Overview Virtual Assistant Course is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Virtual Assistant Course and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 05 Hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Module 01: Introduction to Virtual Assistant Introduction to Virtual Assistant 00:16:00 Module 02: Different Types of Virtual Assistants Different Types of Virtual Assistants 00:24:00 Module 03: Be a Virtual Assistant Be a Virtual Assistant 00:12:00 Module 04: Must-Have Skills for Virtual Assistants Must Have Skills for Virtual Assistants 00:22:00 Module 05:Essential Tools for a Virtual Assistant Essential Tools for a Virtual Assistant 00:10:00 Module 06: Finding Your Niche Finding Your Niche 00:12:00 Module 07: Get Hired for VA Jobs Get Hired for VA Jobs 00:20:00 Module 08: How to Set VA Business How to Set VA Business 00:16:00 Module 09: Admin Support- a Vital Part of VA Admin Support a Vital Part of VA 00:14:00 Module 10: How to Manage Clients How to Manage Clients 00:10:00 Module 11: Working with a Virtual Team Working with a Virtual Team 00:12:00 Module 12: Data Security Measures Data Security Measures 00:20:00 Assignment Assignment - Virtual Assistant 00:00:00
Learn everything you need to know to be fully competent with Mac iOS. This syllabus takes you around the basics and then on another deep dive into all the elements. Discover things you never knew and speed up your experience using Mac iOS. Module 1: Introduction to Mac iOS and Hardware • Understanding the Mac ecosystem • Overview of Mac hardware components • Navigating the Mac interface Module 2: Mac Operating System (macOS) • Exploring the macOS interface • Customizing system preferences • File management and organization on macOS Module 3: Essential Mac Apps • Using Safari for web browsing • Effective web searching using search engines • Email management with Apple Mail • Calendar and task management with Apple Calendar Module 4: Software Installation and Updates • Installing and updating software applications • Managing and uninstalling programs • App Store and app installations Module 5: Productivity and Collaboration • Using iCloud for cloud-based storage and collaboration • Working with Notes, Reminders, and Messages • Collaborative document editing with iWork Module 6: Multimedia and Creativity • Basic image editing with Photos and Preview • Music creation with GarageBand • Creating multimedia presentations with Keynote Module 7: Troubleshooting and Maintenance • Identifying and resolving common Mac issues • Using Activity Monitor for performance monitoring • Maintenance tasks for macOS Module 8: Mac Security and Privacy • Overview of Mac security features • Online safety and privacy best practices • Protecting personal data and devices Module 9: Advanced Mac Features • Customizing the Dock and Menu Bar • Using Siri for voice commands and search • Continuity features for seamless device integration Module 10: Using AI and Chat GPT • Introduction to AI and Chat GPT technology • Exploring AI-powered features on Mac • Using Chat GPT for productivity and assistance Module 11: Browsing and Search Engines • Effective use of web browsers on macOS • Utilizing search engines for research • Online safety and privacy while browsing Module 12: Cybersecurity • Understanding cybersecurity threats • Protecting against malware and phishing attacks • Secure online practices and password management Module 13: Software Installation and Factory Reset • Installing and updating software applications • Factory resetting a Mac device • Data backup and recovery during resets Module 14: Final Projects and Assessment • Culminating projects showcasing Mac iOS skills • Practical exams assessing Mac software knowledge and skills • Preparing for industry-recognized certifications (optional) Please note that the duration and depth of each module can vary depending on the level of expertise required and the specific needs of the learners. Additionally, it's important to adapt the curriculum to the learners' proficiency levels, whether they are A Level/GCSE students or adult learners with different experience levels.
Course Information Join our comprehensive three-day programme designed as an invaluable external training opportunity for auditors, audit programme managers, and individuals subject to audits. This course is tailored to foster a deep understanding and cultivate essential skills for auditing the validation of computer systems intended for GxP environments (GLP, GCP, GMP, GDP, GPvP). Commencing with an overview of regulatory prerequisites and the system life cycle, the course swiftly transitions to focus on the pragmatic aspects of auditing computer system validation. Experience a blend of presentations, interactive discussions, and immersive practical workshops throughout the duration of the course. Delegates will benefit from practical examples of how to understand the framework of applicable regulations and guidance. Apply risk management techniques to audit planning Plan and conduct computerised system audits Assess system validation documentation to verify compliance Evaluate data integrity and security issues Prepare for regulatory inspection. The course is structured to encourage delegates to: Discuss and develop ideas Solve specific problems Understand the vulnerabilities of computerised systems Learn how to create a compliance checklist Link system development with good business practice. Is this course for you? Auditors Audit programme managers Individuals subject to audits. Tutors Tutors will be comprised of (click the photos for biographies): Nichola Stevens Director and Principal Consultant, Nuncius Compliance Solutions Ltd Barry McManus Consultancy Partner, Empowerment Quality Engineering Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome and Introductions 09:45 Why We Validate and Regulatory Trends 10:30 Break 10:45 Audit Overview, High Level Process and Scheduling 11:30 System Lifecycle 12:30 Lunch 13:15 Exercise 1 - Audit Scheduling 14:45 Exercise 1 - Feedback 15:15 Break 15:30 Validation Deliverables 16:30 Risk Assessments 17:30 Close of Day 1 Day 2 09:00 Supplier Assessment 10:30 Break 10:45 Exercise 2 - Planning a Supplier Audit 12:00 Exercise 2 - Feedback 12:30 Lunch 13:15 Exercise 3 - Auditing a Computerised System Validation Package 15:30 Break 15:45 Exercise 3 - Feedback 16:30 Change Control 17:15 Close of Day Day 3 09:00 Infrastructure Qualification 09:45 Maintaining a Validated State - Operational Processes 11:00 Break 11:15 Exercise 4 - Auditing Systems in Operational Use 12:45 Lunch 13:30 Exercise 4 - Feedback 14:15 Exercise 5 - Auditing Trail Review 15:30 Break 15:45 Exercise 5 - Feedback 16:15 Course Objectives Summary and Any Additional Questions 16:45 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 19 Points Development Level Develop
Description: The 70-697 - Configuring Windows Devices course teaches you how to configure Windows devices. Throughout the course, you will learn about the new features of Windows 10 and how to deploy it. You will be introduced to the basic introduction to Client Hyper-V, and learn about creating virtual machines and managing virtual machine storage and snapshots. The course will teach you the system of configuring device settings by configuration tools, common configuration options, managing user accounts, using control panel, using Windows administrative tools, and using Windows PowerShell. You will learn how to connect Windows 10 to networks, how to share data and printers, and how to manage apps. You will also learn about the techniques of securing Windows 10 devices, monitoring and maintaining Windows 10, managing users in the enterprise, managing desktops and applications in the enterprise, and managing devices in the enterprise. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? 70-697 - Configuring Windows Devices is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our 70-697 - Configuring Windows Devices is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. What's New in Windows 10 What Makes Windows 10 Different? FREE 00:14:00 Primary Feature Overview 00:14:00 Navigating and Using Windows 10 00:34:00 Windows 10 Deployment Standard Windows 10 Deployment 01:11:00 Enterprise Deployment Strategies 00:52:00 Deploying Virtual Windows 10 Desktops Introduction to Client Hyper-V 00:12:00 Creating Virtual Machines 00:15:00 Managing Virtual Machine Storage and Snapshots 00:09:00 Configuring Device Settings Overview of Configuration Tools 00:14:00 Common Configuration Options 00:17:00 Managing User Accounts 00:20:00 Using Control Panel 00:10:00 Using Windows Administrative Tools 00:28:00 Using Windows PowerShell 00:41:00 Connecting Windows 10 to Networks TCPIP Network Connectivity 00:40:00 Name Resolution 00:10:00 Wireless Connectivity 00:21:00 Remote Access Overview 00:18:00 Troubleshooting Connectivity 00:20:00 Sharing Data and Printers Managing Hard Disks 00:37:00 Managing Storage Spaces 00:06:00 Overview of Data Access 00:09:00 Configuring and Managing File Access 00:24:00 Managing Shared Folders 00:12:00 Understanding Work Folders 00:05:00 Managing Printers 00:12:00 Managing Apps Installing and Configuring Applications 00:08:00 Managing Apps From the Windows Store 00:05:00 Managing Web Browsers 00:19:00 Securing Windows 10 Devices Security Overview 00:11:00 Configuring Local Security 00:20:00 Securing Network Communications 00:31:00 Configuring Data Security 00:25:00 Monitoring and Maintaining Windows 10 Working with Updates 00:08:00 Monitoring and Optimizing 00:35:00 Managing Devices and Drivers 00:14:00 Recovering Files and Devices 00:19:00 Managing Users in the Enterprise Managing User Profiles 00:20:00 User State Virtualization 00:09:00 User Profile Migration 00:11:00 Managing Desktops and Applications in the Enterprise Using Group Policy to Manage Windows 10 Devices 00:44:00 Using Group Policy to Manage Applications 00:18:00 Managing Devices in the Enterprise The Enterprise Mobility Suite 00:27:00 Managing Desktops and Mobile Clients 00:07:00 Managing Updates and Endpoint Protection 00:04:00 Managing Applications 00:03:00 Mock Exam Mock Exam- 70-697 - Configuring Windows Devices 00:20:00 Final Exam Final Exam- 70-697 - Configuring Windows Devices 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 3 Days 18 CPD hours This course is intended for This class is intended for the following participants: Cloud architects, administrators, and SysOps/DevOps personnel Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with the Google Cloud Platform. Overview This course teaches participants the following skills: Understand how software containers work Understand the architecture of Kubernetes Understand the architecture of Google Cloud Platform Understand how pod networking works in Kubernetes Engine Create and manage Kubernetes Engine clusters using the GCP Console and gcloud/ kubectl commands Launch, roll back and expose jobs in Kubernetes Manage access control using Kubernetes RBAC and Google Cloud IAM Managing pod security policies and network policies Using Secrets and ConfigMaps to isolate security credentials and configuration artifacts Understand GCP choices for managed storage services Monitor applications running in Kubernetes Engine This class introduces participants to deploying and managing containerized applications on Google Kubernetes Engine (GKE) and the other services provided by Google Cloud Platform. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as pods, containers, deployments, and services; as well as networks and application services. This course also covers deploying practical solutions including security and access management, resource management, and resource monitoring. Introduction to Google Cloud Platform Use the Google Cloud Platform Console Use Cloud Shell Define cloud computing Identify GCPs compute services Understand regions and zones Understand the cloud resource hierarchy Administer your GCP resources Containers and Kubernetes in GCP Create a container using Cloud Build Store a container in Container Registry Understand the relationship between Kubernetes and Google Kubernetes Engine (GKE) Understand how to choose among GCP compute platforms Kubernetes Architecture Understand the architecture of Kubernetes: pods, namespaces Understand the control-plane components of Kubernetes Create container images using Google Cloud Build Store container images in Google Container Registry Create a Kubernetes Engine cluster Kubernetes Operations Work with the kubectl command Inspect the cluster and Pods View a Pods console output Sign in to a Pod interactively Deployments, Jobs, and Scaling Create and use Deployments Create and run Jobs and CronJobs Scale clusters manually and automatically Configure Node and Pod affinity Get software into your cluster with Helm charts and Kubernetes Marketplace GKE Networking Create Services to expose applications that are running within Pods Use load balancers to expose Services to external clients Create Ingress resources for HTTP(S) load balancing Leverage container-native load balancing to improve Pod load balancing Define Kubernetes network policies to allow and block traffic to pods Persistent Data and Storage Use Secrets to isolate security credentials Use ConfigMaps to isolate configuration artifacts Push out and roll back updates to Secrets and ConfigMaps Configure Persistent Storage Volumes for Kubernetes Pods Use StatefulSets to ensure that claims on persistent storage volumes persist across restarts Access Control and Security in Kubernetes and Kubernetes Engine Understand Kubernetes authentication and authorization Define Kubernetes RBAC roles and role bindings for accessing resources in namespaces Define Kubernetes RBAC cluster roles and cluster role bindings for accessing cluster-scoped resources Define Kubernetes pod security policies Understand the structure of GCP IAM Define IAM roles and policies for Kubernetes Engine cluster administration Logging and Monitoring Use Stackdriver to monitor and manage availability and performance Locate and inspect Kubernetes logs Create probes for wellness checks on live applications Using GCP Managed Storage Services from Kubernetes Applications Understand pros and cons for using a managed storage service versus self-managed containerized storage Enable applications running in GKE to access GCP storage services Understand use cases for Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Bigtable, Cloud Firestore, and Bigquery from within a Kubernetes application
ð± Unlock Your Potential with Our Agriculture Course! Are you ready to cultivate a brighter future in the world of agriculture? Dive into the vast expanse of possibilities with our comprehensive Agriculture course! ð Why Choose Our Agriculture Course? ð©âð¾ Grow Your Knowledge: From soil management to crop production techniques, our course covers all aspects of modern agriculture, providing you with a solid foundation to thrive in this dynamic field. ð Stay Ahead of the Curve: In today's rapidly evolving agricultural landscape, staying updated with the latest trends and technologies is crucial. Our course ensures you're equipped with the most current practices to excel in your endeavors. ð¡ Hands-On Learning: Theory is essential, but practical experience is invaluable. That's why our course integrates hands-on learning opportunities, allowing you to apply theoretical concepts in real-world scenarios, enhancing your understanding and skill set. ð Make a Difference: Agriculture plays a vital role in feeding the world's growing population and addressing global food security challenges. By enrolling in our course, you'll be part of a movement driving sustainable agricultural practices and making a positive impact on society and the environment. ð Expert Guidance: Learn from seasoned professionals and industry experts who bring years of experience and insights to the table. Benefit from their mentorship as you navigate through the complexities of agriculture and carve out your path to success. Who is this for? ð¨âð¾ Aspiring Farmers: Whether you dream of managing your own farm or joining an established agricultural enterprise, this course provides the knowledge and skills you need to kickstart your journey in farming. ð©âð¬ Agricultural Scientists: If you're passionate about research and innovation in agriculture, our course offers a solid grounding in scientific principles and methodologies, empowering you to contribute to groundbreaking discoveries and advancements in the field. ð± Agribusiness Entrepreneurs: For those looking to venture into agribusiness, understanding the intricacies of agriculture is essential for making informed decisions and maximizing profitability. Our course equips you with the business acumen and industry insights necessary to thrive in the competitive agribusiness landscape. ð©âð Students and Educators: Whether you're pursuing a career in agriculture or teaching the next generation of agricultural professionals, our course provides valuable resources and knowledge to support your academic and career aspirations. Career Path ð Farm Manager: Take the helm of agricultural operations, overseeing day-to-day activities, managing resources, and optimizing productivity to ensure the success of the farm. ð¾ Crop Consultant: Offer expert advice to farmers on crop selection, planting techniques, pest management, and other aspects of crop production to maximize yields and profitability. ð± Sustainability Specialist: Champion sustainable farming practices, promoting environmental stewardship and resource conservation to create a more resilient and eco-friendly agricultural ecosystem. ð¬ Research Scientist: Conduct groundbreaking research in agricultural science, exploring innovative solutions to enhance crop productivity, mitigate climate change impacts, and address global food security challenges. ð Agribusiness Manager: Lead strategic initiatives in agribusiness, from market analysis and supply chain management to sales and marketing, driving growth and profitability in agricultural enterprises. Embark on your journey to success in agriculture today! Enroll in our Agriculture course and unlock a world of opportunities in this thriving industry. ð±ð FAQ (Frequently Asked Questions) - Agriculture Course Q1: What is Agriculture? Agriculture is the practice of cultivating crops, raising animals, and other activities involved in the production of food, fiber, and other products used to sustain human life. It encompasses various practices such as crop cultivation, animal husbandry, forestry, and aquaculture. Agriculture plays a crucial role in providing food security, supporting livelihoods, and contributing to economic development globally. Q2: What are the key principles of sustainable agriculture? Sustainable agriculture aims to meet current food production needs without compromising the ability of future generations to meet their own needs. Key principles of sustainable agriculture include soil health management, water conservation, biodiversity preservation, integrated pest management, and promoting efficient resource use. It emphasizes environmentally friendly practices that promote resilience, minimize negative impacts on ecosystems, and ensure the long-term viability of agricultural systems. Q3: What are the major challenges facing modern agriculture? Modern agriculture faces various challenges, including climate change, soil degradation, water scarcity, pest and disease outbreaks, and socio-economic disparities. Climate change disrupts weather patterns, leading to more frequent extreme weather events such as droughts and floods, which affect crop yields and livestock production. Soil degradation reduces fertility and threatens agricultural productivity, while water scarcity limits irrigation and threatens crop survival. Pests and diseases can devastate crops if not managed effectively, and socio-economic disparities impact access to resources and markets for smallholder farmers. Q4: How can technology improve agricultural productivity? Technology plays a vital role in enhancing agricultural productivity and efficiency. Innovations such as precision farming, genetically modified crops, drones, and remote sensing technologies help farmers monitor crops, optimize inputs, and manage resources more effectively. Machinery and equipment such as tractors, harvesters, and irrigation systems streamline farming operations, saving time and labor. Information and communication technologies provide farmers with access to market information, weather forecasts, and agricultural extension services, enabling them to make informed decisions and improve their yields. Q5: What career opportunities are available in the field of agriculture? The field of agriculture offers diverse career opportunities across various sectors, including farming, agribusiness, research and development, extension services, education, policy-making, and conservation. Career options include agronomist, agricultural engineer, livestock specialist, farm manager, agricultural economist, food scientist, extension officer, environmental consultant, and policy analyst. With the growing demand for sustainable food production and innovation in agriculture, there is a need for skilled professionals to address the challenges and opportunities in the agricultural sector. Course Curriculum Module 1 Introduction to Agriculture Introduction to Agriculture 00:00 Module 2 Soil Management Soil Management 00:00 Module 3 Sustainable Agriculture Practices Sustainable Agriculture Practices 00:00 Module 4 Marketing and Business Management in Agriculture Marketing and Business Management in Agriculture 00:00 Module 5 Agricultural Technology Agricultural Technology 00:00
Duration 3 Days 18 CPD hours This course is intended for This course is designed for security analysts, security technical architects, offense managers, network administrators, and system administrators using QRadar SIEM. Overview After completing this course, you should be able to perform the following tasks: Describe how QRadar collects data to detect suspicious activities Describe the QRadar architecture and data flows Navigate the user interface Define log sources, protocols, and event details Discover how QRadar collects and analyzes network flow information Describe the QRadar Custom Rule Engine Utilize the Use Case Manager app Discover and manage asset information Learn about a variety of QRadar apps, content extensions, and the App Framework Analyze offenses by using the QRadar UI and the Analyst Workflow app Search, filter, group, and analyze security data Use AQL for advanced searches Use QRadar to create customized reports Explore aggregated data management Define sophisticated reporting using Pulse Dashboards Discover QRadar administrative tasks IBM Security QRadar enables deep visibility into network, endpoint, user, and application activity. It provides collection, normalization, correlation, and secure storage of events, flows, assets, and vulnerabilities. Suspected attacks and policy breaches are highlighted as offenses. In this course, you learn about the solution architecture, how to navigate the user interface, and how to investigate offenses. You search and analyze the information from which QRadar concluded a suspicious activity. Hands-on exercises reinforce the skills learned. Course Outline Unit 0: IBM Security QRadar 7.4 - Fundamentals Unit 1: QRadar Architecture Unit 2: QRadar UI - Overview Unit 3: QRadar - Log Source Unit 4: QRadar flows and QRadar Network Insights Unit 5: QRadar Custom Rule Engine (CRE) Unit 6: QRadar Use Case Manager app Unit 7: QRadar - Assets Unit 8: QRadar extensions Unit 9: Working with Offenses Unit 10: QRadar - Search, filtering, and AQL Unit 11: QRadar - Reporting and Dashboards Unit 12: QRadar - Admin Console Additional course details: Nexus Humans BQ104 IBM QRadar SIEM Foundations training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the BQ104 IBM QRadar SIEM Foundations course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate level course for students that will perform Database Administration tasks, who plan, implement, and maintain D22 11.1 databases. Overview These skills can be developed by taking: DB2 SQL Workshop DB2 Fundamentals This course teaches database administrators to perform basic database administrative tasks using Db2 11.1. These tasks include creating database objects like tables, indexes and views, and loading data into the database with Db2 utilities like LOAD and INGEST. Various diagnostic methods will be presented, including using db2pd command options, and monitoring with SQL statements that reference Db2 monitor functions. Students will learn how to implement automatic archival for database logs and how to recover a database to a specific point in time using the archived logs. The course covers using EXPLAIN tools to review the access plans for SQL statements and adding indexes to improve SQL performance. We will cover the locking performed by Db2 and the effect the application isolation level has on locking and lock wait conditions. Students will learn how to implement database security, including adding a security administrator, SECADM user, and implement database roles to simplify security management. We will also describe implementing Db2 native encryption for a database. Overview of Db2 11.1Db2 Command Line Processor (CLP) and GUI toolsThe Db2 database manager instanceCreating Databases and Data PlacementCreating Database ObjectsMoving DataBackup and RecoveryDatabase Maintenance, Monitoring and Problem DeterminationLocking and concurrencySecurity
Duration 2 Days 12 CPD hours This course is intended for Application developers who want to increase their understanding of Spring and Spring Boot and a focus on fundamentals. Overview By the end of the course, you should be able to meet the following objectives: Describe the benefits provided by Spring Boot Initialize a project using Spring Boot Starters Leverage Spring Boot's auto configuration features Create simplified backing-store solutions using Spring Data JPA Build a simple MVC application using Spring Boot, embedded Web Server and fat JARs or classic WARs Build a RESTful Web application Use Spring Security to secure Web and REST endpoints Enable and extend metrics and monitoring capabilities using Spring Boot actuator Leverage advance configuration capabilities Utilize Spring Boot enhancements to testing This course offers experience with Spring Boot and its major features, including auto-configuration, Actuator, Spring Boot testing framework and more. On completion, participants will have a foundation for creating enterprise and cloudready applications. Please note that this course is a subset of the material in our 4-day Spring: Core Training course - there is no need to take both courses. This course is recommended if you have a good working knowledge of Spring Basics (see Prerequisites) but are new to Spring Boot. Introduction to Spring Essentials Why Spring Configuration using Spring Bean creation Data Management Spring Boot Introduction Introduction to Spring Boot Features Value Proposition of Spring Boot Creating a simple Boot application using Spring Initializer website Spring Boot Dependencies, Auto-configuration, and Runtime Dependency management using Spring Boot starters How auto-configuration works Configuration properties Overriding auto-configuration Using CommandLineRunner JPA with Spring and Spring Data Quick introduction to ORM with JPA Benefits of using Spring with JPA JPA configuration in Spring Configuring Spring JPA using Spring Boot Spring Data JPA dynamic repositories Spring MVC Architecture and Overview Introduction to Spring MVC and request processing Controller method signatures Using @Controller, @RestController and @GetMapping annotations Configuring Spring MVC with Spring Boot Spring Boot packaging options, JAR or WAR Rest with Spring MVC An introduction to the REST architectural style Controlling HTTP response codes with @ResponseStatus Implementing REST with Spring MVC, @RequestMapping, @RequestBody and @ResponseBody Spring MVC?s HttpMessageConverters and automatic content negotiation Spring Security What problems does Spring Security solve? Configuring authentication Implementing authorization by intercepting URLs Authorization at the Java method level Understanding the Spring Security filter chain Spring security testing Actuators, Metrics and Health Indicators Exposing Spring Boot Actuator endpoints Custom Metrics Health Indicators Creating custom Health Indicators External monitoring systems Spring Boot Testing Enhancements Spring Boot testing overview Integration testing using @SpringBootTest Web slice testing with MockMvc framework Slices to test different layers of the application