Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is as follows: Network Administrators Administrators interested in Automation Individuals interested in devops, specifically for networking Overview This course teaches students to blend Python skillsets with Ansible through the lens of automating networks. Automation techniques for the most popular vendor (incl. Cisco, Juniper, Arista) will be subjects of study, however, students may request examples from vendors within their own environments. Topics begin with a focus on automating networks with Python; this skill set is then folded into a broadening understanding of automating with Ansible. Students will have programmatic experience automating enterprise class networks by the conclusion of this course (includes writing custom Ansible modules with Python). Class is a combination of lecture, demonstration, and hands-on labs. Students are invited to share their own relevant Python and Ansible scripts with the instructor to ensure class subjects are as relevant as possible. All notes and scripts will be made available to students by the end of each day via a cloud-share or email. Lab time will be given reinforce that day's topics and demonstrations. No two networks are the same! Learn to automate your network with a Python and Ansible skillset. Course can be taught across all major (and most minor) network vendors. Course demonstrations can be adapted to best-fit the customer?s network to ensure all lessons have maximum relevance. Day 1 ? Critical Python Catchup & Review Overview of Python and Ansible Python white space rules & best practices Printing and more Printing Date types and Variables Packing and Unpacking Variables f Strings Conditional expressions Relational and Boolean operators Lists, Tuples, Dictionaries Indexing and slicing Built-in functions Iterating with Loops (for and while) Working with files Software Control Management (SCM) (Git, Github, Bitbucket, Cloudshare, etc.) Using Python to access REST interfaces Working with JSON Python, Ansible and Paramiko Using Paramiko to SSH with keys and passwords RESTful API review API keys Paramiko Review Using Paramiko to SFTP with keys and passwords Day 02 ? Python and Network Automation Introduction to Netmiko (automating routers and switches) Using Netmiko to send commands to / from network devices Working with YAML Converting JSON to YAML with Python Ansible keywords YAML and JSON for data exchange Ansible and YAML Ansible Playbook components Tying together Python and Ansible ? Using Python within Ansible Ansible Network Modules What is new in Ansible (most current updates / release notes) Network Agnostic modules Writing network playbooks Reviewing the construction of network playbooks Writing Ansible playbooks that respond to network failures Day 03 ? Blending Python and Ansible Skillsets Review how to use Python within Ansible Calling Python scripts with Ansible Jinja2 Templating Engine for Python (and Ansible) Using Templates in Ansible playbooks Jinja2 filters, looping, and other useful tricks for automating with Ansible Playbook tagging for selective runs When to use Python and when to use Ansible ?Big Picture? options for using Python & Ansible within your Network Ansible Roles Day 04 ? Customizing Ansible with Python Review ? Running Scripts with Ansible Prompting for Ansible user input Ansible Galaxy & Getting at Roles Writing a custom Ansible Module with Python Ansible ?Engine? vs Ansible ?Tower? ? marketing hype, capabilities, costs, etc. Case Study: Automate your Enterprise Network When to use Python and when to use Ansible Writing your own Ansible modules in Python ?Big Picture? options for using Python & Ansible within your Network Overview ? NETCONF / YANG and what they mean for Python and Ansible Molecule ? Testing your roles Additional course details: Nexus Humans Network Automation with Python and Ansible training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Network Automation with Python and Ansible course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is appropriate for anyone who wants to create applications or modules to automate and simplify common tasks with Perl. Overview Working within in an engaging, hands-on learning environment, guided by our expert web development, PHP practitioner, students will learn to: Create a working script that gets input from the command line, the keyboard, or a file Use arrays to store and process data from files Create formatted reports Use regular expressions Use the appropriate types of variables and data structures Refactor duplicate code into subroutines and modules What is available in the standard library Use shortcuts and defaults, and what they replace Introduction to Perl Programming Essentials is an Introductory-level practical, hands-on Perl scripting training course that guides the students from the basics of writing and running Perl scripts to using more advanced features such as file operations, report writing, the use of regular expressions, working with binary data files, and using the extensive functionality of the standard Perl library. Students will immediately be able to use Perl to complete tasks in the real world. Session: An Overview of Perl What is Perl? Perl is compiled and interpreted Perl Advantages and Disadvantages Downloading and Installing Perl Which version of Perl Getting Help Session: Creating and running Perl Programs Structure of a Perl program Running a Perl script Checking syntax and warnings Execution of scripts under Unix and Windows Session: Basic Data and I/O Numeric and Text literals Math operators and expressions Scalar variables Default values Writing to standard output Command line arguments Reading from the standard input Session: Logic and Loops About flow control The if statement and Boolean values Using unless and elsif Statement modifiers warn() and die() The conditional construct Using while loop and its variants Using the for loop Exiting from loops Session: Lists and Arrays The list data type Accessing array elements Creating arrays List interpolation Arrays and memory Counting elements Iterating through an array List evaluation Slices and ranges Session: Reading and writing text files File I/O Overview Opening a file Reading text files Writing to a text file Arrays and file I/O Using the <> operator Session: List functions Growing and shrinking arrays The split() function Splitting on whitespace Assigning to literal lists The join() function The sort() function Alternate sort keys Reversing an array Session: Formatting output Using sprintf() and printf() Report formatting overview Defining report formats The write() function Advanced filehandle magic Session: Hashes Hash overview Creating hashes Hash attributes Traversing a hash Testing for existence of elements Deleting hash elements Session: References What is a reference? The two ways to create references References to existing data References to anonymous data Dereferencing scalar, array, and ash references Dereferencing elements of arrays and hashes Multidimensional arrays and other data structures Session: Text and Regular Expressions String length The substr() function The index() and rindex() functions String replication Pattern matching and substitution Regular expressions Session: Raw file and data access Opening and closing raw (binary) files Reading raw data Using seek() and tell() Writing raw data Raw data manipulation with pack() and unpack() Session: Subroutines and variable scope Understanding packages Package and Lexical variables Localizing builtin variables Declaring and calling subroutines Calling subroutines Passing parameters and returning values Session: Working with the operating system Determining current OS Environment variables Running external programs User identification Trapping signals File test operators Working with files Time of day Session: Shortcuts and defaults Understanding $_ shift() with no array specified Text file processing Using grep() and Using map() Command-line options for file processing Session: Data wrangling Quoting in Perl Evaluating arrays Understanding qw( ) Getting more out of the <> operator Read ranges of lines Using m//g in scalar context The /o modifier Working with embedded newlines Making REs more readable Perl data conversion Session: Using the Perl Library The Perl library Old-style library files Perl modules Modules bundled with Perl A selection of modules Getting modules from ActiveState Getting modules from CPAN Using Getopt::Long Session: Some Useful Tools Sending and receiving files with Net::FTP Using File::Find to search for files and directories Grabbing a Web page Some good places to find scripts Perl man pages for more information Zipping and unzipping files
The Marketing Leaders Forum is a collective of senior marketers sharing best practice across different sectors.
Duration 5 Days 30 CPD hours This course is intended for This intermediate and beyond level course is geared for experienced technical professionals in various roles, such as developers, data analysts, data engineers, software engineers, and machine learning engineers who want to leverage Scala and Spark to tackle complex data challenges and develop scalable, high-performance applications across diverse domains. Practical programming experience is required to participate in the hands-on labs. Overview Working in a hands-on learning environment led by our expert instructor you'll: Develop a basic understanding of Scala and Apache Spark fundamentals, enabling you to confidently create scalable and high-performance applications. Learn how to process large datasets efficiently, helping you handle complex data challenges and make data-driven decisions. Gain hands-on experience with real-time data streaming, allowing you to manage and analyze data as it flows into your applications. Acquire practical knowledge of machine learning algorithms using Spark MLlib, empowering you to create intelligent applications and uncover hidden insights. Master graph processing with GraphX, enabling you to analyze and visualize complex relationships in your data. Discover generative AI technologies using GPT with Spark and Scala, opening up new possibilities for automating content generation and enhancing data analysis. Embark on a journey to master the world of big data with our immersive course on Scala and Spark! Mastering Scala with Apache Spark for the Modern Data Enterprise is a five day hands on course designed to provide you with the essential skills and tools to tackle complex data projects using Scala programming language and Apache Spark, a high-performance data processing engine. Mastering these technologies will enable you to perform a wide range of tasks, from data wrangling and analytics to machine learning and artificial intelligence, across various industries and applications.Guided by our expert instructor, you?ll explore the fundamentals of Scala programming and Apache Spark while gaining valuable hands-on experience with Spark programming, RDDs, DataFrames, Spark SQL, and data sources. You?ll also explore Spark Streaming, performance optimization techniques, and the integration of popular external libraries, tools, and cloud platforms like AWS, Azure, and GCP. Machine learning enthusiasts will delve into Spark MLlib, covering basics of machine learning algorithms, data preparation, feature extraction, and various techniques such as regression, classification, clustering, and recommendation systems. Introduction to Scala Brief history and motivation Differences between Scala and Java Basic Scala syntax and constructs Scala's functional programming features Introduction to Apache Spark Overview and history Spark components and architecture Spark ecosystem Comparing Spark with other big data frameworks Basics of Spark Programming SparkContext and SparkSession Resilient Distributed Datasets (RDDs) Transformations and Actions Working with DataFrames Spark SQL and Data Sources Spark SQL library and its advantages Structured and semi-structured data sources Reading and writing data in various formats (CSV, JSON, Parquet, Avro, etc.) Data manipulation using SQL queries Basic RDD Operations Creating and manipulating RDDs Common transformations and actions on RDDs Working with key-value data Basic DataFrame and Dataset Operations Creating and manipulating DataFrames and Datasets Column operations and functions Filtering, sorting, and aggregating data Introduction to Spark Streaming Overview of Spark Streaming Discretized Stream (DStream) operations Windowed operations and stateful processing Performance Optimization Basics Best practices for efficient Spark code Broadcast variables and accumulators Monitoring Spark applications Integrating External Libraries and Tools, Spark Streaming Using popular external libraries, such as Hadoop and HBase Integrating with cloud platforms: AWS, Azure, GCP Connecting to data storage systems: HDFS, S3, Cassandra, etc. Introduction to Machine Learning Basics Overview of machine learning Supervised and unsupervised learning Common algorithms and use cases Introduction to Spark MLlib Overview of Spark MLlib MLlib's algorithms and utilities Data preparation and feature extraction Linear Regression and Classification Linear regression algorithm Logistic regression for classification Model evaluation and performance metrics Clustering Algorithms Overview of clustering algorithms K-means clustering Model evaluation and performance metrics Collaborative Filtering and Recommendation Systems Overview of recommendation systems Collaborative filtering techniques Implementing recommendations with Spark MLlib Introduction to Graph Processing Overview of graph processing Use cases and applications of graph processing Graph representations and operations Introduction to Spark GraphX Overview of GraphX Creating and transforming graphs Graph algorithms in GraphX Big Data Innovation! Using GPT and Generative AI Technologies with Spark and Scala Overview of generative AI technologies Integrating GPT with Spark and Scala Practical applications and use cases Bonus Topics / Time Permitting Introduction to Spark NLP Overview of Spark NLP Preprocessing text data Text classification and sentiment analysis Putting It All Together Work on a capstone project that integrates multiple aspects of the course, including data processing, machine learning, graph processing, and generative AI technologies.
Duration 3 Days 18 CPD hours This course is intended for Blockchain Architects Blockchain DevelopersApplication Developers Blockchain System AdministratorsNetwork Security Architects Cyber Security ExpertsIT Professionals w/cyber security experience Overview Those who attend the Security for Blockchain Professionals course and pass the exam certification will have a demonstrated knowledge of:Identifying and differentiating between security threats and attacks on a Blockchain network.Blockchain security methods, best practices, risk mitigation, and more.All known (to date) cyber-attack vectors on the Blockchain.Performing Blockchain network security risk analysis.A complete understanding of Blockchain?s inherent security features and risks.An excellent knowledge of best security practices for Blockchain System/Network Administrators.Demonstrating appropriate Blockchain data safeguarding techniques. This course covers all known aspects of Blockchain security that exist in the Blockchain environment today and provides a detailed overview of all Blockchain security issues, including threats, risk mitigation, node security integrity, confidentiality, best security practices, advanced Blockchain security and more. Fundamental Blockchain Security Cryptography for the Blockchain Hash Functions Public Key Cryptography Elliptic Curve Cryptography A Brief Introduction to Blockchain The Blocks The Chains The Network Promises of the Blockchain Blockchain Security Assumptions Digital Signature Security Hash Function Security Limitations of Basic Blockchain Security Public Key Cryptography Review Real-Life Public Key Protection Cryptography and Quantum Computers Lab 1 (Tentative) Finding Hash Function Collisions Reversible hash function Hash function with poor non-locality Hash function with small search space Breaking Public Key Cryptography Brute Forcing a Short Private Key Brute Forcing a Poorly-Chosen Private Key Consensus in the Blockchain Blockchain Consensus and Byzantine Generals Blockchain Networking Review Byzantine Generals Problem Relation to Blockchain Byzantine Fault Tolerance Introduction to Blockchain Consensus Security Blockchain Consensus Breakthrough Proof of Work What is Proof of Work? How does Proof of Work Solve BGP? Proof of Work Security Assumptions Attacking Proof of Work Proof of Stake What is Proof of Stake? How does Proof of Stake Solve BGP? Proof of Stake Security Assumptions Attacking Proof of Stake General Attacks on Blockchain Consensus Other Blockchain Consensus Algorithms Lab 2 (Tentative) Attacking Proof of Work Performing a 51% Attack Performing a Selfish Mining Attack Attacking Proof of Stake Performing a XX% Attack Performing a Long-Range Attack Malleable Transaction Attacks Advanced Blockchain Security Mechanisms Architectural Security Measures Permissioned Blockchains Checkpointing Advanced Cryptographic Solutions Multiparty Signatures Zero-Knowledge Proofs Stealth Addresses Ring Signatures Confidential Transactions Lab 3 (Tentative) Permissioned Blockchains 51% on a Checkpointed Blockchain Data mining on a blockchain with/without stealth addresses Zero-Knowledge Proof Simulation Trying to fake knowledge of a ZKP Module 4: Blockchain for Business Introduction to Ethereum Security What is Ethereum Consensus in Ethereum Smart Contracts in Ethereum Ethereum Security Pros and Cons of Ethereum Blockchains Introduction to Hyperledger Security What is Hyperledger Consensus in Hyperledger Smart Contracts in Hyperledger Hyperledger Security Pros and Cons of Hyperledger Blockchains Introduction to Corda Security What is Corda Consensus in Corda Smart Contracts in Corda Corda Security Pros and Cons of Corda Blockchains Lab 4 Blockchain Risk Assessment What are the Risks of the Blockchain? Information Security Information Sensitivity Data being placed on blockchain Risks of disclosure Regulatory Requirements Data encryption Data control PII protection Blockchain Architectural Design Public and Private Blockchains Open and Permissioned Blockchains Choosing a Blockchain Architecture Lab 5 Exploring public/private open/permissioned blockchains? Basic Blockchain Security Blockchain Architecture User Security Protecting Private Keys Malware Update Node Security Configuring MSPs Network Security Lab 6 (TBD) Smart Contract Security Introduction to Smart Contracts Smart Contract Security Considerations Turing-Complete Lifetime External Software Smart Contract Code Auditing Difficulties Techniques Tools Lab 7 (Tentative) Try a couple of smart contract code auditing tool against different contracts with built-in vulnerabilities Module 8: Security Implementing Business Blockchains Ethereum Best Practices Hyperledger Best Practices Corda Best Practices Lab 8 Network-Level Vulnerabilities and Attacks Introduction to Blockchain Network Attacks 51% Attacks Denial of Service Attacks Eclipse Attacks Routing Attacks Sybil Attacks Lab 9 Perform different network-level attacks System-Level Vulnerabilities and Attacks Introduction to Blockchain System Vulnerabilities The Bitcoin Hack The Verge Hack The EOS Vulnerability Lab 10 Smart Contract Vulnerabilities and Attacks Introduction to Common Smart Contract Vulnerabilities Reentrancy Access Control Arithmetic Unchecked Return Values Denial of Service Bad Randomness Race Conditions Timestamp Dependence Short Addresses Lab 11 Exploiting vulnerable smart contracts Security of Alternative DLT Architectures What Are Alternative DLT Architectures? Introduction to Directed Acyclic Graphs (DAGs) DAGs vs. Blockchains Advantages of DAGs DAG Vulnerabilities and Security Lab 12 Exploring a DAG network
Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs Module 1: Introduction The real story of AWS Well-Architected Framework Six advantages of the cloud Global infrastructure Module 2: The Simplest Architectures S3 Glacier Choosing your regions Hands-on lab: Static Website Module 3: Adding a Compute Layer EC2 Storage solutions for instances Purchasing options such as dedicated host vs instances Module 4: Adding a Database Layer Relational vs non-relational Managed databases RDS Dynamo DB Neptune Hands-on lab: Deploying a web application on AWS Module 5: Networking in AWS Part 1 VPC CIDR and subnets Public vs private subnets NAT and internet gateway Security groups Module 6: Networking in AWS Part 2 Virtual Private Gateway VPN Direct Connect VPC peering Transit Gateway VPC Endpoints Elastic Load Balancer Route 53 Hands-on lab: Creating a VPC Module 7: AWS Identity and Access Management (IAM) IAM Identity federation Cognito Module 8: Organizations Organizations Multiple account management Tagging strategies Module 9: Elasticity, High Availability, and Monitoring Elasticity vs inelasticity Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs Auto scaling Scaling databases Hands-on lab: Creating a highly available environment Module 10: Automation Why automate? CloudFormation AWS Quick Starts AWS Systems Manager AWS OpsWorks AWS Elastic Beanstalk Module 11: Deployment Methods Why use a deployment method? Blue green and canary deployment Tools to implement your deployment methods CI/CD Hands-on lab: Automating infrastructure deployment Module 12: Caching When and why you should cache your data Cloudfront Elasticache (Redis/Memcached) DynamoDB Accelerator Module 13: Security of Your Data Shared responsibility model Data classification Encryption Automatic data security Module 14: Building Decoupled Architecture Tight coupling vs loose coupling SQS SNS Module 15: Optimizations and Review Review questions Best practices Activity: Design and architecture - two trues and one lie Module 16: Microservices What is a microservice? Containers ECS Fargate EKS Module 17: Serverless Why use serverless? Lambda API Gateway AWS Step Functions Hands-on lab: Implementing a serverless architecture with AWS Managed Services Module 18: Building for Resilience Using managed services greatly increases resiliency Serverless for resiliency Issues with microservices to be aware of DDoS Hands-on lab: Amazon CloudFront content delivery and automating WAF rules Module 19: Networking in AWS Part 3 Elastic Network Adapter Maximum transmission units Global Accelerator Site to site VPN Transit Gateway Module 20: Understanding Costs Simple monthly calculator Right sizing your instances Price sensitive architecture examples Module 21: Migration Strategies Cloud migration strategies Planning Migrating Optimizing Hands-on lab: Application deployment using AWS Fargate Module 22: RTO/RPO and Backup Recovery Setup Disaster planning Recovery options Module 23: Final Review Architecting advice Service use case questions Example test questions Additional course details: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of the fundamentals of coding and basics of C++ and object-oriented programming concepts. This course is for Non-Developers, or anyone who wants to have a basic understanding of and learn how to code C++ applications and syntax Overview Companies are constantly challenged to keep their applications, development projects, products, services (and programmers!) up to speed with the latest industry tools, skills, technologies and practices to stay ahead in the ever-shifting markets that make up today's fiercely competitive business landscape. The need for application, web and mobile developers and coders is seemingly endless as technologies regularly change and grow to meet the modern needs of demanding industries and clients. C++ and Programming Basics for Non-Programmers is a five-day, basic-level training course geared for IT candidates who have little or no prior experience in computer programming. Throughout this gentle introduction to programming and C++, students will learn to create applications and libraries using C++ using best practices and sound OO development techniques for writing object-oriented programs in C++. Special emphasis is placed on object-oriented concepts and best practices throughout the training. Fundamentals of the Program Development Cycle Computer Architecture The Notion of Algorithms Source Code vs. Machine Code Compile-Time vs. Run-Time Software Program Architecture Standalone Client/Server Distributed Web-Enabled IDE (Interactive Development Environment) Concepts Looping Constructs Counter-Controlled Repetition Sentinel-Controlled Repetition Nested Control Constructs break and continue Statements Structured Programming Best Practices Writing Methods (Functions) Static vs. Dynamic Allocation Declaring Methods Declaring Methods with Multiple Parameters Method-Call Stack Scope of Declarations Argument Promotion and Casting Designing Methods for Reusability Method Overloading Arrays Purpose of Arrays Declaring and Instantiating Arrays Passing Arrays to Methods Multidimensional Arrays Variable-Length Argument Lists Using Command-Line Arguments Using Environment Variables Deeper Into Classes and Objects Controlling Access to Class Members Referencing the Current Object Using this Overloading Constructors Default and No-Argument Constructors Composition of Classes Garbage Collection and Destructors The finalize Method Static Class Members Defining Classes Using Inheritance Application Development Fundamentals Structure of a C++ Program Memory Concepts Fundamental Data Type Declarations Fundamental I/O Concepts Fundamental Operators Arithmetic Operators Logical Operators Precedence and Associativity Building and Deploying a C++ Program Superclasses and Subclasses Advantages of Using Inheritance protected Class Members Constructors in Subclasses Increasing Convenience by Using Polymorphism Purpose of Polymorphic Behavior The Concept of a Signature Abstract Classes and Methods final Methods and Classes Purpose of Interfaces Using and Creating Interfaces Common Interfaces of the C++ API Files and Streams Concept of a Stream Class File Sequential Access Object Serialization to/from Sequential Access Files Fundamental Searching and Sorting Introduction to Searching Algorithms Linear Search Binary Search Introduction to Sorting Algorithms Selection Sort Insertion Sort Merge Sort Fundamental Data Structures Dynamic Memory Allocation Linked Lists Stacks Queues Trees Exception Handling Types of Exceptions Exception Handling Overview Introduction to Classes and Objects Classes, Objects and Methods Object Instances Declaring and Instantiating a C++ Object Declaring Methods set and get Methods Initiating Objects with Constructors Primitive Types vs. Reference Types Flow Control Conditional Constructs Exception Class Hierarchy Extending Exception Classes When to Throw or Assert Exceptions Formatted Output printf Syntax Conversion Characters Specifying Field Width and Precision Using Flags to Alter Appearance Printing Literals and Escape Sequences Formatting Output with Class Formatter Strings, Characters and Regular Expressions Fundamentals of Characters and Strings String Class String Operations StringBuilder Class Character Class StringTokenizer Class Regular Expressions Regular Expression Syntax Pattern Class Matcher Class Fundamental GUI Programming Concepts Overview of Swing Components Displaying Text and Graphics in a Window Event Handling with Nested Classes GUI Event Types and Listener Interfaces Mouse Event Handling Layout Managers Additional course details: Nexus Humans C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C Plus Plus and Programming Basics for Non-Programmers (TTCP2000) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for This course is designed for a non-technical audience and doesn't require any prior coding or technical experience. The handson exercises will be done using pre-built OpenAI tools and interfaces that are user-friendly and easy to use. Overview Working in an interactive learning environment, led by our engaging expert, you will: Get comfortable with the basics of prompt engineering and discover how it can make a difference in various business tasks, such as enhancing customer support, creating content, and fine-tuning sales pitches. Develop the knack for crafting, refining, and perfecting prompts suited to specific business situations by understanding context, user intent, and what makes a prompt great. Learn how to smoothly incorporate prompt engineering solutions into your existing business workflows, including pinpointing the right processes, integrating with your current software, and keeping data privacy and security in check. Become proficient in advanced techniques and best practices in prompt engineering, like making use of APIs, customizing language models, and collaborating with your teammates across different departments. Keep up with the latest developments in prompt engineering and be ready to adapt to changing business needs and trends, ensuring that you stay relevant and continue to grow in the dynamic business world. Prompt engineering is the process of designing and refining input prompts to get desired output from advanced language models, such as OpenAI Codex or GPT-4. It involves creating effective questions or statements that guide the AI model to generate useful responses for a specific task or purpose, like enhancing customer support, generating content, and fine-tuning sales pitches, making it an essential skill set for a wide range of business applications. Quick Start to Prompt Engineering for Everyday Business Users is a one-day, workshop style hands-on course that where you'll learn how to create effective prompts, integrate prompt engineering solutions into existing workflows, and uncover advanced techniques and best practices. Guided by our engaging, expert instructor, you?ll experiment with innovative tools and develop practical skills that can be immediately applied to a variety of projects. Whether you're aiming to enhance customer interactions, simplify content creation, or refine internal communication, this immersive learning experience will equip you with the knowledge to make a meaningful impact on your organization. Introduction to Prompt Engineering Understand the fundamentals of prompt engineering and its applications in the business world. What is prompt engineering? Importance of prompt engineering in business Key concepts and terminology Examples of prompt engineering in business scenarios Overview of popular prompt engineering tools (e.g., OpenAI Codex, GPT-4) Activity: Hands-on exploration of prompt engineering tools: Participants will engage in a fun scavenger hunt activity, where they will experiment with different prompt engineering tools to answer a set of questions. Developing Effective Prompts Learn how to create and refine prompts for a variety of business applications. Anatomy of a good prompt Understanding context and user intent Techniques for prompt iteration and optimization Generating specific and creative responses Handling sensitive information and biases Activity: Prompt development workshop: Participants will practice developing and refining prompts in a collaborative, game-like environment, where they will compete to create the most effective prompts for given business scenarios. Integrating Prompt Engineering into Business Processes Discover how to incorporate prompt engineering solutions into existing workflows. Identifying business processes that can benefit from prompt engineering Integrating prompt engineering with existing software and tools Evaluating the success and impact of prompt engineering solutions Ensuring data privacy and security Scaling prompt engineering solutions across an organization Activity: Business process integration simulation: Participants will work in teams to create a plan for integrating a prompt engineering solution into a simulated business process, with a focus on creativity and practicality. Advanced Techniques and Best Practices Gain insights into advanced techniques and best practices for prompt engineering in a business context. Leveraging APIs for prompt engineering Customizing and fine-tuning language models Adapting to changing business requirements and trends Collaborating with cross-functional teams Staying up-to-date with prompt engineering advancements Activity: Advanced prompt engineering challenge: Participants will take part in a friendly competition, using advanced techniques to solve complex business-related prompt engineering challenges. Additional course details: Nexus Humans QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the QuickStart to Prompt Engineering for Everyday Business Users (TTAI2009) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is geared for attendees with solid Python skills who wish to learn and use basic machine learning algorithms and concepts Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Topics Covered: This is a high-level list of topics covered in this course. Please see the detailed Agenda below Getting Started & Optional Python Quick Refresher Statistics and Probability Refresher and Python Practice Probability Density Function; Probability Mass Function; Naive Bayes Predictive Models Machine Learning with Python Recommender Systems KNN and PCA Reinforcement Learning Dealing with Real-World Data Experimental Design / ML in the Real World Time Permitting: Deep Learning and Neural Networks Machine Learning Essentials with Python is a foundation-level, three-day hands-on course that teaches students core skills and concepts in modern machine learning practices. This course is geared for attendees experienced with Python, but new to machine learning, who need introductory level coverage of these topics, rather than a deep dive of the math and statistics behind Machine Learning. Students will learn basic algorithms from scratch. For each machine learning concept, students will first learn about and discuss the foundations, its applicability and limitations, and then explore the implementation and use, reviewing and working with specific use casesWorking in a hands-on learning environment, led by our Machine Learning expert instructor, students will learn about and explore:Popular machine learning algorithms, their applicability and limitationsPractical application of these methods in a machine learning environmentPractical use cases and limitations of algorithms Getting Started Installation: Getting Started and Overview LINUX jump start: Installing and Using Anaconda & Course Materials (or reference the default container) Python Refresher Introducing the Pandas, NumPy and Scikit-Learn Library Statistics and Probability Refresher and Python Practice Types of Data Mean, Median, Mode Using mean, median, and mode in Python Variation and Standard Deviation Probability Density Function; Probability Mass Function; Naive Bayes Common Data Distributions Percentiles and Moments A Crash Course in matplotlib Advanced Visualization with Seaborn Covariance and Correlation Conditional Probability Naive Bayes: Concepts Bayes? Theorem Naive Bayes Spam Classifier with Naive Bayes Predictive Models Linear Regression Polynomial Regression Multiple Regression, and Predicting Car Prices Logistic Regression Logistic Regression Machine Learning with Python Supervised vs. Unsupervised Learning, and Train/Test Using Train/Test to Prevent Overfitting Understanding a Confusion Matrix Measuring Classifiers (Precision, Recall, F1, AUC, ROC) K-Means Clustering K-Means: Clustering People Based on Age and Income Measuring Entropy LINUX: Installing GraphViz Decision Trees: Concepts Decision Trees: Predicting Hiring Decisions Ensemble Learning Support Vector Machines (SVM) Overview Using SVM to Cluster People using scikit-learn Recommender Systems User-Based Collaborative Filtering Item-Based Collaborative Filtering Finding Similar Movie Better Accuracy for Similar Movies Recommending movies to People Improving your recommendations KNN and PCA K-Nearest-Neighbors: Concepts Using KNN to Predict a Rating for a Movie Dimensionality Reduction; Principal Component Analysis (PCA) PCA with the Iris Data Set Reinforcement Learning Reinforcement Learning with Q-Learning and Gym Dealing with Real-World Data Bias / Variance Tradeoff K-Fold Cross-Validation Data Cleaning and Normalization Cleaning Web Log Data Normalizing Numerical Data Detecting Outliers Feature Engineering and the Curse of Dimensionality Imputation Techniques for Missing Data Handling Unbalanced Data: Oversampling, Undersampling, and SMOTE Binning, Transforming, Encoding, Scaling, and Shuffling Experimental Design / ML in the Real World Deploying Models to Real-Time Systems A/B Testing Concepts T-Tests and P-Values Hands-on With T-Tests Determining How Long to Run an Experiment A/B Test Gotchas Capstone Project Group Project & Presentation or Review Deep Learning and Neural Networks Deep Learning Prerequisites The History of Artificial Neural Networks Deep Learning in the TensorFlow Playground Deep Learning Details Introducing TensorFlow Using TensorFlow Introducing Keras Using Keras to Predict Political Affiliations Convolutional Neural Networks (CNN?s) Using CNN?s for Handwriting Recognition Recurrent Neural Networks (RNN?s) Using an RNN for Sentiment Analysis Transfer Learning Tuning Neural Networks: Learning Rate and Batch Size Hyperparameters Deep Learning Regularization with Dropout and Early Stopping The Ethics of Deep Learning Learning More about Deep Learning Additional course details: Nexus Humans Machine Learning Essentials with Python (TTML5506-P) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Machine Learning Essentials with Python (TTML5506-P) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek techniques for working with complex types of data resources. Overview Use Connector stages to read from and write to database tables Handle SQL errors in Connector stages Use Connector stages with multiple input links Use the File Connector stage to access Hadoop HDFS data Optimize jobs that write to database tables Use the Unstructured Data stage to extract data from Excel spreadsheets Use the Data Masking stage to mask sensitive data processed within a DataStage job Use the Hierarchical stage to parse, compose, and transform XML data Use the Schema Library Manager to import and manage XML schemas Use the Data Rules stage to validate fields of data within a DataStage job Create custom data rules for validating data Design a job that processes a star schema data warehouse with Type 1 and Type 2 slowly changing dimensions This course is designed to introduce you to advanced parallel job data processing techniques in DataStage v11.5. In this course you will develop data techniques for processing different types of complex data resources including relational data, unstructured data (Excel spreadsheets), and XML data. In addition, you will learn advanced techniques for processing data, including techniques for masking data and techniques for validating data using data rules. Finally, you will learn techniques for updating data in a star schema data warehouse using the DataStage SCD (Slowly Changing Dimensions) stage. Even if you are not working with all of these specific types of data, you will benefit from this course by learning advanced DataStage job design techniques, techniques that go beyond those utilized in the DataStage Essentials course. Accessing databases Connector stage overview - Use Connector stages to read from and write to relational tables - Working with the Connector stage properties Connector stage functionality - Before / After SQL - Sparse lookups - Optimize insert/update performance Error handling in Connector stages - Reject links - Reject conditions Multiple input links - Designing jobs using Connector stages with multiple input links - Ordering records across multiple input links File Connector stage - Read and write data to Hadoop file systems Demonstration 1: Handling database errors Demonstration 2: Parallel jobs with multiple Connector input links Demonstration 3: Using the File Connector stage to read and write HDFS files Processing unstructured data Using the Unstructured Data stage in DataStage jobs - Extract data from an Excel spreadsheet - Specify a data range for data extraction in an Unstructured Data stage - Specify document properties for data extraction. Demonstration 1: Processing unstructured data Data masking Using the Data Masking stage in DataStage jobs - Data masking techniques - Data masking policies - Applying policies for masquerading context-aware data types - Applying policies for masquerading generic data types - Repeatable replacement - Using reference tables - Creating custom reference tables Demonstration 1: Data masking Using data rules Introduction to data rules - Using the Data Rules Editor - Selecting data rules - Binding data rule variables - Output link constraints - Adding statistics and attributes to the output information Use the Data Rules stage to valid foreign key references in source data Create custom data rules Demonstration 1: Using data rules Processing XML data Introduction to the Hierarchical stage - Hierarchical stage Assembly editor - Use the Schema Library Manager to import and manage XML schemas Composing XML data - Using the HJoin step to create parent-child relationships between input lists - Using the Composer step Writing Hierarchical data to a relational table Using the Regroup step Consuming XML data - Using the XML Parser step - Propagating columns Topic 6: Transforming XML data - Using the Aggregate step - Using the Sort step - Using the Switch step - Using the H-Pivot step Demonstration 1: Importing XML schemas Demonstration 2: Compose hierarchical data Demonstration 3: Consume hierarchical data Demonstration 4: Transform hierarchical data Updating a star schema database Surrogate keys - Design a job that creates and updates a surrogate key source key file from a dimension table Slowly Changing Dimensions (SCD) stage - Star schema databases - SCD stage Fast Path pages - Specifying purpose codes - Dimension update specification - Design a job that processes a star schema database with Type 1 and Type 2 slowly changing dimensions Demonstration 1: Build a parallel job that updates a star schema database with two dimensions Additional course details: Nexus Humans KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM423 IBM InfoSphere DataStage v11.5 - Advanced Data Processing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.