Duration 2 Days 12 CPD hours Overview Install and initialize WEM and integrate into Citrix Virtual Apps and Desktops and Citrix DaaS. Configure WEM features to improve the end user environment and virtual resource consumption. Migrate an on-premises WEM deployment to WEM service Designed for experienced IT professionals, you will discover why WEM is the go-to system optimization and logon optimization solution for a Citrix deployment's app and desktop workloads. You will learn how to plan, build, rollout, and manage on-premises WEM or WEM service and how to integrate it into Citrix Virtual Apps and Desktops or Citrix DaaS. You will leave this course with a good understanding of how to manage additional solutions and features in your Citrix Virtual Apps and Desktop or Citrix DaaS site Module 1: Introduction to Workspace Environment Management (WEM) WEM Features and Benefits Module 2: Planning ? WEM Architecture and Component Communications WEM On-Premises Components and Deployments WEM Service Components and Deployments WEM Component Communication Workflows Module 3: Planning - WEM On-Premises Deployment Installation On-Premises WEM: Leading Practice Installation Prerequisites and Steps On-Premises WEM: ADMX Template Configuration Choosing a Security Principal to run the WEM Infrastructure Service Creating the WEM Database Running the WEM Infrastructure Service Configuration Utility On-Premises WEM: Agent Installation Module 4: Planning ? WEM Service Deployment Installation WEM On-Premises vs WEM Service WEM Service: Leading Practice Installation Prerequisites and Steps WEM Service: ADMX Template Configuration WEM Service: Agent Installation Module 5: Planning ? WEM Consoles and Initial Setup On-Premises WEM and WEM Service Consoles WEM Initial Setup Migrating GPO settings to WEM Module 6: Planning ? WEM System and Log On Optimization WEM System Optimization Overview WEM CPU Management WEM Memory Management Additional System Optimization Features WEM Log On Optimization Overview WEM Assigned Actions WEM Environmental Settings Citrix Profile Management In WEM Module 7: Planning ? WEM Security and Lockdown Features WEM Security Management Features Privilege Elevation and Process Hierarchy Control WEM Transformer Module 8: Planning - The WEM Agent WEM Settings Processing and WEM Agent Caches WEM Agent Integration with Citrix Virtual Apps and Desktops and Citrix DaaS Module 9: Planning ? WEM Monitoring, Reporting, and Troubleshooting WEM Monitoring and Reporting WEM Agent Troubleshooting WEM Service Troubleshooting Module 10: Planning ? Upgrading WEM and Migration to WEM Service Upgrading Workspace Environment Management WEM On-Premises Migration to WEM Service Module 11: Rolling Out a WEM Deployment WEM Agent User Options on Windows Desktops Module 12: Managing a WEM Deployment Measuring WEM Success Additional course details: Nexus Humans CWS-220 Citrix Workspace Environment Management Deployment and Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CWS-220 Citrix Workspace Environment Management Deployment and Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is as follows: Channel Partner System Engineers System Administrators Architects Security Professionals Overview Upon successful completion of this course, the student will gain the following knowledge:How to describe and position Cisco UmbrellaDiscuss Secure Internet Gateway and Ransomware ProtectionLearn about DNS & IP layer enforcement & Intelligent ProxyDescribe Command and control callback blockingDiscuss Threat IntelligenceCompare Umbrella PackagesUnderstand Roaming SecurityBasic understanding of Cisco Roaming ClientUnderstand how to use Cisco Umbrella Virtual ApplianceExplain the ease of Integrating Cisco Umbrella into Active DirectoryDiscuss Umbrella ReportingUnderstand Utilize Multi-Organization Tools Cisco Umbrella? is a cloud security platform that provides the first line of defense against threats on the Internet. Being able to understand and position how Cisco Umbrella? works and what are the features is the key focus of this 2-day Cisco© online IT class. Students who enter the course with a basic understanding of Cisco© products and IT solutions will be able to describe the Cisco Umbrella?, understand Secure Internet Gateway and Ransomware Protection, discuss Threat Intelligence, use Cisco© Roaming Client. Cisco Umbrella- Security Solution Discuss Security Internet Gateway Explain Ransomware Protection DNS & IP layer enforcement Intelligent Proxy Command & control callback blocking Threat Intelligence Umbrella Packages Implementing Cisco Umbrella Overview of Cisco Umbrella How do you Protect your network Review how to Point your DNS to Cisco Umbrella What are the custom policies? Discuss Intelligent Proxy Umbrella Policy Tester Policy Precedence Roaming Client Introduction to Umbrella Roaming Client Prerequisites Downloading and Installing Adding IP Layer Enforcement Status, States, and Functionality Virtual Appliances Internal Domains Umbrella Roaming Security AnyConnect: Cisco Umbrella Roaming Security Client Administrator Guide Cisco Umbrella Dashboard at a glance Cisco Certificate Import Virtual Appliance Setup Guide Discuss Deployment Guidelines How to Deploy the VAs Review via VMware Review via Hyper-V Understand Your VAs Local DNS Forwarding Overview of DNS Explain Sites and Internal Networks Sizing Active Directory Overview of Active Directory Discuss Up DNS Forwarding with your VAs Active Directory Environment Route DNS Traffic Communication Flow Multiple Active Directory and Umbrella Sites Reporting Overview Reporting Basics Understanding Security Categories Scheduled Reports: Overview Security Overview Report Activity Search Report Security Activity Report Destinations Report Identities Report Cloud Services Report Admin Audit Log Report Umbrella Multi-Org Overview Cisco Umbrella Multi-Org Overview Centralized Settings Centralized Reports: Service Status Centralized Reports: Cloud Services Additional course details: Nexus Humans Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering and Positioning Cisco Umbrella Operations (ADMUMB) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Experienced software developers who are already familiar with AWS services Overview In this course, you will learn how to: Analyze a monolithic application architecture to determine logical or programmatic break points where the application can be broken up across different AWS services Apply Twelve-Factor Application manifesto concepts and steps while migrating from a monolithic architecture Recommend the appropriate AWS services to develop a microservices based cloud-native application Use the AWS API, CLI, and SDKs to monitor and manage AWS services Migrate a monolithic application to a microservices application using the 6 Rs of migration Explain the SysOps and DevOps interdependencies necessary to deploy a microservices application in AWS The Advanced Developing on AWS course uses the real-world scenario of taking a legacy, on-premises monolithic application and refactoring it into a serverless microservices architecture. This three-day advanced course covers advanced development topics such as architecting for a cloud-native environment; deconstructing on-premises, legacy applications and repackaging them into cloud-based, cloud-native architectures; and applying the tenets of the Twelve-Factor Application methodology. Module 1: The cloud journey Common off-cloud architecture Introduction to Cloud Air Monolithic architecture Migration to the cloud Guardrails The six R?s of migration The Twelve-Factor Application Methodology Architectural styles and patterns Overview of AWS Services Interfacing with AWS Services Authentication Infrastructure as code and Elastic Beanstalk Demonstration: Walk through creating base infrastructure with AWS CloudFormation in the AWS console Hands-on lab 1: Deploy your monolith application using AWS Elastic Beanstalk Module 2: Gaining Agility DevOps CI/CD Application configuration Secrets management CI/CD Services in AWS Demonstration: Demo AWS Secrets Manager Module 3: Monolith to MicroServices Microservices Serverless A look at Cloud Air Microservices using Lambda and API Gateway SAM Strangling the Monolith Hands-on lab: Using AWS Lambda to develop microservices Module 4: Polyglot Persistence & Distributed Complexity Polyglot persistence DynamoDB best practices Distributed complexity Steps functions Module 5: Resilience and Scale Decentralized data stores Amazon SQS Amazon SNS Amazon Kinesis Streams AWS IoT Message Broker Serverless event bus Event sourcing and CQRS Designing for resilience in the cloud Hands-on lab: Exploring the AWS messaging options Module 6: Security and Observability Serverless Compute with AWS Lambda Authentication with Amazon Cognito Debugging and traceability Hands-on lab: Developing microservices on AWS Additional course details: Nexus Humans Advanced Developing on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Advanced Developing on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Data Protection Officers Data Protection Managers Auditors Legal Compliance Officers Security Manager Information Managers Anyone involved with data protection processes and programmes Overview Principles of Privacy Program Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organization through process and technology?regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP?s ANSI accredited Certified Information Privacy Manager (CIPM) certification program. Founded in 2000, the IAPP is the world?s largest and most comprehensive privacy resource with a mission to define, support and improve the Privacy profession globally. Every organization has data protection needs. Every day, we access, share and manage data across companies, continents and the globe. Knowing how to implement a privacy program is an invaluable skill that will help you protect your organization?s data?and take your career to the next level. Our Principles of Privacy Program Management training is the premier course on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a privacy team. Introduction to privacy program management Privacy program management responsibilities Accountability in privacy program management Privacy governance Considerations for developing and implementing a privacy program Position of the privacy function within an organization Role of the DPO Program scope and charter Privacy strategy Support and ongoing involvement of key functions and privacy frameworks Applicable laws and regulations The regulatory environment Common elements across jurisdictions Strategies for aligning compliance with organizational strategy Data assessments Practical processes for creating and using data inventories/maps Generating and applying gap analyses Privacy assessments Privacy impact assessments/data protection impact assessments Vendor assessments Policies Common types of privacy-related policies Policy components Strategies for implementation Data subject rights Operational considerations for communicating and ensuring data subject rights Privacy notice Choice and consent Access and rectification Data portability Erasure Training and awareness Developing privacy training and awareness programs Implementing privacy training and awareness programs Protecting personal information Holistic approach to protecting personal information Privacy by design Data breach incident plans Planning for a data security incident or breach Responding to a data security incident or breach Monitoring and auditing program performance Common practices for monitoring privacy program performance Measuring, analyzing and auditing privacy programs Additional course details: Nexus Humans Certified Information Privacy Manager (CIPM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Information Privacy Manager (CIPM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Are you looking to improve your current abilities or make a career move? Our unique AWS Essentials course might help you get there! Expand your expertise with high-quality training - study the AWS Essentials course and get an expertly designed, great-value training experience. Learn from industry professionals and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career through the online training course. The AWS Essentials course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the AWS Essentials course, an instant e-certificate will be exhibited in your profile that you can order as proof of your skills and knowledge. Add these amazing new skills to your resume and boost your employability by simply enrolling in this course. This AWS Essentials training can help you to accomplish your ambitions and prepare you for a meaningful career. So, join us today and gear up for excellence! Why Prefer Us? Opportunity to earn a certificate accredited by CPDQS. Get a free student ID card! (£10 postal charge will be applicable for international delivery) Innovative and Engaging Content. Free Assessments 24/7 Tutor Support. Take a step toward a brighter future! *** Course Curriculum *** Here is the curriculum breakdown of the AWS Essentials course: Section 01: AWS Foundations and Services Introduction10 So You Wanna Be An AWS Rock Star? What's In A Name?1 Ready, Set, Go Exploring the Management Console Creating an S3 Bucket Creating an EC2 Instance AWS Databases Other Cool Services Section 02: AWS Security and Costs IAMWhat? AWS Costs AWS Documentation AWS Certification Path Assessment Process Once you have completed all the modules in the AWS Essentials course, you can assess your skills and knowledge with an optional assignment. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this AWS Essentials course. This course is open to everybody. Requirements You will not need any prior background or expertise to enrol in this course. Career path After completing this course, you are to start your career or begin the next phase of your career. Certificates CPD Accredited Certificate Digital certificate - £10 CPD Accredited Certificate Hard copy certificate - £29 If you are an international student, then you have to pay an additional 10 GBP as an international delivery charge.
Our Aim Is Your Satisfaction! Offer Ends Soon; Hurry Up!! Every manager knows that one of the most important aspects of the role is to ensure that your team is working together in a way that facilitates maximum productivity. When a group feels motivated and has shared values and goals to work towards, great work can be accomplished. If you are a manager, supervisor or group leader, who wishes to gain a better understanding of the steps to effective team building, then this course is for you. Through this Team Building course, you will learn about the importance and benefits of teamwork, teaching you everything you need to know to foster a positive and productive working environment. This Team Building course also covers the steps to overcoming obstacles in teamwork such as conflict management, equipping you with the tools to motivate employees, provide constructive feedback and implement shared organisational goals. Key Topics to Be Covered by Team Building Course: The benefits of teamwork and the importance of fostering teamwork Teambuilding strategies and techniques for managers and leaders How to use games and activities in teambuilding Managing conflict and conflict resolution strategies How to foster a positive and productive working environment Tips for motivating employees and providing feedback Teambuilding skills every manager should have Mastering goal setting and introducing shared values The Team Building course is broken down into several in-depth modules to provide you with the most convenient and rich learning experience possible. Upon successful completion of the Team Building course, an instant e-certificate will be exhibited in your profile that you can order as proof of your skills and knowledge. Add these amazing new skills to your resume and boost your employability by simply enrolling in this Team Building course. This Team Building training can help you to accomplish your ambitions and prepare you for a meaningful career. So, join the Team Building course today and gear up for excellence! Start your learning journey straight away with this diploma and take a step toward a brighter future! Skills You Will Gain by This Diploma Team-building Business communication Goal-setting Motivation Leadership and management Why Prefer Us? Opportunity to earn a certificate accredited by CPDQS. Get a free student ID card! (£10 postal charge will be applicable for international delivery) Innovative and Engaging Content. Free Assessments 24/7 Tutor Support. *** Course Curriculum *** Here is the curriculum breakdown of the Team Building course: Module 01: What Are the Benefits? Better Communication and Conflict Resolution Effectiveness Motivation Camaraderie Module 02: Types Activities Games Activities Education Social Gatherings Module 03: Games Games for Introductions Games to Build Camaraderie Games for Problem-Solving Games to Stimulate Interaction Module 04: More Team Building Games Games to Build Trust Games to Motivate Games to Build Communication Games for Conflict Resolution Module 05: Activities Activities to Build Camaraderie Activities for Idea Sharing Activities to Build Trust Activities to Stimulate Interaction Module 06: More Team Building Activities Activities to Motivate Activities to Improve Working Together Activities to Build Communication Activities for Conflict Resolution Module 07: Social Gatherings Singing/Karaoke Dinner/Potlucks Physical Activities Meetings Module 08: Common Mistake Allowing Cliques to Develop Not Delegating Tasks Rewarding in Private/Criticizing in Public Disjointed Plans of Grandeur Module 09: Formatting a Plan Define the Goal Consult Team Members Research and Create Structure Keep It Fun Module 10: Evaluate Was the Goal Met? Was the Team Building Cohesive? What Did the Team Think of the Team Building? How Can the Team Building Be Improved for Next Time? Assessment Process Once you have completed the modules in the Team Building Diploma , your skills and knowledge will be tested with an automated multiple-choice assessment, after which you will receive instant results. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone interested in learning more about the topic is advised to take this course. This course is open to everybody. Career path This course is a must for managers and leaders looking to develop the essential skills to lead groups more effectively. It particularly applies to those in the following professions:
Duration 2 Days 12 CPD hours This course is intended for There is no specific prerequisite for the CDRP© course. However, participants who have at least three years' experience in a data centre and/or IT infrastructures will be best suited. Overview After completion of the course, the participant will be able to: 1. Understand the different standards and methodologies for risk management and assessment 2. Establish the required project team for risk management 3. Perform the risk assessment, identifying current threats, vulnerabilities and the potential impact based on customised threat catalogues 4. Report on the current risk level of the data centre both quantitative and qualitative 5. Anticipate and minimise potential financial impacts 6. Understand the options for handling risk 7. Continuously monitor and review the status of risk present in the data centre 8. Reduce the frequency and magnitude of incidents 9. Detect and respond to events when they occur 10. Meet regulatory and compliance requirements 11. Support certification processes such as ISO/IEC 27001 12. Support overall corporate and IT governance Introduction to Risk Management Risk management concepts Senior management and risk Enterprise Risk Management (ERM) Benefits of risk management Data Centre Risk and Impact Risk in facility, power, cooling, fire suppression, infrastructure and IT services Impact of data centre downtime Main causes of downtime Cost factors in downtime Standards, Guidelines and Methodologies ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013 NIST SP 800-30 ISO/IEC 31000:2009 SS507:2008 ANSI/TIA-942 Other methodologies (CRAMM, EBIOS, OCTAVE, etc.) Risk Management Definitions Asset Availability/Confidentiality/Integrity Control Information processing facility Information security Policy Risk Risk analysis/Risk assessment/Risk evaluation/ Risk treatment Threat/Vulnerability Types of risk Risk Assessment Software The need for software Automation Considerations Risk Management Process The risk management process Establishing the context Identification Analysis Evaluation Treatment Communication and consultation Monitoring and review Project Approach Project management principles Project management methods Scope Time Cost Cost estimate methods Context Establishment General considerations Risk evaluation, impact and acceptance criteria Severity rating of impact Occurrence rating of probability Scope and boundaries Scope constraints Roles & responsibilities Training, awareness and competence Risk Assessment - Identification The risk assessment process Identification of assets Identification of threats Identification of existing controls Identification of vulnerabilities Identification of consequences Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences Risk Assessment - Analysis and Evaluation Risk estimation Risk estimation methodologies Assessment of consequences Assessment of incident likelihood Level of risk estimation Risk evaluation Hands-on exercise: Assessment of consequences, probability and estimating level of risk Risk Treatment The risk treatment process steps Risk Treatment Plan (RTP) Risk modification Risk retention Risk avoidance Risk sharing Constraints in risk modification Control categories Control examples Cost-benefit analysis Control implementation Residual risk Communication Effective communication of risk management activities Benefits and concerns of communication Risk Monitoring and Review Ongoing monitoring and review Criteria for review Risk scenarios Risk assessment approach Data centre site selection Data centre facility Cloud computing UPS scenarios Force majeure Organisational shortcomings Human failure Technical failure Deliberate acts Exam: Certified Data Centre Risk Professional Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Duration 3 Days 18 CPD hours Overview In this course you?ll learn how to: Containerize and deploy a new Python script Configure the deployment with ConfigMaps, Secrets and SecurityContexts Understand multi-container pod design Configure probes for pod health Update and roll back an application Implement services and NetworkPolicies Use PersistentVolumeClaims for state persistence And more In this vendor agnostic course, you will use Python to build, monitor and troubleshoot scalable applications in Kubernetes. Introduction Objectives Who You Are The Linux Foundation Linux Foundation Training Preparing Your System Course Registration Labs Kubernetes Architecture What Is Kubernetes? Components of Kubernetes Challenges The Borg Heritage Kubernetes Architecture Terminology Master Node Minion (Worker) Nodes Pods Services Controllers Single IP per Pod Networking Setup CNI Network Configuration File Pod-to-Pod Communication Cloud Native Computing Foundation Resource Recommendations Labs Build Container Options Containerizing an Application Hosting a Local Repository Creating a Deployment Running Commands in a Container Multi-Container Pod readinessProbe livenessProbe Testing Labs Design Traditional Applications: Considerations Decoupled Resources Transience Flexible Framework Managing Resource Usage Multi-Container Pods Sidecar Container Adapter Container Ambassador Points to Ponder Labs Deployment Configuration Volumes Overview Introducing Volumes Volume Spec Volume Types Shared Volume Example Persistent Volumes and Claims Persistent Volume Persistent Volume Claim Dynamic Provisioning Secrets Using Secrets via Environment Variables Mounting Secrets as Volumes Portable Data with ConfigMaps Using ConfigMaps Deployment Configuration Status Scaling and Rolling Updates Deployment Rollbacks Jobs Labs Security Security Overview Accessing the API Authentication Authorization ABAC RBAC RBAC Process Overview Admission Controller Security Contexts Pod Security Policies Network Security Policies Network Security Policy Example Default Policy Example Labs Exposing Applications Service Types Services Diagram Service Update Pattern Accessing an Application with a Service Service without a Selector ClusterIP NodePort LoadBalancer ExternalName Ingress Resource Ingress Controller Labs Troubleshooting Troubleshotting Overview Basic Troubleshooting Steps Ongoing (Constant) Change Basic Troubleshooting Flow: Pods Basic Troubleshooting Flow: Node and Security Basic Troubleshooting Flow: Agents Monitoring Logging Tools Monitoring Applications System and Agent Logs Conformance Testing More Resource Labs Additional course details: Nexus Humans Kubernetes for App Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Kubernetes for App Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for This introductory-level Python course is geared for experienced web developers new to Python who want to use Python and Django for full stack web development projects. Overview Working in a hands-on learning environment, guided by our expert team, attendees will learn to: Develop full-stack web sites based on content stored in an RDMS Use python data types appropriately Define data models Understand the architecture of a Django-based web site Create Django templates for easy-to-modify views Map views to URLs Take advantage of the built-in Admin interface Provide HTML form processing Geared for experienced web developers new to Python, Introduction to Full Stack Web Development with Python and Django is a five-day hands-on course that teaches students how to develop Web applications using the Django framework. Students will explore the basics of creating basic applications using the MVC (model-view-controller) design pattern, as well as more advanced topics such as administration, session management, authentication, and automated testing. This comprehensive, practical course provides an in-depth exploration of working with the programming language, not an academic overview of syntax and grammar. Students will immediately be able to use Python to complete tasks in the real world. The Python Environment Starting Python Using the interpreter Running a Python script Getting help Editors and IDEs Getting Started Using variables Built in functions Strings Numbers Converting among types Writing to the screen Command line parameters Flow Control About flow control Conditional expressions Relational and Boolean operators while loops Lists and Tuples About sequences Lists and list methods Tuples Indexing and slicing Iterating through a sequence Sequence functions, keywords, and operators List comprehensions Working with Files File overview The with statement Opening a file Reading/writing files Dictionaries and Sets About dictionaries Creating and using dictionaries About sets Creating and using sets Functions Returning values Function parameters Variable Scope Sorting with functions Errors and Exception Handling Exception overview Using try/catch/else/finally Handling multiple exceptions Ignoring exceptions Modules and Packages Creating Modules The import statement Module search path Creating packages Classes About OO programming Defining classes Constructors Properties Instance methods and data Class/static methods and data Inheritance Django Architecture Django overview Sites and apps Shared configuration Minimal Django layout Built in flexibility Configuring a Project Executing manage.py Starting the project Generating app files App configuration Database setup The development server Using cookiecutter Creating models Defining models Related objects SQL Migration Simplel model access Login for Nothing and Admin for Free Setting up the admin user Using the admin interface Views What is a view HttpResponse URL route configuration Shortcut: get_object_or_404() Class-based views Templates About templates Variable lookups The url tag Shortcut: render() Querying Models QuerySets Field lookups Chaining filters Slicing QuerySets Related fields Q objects Advanced Templates Use Comments Inheritance Filters Escaping HTML Custom filters Forms Forms overview GET and POST The Form class Processing the form Widgets Validation Forms in templates Automated Testing Why create tests? When to create tests Using Django's test framework Using the test client Running tests Checking code coverage
Duration 4 Days 24 CPD hours This course is intended for This course is intended for the person who has responsibility for daily system operations. Overview Send, display, and respond to messages Use the online help and reference materials Monitor and control job queues, active jobs, and output queues Create and change user profiles Use authorization lists and group profiles Start and stop Power Systems with IBM i Manage system devices, user display stations, and printers Save and restore objects and libraries Monitor job and history logs Diagnose a system problem Order, receive, and install PTFs This course enables a new system operator to develop basic to intermediate level skills needed for day-to-day operations of the Power System with IBM i Power Systems and IBM i concepts and overview . Reference material and support . Overview of 5250 emulation and help . Overview of System i Navigator . Overview of IBM Navigator for i . Messaging concepts . Messaging with 5250 emulation . Messaging with System i Navigator . Messaging with IBM Navigator for i . CL command concepts . CL commands with 5250 emulation . Concepts: Object, library, and the IFS . Object management with 5250 emulation . Object management with System i Navigator . Object management with IBM Navigator for i . Introduction to work management . Work management with 5250 emulation . Job control with 5250 emulation . Job control with System i Navigator . Job control with IBM Navigator for i . Print concepts . Print control with 5250 emulation . Print control with System i Navigator . Print control with IBM Navigator for i . Starting and stopping the system . System security concepts . System security with 5250 emulation . System security with System i Navigator . System security with IBM Navigator for i . System configuration overview . Configuration with 5250 emulation . Configuration with System i Navigator . Configuration with IBM Navigator for i . Save concepts . Save with 5250 emulation . Save with System i Navigator . Save with IBM Navigator for i . Restore concepts and overview . Problem determination with 5250 emulation . Problem determination with System i Navigator . Overview of the PTF process . PTFs with 5250 Emulation . Class summary . Additional course details: Nexus Humans AS24 IBM System Operator Workshop for IBM i training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AS24 IBM System Operator Workshop for IBM i course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.