• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

347 Scala courses

VEEAM-VMCE Availability Suite v10.0: Configuration and Management

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v10 environment. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to their own environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Install and configure Veeam Availability Suite into their environment, ensuring data is protected effectively. Adapt with an organization's evolving technical, business and regulatory needs. Ensure recovery is possible, effective, efficient, secure and compliant with business and legal requirements. Provide visibility of the business data assets, and produce effective reports and dashboards to monitor performance and risks. Conduct basic troubleshooting and analysis of their Veeam Availability Suite environment. This three-day, technical deep dive Veeam© Availability Suite? v10: Configuration and Management training course is focused on teaching IT professionals the skills to configure, manage and support a Veeam Availability Suite v10 solution. With extensive hands-on-labs, the class enables administrators and engineers to effectively manage data in an ever-changing technical and business environment, bringing tangible benefit to businesses in the digital world. INTRODUCTION * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including NAS Backup jobs. Explore different tools and methods, such as BitLooker? and Deduplication, to maximize environment performance * Global Settings and their usage to prevent production performance bottlenecks, encrypt network traffic data and control network jurisdiction * RESTORING FROM BACKUP * Identify and describe the different restore tools and their features. Ensure you have the confidence to use the correct restore tool at the right time * Using Secure Restore to prevent the restoration of malware * Disaster recovery from backup, respond accordingly to a variety of real-world recovery scenarios BACKUP COPY JOBS * Simple vs Advanced Backup Copy Jobs, how to create and modify them using best practices to ensure efficient recovery * Utilizing tape jobs, how to create and modify REPLICATION * Identify and describe the options available for replication, the use cases and impacts of using * Create, modify and delete replication jobs, outline considerations to ensure success FAILOVER * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica, respond accordingly to a variety of real-world recovery scenarios ADVANCED REPOSITORY CAPABILITIES * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact of various backup functions on the infrastructure * Ensure scalability by integrating off-site S3 storage * Ensure compatibility with existing deduplication appliances TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure Veeam DataLabs? and setup sandbox environments based on backup, replicas and storage snapshots * Using Veeam DataLabs Staged Restore to manage and comply with General Data Protection Regulation (GDPR) legislation before releasing restores to production VEEAM BACKUP ENTERPRISE MANAGER * Manage multiple Veeam Backup & Replication? installations from a single web console, maintaining a view of your entire virtual environment, ensuring data protection of ROBO and Enterprise environments. * Create user and group roles, delegate workloads whilst maintaining data control * Enable encryption password loss protection, helping to restore encrypted data in case of lost or forgotten encryption passwords VEEAM ONE * Monitor your Virtual, Physical and Cloud environments with Veeam ONE? and assess the different views available * Configure Veeam ONE for your specific technical and business requirements, describe the alarm options available and how to customize their usage * Set up, use and customize Veeam ONE Reporter, creating the reports and dashboards you require technically and for the business SUPPORT * Locate, migrate or restore backup configuration * Identify and locate appropriate support resources * Troubleshooting methodology to identify, isolate and remediate support issues ADDITIONAL COURSE DETAILS: Nexus Humans VEEAM-VMCE Availability Suite v10.0: Configuration and Management training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VEEAM-VMCE Availability Suite v10.0: Configuration and Management course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VEEAM-VMCE Availability Suite v10.0: Configuration and Management
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware NSX-T Data Center: Design [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and VMware NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX-T Data Center requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX-T Data Center Design logical switching and routing Recognize NSX-T Data Center security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX-T Data Center infrastructure across multiple sites Describe the factors that drive performance in NSX-T Data Center This five-day course provides comprehensive training on considerations and practices to design a VMware NSX-T? Data Center environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of NSX-T Data Center offered in release 3.2, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX-T Data Center architecture and how it can be used to create solutions to address the customer?s business needs. COURSE INTRODUCTION * Introduction and course logistics * Course objectives DESIGN CONCEPTS * Identify design terms * Describe framework and project methodology * Describe VMware Validated Design? * Identify customers? requirements, assumptions, constraints, and risks * Explain the conceptual design * Explain the logical design * Explain the physical design NSX ARCHITECTURE AND COMPONENTS * Recognize the main elements in the NSX-T Data Center architecture * Describe the NSX management cluster and the management plane * Identify the functions and components of management, control, and data planes * Describe the NSX Manager sizing options * Recognize the justification and implication of NSX manager cluster design decisions * Identify the NSX management cluster design options NSX EDGE DESIGN * Explain the leading practices for edge design * Describe the NSX Edge VM reference designs * Describe the bare-metal NSX Edge reference designs * Explain the leading practices for edge cluster design * Explain the effect of stateful services placement * Explain the growth patterns for edge clusters * Identify design considerations when using L2 bridging services NSX LOGICAL SWITCHING DESIGN * Describe concepts and terminology in logical switching * Identify segment and transport zone design considerations * Identify virtual switch design considerations * Identify uplink profile, VMware vSphere© Network I/O Control profile, and transport node profile design considerations * Identify Geneve tunneling design considerations * Identify BUM replication mode design considerations NSX LOGICAL ROUTING DESIGN * Explain the function and features of logical routing * Describe NSX-T Data Center single-tier and multitier routing architectures * Identify guidelines when selecting a routing topology * Describe the BGP and OSPF routing protocol configuration options * Explain gateway high availability modes of operation and failure detection mechanisms * Identify how multitier architectures provide control over stateful service location * Identify VRF Lite requirements and considerations * Identify the typical NSX scalable architectures NSX SECURITY DESIGN * Identify different security features available in NSX-T Data Center * Describe the advantages of an NSX Distributed Firewall * Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall * Determine a security policy methodology * Recognize the NSX-T Data Center security best practices NSX NETWORK SERVICES * Identify the stateful services available in different edge cluster high availability modes * Describe failover detection mechanisms * Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX-T Data Center * Describe stateful and stateless NSX-T Data Center NAT * Identify benefits of NSX-T Data Center DHCP * Identify benefits of metadata proxy * Describe IPSec VPN and L2 VPN PHYSICAL INFRASTRUCTURE DESIGN * Identify the components of a switch fabric design * Assess Layer 2 and Layer 3 switch fabric design implications * Review guidelines when designing top-of-rack switches * Review options for connecting transport hosts to the switch fabric * Describe typical designs for VMware ESXi? compute hypervisors with two pNICs * Describe typical designs for ESXi compute hypervisors with four or more pNICs * Describe a typical design for a KVM compute hypervisor with two pNICs * Differentiate dedicated and collapsed cluster approaches to SDDC design NSX MULTILOCATION DESIGN * Explain scale considerations in an NSX-T Data Center multisite design * Describe the main components of the NSX Federation architecture * Describe the stretched networking capability in Federation * Describe stretched security use cases in Federation * Compare Federation disaster recovery designs NSX OPTIMIZATION * Describe Geneve Offload * Describe the benefits of Receive Side Scaling and Geneve Rx Filters * Explain the benefits of SSL Offload * Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput * Explain the available N-VDS enhanced datapath modes and use cases * List the key performance factors for compute nodes and NSX Edge nodes

VMware NSX-T Data Center: Design [V3.2]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware NSX: Design [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Network and security architects and consultants who design the enterprise and data center networks and NSX environments Overview By the end of the course, you should be able to meet the following objectives: Describe and apply a design framework Apply a design process for gathering requirements, constraints, assumptions, and risks Design a VMware vSphere virtual data center to support NSX requirements Create a VMware NSX Manager™ cluster design Create a VMware NSX Edge™ cluster design to support traffic and service requirements in NSX Design logical switching and routing Recognize NSX security best practices Design logical network services Design a physical network to support network virtualization in a software-defined data center Create a design to support the NSX infrastructure across multiple sites Describe the factors that drive performance in NSX This five-day course provides comprehensive training on considerations and practices to design a VMware NSX© environment as part of a software-defined data center strategy. This course prepares the student with the skills to lead the design of an NSX environment, including design principles, processes, and frameworks. The student gains a deeper understanding of the NSX architecture and how it can be used to create solutions to address the customer?s business needs. COURSE INTRODUCTION * Introduction and course logistics * Course objectives NSX DESIGN CONCEPTS * Identify design terms * Describe framework and project methodology * Describe the role of VMware Cloud Foundation? in NSX design * Identify customers? requirements, assumptions, constraints, and risks * Explain the conceptual design * Explain the logical design * Explain the physical design NSX ARCHITECTURE AND COMPONENTS * Recognize the main elements in the NSX architecture * Describe the NSX management cluster and the management plane * Identify the functions and components of management, control, and data planes * Describe the NSX Manager sizing options * Recognize the justification and implication of NSX Manager cluster design decisions * Identify the NSX management cluster design options NSX EDGE DESIGN * Explain the leading practices for edge design * Describe the NSX Edge VM reference designs * Describe the bare-metal NSX Edge reference designs * Explain the leading practices for edge cluster design * Explain the effect of stateful services placement * Explain the growth patterns for edge clusters * Identify design considerations when using L2 bridging services NSX LOGICAL SWITCHING DESIGN * Describe concepts and terminology in logical switching * Identify segment and transport zone design considerations * Identify virtual switch design considerations * Identify uplink profile and transport node profile design considerations * Identify Geneve tunneling design considerations * Identify BUM replication mode design considerations NSX LOGICAL ROUTING DESIGN * Explain the function and features of logical routing * Describe the NSX single-tier and multitier routing architectures * Identify guidelines when selecting a routing topology * Describe the BGP and OSPF routing protocol configuration options * Explain gateway high availability modes of operation and failure detection mechanisms * Identify how multitier architectures provide control over stateful service location * Identify EVPN requirements and design considerations * Identify VRF Lite requirements and considerations * Identify the typical NSX scalable architectures NSX SECURITY DESIGN * Identify different security features available in NSX * Describe the advantages of an NSX Distributed Firewall * Describe the use of NSX Gateway Firewall as a perimeter firewall and as an intertenant firewall * Determine a security policy methodology * Recognize the NSX security best practices NSX NETWORK SERVICES * Identify the stateful services available in different edge cluster high availability modes * Describe failover detection mechanisms * Compare NSX NAT solutions * Explain how to select DHCP and DNS services * Compare policy-based and route-based IPSec VPN * Describe an L2 VPN topology that can be used to interconnect data centers * Explain the design considerations for integrating VMware NSX© Advanced Load Balancer? with NSX PHYSICAL INFRASTRUCTURE DESIGN * Identify the components of a switch fabric design * Assess Layer 2 and Layer 3 switch fabric design implications * Review guidelines when designing top-of-rack switches * Review options for connecting transport hosts to the switch fabric * Describe typical designs for VMware ESXi? compute hypervisors with two pNICs * Describe typical designs for ESXi compute hypervisors with four or more pNICs * Differentiate dedicated and collapsed cluster approaches to SDDC design NSX MULTILOCATION DESIGN * Explain scale considerations in an NSX multisite design * Describe the main components of the NSX Federation architecture * Describe the stretched networking capability in Federation * Describe stretched security use cases in Federation * Compare the Federation disaster recovery designs NSX OPTIMIZATION AND DPU-BASED ACCELERATION * Describe Geneve Offload * Describe the benefits of Receive Side Scaling and Geneve Rx Filters * Explain the benefits of SSL Offload * Describe the effect of Multi-TEP, MTU size, and NIC speed on throughput * Explain the available enhanced datapath modes and use cases * List the key performance factors for compute nodes and NSX Edge nodes * Describe DPU-Based Acceleration * Define the NSX features supported by DPUs * Describe the hardware and networking configurations supported with DPUs

VMware NSX: Design [V4.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

Architecting Hybrid Cloud Infrastructure with Anthos

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is primarily intended for the following participants: Technical employees using GCP, including customer companies, partners and system integrators deployment engineers, cloud architects, cloud administrators, system engineers , and SysOps/DevOps engineers. Individuals using GCP to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments. Overview Connect and manage Anthos GKE clusters from GCP Console whether clusters are part of Anthos on Google Cloud or Anthos deployed on VMware. Understand how service mesh proxies are installed, configured and managed. Configure centralized logging, monitoring, tracing, and service visualizations wherever the Anthos GKE clusters are hosted. Understand and configure fine-grained traffic management. Use service mesh security features for service-service authentication, user authentication, and policy-based service authorization. Install a multi-service application spanning multiple clusters in a hybrid environment. Understand how services communicate across clusters. Migrate services between clusters. Install Anthos Config Management, use it to enforce policies, and explain how it can be used across multiple clusters. This two-day instructor-led course prepares students to modernize, manage, and observe their applications using Kubernetes whether the application is deployed on-premises or on Google Cloud Platform (GCP). Through presentations, and hands-on labs, participants explore and deploy using Kubernetes Engine (GKE), GKE Connect, Istio service mesh and Anthos Config Management capabilities that enable operators to work with modern applications even when split among multiple clusters hosted by multiple providers, or on-premises. ANTHOS OVERVIEW * Describe challenges of hybrid cloud * Discuss modern solutions * Describe the Anthos Technology Stack MANAGING HYBRID CLUSTERS USING KUBERNETES ENGINE * Understand Anthos GKE hybrid environments, with Admin and User clusters * Register and authenticate remote Anthos GKE clusters in GKE Hub * View and manage registered clusters, in cloud and on-premises, using GKE Hub * View workloads in all clusters from GKE Hub * Lab: Managing Hybrid Clusters using Kubernetes Engine INTRODUCTION TO SERVICE MESH * Understand service mesh, and problems it solves * Understand Istio architecture and components * Explain Istio on GKE add on and it's lifecycle, vs OSS Istio * Understand request network traffic flow in a service mesh * Create a GKE cluster, with a service mesh * Configure a multi-service application with service mesh * Enable external access using an ingress gateway * Explain the multi-service example applications: Hipster Shop, and Bookinfo * Lab: Installing Open Source Istio on Kubernetes Engine * Lab: Installing the Istio on GKE Add-On with Kubernetes Engine OBSERVING SERVICES USING SERVICE MESH ADAPTERS * Understand service mesh flexible adapter model * Understand service mesh telemetry processing * Explain Stackdriver configurations for logging and monitoring * Compare telemetry defaults for cloud and on-premises environments * Configure and view custom metrics using service mesh * View cluster and service metrics with pre-configured dashboards * Trace microservice calls with timing data using service mesh adapters * Visualize and discover service attributes with service mesh * Lab: Telemetry and Observability with Istio MANAGING TRAFFIC ROUTING WITH SERVICE MESH * Understand the service mesh abstract model for traffic management * Understand service mesh service discovery and load balancing * Review and compare traffic management use cases and configurations * Understand ingress configuration using service mesh * Visualize traffic routing with live generated requests * Configure a service mesh gateway to allow access to services from outside the mesh * Apply virtual services and destination rules for version-specific routing * Route traffic based on application-layer configuration * Shift traffic from one service version to another, with fine-grained control, like a canary deployment * Lab: Managing Traffic Routing with Istio and Envoy MANAGING POLICIES AND SECURITY WITH SERVICE MESH * Understand authentication and authorization in service mesh * Explain mTLS flow for service to service communication * Adopt mutual TLS authentication across the service mesh incrementally * Enable end-user authentication for the frontend service * Use service mesh access control policies to secure access to the frontend service * Lab: Managing Policies and Security with Service Mesh MANAGING POLICIES USING ANTHOS CONFIG MANAGEMENT * Understand the challenge of managing resources across multiple clusters * Understand how a Git repository is as a configuration source of truth * Explain the Anthos Config Management components, and object lifecycle * Install and configure Anthos Config Management, operators, tools, and related Git repository * Verify cluster configuration compliance and drift management * Update workload configuration using repo changes * Lab: Managing Policies in Kubernetes Engine using Anthos Config CONFIGURING ANTHOS GKE FOR MULTI-CLUSTER OPERATION * Understand how multiple clusters work together using DNS, root CA, and service discovery * Explain service mesh control-plane architectures for multi-cluster * Configure a multi-service application using service mesh across multiple clusters with multiple control-planes * Configure a multi-service application using service mesh across multiple clusters with a shared control-plane * Configure service naming/discovery between clusters * Review ServiceEntries for cross-cluster service discovery * Migrate workload from a remote cluster to an Anthos GKE cluster * Lab: Configuring GKE for Multi-Cluster Operation with Istio * Lab: Configuring GKE for Shared Control Plane Multi-Cluster Operation

Architecting Hybrid Cloud Infrastructure with Anthos
Delivered on-request, onlineDelivered Online
Price on Enquiry

Veeam Certified Architect v11 (VMCE11-A)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is suitable for anyone responsible for configuring, managing or supporting a Veeam Availability Suite v11 environment. This includes Senior Engineers and Architects responsible for creating architectures for Veeam environments. Overview After completing this course, attendees should be able to: Describe Veeam Availability Suite components usage scenarios and relevance to your environment. Effectively manage data availability in on-site, off-site, cloud and hybrid environments. Ensure both Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs) are met. Configure Veeam Availability Suite to ensure data is protected effectively. Adapt with an organization's evolving technical and business data protection needs. Ensure recovery is possible, effective, efficient, secure and compliant with business requirements. Provide visibility of the business data assets, reports and dashboards to monitor performance and risks. Design and architect a Veeam solution in a real-world environment Describe best practices, review an existing infrastructure and assess business/project requirements Identify relevant infrastructure metrics and perform component (storage, CPU, memory) quantity sizing Provide implementation and testing guidelines in line with designs Innovatively address design challenges and pain points, matching appropriate Veeam Backup & Replication features with requirements Veeam Certified Architect is the highest level of Veeam technical certifications. Engineers who complete both Veeam Availability Suite v11: Configuration and Management and Veeam Backup & Replication V11: Architecture and Design programs (courses + exams) will be granted with the 'Veeam Certified Architect' (VMCA) title by Veeam. INTRODUCTION VEEAM AVAILABILITY SUITE V11: CONFIGURATION AND MANAGEMENT * Describe RTOs and RPOs, what they mean for your business, how to manage and monitor performance against them * The 3-2-1 Rule and its importance in formulating a successful backup strategy * Identify key Veeam Availability Suite components and describe their usage scenarios and deployment types BUILDING BACKUP CAPABILITIES * Backup methods, the appropriate use cases and impact on underlying file systems * Create, modify, optimize and delete backup jobs, including Agents and NAS Backup jobs. Explore different tools and methods to maximize environment performance * Ensure efficiency by being able to select appropriate transport modes while being aware of the impact * of various backup functions on the infrastructure BUILDING REPLICATION CAPABILITIES * Identify and describe the options available for replication and impacts of using them * Create and modify replication jobs, outline considerations to ensure success * Introduce the new Continuous Data Protection (CDP) policy SECONDARY BACKUPS * Simple vs. advanced backup copy jobs, how to create and modify them using best practices to ensure efficient recovery * Discuss using tapes for backups ADVANCED REPOSITORY CAPABILITIES * Ensure repository scalability using a capability such as SOBR on-premises and off-site including integration with cloud storage * Ensure compatibility with existing deduplication appliances * Introduce the new hardened repository PROTECTING DATA IN THE CLOUD * Review how Veeam can protect the data of a cloud native application * Review how Veeam Cloud Connect enables you to take advantage of cloud services built on Veeam * Review how Veeam can be used to protect your Office 365 data RESTORING FROM BACKUP * Ensure you have the confidence to use the correct restore tool at the right time for restoring VMs, bare metal and individual content such as files and folders * Utilize Secure Restore to prevent the restoration of malware * Describe how to use Staged Restore to comply with things like General Data Protection Regulation (GDPR) before releasing restores to production * Identify, describe and utilize the different explores and instant recovery tools and features RECOVERY FROM REPLICA * Identify and describe in detail, failover features and the appropriate usage * Develop, prepare and test failover plans to ensure recovery * Disaster recovery from replica to meet a variety of real-world recovery needs TESTING BACKUP AND REPLICATION * Testing backups and replicas to ensure you can recover, what you need, when you need to * Configure and setup virtual sandbox environments based on backup, replicas and storage snapshots VEEAM BACKUP ENTERPRISE MANAGER AND VEEAM ONE * Introduce the concept of monitoring your virtual, physical and cloud environments with Veeam Backup Enterprise Manager and Veeam ONE? CONFIGURATION BACKUP * Locate, migrate or restore backup configuration INTRODUCTION VEEAM BACKUP & REPLICATION V11: ARCHITECTURE AND DESIGN * Review the architecture principles * Explore what a successful architecture looks like * Review Veeam?s architecture methodology DISCOVERY * Analyze the existing environment * Uncover relevant infrastructure metrics * Uncover assumptions and risks * Identify complexity in the environment CONCEPTUAL DESIGN * Review scenario and data from discovery phase * Identify logical groups of objects that will share resources based on requirements * Create a set of detailed tables of business and technical requirements, constraints, assumptions and risks * Review infrastructure data with each product component in mind * Create high level design and data flow LOGICAL DESIGN * Match critical components and features of VBR with requirements * Create logical groupings * Determine location of components and relationship to logical grouping * Aggregate totals of component resources needed per logical grouping * Calculate component (storage, CPU, memory) quantity sizing PHYSICAL/TANGIBLE DESIGN * Convert the logical design into a physical design * Physical hardware sizing * Create a list of physical Veeam backup components IMPLEMENTATION AND GOVERNANCE * Review physical design and implantation plan * Review Veeam deployment hardening * Describe the architect?s obligations to the implementation team * Provide guidance on implementation specifics that relate to the design VALIDATION AND ITERATION * Provide framework for how to test the design * Further develop the design according to a modification scenario

Veeam Certified Architect v11 (VMCE11-A)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Architecting on AWS - Accelerator

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for: Solutions Architects who are new to designing and building cloud architectures Data Center Architects who are migrating from on-premises environment to cloud architectures Other IT/cloud roles who want to understand how to design and build cloud architectures Overview In this course, you will learn how to: Make architectural decisions based on AWS architectural principles and best practices Use AWS services to make your infrastructure scalable, reliable, and highly available Use AWS Managed Services to enable greater flexibility and resiliency in an infrastructure Make an AWS-based infrastructure more efficient to increase performance and reduce costs Use the Well Architected Framework to improve architectures with AWS solutions This course covers all aspects of how to architect for the cloud over four-and-a-half-days. It covers topics from Architecting on AWS and Advanced Architecting on AWS to offer an immersive course in cloud architecture. You will learn how to design cloud architectures, starting small and working to large-scale enterprise level designs-and everything in between. Starting with the Well-Architected Framework, you will learn important architecting information for AWS services including: compute, storage, database, networking, security, monitoring, automation, optimization, benefits of de-coupling applications and serverless, building for resilience, and understanding costs MODULE 1: INTRODUCTION * The real story of AWS * Well-Architected Framework * Six advantages of the cloud * Global infrastructure MODULE 2: THE SIMPLEST ARCHITECTURES * S3 * Glacier * Choosing your regions * Hands-on lab: Static Website MODULE 3: ADDING A COMPUTE LAYER * EC2 * Storage solutions for instances * Purchasing options such as dedicated host vs instances MODULE 4: ADDING A DATABASE LAYER * Relational vs non-relational * Managed databases * RDS * Dynamo DB * Neptune * Hands-on lab: Deploying a web application on AWS MODULE 5: NETWORKING IN AWS PART 1 * VPC * CIDR and subnets * Public vs private subnets * NAT and internet gateway * Security groups MODULE 6: NETWORKING IN AWS PART 2 * Virtual Private Gateway * VPN * Direct Connect * VPC peering * Transit Gateway * VPC Endpoints * Elastic Load Balancer * Route 53 * Hands-on lab: Creating a VPC MODULE 7: AWS IDENTITY AND ACCESS MANAGEMENT (IAM) * IAM * Identity federation * Cognito MODULE 8: ORGANIZATIONS * Organizations * Multiple account management * Tagging strategies MODULE 9: ELASTICITY, HIGH AVAILABILITY, AND MONITORING * Elasticity vs inelasticity * Monitoring with CloudWatch, CloudTrail, and VPC Flow Logs * Auto scaling * Scaling databases * Hands-on lab: Creating a highly available environment MODULE 10: AUTOMATION * Why automate? * CloudFormation * AWS Quick Starts * AWS Systems Manager * AWS OpsWorks * AWS Elastic Beanstalk MODULE 11: DEPLOYMENT METHODS * Why use a deployment method? * Blue green and canary deployment * Tools to implement your deployment methods * CI/CD * Hands-on lab: Automating infrastructure deployment MODULE 12: CACHING * When and why you should cache your data * Cloudfront * Elasticache (Redis/Memcached) * DynamoDB Accelerator MODULE 13: SECURITY OF YOUR DATA * Shared responsibility model * Data classification * Encryption * Automatic data security MODULE 14: BUILDING DECOUPLED ARCHITECTURE * Tight coupling vs loose coupling * SQS * SNS MODULE 15: OPTIMIZATIONS AND REVIEW * Review questions * Best practices * Activity: Design and architecture - two trues and one lie MODULE 16: MICROSERVICES * What is a microservice? * Containers * ECS * Fargate * EKS MODULE 17: SERVERLESS * Why use serverless? * Lambda * API Gateway * AWS Step Functions * Hands-on lab: Implementing a serverless architecture with AWS Managed Services MODULE 18: BUILDING FOR RESILIENCE * Using managed services greatly increases resiliency * Serverless for resiliency * Issues with microservices to be aware of * DDoS * Hands-on lab: Amazon CloudFront content delivery and automating WAF rules MODULE 19: NETWORKING IN AWS PART 3 * Elastic Network Adapter * Maximum transmission units * Global Accelerator * Site to site VPN * Transit Gateway MODULE 20: UNDERSTANDING COSTS * Simple monthly calculator * Right sizing your instances * Price sensitive architecture examples MODULE 21: MIGRATION STRATEGIES * Cloud migration strategies * Planning * Migrating * Optimizing * Hands-on lab: Application deployment using AWS Fargate MODULE 22: RTO/RPO AND BACKUP RECOVERY SETUP * Disaster planning * Recovery options MODULE 23: FINAL REVIEW * Architecting advice * Service use case questions * Example test questions ADDITIONAL COURSE DETAILS: Nexus Humans Architecting on AWS - Accelerator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS - Accelerator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS - Accelerator
Delivered on-request, onlineDelivered Online
Price on Enquiry

Oracle BI Publisher 12c R1: Fundamentals

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Analyst Developer End User Implementer Overview Schedule and Burst Reports Perform Translations Create Reports Integrated With Oracle BI EE Administer BI Publisher Server Describe BI Publisher Technology and Architecture Create reports from OBI EE data sources Create and Modify Data Models Create RTF Templates by Using Template Builder Explore and Use the Form Field Method for Creating RTF Templates Create Layouts by Using the Layout Editor This Oracle BI Publisher 12c training will help you build a foundation of understanding how to best leverage this solution. Through Classroom Training or Live Virtual Class Training, you'll learn the ins and outs of how to use this solution. BI PUBLISHER TECHNOLOGY AND ARCHITECTURE * Functional Components * Layout Templates * Multitier Architecture * Enterprise Server Architecture and Performance and Scalability * Document Generation Process and Output Formats * Supported Data Sources * Bursting Overview * Internationalization and Language Support GETTING STARTED WITH BI PUBLISHER * Logging In, the Home Page, and Global Header, and Setting Account Preferences * Viewing Reports * Managing Repository Objects * Managing Favorites * Using Create Report wizard to Create Reports * Selecting Data: Data Model, Spreadsheet, and BI Subject Area * Configuring Report Properties USING THE DATA MODEL EDITOR * Exploring the Schemas Used in the Course * Exploring the Data Model Editor UI and the Supported Data Sources * Creating a Private Data Source * Creating a Simple Data Model based on a SQL Query Data Set * Using Query Builder to Build a Query * Viewing Data and Saving Sample Data Sets * Adding Parameters and LOVs to the Query * Configuring Parameter Settings and Viewing Reports with Parameters WORKING WITH LAYOUT EDITOR * Opening the Layout Editor and Navigating the Layout Editor UI * Creating a Layout by Using a Basic Template * Inserting a Layout Grid * Adding a Table, Formatting Columns, Defining Sorts and Groups, and Applying Conditional Formats * Inserting and Editing Charts, and Converting Charts to a Pivot Tables * Adding Repeating Sections, Text Items, and Images * Working with Lists, Gauges and Pivot Tables * Creating Boilerplates USING TEMPLATE BUILDER TO CREATE RTF TEMPLATES * Using the BI Publisher Menu Bar * Creating an RTF Template from a Sample, Changing Field Properties, and Previewing Table Data * Adding a Chart to an RTF Template * Designing an RTF Template for a BI Publisher Report * Creating a BI Publisher Report by Using Template Builder in Online Mode * Exploring the Basic and Form Field Methods * Exploring Advanced RTF Template Techniques Including Conditional Formats, Watermarks, Page-Level Calculations, Running Totals, Grouping, and Sorting BI PUBLISHER SERVER: ADMINISTRATION AND SECURITY * Describing the Administration Page * Creating the JDBC Connections * Setting, Viewing, and Updating Data Sources * Describing the Security Model for BI Publisher and Oracle Fusion Middleware * Describing Groups, Users, Roles, and Permissions * Describing Delivery Options Including Print, Fax, Email, WebDav, HTTP Server, FTP, and CUPS * Describing and Configuring BI Publisher Scheduler * Integrating with Oracle BI Presentation Services and Oracle Endeca Server SCHEDULING AND BURSTING REPORTS * Scheduling and Describing a Report Job and Related Options * Managing and Viewing a Report Job * Viewing Report Job History * Scheduling a Report with Trigger * Describing Bursting * Adding a Bursting Definition to a Data Model * Scheduling a Bursting Job INTEGRATING BI PUBLISHER WITH ORACLE BI ENTERPRISE EDITION * Configuring Presentation Services Integration * Navigating Oracle BI EE * Creating a Report based on OBI EE Subject Area * Creating a Data Model and Report based on a BI Server SQL Query * Creating a Data Model and Report based on an Oracle BI Analysis * Adding a BI Publisher Report to an Oracle BI EE Dashboard CREATING DATA MODELS AND BI PUBLISHER REPORTS BASED ON OTHER DATA SOURCES * Configuring Presentation Services Integration * Describing the Web Services Data Source * Describing the HTTP (XML/RSS Feed) Data Source * Explaining Proxy Setting for Web Services and HTTP Data Sources * Creating a BI Publisher Report based on an External Web Service * Creating a BI Publisher Report based on an HTTP Data Set * Creating a BI Publisher Report Based on XML File * Creating a BI Publisher Report Based on CSV Data source PERFORMING TRANSLATIONS * Describing Translation Types * Translating by Using the Localized Template Option * Translating by Using the XLIFF Option * Managing XLIFF Translations on BI Publisher Server * Describing the Overall Translation Process * Describing Catalog Translation * Exporting and Importing the XLIFF for a Catalog Folder ADDITIONAL COURSE DETAILS: Nexus Humans Oracle BI Publisher 12c R1: Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Oracle BI Publisher 12c R1: Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Oracle BI Publisher 12c R1: Fundamentals
Delivered on-request, onlineDelivered Online
Price on Enquiry

Understanding Microservices | A Technical Overview (TT7050)

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This overview-level course is ideally suited for professionals seeking an introduction to microservices architecture and its application within a business context. Ideal attendee roles include software developers, system architects, technical managers, and IT professionals who are part of teams transitioning to a microservices approach. It's also an excellent starting point for non-technical roles such as product owners or business analysts who work closely with technical teams and want to better understand and become conversant in the language and principles of microservices. Overview This course combines engaging instructor-led presentations and useful demonstrations with engaging group activities. Throughout the course you'll explore: Understand the Basics of Microservices: Get to know the fundamental principles and characteristics of microservices and how they revolutionize traditional software development approaches. Explore the Design of Microservices: Gain an overview of how microservices are designed based on business requirements and what makes them unique in the software architecture world. Overview of Managing and Scaling Microservices: Get an introduction to how microservices are managed and scaled independently, and understand the significance of these features in your business operations. Familiarize with the Microservices Ecosystem: Learn about the typical patterns, best practices, and common pitfalls in the microservices world, setting a foundation for future learning and implementation. Introduction to Microservices in a Business Context: Acquire a basic understanding of how microservices can be aligned with specific business capabilities, and get a glimpse into how they can coexist with legacy systems in a business setting. Microservices have rapidly emerged as a popular architectural style, breaking down applications into small, independent services that can be developed, deployed, and scaled individually. Microservices offer a robust method to address a variety of projects, such as e-commerce platforms and content management systems, enhancing scalability and boosting productivity. This technology, when employed correctly, can greatly increase software delivery speed and system resilience, making it a crucial skill set for modern technology professionals.Understanding Microservices - A Technical Overview is a one-day course ideally suited for technical professionals seeking an introduction to microservices architecture and its application within a business context. Under the guidance of an industry expert, this engaging class combines lecture-style learning with lively demonstrations, case study review and group discussions.Throughout the course you?ll explore the principles and characteristics that define microservices, how to identify suitable projects for a microservices approach, the factors to consider when designing them, and the strategies to effectively manage and scale them within complex systems. You?ll also learn about the best practices, patterns, and anti-patterns, arming you with the knowledge to make the right architectural choices. This course also explores the real-world implementation of microservices in a business enterprise. We'll discuss how to align the application of microservices with your organization's specific business capabilities, and offer strategies for smoothly integrating this technology within existing legacy systems. INTRODUCTION TO MICROSERVICES * Understand what microservices are and their role in modern software development. * Introduction to Microservices: what they are and why they matter. * Monolithic vs Microservices: highlighting the shift and benefits. * Key principles and characteristics of microservices. * Identifying suitable applications for microservices transformation. * Demo: Analyzing a sample application and identifying potential microservices ARCHITECTING AND MANAGING MICROSERVICES * Learn the basic strategies for scaling and managing microservices. * Scaling Microservices: from a single service to hundreds. * Key components of a microservices architecture. * Introduction to resilience patterns: Circuit-Breakers and Bulkheads. * Load management and provisioning in a microservices setup. * Understanding the role of cloud services in microservices. * Optional Demo: Illustrating how a microservice-based application scales in real-time DESIGNING MICROSERVICES * Learn the key aspects to consider when designing microservices. * Defining microservice boundaries: Deciding the scope of a microservice. * Communication patterns in microservices. * Understanding Microservice endpoints. * Exploring data stores and transaction boundaries in microservices. * Overcoming challenges in Microservices design. * Demo: Designing microservices for a hypothetical business requirement IMPLEMENTING MICROSERVICES IN A BUSINESS ENTERPRISE * Understand the process and considerations for implementing microservices in an enterprise context. * Assessing enterprise readiness for microservices. * Building the business case for microservices: strategic advantages and potential challenges. * Aligning microservices with business capabilities. * Organizational changes: Team structures and processes for microservices. * Dealing with Legacy Systems: Strategies for microservices integration. * Demo: Exploring a case study of successful microservices implementation in a business enterprise THE MICROSERVICES ECOSYSTEM * Understand the key tools and best practices in the Microservices ecosystem. * Understanding the typical Microservices Stack. * Monitoring and Logging in Microservices. * Introduction to Docker: Containerization of Microservices. * Deployment strategies in a Microservices setup. * Introduction to Orchestration in Microservices * Demo: Containerizing and deploying a simple microservice MICROSERVICES DEPLOYMENT STRATEGIES * Understand various ways to safely introduce changes in a microservices environment. * The concept of Blue-Green Deployment: changing services without downtime. * Canary Releases and Feature Toggles: slowly rolling out changes to users. * Database changes in a microservices environment: keeping data consistent. * Demo: Examining various deployment strategies MICROSERVICES BEST PRACTICES AND DEVOPS * Learn key strategies to ensure a smooth operation of your microservices setup. * The DevOps culture in Microservices: collaboration for efficiency. * Defining a Minimum Viable Product in a Microservices setup: building small, delivering fast. * Dealing with data in a distributed setup: managing Data Islands. * The importance of Continuous Integration/Continuous Delivery in a microservices setup. * Governance: Keeping track of your services and their consumers. * Demo: Visualizing a simple continuous delivery pipeline MICROSERVICES PATTERNS AND ANTI-PATTERNS * Learn about common do's and don'ts when working with microservices. * Understanding patterns that help with efficient microservices operation. * Recognizing and avoiding anti-patterns that can hinder performance. * Dealing with common challenges: dependencies between services, managing service boundaries. * Demo: Examples of real-world patterns and anti-patterns SIMPLE OVERVIEW OF OAUTH AND OPENID FOR MICROSERVICES * Introduction to OAuth and OpenID: What they are and why they matter in Microservices. * The role of tokens in OAuth 2.0: How they help in securing communications. * A simplified look at OpenID Connect: Linking identities across services. * Demo

Understanding Microservices | A Technical Overview  (TT7050)
Delivered on-request, onlineDelivered Online
Price on Enquiry

Implementing Aruba OS-CX Switching, Rev. 20.21

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Typical candidates for this course are IT Professionals who will deploy and manage networks based on HPE's ArubaOS-CX switches. Overview After you successfully complete this course, expect to be able to: Use NetEdit to manage switch configurations Use the Network Analytics Engine (NAE) to implement scripting solutions to provide for proactive network management and monitoring Compare and contrast VSX, VSF, and backplane stacking Explain how VSX handles a split-brain scenario Implement and manage a VSX fabric Define ACLs and identify the criteria by which ACLs select traffic Configure ACLs on AOS-CX switches to select given traffic Apply static ACLs to interfaces to meet the needs of a particular scenario Examine an ACL configuration and determine the action taken on specific packets Deploy AOS-Switches in single-area and multi-area OSPF systems Use area definitions and summaries to create efficient and scalable multiple area designs Advertise routes to external networks in a variety of OSPF environments Promote fast, effective convergence during a variety of failover situations Use virtual links as required to establish non-direct connections to the backbone Implement OSFP authentication Establish and monitor BGP sessions between your routers and ISP routers Advertise an IP block to multiple ISP routers Configure a BGP router to advertise a default route in OSPF Use Internet Group Management Protocol (IGMP) to optimize forwarding of multicast traffic within VLANs Describe the differences between IGMP and IGMP snooping Distinguish between PIM-DM and PIM-SM Implement PIM-DM and PIM-SM to route multicast traffic Implement Virtual Routing Forwarding (VRF) policies to contain and segregate routing information Create route maps to control routing policies Understand the use of user roles to control user access on AOS-CX switches Implement local user roles on AOS-CX switches and downloadable user roles using a ClearPass solution Implement 802.1X on AOS-CX switch ports Integrate AOS-CX switches with an Aruba ClearPass solution, which might apply dynamic role settings Implement RADIUS-based MAC Authentication (MAC-Auth) on AOS-CX switch ports Configure captive portal authentication on AOS-CX switches to integrate them with an Aruba ClearPass solution Combine multiple forms of authentication on a switch port that supports one or more simultaneous users Configure dynamic segmentation on AOS-CX switches This course teaches you the advanced skills necessary to implement and operate enterprise level Aruba campus switching solutions. You will build on the skills you learned at the Associate level to configure and manage modern, open standards-based networking solutions using Aruba's OS-CX routing and switching technologies. In this course, participants learn about ArubaOS-CX switch technologies including: securing port access with Aruba's dynamic segmentation, redundancy technologies such as Multiple Spanning Tree Protocol (MSTP), link aggregation techniques including Link Aggregation Protocol (LACP) and switch virtualization with Aruba?s Virtual Switching Extension (VSX) and Aruba's Virtual Switching Framework (VSF). This course is approximately 50% lecture and 50% hands-on lab exercises. INTRODUCTION TO ARUBA SWITCHING * Switches overview * Architectures NETEDIT * Overview * Centralized configuration * Switch groups/templates * AOS-CX mobile App NETWORK ANALYTICS ENGINE (NAE) * Overview * Configuration * Core NAE feature lab * sflow, local mirror, remote mirror VSX * VSF vs. VSX: access and Agg/core design * Stacking review * VSF and uni/multi packet forwarding * Stack fragments / split brain * VSX Overview: roles, control, data, management planes * VSX components (ISL, Keepalive, VSX LAG, Active Gateway, Active-Forwarding, Link Delay) * Split Brain scenario * Upstream Connectively Options (ROP single VRF, SVIs with multiple VRF, VSX Lag SVIs with multiple VRFs) * Upstream/Downstream unicast traffic flow (South-North and North-South) * VSX Configuration: VSX and Active Gateway * VSX firmware updates ACLS * Overview: types, components * MAC ACL, Standard ACL, Extended ACL, * Classifier-based Policies * Configuration: wildcard bits, logging, pacl, vacl, racl ADVANCED OSPF * Review basic OSPF * Multi area: setup and aggregation * Area-Types Stub, Totally Stub, NSSA, Totally NSSA * External routes * OSPF tuning: costs, bfd, gr, auth, vrrp, virt link BGP * Overview: i/e bgp, as numbers * Best path selection * Configuration: route announcement * Route filtering to prevent transit as IGMP * Overview * Querier * Snooping * Unknown multicasts MULTICAST ROUTING: PIM * Overview * PIM DM 802.1X AUTHENTICATION * Overview: roles, requirements, coa, accounting * Dynamic port configuration: avp, acl, qos, VLAN * Port-based vs. user-based: examples * Radius service tracking, critical VLAN MAC AUTHENTICATION * Overview: Use cases * Radius-based MAC Auth DYNAMIC SEGMENTATION * Leverage dynamic segmentation features * Configure tunneled-node on AOS-CX switches * Describe when and how to configure PAPI enhanced security, high availability, and fallback switching for tunneled-node QUALITY OF SERVICE * Overview * VoQ (Virtual Output Queue) * QOS: queueing, QOS marks, dot1p, dscp * Trust levels * QOS configuration: port, VLAN, policies * Interaction with user roles * Queue configuration * Rate limiters * LLDP-MED ADDITIONAL ROUTING TECHNOLOGIES * VRF - Management VRF * PBR * MDNS * PIM SM CAPITVE PORTAL AUTHENTICATION * Overview of guest solutions * Built-in web auth * ClearPass redirect with CPPM

Implementing Aruba OS-CX Switching, Rev. 20.21
Delivered on-request, onlineDelivered Online
Price on Enquiry

PostgreSQL for Database Developers (TTDB7024)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The ideal audience for this course includes database enthusiasts, IT professionals, and developers who are eager to expand their knowledge and skill set in database management and optimization. Roles that would greatly benefit from attending this course include: Database Developers: Those who design, implement, and maintain databases as part of their primary responsibilities and want to improve their expertise in schema design, query optimization, and advanced database features. Backend Developers: Professionals who work on server-side application logic and require a strong understanding of database management to integrate data storage and retrieval processes into their applications. Overview Upon completing this course, database developers will be able to: Design and implement efficient database schemas by employing normalization techniques, appropriate indexing strategies, and partitioning methods to optimize data storage and retrieval processes. Develop advanced SQL queries, including joining multiple tables, utilizing subqueries, and aggregating data, to extract valuable insights and facilitate decision-making processes. Implement stored procedures, functions, and triggers to automate common database tasks, enforce data integrity, and improve overall application performance. Apply database performance tuning techniques, such as query optimization, index management, and transaction control, to ensure optimal resource usage and enhanced system responsiveness. Integrate databases with various programming languages and platforms, enabling seamless data access and manipulation for web, mobile, and desktop applications. PostgreSQL is a powerful, open-source object-relational database management system that emphasizes extensibility, data integrity, and high performance. Its versatility and robust feature set make it an ideal choice for developers working on projects of all sizes, from small-scale applications to enterprise-level systems. By learning PostgreSQL, developers can tap into its advanced capabilities, such as full-text search, spatial data support, and customizable data types, allowing them to create efficient and scalable solutions tailored to their unique needs. PostgreSQL for Database Developers is a three-day hands-on course that explores the fundamentals of database management, covering everything from installation and management to advanced SQL functions. Designed for beginners and enthusiasts alike, this course will equip you with the knowledge and skills required to effectively harness the power of PostgreSQL in today's data-driven landscape. Throughout the course you?ll be immersed in a variety of essential topics, such as understanding data types, creating and managing indexes, working with array values, and optimizing queries for improved performance. You?ll gain valuable hands-on experience with real-world exercises, including the use of the psql client, writing triggers and stored procedures with PL/pgSQL, and exploring advanced SQL functions like Common Table Expressions (CTE), Window Functions, and Recursive Queries. You?ll exit this course with a solid foundation in PostgreSQL, enabling you to confidently navigate and manage your databases with ease and efficiency. INSTALLING & MANAGING POSTGRESQL * PostgreSQL installation process * Optimal configuration settings * User and role management * Database backup and restoration OVERVIEW OF POSTGRESQL DATABASE * PostgreSQL architecture overview * Understanding database objects * Efficient data storage * Transaction management basics USING THE PSQL CLIENT * Introduction to psql * Essential psql commands * Executing queries effectively * Managing databases with psql UNDERSTANDING POSTGRESQL DATA TYPES * Numeric data types explored * Character and binary types * Date, time, and boolean values * Array and other types UNDERSTANDING SEQUENCES * Sequence creation and usage * Customizing sequence behavior * Implementing auto-increment columns * Sequence manipulation and control CREATING & MANAGING INDEXES * PostgreSQL index fundamentals * Designing partial indexes * Utilizing expression-based indexes * Index management techniques USING COPY TO LOAD DATA * COPY command overview * Importing and exporting data * Handling CSV and binary formats * Performance considerations WORKING WITH ARRAY VALUES * Array value basics * Array manipulation functions * Querying arrays efficiently * Multidimensional array handling ADVANCED SQL FUNCTIONS * Mastering Common Table Expressions * Utilizing Window Functions * Regular Expressions in SQL * Crafting Recursive Queries WRITING TRIGGERS & STORED PROCEDURES WITH PL/PGSQL * PL/pgSQL variables usage * Implementing loop operations * PERFORM and EXECUTE statements * Developing PostgreSQL triggers USING THE POSTGRESQL QUERY OPTIMIZER * Query analysis and optimization * EXPLAIN command insights * PostgreSQL query operators * Identifying performance bottlenecks IMPROVING QUERY PERFORMANCE * Query performance tuning * Index optimization strategies * Efficient database partitioning * Connection and resource management WRAP UP & ADDITIONAL RESOURCES * Further learning opportunities * Staying up-to-date with PostgreSQL * Community engagement and support ADDITIONAL COURSE DETAILS: Nexus Humans PostgreSQL for Database Developers (TTDB7024) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PostgreSQL for Database Developers (TTDB7024) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

PostgreSQL for Database Developers (TTDB7024)
Delivered on-request, onlineDelivered Online
Price on Enquiry