Duration 5 Days 30 CPD hours This course is intended for This course is designed for application developers. Overview Deploy microservice applications on Red Hat© OpenShift Container Platform. Build a microservice application with Quarkus. Implement unit and integration tests for microservices. Use the config specification to inject data into a microservice. Secure a microservice using OAuth. Build and deploy native Quarkus applications. Develop microservice-based applications with Quarkus and OpenShift. Many enterprises are looking for a way to take advantage of cloud-native architectures, but many do not know the best approach. Quarkus is an exciting new technology that brings the reliability, familiarity, and maturity of Java Enterprise with a container-ready lightning fast deployment time. Red Hat Cloud-native Microservices Development with Quarkus (DO378) emphasizes learning architectural principles and implementing microservices based on Quarkus and OpenShift. You will build on application development fundamentals and focus on how to develop, monitor, test, and deploy modern microservices applications.. This course is based on OpenShift 4.5 and Quarkus 1.7L 1 - Describe microservice architectures Describe components and patterns of microservice-based application architectures. 2 - Implement a microservice with Quarkus Describe the specifications in Quarkus, implement a microservice with some of the specifications, and deploy it to an OpenShift cluster. 3 - Build microservice applications with Quarkus Build a persistent and configurable distributed quarkus microservices application. 4 - Implement fault tolerance Implement fault tolerance in a microservice architecture. 5 - Build and deploy native Quarkus applications Describe Quarkus in native mode and describe its deployment on OpenShift Container Platform. 6 - Test microservices Implement unit and integration tests for microservices. 7 - Create application health checks Create a health check for a microservice. 8 - Secure microservices Secure microservice endpoints and communication. 9 - Monitor microservices Monitor the operation of a microservice using metrics and distributed tracing. Additional course details: Nexus Humans Red Hat Cloud-native Microservices Development with Quarkus (DO378) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Cloud-native Microservices Development with Quarkus (DO378) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This is an intermediate-level programming course, designed for experienced .Net developers who wish to get up and running on developing well defended software applications. Real world programming experience with .Net is required. Overview Students who attend Attacking and Securing .Net Web Applications will leave the course armed with the skills required to recognize actual and potential software vulnerabilities and implement defenses for those vulnerabilities. This course begins by developing the skills required to fingerprint a web application and then scan it for vulnerabilities and bugs. Practical labs using current tools and techniques provide students with the experience needed to begin testing their own applications. Students also gain a deeper understanding of how attackers probe applications to understand the runtime environment as well as find potential weaknesses. This course the introduces developers to the most common security vulnerabilities faced by web applications today. Each vulnerability is examined from a .Net perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing effective defenses. Practical labs reinforce these concepts with real vulnerabilities and attacks. Students are then challenged to design and implement the layered defenses they will need in defending their own applications. There is an emphasis on the underlying vulnerability patterns since the technologies, use cases, and methods of attack as constantly changing. The patterns remain the same through all the change and flux. This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in secure web application development, coding and design, coupling the most current, effective techniques with the soundest industry practices. Our instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. This lab-intensive course provides hands-on .Net security training that offers a unique look at .Net application security. Beginning with penetration testing and hunting for bugs in .Net web applications, you thoroughly examine best practices for defensively coding web applications, covering all the OWASP Top Ten as well as several additional prominent vulnerabilities. You will repeatedly attack and then defend various assets associated with fully functional web applications and services, driving home the mechanics of how to secure .Net web applications in the most practical of terms. Bug Hunting Foundation Why Hunt Bugs? Safe and Appropriate Bug Hunting/Hacking Scanning Web Applications Scanning Applications Overview Moving Forward from Hunting Bugs Removing Bugs Foundation for Securing Applications Principles of Information Security Bug Stomping 101 Unvalidated Data Injection Broken Authentication Sensitive Data Exposure XML External Entities (XXE) Broken Access Control Bug Stomping 102 Security Misconfiguration Cross Site Scripting (XSS) Deserialization/Vulnerable Components Insufficient Logging and Monitoring Spoofing, CSRF, and Redirects Moving Forward with Application Security Applications: What Next? .NET Issues and Best Practices Making Application Security Real Time Permitting Topics Cryptography Overview .NET Cryptographic Services
Duration 5 Days 30 CPD hours This course is intended for The target audience for this textbook is all Oracle professionals, both business and systems professionals. Among the specific groups for whom this textbook will be helpful are: ? Business and non-IT professionals ? Application designers and database developers ? Business Intelligence (BI) analysts and consumers ? Database administrators ? Web server administrators Overview The first portion of this textbook considers the logical models upon which a relational database is based and the various configurations and environments in which you may work with the Oracle database. The next segment focuses on the actual SQL syntax for writing database queries. You will begin with the simplest of queries and then proceed onto moderately complex query scenarios. Finally, this textbook covers the DDL, DML and transaction control portions of the SQL language that allow one to create, maintain and manipulate application database objects and application data. This textbook takes a unique approach to SQL training in that it incorporates data modeling theory, relational database theory, graphical depictions of theoretical concepts and numerous examples of actual SQL syntax into one learning vehicle. Relational Databases & Data Models About Data Models About the Relational Model The Electronics Data Model About the Relational DBMS Selection & Setup of the Database Interface Considering Available Tools Selecting the Appropriate Tool Oracle Net Database Connections Oracle PAAS Database Connections Setup SQL Developer Setup SQL*Plus Setup Jdeveloper Using the Database Interface About Bind & Substitution Variables Using SQL Developer Using SQL*Plus Introduction to the SQL Language About the SQL Language Characteristics of SQL Introducing SQL Using Select SQL Rules The Select Statement The Select Statement Distinct/Unique Keyword Using Alias Names Restricting Results with the Where Clause About Logical Operators Equality Operator Boolean Operators REGEXP_LIKE() In Operator Sorting Data with the Order By Clause About the Order by Clause Multiple Column Sorts Specify the Sort Sequence About Null Values within Sorts Using Column Aliases Pseudo Columns, Functions & Top-N Queries Rowid Pseudo Column ORA_ROWSCN PSEUDO Column ROWNUM Pseudo Column About the Built-In Functions SYSDATE User & UID SESSIONTIMEZONE Function Using the Dual Table Row Limiting & Top-N Queries FETCH First x Rows Only Clause OFFSET x Rows Clause FETCH?PERCENT Clause The WITH TIES Option Joining Tables About Joins Inner Joins Reflexive Join Non-Key Join Outer Join Using the Set Operators About the Set Operators SQL Set Operator Examples UNION Example INTERECT Example MINUS Example UNION All Summary Functions Using Sub-Queries Finding Data with Sub-Queries Standard Sub-Queries Correlated Sub-Queries The EXISTS Operator Aggregating Data within Groups About Summary Groups Find Groups within the Tables Select Data From the Base Tables Select Groups from the Results Use DDL to Create & Manage Tables Create Table Statement Column Data Types Not Null Default Describe Alter Table Statement Drop Table Statement Table DDL Using SQL Developer Alter User Statement Alter Session Statement NLS_Language NLS_Date Use DML to Manipulate Data The Insert Statement The Delete Statement The Update Statement About Transactions Transaction Rollback Transaction Commit Transaction Savepoint The Set Transaction Statement Set Transaction Read Only Statement Rules Understanding the Data Models The Company Data Model The Electronics Data Model About the SQL-99 Standard SQL-92 & SQL-99 Cross Joins Natural Joins Inner Joins Implicit Inner Join Outer Joins Anti Joins Named Sub-Queries Enhancing Groups with Rollup & Cube Using Rollup The Grouping() Function Using Cube SQL Functions: Character Handling What are the SQL Functions? String Formatting Functions UPPER(), LOWER() Example INITCAP() Example Character Codes Functions CHR((), ASCII() Examples PAD & TRIM Functions RPAD() Example RTRIM() Example TRIM() Example String Manipulation Functions DECODE () Example SUBSTR() Example INSTR() Example TRANSLATE() Example REPLACE() Example String Comparison Functions LEAST() Example Phonetic Search Function SOUNDEX() Example SQL Functions: Numeric Handling About the Numeric Data Functions GREATEST() Example ABS() Example ROUND() Example TRUNC() Example SIGN() Example TO_NUMBER() Example & Data ype Conversions NULL VALUES FUNCTIONS NVL() & NVL2() Function NVL() Example (Character) NVL() Example (Numeric Loss of Data) NVL() Example (Numeric Output) NVL2() Example COALESCE() Function NULLIF() Function SQL Functions: Date Handling Date Formatting Functions TO_CHAR() & TO_DATE() Format Patterns TO_CHAR() Examples TO_DATE() Examples EXTRACT() Example Date Arithmetic Functions MONTHS_BETWEEN() Example ADD_MONTHS() Example LAST_DAY() Example NEXT_DAY() Example TRUNC(), ROUND() Dates Example NEW_ TIME() Example About V$TIMEZONE_NAMES CAST() FUNCTION & TIME ZONES Database Objects: About Database Objects About Database Objects About Schemas Making Object References Database Objects: Relational Views About Relations Views The Create View Statement Why Use Views? Accessing Views with DML Maintaining View Definitions Alter View Drop View DDL Using SQL Developer Database Objects: Indexes About Indexes Create & Drop Index Statements Indexes & Performance Data Dictionary Storage Database Objects: Creating Other Objects About Sequences Referencing NEXTVAL Referencing CURRVAL Within the DEFAULT Clause Alter Sequence & Drop Sequence ALTER SEQUENCE DROP SEQUENCE About Identity Columns CREATE TABLE?GENERATED AS IDENTITY ALTER TABLE?GENERATED AS IDENTITY Start With Limit Value ALTER TABLE...DROP IDENTITY About Synonyms CREATE & DROP SYNONYM Statements CREATE SYNONYM DROP SYNONYM Public Vs Private Synonyms CREATE SCHEMA AUTHORIZATION Database Objects: Object Management Using DDL The RENAME Statement TABLESPACE Placement CREATE TABLE?TABLESPACE The Comment Statement The TRUNCATE TABLE Statement Database Objects: Security About Object Security Grant Object Privileges Revoke Object Privileges Object Privileges & SQL Developer Data Integrity Using Constraints About Constraints NOT NULL Constraint NOT NULL Example CHECK Constraint UNIQUE Constraint PRIMARY KEY Constraint REFERENCES Constraint ON DELETE CASCADE Example ON DELETE SET NULL Example Constraints on Existing Tables Constraints & SQL Developer Managing Constraint Definitions RENAMING & DROPPING Constraints ENABLING & DISABLING Constraints DEFERRED Constraint Enforcement SET CONSTRAINTS Handling Constraint Exceptions Constraints with Views DATA Dictionary Storage The Data Dictionary Structure More About the Data Dictionary OBJECT-SPECIFIC Dictionary Views USER_UPDATABLE_COLUMNS The Dictionary Structure METADATA & SQL Developer Additional course details: Nexus Humans Oracle 12c SQL Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 12c SQL Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Feeling tight, tense, or just plain stuck? Yoga for Stiff Bodies Training was created to meet you right there—no flexibility required. This is not about touching your toes. It’s about giving your mind and body a chance to breathe, soften, and slow down. No one wants more pressure in their life, so Yoga for Stiff Bodies Training makes it easy, effortless, and entirely on your terms. With enrollment open now for a limited time, there’s never been a better moment to start moving toward comfort and calm—before this chance slips by. Description You don’t need to be bendy. You don’t need to be strong. You don’t need anything but a willingness to begin. Yoga for Stiff Bodies Training invites you to reconnect with yourself without judgment, rush, or effort that feels like work. This is a safe, simple way to unwind, mentally and physically. Whether you’re coming off years of inactivity or just carrying tension from long days, Yoga for Stiff Bodies Training offers a path to ease—without the guilt, grind, or overwhelm. With short, supportive sessions and a self-paced format, Yoga for Stiff Bodies Training adapts to your life. You don’t have to change everything. Just press play, take a breath, and start loosening more than just your body. Benefits ✅ Ease into movement with Yoga for Stiff Bodies Training, no pressure or flexibility required. ✅ Stress relief that meets you exactly where you are. ✅ Total self-paced control—no clocks, no pressure, no competition. ✅ Created for tight muscles and busy minds alike. ✅ Enjoy guilt-free progress on your own timeline. ✅ Affordable and built for daily life, not yoga studios. ✅ Lifelong access to Yoga for Stiff Bodies Training to revisit whenever you need. FAQ Q: What if I’m really inflexible or haven’t exercised in years? That’s exactly why Yoga for Stiff Bodies Training exists. It’s built for total beginners and stiff bodies. Q: Is this course strenuous or difficult? Not at all. Yoga for Stiff Bodies Training is intentionally gentle and low-effort to support both mind and body. Q: Can I skip days and still benefit? Yes! Yoga for Stiff Bodies Training is forgiving and flexible—do what you can, when you can. Q: Do I need yoga experience or gear? Nope. You only need a quiet space. Yoga for Stiff Bodies Training is as simple and approachable as it gets. N:B: This is not a Naked Yoga Course
Date: Thursday 15th June Time: 4pm Location: Studio A - Landor Road Event Details: Tim Haines is a television producer and director, having worked on several highly-respected documentary and drama productions over a storied career. Tim will speak about the following topics as well as others at the event: Approaches to Documentary How a Documentary Gets Made The Purpose of a Documentary Modern Combinations of CGI & Live Action Throughout students will have the chance to ask questions about the topics being discussed, before wrapping up with a wider Q+A session at the end. A multiple Emmy and BAFTA winner, Tim has worked on many well known series, including: - Walking with Dinosaurs - Director & Producer - Primeval - Producer - The Loch - Producer - Surviving Earth (currently in production) - Producer This is a free event that all students are welcome to attend. Be sure to book tickets in advance though so that you don't miss out!
What will you learn in this course? Understand without any difficulty everything heard or read and express yourselves in complex situations. Communicate with native speakers with ease. Understand the main ideas of abstract topics. Speak with clarity and argue on topics by presenting advantages and disadvantages. Deal with unexpected issues concerning your everyday life (problems related to home, work, friends and family). The main topics to be covered in this course are about feelings, telling stories, achievements, making decisions, advantages & disadvantages, media, greek culture and more.
What will you learn in this course? Deal with every day social and professional situations. Understand the main topics and some details of spoken or written language. Learn how to communicate and interact socially in formal situations. Become familiar with the greek culture. Deal with situations when you travel to places where the language is spoken. Write small paragraphs in order to describe experiences, events, dreams, and express your opinion. The main topics to be covered in this course are about society, telling stories, travelling, advantages & disadvantages, agreeing & disagreeing, the greek culture and more.
Beautiful, luxurious, and heartfelt. Temari are cherished gifts, symbolizing friendship and loyalty.
Are you passionate about creating unforgettable moments? Start your journey in the glamorous world of weddings with our comprehensive Wedding Planner Online Course. Whether you're dreaming of launching your own wedding planning business or seeking to enhance your event coordination skills, this course is designed to equip you with all the essential knowledge and expertise. Key Features: CPD Certified Free Certificate Developed by Specialist Lifetime Access In the Wedding Planner Online Course, learners will gain a comprehensive understanding of the wedding industry and the role of a wedding planner. They will learn how to start and manage their own wedding planning business, including crucial aspects like determining the wedding vision, venue selection, and theme development. Participants will master the skills needed to equip and decorate venues, manage wedding budgets effectively, and coordinate wedding attire, food, beverages, and cakes. They will also learn about arranging music, photography, and videography services, as well as creating detailed wedding day schedules. After the wedding, learners will understand how to manage post-wedding activities and conduct evaluations to ensure client satisfaction. This course equips learners with practical knowledge and skills essential for a successful career in wedding planning. Course Curriculum Module 01: Wedding Industry Overview Module 02: Profession of a Wedding Planner Module 03: Starting your Own Wedding Planning Business Module 04: The Vision, Venue, and Theme Determining Module 05: Setting the Stage Choosing, Equipping and Decorating Venue Module 06: Wedding Budgets Module 07: Wedding Attire Module 08: Food, Beverage and the Wedding Cake Module 09: Music, Photography and Videography Module 10: Wedding Day Details Module 11: Wedding Timelines Module 12: Post Wedding Activities and Evaluation Learning Outcomes Understand the wedding industry dynamics and market trends analysis. Describe the role and responsibilities of a professional wedding planner. Develop a business plan for starting a wedding planning venture. Plan and execute the selection of wedding themes and venues. Manage wedding budgets effectively and allocate resources optimally. Coordinate wedding day logistics and post-event evaluation procedures. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Individuals interested in planning weddings professionally. Event coordinators looking to specialize in wedding planning services. Entrepreneurs aiming to start their wedding planning business. Students pursuing a career in event management, focusing on weddings. Anyone passionate about organizing and managing wedding ceremonies. Career path Wedding Planner Wedding Coordinator Event Manager (specializing in weddings) Wedding Consultant Venue Manager (specializing in wedding venues) Wedding Stylist Certificates Digital certificate Digital certificate - Included Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.
Duration 2 Days 12 CPD hours This course is intended for This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of BIG-IP DNS systems. This course gives networking professionals a functional understanding of the BIG-IP DNS system as it is commonly used. The course covers configuration and ongoing management of the BIG-IP DNS system, and includes a combination of lecture, discussion, and hands-on labs. Module 1: Setting Up the BIG-IP System Introducing the BIG-IP System Initially Setting Up the BIG-IP System Archiving the BIG-IP Configuration Leveraging F5 Support Resources and Tools Provision the BIG-IP System and Confirm Network Configuration Module 2: Introducing the Domain Name System (DNS) and BIG-IP DNS Understanding the Domain Name System (DNS) Reviewing the Name Resolution Process Implementing BIG-IP DNS Using DNS Resolution Diagnostic Tools Module 3: Accelerating DNS Resolution Introducing DNS Resolution with BIG-IP DNS BIG-IP DNS Resolution Decision Flow Configuring BIG-IP DNS Listeners Resolving DNS Queries in the Labs (Lab Zone Records) Load Balancing Queries to a DNS Server Pool Accelerating DNS Resolution with DNS Cache Accelerating DNS Resolution with DNS Express Introducing Wide IPs Using Other Resolution Methods with BIG-IP DNS Integrating BIG-IP DNS into Existing DNS Environments Module 4: Implementing Intelligent DNS Resolutions Introducing Intelligent DNS Resolution Identifying Physical Network Components Identifying Logical Network Components Collecting Metrics for Intelligent Resolution Configuring Data Centers Configuring a BIG-IP DNS System as a Server Configuring a BIG-IP LTM System as a Server Establishing iQuery Communication between BIG-IP Systems Configuring a Non-F5 Server Defining Links and Routers Configuring Wide IP Pools Configuring Wide IPs Managing Object Status Using the Traffic Management Shell (TMSH) Module 5: Using LDNS Probes and Metrics Introducing LDNS Probes and Metrics Types of LDNS Probes Excluding an LDNS from Probing Configuring Probe Metrics Collection Module 6: Load Balancing Intelligent DNS Resolution Introducing Load Balancing on BIG-IP DNS Using Static Load Balancing Methods Round Robin Ratio Global Availability Static Persist Other Static Load Balancing Methods Using Dynamic Load Balancing Methods Round Trip Time Completion Rate CPU Hops Least Connections Packet Rate Kilobytes per Second Other Dynamic Load Balancing Methods Virtual Server Capacity Virtual Server Score Using Quality of Service Load Balancing Persisting DNS Query Responses Configuring GSLB Load Balancing Decision Logs Using Manual Resume Using Topology Load Balancing Module 7: Monitoring Intelligent DNS Resources Exploring Monitors Configuring Monitors Assigning Monitors to Resources Monitoring Best Practices Module 8: Advanced BIG-IP DNS Topics Implementing DNSSEC Setting Limits for Resource Availability Using iRules with Wide IPs Introducing Other Wide IP Types Implementing BIG-IP DNS Sync Groups Module 9: Final Configuration Projects Final Configuration Projects