• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

317 C2 courses

Oracle 19c Database Administration II (DBA II) (TTOR20619)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs with basic Oracle 19c skills. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs andexercises. Working in a hands-on learning environment led by our expert facilitator, students will explore: Creating CDBs and Regular PDBs Managing CDBs and PDBs Backup and Duplicate Upgrading and Transporting CDBs and Regular PDBs Backup Strategies and Terminology Restore and Recovery Concepts Using Flashback Technologies Duplicating a Database Installing Grid Infrastructure and Oracle Database Patching Grid Infrastructure and Oracle Database Upgrading to Oracle Grid Infrastructure Using General Overall Database Enhancements Monitoring and Tuning Database Performance Managing Application PDBs Managing Security in Multitenant databases Recovery and Flashback Configuring and Using RMAN Diagnosing Failures Performing Recovery Transporting Data RMAN Troubleshooting and Tuning Creating an Oracle Database by using DBCA Oracle Restart Upgrading the Oracle Database Installing Grid Infrastructure for a Standalone server Using Availability Enhancements Tuning SQL Statements Geared for participants experienced with Oracle 19c DBA essentials Oracle 19c Database Administration II (Oracle DBA II) expands their understanding of Oracle database administration. Throughout the course students will explore coverage of Multitenant (CDB/PDB), database tuning, SQL tuning, and backup and recovery: the skills needed to keep a database running reliably and efficiently. The current release of the database is used for exercises and demonstrations, and the content back-ported as necessary for previous releases. CREATING CDBS AND REGULAR PDBS * Configure and create a CDB * Create a new PDB from the CDB seed * Explore the structure of PDBs MANAGE CDBS AND PDBS * Manage PDB service names and connections * Manage startup, shutdown and availability of CDBs and PDBs * Change the different modes and settings of PDBs * Evaluate the impact of parameter value changes * Performance management in CDBs and PDBs * Control CDB and PDB resource usage with the Oracle Resource Manager BACKUP AND DUPLICATE * Perform Backup and Recover CDBs and PDBs * Duplicate an active PDB * Duplicate a Database UPGRADING AND TRANSPORTING CDBS AND REGULAR PDBS * Upgrade an Oracle Database * Transport Data BACKUP STRATEGIES AND TERMINOLOGY * Perform Full and Incremental Backups and Recoveries * Compress and Encrypt RMAN Backups * Use a media manager * Create multi-section backups of exceptionally large files * Create duplexed backup sets * Create archival backups * Backup of recovery files * Backup non database files * Back up ASM meta data RESTORE AND RECOVERY CONCEPTS * Employ the best Oracle Database recovery technology for your failure situation * Describe and use Recovery technology for Crash, Complete, and Point-in-time recovery USING FLASHBACK TECHNOLOGIES * Configure your Database to support Flashback * Perform flashback operations DUPLICATING A DATABASE * Duplicate Databases INSTALL GRID INFRASTRUCTURE AND ORACLE DATABASE * Install Grid Infrastructure for a Standalone server Install Oracle Database software PATCHING GRID INFRASTRUCTURE AND ORACLE DATABASE * Patch Grid Infrastructure and Oracle Database UPGRADING TO ORACLE GRID INFRASTRUCTURE * Upgrade Oracle Grid Infrastructure USING GENERAL OVERALL DATABASE ENHANCEMENTS * Install Oracle Database software Create, Delete and Configure Databases using DBCA Creating CDBs and Regular PDBs Use Miscellaneous 19c New Features MONITORING AND TUNING DATABASE PERFORMANCE * Managing Memory Components Understanding the Automatic Workload Repository (AWR) Understanding the Advisory Framework Monitoring Wait Events, Sessions, and Services Managing Metric Thresholds and Alerts Understanding and Using the Performance Tuning Methodology Performing Performance Planning Understanding the Automatic Database Diagnostic Monitor (ADDM) MANAGE APPLICATION PDBS * Explain the purpose of application root and application seed Define and create application PDBs Install, upgrade and Patch applications Create and administer Application PDBS Clone PDBs and Application containers Plug and unplug operations with PDBs and application containers Comparing Local Undo Mode and Shared Undo Mode MANAGE SECURITY IN MULTITENANT DATABASES * Manage Security in Multitenant databases Manage PDB lockdown profiles Audit Users in CDBs and PDBs Manage other types of policies in application containers RECOVERY AND FLASHBACK * Restore and Recovering Databases with RMAN Perform CDB and PDB flashback CONFIGURING AND USING RMAN * Configure RMAN and the Database for Recoverability Configure and Using an RMAN recovery catalog DIAGNOSING FAILURES * Detect and repair database and database block corruption Diagnosing Database Issues PERFORMING RECOVERY * Restore and Recovering Databases with RMAN Perform Non RMAN database recovery TRANSPORTING DATA * Transport Data RMAN TROUBLESHOOTING AND TUNING * Interpret the RMAN message output Diagnose RMAN performance issues CREATING AN ORACLE DATABASE BY USING DBCA * Create, Delete and Configure Databases using DBCA ORACLE RESTART * Configure and use Oracle Restart to manage components UPGRADE THE ORACLE DATABASE * Plan for Upgrading an Oracle Database Upgrade an Oracle Database Perform Post-Upgrade tasks INSTALL GRID INFRASTRUCTURE FOR A STANDALONE SERVER * Rapid Home Provisioning USING AVAILABILITY ENHANCEMENTS * Use an RMAN recovery catalog Use Flashback Database TUNING SQL STATEMENTS * Understanding the Oracle Optimizer Using the SQL Tuning Advisor Managing Optimizer Statistics Using the SQL Access Advisor Understanding the SQL Tuning Process ADDITIONAL COURSE DETAILS: Nexus Humans Oracle 19c Database Administration II (DBA II) (TTOR20619) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle 19c Database Administration II (DBA II) (TTOR20619) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle 19c Database Administration II (DBA II) (TTOR20619)
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)ISSM - Certified Information Systems Security Manager Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Penetration Testers Microsoft Administrators Security Administrators Active Directory Administrators Anyone looking to learn more about security Overview Upon completion, Certified IS Security Manager students will have a strong foundation in Cyber Security & IS management standards with current best practices and will be prepared to competently take the C)ISSM exam. Companies will lean on a Certified IS Security Manager, C)ISSM to create solutions for tomorrow?s problems, today. When it comes to identifying critical issues and providing effective IS management solutions.ÿ ÿThe knowledge and course content provided in the Certified Information Systems Security Manager ? C)ISSM will not only cover ISACA©?s CISM exam but will provide a measurable certification that demonstrates proficiency in the IS Management Field. The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance. COURSE OUTLINE * Introduction * Information Security Governance * Information Risk Management and Compliance * Information Security Program Development and Management * Information Security Incident Management ADDITIONAL COURSE DETAILS: Nexus Humans C)ISSM - Certified Information Systems Security Manager Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSM - Certified Information Systems Security Manager Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSM - Certified Information Systems Security Manager Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)ISSA Certified Information Systems Security Auditor Mile 2

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers IS Systems Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview Upon completion, Certified Information Systems Security Auditor students will  be able to establish industry acceptable Cyber Security & IS management standards with current best practices and be prepared to competently take the C)ISSA exam. The Certified Information Systems Security Auditor, C)ISSA , course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require an Information System Auditor?s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. Through the use of a risk-based approach, the C)ISSA is able to implement and maintain cost-effective security controls that are closely aligned with both business and industry standards. COURSE OUTLINE * The Process of Auditing Information Systems * Risk-Based Auditing * Audit Planning and Performance * IS Systems Auditor reports * IT Governance and Management * Systems Acquisition, Development and Implementation * Systems Development Models * Types of Specialized Business Applications * Application Controls * Information Systems Operations, Maintenance, and Support * System and Communications * Hardware ADDITIONAL COURSE DETAILS: Nexus Humans C)ISSA Certified Information Systems Security Auditor Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSA Certified Information Systems Security Auditor Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

C)ISSA Certified Information Systems Security Auditor Mile 2
Delivered on-request, onlineDelivered Online
Price on Enquiry

EC-Council Certified CISO (C|CISO) w/exam

By Nexus Human

Duration 4.375 Days 26.25 CPD hours This course is intended for CCISOs are certified in the knowledge of and experience in the following CISO Domains:Governance (Policy, Legal & Compliance)IS Management Controls and Auditing Management (Projects, Technology & Operations)Management ? Projects and OperationsInformation Security Core CompetenciesStrategic Planning & Finance Overview Please refer to Overview. The Certified CISO (C|CISO) course has certified leading information security professionals around the world and is the first of its kind training and certification program aimed at producing top-level Information Security Leaders. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by seasoned CISOs for current and aspiring CISOs. GOVERNANCE * Drivers that Influence Governance * Corporate Governance Activities * Information Security Governance Activities * Governance and Ethical Decision Making SECURITY RISK MANAGEMENT, CONTROLS, AND AUDIT MANAGEMENT * Risk Management * Audit Management * Risk Treatment * Risk Management Frameworks * Risk Communication and Organizational Reporting SECURITY PROGRAM MANAGEMENT AND OPERATIONS * Information Security Portfolio Management * Information Security Program Management * Information Security Project Management * Security Operations INFORMATION SECURITY CORE COMPETENCIES * Access Control * Physical Security * Network and Communications Security * Threat and Vulnerability Management * System and Application Security * Encryption Concepts and Technology STRATEGIC PLANNING, FINANCIAL MANAGEMENT, AND VENDOR MANAGEMENT * Strategic Planning * Financial Management * Vendor Risk Management ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified CISO (C|CISO) w/exam training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified CISO (C|CISO) w/exam course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified CISO (C|CISO) w/exam
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle Database 12c - Admin, Install and Upgrade Accelerated

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Database DesignersSupport EngineerTechnical AdministratorDatabase AdministratorsData Warehouse Administrator Overview Use Oracle Restart to manage components.Upgrade database to Oracle Database 12c.Install Oracle Grid Infrastructure for a Standalone Server.Create a container database.Create an Oracle DatabaseInstall Oracle Database 12c software.Monitor the Database.Manage Database Performance.Implement Database Auditing.Configure the Database Instance Such That Resources Are Appropriately Allocated Among Sessions and Tasks.Schedule Jobs to Run Inside or Outside of the Database.Configure Oracle Net Services.Configure your Database For Backup and Recovery Operations.Describe Oracle Database Architecture.Manage the Oracle Database Instance.Manage Oracle Database Storage structures. This course will will teach you about the Oracle Database architecture and you will discover how to effectively manage an Oracle Database instance. You will also be provided key information on how to install and administer Oracle Database 12c. This course will will teach you about the Oracle Database architecture and you will discover how to effectively manage an Oracle Database instance. You will also be provided key information on how to install and administer Oracle Database 12c.

Oracle Database 12c - Admin, Install and Upgrade Accelerated
Delivered on-request, onlineDelivered Online
Price on Enquiry

Salesforce B2C Commerce Developer with SFRA (CCD102)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Developers who have: At least two years of experience with Java or JavaScript programming Familiarity with the jQuery library and JSON syntax Overview When you complete this course, you will be able to: Create cartridges to add reusable functionality to a site. Use JavaScript controllers to add business logic to a site. Create reusable code using ISML templates. Use content slots and page designer to improve the appearance and flexibility of a site. Use B2C Commerce Script in ISML templates and script files. Use the Forms Framework to control the validation, rendering, and storing of consumer-entered values. Create hooks to configure functionality that is called a specific event. Measure and ensure site performance. Install and use SFRA command line tools to perform testing. This course introduces the core programming concepts, relevant files, and scripting language for Salesforce B2C Commerce. It is a must for developers new to Salesforce B2C Commerce and experienced developers looking to ramp up on Storefront Reference Architecture. Using real-world scenarios, this course covers how to customize the Storefront Reference Architecture and modify a B2C Commerce Cloud storefront. OVERVIEW OF B2C COMMERCE * Salesforce B2C Commerce Overview * Storefront Reference Architecture Overview * Business Manager Organization GETTING STARTED * Accessing Storefront Reference Architecture * Creating a Workspace * Creating a Server Connection * Navigating Cartridges CARTRIDGESCARTRIDGES * Cartridge Types * Cartridge Path * Working with Plugin Cartridges * Using a Custom Storefront Cartridge CONTROLLERS * Introduction to JavaScript Controllers * Creating a JavaScript Controller * Script & JavaScript Controller Debugging * Middleware Functions * B2C Commerce Script API MODELS * Introduction to Models * Extending Models ISML * ISML Tags and Expressions * Reusing Code in Templates * Conditional Statements & Loops * Resource API & Resource Bundles CONTENT SLOTS * Creating & Configuring Content Slots * Content Link Functions PAGE DESIGNER * Introduction to Page Designer * Business & Developer Tasks * Creating Custom Components FORMS FRAMEWORK * Custom & System Objects * XML Metadata File * Server-Side Validation Script * ISML Form Template * Custom Logging * Client-Side Validation Script SITE MAINTENANCE * Site and Page Caching * Site Performance STOREFRONT REFERENCE ARCHITECTURE TOOLS * GitHub * NPM Tools * Functional and Unit Tests

Salesforce B2C Commerce Developer with SFRA (CCD102)
Delivered on-request, onlineDelivered Online
Price on Enquiry

EC-Council Certified Threat Intelligence Analyst (C|TIA)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks. Ethical Hackers Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers Threat Intelligence Analysts, Associates, Researchers, Consultants Threat Hunters SOC Professionals Digital Forensic and Malware Analysts Incident Response Team Members Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience. Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence. Individuals interested in preventing cyber threats. Overview This program will benefit students who are looking to build effective threat intelligence for their organization in order to combat modern-day cyber-attacks and prevent future attacks. Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive, specialist-level program that teaches a structured approach for building effective threat intelligence. INTRODUCTION TO THREAT INTELLIGENCE * Understanding Intelligence * Understanding Cyber Threat Intelligence * Overview of Threat Intelligence Lifecycle and Frameworks CYBER THREATS AND KILL CHAIN METHODOLOGY * Understanding Cyber Threats * Understanding Advanced Persistent Threats (APTs) * Understanding Cyber Kill Chain * Understanding Indicators of Compromise (IoCs) REQUIREMENTS, PLANNING, DIRECTION, AND REVIEW * Understanding Organization?s Current Threat Landscape * Understanding Requirements Analysis * Planning Threat Intelligence Program * Establishing Management Support * Building a Threat Intelligence Team * Overview of Threat Intelligence Sharing * Reviewing Threat Intelligence Program DATA COLLECTION AND PROCESSING * Overview of Threat Intelligence Data Collection * Overview of Threat Intelligence Collection Management * Overview of Threat Intelligence Feeds and Sources * Understanding Threat Intelligence Data Collection and Acquisition * Understanding Bulk Data Collection * Understanding Data Processing and Exploitation DATA ANALYSIS * Overview of Data Analysis * Understanding Data Analysis Techniques * Overview of Threat Analysis * Understanding Threat Analysis Process * Overview of Fine-Tuning Threat Analysis * Understanding Threat Intelligence Evaluation * Creating Runbooks and Knowledge Base * Overview of Threat Intelligence Tools INTELLIGENCE REPORTING AND DISSEMINATION * Overview of Threat Intelligence Reports * Introduction to Dissemination * Participating in Sharing Relationships * Overview of Sharing Threat Intelligence * Overview of Delivery Mechanisms * Understanding Threat Intelligence Sharing Platforms * Overview of Intelligence Sharing Acts and Regulations * Overview of Threat Intelligence Integration

EC-Council Certified Threat Intelligence Analyst (C|TIA)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Introduction to C Plus Plus Programming Essentials (TTCP2100)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This is an introductory-level C++ programming course designed for developers with experience programming in C or other languages. Practical hands-on prior programming experience and knowledge is required. Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, designed to train attendees in basic coding with C++, coupling the most current, effective techniques with the soundest industry practices. Our engaging instructors and mentors are highly experienced practitioners who bring years of current 'on-the-job' experience into every classroom. Working in a hands-on learning environment, guided by our expert team, attendees will learn: Writing procedural programs using C++ Using private, public and protected keywords to control access to class members Defining a class in C++ Writing constructors and destructors Writing classes with const and static class members Overloading operators Implementing polymorphic methods in programs Writing programs using file I/O and string streams Using manipulators and stream flags to format output Using the keyword template to write generic functions and classes Writing programs that use generic classes and functions Writing programs that use algorithms and containers of the Standard Library Apply object-oriented design techniques to real-world programming problems Using algorithms and containers of the Standard Library to manipulate string data Understand how C++ protects the programmer from implementation changes in other modules of an application Using try() blocks to trap exceptions Using catch() blocks to handle exceptions Defining exceptions and using throw to trigger them Introduction to C++ Programming / C++ Essentials is a skills-focused, hands-on C++ training course geared for experienced programmers who need to learn C++ coupled with sounds coding skills and best practices for OO development. Students will leave this course armed with the required skills to put foundation-level C++ programming skills right to work in a practical environment. The central concepts of C++ syntax and style are taught in the context of using object-oriented methods to achieve reusability, adaptability and reliability. Emphasis is placed on the features of C++ that support abstract data types, inheritance, and polymorphism. Students will learn to apply the process of data abstraction and class design. Practical aspects of C++ programming including efficiency, performance, testing, and reliability considerations are stressed throughout. Comprehensive hands on exercises are integrated throughout to reinforce learning and develop real competency MOVING FROM C TO C++ (OPTIONAL) * New Compiler Directives * Stream Console I/O * Explicit Operators * Standard Libraries * Data Control Capabilities HANDLING DATA * New Declaration Features * Initialization and Assignment * Enumerated Types * The bool Type * Constant Storage * Pointers to Constant Storage * Constant Pointers * References * Constant Reference Arguments * Volatile Data * Global Data FUNCTIONS * Function Prototypes and Type Checking * Default Function Data Types * Function Overloading * Problems with Function Overloading * Name Resolution * Promotions and Conversions * Call by Value * Reference Declarations * Call-by-Reference and Reference Types * References in Function Return * Constant Argument Types * Conversion of Parameters Using Default Initializers * Providing Default Arguments * Inline Functions OPERATOR OVERLOADING * Advantages and Pitfalls of Overloading * Member Operator Syntax and Examples * Class Assignment Operators * Class Equality Operators * Non-Member Operator Overloading * Member and Non-Member Operator Functions * Operator Precedence * This Pointer * Overloading the Assignment Operator * Overloading Caveats CREATING AND USING OBJECTS * Creating Automatic Objects * Creating Dynamic Objects * Calling Object Methods * Constructors * Initializing Member consts * Initializer List Syntax * Allocating Resources in Constructor * Destructors * Block and Function Scope * File and Global Scope * Class Scope * Scope Resolution Operator :: * Using Objects as Arguments * Objects as Function Return Values * Constant Methods * Containment Relationships DYNAMIC MEMORY MANAGEMENT * Advantages of Dynamic Memory Allocation * Static, Automatic, and Heap Memory * Free Store Allocation with new and delete * Handling Memory Allocation Errors CONTROLLING OBJECT CREATION * Object Copying and Copy Constructor * Automatic Copy Constructor * Conversion Constructor STREAMING I/O * Streams and the iostream Library * Built-in Stream Objects * Stream Manipulators * Stream Methods * Input/Output Operators * Character Input * String Streams * Formatted I/O * File Stream I/O * Overloading Stream Operators * Persistent Objects * INTRODUCTION TO OBJECT CONCEPTS * The Object Programming Paradigm * Object-Orientated Programming Definitions * Information Hiding and Encapsulation * Separating Interface and Implementation * Classes and Instances of Objects * Overloaded Objects and Polymorphism DECLARING AND DEFINING CLASSES * Components of a Class * Class Structure * Class Declaration Syntax * Member Data * Built-in Operations * Constructors and Initialization * Initialization vs. Assignment * Class Type Members * Member Functions and Member Accessibility * Inline Member Functions * Friend Functions * Static Members * Modifying Access with a Friend Class TEMPLATES * Purpose of Template Classes * Constants in Templates * Templates and Inheritance * Container Classes * Use of Libraries STRINGS IN C++ * Character Strings * The String Class * Operators on Strings * Member Functions of the String Class INHERITANCE * Inheritance and Reuse * Composition vs. Inheritance * Inheritance: Centralized Code * Inheritance: Maintenance and Revision * Public, Private and Protected Members * Redefining Behavior in Derived Classes * Designing Extensible Software Systems * Syntax for Public Inheritance * Use of Common Pointers * Constructors and Initialization * Inherited Copy Constructors * Destructors and Inheritance * Public, Protected, Private Inheritance * EXCEPTIONS * Types of Exceptions * Trapping and Handling Exceptions * Triggering Exceptions * Handling Memory Allocation Errors C++ PROGRAM STRUCTURE * Organizing C++ Source Files * Integrating C and C++ Projects * Using C in C++ RELIABILITY CONSIDERATIONS IN C++ PROJECTS * Function Prototypes * Strong Type Checking * Constant Types * C++ Access Control Techniques POLYMORPHISM IN C++ * Definition of Polymorphism * Calling Overridden Methods * Upcasting * Accessing Overridden Methods * Virtual Methods and Dynamic Binding * Virtual Destructors * Abstract Base Classes and Pure Virtual Methods MULTIPLE INHERITANCE * Derivation from Multiple Base Classes * Base Class Ambiguities Virtual Inheritance * Virtual Base Classes * Virtual Base Class Information THE STANDARD TEMPLATE LIBRARY * STL Containers * Parameters Used in Container Classes * The Vector Class * STL Algorithms * Use of Libraries

Introduction to C Plus Plus Programming Essentials (TTCP2100)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle 19c Database Administration I (DBA I) (TTOR20519)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This hands-on course is geared for experienced DBAs new to Oracle 19c, who can work in Linux and have basic experience with SQL scripting. Overview This course combines expert lecture, real-world demonstrations and group discussions with machine-based practical labs and exercises. Working in a hands-on learning environment led by our Oracle Certified expert facilitator, students will learn how to: How to use tools to access an Oracle Database Generate database creation scripts by using DBCA How to create a container database (CDB) by using the CREATE DATABASE command Learn about Startup and shut down Oracle databases Initialization parameter files and initialization parameters Tools that are used to administer Oracle Net Services How to use the Oracle Connection Manager Control utility to administer Oracle Connection Manager How to create a new PDB from the PDB seed. Logical and physical storage structures in an Oracle database Usage of Oracle Database features that save space Explanation of DML and undo data generation Learn about general architecture of Oracle Data Pump and SQL*Loader How to use SQL*Loader to load data from a non-Oracle database (or user files) Bonus Content / Time Permitting: Explanation of maintenance windows Bonus Content / Time Permitting: Employ basic monitoring procedures and manage performance Oracle 19C Database Administration I (Oracle DBA I) is a comprehensive, hands-on course provides concrete information on the design of an Oracle Database instance and database, allowing you to manage your database investment. In this class, you will learn how to create database storage structures that align with your requirements and business models. You will also learn how to create users and administer databases as well as harden the databases to meet your business requirements. This is the foundational course for learning about Oracle Database and it does not assume prior knowledge or Oracle technologies, however you should have incoming experience working with SQL, and be comfortable with Linux and working from the command line. This training is NOT Official Oracle University training. This is independent, adjustable content that aligns with current topics, skills and tools that participants need to excel in these areas. INTRODUCTION TO ORACLE DATABASE * Oracle Multitenant Container Database * Oracle Database Instance Configurations * Database Sharding * Oracle Database Server ACCESSING AN ORACLE DATABASE * Oracle Database Tools * Database Tool Choices * SQL Developer * Enterprise Manager Database Express CREATING AN ORACLE DATABASE BY USING DBCA * Planning the Database * Choosing a Database Template * Configuration Assistant CREATING AN ORACLE DATABASE BY USING A SQL COMMAND * Creating a Container Database * Enable Pluggable Database STARTING UP AND SHUTTING DOWN A DATABASE INSTANCE * Starting the Oracle Database Instance * Shutting Down an Oracle Database Instance * Opening and Closing PDBs MANAGING DATABASE INSTANCES * Investigating Initialization Parameter Files * Viewing Initialization Parameters by Using SQL*Plus * Modifying Initialization Parameters by Using SQL*Plus * Viewing Diagnostic Information ORACLE NET SERVICES OVERVIEW * Oracle Net Services Components * Oracle Net Listener CONFIGURING NAMING METHODS * Configuring the Oracle Network to Access a Database * Creating a Net Service Name for a PDB CONFIGURING AND ADMINISTERING THE LISTENER * Exploring the Default Listener * Creating a Second Listener * Connecting to a Database Service Using the New Listener CONFIGURING A SHARED SERVER ARCHITECTURE * Configuring Shared Server Mode Configuring Clients to Use a Shared Server CONFIGURING ORACLE CONNECTION MANAGER FOR MULTIPLEXING AND ACCESS CONTROL * Oracle Connection Manager Processes * Filtering Rules * Session Multiplexing CREATING PDBS * Creating a New PDB from the PDB Seed * Cloning Remote PDBs in Hot Mode * Relocating PDBs MANAGING PDBS * Renaming a PDB * Setting Parameter Values for PDBs DATABASE STORAGE OVERVIEW * Logical and Physical Database Structures * Tablespaces and Data Files * Types of Segments * Monitoring Tablespace Space Usage CREATING AND MANAGING TABLESPACES * Viewing Tablespace Information * Creating a Tablespace * Managing Temporary and Permanent Tablespaces IMPROVING SPACE USAGE * Managing Space in Tablespaces * Using Compression * Enabling the Resumable Space Allocation Feature CREATING AND MANAGING USER ACCOUNTS * Creating Common and Local Users * Creating a Local User for an Application * Exploring OS and Password File Authentication CONFIGURING PRIVILEGE AND ROLE AUTHORIZATION * Granting a Local Role (DBA) to PDBADMIN * Using SQL*Developer to Create Local Roles CONFIGURING USER RESOURCE LIMITS * Using SQL*Developer to Create a Local Profile & Users * Configuring a Default Role for a User IMPLEMENTING ORACLE DATABASE AUDITING * Enabling Unified Auditing * Creating Audit Users * Creating an Audit Policy INTRODUCTION TO LOADING AND TRANSPORTING DATA * General Architecture * Oracle Data Pump * SQL Loader * Loading Data into a PDB from an External File * Moving Data from One PDB to Another PDB * Transporting a Tablespace USING EXTERNAL TABLES TO LOAD AND TRANSPORT DATA * Querying External Tables * Unloading External Tables AUTOMATED MAINTENANCE TASKS OVERVIEW * Automated Maintenance Tasks * Maintenance Windows * Predefined Maintenance Windows BONUS: MANAGING TASKS AND WINDOWS * Enabling and Disabling Automated Maintenance Tasks * Modifying the Duration of a Maintenance Window BONUS: DATABASE MONITORING AND PERFORMANCE TUNING OVERVIEW * Performance Planning Considerations * Automatic Workload Repository (AWR) * Advisory Framework BONUS: MONITORING DATABASE PERFORMANCE & PROCESSES * Server-Generated Alerts * Setting Metric Thresholds * Performance Monitoring * Examining the Database Background Processes BONUS: TUNING DATABASE MEMORY * Viewing Memory Configurations BONUS: ANALYZING SQL AND OPTIMIZING ACCESS PATHS * Using the Optimizer Statistics Advisor

Oracle 19c Database Administration I (DBA I) (TTOR20519)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Home - Start Volunteer

4.7(160)

By Janets

Transform lives as a Home-Start Volunteer! Join our dedicated team to make a positive impact on families in need. Support and empower parents, offering a helping hand through challenging times. Become a beacon of hope as a Home-Start Volunteer today.

Home - Start Volunteer
Delivered Online On Demand
£25