• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

4385 PE courses in Cardiff delivered Live Online

Enterprise Linux System Admin 1 Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IT professionals across a broad range of disciplines who need to perform essential Linux administration tasks including installation, establishing network connectivity, managing physical storage, and basic security administration. This course relates to Red Hat Enterprise Linux 7 and is designed for IT pros without previous Linux admin experience. The course focuses on providing students with Linux admin 'survival skills' by focusing on core admin tasks. Access the command line Log in to a Linux system and run simple commands using the shell. Manage files from the command line Copy, move, create, delete, and organize files from the bash shell prompt. Getting help in Red Hat Enterprise Linux Resolve problems by using online help systems and Red Hat support utilities. Create, view, and edit text files Create, view, and edit text files from command output or in an editor Manage local Linux users and groups Manage local Linux users and groups, and administer local password policies. Control access to files with Linux file system permissions Set Linux file system permissions on files and interpret the security effects of different permission settings. Monitor and manage Linux processes Obtain information about the system, and control processes running on it. Control services and daemons Control and monitor network services and system daemons using systemd. Configure and secure OpenSSH service Access and provide access to the command line on remote systems securely using OpenSSH. Analyze and store logs Locate and accurately interpret relevant system log files for troubleshooting purposes. Manage Red Hat Enterprise Linux networking Configure basic IPv4 networking on Red Hat Enterprise Linux systems. Archive and copy files between systems Archive files and copy them from one system to another. Install and update software packages Download, install, update, and manage software packages from Red Hat and yum package repositories. Access Linux file systems Access and inspect existing file systems on a Red Hat Enterprise Linux system. Use virtualized systems Create and use Red Hat Enterprise Linux virtual machines with KVM and libvirt.

Enterprise Linux System Admin 1 Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Securing Databases | Database Security (TT8700)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge. Overview Students who attend Securing Databases will leave the course armed with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. This course introduces students to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Students will learn how to design and implement the layered defenses they will need in defending their own databases. Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms. Security experts agree that the least effective approach to security is 'penetrate and patch'. It is far more effective to 'bake' security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception. Securing Databases Foundation Why Hunt for Security Defects? Fingerprinting Databases Principles of Information Security Database Security Vulnerabilities Database Security Concerns Vulnerabilities Cryptography Overview Database Security Database Security What Next? Secure Development Lifecycle (SDL) SDL Process Overview Taking Action Now Asset Analysis Design Review Making Application Security Real

Securing Databases | Database Security (TT8700)
Delivered OnlineFlexible Dates
Price on Enquiry

HA400 SAP ABAP Programming for SAP HANA

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Primary target audiences for this training are developers and development consultants but also other roles involved with implementing or reviewing program code to optimize ABAP based applications for SAP HANA. This course will prepare students to develop and optimize ABAP applications that access data stored in the SAP HANA Database. Course Outline Technical concepts of SAP HANA Introduction to HANA Studio Introduction to ADT (ABAP Development Tools, also known as ABAP in Eclipse) Tools to detect potential functional and performance issues when migrating to SAP HANA: Code Inspector and ABAP Test Cockpit, ABAP Trace and ABAP Profiler, SQL Trace Tools to prioritize performance issues: SQL Monitor, SQL Performance Tuning Worklist Performance Rules and Guidelines for ABAP in the context of SAP HANA Optimizing ABAP by accessing SAP HANA as a Secondary Database Optimizing ABAP using SAP HANA as Primary Database Using SAP HANA Fuzzy Search in ABAP Enabling input fields for Type-Ahead search. SAP List Viewer (ALV) for SAP HANA Additional course details: Nexus Humans HA400 SAP ABAP Programming for SAP HANA training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the HA400 SAP ABAP Programming for SAP HANA course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

HA400 SAP ABAP Programming for SAP HANA
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Migrating to AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Solutions Architects and Engineers who perform cloud migrations IT Project Managers who are involved in projects related to migrating existing workloads to the AWS Cloud Overview This course is designed to teach you how to: Explain the various cloud migration strategies Assess cloud migration readiness Discover your portfolio and plan for migration Plan and design your application migration strategy Perform and validate application migration to the cloud Optimize your applications and operations after migrating to the cloud Migrating to AWS focuses on planning and migrating existing workloads to the AWS Cloud. The course covers various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization. This course is designed for Solutions Architects and Engineers who perform cloud migrations, have an understanding of core AWS services and design patterns covered in Architecting on AWS. This course is also available to IT project managers involved in the planning of those migrations who have completed AWS Technical Essentials Module 1: Migrating to AWS ? Overview Migration process 'Mental Model' Cloud Migration Strategies Comparing Cloud Migration Strategies Cloud Center of Excellence (CoE) Cloud Migration Readiness Assessment AWS Cloud Migration Process Group activity: Creating a high-level migration plan Module 2: Discovery and analysis Migration Process Roadmap AWS Migration Methodology AWS Application Discovery Service Portfolio Analysis Hands-on lab 1: Performing discovery Module 3: Migration planning and design (part I) AWS Migration Hub Pricing and Availability Process Group activity: Creating a detailed migration plan Module 3: Migration planning and design (continued) Application migration ordering Application prioritization criteria Defining success criteria Migration methodology Designing for migration Module 4: Migration, integration, and validation Migration considerations Data migration AWS Snow Services AWS Data Migration Service (DMS) Server migration Demonstration: Server migration service Hands-on lab 2 : Migrating databases to AWS EC2 Hands-on lab 3 : Migrating databases to Amazon Aurora Module 5: Operations and optimization On premises vs. cloud IT operations Optimizing in the AWS Cloud Case study: Optimizing an application

AWS Migrating to AWS
Delivered OnlineFlexible Dates
Price on Enquiry

55125 Quick SQL Server Analysis Services

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is intended for SQL professionals, Microsoft Analysis Services cube and report developers, and business intelligence professionals. Overview ?Understand common Analysis Services solutions.?Understand version changes of SSAS from 2008-2014.?Understand Analysis Services installation and architecture.?Understand how to choose the right model.?Understand the Analysis Services tools available.?Understand the multidimensional model.?Utilize data sources and data source views.?Create a cube.?Understand and utilize dimensions.?Understand and utilize attributes.?Understand and utilize relationships.?Understand and utilize hierarchies.?Understand and utilize measures and measure groups.?Understand and utilize calculated members.?Understand and utilize perspectives.?Understand and utilize translations.?Browse perspectives and translations.?Understand and utilize deployment options.?Understand and utilize processing strategies.?Understand and utilize security.?Deploy a multidimensional model.?Understand the tabular model.?Create a tabular project.?Analyze the data using Microsoft Excel.?Create and configure calculated measures and calculated fields.?Backup and Restore. This course is intended for IT professionals who are interested in quickly learning how to utilize an Analysis Services multidimensional or tabular solution. Course Overview Introduction Course Materials Facilities Prerequisites What We'll Be Discussing Lab 1: Course Overview Introduction to Microsoft SQL Server Analysis Services Common Analysis Services Solutions Version Changes of SSAS from 2008-2014 Analysis Services Installation and Architecture: One Product, Two Models Choosing the Right Model Analysis Services Tools Lab 1: Introduction to Microsoft SQL Server Analysis Services The Multidimensional Solution Understanding the Multidimensional Model Utilizing Data Sources and Data Source Views Creating a Cube Lab 1: The Multidimensional Solution Dissecting with Dimensions Developing Dimensions Utilizing Attributes Relating with Relationships Handling Hierarchies Lab 1: Dissecting with Dimensions Managing Measures Measures and Measure Groups Calculated Members Lab 1: Managing Measures Configuring Cube Options Understanding Perspectives Utilizing Translations Browsing Perspectives and Translations Lab 1: Configuring Cube Options Deploying Examining Deployment Options Processing Strategies Exploring Security Lab 1: Deploying The Tabular Solution Understanding the Tabular Model Creating a Tabular Project Deploying Browsing the Model Querying the Solution and Understanding DAX Maintaining and Optimizing Lab 1: The Tabular Solution

55125 Quick SQL Server Analysis Services
Delivered OnlineFlexible Dates
Price on Enquiry

Microsoft SharePoint Modern Experience: Site Owner with Power Platform

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for existing Microsoft SharePoint site users who will create and manage SharePoint team or communication sites in SharePoint Online or SharePoint 2019. Overview In this course, you will create a SharePoint team site and a communication site, perform basic content management tasks on SharePoint sites, and configure workflows with Forms and Flow. You will: Create and configure new SharePoint sites. Create and configure document libraries. Create and configure lists. Assign permissions and access rights. Create and configure a communication site. Implement workflows with Forms and Flow. This course will empower you to use Microsoft© SharePoint© online to facilitate collaboration and allow you to use familiar applications and web-based tools to create, access, store, and track documents and data in a central location. Enable and configure SharePoint?s many distinct features and discover the many content structures that can be selected, added, and configured. Learn how to create, configure, and manage SharePoint sites so that your team or organization can share information and collaborate effectively.SharePoint content structures and configuration options are complex. As a site owner, it is critical that you understand what features, options, and content structures are available in SharePoint online, and how to properly configure them. With SharePoint sites, features, and content structures properly implemented, you will be able to securely share files, collaborate on documents, and access the information you need to work with your colleagues more effectively. Creating and Configuring a New Site Topic A: Create a Site in SharePoint Topic B: Configure Site Look and Layout Creating and Configuring Document Libraries Topic A: Create Document Libraries Topic B: Configure File Versioning and Checkout Topic C: Configure Content Approval Creating and Configuring Lists Topic A: Add List Apps to a Site Topic B: Create Custom Lists Topic C: Create Calculated and Validated Columns Assigning Permissions and Access Rights Topic A: Secure Sites with Permissions Topic B: Secure Apps, Documents, and Files Creating and Configuring a Communication Site Topic A: Create a Communication Site Topic B: Configure a Communication Site Implementing Workflows with Forms and Flow Topic A: Capture Data with Forms Topic B: Store Form Data in SharePoint with Flow Topic C: Automate Business Processes with Forms, Flow, and SharePoint

Microsoft SharePoint Modern Experience: Site Owner with Power Platform
Delivered OnlineFlexible Dates
Price on Enquiry

SUSE Linux Enterprise Server 15 Administration

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for those who have little or no experience with Linux and whoare seeking a fundamental understanding of the SUSE Linux Enterprise 15 operatingsystem. It is also ideal for those who want to begin preparing for the SUSE CertifiedAdministrator in Enterprise Linux 15 certification exam. Overview Attendees will be taught the following concepts and skills that are fundamental inadministering the SLES Operating System:Install SLES 15 and perform basic Linux configurationBecome familiar with the command line interface & commonly usedcommandsConfigure and use Remote AdministrationManage the boot process and understand systemsManage processes and jobsManage users and permissionsManage softwareConfigure basic networkingManage storageMonitor SUSE Linux Enterprise This course is designed for those who are seeking a fundamental understanding of the SUSE Linux Enterprise Server (SLES) operating system.Students will be able to install and configure a SLES 15 server and integrate it into an existing network. They will be able to perform the most important system administration tasks. Overview of SUSE Linux Enterprise Flavors of SUSE Linux SLE Maintenance Model YaST The Linux Filesystem Understand the Filesystem Hierarchy Standard (FHS) Understand the Linux File Types Work with the Command Line Getting Help at the Command Line Understand the Shell Environment The Vim EditorRemote Administration Understand Remote Administration with OpenSSH Understand Remote Administration with VNC System Initialization Understand the Boot Process Understand the GRUB2 Boot Loader Define and Describe systems Process Management Understand Process Administration Understand Background Processes Understand Process Scheduling Understand xinet Identify and Security Understand User Management Understand Filesystem Permissions Understand Privilege Delegation Software Management Understand Compiling Software from Source Understand Management of RPM Packages Understand Software Management with Libzypp Network Management Understand Network Management in SLE Understand Network Management with Wicked Understand firewall Storage Management Understand the Linux I/O Stack Recognize Traditional Linux File Systems Configure Logical Volume Management (LVM) Configure Software RAID Define and Describe BtrFS Understand NFSv4 Administration and Monitoring Understand Time Sync with chrony Configure System Logging Understand Supportconfig Installing SUSE Linux Enterprise Understand the Unified Installer Understand Extensions and Modules Understand AutoYaST

SUSE Linux Enterprise Server 15 Administration
Delivered OnlineFlexible Dates
Price on Enquiry

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Security professionals. This module is intended for everyone who is involved in the implementation, evaluation and reporting of an information security program, such as an Information Security Manager (ISM), Information Security Officer (ISO) or a Line Manager, Process Manager or Project Manager with security responsibilities. Basic knowledge of Information Security is recommended, for instance through the EXIN Information Security Foundation based on ISO/IEC 27001 certification. Overview The module Information Security Management Professional based on ISO/IEC 27001 (ISMP.EN) tests understanding of the organizational and managerial aspects of information security.The subjects of this module are: Information security perspectives: business, customer, service provider/supplier Risk Management: analysis, controls, remaining risks Information security controls: organizational, technical, physical. Information security is the preservation of confidentiality, integrity and availability of information (ISO/IEC 27000 definition). Information security is gaining importance in the Information Technology (IT) world. Globalization of the economy is leading to an ever-increasing exchange of information between organizations (their staff, customers and suppliers) and an explosion in the use of networked computers and computing devices. The core activities of many companies completely rely on IT. Enterprise resource planning (ERP) management systems, the control systems that govern how a building runs or a manufacturing machine functions, day-to-day communications - everything - runs on computers. The vast majority of information - the most valuable commodity in the world - passes through IT. Information is crucial for the continuity and proper functioning of both individual organizations and the economies they fuel; this information must be protected against access by unauthorized people, protected against accidental or malicious modification or destruction and must be available when it is needed. Companies and individual users of technology are also beginning to understand how important security is and are beginning to make choices based on the security of the technology or service. Information Security Perspectives The candidate understands the business interest of information security The canidate understands the customer perspective on governance The candidate understands the supplierïs responsibilities in security assurance Risk Mangement The candidate understands the principles of risk management The candidate knows how to control risks The candidate knows how to deal with remaining risks Information Security Controls The candidate has knowledge of organizational controls The candidate has knowledge of technical controls The candidate has knowledge of physical, employment-related and continuity controls

EXIN Information Security Foundation based on ISO/IEC 27001 - Professional
Delivered OnlineFlexible Dates
Price on Enquiry

Cloudera Training for Apache HBase

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for developers and administrators who intend to use HBase. Overview Skills learned on the course include:The use cases and usage occasions for HBase, Hadoop, and RDBMSUsing the HBase shell to directly manipulate HBase tablesDesigning optimal HBase schemas for efficient data storage and recoveryHow to connect to HBase using the Java API, configure the HBase cluster, and administer an HBase clusterBest practices for identifying and resolving performance bottlenecks Cloudera University?s four-day training course for Apache HBase enables participants to store and access massive quantities of multi-structured data and perform hundreds of thousands of operations per second. Introduction to Hadoop & HBase What Is Big Data? Introducing Hadoop Hadoop Components What Is HBase? Why Use HBase? Strengths of HBase HBase in Production Weaknesses of HBase HBase Tables HBase Concepts HBase Table Fundamentals Thinking About Table Design The HBase Shell Creating Tables with the HBase Shell Working with Tables Working with Table Data HBase Architecture Fundamentals HBase Regions HBase Cluster Architecture HBase and HDFS Data Locality HBase Schema Design General Design Considerations Application-Centric Design Designing HBase Row Keys Other HBase Table Features Basic Data Access with the HBase API Options to Access HBase Data Creating and Deleting HBase Tables Retrieving Data with Get Retrieving Data with Scan Inserting and Updating Data Deleting Data More Advanced HBase API Features Filtering Scans Best Practices HBase Coprocessors HBase on the Cluster How HBase Uses HDFS Compactions and Splits HBase Reads & Writes How HBase Writes Data How HBase Reads Data Block Caches for Reading HBase Performance Tuning Column Family Considerations Schema Design Considerations Configuring for Caching Dealing with Time Series and Sequential Data Pre-Splitting Regions HBase Administration and Cluster Management HBase Daemons ZooKeeper Considerations HBase High Availability Using the HBase Balancer Fixing Tables with hbck HBase Security HBase Replication & Backup HBase Replication HBase Backup MapReduce and HBase Clusters Using Hive & Impala with HBase Using Hive and Impala with HBase Appendix A: Accessing Data with Python and Thrift Thrift Usage Working with Tables Getting and Putting Data Scanning Data Deleting Data Counters Filters Appendix B: OpenTSDB

Cloudera Training for Apache HBase
Delivered OnlineFlexible Dates
Price on Enquiry

Oracle Database: Backup and Recovery Workshop

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Oracle Database Administrator Data Warehouse Administrator Support Engineer Technical Consultant Technical Administrator Overview The student benefits by gaining a deeper understanding of possibly the most important job of a DBA - backup and recovery. The concepts and architecture that support backup and recovery, along with implementation steps in various ways and situations, are presented in detail. Students gain knowledge of the Recovery Manager (RMAN) command-line interface for various backup, failure, restore, and recovery scenarios, including data duplication. The student begins by gaining a deeper understanding of possibly the most important job of a DBA - backup and recovery. The concepts and architecture that support backup and recovery, along with implementation in various ways and situations are covered in detail. Students gain knowledge of the Recovery Manager (RMAN) command-line interface for various backup, failure, restore, and recovery scenarios, including data duplication. Introduction and Configuration Introduction Getting Started Configuring for Recoverablility Using the RMAN Recovery Catalog Backup Backup Strategies and Terminology Performing Backups Improving Your Backups Using RMAN-Encrypted Backups Recovery Diagnosing Failures Restore and Recovery Concepts Performing Complete Recovery Performing Point-in-Time Recovery Performing Additional Recovery Operations Additional Technologies Using Flashback Technologies Using Flashback Database Transporting Data Duplicating a Database RMAN Troubleshooting and Tuning Hands-On Backup and Recovery Workshop Additional course details: Nexus Humans Oracle Database: Backup and Recovery Workshop training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle Database: Backup and Recovery Workshop course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle Database: Backup and Recovery Workshop
Delivered OnlineFlexible Dates
Price on Enquiry