• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

218 AWS (Amazon Web Services) courses delivered Live Online

Google Cloud Fundamentals for AWS Professionals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for the following participants: Individuals planning to deploy applications and create application environments on Google Cloud Developers, systems operations professionals, and solution architects getting started with Google Cloud. Executives and business decision makers evaluating the potential of Google Cloud to address their business needs. Overview This course teaches participants the following skills: Identify Google Cloud counterparts for AWS IaaS, AWS PaaS, AWS SQL, AWS Blob Storage, AWS Application Insights, and AWS Data Lake Configure accounts, billing, projects, networks, subnets, firewalls, VMs, disks, auto scaling, load balancing, storage, databases, IAM, and more Manage and monitor applications Explain feature and pricing model differences This course with labs introduces AWS professionals to the core capabilities of Google Cloud Platform (GCP) in the four technology pillars: networking, compute, storage, and database. It is designed for AWS Solution Architects and SysOps Administrators familiar with AWS features and setup and want to gain experience configuring GCP products immediately. With presentations, demos, and hands-on labs, participants will get details of similarities, differences, and initial how-tos quickly. INTRODUCING GOOGLE CLOUD * Explain the advantages of Google Cloud. * Define the components of Google's network infrastructure,including: Points of presence, data centers, regions, and zones. * Understand the difference between Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) GETTING STARTED WITH GOOGLE CLOUD * Identify the purpose of projects on Google Cloud Platform. * Understand how AWS?s resource hierarchy differs from Google Cloud?s. * Understand the purpose of and use cases for Identity and Access Management. * Understand how AWS IAM differs from Google Cloud IAM. * List the methods of interacting with Google Cloud Platform. * Launch a solution using Cloud Marketplace. VIRTUAL MACHINES IN THE CLOUD * Identify the purpose and use cases for Google Compute Engine. * Understand the basics of networking in Google Cloud Platform. * Understand how Amazon VPC differs from Google VPC. * Understand the similarities and differences between Amazon EC2 and Google Compute Engine. * Understand how typical approaches to load-balancing in Google Cloud differ from those in AWS. * Deploy applications using Google Compute Engine. STORAGE IN THE CLOUD * Understand the purpose of and use cases for: Cloud Storage,Cloud SQL, Cloud Bigtable and Cloud Datastore. * Understand how Amazon S3 and Amazon Glacier compare to Cloud Storage. * Compare Google Cloud?s managed database services with Amazon RDS and Amazon Aurora. * Learn how to choose among the various storage options on Google Cloud Platform. * Load data from Cloud Storage into BigQuery. Perform a query on the data in BigQuery. * CONTAINERS IN THE CLOUD * Define the concept of a container and identify uses for containers. * Identify the purpose of and use cases for Google Container Engine and Kubernetes. * Understand how Amazon Elastic Container Service (ECS) and Amazon Elastic Kubernetes Service (EKS) differ from GKE. * Provision a Kubernetes cluster using Kubernetes Engine. * Deploy and manage Docker containers using kubectl APPLICATIONS IN THE CLOUD * Understand the purpose of and use cases for Google App Engine. * Contrast the App Engine Standard environment with the App Engine Flexible environment. * Understand how App Engine differs from Amazon Elastic Beanstalk. * Understand the purpose of and use cases for Google Cloud Endpoints. * DEVELOPING, DEPLOYING AND MONITORING IN THE CLOUD * Understand options for software developers to host their source code. * Understand the purpose of template-based creation and management of resources. * Understand how Cloud Deployment Manager differs from AWS CloudFormation. * Understand the purpose of integrated monitoring, alerting, and debugging. * Understand how Google Monitoring differs from Amazon CloudWatch and AWS CloudTrail. * Create a Deployment Manager deployment. * Update a Deployment Manager deployment. * View the load on a VM instance using Google Monitoring. BIG DATA AND MACHINE LEARNING IN THE CLOUD * Understand the purpose of and use cases for the products and services in the Google Cloud big data and machine learning platforms. * Understand how Google Cloud BigQuery differs from AWS Data Lake. * Understand how Google Cloud Pub/Sub differs from AWS Event Hubs and Service Bus. * Understand how Google Cloud?s machine-learning APIs differ from AWS's. * Load data into BigQuery from Cloud Storage. * Perform queries using BigQuery to gain insight into data. SUMMARY AND REVIEW * Review the products that make up Google Cloud and remember how to choose among them * Understand next steps for training and certification * Understand, at a high level, the process of migrating from AWS to Google Cloud. ADDITIONAL COURSE DETAILS: Nexus Humans Google Cloud Fundamentals for AWS Professionals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Google Cloud Fundamentals for AWS Professionals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Google Cloud Fundamentals for AWS Professionals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Salesforce Build Application Architect Expertise (ARC901)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This class is designed for enterprise architects, solution architects, and business analysts working to earn their Salesforce Application Architect credential, or for application architects looking to get more hands-on experience. Overview Design data models that scale gracefully Leverage Salesforce sharing mechanisms at an advanced level Evaluate the nuances of field types and pick the right one for the circumstances Make data model decisions that minimize record locking and other performance degradations Dive into the two cornerstone domains of being an Application Architect: Data Architecture and Management, and Sharing and Visibility. In this 4-day workshop, our Architect experts will present you with a case study scenario that will be broken down and digested through iterative exploration. Learn how to design and build secure, scalable, and high-performing solutions through a combination of lecture, demos, hands-on exercises, and workshop presentations and discussions. APPLICATION ARCHITECT OVERVIEW * Assess the Requirements to Become an Application Architect * Understand the Real-World Expectations of Application Architects * Review the Core Characteristics of Successful Application Architects SCENARIO INTRODUCTION * Review the Application Architecture Scenario * Identify Scenario Problem Areas * Identify Scenario Actors and Licensing ARCHITECTURE DOCUMENTATION * Understand Key Architecture Documentation Requirements * Learn About Best Practices for Artifact Documentation * Produce Architecture Documents DATA MODELING * Identify Relationship Types and Their Impact on Record Access, User Interface, and Reporting * Review the Considerations for Changing Field Types * Review the Considerations for Modifying Data Models with Schema Builder * Review the Considerations for Importing and Exporting Data * Identify Use Cases of External Objects * Determine an Appropriate Data Model * Understand Design Implications with Complex Environments and Large Data Volumes (LDV) DATA MANAGEMENT * Review the Considerations for Working with LDV * Review Data Lifecycle Concepts and Mechanisms * Review Master Data Management and System of Record Concepts * Review Data Migration, Planning, Preparation, and Execution * Identify Potential LDV and Calculate Expected Volumes * Go Further with Indexes Standard and Custom Skinny Tables * Lock Records SECURITY MODEL * Review the Considerations for Working with Internal and External Sharing Models * Restrict and Extend Object and Field Access * Determine Sharing Solutions * Identify Record Sharing Mechanisms (Declarative, Programmatic, Implicit) * Understand Teams Concepts (Account, Opportunity, Case) * Understand Person Accounts and Its Implication on Sharing * Encrypt Data SHARING IN COMMUNITIES * Understand Community Security Mechanisms * Secure Integration Endpoints * Integrate and Specify Connected Apps and Named Credentials ADVANCED SECURITY & VISIBILITY CONCEPTS * Implement Security & Visibility Controls with Apex and Visualforce * Review Territory Management and Its Implication on Data Management, Sharing, and Visibility * Review Divisions and Its Implication on Data Management, Sharing, and Visibility * Understand Security and Visibility Controls on 'Special' Objects SOLUTION DESIGN * Determine When to Leverage Standard Products Functionality vs. Custom Build vs. AppExchange * Understand Declarative and Programmatic Configuration * Get to Know the Order of Execution * Automate Business Processes * Consider Reporting and Analytics Needs * Consider How to Store and Access Content/Files * Apply Solution Design Concepts to Real-World Problems and Scenarios DEPLOYMENT & INTEGRATION BEST PRACTICES * Review the Application Lifecycle * Understand How Sandboxes Should Be Used * Review Deployment Options * Identify Integration Patterns WRAP-UP * Review a Practice Scenario * Review What Was Covered ADDITIONAL COURSE DETAILS: Nexus Humans Salesforce Build Application Architect Expertise (ARC901) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Salesforce Build Application Architect Expertise (ARC901) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Salesforce Build Application Architect Expertise (ARC901)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AWS Security Governance at Scale

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Solutions architects, security DevOps, and security engineers Overview In this course, you will learn to: Establish a landing zone with AWS Control Tower Configure AWS Organizations to create a multi-account environment Implement identity management using AWS Single Sign-On users and groups Federate access using AWS SSO Enforce policies using prepackaged guardrails Centralize logging using AWS CloudTrail and AWS Config Enable cross-account security audits using AWS Identity and Access Management (IAM) Define workflows for provisioning accounts using AWS Service Catalog and AWS Security Hub Security is foundational to AWS. Governance at scale is a new concept for automating cloud governance that can help companies retire manual processes in account management, budget enforcement, and security and compliance. By automating common challenges, companies can scale without inhibiting agility, speed, or innovation. In addition, they can provide decision makers with the visibility, control, and governance necessary to protect sensitive data and systems.In this course, you will learn how to facilitate developer speed and agility, and incorporate preventive and detective controls. By the end of this course, you will be able to apply governance best practices. COURSE INTRODUCTION * Instructor introduction * Learning objectives * Course structure and objectives * Course logistics and agenda MODULE 1: GOVERNANCE AT SCALE * Governance at scale focal points * Business and Technical Challenges MODULE 2: GOVERNANCE AUTOMATION * Multi-account strategies, guidance, and architecture * Environments for agility and governance at scale * Governance with AWS Control Tower * Use cases for governance at scale MODULE 3: PREVENTIVE CONTROLS * Enterprise environment challenges for developers * AWS Service Catalog * Resource creation * Workflows for provisioning accounts * Preventive cost and security governance * Self-service with existing IT service management (ITSM) tools MODULE 4: DETECTIVE CONTROLS * Operations aspect of governance at scale * Resource monitoring * Configuration rules for auditing * Operational insights * Remediation * Clean up accounts MODULE 5: RESOURCES * Explore additional resources for security governance at scale ADDITIONAL COURSE DETAILS: Nexus Humans AWS Security Governance at Scale training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AWS Security Governance at Scale course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AWS Security Governance at Scale
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Security administrators who are responsible for using SaltStack SecOps to manage the security operations in their enterprise Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture of SaltStack Config and SaltStack SecOps Integrate SaltStack Config with directory services. Configure roles and permissions for users and groups to manage and use SaltStack SecOps Use targeting to ensure that the jobs run on the correct minion systems Use remote execution modules to install the packages, transfer files, manage services, and manage users on minion systems Manage configuration control on the minion systems with states, pillars, requisites, and declarations Use Jinja and YAML code to manage the minion systems with the state files Enforce the desired state across minion systems automatically Use SaltStack SecOps to update the compliance and vulnerability content libraries Use SaltStack SecOps to enforce compliance and remediation on the infrastructure with industry standards Use SaltStack SecOps to provide automated vulnerability scanning and remediation on your infrastructure This two-day, hands-on training course provides you with the advanced knowledge, skills, and tools to achieve competency in using VMware vRealize© Automation SaltStack© SecOps. SaltStack SecOps allows you to scan your system for compliance against security benchmarks, detect system vulnerabilities, and remediate your results. This course enables you to create the SaltStack SecOps custom compliance libraries and use SaltStack SecOps. In addition, this course provides you with the fundamentals of how to use VMware vRealize© Automation SaltStack© Config to install software and manage system configurations. COURSE INTRODUCTION * Introductions and course logistics * Course objectives SALTSTACK CONFIG ARCHITECTURE * Identify the SaltStack Config deployment types * Identify the components of SaltStack Config * Describe the role of each SaltStack Config component SALTSTACK CONFIG SECURITY * Describe local user authentication * Describe LDAP and Active Directory authentication * Describe the roles and permissions in vRealize Automation for SaltStack Config * Describe the roles and permissions in SaltStack Config * Describe the SecOps permissions in SaltStack Config * Describe the advanced permissions available in SaltStack Config TARGETING MINIONS * Describe targeting and its importance * Target minions by minion ID * Target minions by glob * Target minions by regular expressions * Target minions by lists * Target minions by compound matching * Target minions by complex logical matching REMOTE EXECUTION AND JOB MANAGEMENT * Describe remote execution and its importance * Describe functions and arguments * Create and manage jobs * Use the Activities dashboard CONFIGURATION CONTROL THROUGH STATES, PILLARS, REQUISITES, AND DECLARATIONS * Define the SaltStack states * Describe file management in SaltStack Config * Create the SaltStack state files * Identify the components of a SaltStack state * Describe pillar data and the uses of pillar data * Configure pillar data on the SaltStack Config master server * Use pillar data in variables in the state files * Describe the difference between IDs and names in the state files * Use the correct execution order * Use requisites in the state files USING JINJA AND YAML * Describe the SaltStack Config renderer system * Use YAML in the state files * Use Jinja in the state files * Use Jinja conditionals, lists, and loops USING SALTSTACK SECOPS COMPLY * Describe the SaltStack SecOps Comply architecture * Describe CIS and DISA STIG benchmarks * Describe the SaltStack SecOps Comply security library * Describe the remediation differences between SaltStack SecOps and VMware Carbon Black© * Create and manage the policies * Create and manage the custom checks * Run assessments on the minion systems * Use SaltStack SecOps to remediate the noncompliant systems * Manage the SaltStack SecOps Comply configuration options * Manage the benchmark content ingestion USING SALTSTACK SECOPS PROTECT * Describe Common Vulnerabilities and Exposures (CVEs) * Use the Protect dashboard * Create and manage the policies * Update the vulnerability library * Run the vulnerability scans * Remediate the vulnerabilities * Manage the vulnerability exemptions

VMware vRealize Automation SaltStack SecOps: Deploy and Manage [V8.6]
Delivered on-request, onlineDelivered Online
Price on Enquiry

CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This intermediate course is for future DB2 for z/OS database administrators who need to acquire the basic skills required to administer a DB2 database. Overview Implement a DB2 database designUse database utilities to load and reorganize dataDefine and implement a DB2 database recovery strategyControl access to database using DB2 authorization facilities This course provides students with instruction on how to physically implement a logical database design in DB2. The course includes instruction on DB2 data management, DB2 catalog tables, the bind process, database utilities, & security considerations. COURSE OUTLINE * Setting up a DB2 database * Referential integrity * Getting data into and out of DB2 * Keeping your DB2 data in good shape * Application data recovery basics * Program preparation and Bind * Security * Serialization ADDITIONAL COURSE DETAILS: Nexus Humans CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CV832 IBM DB2 11 for z/OS Database Administration Workshop Part 1
Delivered on-request, onlineDelivered Online
Price on Enquiry

CertNexus Certified Internet of Things Practitioner (CIoTP)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is designed for IT professionals with baseline skills in computer hardware, software support, and development who want to learn how to design, develop, implement, operate, and manage Internet of Things devices and related systems. It is for those interested in learning more about embedded systems, microcontroller programming, IoT security, and the development life cycle for IoT projects. While students will gain hands-on experience assembling a prototype IoT device and using software development tools, these activities are closely guided, so previous experience in electronics assembly and programming are not required. This course prepares students for taking the CertNexus Certified Internet of Things (IoT) Practitioner (Exam ITP-110). Overview In this course, you will learn how to apply Internet of Things technologies to solve real-world problems. You will: Construct and program an IoT device. Communicate with an IoT device using wired and wireless connections. Process sensor input and control an actuator on an IoT device. Manage security, privacy, and safety risks on IoT projects. Plan an IoT prototyping and development project. In this course, you will learn general strategies for planning, designing, developing, implementing, and maintaining an IoT system through various case studies and by assembling and configuring an IoT device to work in a sensor network. You will create an IoT device based on an ESP8266 microcontroller, implementing various common IoT features, such as analog and digital sensors, a web-based interface, MQTT messaging, and data encryption. The instructor led course includes an exam voucher for the Certified Internet of Things Practitioner (CIoTP) exam (exam ITP-110). PLANNING AN IOT IMPLEMENTATION * Select a General Architecture for an IoT Project * Identify Benefits and Challenges of IoT * CONSTRUCTING AND PROGRAMMING AN IOT DEVICE * Select and Configure a Processing Unit * Select a Microcontroller Power Source * Use a Software Development Kit to Program an IoT Device * COMMUNICATING WITH AN IOT DEVICE * Communicate Using Wired Connections * Communicate Using Wireless Connections * Communicate Using Internet Protocols * PROCESSING IOT DATA * Process IoT Device Input and Output * Process Data in the Cloud * Provide Machine to Machine Communication * MANAGING RISKS ON IOT PROJECTS * Identify IoT Security and Privacy Risks * Manage IoT Security and Privacy Risks * Manage IoT Safety Risks * UNDERTAKING AN IOT PROJECT * Identify Real World Applications for IoT * Follow the IoT Development Lifecycle * ADDITIONAL COURSE DETAILS: Nexus Humans CertNexus Certified Internet of Things Practitioner (CIoTP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus Certified Internet of Things Practitioner (CIoTP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CertNexus Certified Internet of Things Practitioner (CIoTP)
Delivered on-request, onlineDelivered Online
Price on Enquiry

AZ-020T00 - Microsoft Azure solutions for AWS Developers

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Students in this course are experienced AWS developers interested in Azure development. A three-day course designed to teach AWS (Amazon Web Services) developers how to prepare end-to-end solutions in Microsoft Azure. In this course you will construct Azure App Service Web App solutions and Azure Functions, use blob or Cosmos DB storage in solutions, implement secure cloud solutions that include user authentication and authorization, implement API management, and develop event- and message-based solutions, and monitor, troubleshoot, and optimize your Azure solutions. You will learn how developers use Azure services, with additional focus on features and tasks that differ from AWS, and what that means for you as you develop applications that will be hosted by using Azure services CREATE AZURE APP SERVICE WEB APPS * Azure App Service core concepts * Creating an Azure App Service Web App * Configuring and Monitoring App Service apps * Scaling App Service apps * Azure App Service staging environments IMPLEMENT AZURE FUNCTIONS * Azure Functions overview * Developing Azure Functions * Implement Durable Functions DEVELOP SOLUTIONS THAT USE BLOB STORAGE * Azure Blob storage core concepts * Managing the Azure Blob storage lifecycle * Working with Azure Blob storage * Create an Azure Resource Manager Template DEVELOP SOLUTIONS THAT USE COSMOS DB STORAGE * Azure Cosmos DB overview * Azure Cosmos DB data structure * Working with Azure Cosmos DB resources and data * Create and deploy ARM templates IMPLEMENT USER AUTHENTICATION AND AUTHORIZATION * Microsoft Identity Platform v2.0 * Authentication using the Microsoft Authentication Library * Using Microsoft Graph * Authorizing data operations in Azure Storage IMPLEMENT SECURE CLOUD SOLUTIONS * Manage keys, secrets, and certificates by using the KeyVault API * Implement Managed Identities for Azure resources * Secure app configuration data by using Azure App Configuration IMPLEMENT API MANAGEMENT * API Management overview * Defining policies for APIs * Securing your APIs DEVELOP EVENT-BASED SOLUTIONS * Implement solutions that use Azure Event Grid * Implement solutions that use Azure Event Hubs * Implement solutions that use Azure Notification Hubs DEVELOP MESSAGE-BASED SOLUTIONS * Implement solutions that use Azure Service Bus * Implement solutions that use Azure Queue Storage queues MONITOR AND OPTIMIZE AZURE SOLUTIONS * Overview of monitoring in Azure * Instrument an app for monitoring * Analyzing and troubleshooting apps * Implement code that handles transient faults ADDITIONAL COURSE DETAILS: Nexus Humans AZ-020T00 - Microsoft Azure solutions for AWS Developers training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-020T00 - Microsoft Azure solutions for AWS Developers course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-020T00 - Microsoft Azure solutions for AWS Developers
Delivered on-request, onlineDelivered Online
Price on Enquiry

Data Warehousing on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for: Database architects Database administrators Database developers Data analysts and scientists Overview This course is designed to teach you how to: Discuss the core concepts of data warehousing, and the intersection between data warehousing and big data solutions Launch an Amazon Redshift cluster and use the components, features, and functionality to implement a data warehouse in the cloud Use other AWS data and analytic services, such as Amazon DynamoDB, Amazon EMR, Amazon Kinesis, and Amazon S3, to contribute to the data warehousing solution Architect the data warehouse Identify performance issues, optimize queries, and tune the database for better performance Use Amazon Redshift Spectrum to analyze data directly from an Amazon S3 bucket Use Amazon QuickSight to perform data analysis and visualization tasks against the data warehouse Data Warehousing on AWS introduces you to concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS. This course demonstrates how to collect, store, and prepare data for the data warehouse by using other AWS services such as Amazon DynamoDB, Amazon EMR, Amazon Kinesis, and Amazon S3. Additionally, this course demonstrates how to use Amazon QuickSight to perform analysis on your data MODULE 1: INTRODUCTION TO DATA WAREHOUSING * Relational databases * Data warehousing concepts * The intersection of data warehousing and big data * Overview of data management in AWS * Hands-on lab 1: Introduction to Amazon Redshift MODULE 2: INTRODUCTION TO AMAZON REDSHIFT * Conceptual overview * Real-world use cases * Hands-on lab 2: Launching an Amazon Redshift cluster MODULE 3: LAUNCHING CLUSTERS * Building the cluster * Connecting to the cluster * Controlling access * Database security * Load data * Hands-on lab 3: Optimizing database schemas MODULE 4: DESIGNING THE DATABASE SCHEMA * Schemas and data types * Columnar compression * Data distribution styles * Data sorting methods MODULE 5: IDENTIFYING DATA SOURCES * Data sources overview * Amazon S3 * Amazon DynamoDB * Amazon EMR * Amazon Kinesis Data Firehose * AWS Lambda Database Loader for Amazon Redshift * Hands-on lab 4: Loading real-time data into an Amazon Redshift database MODULE 6: LOADING DATA * Preparing Data * Loading data using COPY * Data Warehousing on AWS * AWS Classroom Training * Concurrent write operations * Troubleshooting load issues * Hands-on lab 5: Loading data with the COPY command MODULE 7: WRITING QUERIES AND TUNING FOR PERFORMANCE * Amazon Redshift SQL * User-Defined Functions (UDFs) * Factors that affect query performance * The EXPLAIN command and query plans * Workload Management (WLM) * Hands-on lab 6: Configuring workload management MODULE 8: AMAZON REDSHIFT SPECTRUM * Amazon Redshift Spectrum * Configuring data for Amazon Redshift Spectrum * Amazon Redshift Spectrum Queries * Hands-on lab 7: Using Amazon Redshift Spectrum MODULE 9: MAINTAINING CLUSTERS * Audit logging * Performance monitoring * Events and notifications * Lab 8: Auditing and monitoring clusters * Resizing clusters * Backing up and restoring clusters * Resource tagging and limits and constraints * Hands-on lab 9: Backing up, restoring and resizing clusters MODULE 10: ANALYZING AND VISUALIZING DATA * Power of visualizations * Building dashboards * Amazon QuickSight editions and feature

Data Warehousing on AWS
Delivered on-request, onlineDelivered Online
Price on Enquiry

Database Design - A Modern Approach

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who need to learn database design essentials, typically in preparation for, or as a supplement to, a course on SQL such as SQL Querying: Fundamentals and courses on specific relational database platforms. Overview In this course, you will perform steps to design a relational database, including gathering requirements, data modeling, and planning implementation. You will: - Follow an efficient process for designing a relational database - Define the database conceptual model - Define the database logical model - Apply database normalization methods to improve the initial design of a database - Complete the database design, including controls to ensure its referential integrity and data integrity This course introduces you to a process for effectively planning and designing a functional, efficient database. Knowing how to plan a relational database is important to the success of the databases you create. Without planning, you cannot possibly know what the database needs to do, or even what information to include in the database. Planning a database is essential, and prevents the extra work of fixing data maintenance problems later on. The concepts are not specific to a particular software application and can be applied to any relational database management system. GETTING STARTED WITH RELATIONAL DATABASE DESIGN * Identify Database Components * Identify Common Database Design Problems * Follow a Database Design Process * Gather Requirements DEFINING THE DATABASE CONCEPTUAL MODEL * Create the Conceptual Model * Identify Entity Relationships DEFINING THE DATABASE LOGICAL MODEL * Identify Columns * Identify Primary Keys * Identify and Diagram Relationships NORMALIZING DATA * Avoid Common Database Design Errors * Comply with Higher Normal Forms FINALIZING THE DATABASE DESIGN * Adapt the Physical Model for Different Systems * Ensure Referential Integrity * Ensure Data Integrity at the Column Level * Ensure Data Integrity at the Table Level * Design for the Cloud ADDITIONAL COURSE DETAILS: Nexus Humans Database Design - A Modern Approach training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Database Design - A Modern Approach course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Database Design - A Modern Approach
Delivered on-request, onlineDelivered Online
Price on Enquiry

AWS Building Data Lakes on AWS

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for: Data platform engineers Solutions architects IT professionals Overview In this course, you will learn to: Apply data lake methodologies in planning and designing a data lake Articulate the components and services required for building an AWS data lake Secure a data lake with appropriate permission Ingest, store, and transform data in a data lake Query, analyze, and visualize data within a data lake In this course, you will learn how to build an operational data lake that supports analysis of both structured and unstructured data. You will learn the components and functionality of the services involved in creating a data lake. You will use AWS Lake Formation to build a data lake, AWS Glue to build a data catalog, and Amazon Athena to analyze data. The course lectures and labs further your learning with the exploration of several common data lake INTRODUCTION TO DATA LAKES * Describe the value of data lakes * Compare data lakes and data warehouses * Describe the components of a data lake * Recognize common architectures built on data lakes * DATA INGESTION, CATALOGING, AND PREPARATION * Describe the relationship between data lake storage and data ingestion * Describe AWS Glue crawlers and how they are used to create a data catalog * Identify data formatting, partitioning, and compression for efficient storage and query * Lab 1: Set up a simple data lake DATA PROCESSING AND ANALYTICS * Recognize how data processing applies to a data lake * Use AWS Glue to process data within a data lake * Describe how to use Amazon Athena to analyze data in a data lake BUILDING A DATA LAKE WITH AWS LAKE FORMATION * Describe the features and benefits of AWS Lake Formation * Use AWS Lake Formation to create a data lake * Understand the AWS Lake Formation security model * Lab 2: Build a data lake using AWS Lake Formation ADDITIONAL LAKE FORMATION CONFIGURATIONS * Automate AWS Lake Formation using blueprints and workflows * Apply security and access controls to AWS Lake Formation * Match records with AWS Lake Formation FindMatches * Visualize data with Amazon QuickSight * Lab 3: Automate data lake creation using AWS Lake Formation blueprints * Lab 4: Data visualization using Amazon QuickSight ARCHITECTURE AND COURSE REVIEW * Post course knowledge check * Architecture review * Course review

AWS Building Data Lakes on AWS
Delivered on-request, onlineDelivered Online
Price on Enquiry
1...34567...22