Services (AD RMS).Implement synchronization between AD DS and Azure AD.Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS

20742 Identity with Windows Server 2016
Delivered OnlineFlexible Dates
Price on Enquiry

M20742 Identity with Windows Server 2016

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is primarily intended for existing IT professionals who have some AD DS knowledge and experience and who aim to develop knowledge about identity and access technologies in Windows Server 2016. The secondary audience for this course includes IT professionals who are looking to consolidate their knowledge about AD DS and related technologies, in addition to IT professionals who want to prepare for the 70-742 exam. Overview After completing this course, students will be able to: Install and configure domain controllers. Manage objects in AD DS by using graphical tools and Windows PowerShell. Implement AD DS in complex environments. Implement AD DS sites, and configure and manage replication. Implement and manage Group Policy Objects (GPOs). Manage user settings by using GPOs. Secure AD DS and user accounts. Implement and manage a certificate authority (CA) hierarchy with AD CS. Deploy and manage certificates. Implement and administer AD FS. Implement and administer Active Directory Rights Management Services (AD RMS). Implement synchronization between AD DS and Azure AD. Monitor, troubleshoot, and establish business continuity for AD DS services. This course teaches IT Pros how to deploy and configure Active Directory Domain Services in a distributed environment, how to implement Group Policy, how to perform backup & restore, & how to troubleshoot Active Directory?related issues. Installing & Configuring DCs Overview of AD DS Overview of AD DS DCs Deploying DCs Lab: Deploying and administering AD DS Managing Objects in AD DS Managing user accounts Managing groups in AD DS Managing computer accounts Using Windows PowerShell for AD DS administration Implementing and managing organizational units Lab: Deploying and administering AD DS Lab: Administering AD DS Advanced AD DS Infrastructure Management Overview of advanced AD DS deployments Deploying a distributed AD DS environment Configuring AD DS trusts Lab: Domain and trust management in AD DS Implementing & Administering AD DS Sites & Replication Overview of AD DS replication Configuring AD DS sites Configuring and monitoring AD DS replication Lab: Managing and implementing AD DS sites and replication Implementing Group Policy Introducing Group Policy Implementing and administering GPOs Group Policy scope and Group Policy processing Troubleshooting the application of GPOs Lab: Implementing a Group Policy infrastructure Lab: Troubleshooting a Group Policy Infrastructure Managing User Settings with GPOs Implementing administrative templates Configuring Folder Redirection and scripts Configuring Group Policy preferences Lab: Managing user settings with GPOs Securing AD DS Securing domain controllers Implementing account security Audit authentication Configuring managed service accounts (MSAs) Lab: Securing AD DS Deploying & Managing AD CS Deploying CAs Administering CAs Troubleshooting and maintaining CAs Lab: Deploying and configuring a two-tier CA hierarchy Deploying & Managing Certificates Deploying and managing certificate templates Managing certificate deployment, revocation, and recovery Using certificates in a business environment Implementing and managing smart cards Lab: Deploying certificates Implementing & Administering AD FS Overview of AD FS AD FS requirements and planning Deploying and configuring AD FS Overview of Web Application Proxy Lab: Implementing AD FS Implementing & Administering AD RMS Overview of AD RMS Deploying and managing an AD RMS infrastructure Configuring AD RMS content protection Lab: Implementing an AD RMS infrastructure Implementing AD DS Synchronization with Azure AD Planning and preparing for directory synchronization Implementing directory synchronization by using Azure AD Connect Managing identities with directory synchronization Lab: Configuring directory synchronization Monitoring, Managing, & Recovering AD DS Monitoring AD DS Managing the AD DS database Recovering AD DS objects Lab: Recovering objects in AD DS

M20742 Identity with Windows Server 2016
Delivered OnlineFlexible Dates
Price on Enquiry

Certified Data Centre Risk Professional (CDRP)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified Data Centre Risk Professional (CDRP)
Delivered OnlineFlexible Dates
Price on Enquiry

SCRUMstudy Agile Master Certified (SAMC)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This certification is appropriate for anyone interested in becoming familiar with the concepts and practices of Agile Project Delivery, and who wants to have a working knowledge of the various Agile methodologies. Overview Objectives are: To provide an understanding of Agile philosophy and practices To provide a working knowledge of various Agile methodologies To provide students with the ability to compare and choose which methodology is appropriate in a given situation To prepare participants to pass the SAMC™ exam Course outcomes: Participants will be familiar with the concepts and practices of Agile project delivery. Participants will be equipped with detailed knowledge and understanding of available Agile methodologies. Participants will be able to compare and choose the methodologies or parts of methodologies that are most relevant to their current and future situations. Participants will be armed with the proper tools to take the lead in Agile projects and to address and resolve Agile issues in their organizations. Participants will be SAMC certified. Agile relies on adaptive planning and iterative development and delivery. It focuses primarily on the value of people in getting the job done effectively.Successful candidates will be awarded the SCRUMstudy Agile Master Certified (SAMC?) certification by SCRUMstudy after passing the included certification exam. The certification exam voucher is included in this course so you can take the exam at your convenience. IntroductionAgile Overview Agile Defined Why Use Agile? Adaptive Project Management The Agile Manifesto Principles of the Agile Manifesto Declaration of Interdependence Difference between Waterfall and Agile Domains of Agile Practices Value-Driven Delivery Stakeholder Engagement Team Performance Practices Adaptive Planning Problem Detection and Resolution Continuous Improvement Agile Tools and Artifacts Lean Kanban Software Development Introduction Core Values Practices Understanding Lean Software Development Understanding Kanban Software Development Scrum Overview of Scrum Brief History of Scrum Why Use Scrum? Scalability of Scrum Scrum Principles Scrum Aspects Scrum Processes Scrum and Kanban Extreme Programming (XP) Introduction Core Values? Roles Practices XP Artifacts XP Events XP Release Adopting XP Test-Driven Development (TDD) Introduction The Process Dynamic Systems Development Methods (DSDM) Introduction Core Values Roles Practices Crystal Introduction Core Values Roles Practices The Process Feature Driven Development (FDD) Introduction Core Values Roles Practices The Process Comparison of Agile MethodsBest Fit Analysis ToolBlitz PlanningNote SCRUMstudy has authored the SBOK? Guide as a comprehensive guide to deliver successful projects using Scrum. SCRUMstudy works through its large global partner network of Authorized Training Providers (A.T.P.s) to deliver trainings and certifications. New Horizons is a proud Authorized Training Provider of SCRUMstudy. Additional course details: Nexus Humans SCRUMstudy Agile Master Certified (SAMC) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SCRUMstudy Agile Master Certified (SAMC) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SCRUMstudy Agile Master Certified (SAMC)
Delivered OnlineFlexible Dates
Price on Enquiry

Advanced SQL Programming (TTSQL005)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an intermediate and beyond level SQL course geared for experienced end users, data scientists, business analysts, application developers and database administrators. Students should have recently attended a basic SQL class or have equivalent experience. Overview This course is approximately 50% hands-on, combining expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment led by our expert practitioner, attendees will learn advanced skills needed to: Advanced Query Techniques Manipulating Table Data Using SQL's Data Manipulation Language (DML) User-Defined Functions Stored Procedures Triggers A company?s success hinges on responsible, accurate database management. Organizations rely on highly available data to complete all sorts of tasks, from creating marketing reports and invoicing customers to setting financial goals. Data professionals like analysts, developers and architects are tasked with creating, optimizing, managing and analyzing data from databases ? with little room for error. When databases aren?t built or maintained correctly, it?s easy to mishandle or lose valuable data. Our SQL Programming and Database Training Series provides students with the skills they require to develop, analyze and maintain data and in correctly structured, modern and secure databases. Next Level SQL explores how to identify and use advanced querying techniques to manipulate and index tables. All hands-on work in this course is ANSI SQL compliant and should work with most SQL databases such as Oracle, SQL Server, MySQL, MS Access, Informix, Sybase, or any other ANSI SQL compliant database. Advanced Query Techniques Join inner outer (Left, Right, Full) Subqueries Simple Correlated Using the Exists Operator Tips for Developing Complex Queries Performing Set Operations Aggregating Results Using Group by Creating Temporary Tables Manipulating Table Data Using SQL's Data Manipulation Language (DML) Inserting Data into Tables Updating Existing Data Deleting Records Truncating Tables Implementing Data Integrity with Transactions Beginning Explicit Transactions Committing Transactions Rolling Back Transactions User-Defined Functions Definition and Benefits of Use CREATE FUNCTION Syntax RETURN Clause and the RETURNS Statement Scalar vs. Table Functions Comparison with Stored Procedures Returning Scalar Values and Tables ALTER and DROP FUNCTION Stored Procedures Definition and Benefits of Use CREATE PROCEDURE Syntax Variables and Parameters Control of Program Flow ALTER and DROP PROCEDURE Implementation Differences Triggers Definition and Benefits of Use Alternatives (e.g., Constraints) CREATE TRIGGER Syntax Trigger Types 'Inserted' (or 'NEW') and 'Deleted' (or 'OLD') Tables Event Handling and Trigger Execution ALTER and DROP TRIGGER Additional course details: Nexus Humans Advanced SQL Programming (TTSQL005) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced SQL Programming (TTSQL005) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Advanced SQL Programming (TTSQL005)
Delivered OnlineFlexible Dates
Price on Enquiry

Intermediate Linux (TTLX2104)

By Nexus Human

Duration 2 Days 12 CPD hours Overview This skills-focused course combines expert instructor-led discussions with practical hands-on labs that emphasize useful, current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, you'll learn about and explore: Review of the File System Introduction to Shells: sh, bash, and ksh Shell Programming Advanced Shell Features Text Manipulation Utilities File Processing Utilities Multitasking and Batch Processing Regular Expressions Intermediate Linux: Shell, Bash, Text Manipulation, Multitasking & More is a two-day course designed to provide you with hands on experience using standard Linux commands and utilities used for day-to-day tasks including file manipulation, program execution and control, and effective use of the shell and desktop environments. Throughout the course you?ll explore key concepts to Linux core functionality, while learning the system's most commonly used commands. You?ll also learn the Bourne shell, Bash shell and Korn shell programming techniques you?ll need to read and modify existing shell scripts, and create your own. Data manipulation utilities and shell syntax for synthesizing command pipelines are also emphasized throughout the course. Review of the File System File System Organization File Types File and Directory Naming Rules and Conventions Commands for Navigating the File System Introduction to Inodes Ownership, Permissions, and Dates Manipulating Files and Links Manipulating Directories Determining Disk Usage Other File System Utilities Introduction to Shells: sh, bash, and ksh Shell Functions I/O Redirection and Pipes Command Separation and Grouping Background Execution Filename Expansion Shell Variables Command Substitution Quoting and Escaping Metacharacters Bash Shell Features Korn Shell Features Command Execution Startup Files Customizing the User Environment Shell Programming Shell Script Features and Capabilities Creating and Running a Script Working With Variables Environment Variables Working With Data Types Formatting Base Conversion Setting Special Attributes Input/Output Techniques Conditional Constructs if/then else/elif Looping Constructs for, while, until Math Operators Advanced Shell Features Manipulating Strings Writing and Calling Functions Controlling Process Priorities Interpreting Command Line Arguments Making Scripts Interactive Special Shell Variables Advanced I/O with Streams Improving Performance of Scripts Text Manipulation Utilities Editing a File from a Script Scripting with ed or sed UNIX and Linux Utilities to Manipulate Files Regular Expressions grep and egrep The Stream Editor sed Sorting in Scripts Generating Reports with awk Splitting Large Files Counting Words, Lines, and Characters Transforming File Contents File Processing Utilities Examining and Comparing Files Reporting Differences Between Files Comparing Files of Any Format Displaying Data in Octal and Hex Compressing Data Converting File Formats Extracting Text Strings Multitasking and Batch Processing Multitasking Scheduled Execution Using cron The at and batch Commands Regular Expressions Regular Expression Overview Regular Expression Implementations Regular Expressions RE Character Classes Regex Quantifiers RE Parenthesis Additional course details: Nexus Humans Intermediate Linux (TTLX2104) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Intermediate Linux (TTLX2104) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Intermediate Linux (TTLX2104)
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Compute Engine

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cloud Solutions Architects, DevOps Engineers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with a focus on Google Compute Engine. Overview Configure VPC networks and virtual machines Administer Identity and Access Management for resources Implement data storage services in GCP Manage and examine billing of GCP resources Monitor resources using Stackdriver services Connect your infrastructure to GCP Configure load balancers and autoscaling for VM instances Automate the deployment of GCP infrastructure services Leverage managed services in GCP This class introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud Platform, with a focus on Compute Engine. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems, and application services. This course also covers deploying practical solutions including securely interconnecting networks, customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring. Introduction to Google Cloud Platform List the different ways of interacting with GCP Use the GCP Console and Cloud Shell Create Cloud Storage buckets Use the GCP Marketplace to deploy solutions Virtual Networks List the VPC objects in GCP Differentiate between the different types of VPC networks Implement VPC networks and firewall rules Design a maintenance server Virtual Machines Recall the CPU and memory options for virtual machines Describe the disk options for virtual machines Explain VM pricing and discounts Use Compute Engine to create and customize VM instances Cloud IAM Describe the Cloud IAM resource hierarchy Explain the different types of IAM roles Recall the different types of IAM members Implement access control for resources using Cloud IAM Storage and Database Services Differentiate between Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Firestore and Cloud Bigtable Choose a data storage service based on your requirements Implement data storage services Resource Management Describe the cloud resource manager hierarchy Recognize how quotas protect GCP customers Use labels to organize resources Explain the behavior of budget alerts in GCP Examine billing data with BigQuery Resource Monitoring Describe the Stackdriver services for monitoring, logging, error reporting, tracing, and debugging Create charts, alerts, and uptime checks for resources with Stackdriver Monitoring Use Stackdriver Debugger to identify and fix errors Interconnecting Networks Recall the GCP interconnect and peering services available to connect your infrastructure to GCP Determine which GCP interconnect or peering service to use in specific circumstances Create and configure VPN gateways Recall when to use Shared VPC and when to use VPC Network Peering Load Balancing and Autoscaling Recall the various load balancing services Determine which GCP load balancer to use in specific circumstances Describe autoscaling behavior Configure load balancers and autoscaling Infrastructure Automation Automate the deployment of GCP services using Deployment Manager or Terraform Outline the GCP Marketplace Managed Services Describe the managed services for data processing in GCP Additional course details: Nexus Humans Architecting with Google Compute Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Compute Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Compute Engine
Delivered OnlineFlexible Dates
Price on Enquiry