• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

349 Software Engineer courses in Bristol delivered Online

Software Testing

By Compete High

🚀 Unlock the Power of Quality Assurance with Our Software Testing Course! 🚀 Are you ready to take your career in the tech industry to new heights? Dive into the world of software testing and equip yourself with the essential skills needed to ensure top-notch quality in every digital product! Our comprehensive Software Testing course is your gateway to mastering the art of detecting bugs, ensuring functionality, and delivering seamless user experiences.   Why Software Testing Matters? In today's fast-paced digital landscape, flawless software performance is non-negotiable. Every glitch, bug, or malfunction can cost a company its reputation, customers, and revenue. That's where software testing comes into play. By meticulously examining code, analyzing system functionalities, and running rigorous tests, software testers play a crucial role in identifying and rectifying issues before they escalate.   Benefits of Our Software Testing Course Stay Ahead of the Curve: In an industry that's constantly evolving, staying stagnant is not an option. Our course provides you with the latest techniques, tools, and methodologies in software testing, ensuring you're always ahead of the curve. Enhance Product Quality: Become the guardian of quality by learning how to conduct thorough tests that identify even the most elusive bugs. With your expertise, you'll contribute to the creation of robust, reliable software that delights users. Boost Employability: Employers are constantly on the lookout for skilled software testers who can ensure their products meet the highest standards. By completing our course, you'll enhance your employability and open doors to exciting career opportunities. Save Time and Resources: Catching bugs early in the development process saves both time and resources. Our course teaches you how to implement efficient testing strategies, helping companies streamline their workflows and minimize costly rework. Earn Recognition and Respect: As a proficient software tester, you'll earn the respect of your peers and recognition from industry leaders. Your ability to deliver flawless software solutions will position you as a valuable asset in any organization.   Who is This For? Our Software Testing course is perfect for: Aspiring QA Engineers Software Developers looking to expand their skillset IT Professionals interested in quality assurance Students pursuing a career in technology Anyone passionate about ensuring top-notch software quality No matter your background or experience level, if you're eager to dive into the world of software testing, this course is for you!   Career Path Upon completing our Software Testing course, you'll be well-equipped to pursue a variety of exciting career paths, including: Quality Assurance Engineer: As a QA engineer, you'll be responsible for ensuring that software products meet the highest quality standards. You'll design and execute tests, identify defects, and collaborate with developers to resolve issues. Test Automation Engineer: Automation is becoming increasingly essential in software testing. As a test automation engineer, you'll leverage tools and scripts to automate repetitive testing tasks, improving efficiency and accuracy. Software Development Engineer in Test (SDET): SDETs combine development and testing skills to create robust testing frameworks and tools. They play a crucial role in ensuring the reliability and scalability of software systems. Quality Assurance Manager: With experience and expertise, you could advance to a managerial role overseeing QA teams and processes. Quality assurance managers are responsible for setting testing standards, optimizing workflows, and ensuring the overall quality of deliverables.   Don't Miss Out on This Opportunity! Are you ready to embark on an exciting journey into the world of software testing? Enroll in our Software Testing course today and unlock the door to a rewarding career in quality assurance. Join thousands of satisfied students who have transformed their careers with our comprehensive training program. Don't wait - secure your future in tech today!   FAQ (Frequently Asked Questions) - Software Testing Q1: What is software testing, and why is it important? Software testing is the process of evaluating a software application or system to ensure that it meets specified requirements and works as expected. It involves executing a program or system with the intent of finding errors or bugs and verifying that the software meets its quality and performance objectives. Testing is crucial for several reasons: It helps identify and fix defects or bugs early in the development process, reducing the cost of fixing issues later. It ensures that the software meets user requirements and expectations, enhancing user satisfaction. Testing improves the reliability, usability, and performance of software applications, thereby increasing their overall quality. It helps build confidence in the software's correctness and functionality, leading to better adoption and success in the market. Q2: What are the different types of software testing? There are various types of software testing, each serving different purposes and objectives: Unit Testing: Tests individual components or modules to ensure they function correctly in isolation. Integration Testing: Verifies that multiple components work together as expected when integrated. System Testing: Evaluates the entire system's functionality and performance in the context of the intended environment. Acceptance Testing: Validates that the software meets user requirements and is ready for deployment. Regression Testing: Ensures that changes or updates to the software do not adversely affect existing functionality. Performance Testing: Evaluates the software's responsiveness, scalability, and stability under different workload conditions. Security Testing: Identifies vulnerabilities and weaknesses in the software to prevent unauthorized access or data breaches. Q3: When should testing be performed in the software development lifecycle? Testing should be integrated into the software development lifecycle from the early stages and conducted iteratively throughout the process. Ideally, testing starts as soon as individual components or modules are developed and continues through integration, system development, and acceptance testing phases. Iterative testing allows for early detection and resolution of issues, reducing the risk of defects accumulating and impacting the final product. Q4: What are some common challenges in software testing? Incomplete or unclear requirements: Lack of clear specifications can make it challenging to determine what to test. Time and resource constraints: Limited time and resources may restrict the extent of testing that can be performed. Changing requirements: Frequent changes in requirements can lead to scope creep and require retesting. Complexity of software: Testing complex systems with intricate dependencies can be challenging and time-consuming. Test environment setup: Creating and maintaining test environments that mimic production can be complex and costly. Effective communication: Ensuring clear communication among stakeholders, developers, and testers is essential for successful testing. Course Curriculum Module 1 Introduction to Software Engineering Introduction to Software Engineering 00:00 Module 2 Software Design Principles and Testing Software Design Principles and Testing 00:00 Module 3 Software Maintenance and Evolution Software Maintenance and Evolution 00:00 Module 4 Software Project Management Software Project Management 00:00 Module 5 Software Configuration Management Software Configuration Management 00:00 Module 6 Software Project Metrics and Measurement Software Project Metrics and Measurement 00:00

Software Testing
Delivered Online On Demand6 hours
£4.99

Machine Learning

By Compete High

🚀 Unlock the Power of Data with Our Machine Learning Course! 🤖 Are you ready to dive into the revolutionary world of Machine Learning? Welcome to our comprehensive course designed to equip you with the skills and knowledge needed to harness the potential of data-driven decision-making. 🎓 Machine Learning has rapidly emerged as one of the most transformative technologies of the 21st century. From powering intelligent virtual assistants to revolutionizing healthcare diagnostics, its applications are boundless. With our expertly crafted course, you'll embark on a journey that will demystify the complexities of Machine Learning and empower you to leverage its capabilities for diverse purposes. 💡 Why Machine Learning? In today's data-driven world, organizations across industries are seeking professionals who can extract actionable insights from vast amounts of data. Machine Learning offers the tools and techniques necessary to analyze complex datasets, identify patterns, and make predictions with unprecedented accuracy. By mastering Machine Learning, you'll gain a competitive edge in the job market and position yourself as a valuable asset to any organization. 📈 What You'll Learn: Our Machine Learning course covers a wide array of topics, including: Fundamentals of Machine Learning algorithms Supervised, unsupervised, and reinforcement learning techniques Data preprocessing and feature engineering Model evaluation and validation Deep learning and neural networks Practical applications and case studies With hands-on projects and real-world examples, you'll not only understand the theory behind Machine Learning but also gain practical experience in implementing algorithms and solving complex problems. Whether you're a beginner or an experienced data professional, our course is tailored to accommodate learners of all levels. 📊 Who is this for? Our Machine Learning course is ideal for: Aspiring data scientists and analysts Software engineers looking to transition into Machine Learning roles Business professionals seeking to leverage data for strategic decision-making Students and academics interested in exploring the forefront of technology No matter your background or experience level, our course provides a solid foundation in Machine Learning principles and techniques, setting you on the path to success in this rapidly evolving field. 🌟 Career Path: By mastering Machine Learning, you'll open doors to a myriad of exciting career opportunities, including: Data Scientist Machine Learning Engineer AI Researcher Business Intelligence Analyst Data Engineer With the demand for Machine Learning professionals on the rise, employers are actively seeking individuals with the skills and expertise to drive innovation and deliver impactful solutions. Whether you're looking to advance your current career or embark on a new professional journey, our course will equip you with the tools and knowledge needed to thrive in today's competitive job market. 💼 FAQ: Q: Is prior programming experience required to enroll in the course? A: While prior programming experience can be beneficial, our course is designed to accommodate learners of all backgrounds. We provide comprehensive tutorials and resources to help you grasp the fundamentals of programming and get started with Machine Learning. Q: How long does it take to complete the course? A: The duration of the course varies depending on your pace and level of commitment. On average, most learners complete the course within 3 to 6 months. However, you have the flexibility to study at your own pace and revisit materials as needed. Q: Are there any prerequisites for enrolling in the course? A: While there are no strict prerequisites, familiarity with basic mathematics, statistics, and programming concepts can be advantageous. We provide supplementary materials and support to help you build the necessary foundation for success in the course. Q: Will I receive a certificate upon completion of the course? A: Yes, upon successfully completing the course requirements, you'll receive a certificate of completion that validates your proficiency in Machine Learning concepts and techniques. This certificate can enhance your credentials and demonstrate your expertise to potential employers. Q: How does the course structure accommodate working professionals? A: Our course offers flexible scheduling options, allowing you to balance your studies with your professional and personal commitments. With on-demand access to course materials and resources, you can learn at your own convenience and progress at a pace that suits your lifestyle. Don't miss out on the opportunity to unlock your full potential with our Machine Learning course! Enroll today and embark on a transformative journey that will shape the future of your career. 🌐✨ Course Curriculum Module 1_ Introduction to Machine Learning Introduction to Machine Learning 00:00 Module 2_ Linear Regression Linear Regression 00:00 Module 3_ Logistic Regression Logistic Regression 00:00 Module 4_ Decision Trees and Random Forests Decision Trees and Random Forests 00:00 Module 5_ Support Vector Machines (SVMs) Support Vector Machines (SVMs) 00:00 Module 6_ k-Nearest Neighbors (k-NN) k-Nearest Neighbors (k-NN) 00:00 Module 7_ Naive Bayes Naive Bayes 00:00 Module 8_ Clustering Clustering 00:00 Module 9_ Dimensionality Reduction Dimensionality Reduction 00:00 Module 10_ Neural Networks Neural Networks 00:00

Machine Learning
Delivered Online On Demand10 hours
£4.99

Amazon Web Services (AWS) Course

By One Education

Amazon Web Services (AWS) has reshaped the way businesses operate in the digital space. From cloud computing and secure data storage to scalable infrastructure and machine learning tools, AWS provides a reliable platform that meets the evolving demands of organisations across industries. Whether you’re an aspiring cloud architect or simply looking to sharpen your knowledge of cloud systems, this course is your go-to guide for understanding the core services and capabilities of AWS. In this online course, you’ll be introduced to the key features of AWS and how they are used in professional environments—from managing resources to automating processes with cloud-native tools. The content is structured to deliver clarity without the jargon, giving you the insights needed to navigate the AWS landscape with confidence. It’s an ideal choice for anyone aiming to build their cloud knowledge efficiently, without the extra fluff. Let AWS speak for itself—because once you understand how it works, it’s easy to see why it’s become the global leader in cloud technology. Learning outcomes: Understanding the basics of AWS infrastructure and services Learning how to launch a server on AWS Knowledge of data storage options and how to use them in AWS Understanding AWS security and how to implement it in your projects Learning deployment techniques and how to deploy a project on AWS This course is designed for individuals who want to learn about Amazon Web Services (AWS) and how to use its features to host and deploy applications. The course covers the fundamentals of AWS, including launching a server, data storage, security, and deployment. The course includes hands-on activities that allow learners to practice using AWS services and tools. By the end of the course, learners will have the knowledge and skills needed to build and deploy applications on AWS. Amazon Web Services (AWS) Course Curriculum Section 01: Introduction Section 02: Launching a Server Section 03: AWS - Data Storage Section 04: AWS - Java API Section 05: AWS - CLI Section 06: AWS - S3 Static Website Section 07: AWS - Security Section 08: AWS - Deployment Section 09: AWS - Security Continued How is the course assessed? Upon completing an online module, you will immediately be given access to a specifically crafted MCQ test. For each test, the pass mark will be set to 60%. Exam & Retakes: It is to inform our learners that the initial exam for this online course is provided at no additional cost. In the event of needing a retake, a nominal fee of £9.99 will be applicable. Certification Upon successful completion of the assessment procedure, learners can obtain their certification by placing an order and remitting a fee of __ GBP. £9 for PDF Certificate and £15 for the Hardcopy Certificate within the UK ( An additional £10 postal charge will be applicable for international delivery). CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Developers who want to learn how to host and deploy applications on AWS IT professionals who want to learn how to use AWS for infrastructure management Anyone who wants to learn about cloud computing and AWS services Requirements There are no formal entry requirements for the course, with enrollment open to anyone! Career path AWS Developer: £40,000 - £85,000 AWS Solutions Architect: £60,000 - £110,000 AWS DevOps Engineer: £50,000 - £95,000 Cloud Infrastructure Engineer: £40,000 - £90,000 IT Manager - Cloud Services: £50,000 - £100,000 Certificates Certificate of completion Digital certificate - £9 You can apply for a CPD Accredited PDF Certificate at the cost of £9. Certificate of completion Hard copy certificate - £15 Hard copy can be sent to you via post at the expense of £15.

Amazon Web Services (AWS) Course
Delivered Online On Demand9 hours
£12

VMware vSphere: Install, Configure, Manage [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Software Engineers Senior Software Engineers Java Developers DevOps Engineers Software Developers .NET Developers Systems Engineers Full Stack Developers Full Stack Java Developers Data Scientists Overview By the end of the course, you should be able to meet the following objectives: Describe the software-defined data center (SDDC) Explain the vSphere components and their function in the infrastructure Install and configure VMware ESXi™ hosts Deploy and configure VMware vCenter Server Appliance™ Use VMware vSphere Client™ to manage the vCenter Server inventory and the vCenter Server configuration Manage, monitor, back up, and protect vCenter Server Appliance Create virtual networks with vSphere standard switches Describe the storage technologies supported by vSphere Configure virtual storage using iSCSI and NFS storage Create and manage VMware vSphere VMFS datastores Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create a content library and deploy virtual machines from templates in the library Manage virtual machine resource use Migrate virtual machines with VMware vSphere vMotion and VMware vSphere Storage vMotion Create and manage a vSphere cluster that is enabled with VMware vSphere High Availability and VMware vSphere Distributed Resource Scheduler™ Discuss solutions for managing the vSphere life cycle Use VMware vSphere Update Manager™ to apply patches and perform upgrades to ESXi hosts and virtual machines This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere© 7, which includes VMware ESXi? 7 and VMware vCenter Server© 7. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most of the other VMware technologies in the software-defined data center Course Introduction Introductions and course logistics Course objectives Introduction to vSphere and the Software-Defined Data Center Explain basic virtualization concept Describe how vSphere fits into the software-defined data center and the cloud infrastructure Explain how vSphere interacts with CPUs, memory, networks, and storage Recognize the user interfaces for accessing the vCenter Server system and ESXi hosts Use VMware Host Client? to access and manage ESXi host Virtual Machines Create and remove a virtual machine Provision a virtual machine with virtual devices Identify the files that make up a virtual machine Explain the importance of VMware Tools vCenter Server Describe the vCenter Server architecture Discuss how ESXi hosts communicate with vCenter Server Deploy and configure vCenter Server Appliance Use the vSphere Client to manage the vCenter Server inventory Add data center, organizational objects, and hosts to vCenter Server Use roles and permissions to enable users to access objects in the vCenter Server inventory Back up vCenter Server Appliance Monitor vCenter Server tasks, events, and appliance health Use vCenter Server High Availability to protect a vCenter Server Appliance Configuring and Managing Virtual Networks Create and manage standard switches Describe the virtual switch connection types Configure virtual switch security, traffic-shaping and load-balancing policies Compare vSphere distributed switches and standard switches Configuring and Managing Virtual Storage Identify storage protocols and storage device types Discuss ESXi hosts using iSCSI, NFS, and Fibre Channel storage Create and manage VMFS and NFS datastores Explain how multipathing works with iSCSI, NFS, and Fibre Channel storage Deploy virtual machines on a VMware vSAN? datastore Virtual Machine Management Use templates and cloning to deploy new virtual machines Modify and manage virtual machines Create a content library and deploy virtual machines from templates in the library Dynamically increase the size of a virtual disk Use customization specification files to customize a new virtual machine Perform vSphere vMotion and vSphere Storage vMotion migrations Create and manage virtual machine snapshots Examine the features and functions of VMware vSphere© Replication? Resource Management and Monitoring Discuss CPU and memory concepts in a virtualized environment Describe what overcommitment of a resource means Describe methods for optimizing CPU and memory usage Use various tools to monitor resource use Create and use alarms to report certain conditions or events vSphere Clusters Describe options for making a vSphere environment highly available Explain the vSphere HA architecture Configure and manage a vSphere HA cluster Examine the features and functions of VMware vSphere© Fault Tolerance Configure a vSphere cluster using ESXi Cluster Quickstart Describe the functions of a vSphere DRS cluster Create a vSphere DRS cluster vSphere Lifecycle Management Describe how VMware vSphere© Lifecycle Manager? works Use vSphere Lifecycle Manager to update ESXi hosts in a cluster Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere: Install, Configure, Manage [v7.0] training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere: Install, Configure, Manage [v7.0] course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere: Install, Configure, Manage [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

Information Assurance (STIG) Overview (TT8800)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options

Information Assurance (STIG) Overview (TT8800)
Delivered OnlineFlexible Dates
Price on Enquiry

Cloudera Introduction to Machine Learning with Spark ML and MLlib

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Software Engineers Overview The objective of this course is to learn the key language concepts to machine learning, Spark MLlib, and Spark ML. This course will teach you the key language concepts to machine learning, Spark MLlib, and Spark ML. The course includes coverage of collaborative filtering, clustering, classification, algorithms, and data volume. This course will teach you the key language concepts to machine learning, Spark MLlib, and Spark ML. The course includes coverage of collaborative filtering, clustering, classification, algorithms, and data volume.

Cloudera Introduction to Machine Learning with Spark ML and MLlib
Delivered OnlineFlexible Dates
Price on Enquiry

iOS 8.0 Mobile Application Development Essentials

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Software Engineers Mobile Developers Overview The training is geared to build essential skills to develop professional applications for iOS 8.0 devices. The complete hands-on course will be delivered using Xcode 6. The 2 days of Objective-C and Swift training, at the start of the course is designed to allow developers , with a non-Objective C background, to jumpstart into iOS application development. The training is intended to lay a solid foundation in Apple's new programming language - Swift for development of next-generation iOS applications. The training is intended to lay a solid foundation in Apple's new programming language - Swift for development of next-generation iOS applications.

iOS 8.0 Mobile Application Development Essentials
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Developing Applications for Cisco Webex and Webex Devices v1.1 (DEVWBX)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for professionals in job roles such as: Communication engineers Project managers Network engineers Software engineers System architects The Developing Applications for Cisco Webex and Webex Devices (DEVWBX) v1.1 course prepares you to use the programmability features of Webex©, Cisco© enterprise solution for video conferencing, online meetings, online training, webinars, web conferencing, cloud calling, and collaboration. Through a combination of lessons and hands-on labs, you will learn about Webex Application Programming Interface (API) Foundation, meetings, devices, teams, messaging, embedding Cisco Webex, administration, and compliance. You will learn how to leverage Webex APIs to extend the functionalities of teams, meetings, and devices, and explore how these APIs can help automate, administer, and enforce compliance. This course prepares you for the 300-920 Developing Applications for Cisco Webex and Webex Devices (DEVWBX) exam. Introducing Webex APIs Foundations Webex as an Extensible Platform Building Cisco Webex Teams Applications Introduction to Webex Messaging Developing with Webex Meetings XML API Describe the Capabilities of Cisco Webex Meetings APIs Automating and Extending Cisco Collaboration Devices with xAPI Overview, Capabilities and Transport Methods for Cisco Endpoint Device Programmability Embedding Cisco Webex Benefits of Embedding Cisco Webex into Other Applications Managing Administration and Compliance with Cisco Webex APIs Administer a Cisco Webex Organization

Cisco Developing Applications for Cisco Webex and Webex Devices v1.1 (DEVWBX)
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Application Centric Infrastructure v1.2 (DCACI)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for network and software engineers who are interested in learning about automation and programmability and hold the following job roles: Network Designers Network Administrators Network Engineers Systems Engineers Data Center Engineers Consulting Systems Engineers Technical Solutions Architects Cisco Integrators/Partners Field Engineers Server Administrators Network Managers Storage Administrators Cisco Integrators and Partners Overview After completing the course, you should be able to: Describe Cisco ACI Fabric Infrastructure and basic Cisco ACI concepts Describe Cisco ACI policy model logical constructs Describe Cisco ACI basic packet forwarding Describe external network connectivity Describe VMM Integration Describe Layer 4 to Layer 7 integrations Explain Cisco ACI management features The Implementing Cisco Application Centric Infrastructure (DCACI) v1.2 course shows you how to deploy and manage the Cisco© Nexus© 9000 Series Switches in Cisco Application Centric Infrastructure (Cisco ACI©) mode. You will learn how to configure and manage Cisco Nexus 9000 Series Switches in ACI mode, how to connect the Cisco ACI fabric to external networks and services, and the fundamentals of Virtual Machine Manager (VMM) integration. You will gain hands-on practice implementing key capabilities such as fabric discovery, policies, connectivity, VMM integration, and more. This course earns you 40 Continuing Education (CE) credits towards recertification.This course helps prepare you for the following exam:300-620 Implementing Cisco Application Centric Infrastructure (DCACI) Introducing Cisco ACI Fabric Infrastructure and Basic Concepts What Is Cisco ACI? Cisco ACI Topology and Hardware Describing Cisco ACI Policy Model Logical Constructs Cisco ACI Logical Constructs Tenant Describing Cisco ACI Basic Packet Forwarding Endpoint Learning Basic Bridge Domain Configuration Knob Introducing External Network Connectivity Cisco ACI External Connectivity Options External Layer 2 Network Connectivity Introducing VMM Integration VMware vCenter VDS Integration Resolution Immediacy in VMM Describing Layer 4 to Layer 7 Integrations Service Appliance Insertion Without ACI L4-L7 Service Graph Service Appliance Insertion via ACI L4-L7 Service Graph Explaining Cisco ACI Management Out-of-Band Management In-Band Management

Cisco Implementing Cisco Application Centric Infrastructure v1.2 (DCACI)
Delivered OnlineFlexible Dates
Price on Enquiry

Docker Fundamentals Plus Enterprise Operations Bundle

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Software Engineers and DevOps professionals working in an Enterprise developing mission critical line of business applications. Overview By the end of this course, students will be able to: Assess the advantages of a containerized software development & deployment Use Docker engine features necessary for running containerized applications Utilize Swarm and Kubernetes orchestrators to deploy, maintain, and scale a distributed application Describe the essential patterns used in a highly distributed EE application Understand how to configure EE applications for different environments without code changes Produce and containerize scalable, accessible, and fault-tolerant EE applications Apply different debugging and testing techniques to containerized EE applications The Docker Fundamentals + Enterprise Operations Bundle includes the full Docker for Enterprise Operations course as well as the prerequisite Docker Fundamentals course run back to back in a single intensive training experience. The Docker Fundamentals training course features the foundational concepts and practices of containerization on a single Docker node. The course offers learners the opportunity to assimilate basic container orchestration and how to scale Docker across multiple nodes in a simple swarm cluster. This course provides essential foundational knowledge for subsequent Docker courses. As the follow-on to the Docker Fundamentals course, Docker for Enterprise Operations is a role-based course is designed for Docker Operations teams to accelerate their Docker journey in the enterprise. The course covers in-depth core advanced features of Docker EE and best practices to apply these features at scale with enterprise workloads. Platform Availability: Linux, Windows (Fundamentals Only). Introducing Docker Containerization Fundamentals Creating Images Docker Volumes Docker Networking Basics Introduction to Docker Compose Introduction to Swarm Mode Introduction to Kubernetes Secrets Fundamentals Signature Assignment Distributed Application Architecture Sample Application Edit and Continue Debugging Docker Compose Testing Service Discovery Defensive Programming Logging and Error Handling Health Checks Secrets Configuration Management Development Pipeline Overview Universal Control Plane Docker Trusted Registry Repository Automation Build Server

Docker Fundamentals  Plus Enterprise Operations Bundle
Delivered OnlineFlexible Dates
Price on Enquiry