• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2987 Software Development courses delivered Online

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration

By Nexus Human

Duration 5 Days 30 CPD hours Overview How to implement advanced administration concepts such as backups, disaster recovery, scalability and redundancy for a Citrix Virtual Apps and Desktop 7 Site. Advanced troubleshooting techniques to troubleshoot Citrix Virtual Apps and Desktop 7. Security considerations and configurations for Citrix Apps and Desktop 7 site including multi-site management using zones. Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, this course builds on the foundational implementation and management skills introducing scalability, redundancy, and security configurations. You will learn to build to implement Workspace Environment Management to improve logon times, centralize user settings management, and optimize the performance of machines. In the advanced troubleshooting section, you will learn techniques to investigate many of the common issues that can affect environment health and how to solve issues more effectively. You will leave this course with a good understanding of how to manage more complex solutions such as multi-location environments with configurations around StoreFront, the Delivery Controllers, Cloud Connectors, and HDX. Module 1: Introduction to Citrix Virtual Apps and Desktops 7 Advanced Configuration Citrix Virtual Apps and Desktops Deployments - Advanced Configuration Module 2: Planning: Redundancy and Scalability Citrix Virtual Apps and Desktops Redundancy and Scalability StoreFront and Citrix Gateway Redundancy and Scalability Site Infrastructure Redundancy and Scalability Machines Running the Virtual Delivery Agent Module 3: Planning: Virtual Apps and Desktops Environment with Multiple Locations Zones VDA Registration in a Multi-Zone Environment Zone Preference Optimal Gateway Routing and Zones StoreFront Resource Aggregation Managing StoreFront Store Subscriptions in a Multi-Location Environment Module 4: Planning: Backups and Disaster Recovery Backups Disaster Recovery Considerations Disaster Recovery Process Module 5: Planning: Advanced Authentication Methods Multi-factor Authentication - RADIUS and One Time Passwords (OTP) Multi-factor Authentication ? Smart Card Authentication Federated Authentication Module 6: Planning: App and Data Security Introduction to Application Security Preventing Jailbreak Attacks Minimizing the Impact of Attacks Module 7: Planning: Virtual Delivery Agent Security Transport Layer Security (TLS) Virtual Delivery Agent (VDA) Encryption Microsoft Group Policy Objects (GPOs) and Citrix Policies Image Management Module 8: Introduction to Troubleshooting Troubleshooting Methodology Resource Tools and Utilities Introduction to PowerShell Module 9: Troubleshoot Access Issues Troubleshooting StoreFront Citrix ADC and Citrix Gateway ? Workflow and Troubleshooting Overview Citrix ADC and Citrix Gateway - Troubleshooting Access and Authentication Citrix ADC and Citrix Gateway - Troubleshooting App/Desktop Launch Module 10: Troubleshoot Delivery Controller Issues Validating FlexCast Management Architecture (FMA) Services Module 11: Troubleshoot Virtual Delivery Agent (VDA) Registration Issues Troubleshooting Virtual Delivery Agent (VDA) Registration Module 12: Troubleshoot HDX Connection Issues Troubleshooting HDX Connections Module 13: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 14: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 15: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 16: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 17: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 18: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 19: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 20: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 21: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 22: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 23: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 24: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CWS-322 Citrix Virtual Apps and Desktops 7 Advanced Configuration and WEM Administration
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced security administrators and security analysts who are already familiar with VMware Carbon Black Cloud Overview By the end of the course, you should be able to meet the following objectives: Describe and determine use cases for integrating with VMware Carbon Black Cloud Configure, automate, and troubleshoot the VMware Carbon Black Cloud Syslog Integration Use VMware Carbon Black Cloud APIs to pull data with Postman Install and use the VMware Carbon Black Cloud Python SDK Automate operations using the VMware Carbon Black Cloud SDK and APIs Identify and troubleshoot VMware Carbon Black Cloud sensor installations Gather troubleshooting data within the browser to remediate or escalate problems Identify and resolve sensor usage, networking, and performance problems with the VMware Carbon Black Cloud sensor This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in performing advanced operations and troubleshooting of VMware Carbon Black Cloud. This course will go into integrating VMware Carbon Black Cloud with other third-party components and utilizing the API and the SDK to automate operations within the product and your security stack. This course will also enable you to troubleshoot common problems during sensor installation, operations, and within the VMware Carbon Black Cloud console with hands-on lab problems. Course Introduction Introductions and course logistics Course objectives VMware Carbon Black Cloud Integrations Describe the integration capabilities with VMware Carbon Black Cloud Determine integration use cases for VMware Carbon Black Cloud Identify required components for integrating VMware Carbon Black Cloud Differentiate VMware Carbon Black Cloud integration vendors VMware Carbon Black Cloud Syslog Integration Describe the function of the Syslog Connector Generate API and SIEM keys from the Cloud console Validate a successful Syslog integration Describe how to automate the Syslog Connector Troubleshoot problems with the Syslog integration Using Postman Explain the concept and purpose of an API Interpret common REST API Status codes Recognize the difference between platform and product APIs Using the Postman Client to initiate API calls Create a custom access level and respective API key Create a valid API request Using the VMware Carbon Black Cloud Python SDK Install the VMware Carbon Black Cloud Python SDK Describe the different authentication methods Evaluate the best authentication method for a given task Automating Operations Automate basic Incident Response tasks using the VMware Carbon Black Cloud SDK and API Automate basic watchlist interactions using the VMware carbon Black Cloud SDK and API Sensor Installation Troubleshooting Describe sensor install log collection process Identify sensor install log parameters Create a detailed sensor install log Locate sensor install logs on an endpoint Interpret sensor install success from an install log Determine likely cause for install failure using sensor logs Propose resolution steps for a given sensor install failure VMware Carbon Black Cloud Console Troubleshooting Identify sensor bypass status reasons Simplify console data exports using search Describe differences in Audit Log detail levels Locate built-in browser tools Gather console diagnostics logs from a browser Review console diagnostics logs Sensor Operations Troubleshooting Identify available types of diagnostic logs Gather appropriate diagnostic logs for a given issue Identify steps for resolving software interoperability problems Identify steps for resolving resource problems Identify steps for resolving network problems Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud:Advanced Operations and Troubleshooting training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud:Advanced Operations and Troubleshooting course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Carbon Black Cloud:Advanced Operations and Troubleshooting
Delivered OnlineFlexible Dates
Price on Enquiry

Unix Administration: Unix Operating System

4.5(3)

By Studyhub UK

The 'Unix Administration: Unix Operating System' course offers a comprehensive introduction to Unix, focusing on key concepts, file and directory management, essential commands, and the basics of the VI text editor. Participants will gain practical knowledge and skills in Unix administration, enabling them to navigate and manage the Unix operating system effectively. Learning Outcomes: Understand the fundamentals of Unix and its significance in modern computing. Explore directory and file management techniques, including creation, manipulation, and organization. Master essential Unix commands for tasks such as navigation, file operations, and system management. Learn the basics of the VI text editor for efficient file editing and manipulation. Acquire proficiency in using Unix shell commands to enhance system administration. Develop skills in managing user accounts, permissions, and security settings. Gain knowledge of process management and system monitoring in Unix. Understand basic networking concepts and how they apply to Unix systems. Why buy this Unix Administration: Unix Operating System? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Unix Administration: Unix Operating System there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Unix Administration: Unix Operating System does not require you to have any prior qualifications or experience. You can just enrol and start learning.  IT professionals seeking to enhance their Unix administration skills. System administrators and network administrators working with Unix-based systems. Software developers and programmers interested in Unix environments. Students and enthusiasts looking to gain hands-on experience with Unix. Individuals pursuing a career in IT infrastructure and system management. Prerequisites This Unix Administration: Unix Operating System was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Unix System Administrator - Median salary of £40,000 - £50,000 per year. Network Administrator - Median salary of £30,000 - £40,000 per year. IT Operations Manager - Median salary of £50,000 - £70,000 per year. Software Developer - Median salary of £35,000 - £45,000 per year. IT Consultant - Median salary of £40,000 - £60,000 per year. Course Curriculum Unix Administration: Unix Operating System Introduction to Unix 01:00:00 Directory and File Management (Part- I) 00:58:00 Directory and File Management (Part- II) 00:59:00 Commands in Unix 00:59:00 Basics of VI Editor 00:59:00 Assignment Assignment - Unix Administration: Unix Operating System 00:00:00

Unix Administration: Unix Operating System
Delivered Online On Demand4 hours 55 minutes
£10.99

Bioinformatics & Computational Genomics: Algorithms & Tools

By NextGen Learning

For those interested in the field of genetics and computational biology, who want to gain a deep understanding of the tools and algorithms used in bioinformatics, we have this Bioinformatics & Computational Genomics: Algorithms & Tools course. With the explosion of data in the field of genomics, it can be overwhelming to keep up with the latest tools and techniques in bioinformatics. Without a strong foundation in this field, it can be difficult to navigate the complex algorithms and tools required to make meaningful contributions. Our Bioinformatics & Computational Genomics course provides a comprehensive introduction to the most important algorithms and tools in the field, as well as the latest research in computational genomics. Learning Outcomes: Gain a thorough understanding of the fundamental principles and concepts in bioinformatics and computational genomics. Develop the ability to analyse and interpret genomic data using advanced algorithms and computational tools. Explore the structure and function of proteins, and understand their significance in biological systems. Acquire knowledge of the latest advancements in computational genomics and their application in various research areas. Develop critical thinking skills to tackle complex problems in bioinformatics and propose innovative solutions. Unlock the world of Bioinformatics & Computational Genomics with our comprehensive course. Delve into the fascinating realm of genetic data analysis, algorithms, and tools, and discover how they shape our understanding of complex biological systems. Throughout this immersive learning experience, you will explore diverse topics, including computational genomics, protein structure and function, and applied bioinformatics. With a strong focus on theoretical concepts, this course equips you with the essential knowledge to navigate the vast landscape of bioinformatics research. Embark on a transformative journey as you unravel the mysteries hidden within the genomes. Our carefully designed curriculum covers the key principles, algorithms, and tools that drive breakthroughs in bioinformatics. By delving into the intricacies of genomic data analysis, you will gain valuable insights into the structure and function of proteins, enabling you to decipher the language of life at a molecular level. Immerse yourself in the world of computational genomics and embrace the power of algorithms in unlocking the secrets of genetic information. This course is tailored for individuals passionate about genomics and computational biology. Whether you're an aspiring researcher, a healthcare professional, or a biology enthusiast, this course will ignite your curiosity and expand your horizons. No prior knowledge of bioinformatics is required, as we provide a solid foundation to help you navigate this captivating field. Enrol in the course right now! Certification Upon completion of the Bioinformatics & Computational Genomics: Algorithms & Tools course, learners can obtain a certificate as proof of their achievement. You can receive a £4.99 PDF Certificate sent via email, a £9.99 Printed Hardcopy Certificate for delivery in the UK, or a £19.99 Printed Hardcopy Certificate for international delivery. Each option depends on individual preferences and locations. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The target audience for the course is: Researchers looking to enhance their knowledge and expertise in bioinformatics and computational genomics. Healthcare professionals interested in understanding the computational aspects of genomics and its applications. Biology students seeking to explore the intersection of biology and computer science. Enthusiasts eager to unravel the mysteries of genomics and gain a deeper understanding of the computational tools used in bioinformatics. Career path Some of the career paths related to this field are: Bioinformatics Analyst: £30,000 - £50,000 per annum Computational Genomics Researcher: £35,000 - £60,000 per annum Data Scientist (Genomics) £40,000 - £70,000 per annum Genomic Data Analyst: £35,000 - £55,000 per annum Bioinformatics Software Developer: £40,000 - £65,000 per annum Academic Researcher (Bioinformatics): £35,000 - £70,000 per annum

Bioinformatics & Computational Genomics: Algorithms & Tools
Delivered Online On Demand1 hour
£15

Linux File Management System

4.5(3)

By Studyhub UK

Overview Embarking on a journey through the intricate pathways of the Linux File Management System offers a thrilling yet essential adventure for those diving into modern computing. This course unfolds the mysteries behind Linux's unique file hierarchy, ensuring that users comprehend its structure and master the art of navigation and manipulation within this environment. From initial introductions to setting up a dedicated lab and diving deep into the Linux FileSystem, learners will be equipped with the prowess to navigate Linux systems effortlessly. Learning Outcomes: Understand the fundamental principles and concepts of the Linux File Management System. Acquire the knowledge to configure and set up a functional Linux lab environment. Demonstrate proficiency in navigating the Linux filesystem hierarchy. Apply various commands and techniques to manage files effectively. Recognise and differentiate between multiple Linux file types and their specific purposes. Implement appropriate security measures to safeguard files and directories. Evaluate and troubleshoot common file management issues within Linux environments. Why buy this Linux File Management System? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Linux File Management System there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this course for? This Linux File Management System course is ideal for Aspiring system administrators keen on mastering Linux file management. Software developers looking to enhance their Linux-based application development skills. IT enthusiasts aiming to expand their knowledge on Linux operations. Individuals transitioning from other operating systems to Linux platforms. University students studying computer science or related fields with a focus on Linux systems. Prerequisites This Linux File Management System does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Linux File Management System was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Linux System Administrator: Average salary of £40,000 - £55,000 Per Annum. Software Developer (Linux-focused): Average salary of £45,000 - £60,000 Per Annum. Linux Support Engineer: Average salary of £30,000 - £45,000 Per Annum. IT Consultant (Linux speciality): Average salary of £50,000 - £70,000 Per Annum. Linux Systems Architect: Average salary of £60,000 - £80,000 Per Annum. Linux Training Specialist: Average salary of £35,000 - £50,000 Per Annum. Course Curriculum Section 1: Introduction Introduction 00:01:00 Course Overview 00:04:00 Section 2: Setup a Lab Unit 1: Download and Install VirtualBox 00:06:00 Unit 2: Creating First Virtual Machine 00:06:00 Unit 3: Linux Installation 00:25:00 Unit 4: Linux CentOS8 Installation 00:25:00 Section 3: Linux FileSystem Unit 1: Introduction to Unix and Linux 00:02:00 Unit 2: Accessing Linux System 00:03:00 Unit 3: Download and Install Putty 00:03:00 Unit 4: Connect Linux via Putty 00:05:00 Unit 5: Introduction to Linux FileSystem 00:05:00 Unit 6: FileSystem Structure and Description 00:13:00 Unit 7: FileSystem Navigation Commands 00:10:00 Unit 8: Absolute and Relative Paths 00:05:00 Unit 9: Directory Listing Attributes 00:03:00 Unit 10: Creating Files and Directories 00:09:00 Unit 11: Linux File Type 00:01:00 Unit 12: Difference Between Find and Locate Commands 00:06:00 Unit 13: Hard and Soft Link 00:12:00 Unit 14: i=Important Things to Remember 00:01:00 Unit 15: Understanding Wildcards 00:10:00 Unit 16: Command Prompts and Getting prompts Back 00:04:00 Unit 17: Changing Systems password 00:05:00 Assignment Assignment - Linux File Management System 00:00:00

Linux File Management System
Delivered Online On Demand2 hours 44 minutes
£10.99

Beginner to Intermediate Python Coding

4.5(3)

By Studyhub UK

Embark on a transformative journey into the realm of programming with our Intermediate Python Coding course. Picture yourself delving deeper into the world of Python, a language known for its versatility and efficiency. This course begins with a refresher introduction, setting a solid foundation before advancing to more complex concepts. It's designed not just to teach but to immerse you in the intricacies of Python. From understanding the fundamentals of classes and methods to unraveling the complexities of Object-Oriented Programming (OOP), each section is a step towards mastering this powerful programming language. Whether you're looking to enhance your coding skills for professional growth or personal satisfaction, this course bridges the gap between basic understanding and advanced proficiency. As you progress, you'll explore the sophisticated elements of Python, including inheritance, polymorphism, encapsulation, and abstraction. These concepts are not just taught theoretically; you'll see them come to life through practical applications, especially in the creation of Python games. This hands-on approach ensures that you're not just learning concepts but also applying them in real-world scenarios. The course also delves into Python's extensive libraries as you learn about modules, packages, and data handling with Pandas. Completing the course with error and exception handling, you emerge not just as someone who can code but as a problem-solver who can navigate through challenges and create efficient, elegant solutions. Learning Outcomes Gain a deeper understanding of Python classes, methods, and OOP principles. Develop skills in implementing inheritance, polymorphism, encapsulation, and abstraction in Python. Create interactive Python games and applications to apply coding skills practically. Learn to manage and utilise Python modules, packages, and the Pandas library. Master error and exception handling in Python for robust coding. Why choose this Intermediate Python Coding course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Intermediate Python Coding course for? Programmers looking to advance from basic to intermediate Python skills. Computer science students seeking a deeper understanding of Python. Software developers aiming to enhance their proficiency in Python. Data analysts and scientists interested in leveraging Python's capabilities. Hobbyists and tech enthusiasts keen on developing Python applications. Career path Software Developer: £30,000 - £60,000 Data Analyst: £25,000 - £50,000 Python Developer: £28,000 - £55,000 Machine Learning Engineer: £32,000 - £70,000 Data Scientist: £35,000 - £75,000 Back-end Developer: £27,000 - £53,000 Prerequisites This Beginner to Intermediate Python Coding does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Beginner to Intermediate Python Coding was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Section 01: Introduction Course Introduction 00:02:00 Course Curriculum 00:05:00 How to get Pre-requisites 00:02:00 Getting Started on Windows, Linux or Mac 00:01:00 How to ask Great Questions 00:02:00 Section 02: Class Introduction to Class 00:07:00 Create a Class 00:09:00 Calling a Class Object 00:08:00 Class Parameters - Objects 00:05:00 Access Modifiers(theory) 00:10:00 Summary 00:02:00 Section 03: Methods Introduction to methods 00:06:00 Create a method 00:07:00 Method with parameters 00:12:00 Method default parameter 00:06:00 Multiple parameters. 00:05:00 Method return keyword. 00:04:00 Method Overloading. 00:05:00 Summary 00:02:00 Section 04: OOPs Object-Oriented Programming Introduction to OOPs 00:05:00 Classes and Objects 00:08:00 Class Constructors 00:07:00 Assessment Test1 00:01:00 Solution for Assessment Test1 00:03:00 Summary 00:01:00 Section 05: Inheritance and Polymorphism Introduction 00:04:00 Inheritance 00:13:00 Getter and Setter Methods 00:12:00 Polymorphism 00:13:00 Assessment Test2 00:03:00 Solution for Assessment Test2 00:03:00 Summary 00:01:00 Section 06: Encapsulation and Abstraction Introduction 00:03:00 Access Modifiers (public, protected, private) 00:21:00 Encapsulation 00:07:00 Abstraction 00:07:00 Summary 00:02:00 Section 07: Python Games for Intermediate Introduction 00:01:00 Dice Game 00:06:00 Card and Deck Game Playing 00:07:00 Summary 00:01:00 Section 08: Modules and Packages Introduction 00:01:00 PIP command installations 00:12:00 Modules 00:12:00 Naming Module 00:03:00 Built-in Modules 00:03:00 Packages 00:08:00 List Packages 00:03:00 Summary 00:02:00 Section 09: Working Files with Pandas Introduction 00:02:00 Reading CSV files 00:11:00 Writing CSV files 00:04:00 Summary 00:01:00 Section 10: Error and ExceptionHandling Introduction 00:01:00 Errors - Types of Errors 00:08:00 Try - ExceptExceptions Handling 00:07:00 Creating User-Defined Message 00:05:00 Try-Except-FinallyBlocks 00:07:00 Summary 00:02:00

Beginner to Intermediate Python Coding
Delivered Online On Demand5 hours 21 minutes
£10.99

VMware Tanzu Mission Control: Management and Operations 2022

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Operators and application owners who are responsible for deploying and managing policies for multiple Kubernetes clusters across on-premises and public cloud environments. Overview By the end of the course, you should be able to meet the following objectives: Describe the VMware Tanzu Mission Control architecture Configure user and group access Create access, image registry, network, security, quota, and custom policies Connect your on-premises vSphere with Tanzu Supervisor cluster to VMware Tanzu Mission Control Create, manage, and backup Tanzu Kubernetes clusters Perform cluster inspections Monitor and secure Kubernetes environments During this two-day course, you focus on using VMware Tanzu© Mission Control? to provision and manage Kubernetes clusters. The course covers how to apply access, image registry, network, security, quota, and custom policies to Kubernetes environments. For cluster provisioning and management, the course focuses on deploying, upgrading, backing up and monitoring Kubernetes clusters on VMware vSphere© with Tanzu. Given the abstractions of VMware Tanzu Mission Control, the learnings should be transferrable to public cloud. Introducing VMware Tanzu Mission Control VMware Tanzu Mission Control Accessing VMware Tanzu Mission Control VMware Cloud? services access control VMware Tanzu Mission Control architecture Cluster Management Attached clusters Management clusters Provisioned clusters Cluster inspections Data protection VMware Tanzu© Observability? by Wavefront VMware Tanzu© Service Mesh? Policy Management Policy management Access policies Image registry policies Network policies Security policies Quota policies Custom policies Policy insights

VMware Tanzu Mission Control: Management and Operations 2022
Delivered OnlineFlexible Dates
Price on Enquiry

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5]

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Platform operators who are responsible for deploying and managing Tanzu Kubernetes clusters Overview By the end of the course, you should be able to meet the following objectives: Describe how Tanzu Kubernetes Grid fits in the VMware TanzuTM portfolio Describe the Tanzu Kubernetes Grid architecture Deploy and manage Tanzu Kubernetes Grid management clusters Deploy and manage Tanzu Kubernetes Grid workload clusters Deploy, configure, and manage Tanzu Kubernetes Grid packages Perform basic troubleshooting During this three-day course, you focus on installing VMware Tanzu© Kubernetes Grid? on a VMware vSphere© environment and then provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages for image registry, authentication, logging, ingress, multi-pod network interfaces, service discovery, and monitoring. The concepts learned in this course are transferable for users who must install Tanzu Kubernetes Grid on other supported clouds. Course Introduction Introductions and course logistics Course objectives Introducing VMware Tanzu Kubernetes Grid Identify the VMware Tanzu products responsible for Kubernetes life cycle management and describe the main differences between them Explain the core concepts of Tanzu Kubernetes Grid, including bootstrap, Tanzu Kubernetes Grid management and workload clusters, and the role of Cluster API List the components of a Tanzu Kubernetes Grid instance Illustrate how to use the Tanzu CLI Identify the requirements for a bootstrap machine Define the Carvel Tool set Define Cluster API Identify the infrastructure providers List the Cluster API controllers Identify the Cluster API Custom Resource Definitions Management Clusters List the requirements for deploying a management cluster Differentiate between deploying on vSphere 6.7 Update 3 and vSphere 7 Describe the components of NSX Advanced Load Balancer Explain how Tanzu Kubernetes Grid integrates with NSX Advanced Load Balancer Explain how Kubernetes manages authentication Define Pinniped Define Dex Describe the Pinniped authentication workflow List the steps to install a Tanzu Kubernetes Grid management cluster Summarize the events of a management cluster creation Demonstrate how to use commands when working with management clusters Tanzu Kubernetes Clusters List the steps to build a custom image Describe the available customizations Identify the options for deploying Tanzu Kubernetes Grid clusters Explain how Tanzu Kubernetes Grid clusters are created Discuss which VMs make up a Tanzu Kubernetes Grid cluster List the pods that run on a Tanzu Kubernetes cluster Describe the Tanzu Kubernetes Grid core add-ons that are installed on a cluster Configuring and Managing Tanzu Kubernetes Grid Instances Define the Tanzu Kubernetes Grid packages Describe the Harbor Image Registry Define Fluent Bit Identify the logs that Fluent Bit collects Explain basic Fluent Bit configuration Describe the Contour ingress controller Demonstrate how to install Contour on a Tanzu Kubernetes Grid cluster Demonstrate how to install Service Discovery with ExternalDNS. Define Multus CNI Define Prometheus Define Grafana Troubleshooting Discuss the various Tanzu Kubernetes Grid logs Identify the location of Tanzu Kubernetes Grid logs Explain the purpose of crash diagnostics Demonstrate how to use SSH to connect to a Tanzu Kubernetes Grid VM Describe the steps for troubleshooting a failed cluster deployment Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware Tanzu Kubernetes Grid: Install, Configure, Manage [V1.5]
Delivered OnlineFlexible Dates
Price on Enquiry

C)PEH - Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. Course Introduction Introduction to Ethical Hacking Linux Fundamentals Protocols Cryptography Password Cracking Malware Security Devices Information Gathering ? Passive Reconnaissance Social Engineering Active Reconnaissance Vulnerability Assessment Network Attacks Hacking Servers Hacking Web Technologies Hacking Wireless Technologies Maintaining Access and Covering Tracks

C)PEH - Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Aruba Networks - Aruba Switching Fundamentals For Mobility, Rev. 16.41 (ASFM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for IT Professionals who deploy small-to- medium scale enterprise network solutions based on Aruba products and technologies Overview Upon completion of this course, you will be able to:Explain how Aruba networking solutions meet customers? requirementsExplain how Aruba AirWave provides unified wireless and wired network managementDescribe in-band management and out-of-band managementComplete the initial setup on ArubaOS switchesControl access to switches for both in-band and out-of-band managementManage software and configuration files on ArubaOS switchesExplain use cases for VLANs and configure port-based VLANs on ArubaOS switchesUnderstand and configure Rapid Spanning Tree Protocol (RSTP)Understand and configure Multiple Spanning Tree Protocol (MSTP)Differentiate between different types of link aggregation and understand the benefits of Link Aggregation Control Protocol (LACP)Configure and troubleshoot link aggregation on ArubaOS switchesConfigure static routes on ArubaOS switches and interpret IP routing tablesConfigure a basic Open Shortest Path First (OSPF) solutionDescribe how Virtual Switching Framework (VSF) works and the advantages that it providesConfigure and verify a simple VSF fabricDescribe the basics of wireless communications and 802.11 standardsDefine a wireless LAN (WLAN) and differentiate between wireless security optionsConfigure basic settings on Aruba Instant APsConfigure AirWave management settings on an IAP clusterConfigure SNMP v2c settings on ArubaOS switchesDiscover ArubaOS switches in AirWave and bring switches and IAPs under monitoring and managementImplement zero touch provisioning (ZTP) for Aruba IAPs and ArubaOS switches This course teaches you the fundamental skills necessary to configure and manage modern, open standards-based networking solutions. This course consists of approximately 20% lecture and 80% hands-on lab exercises to help you learn how to implement and validate small to medium enterprise network solutions. This 3-day course prepares network professionals for the HPE ATP - Aruba Mobile First Solutions V1 certification exam.In this course, participants learn about ArubaOS switch technologies including: VLANs, securing access, redundancy technologies such as MSTP, link aggregation techniques including LACP, and switch virtualization with Aruba?s Virtual Switching Framework (VSF). You also learn about IP Routing including static and dynamic IP routing with OSPF. This course teaches you how to deploy Aruba wireless Access Points and configure Aruba Clustering technology. It also teaches you how to configure, manage and monitor the network with the Aruba AirWave management solution. Introduction to Aruba, a Hewlett Packard Enterprise companySwitch CLI (Command Line Interface) NavigationProtecting Management AccessManagement of Software and ConfigurationsVLANSSpanning Tree Protocol (STP)Link AggregationIP RoutingVirtual Switching Framework (VSF)Wireless for Small-to-Medium Businesses (SMBs)Aruba AirWave

Aruba Networks - Aruba Switching Fundamentals For Mobility, Rev. 16.41 (ASFM)
Delivered OnlineFlexible Dates
Price on Enquiry