Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others. Overview After completing this course, students will be able to:Describe the functionality of Windows PowerShell and use it to run and find basic commands.Identify and run cmdlets for server administration.Work with Windows PowerShell pipeline.Describe the techniques Windows PowerShell pipeline uses.Use PSProviders and PSDrives to work with other forms of storage.Query system information by using WMI and CIM.Work with variables, arrays, and hash tables.Write basic scripts in Windows PowerShell.Write advanced scripts in Windows PowerShell.Administer remote computers.Use background jobs and scheduled jobs.Use advanced Windows PowerShell techniques. This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows based servers. Getting Started with Windows PowerShell Overview and Background Understanding command syntax Finding commands Lab : Configuring Windows PowerShell Lab : Finding and Running Basic Commands Cmdlets for administration Active Directory administration cmdlets Network configuration cmdlets Other server administration cmdlets Lab : Windows Administration Working with the Windows PowerShell pipeline Understanding the Pipeline Selecting, Sorting, and Measuring Objects Filtering Objects Out of the Pipeline Enumerating Objects in the Pipeline Sending pipeline data as output Lab : Using the Pipeline Lab : Filtering Objects Lab : Enumerating Objects Lab : Sending output to a file Understanding How the Pipeline Works Passing the pipeline data Advanced considerations for pipeline data Lab : Working with Pipeline Parameter Binding Using PSProviders and PSDrives Using PSProviders Using PSDrives Lab : Using PSProviders and PSDrives Querying Management Information by Using WMI and CIM Understanding WMI and CIM Querying Data with WMI and CIM Making changes with WMI/CIM Lab : Working with WMI and CIM Working with variables, arrays, and hash tables Using variables Manipulating variables Manipulating arrays and hash tables Lab : Working with variables Basic scripting Introduction to scripting Scripting constructs Importing data from files Lab : Basic scripting Advanced scripting Accepting user input Overview of script documentation Troubleshooting and error handling Functions and modules Lab : Accepting data from users Lab : Implementing functions and modules Administering Remote Computers Using basic Windows PowerShell remoting Using advanced Windows PowerShell remoting techniques Using PSSessions Lab : Using basic remoting Lab : Using PSSessions Using Background Jobs and Scheduled Jobs Using Background Jobs Using Scheduled Jobs Lab : Using Background Jobs and Scheduled Jobs Using advanced Windows PowerShell techniques Creating profile scripts Using advanced techniques Lab : Practicing advanced techniques Lab : Practicing script development (optional)
Duration 5 Days 30 CPD hours This course is intended for The course provides an intensive hands-on experience for key system administration tasks with the goal of making the system administrator job-ready. Overview Administer the Oracle Solaris 11 Host on an Existing Network Administer Oracle Solaris Zones Control Access to Systems and Files Install Oracle Solaris 11 Operating System Administer User Accounts Administer System Processes and Schedule System Tasks Manage Data by Using ZFS Manage Boot and Shutdown of a System Administer Services by Using SMF Administer Software Packages by Using IPS and Manage Boot Environments Describe the use of IPS in packaging the Oracle Solaris OS Manage boot environments Updating the OS by using IPS The Oracle Solaris 11 System Administration training covers the full range of introductory system administration tasks on Oracle Solaris 11.3 OS. The topics covered range from installing the operating system on a single system, to monitoring and basic troubleshooting. The Oracle Solaris 11 System Administration course is designed to provide new system administrators, as well as enterprise system administrators who are new to the Oracle Solaris 11 Operating System, with the skills they need to perform their job tasks successfully and efficiently. Installing Oracle Solaris 11 Operating System Introduction to Oracle Solaris 11 OS Planning for Oracle Solaris 11 OS installation Installing Oracle Solaris 11 OS by Using the Live Media Installer Installing Oracle Solaris 11 OS Using the Text Installer Verifying the OS Installation Managing Boot and Shutdown of Systems Analyze the boot design and boot process Boot a SPARC-based system Boot an x86-based system Shut down a system Administering Services by Using SMF Describing SMF and its components Administering SMF Services Administering Software Packages by Using IPS and Managing Boot Environments Describing IPS, its components, and interfaces Configuring an IPS Client to Access the Local IPS Repository Managing Package Publishers Managing Software Packages Managing Signed Packages and Package Properties Describe the use of IPS in packaging the Oracle Solaris OS Manage boot environments Updating the OS by using IPS Managing Data by Using ZFS Introducing ZFS Administering ZFS Storage Pools Administering ZFS File Systems Administering ZFS Properties Administering ZFS Snapshots and Clones Administering the Network Reviewing Networking Fundamentals Administering Datalink Configuration Administering a Network Interface Administering Profile-Based Network Configuration Configuring a Virtual Network Verifying the Network Operations Managing Resources on the Virtual Network Administering Oracle Solaris Zones Introducing Oracle Solaris Zones Configuring an Oracle Solaris Zone Determining an Oracle Solaris Zone Configuration Controlling Access to Systems and Files Controlling Access to Systems Controlling Access to Files Securing Access to Remote Host Administering User Accounts Getting Started with the User Administration Setting Up User Accounts Maintaining User Accounts Configuring User Disk Quotas Managing System Processes and System Tasks Managing System Processes Scheduling System Administration Tasks
Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server and Windows Client administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of Windows PowerShell, or any scripting language, is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Exchange Server, SharePoint Server, SQL Server, System Center, and others. Overview After completing this course, students will be able to: Describe the functionality of Windows PowerShell and use it to run and find basic commands. Identify and run cmdlets for server administration. Work with Windows PowerShell pipeline. Describe the techniques Windows PowerShell pipeline uses. Use PSProviders and PSDrives to work with other forms of storage. Query system information by using WMI and CIM. Work with variables, arrays, and hash tables. Write basic scripts in Windows PowerShell. Write advanced scripts in Windows PowerShell. Administer remote computers. Use background jobs and scheduled jobs. Use advanced Windows PowerShell techniques. This course provides students with the fundamental knowledge and skills to use Windows PowerShell for administering and automating administration of Windows based servers. Getting Started with Windows PowerShell Overview and Background Understanding command syntax Finding commands Lab : Configuring Windows PowerShell Lab : Finding and Running Basic Commands Cmdlets for administration Active Directory administration cmdlets Network configuration cmdlets Other server administration cmdlets Lab : Windows Administration Working with the Windows PowerShell pipeline Understanding the Pipeline Selecting, Sorting, and Measuring Objects Filtering Objects Out of the Pipeline Enumerating Objects in the Pipeline Sending pipeline data as output Lab : Using the Pipeline Lab : Filtering Objects Lab : Enumerating Objects Lab : Sending output to a file Understanding How the Pipeline Works Passing the pipeline data Advanced considerations for pipeline data Lab : Working with Pipeline Parameter Binding Using PSProviders and PSDrives Using PSProviders Using PSDrives Lab : Using PSProviders and PSDrives Querying Management Information by Using WMI and CIM Understanding WMI and CIM Querying Data with WMI and CIM Making changes with WMI/CIM Lab : Working with WMI and CIM Working with variables, arrays, and hash tables Using variables Manipulating variables Manipulating arrays and hash tables Lab : Working with variables Basic scripting Introduction to scripting Scripting constructs Importing data from files Lab : Basic scripting Advanced scripting Accepting user input Overview of script documentation Troubleshooting and error handling Functions and modules Lab : Accepting data from users Lab : Implementing functions and modules Administering Remote Computers Using basic Windows PowerShell remoting Using advanced Windows PowerShell remoting techniques Using PSSessions Lab : Using basic remoting Lab : Using PSSessions Using Background Jobs and Scheduled Jobs Using Background Jobs Using Scheduled Jobs Lab : Using Background Jobs and Scheduled Jobs Using advanced Windows PowerShell techniques Creating profile scripts Using advanced techniques Lab : Practicing advanced techniques Lab : Practicing script development (optional)
Duration 5 Days 30 CPD hours This course is intended for This course is designed for: IT Professionals in the BC/DR or system administration domain, business continuity and disaster recovery consultants, individuals wanting to establish themselves in the field of IT business, continuity and disaster recovery, IT risk managers and consultants, and CISOs and IT directors. Before taking this course, some experience in the IT BC/DR domain is recommended. More info can be found here: https://www.eccouncil.org/wp-content/uploads/2017/05/edrpv3-brochure.pdf Overview EC-Council Disaster Recovery Professional (EDRP) is a comprehensive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. EDRP teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization's critical data in the aftermath of a disaster. EDRP provides the professionals with a strong understanding of business continuity and disaster recovery principles, including conducting business impact analysis, assessing of risks, developing policies and procedures, and implementing a plan. It also teaches professionals how to secure data by putting policies and procedures in place, and how to recover and restore their organization?s critical data in the aftermath of a disaster. The program is designed to provide much needed step-by-step guidance to attendees and then tests their knowledge through case studies. EDRPv3 addresses gaps in other BC/DR programs by providing helpful templates that are applied to BC/DR efforts in an enterprise. Course Outline Introduction to Disaster Recovery and Business Continuity Business Continuity Management (BCM) Risk Assessment Business Impact Analysis (BIA) Business Continuity Planning (BCP) Disaster Recovery Planning Process Data Backup Strategies Data Recovery Strategies Virtualization-Based Disaster Recovery System Recovery Centralized and Decentralized System Recovery BCP Testing, Maintenance, and Training Additional course details: Nexus Humans EC-Council Disaster Recovery Professional (EDRP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Disaster Recovery Professional (EDRP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced DataStage developers seeking training in more advanced DataStage job techniques and who seek an understanding of the parallel framework architecture. In this course, students will develop a deeper understanding of the DataStage architecture, including a deeper understanding of the DataStage development and runtime environments. Introduction to the Parallel Framework Architecture Describe the parallel processing architecture Describe pipeline and partition parallelism Describe the role of the configuration file Design a job that creates robust test data Compiling & Executing Jobs Describe the main parts of the configuration file Describe the compile process and the OSH that the compilation process generates Describe the role and the main parts of the Score Describe the job execution process Partitioning & Collecting Data Understand how partitioning works in the Framework Viewing partitioners in the Score Selecting partitioning algorithms Generate sequences of numbers (surrogate keys) in a partitioned, parallel environment Sorting Data Sort data in the parallel framework Find inserted sorts in the Score Reduce the number of inserted sorts Optimize Fork-Join jobs Use Sort stages to determine the last row in a group Describe sort key and partitioner key logic in the parallel framework Buffering in Parallel Jobs Describe how buffering works in parallel jobs Tune buffers in parallel jobs Avoid buffer contentions Parallel Framework Data Types Describe virtual data sets Describe schemas Describe data type mappings and conversions Describe how external data is processed Handle nulls Work with complex data Reusable Components Create a schema file Read a sequential file using a schema Describe Runtime Column Propagation (RCP) Enable and disable RCP Create and use shared containers Balanced Optimization Enable Balanced Optimization functionality in Designer Describe the Balanced Optimization workflow List the different Balanced Optimization options. Push stage processing to a data source Push stage processing to a data target Optimize a job accessing Hadoop HDFS file system Understand the limitations of Balanced Optimizations Additional course details: Nexus Humans KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the KM404 IBM InfoSphere Advanced DataStage - Parallel Framework (v11.5) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is for computer professionals involved with security compliance using CCS 11.0. Overview At the completion of the course, you will be able to: Describe current security risk and compliance challenges. Define methods of proactive security. Describe CCS 11 and how it helps meet security and compliance needs. Describe general CCS 11.0 pre-deployment considerations. Install CCS 11. Perform initial CCS configuration tasks. Import assets and common fields. Describe how to install CCS Agents. Perform data collection and evaluation. Describe the components of standards. Copy and edit standards. Evaluate collected data in terms of a standard. Describe compliance and risk scores. Manage exceptions. Create, edit, and map control statements. Use Controls Studio to eliminate duplication of controls. Describe mandates, policies, and control statements. Build queries to gather data quickly from assets. Add external data integration and configure data connectors. Use CCS reporting features. Create, edit, and manage dashboards. Investigate contingencies using a ?what if?? analysis in dynamic dashboards. This course focuses on defining security controls that govern the enterprise, assess compliance with standards and other mandates, and create reports and dashboards to demonstrate compliance and show deficiencies to multiple audiences. Introduction to CCS 11.0 Overview of Security and Compliance Proactive Security Into to CCS11 Implementing Security and Compliance with CCS 11.0 Installing the CCS Suite General pre-deployment considerations Pre-installation requirements Installation tasks Initial configuration Getting started tasks Preparing for data collection Getting started with CCS 11.0 Importing assets Installing a UNIX Agent Collecting and evaluating data Standards Manager/CVSS and Risk Score Working with standards Assessing compliance with standards Managing exceptions Controls Studio About Controls Studio Working with Controls Studio Ad hoc queries Query building Querying your enterprise External data integration Connecting to external data sources Overview of third-party connectors Reporting and dashboards Reporting overview Working with dynamic dashboards Additional course details: Nexus Humans Symantec Control Compliance Suite (CCS) 11.0 Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Control Compliance Suite (CCS) 11.0 Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for This course is for IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security of the ProxySG. Overview Solve common authentication and SSL issuesUnderstand the underlying architecture of SGOSMonitor and analyze ProxySG performanceUse policy tracing as a troubleshooting tool The ProxySG 6.6 Advanced Administration course is intended for IT professionals who wish to learn to master the advanced features of the ProxySG. Using Authentication Realms Describe the benefits of enabling authentication on the ProxySG Describe, at a high level, the ProxySG authentication architecture Understand the use of IWA realms, with both IWA Direct and IWA BCAAA connection methods Understanding Authentication Credentials Describe how NTLM and Kerberos authentication work in both IWA direct and IWA BCAAA deployments Configure the ProxySG to use Kerberos authentication Understanding Authentication Modes Describe authentication surrogates and authentication modes Describe ProxySG authentication in both explicit and transparent deployment mode Understanding HTTPS Describe key components of SSL encryption Describe how the SSL handshake works Describe some of the legal and security considerations related to use of the SSL proxy Managing SSL Traffic on the ProxySG Describe how the SSL proxy service handles SSL traffic Describe the standard keyrings that are installed by default on the ProxySG Identify the types of security certificates that the ProxySG uses Optimizing SSL Interception Performance Configure the ProxySG to process SSL traffic according to best practices for performance SGOS Architecture Identify key components of SGOS Explain the interaction among client workers and software workers in processing client requests Explain the significance of policy checkpoints Describe key characteristics of the SGOS storage subsystem Explain the caching behavior of the ProxySG Caching Architecture Describe the benefits of object caching on the ProxySG Explain the caching-related steps in a ProxySG transaction Identify and describe the HTTP request and response headers related to caching Describe, in general terms, how the ProxySG validates cached objects to ensure freshness Explain how the ProxySG uses cost-based deletion, popularity contests, and pipelining to improve object caching System Diagnostics Describe the use of the health monitor and health checks Explain the use of the event and access logs Describe the information available in advanced URLs and sysinfo files Describe the function of policy tracing and packet captures Introduction to Content Policy Language (CPL) Describe the fundamental concepts and purposes of ProxySG policy transactions Understand the relationship of layers, rules, conditions, properties, and triggers Describe the two types of actions in CPL Describe how to write, edit, and upload CPL code Using Policy Tracing for Troubleshooting Identify the two main types of ProxySG policy traces Describe the various sections of a policy trace result Configure a global and policy-driven trace Access and interpret policy trace results ProxySG Integration Identify other Symantec products that can be used as part of a complete security solution
Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, network administrators, and system integrators responsible for designing and implementing networking solutions Network and security professionals who work with enterprise and data center networks Overview By the end of the course, you should be able to meet the following objectives: Discuss the SD-WAN architecture and platform deployment model options Identify and describe the SD-WAN solution components Explain the interaction between the SD-WAN Edge, Orchestrator, and Gateway components Describe the SD-WAN Software-Defined Networking (SDN) approach, traffic, and network flows Explore SD-WAN core features and evaluate how these dramatically improve operational automation Use SD-WAN features to perform simple, agile, and secure SD-WAN operations Simplify branch infrastructure by inserting network services on the branch edge, in the cloud, or in the regional and enterprise data centers This course provides you with the knowledge, skills, and tools to achieve competency in deploying and managing the VMware SD-WAN by VeloCloud environment. In this course, you are introduced to workflows of various software-defined WAN constructs along with several operational tools that help you deploy and manage VMware SD-WAN by VeloCloud. Course Introduction Introductions and course logistics Course objectives Introduction to VMware SD-WAN Solution Revisit the traditional WAN technology, WAN topologies and downsides Explain the challenges solved by Secure Access Service Edge (SASE) and use cases List the components of the VMware SASE? solution Describe the VMware SD-WAN solution and list its capabilities VMware SD-WAN Components and Architecture Understand the architecture of the VMware SD-WAN solution and list all its components Explain the function of VMware SD-WAN Edges, Hub, Gateways, controllers, and Orchestrator Explain how the components of the VMware SD-WAN solution interact with each other Using VMware SD-WAN Orchestrator Describe key attributes of the VMware SD-WAN Orchestrator List primary features of the VMware SD-WAN Orchestrator Navigate the main menus of the VMware SD-WAN Orchestrator portal Deploy and Configure VMware SD-WAN Understand the deployment process of VMware SD-WAN components like VMware SD-WAN Edges, Hubs, Gateways, and more Understand the workflow of the VMware SD-WAN configuration List the optional network services that are supported by VMware and the steps to configure the same Understand the profiles and their application in the VMware SD-WAN infrastructure Describe the VMware SD-WAN Edge activation process Path and Traffic Management List the routing options supported by VMware SD-WAN: Static, BGP, OSPF Understand the Dynamic Multipath Optimization (DMPO) feature and its advantages Explain the Quality of Service and its configuration to manage traffic Securing VMware SD-WAN Environment Explain various options available to secure VMware SD-WAN environments. Understand the firewall capabilities and configuration Monitoring, Maintenance, and Troubleshooting List and understand the various features available to monitor the VMware SD-WAN infrastructure List and understand the various options available to troubleshoot and investigate issues in VMware SD-WAN
Duration 2 Days 12 CPD hours This course is intended for This course is for analysts, developers, and administrators of IBM Watson Explorer Deep Analytics Edition oneWEX. Overview Identify oneWEX platformsIdentify the process and data flows of oneWEX projectsExplore the oneWEX user interfaceExplain ingestion and conversionUtilize Content MinerDefine enrichmentIdentify advanced features of oneWEX This course is designed to teach students core concepts of IBM Watson Explorer Deep Analytics Edition oneWEX. Students will learn to identify the oneWEX platforms as well as the process flow and data flow of oneWEX projects. Students will explore oneWEX tools, such as Content Miner and the Admin Console, while gaining hands-on experience in data acquisition and enrichment. Finally, students will be exposed to more advanced topics, such as Application Builder, Content Analytics Studio, and API usage. Overview of oneWEX Introduction to oneWEX Explore oneWEX architecture Identify installation options Navigation in oneWEX Explore the Admin Console Explore navigation using Content Miner The Collection detail view The REST API Data flow Explore the data flow of oneWEX Search and Analytics collection templates Identify data acquisition Data ingestion Work with datasets Work with crawlers Use an importer Explore conversion Data ingestion log files Analysis using oneWEX Content Miner Explore analysis using Content Miner The Guided Analysis Experience The Guided Analysis view Explore Annotators Enrichment using Annotators Annotator types Enrichment using Labeler Identify enrichment Identify document classification Classify using training data Classification versus clustering The document classification process Enrichment using Ranker Identify enrichment using Ranker The ranking process Migrate annotators from Content Analytics Studio Migrate Content Analytics Studio annotators Identify the UIMA pipeline configuration for oneWEX Update annotators Using Application Builder with oneWEX Application Builder and user roles Explore Application Builder Set up a oneWEX data source Functionality for oneWEX data sources Additional course details: Nexus Humans O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the O3201 Fundamentals of IBM Watson Explorer Deep Analytics Edition oneWEX (V12.0.x) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 1 Days 6 CPD hours This course is intended for Individuals planning to deploy applications and create application environments on Google Cloud. Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview Identify the purpose and value of Google Cloud products and services. Interact with Google Cloud services. Describe ways in which customers have used Google Cloud. Choose among and use application deployment environments on Google Cloud: App Engine, Google Kubernetes Engine, and Compute Engine. Choose among and use Google Cloud storage options: Cloud Storage, Cloud SQL, Cloud Bigtable, and Firestore. Make basic use of BigQuery, Google's managed data warehouse for analytics. This course uses lectures, demos, and hands-on labs to give you an overview of Google Cloud products and services so that you can learn the value of Google Cloud and how to incorporate cloud-based solutions into your business strategies. Introducing Google Cloud Platform Explain the advantages of Google Cloud Platform. Define the components of Google's network infrastructure, including: Points of presence, data centers, regions, and zones. Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS). Getting Started with Google Cloud Platform Identify the purpose of projects on Google Cloud Platform. Understand the purpose of and use cases for Identity and Access Management. List the methods of interacting with Google Cloud Platform. Lab: Getting Started with Google Cloud Platform. Google Compute Engine and Networking Identify the purpose of and use cases for Google Compute Engine. Understand the basics of networking in Google Cloud Platform. Lab: Deploying Applications Using Google Compute Engine. Google Cloud Platform Storage Options Understand the purpose of and use cases for: Google Cloud Storage, Google Cloud SQL, and Google Cloud Bigtable. Learn how to choose between the various storage options on Google Cloud Platform. Lab: Integrating Applications with Google Cloud Storage. Google Container Engine Define the concept of a container and identify uses for containers. Identify the purpose of and use cases for Google Container Engine and Kubernetes. Introduction to Hybrid and Multi-Cloud computing (Anthos). Lab: Deploying Applications Using Google Container Engine. Google App Engine and Google Cloud Datastore Understand the purpose of and use cases for Google App Engine and Google Cloud Datastore. Contrast the App Engine Standard environment with the App Engine Flexible environment. Understand the purpose of and use cases for Google Cloud Endpoints. Lab: Deploying Applications Using App Engine and Cloud Datastore. Deployment and Monitoring Understand the purpose of template-based creation and management of resources. Understand the purpose of integrated monitoring, alerting, and debugging. Lab: Getting Started with Stackdriver and Deployment Manager. Big Data and Machine Learning Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. Lab: Getting Started with BigQuery. Summary and Review Summary and Review. What's Next?.