• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3044 Software Development courses

Introduction to Reactive Spring (TT3355 )

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This in an intermediate-level Java development course geared for students experienced with Java and Spring programming essentials. This course does not cover Java or Spring development basics. Overview Working within in an engaging, hands-on learning environment, guided by our expert team, attendees will: Understand the ReactiveX specification Understand the basics of Reactive Programming Discuss the advantages and limitations of Observables Write a client application capable of handling Reactive events Apply operators to event streams to filter, modify and combine the objects emitted by event publishers Select the appropriate type of Event Source Use both Cold and Hot Observables Deal with backpressure problems in reactive programming Develop a reactive web application using Spring WebFlux Define application flows of a WebFlux application Use the WebClient API to work with both synchronous and streaming APIs Develop Unit and Integration tests to test WebFlux endpoints Creating a reactive REST endpoint Become familiar with the basics of WebSockets Create a WebSocket endpoint using Spring Create a WebSocket client Understand the basics of NoSQL Become familiar with the basics of MongoDB Understand how the data in MongoDB can be retrieved using a Reactive API Define Spring Data MongoDB repositories Query the MongoDB using Spring Data Define a reactive repository using MongoDB Explore the Spring Data R2DBC API to perform reactive CRUD operations against a relational database Spring Data reative allow us to implement database operations relying on Reative Programming APIs. While the Spring R2DBC initiative aims to bring reactive programming to relational databaes, several NoSQL databases already provide this possibility. After an introduction to NoSQL and the MongoDB, this courses covers the APIs available to communicate with this NoSQL database using both blocking and reactive APIs.Introdcution to Reactive Spring is a comprehensive Java training workshop geared for experienced developers who wish to explore concurrent, asynchronous and reactive programming APIs and techniques using Spring. After an introduction to reactive programming, Reactive Streams and the Project Reactor APIs, this course will show how this APIs are integrated into Spring. Spring 5 includes Spring WebFlux, providing a reactive programming model for web applications, including support for Reactive REST APIs. Spring WebSocket assists in the creation of web applications which provide a full-duplex, two-way communication between client and server. Introduction to Reactive Programming Reactive Manifesto Introduce ReactiveX ReactiveX implementations The Observer, Iterator pattern and functional programming Discuss hot and cold publishers Reactive Streams API Introduce the Reactive Streams specification Publisher and Subscribers java.util.concurrent.Flow Transformation of Messages (Processor) Controlling messages Tutorial: Setup Eclipse for Using Maven Introduction Introduce the Reactor Building blocks Flux and Mono Creating observables Subscribing to a stream Testing Event Sources (introduction) Testing reactive implementations StepVerifier : test sequence of emitted items Defining expectations TestPublisher: produce test data to test downstream operators Reactive Operators Introduce Operators Show the use of marble diagrams Explain some commonly used operators Callback operators Schedulers (Multithreading) Thread usage of subscriber and consumer Using the subscribeOn method Introduce the Scheduler interface Using the observeOn method Backpressure Strategies for dealing with Backpressure ?reactive pull? backpressure Exception Handling Handling errors in onError Exception handling strategies Using onErrorReturn or onErrorNext operators Using the retry operators The Global Error Handler Spring Data Review Quick review of Spring Data repositories Query return types Defining Query methods Pagination and sorting R2DBC Reactive Relational Database Connectivity DatabaseClient Performing CRUD operations Reactive Query annotated methods Spring WebFlux: Introduction Annotated Controllers Functional Endpoints WebFlux configuration Creating a reactive REST endpoint Defining flows Defining the application flow Actions Defining decision Navigating flows RouterFunction View Technologies View technologies Using Thymeleaf to create the view View Configuration Spring WebClient: Introduction to WebClient Working with asynchronous and streaming APIs Making requests Handling the response Lab: WebClient WebTestClient Testing WebFlux server endpoints Testing controllers or functions Define integration tests Introduction to Spring Reactive WebSockets Be familiar with the basics of WebSockets Understand the HTTP handshake and upgrade Name some of the advantages of WebSockets Defining the WebSocket WebSocket Message Handling WebSocketSession Implementing the WebSockethandler Creating a Browser WebSocket Client WebSocket STOMP Streaming (or Simple) text-orientated messaging protocol Introduce SockJS Connecting to the STOMP endpoint Configuring the message broker STOMP destinations Reactive WebSocket Reactive WebSocket support Implement the reactive WebSocketHandler BigData Introduce Big Data Explain the need for enhanced data storage Introduction to MongoDB JavaScript Object Notation Overview Introduce Binary JSON (BSON) Starting the database Creating Collections and Documents Executing ?simple? database commands Introduce the ObjectID Searching for documents using query operators Updating and deleting documents MongoDB Compass Spring and MongoDB MongoDB Support in Spring Data MongoClient and MongoTemplate Spring Data MongoDB configuration @EnableMongoRepositories Adding documents to the database The @Document and @Field annotations Polymorphism and the _class property The Criteria object Spring Data MongoDB MongoRepository Field naming strategy Using JSON queries to find documents The @PersistenceConstructor annotation Reactive Repositories with MongoDB Using reactive repositories ReactiveMongoTemplate RxJava or Reactor Additional course details: Nexus Humans Introduction to Reactive Spring (TT3355 ) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Introduction to Reactive Spring (TT3355 ) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Introduction to Reactive Spring (TT3355 )
Delivered OnlineFlexible Dates
Price on Enquiry

55244 JavaScript for Developers

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for both novice and experienced programmers. Some experience in C++, C# or Java is helpful. Overview After completing this course, you will be able to: Write and test JavaScript code in modern browsers. Understand and work with the browser's Document Object Model (DOM). Work DOM objects and write code to respond to events. Add jQuery to their projects and use jQuery to manipulate the DOM and to make Ajax calls. Understand Ajax and Web Services, including HTTP Verbs and asynchronous Ajax calls. Work with XML and JSON data formats. Understand and use RESTful Web Services including ODATA queries. Work with Anonymous Functions, Self-Invoking Functions and Closures. Understand the role of the Window and Navigator objects. Describe and understand variables, 'variable hoisting', and JavaScript objects. This course is an in depth hands-on study of JavaScript. The course includes detailed hands-on labs and Q&A labs. The labs include multiple projects that update an existing web site. This course is similar to the retired Course 20480: Programming in HTML5 with JavaScript and CSS3. Module 1: Basic Scripting JavaScript Basics JavaScript or ECMAScript? Which Version of JavaScript am I Using? Shims, Shivs, and Polyfills Writing and Testing JavaScript Editors and the F12 Tools Key Parts of a Script Module 2: The Document Object Model The DOM Accessing Objects from the DOM Responding to Events Adding Elements to the DOM Module 3: Introduction to jQuery jQuery Downloading the jQuery Library jQuery Versions Linking to the Library Selecting Elements using jQuery Working with the Data Returned by jQuery Setting CSS Properties Running a Function Against the jQuery Return Set Module 4: Ajax and Web Services Web Services HTTP Verbs Data Formats ? XML and JSON Ajax RESTful Web Services OData OData Queries OData Updates Module 5: Diving in Deeper Is JavaScript Compiled? Data Types and Objects Extending Data Types Variables, Scopes and Hoisting Functions The ?this? Keyword Errors Recursion

55244 JavaScript for Developers
Delivered OnlineFlexible Dates
Price on Enquiry

Professional Certificate Course in Introduction to Requirements Management in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This Professional Certificate Course in Introduction to Requirements Management provides a comprehensive overview of fundamental concepts, including the definition and significance of Requirements Management. Participants will gain insights into the intricacies of requirement management processes, understand the critical importance of effective stakeholder management in gathering requirements, and explore the relationship between requirement gathering and strategic project planning. Through targeted modules, learners will also identify key elements of high-quality requirements, grasp diverse types of requirements in project management, and appreciate the pivotal role of requirement management in ensuring project success. After the successful completion of the course, you will be able to learn about the following: Definition and Explanation of Requirements Management Explain the process of requirement management. Explain importance of requirement management Identify the key elements of a good requirement Discuss the different types of requirements in project management. Explain the importance of stakeholder management in requirement gathering Understand the relationship between requirement gathering and project planning This Professional Certificate Course in Introduction to Requirements Management offers a comprehensive understanding of the fundamentals, encompassing the definition and importance of Requirements Management, key elements of effective requirements, diverse requirement types, stakeholder management significance, and the integral connection between requirement gathering and project planning. Participants will gain essential insights into the entire requirement management process, ensuring a solid foundation for successful project implementation. This Professional Certificate Course in Introduction to Requirements Management provides a comprehensive foundation, covering the definition and process of requirements management, emphasizing the importance of stakeholder engagement, and equipping participants with the skills to identify key elements of good requirements, discuss various types, and understand the pivotal link between requirement gathering and effective project planning. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Introduction to Requirement Management Self-paced pre-recorded learning content on this topic. Introduction To Requirements Management Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course.The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience, Project Managers Business Analysts Software Developers System Analysts Quality Assurance Professionals Product Managers Stakeholders involved in Project Planning Anyone Seeking a Foundation in Requirements Management Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Introduction to Requirements Management in London 2024
Delivered Online On Demand14 days
£31

Professional Certificate Course in Identifying Information Systems and Information Technology in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This course aims to provide learners with an in-depth understanding of Information Systems and their various components. The course covers the evolution, types, and components of Information Systems, including databases, database management systems, computer networking, and network architecture. It also explores key concepts and types of database management systems and database languages, information systems software, and the distinction between information systems and information technology. Additionally, the course covers enterprise resource planning (ERP), process mapping, implementation management, cloud computing, and artificial intelligence in Management Information Systems (MIS).After the successful completion of the course, you will be able to learn about the following, Information System, its evolution, types and components. Database and Database Management System. Key Concepts and Types of Database Management Systems and Database Languages. Computer Networking and Its Key Components and Types. What is Network Architecture? Information Systems Software. Information Systems V/s Information Technology. ERP, process mapping, Implementation Management and its components. Cloud Computing in Management Information Systems. Artificial Intelligence and Information Systems. This course provides learners with a comprehensive overview of Information Systems and their components. It begins by introducing the concept of Information Systems, their evolution, types, and components. It then covers databases and database management systems, including the types of database management systems, database languages, and the role of databases in managing information. This course provides learners with a comprehensive overview of Information Systems and their components. It begins by introducing the concept of Information Systems, its evolution, types, and components. It then covers databases and database management systems, including the types of database management systems, database languages, and the role of databases in managing information. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Identifying Information Systems and Information Technology Self-paced pre-recorded learning content on this topic. Identifying Information Systems and Information Technology Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course. The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. IT & Operations &Project Managers Business & Data Analysts Database Administrators & Network Engineers Systems Analysts & Software Developers Enterprise Architects, CIOs and CTOs Information Security Managers & IT Consultants Management Consultants & Business Owners Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Identifying Information Systems and Information Technology in London 2024
Delivered Online On Demand14 days
£31

Machine Learning and other AI: Are You Ready?

By IIL Europe Ltd

Machine Learning and other AI: Are You Ready? Machine Learning is the latest 'hot' title in computing and Artificial Intelligence. It sounds new but is influencing your life already. Machine Learning and AI will affect more and more of your life as they mature and more enabling technologies intersect with them. Machine Learning will change many disciplines and careers, overcoming scale issues, enabling better knowledge and insights, and augmenting many professions. Are you ready? This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.

Machine Learning and other AI: Are You Ready?
Delivered Online On Demand30 minutes
£10

Professional Certificate Course in Requirements Control and Change Management in London 2024

4.9(261)

By Metropolitan School of Business & Management UK

This Professional Certificate Course in Requirements Control and Change Management provides a comprehensive overview, emphasizing the significance of mastering skills in effective change management. Participants will identify processes, tools, and differentiate between minor and major changes, while also learning to navigate challenges and pitfalls through practical solutions. After the successful completion of the course, you will be able to learn about the following:• Understand the importance of requirements control and change management.• Identify the different processes and tools used for requirements control and change management.• Understand the difference between minor and major changes.• Identify the challenges and pitfalls of requirements control and change management, and how to address them. This Professional Certificate Course in Requirements Control and Change Management offers a comprehensive understanding of the vital principles, processes, and tools involved, covering distinctions between minor and major changes, and providing strategies to address challenges and pitfalls in effective requirements control and change management. This Professional Certificate Course in Requirements Control and Change Management equips participants to comprehend the significance, processes, and tools involved, distinguishing between minor and major changes, while addressing challenges and pitfalls through effective strategies. Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Project Requirements Control and Change Management Self-paced pre-recorded learning content on this topic. Requirements Control and Change Management Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course.The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience, Project Managers Business Analysts Software Developers Quality Assurance Professionals System Architects Product Managers Requirements Engineers IT Professionals Stakeholders in Project Management Professionals involved in Change Management Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.

Professional Certificate Course in Requirements Control and Change Management in London 2024
Delivered Online On Demand14 days
£30

Why Should You Learn Machine Learning Its Significance, Working, and Roles

By garyv

Machine literacy in data wisdom is a fleetly expanding discipline and now is the crucial element. This groundbreaking field equips computers and systems with the capacity to learn from data and ameliorate their performance over time without unequivocal programming. Statistical ways are employed to train algorithms to produce groups or prognostications and to find significant findings in data mining systems. immaculately, the conclusions made from these perceptivity impact crucial growth pointers in operations and companies. What's Machine Learning? . Machine learning classes in pune The machine literacy term was chased by Arthur Samuel in 1959. It's the discipline solely concentrated on studying and erecting tools and ways that can let machines learn. These styles use data to enhance the computer performance of a particular set of tasks. Machine literacy algorithms induce prognostications or possibilities and produce a model grounded on data samples, also called training data. There's a need for machine literacy as these algorithms are applied in a broad range of operations, for illustration, computer vision, dispatch filtering, speech recognition, husbandry, and drugs, where it's a challenge to produce traditional algorithms that can negotiate the needed tasks. orders in Machine Learning Being such a vast and complicated field, machine literacy is divided into three different orders machine literacy orders Supervised literacy – In this system, the algorithm is trained using data that has been labeled and in which the target variable or asked result is known. Once trained, the algorithm may make prognostications grounded on unidentified information by learning how to associate input variables with the willed affair. Unsupervised literacy – In this case, the algorithm is trained on unlabeled data, and its thing is to discover structures or patterns within the data without having a specific target variable in mind. Common unsupervised literacy tasks include dimensionality reduction and clustering. underpinning literacy – An algorithm is trained via relations with the terrain in this type of literacy. The algorithm learns how to operate in order to maximize a price signal or negotiate a particular ideal. Through prices or penalties, it receives feedback that helps it upgrade its decision-making process. Artificial Intelligence and Machine Learning Artificial intelligence( AI) is divided into several subfields, and machine literacy( ML) is one of them. In order to produce intelligent machines that can pretend mortal intelligence, a variety of methodologies, approaches, and technologies are used. This notion is known as artificial intelligence( AI). The development of ways and models that allow computers to acquire knowledge from data and make recommendations or judgments without unequivocal programming is the focus of machine literacy( ML). Some academics were interested in the idea of having machines learn from data in the early stages of AI as an academic field. They tried to approach the issue using colorful emblematic ways and neural networks. They were primarily perceptrons, along with other models that were ultimately discovered to be reimaginings of the generalized direct models of statistics. For this case, you aim to make a system secerning cows and tykes. With the AI approach, you'll use ways to make a system that can understand the images with the help of specific features and rules you define. Machine literacy models will bear training using a particular dataset of pre-defined images. You need to give numerous farmlands of cows and tykes with corresponding markers. Why is Machine Learning Important? Machine literacy is an abecedarian subfield of artificial intelligence that focuses on assaying and interpreting patterns and structures in data. It enables logic, literacy, and decision-making outside of mortal commerce. The significance of machine literacy is expanding due to the extensively more expansive and more varied data sets, the availability and affordability of computational power, and the availability of high-speed internet. It facilitates the creation of new products and provides companies with a picture of trends in consumer geste and commercial functional patterns. Machine literacy is a high element of the business operations of numerous top enterprises, like Facebook, Google, and Uber. Prophetic Analytics Machine learning course in pune Machine literacy makes prophetic analytics possible by using data to read unborn results. It's salutary in the fields of finance, healthcare, marketing, and logistics. Associations may prognosticate customer growth, spot possible troubles, streamline operations, and take visionary action to ameliorate results using prophetic models. Personalization and recommendation systems Machine literacy makes recommendation systems and substantiated gests possible, impacting every aspect of our diurnal lives. Platforms like Netflix, Amazon, and Spotify use machine literacy algorithms to comprehend stoner preferences and offer substantiated recommendations. Personalization boosts stoner pleasure and engagement while promoting business expansion. Image and speech recognition Algorithms for machine literacy are particularly good at jobs like speech and picture recognition. Deep literacy, a branch of ML, has converted computer vision and natural language processing. It makes it possible for machines to comprehend, dissect, and produce visual and audio input. This technology is helpful for driverless vehicles, surveillance, medical imaging, and availability tools, among other effects. Machine learning training in pune


Why Should You Learn Machine Learning Its Significance, Working, and Roles
Delivered In-PersonFlexible Dates
FREE

CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for future DB2 for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database. Overview Implement a DB2 database designUse database utilities to load and reorganize dataDefine and implement a DB2 database recovery strategyControl access to database using DB2 authorization facilities This course provides students with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities, & security considerations. Course Outline Setting up a DB2 database Referential integrity Getting data into and out of DB2 Keeping your DB2 data in good shape Application data recovery basics Program preparation and Bind Security Serialization Additional course details: Nexus Humans CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1
Delivered OnlineFlexible Dates
Price on Enquiry

Salesforce Build Application Architect Expertise (ARC901)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. Application Architect Overview Assess the Requirements to Become an Application Architect Understand the Real-World Expectations of Application Architects Review the Core Characteristics of Successful Application Architects Scenario Introduction Review the Application Architecture Scenario Identify Scenario Problem Areas Identify Scenario Actors and Licensing Architecture Documentation Understand Key Architecture Documentation Requirements Learn About Best Practices for Artifact Documentation Produce Architecture Documents Data Modeling Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting Review the Considerations for Changing Field Types Review the Considerations for Modifying Data Models with Schema Builder Review the Considerations for Importing and Exporting Data Identify Use Cases of External Objects Determine an Appropriate Data Model Understand Design Implications with Complex Environments and Large Data Volumes (LDV) Data Management Review the Considerations for Working with LDV Review Data Lifecycle Concepts and Mechanisms Review Master Data Management and System of Record Concepts Review Data Migration, Planning, Preparation, and Execution Identify Potential LDV and Calculate Expected Volumes Go Further with Indexes Standard and Custom Skinny Tables Lock Records Security Model Review the Considerations for Working with Internal and External Sharing Models Restrict and Extend Object and Field Access Determine Sharing Solutions Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) Understand Teams Concepts (Account, Opportunity, Case) Understand Person Accounts and Its Implication on Sharing Encrypt Data Sharing in Communities Understand Community Security Mechanisms Secure Integration Endpoints Integrate and Specify Connected Apps and Named Credentials Advanced Security & Visibility Concepts Implement Security & Visibility Controls with Apex and Visualforce Review Territory Management and Its Implication on Data Management, Sharing, and Visibility Review Divisions and Its Implication on Data Management, Sharing, and Visibility Understand Security and Visibility Controls on 'Special' Objects Solution Design Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange Understand Declarative and Programmatic Configuration Get to Know the Order of Execution Automate Business Processes Consider Reporting and Analytics Needs Consider How to Store and Access Content/Files Apply Solution Design Concepts to Real-World Problems and Scenarios Deployment & Integration Best Practices Review the Application Lifecycle Understand How Sandboxes Should Be Used Review Deployment Options Identify Integration Patterns Wrap-up Review a Practice Scenario Review What Was Covered Additional course details: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Application Architect Expertise (ARC901)
Delivered OnlineFlexible Dates
Price on Enquiry

AWS Security Governance at Scale

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. Course Introduction Instructor introduction Learning objectives Course structure and objectives Course logistics and agenda Module 1: Governance at Scale Governance at scale focal points Business and Technical Challenges Module 2: Governance Automation Multi-account strategies, guidance, and architecture Environments for agility and governance at scale Governance with AWS Control Tower Use cases for governance at scale Module 3: Preventive Controls Enterprise environment challenges for developers AWS Service Catalog Resource creation Workflows for provisioning accounts Preventive cost and security governance Self-service with existing IT service management (ITSM) tools Module 4: Detective Controls Operations aspect of governance at scale Resource monitoring Configuration rules for auditing Operational insights Remediation Clean up accounts Module 5: Resources Explore additional resources for security governance at scale Additional course details: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Governance at Scale
Delivered OnlineFlexible Dates
Price on Enquiry