• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1589 Architecture courses delivered Online

Sustainable Landscape Design Architecture Online Course

By Study Plex

RECOGNISED ACCREDITATION This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. COURSE CURRICULUM Introduction Introduction 00:02:00 What is landscape design? 00:10:00 Environmental impact of landscapes 00:11:00 Landscapes and green buildings 00:12:00 Landscapes and sustainable interiors 00:05:00 Assessment Assessment - Sustainability Through Landscape Design 00:10:00 Certificate of Achievement Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00

Sustainable Landscape Design Architecture Online Course
Delivered Online On Demand
£19

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - INTRODUCTION TO ZERO TRUST AND BEST PRACTICE FRAMEWORKS * Zero Trust initiatives * Zero Trust technology pillars part 1 * Zero Trust technology pillars part 2 2 - DESIGN SOLUTIONS THAT ALIGN WITH THE CLOUD ADOPTION FRAMEWORK (CAF) AND WELL-ARCHITECTED FRAMEWORK (WAF) * Define a security strategy * Cloud Adoption Framework secure methodology * Design security with Azure Landing Zones * The Well-Architected Framework security pillar 3 - DESIGN SOLUTIONS THAT ALIGN WITH THE MICROSOFT CYBERSECURITY REFERENCE ARCHITECTURE (MCRA) AND MICROSOFT CLOUD SECURITY BENCHMARK (MCSB) * Design solutions with best practices for capabilities and controls * Design solutions with best practices for attack protection 4 - DESIGN A RESILIENCY STRATEGY FOR COMMON CYBERTHREATS LIKE RANSOMWARE * Common cyberthreats and attack patterns * Support business resiliency * Ransomware protection * Configurations for secure backup and restore * Security updates 5 - CASE STUDY: DESIGN SOLUTIONS THAT ALIGN WITH SECURITY BEST PRACTICES AND PRIORITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 6 - DESIGN SOLUTIONS FOR REGULATORY COMPLIANCE * Translate compliance requirements into a security solution * Address compliance requirements with Microsoft Purview * Address privacy requirements with Microsoft Priva * Address security and compliance requirements with Azure policy * Evaluate infrastructure compliance with Defender for Cloud 7 - DESIGN SOLUTIONS FOR IDENTITY AND ACCESS MANAGEMENT * Design cloud, hybrid and multicloud access strategies (including Azure AD) * Design a solution for external identities * Design modern authentication and authorization strategies * Align conditional access and Zero Trust * Specify requirements to secure Active Directory Domain Services (AD DS) * Design a solution to manage secrets, keys, and certificates 8 - DESIGN SOLUTIONS FOR SECURING PRIVILEGED ACCESS * The enterprise access model * Design identity governance solutions * Design a solution to secure tenant administration * Design a solution for cloud infrastructure entitlement management (CIEM) * Design a solution for privileged access workstations and bastion services 9 - DESIGN SOLUTIONS FOR SECURITY OPERATIONS * Design security operations capabilities in hybrid and multicloud environments * Design centralized logging and auditing * Design security information and event management (SIEM) solutions * Design solutions for detection and response * Design a solution for security orchestration, automation, and response (SOAR) * Design security workflows * Design threat detection coverage 10 - CASE STUDY: DESIGN SECURITY OPERATIONS, IDENTITY AND COMPLIANCE CAPABILITIES * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 11 - DESIGN SOLUTIONS FOR SECURING MICROSOFT 365 * Evaluate security posture for collaboration and productivity workloads * Design a Microsoft 365 Defender solution * Design configurations and operational practices for Microsoft 365 12 - DESIGN SOLUTIONS FOR SECURING APPLICATIONS * Design and implement standards to secure application development * Evaluate security posture of existing application portfolios * Evaluate application threats with threat modeling * Design security lifecycle strategy for applications * Secure access for workload identities * Design a solution for API management and security * Design a solution for secure access to applications 13 - DESIGN SOLUTIONS FOR SECURING AN ORGANIZATION'S DATA * Design a solution for data discovery and classification using Microsoft Purview * Design a solution for data protection * Design data security for Azure workloads * Design security for Azure Storage * Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR APPLICATIONS AND DATA * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough 15 - SPECIFY REQUIREMENTS FOR SECURING SAAS, PAAS, AND IAAS SERVICES * Specify security baselines for SaaS, PaaS, and IaaS services * Specify security requirements for web workloads * Specify security requirements for containers and container orchestration 16 - DESIGN SOLUTIONS FOR SECURITY POSTURE MANAGEMENT IN HYBRID AND MULTICLOUD ENVIRONMENTS * Evaluate security posture by using Microsoft Cloud Security Benchmark * Design integrated posture management and workload protection * Evaluate security posture by using Microsoft Defender for Cloud * Posture evaluation with Microsoft Defender for Cloud secure score * Design cloud workload protection with Microsoft Defender for Cloud * Integrate hybrid and multicloud environments with Azure Arc * Design a solution for external attack surface management 17 - DESIGN SOLUTIONS FOR SECURING SERVER AND CLIENT ENDPOINTS * Specify server security requirements * Specify requirements for mobile devices and clients * Specify internet of things (IoT) and embedded device security requirements * Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT * Specify security baselines for server and client endpoints * Design a solution for secure remote access 18 - DESIGN SOLUTIONS FOR NETWORK SECURITY * Design solutions for network segmentation * Design solutions for traffic filtering with network security groups * Design solutions for network posture management * Design solutions for network monitoring 19 - CASE STUDY: DESIGN SECURITY SOLUTIONS FOR INFRASTRUCTURE * Case study description * Case study answers * Conceptual walkthrough * Technical walkthrough ADDITIONAL COURSE DETAILS: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered Online5 days, Jul 29th, 13:00 + 1 more
£2380

50255 Managing Windows Environments with Group Policy

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for Enterprise network staff responsible for help desk support, system administration, and network design. Overview At Course Completion: - Features and functions of Group Policy - Use Group Policy management tools to manage security policies - Design a Group Policy infrastructure - Group Policy processing architecture - Back up, restore, import, and copy Group Policy Objects through the Group Policy - Management Console - Use Windows PowerShell to manage Group Policy - Implement security using Group Policy - Configure the desktop environment with Group Policy - Configure roaming profiles and Folder Redirection - Assign and publish software packages - Implement AppLocker and software restriction policies - Create and deploy Administrative Templates - Configure Group Policy preferences In this course, you will learn how to reduce costs and increase efficiencies in your network. You will discover how to consolidate the administration of an enterprise IT infrastructure with Group Policy, and you will learn to control and manage computer systems and domain users running Windows Server 2016 and Windows clients. Create Group Policies, implement administrative and security templates, and determine best practices when deploying software packages. Walk away with the experience and tools needed to optimize your enterprise systems and networks, implement administrative and security templates, and determine best practices when deploying software packages. 1 - INTRODUCTION TO CONFIGURATION MANAGEMENT * Configuration Management Overview * Configuration Management Using Group Policy * Group Policy Features Introduced with Later Versions of Windows * Using Windows PowerShell in the Configuration Management Process 2 - USING GROUP POLICY MANAGEMENT TOOLS * Local and Domain Policies * Using Group Policy Management Console * Understanding Group Policy Refresh 3 - DESIGNING A GROUP POLICY INFRASTRUCTURE * Design Stages for a Group Policy Infrastructure * Planning your Group Policy Design * Designing Your Group Policy Solution * Deploying Your Group Policy Solution * Managing Your Group Policy Solution 4 - UNDERSTANDING THE ARCHITECTURE OF GROUP POLICY PROCESSING * Group Policy Components in AD DS * Understanding the Group Policy Deployment Order * Modifying Group Policy Processing 5 - TROUBLESHOOTING AND BACKING UP GPOS * Using Group Policy Troubleshooting Tools * Integration of RSoP Functionality * Group Policy Logging Options * Backing Up, Restoring, Importing, and Copying GPOs * Building Migration Tables 6 - SECURING WINDOWS USING GROUP POLICY * Exploring the Windows Security Architecture * Securing User Accounts * Exploring Security Policies * Windows Firewall with Advanced Security * Implementing Domain Security * Security Policy Options for Window Client and Windows Server 7 - IMPLEMENTING APPLICATION SECURITY USING GROUP POLICY * Managing UAC Settings * Defending Against Malware * Using AppLocker to Restrict Software * Implementing Windows App Security Settings 8 - CONFIGURING THE DESKTOP ENVIRONMENT WITH GROUP POLICY * Exploring Script Types and Controlling Script Execution * Defining the Desktop, Start Menu, and Taskbar Settings * Defining the Control Panel Settings * Defining the Windows Components Settings * Configuring the Printer Management and Pruning Settings * Defining the Network Settings * Discovering the new Group Policy Settings 9 - IMPLEMENTING USER STATE VIRTUALIZATION * Configuring Folder Redirection * Managing Offline Files * Implementing User Experience Virtualization * OneDrive for Business 10 - ASSIGNING AND PUBLISHING SOFTWARE PACKAGES * Using MSI Packages to Distribute Software * Using Group Policy as a Software Deployment Method * Deploying Software * Setting Up Distribution Points * Using the Systems Center Configuration Manager to Distribute Software 11 - CONFIGURATION MANAGEMENT WITH WINDOWS POWERSHELL * Introducing Windows PowerShell * Using Windows PowerShell * Writing PowerShell Scripts * Windows PowerShell Library for Group Policy * Windows PowerShell-Based Logon Scripts 12 - IMPLEMENTING POWERSHELL DESIRED STATE CONFIGURATION * Introducing Group Policy Preferences * Comparing Preferences and Policy Settings * Options for Applying Preferences * Configure Preference Settings 13 - CONFIGURING GROUP POLICY PREFERENCES * Introducing Group Policy Preferences * Comparing Preferences and Policy Settings * Options for Applying Preferences * Configuring Preferences Settings ADDITIONAL COURSE DETAILS: Nexus Humans 50255 Managing Windows Environments with Group Policy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 50255 Managing Windows Environments with Group Policy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

50255 Managing Windows Environments with Group Policy
Delivered Online6 days, Aug 19th, 13:00 + 2 more
£2975

Construction Management, Architecture, Surveying, Interior design & Construction Safety

By NextGen Learning

Get ready for an exceptional online learning experience with the Construction Management, Architecture, Surveying, Interior design & Construction Safety bundle! This carefully curated collection of 20 premium courses is designed to cater to a variety of interests and disciplines. Dive into a sea of knowledge and skills, tailoring your learning journey to suit your unique aspirations. The Construction Management, Architecture, Surveying, Interior Design & Construction Safety is a dynamic package, blending the expertise of industry professionals with the flexibility of digital learning. It offers the perfect balance of foundational understanding and advanced insights. Whether you're looking to break into a new field or deepen your existing knowledge, the Construction Management package has something for everyone. As part of this package, you will receive complimentary PDF certificates for all courses in this bundle at no extra cost. Equip yourself with the Construction Management bundle to confidently navigate your career path or personal development journey. Enrol today and start your career growth! This Bundle Comprises the Following CPD Accredited Courses: 1. Construction Management 2. CDM Awareness Training Course 3. Architectural Studies 4. Construction Cost Estimation 5. Road Construction & Structural Drawing Like Expert 6. Building Surveyor Training 7. Land Surveying 8. Site Management Safety Training Scheme (SMSTS) 9. LEED V4 - Building Design and Construction 10. WELL Building Standard 11. Revit Architecture Ultimate Interior Design Course 12. Revit Architecture Ultimate Exterior Design for Beginners 13. Revit Architecture Advanced Interior Design Training 14. Property Law 15. Intermediate Solidworks Course 16. Finite Element Analysis Using Solidworks 17. Solidworks: Beginner to Advanced 18. Construction Safety 19. Ladder Safety 20. Working at Height Level 2 Learning Outcome: * Gain comprehensive insights into multiple fields. * Foster critical thinking and problem-solving skills across various disciplines. * Understand industry trends and best practices through the Construction Management Bundle. * Develop practical skills applicable to real-world situations. * Enhance personal and professional growth with the Construction Management Bundle. * Build a strong knowledge base in your chosen course via thisbundle. * Benefit from the flexibility and convenience of online learning. * With the Construction Management package, validate your learning with a CPD certificate. Each course in this bundle holds a prestigious CPD accreditation, symbolising exceptional quality. The materials, brimming with knowledge, are regularly updated, ensuring their relevance. This bundle promises not just education but an evolving learning experience. Engage with this extraordinary collection, and prepare to enrich your personal and professional development. Embrace the future of learning with the Construction Management, Architecture, Surveying, Interior Design & Construction Safety, a rich anthology of 20 diverse courses. Each course in the Construction Management bundle is handpicked by our experts to ensure a wide spectrum of learning opportunities. This bundle will take you on a unique and enriching educational journey. The bundle encapsulates our mission to provide quality, accessible education for all. Whether you are just starting your career, looking to switch industries, or hoping to enhance your professional skill set, the Construction Management, Architecture, Surveying, Interior Design & Construction Safety bundle offers you the flexibility and convenience to learn at your own pace. Make the Construction Management package your trusted companion in your lifelong learning journey. CPD 210 CPD hours / points Accredited by CPD Quality Standards WHO IS THIS COURSE FOR? The Construction Management, Architecture, Surveying, Interior Design & Construction Safety bundle is perfect for: * Lifelong learners looking to expand their knowledge and skills. * Professionals seeking to enhance their career with CPD certification. * Individuals wanting to explore new fields and disciplines. * Anyone who values flexible, self-paced learning from the comfort of home. CAREER PATH Unleash your potential with the Construction Management, Architecture, Surveying, Interior Design & Construction Safety bundle. Acquire versatile skills across multiple fields, foster problem-solving abilities, and stay ahead of industry trends. Ideal for those seeking career advancement, a new professional path, or personal growth. Embrace the journey with thisbundle package. CERTIFICATES CERTIFICATE OF COMPLETION Digital certificate - Included CERTIFICATE OF COMPLETION Hard copy certificate - Included You will get a complimentary Hard Copy Certificate.

Construction Management, Architecture, Surveying, Interior design & Construction Safety
Delivered Online On Demand
£100

Java Certification Cryptography Architecture

5.0(2)

By Studyhub UK

Embark on a journey into the world of Java cryptography with our course, 'Java Certification Cryptography Architecture.' This course is designed to provide a deep dive into the critical aspects of Java's cryptographic capabilities, offering a blend of theoretical knowledge and practical application. Start with the basics in our introductory section, which sets the stage for a deeper exploration of Java Cryptography Architecture. As you progress, the course meticulously unfolds the complexities of message digest algorithms, MAC (Message Authentication Code), and PBKDF2 (Password-Based Key Derivation Function 2). This course is not just about coding; it's a comprehensive guide to understanding and implementing Java-based cryptographic solutions in real-world applications. Advance through the curriculum and discover practical examples of hashing, both simple and real-world, enhancing your ability to secure data effectively. Delve into efficient stream-based hashing and learn how to implement robust password hashing using PBKDF2. The course also includes a section on commercial wrapper libraries, demonstrating the integration of Java cryptography in commercial applications. By the conclusion of the course, you'll not only be proficient in Java Cryptography Architecture but also equipped with the skills to apply these cryptographic techniques in various professional scenarios, ensuring data security and integrity. Learning Outcomes * Develop a foundational understanding of Java Cryptography Architecture. * Learn to implement hashing algorithms and message digest techniques in Java. * Gain expertise in creating and using MAC for data security. * Master the application of PBKDF2 for secure password hashing. * Understand the use of commercial wrapper libraries in Java cryptography. WHY CHOOSE THIS JAVA CERTIFICATION CRYPTOGRAPHY ARCHITECTURE COURSE? 1. Unlimited access to the course for a lifetime. 2. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. 3. Structured lesson planning in line with industry standards. 4. Immerse yourself in innovative and captivating course materials and activities. 5. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. 6. Flexibility to complete the Course at your own pace, on your own schedule. 7. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. 8. Unlock career resources for CV improvement, interview readiness, and job success. WHO IS THIS JAVA CERTIFICATION CRYPTOGRAPHY ARCHITECTURE COURSE FOR? * Software developers and programmers looking to specialize in Java cryptography. * IT professionals seeking to enhance their data security skills. * Computer science students interested in cryptography and data protection. * System architects designing secure Java-based applications. * Security enthusiasts keen on exploring Java's cryptographic capabilities. CAREER PATH * Java Developer: £25,000 - £50,000 * Software Engineer (Java): £30,000 - £60,000 * Information Security Analyst: £35,000 - £70,000 * Cryptography Engineer: £40,000 - £80,000 * Application Security Developer: £38,000 - £75,000 * Systems Architect (Java): £45,000 - £85,000 PREREQUISITES This Java Certification Cryptography Architecture does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Java Certification Cryptography Architecture was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. CERTIFICATION After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. COURSE CURRICULUM Section 01: Introduction Introductory Lecture 00:02:00 Setup 00:03:00 Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example 00:05:00 Real-world Hashing Example 00:07:00 Efficient Stream-Based Hashing 00:02:00 Message Authentication Code (MAC) 00:05:00 Secure Password Hashing with PBKDF2/PKCS#5 00:10:00 Section 03: Outro Commercial Wrapper Libraries: Demo 00:03:00 JCE Unlimited Strength Policy File Installation 00:03:00 Assignment Assignment - Java Certification Cryptography Architecture 00:00:00

Java Certification Cryptography Architecture
Delivered Online On Demand
£10.99

Java Cryptography Architecture: Secure Password Hashing

By Course Cloud

COURSE OVERVIEW The Java Cryptography Architecture: Secure Password Hashing course has been designed for junior and senior Java Developers who wish to gain a comprehensive understanding of the Java cryptography architecture. The knowledge provided in this course can be applied to web applications (Swing, AWT, SWT/RCP, JavaFX), Java-based desktop applications, and backend applications, as well as Android apps. Broken down into three core modules, this training program covers the key areas of Java cryptography architecture, through easy to follow video tutorials and instructor-led guidance. Study as a part-time or full-time learner and gain in-demand industry skills by learning from the experts. This best selling Java Cryptography Architecture: Secure Password Hashing has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Java Cryptography Architecture: Secure Password Hashing is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Java Cryptography Architecture: Secure Password Hashing is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The Java Cryptography Architecture: Secure Password Hashing is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Java Cryptography Architecture: Secure Password Hashing, you will be awarded a certificate of completion  as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Java Cryptography Architecture: Secure Password Hashing will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Java Cryptography Architecture: Secure Password Hashing to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Java Cryptography Architecture: Secure Password Hashing
Delivered Online On Demand
£25

Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle

By Training Express

This Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle provides you with the required knowledge and skills to achieve a rewarding career in a rapidly growing industry. By enrolling today, you can take your knowledge to a whole new level and quickly reap the rewards of your study in relevant fields. You will start with the basics, building a solid foundation that will give you further knowledge as you progress into intermediate and advanced-level topics. The courses in the Architectural Studies - Architecture - CPD Accredited 3 Courses bundle are relevant, reliable, and up-to-date. Moreover, since the courses are CPD UK accredited, they will boost your career and improve your CV. Industry experts design the Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle to ensure you learn everything thoroughly. All three courses in the bundle will help you to give your career a boost. We look forward to sharing our knowledge and experience to help you become more confident and comfortable with the topic. Enrol today and start your journey to career development. These comprehensive courses are available in this Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle * Course: 01: Architecture * Course: 02: Paralegal - Agricultural * Course: 03: Landscape Architecture ** Special Offer: Free PDF and Hard Copy Certificates** Key Benefits * Get instant PDF and Hard Copy certificate * Fully online courses * Developed by qualified professionals * Self-paced learning and laptop, tablet, and smartphone-friendly * 24/7 Learning Assistance Course Curriculum: Course: 01: Architecture * Module 01: Introduction to Architectural Studies * Module 02: Ancient Architecture * Module 03: Architectural Ideas and Movements * Module 04: Architectural Styles * Module 05: Art Deco Architectural Style * Module 06: Scandinavian Architectural Style * Module 07: Victorian Architectural Style * Module 08: Classical and Early Christian Architectural Style * Module 09: Gothic Architectural Style * Module 10: Baroque and Rococo Architectural Style * Module 11: Eclecticism Architectural Style * Module 12: Modern and Post-Modern Architectural Style * Module 13: Interior Designing * Module 14: Colour in Interior Designing * Module 15: Lighting in Interior Design Part One * Module 16: Lighting in Interior Design Part Two Course Assessment You will immediately be given access to a specifically crafted MCQ test upon completing each Architectural Studies - Architecture - CPD Accredited 3 Courses bundle course. For each test, the pass mark will be set to 60%. Accredited Certificate After successfully completing this Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle course, you will qualify for the CPD Certification Service (CPD UK) certified certificate from Training Express. Disclaimer: The CPD approved course is owned by E-Learning Solutions Ltd and is distributed under license. Why Choose The CPD Certification Service Accredited Course? With 25 years of experience in the Continuous Professional Development sector, CPD Certification Service (CPD UK) is the leading CPD accreditation organisation in the UK, working across all industry sectors. The CPD Certification Service provides recognised independent CPD accreditation compatible with global CPD requirements. Hundreds and thousands of professionals recognise the CPD Certified symbol as the qualitative benchmark that reflects and sets the industry standards. CPD UK evaluates learning activities to the highest standards and courses are certified against the universally accepted structured checklist. CPD 30 CPD hours / points Accredited by The CPD Certification Service WHO IS THIS COURSE FOR? The Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle training is ideal for highly motivated individuals or teams who want to enhance their skills and efficiently skilled employees. REQUIREMENTS There are no formal entry requirements for the course, with enrollment open to anyone! CAREER PATH Learn the essential skills and knowledge you need to excel in your professional life with the help & guidance from our Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle training.

Architectural Studies - Architecture - CPD Accredited 3 Courses Bundle
Delivered Online On Demand
£41

Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites * AWS Cloud Practitioner Essentials classroom or digital training, or * Working knowledge of distributed systems * Familiarity with general networking concepts * Familiarity with IP addressing * Working knowledge of multi-tier architectures * Familiarity with cloud computing concepts 0 - INTRODUCTIONS & COURSE MAP REVIEW * Welcome and course outcomes 1 - ARCHITECTING FUNDAMENTALS REVIEW * AWS Services and Infrastructure * Infrastructure Models * AWS API Tools * Securing your infrastructure * The Well-Architected Framework * Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - ACCOUNT SECURITY * Security Principals * Identity and Resource-Based Policies * Account Federation * Introduction to Managing Multiple Accounts 3 - NETWORKING, PART 1 * IP Addressing * Amazon Virtual Private Cloud (VPC), Patterns and Quotas * Routing * Internet Access * Network Access Control Lists (NACLs) * Security Groups 4 - COMPUTE * Amazon Elastic Cloud Compute (EC2) * EC2 Instances and Instance Selection * High Performance Computing on AWS * Lambda and EC2, When to Use Which * Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - STORAGE * Amazon S3, Security, Versioning and Storage Classes * Shared File Systems * Data Migration Tools 6 - DATABASE SERVICES * AWS Database Solutions * Amazon Relational Database Services (RDS) * DynamoDB, Features and Use Cases * Redshift, Features, Use Cases and Comparison with RDS * Caching and Migrating Data * Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - MONITORING AND SCALING * Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs * Invoking Events 8 - AUTOMATION * CloudFormation * AWS Systems Manager 9 - CONTAINERS * Microservices * Monitoring Microservices with X-Ray * Containers 10 - NETWORKING PART 2 * VPC Peering & Endpoints * Transit Gateway * Hybrid Networking * Route 53 11 - SERVERLESS ARCHITECTURE * Amazon API Gateway * Amazon SQS, Amazon SNS * Amazon Kinesis Data Streams & Kinesis Firehose * Step Functions * Hands-on Lab: Build a Serverless Architecture 12 - EDGE SERVICES * Edge Fundamentals * Amazon CloudFront * AWS Global Accelerator * AWS Web Application Firewall (WAF), DDoS and Firewall Manager * AWS Outposts * Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - BACKUP AND RECOVERY * Planning for Disaster Recovery * AWS Backup * Recovery Strategie ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered Online4 days, Aug 28th, 13:00 + 4 more
£2025

Java Certification Cryptography Architecture Course

By NextGen Learning

OVERVIEW Data security is one of the most promising and booming sectors for tech enthusiasts. If you want to pursue a career as a data security officer or software engineer, Java Cryptography can help you in many ways. learn Java Cryptography Architecture from this Java Certification Cryptography Architecture course and take your skill to another level. This Java Certification Cryptography Architecture course will teach you how you can use cryptography for securing your device and applications. You will learn hashing examples, efficient stream-based hashing, message authentication code, security password hashing and how you can use these techniques for your program.  You will learn Java Cryptography Architecture from scratch in this course. This course will be beneficial for software engineers, data security officers, web designers, app testers or anyone who wants to build his career in the IT sector. COURSE DESIGN The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of * Video lessons * Online study materials WILL I RECEIVE A CERTIFICATE OF COMPLETION? Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and a Hard Copy Certificate for £15. WHY STUDY THIS COURSE Whether you're an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge. The Java Certification Cryptography Architecture is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16. COURSE CURRICULUM Section 01: Introduction Introductory Lecture 00:02:00 Setup 00:03:00 Section 02: Java Cryptography Architecture: MessageDigest, MAC & PBKDF2 Simple Hashing Example 00:05:00 Real-world Hashing Example 00:07:00 Efficient Stream-Based Hashing 00:02:00 Message Authentication Code (MAC) 00:05:00 Secure Password Hashing with PBKDF2/PKCS#5 00:10:00 Section 03: Outro Commercial Wrapper Libraries: Demo 00:03:00 JCE Unlimited Strength Policy File Installation 00:03:00 Assignment Assignment - Java Certification Cryptography Architecture 00:00:00

Java Certification Cryptography Architecture Course
Delivered Online On Demand
£20

DP-900T00 Microsoft Azure Data Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - EXPLORE CORE DATA CONCEPTS * Identify data formats * Explore file storage * Explore databases * Explore transactional data processing * Explore analytical data processing 2 - EXPLORE DATA ROLES AND SERVICES * Explore job roles in the world of data * Identify data services 3 - EXPLORE FUNDAMENTAL RELATIONAL DATA CONCEPTS * Understand relational data * Understand normalization * Explore SQL * Describe database objects 4 - EXPLORE RELATIONAL DATABASE SERVICES IN AZURE * Describe Azure SQL services and capabilities * Describe Azure services for open-source databases 5 - EXPLORE AZURE STORAGE FOR NON-RELATIONAL DATA * Explore Azure blob storage * Explore Azure DataLake Storage Gen2 * Explore Azure Files * Explore Azure Tables 6 - EXPLORE FUNDAMENTALS OF AZURE COSMOS DB * Describe Azure Cosmos DB * Identify Azure Cosmos DB APIs 7 - EXPLORE FUNDAMENTALS OF LARGE-SCALE DATA WAREHOUSING * Describe data warehousing architecture * Explore data ingestion pipelines * Explore analytical data stores 8 - EXPLORE FUNDAMENTALS OF REAL-TIME ANALYTICS * Understand batch and stream processing * Explore common elements of stream processing architecture * Explore Azure Stream Analytics * Explore Apache Spark on Microsoft Azure 9 - EXPLORE FUNDAMENTALS OF DATA VISUALIZATION * Describe Power BI tools and workflow * Describe core concepts of data modeling * Describe considerations for data visualization

DP-900T00 Microsoft Azure Data Fundamentals
Delivered OnlineTwo days, Aug 9th, 13:00 + 2 more
£595