• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

291 Cloud Computing courses delivered Online

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - INTRODUCTION TO ETHICAL HACKING * Information Security Overview * Cyber Kill Chain Concepts * Hacking Concepts * Ethical Hacking Concepts * Information Security Controls * Information Security Laws and Standards 2 - 2 - FOOT-PRINTING AND RECONNAISSANCE * Footprinting Concepts * Footprinting through Search Engines * Footprinting through Web Services * Footprinting through Social Networking Sites * Website Footprinting * Email Footprinting * Who is Footprinting * DNS Footprinting * Network Footprinting * Footprinting through Social Engineering * Footprinting Tools * Footprinting Countermeasures 3 - SCANNING NETWORKS * Network Scanning Concepts * Scanning Tools * Host Discovery * Port and Service Discovery * OS Discovery (Banner Grabbing/OS Fingerprinting) * Scanning Beyond IDS and Firewall * Draw Network Diagrams 4 - ENUMERATION * Enumeration Concepts * NetBIOS Enumeration * SNMP Enumeration * LDAP Enumeration * NTP and NFS Enumeration * SMTP and DNS Enumeration * Other Enumeration Techniques * Enumeration Countermeasures 5 - VULNERABILITY ANALYSIS * Vulnerability Assessment Concepts * Vulnerability Classification and Assessment Types * Vulnerability Assessment Solutions and Tools * Vulnerability Assessment Reports 6 - SYSTEM HACKING * System Hacking Concepts * Gaining Access * Escalating Privileges * Maintaining Access * Clearing Logs 7 - MALWARE THREATS * Malware Concepts * APT Concepts * Trojan Concepts * Virus and Worm Concepts * Fileless Malware Concepts * Malware Analysis * Countermeasures * Anti-Malware Software 8 - SNIFFING * Sniffing Concepts * Sniffing Technique: MAC Attacks * Sniffing Technique: DHCP Attacks * Sniffing Technique: ARP Poisoning * Sniffing Technique: Spoofing Attacks * Sniffing Technique: DNS Poisoning * Sniffing Tools * Countermeasures * Sniffing Detection Techniques 9 - SOCIAL ENGINEERING * Social Engineering Concepts * Social Engineering Techniques * Insider Threats * Impersonation on Social Networking Sites * Identity Theft * Countermeasures 10 - DENIAL-OF-SERVICE * DoS/DDoS Concepts * DoS/DDoS Attack Techniques * BotnetsDDoS Case Study * DoS/DDoS Attack Tools * Countermeasures * DoS/DDoS Protection Tools 11 - SESSION HIJACKING * Session Hijacking Concepts * Application Level Session Hijacking * Network Level Session Hijacking * Session Hijacking Tools * Countermeasures 12 - EVADING IDS, FIREWALLS, AND HONEYPOTS * IDS, IPS, Firewall, and Honeypot Concepts * IDS, IPS, Firewall, and Honeypot Solutions * Evading IDS * Evading Firewalls * IDS/Firewall Evading Tools * Detecting Honeypots * IDS/Firewall Evasion Countermeasures 13 - HACKING WEB SERVERS * Web Server Concepts * Web Server Attacks * Web Server Attack Methodology * Web Server Attack Tools * Countermeasures * Patch Management * Web Server Security Tools 14 - HACKING WEB APPLICATIONS * Web Application Concepts * Web Application Threats * Web Application Hacking Methodology * Web API, Webhooks, and Web Shell * Web Application Security 15 - SQL INJECTION * SQL Injection Concepts * Types of SQL Injection * SQL Injection Methodology * SQL Injection Tools * Evasion Techniques * Countermeasures 16 - HACKING WIRELESS NETWORKS * Wireless Concepts * Wireless Encryption * Wireless Threats * Wireless Hacking Methodology * Wireless Hacking Tools * Bluetooth Hacking * Countermeasures * Wireless Security Tools 17 - HACKING MOBILE PLATFORMS * Mobile Platform Attack Vectors * Hacking Android OS * Hacking iOS * Mobile Device Management * Mobile Security Guidelines and Tools 18 - IOT AND OT HACKING * IoT Hacking * IoT Concepts * IoT Attacks * IoT Hacking Methodology * IoT Hacking Tools * Countermeasures * OT Hacking * OT Concepts * OT Attacks * OT Hacking Methodology * OT Hacking Tools * Countermeasures 19 - CLOUD COMPUTING * Cloud Computing Concepts * Container Technology * Serverless Computing * Cloud Computing Threats * Cloud Hacking * Cloud Security 20 - CRYPTOGRAPHY * Cryptography Concepts * Encryption Algorithms * Cryptography Tools * Public Key Infrastructure (PKI) * Email Encryption * Disk Encryption * Cryptanalysis * Countermeasures ADDITIONAL COURSE DETAILS: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online6 days, Jun 17th, 13:00 + 5 more
£3495

AZ-900T00 Microsoft Azure Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is suitable for IT personnel who are just beginning to work with Azure. This audience wants to learn about our offerings and get hands-on experience with the product. This course primarily uses the Azure portal and command line interface to create resources and does not require scripting skills. Students in this course will gain confidence to take other role-based courses and certifications, such as Azure Administrator. This course combines lecture, demonstrations, and hands-on labs. This course will also help prepare someone for the AZ-900 exam. This course will provide foundational level knowledge on cloud concepts; core Azure services; and Azure management and governance features and tools. Prerequisites There are no prerequisites for taking this course. Familiarity with cloud computing is helpful, but isn't necessary. 1 - DESCRIBE CLOUD COMPUTING * What is cloud computing * Describe the shared responsibility model * Define cloud models * Describe the consumption-based model 2 - DESCRIBE THE BENEFITS OF USING CLOUD SERVICES * Describe the benefits of high availability and scalability in the cloud * Describe the benefits of reliability and predictability in the cloud * Describe the benefits of security and governance in the cloud * Describe the benefits of manageability in the cloud 3 - DESCRIBE CLOUD SERVICE TYPES * Describe Infrastructure as a Service * Describe Platform as a Service * Describe Software as a Service 4 - DESCRIBE THE CORE ARCHITECTURAL COMPONENTS OF AZURE * What is Microsoft Azure * Get started with Azure accounts * Describe Azure physical infrastructure * Describe Azure management infrastructure 5 - DESCRIBE AZURE COMPUTE AND NETWORKING SERVICES * Describe Azure Virtual Machines * Describe Azure Virtual Desktop * Describe Azure Containers * Describe Azure Functions * Describe application hosting options * Describe Azure Virtual Networking * Describe Azure Virtual Private Networks * Describe Azure ExpressRoute * Describe Azure DNS 6 - DESCRIBE AZURE STORAGE SERVICES * Describe Azure storage accounts * Describe Azure storage redundancy * Describe Azure storage services * Identify Azure data migration options * Identify Azure file movement options 7 - DESCRIBE AZURE IDENTITY, ACCESS, AND SECURITY * Describe Azure directory services * Describe Azure authentication methods * Describe Azure external identities * Describe Azure conditional access * Describe Azure role-based access control * Describe zero trust model * Describe defense-in-depth * Describe Microsoft Defender for Cloud 8 - DESCRIBE COST MANAGEMENT IN AZURE * Describe factors that can affect costs in Azure * Compare the Pricing and Total Cost of Ownership calculators * Describe the Microsoft Cost Management tool * Describe the purpose of tags 9 - DESCRIBE FEATURES AND TOOLS IN AZURE FOR GOVERNANCE AND COMPLIANCE * Describe the purpose of Microsoft Purview * Describe the purpose of Azure Policy * Describe the purpose of resource locks * Describe the purpose of the Service Trust portal 10 - DESCRIBE FEATURES AND TOOLS FOR MANAGING AND DEPLOYING AZURE RESOURCES * Describe tools for interacting with Azure * Describe the purpose of Azure Arc * Describe Azure Resource Manager and Azure ARM templates 11 - DESCRIBE MONITORING TOOLS IN AZURE * Describe the purpose of Azure Advisor * Describe Azure Service Health * Describe Azure Monitor ADDITIONAL COURSE DETAILS: Nexus Humans AZ-900T00 Microsoft Azure Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-900T00 Microsoft Azure Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-900T00 Microsoft Azure Fundamentals
Delivered OnlineTwo days, Jun 17th, 13:00 + 15 more
£1190

SC-400T00 Administering Information Protection and Compliance in Microsoft 365

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The information protection administrator translates an organization?s risk and compliance requirements into technical implementation. They are responsible for implementing and managing solutions for content classification, data loss prevention (DLP), information protection, data lifecycle management, records management, privacy, risk, and compliance. They also work with other roles that are responsible for governance, data, and security to evaluate and develop policies to address an organization's risk reduction and compliance goals. This role assists workload administrators, business application owners, human resources departments, and legal stakeholders to implement technology solutions that support the necessary policies and controls. Learn how to protect information in your Microsoft 365 deployment. This course focuses on data lifecycle management and information protection and compliance within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies, Microsoft Purview Message Encryption, audit, eDiscovery, and insider risk among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400). Prerequisites * Foundational knowledge of Microsoft security and compliance technologies. * Basic knowledge of information protection concepts. * Understanding of cloud computing concepts. * Understanding of Microsoft 365 products and services. 1 - INTRODUCTION TO INFORMATION PROTECTION AND DATA LIFECYCLE MANAGEMENT IN MICROSOFT PURVIEW * Know your data * Protect your data * Prevent data loss * Govern your data 2 - CLASSIFY DATA FOR PROTECTION AND GOVERNANCE * Data classification overview * Classify data using sensitive information types * Classify data using trainable classifiers * Review sensitive information and label usage * Explore labeled and sensitive content * Understand activities related to your data 3 - CREATE AND MANAGE SENSITIVE INFORMATION TYPES * Compare built-in versus custom sensitive information types * Create and manage custom sensitive information types * Describe custom sensitive information types with exact data match * Implement document fingerprinting * Create keyword dictionary 4 - UNDERSTAND MICROSOFT 365 ENCRYPTION * Learn how Microsoft 365 data is encrypted at rest * Understand service encryption in Microsoft Purview * Explore customer key management using Customer Key * Learn how data is encrypted in-transit 5 - DEPLOY MICROSOFT PURVIEW MESSAGE ENCRYPTION * Implement Microsoft Purview Message Encryption * Implement Microsoft Purview Advanced Message Encryption * Use Microsoft Purview Message Encryption templates in mail flow rules 6 - PROTECT INFORMATION IN MICROSOFT PURVIEW * Information protection overview * Configure sensitivity labels * Configure sensitivity label policies * Configure auto-labeling policies * Manage, monitor, and remediate information protection 7 - APPLY AND MANAGE SENSITIVITY LABELS * Apply sensitivity labels to Microsoft Teams, Microsoft 365 groups, and SharePoint sites * Plan on-premises labeling * Configure on-premises labeling for the Unified Labeling Scanner * Apply protections and restrictions to email and files * Monitor label performance using label analytics 8 - PREVENT DATA LOSS IN MICROSOFT PURVIEW * Data loss prevention overview * Identify content to protect * Define policy settings for your DLP policy * Test and create your DLP policy * Prepare Endpoint DLP * Manage DLP alerts in the Microsoft Purview compliance portal * View data loss prevention reports * Implement the Microsoft Purview Extension 9 - CONFIGURE DLP POLICIES FOR MICROSOFT DEFENDER FOR CLOUD APPS AND POWER PLATFORM * Configure data loss prevention policies for Power Platform * Integrate data loss prevention in Microsoft Defender for Cloud Apps * Configure policies in Microsoft Defender for Cloud Apps * Manage data loss prevention violations in Microsoft Defender for Cloud Apps 10 - MANAGE DATA LOSS PREVENTION POLICIES AND REPORTS IN MICROSOFT 365 * Configure data loss prevention for policy precedence * Implement data loss prevention policies in test mode * Explain data loss prevention reporting capabilities * Manage permissions for data loss prevention reports * Manage and respond to data loss prevention policy violations 11 - MANAGE THE DATA LIFECYCLE IN MICROSOFT PURVIEW * Data Lifecycle Management overview * Configure retention policies * Configure retention labels * Configure manual retention label policies * Configure auto-apply retention label policies * Import data for Data Lifecycle Management * Manage, monitor, and remediate Data Lifecycle Management 12 - MANAGE DATA RETENTION IN MICROSOFT 365 WORKLOADS * Explain retention in Exchange Online * Explain retention in SharePoint Online and OneDrive * Explain retention in Microsoft Yammer * Activate archive mailboxes in Microsoft Exchange * Apply mailbox holds in Microsoft Exchange * Recover content in Microsoft Exchange 13 - MANAGE RECORDS IN MICROSOFT PURVIEW * Records management overview * Import a file plan * Configure retention labels * Configure event driven retention * Manage, monitor, and remediate records 14 - EXPLORE COMPLIANCE IN MICROSOFT 365 * Plan for security and compliance in Microsoft 365 * Plan your beginning compliance tasks in Microsoft Purview * Manage your compliance requirements with Compliance Manager * Examine the Compliance Manager dashboard * Analyze the Microsoft Compliance score 15 - SEARCH FOR CONTENT IN THE MICROSOFT PURVIEW COMPLIANCE PORTAL * Explore Microsoft Purview eDiscovery solutions * Create a content search * View the search results and statistics * Export the search results and search report * Configure search permissions filtering * Search for and delete email messages 16 - MANAGE MICROSOFT PURVIEW EDISCOVERY (STANDARD) * Explore Microsoft Purview eDiscovery solutions * Implement Microsoft Purview eDiscovery (Standard) * Create eDiscovery holds * Search for content in a case * Export content from a case * Close, reopen, and delete a case 17 - MANAGE MICROSOFT PURVIEW EDISCOVERY (PREMIUM) * Explore Microsoft Purview eDiscovery (Premium) * Implement Microsoft Purview eDiscovery (Premium) * Create and manage an eDiscovery (Premium) case * Manage custodians and non-custodial data sources * Analyze case content 18 - MANAGE MICROSOFT PURVIEW AUDIT (STANDARD) * Explore Microsoft Purview Audit solutions * Implement Microsoft Purview Audit (Standard) * Search the audit log * Export, configure, and view audit log records * Use audit log searching to investigate common support issues 19 - PREPARE MICROSOFT PURVIEW COMMUNICATION COMPLIANCE * Plan for communication compliance * Identify and resolve communication compliance workflow * Case study--Configure an offensive language policy * Investigate and remediate communication compliance alerts 20 - MANAGE INSIDER RISK IN MICROSOFT PURVIEW * Insider risk management overview * Create and manage insider risk policies * Investigate insider risk alerts * Take action on insider risk alerts through cases * Manage insider risk management forensic evidence * Create insider risk management notice templates 21 - IMPLEMENT MICROSOFT PURVIEW INFORMATION BARRIERS * Explore Microsoft Purview Information Barriers * Configure information barriers in Microsoft Purview * Examine information barriers in Microsoft Teams * Examine information barriers in OneDrive * Examine information barriers in SharePoint 22 - MANAGE REGULATORY AND PRIVACY REQUIREMENTS WITH MICROSOFT PRIVA * Create and manage risk management policies * Investigate and remediate risk management alerts * Create rights requests * Manage data estimate and retrieval for rights requests * Review data from rights requests * Get reports from rights requests 23 - IMPLEMENT PRIVILEGED ACCESS MANAGEMENT * Case study--Implementing privileged access management 24 - MANAGE CUSTOMER LOCKBOX * Manage Customer Lockbox requests

SC-400T00 Administering Information Protection and Compliance in Microsoft 365
Delivered Online5 days, Jun 17th, 13:00 + 2 more
£2380

Cloud Computing

4.8(8)

By Skill Up

Embark on a transformative journey into the realm of Cloud Computing. Discover the essence of digital innovation and efficiency in this immersive course.

Cloud Computing
Delivered Online On Demand
£25

Getting Started with Cloud Computing - Level 1

By Packt

Start your journey in the cloud computing revolution-what, why, and how!

Getting Started with Cloud Computing - Level 1
Delivered Online On Demand
£95.99

Introduction to Cloud Computing

By Packt

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. In this course, you will learn about the various cloud service models and how to manage Azure with CLI.

Introduction to Cloud Computing
Delivered Online On Demand
£33.99

Cloud Computing Training

By Course Cloud

COURSE OVERVIEW The comprehensive Cloud Computing Training has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Cloud Computing Training today, and learn from the very best the industry has to offer! This best selling Cloud Computing Training has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Cloud Computing Training is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Cloud Computing Training is CPD-accredited, so you can be confident you're completing a quality training course  will boost your CV and enhance your career potential. The Cloud Computing Training is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Cloud Computing Training, you will be awarded a certificate of completion  as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Cloud Computing Training will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Cloud Computing Training to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Cloud Computing Training
Delivered Online On Demand
£319

AWS Technical Essentials

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for Individuals responsible for articulating the technical benefits of AWS services Individuals interested in learning how to get started with using AWS SysOps Administrators, Solution Architects and Developers interested in using AWS services Overview Recognize terminology and concepts as they relate to the AWS platform and navigate the AWS Management Console. Understand the foundational services, including Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS). Understand the security measures AWS provides and key concepts of AWS Identity and Access Management (IAM). Understand AWS database services, including Amazon DynamoDB and Amazon Relational Database Service (RDS). Understand AWS management tools, including Auto Scaling, Amazon CloudWatch, Elastic Load Balancing (ELB), and AWS Trusted Advisor. AWS Technical Essentials introduces you to AWS services, and common solutions. It provides you with fundamental knowledge to become more proficient in identifying AWS services. It helps you make informed decisions about IT solutions based on your business requirements and get started working on AWS. Prerequisites * Working knowledge of distributed systems * Familiarity with general networking concepts * Working knowledge of multi-tier architectures * Familiarity with cloud computing concepts 1 - AWS INTRODUCTION AND HISTORY * AWS Global Infrastructure * Demonstration: AWS Management Console 2 - AWS STORAGE * Identify key AWS storage options * Describe Amazon EBS * Create an Amazon S3 bucket and manage associated objects 3 - COMPUTE, NETWORK AND STORAGE SERVICES * Amazon Elastic Compute Cloud (EC2) * Amazon Virtual Private Cloud (VPC) * Amazon Simple Storage Service (S3) * Amazon Elastic Block Store (EBS) * Demonstration: Amazon Simple Storage Service (S3) * Hands-on lab: Build your VPC and launch a web server 4 - AWS SECURITY, AWS IDENTITY AND ACCESS MANAGEMENT (IAM) * AWS Identity and Access Management (IAM) * Demonstration: AWS Identity and Access Management (IAM) 5 - COMPUTE SERVICES & NETWORKING * Identify the different AWS compute and networking options * Describe an Amazon Virtual Private Cloud (VPC) * Create an Amazon EC2 instance * Use Amazon EBS with Amazon EC2 6 - MANAGED SERVICES & DATABASE * Describe Amazon DynamoDB * Understand key aspects of Amazon RDS * Launch an Amazon RDS instance 7 - DATABASES (RDS, DYNAMODB) * SQL and NoSQL databases * Data storage considerations * Hands-on lab: Build your database server and connect to it 8 - AWS ELASTICITY AND MANAGEMENT TOOLS * Auto scaling * Load balancing * Cloud Watch * Trusted Advisor * Hands-on lab: Scale and load balance your architecture 9 - DEPLOYMENT AND MANAGEMENT * Identify what is CloudFormation * Describe Amazon CloudWatch metrics and alarms * Describe Amazon Identity and Access Management (IAM)

AWS Technical Essentials
Delivered OnlineTwo days, Jun 21st, 13:00 + 4 more
£675

Cloud Computing Fundementals Course

By Course Cloud

COURSE OVERVIEW The comprehensive Cloud Computing Fundamentals Course has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Cloud Computing Fundamentals Course today, and learn from the very best the industry has to offer! This best selling Cloud Computing Fundamentals Course has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Cloud Computing Fundamentals Course is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Cloud Computing Fundamentals Course is CPD-accredited, so you can be confident you're completing a quality training course  will boost your CV and enhance your career potential. The Cloud Computing Fundamentals Course is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Cloud Computing Fundamentals Course, you will be awarded a certificate of completion  as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Cloud Computing Fundamentals Course will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Cloud Computing Fundamentals Course to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Cloud Computing Fundementals Course
Delivered Online On Demand
£319

Cloud Computing

By The Teachers Training

Cloud Computing  is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Cloud Computing  and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 01 hour studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. WHY CHOOSE TEACHERS TRAINING Some of our website features are: * This is a dedicated website for teaching * 24/7 tutor support * Interactive Content * Affordable price * Courses accredited by the UK's top awarding bodies * 100% online * Flexible deadline ENTRY REQUIREMENTS No formal entry requirements. You need to have: * Passion for learning * A good understanding of the English language * Be motivated and hard-working * Over the age of 16. CERTIFICATION CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. * You can get your digital certificate (PDF) for £4.99 only * Hard copy certificates are also available, and you can get one for only £10.99 * You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Cloud Computing Introduction 00:04:00 The Need for Cloud Computing 00:13:00 What is Cloud Computing - I 00:05:00 What is Cloud Computing- II 00:06:00 Benefits of Cloud Computing 00:09:00 CapEx Vs OpEx 00:03:00 What are Public Clouds 00:02:00 Characteristics of Public Cloud 00:01:00 What are Private Clouds 00:01:00 Characteristics of Private Cloud 00:02:00 What is Hybrid Cloud 00:01:00 Characteristics of Hybrid Cloud 00:01:00 Review and What Next!! 00:01:00 What is Infrastructure as a service 00:04:00 Use cases of IAAS 00:02:00 What is Platform as a Service? 00:02:00 Use cases of PAAS 00:04:00 What is Software as a Service 00:02:00 Key Concepts and Terminology 00:06:00 Economies of Scale 00:01:00 What is Shared Responsibility model 00:09:00

Cloud Computing
Delivered Online On Demand
£24.99

Educators matching "Cloud Computing"

Show all 44
ThinCor

thincor

Thincor academy with almost 10years of experience is one of the best training institute for Networking and Programming. It won’t be wrong if it is said that there is a lot of scope for students and professionals who have completed a course in Networking and programming. Thus we as a team have been putting in a lot of time and energy to study the ongoing trend and provide the best coaching. We strive towards providing a different kind of training that helps students choose a better career. It has been our continuous effort to keep in track the latest technology so as to be able to meet the requirements put forward by the students. If you are looking for a course in JAVA, Networking or hardware courses then you are at the place. When it comes to JAVA we provide both basic and advanced JAVA with latest frameworks like Springs,Hibernate, Struts, Spring boot etc. We also conduct free workshops so that the students get an overall idea of the courses and how it will be helpful. In order to provide world class training Thincor is affiliated with many networking and development based company’s .All our training syllabus are designed as per the latest requirements of the corporate sector. Apart from JAVA we have been giving importance to BIG DATA and Hadoop. We believe in providing quality education. Students who have plans of studying any of these courses might have a lot of doubts but be assured that our team of experienced faculty will provide an in depth knowledge leaving no doubts behind. A good teaching environment, best teaching methods, experienced faculty and a well set up lab is what we believe has helped us make the number one training

Delhi Institute of Computer Courses

delhi institute of computer courses

Delhi Institute of Computer Courses (DICC) was founded in 2009 with an aim to provide high-quality education to its students. Our goal is to provide standard, professional and practical training to our students. There are lots of institutes today that charges lots of amount from you and didn’t provide you what you deserve. We value your money and offer professional training programs such as stock market technical analysis, digital marketing, ethical hacking, PHP and Web designing etc at a really affordable cost. Our aim is to satisfy our students completely so that they only give us positive reviews. So far we have trained more than 2000 students in a span of six years and all the students are completely satisfied with our trainers. We never focus on taking out big cash from your pockets but only charge suitable amount and give best value and services to your money. We have the great reputation in providing high quality training and we already have delivered lectures on stock market, ethical hacking and digital marketing in the universities and colleges. We have also conducted workshops and seminars at Delhi University Colleges. We are gaining popularity gradually and we maintain the reputation and standard till now. We never compromise with our standards of delivering high quality lectures to our students. We fulfil promises with our students and never play with their careers. So, if you too would not like to be catch in the hands of money-making people than JOIN DICC NOW!