Explore A Variety Of Fresh Topics
Find The Right Course For You
Learn On Your Schedule
The AWS Certified Solutions Architect – Professional
This course is a high-level overview of Azure. The course will provide foundational level knowledge of cloud services and how those services are provided with Microsoft Azure.
This course will teach you how to manage your Azure subscriptions, create and scale virtual machines, implement storage solutions, configure virtual networking, back up and share data, connect Azure and on-premises sites, manage network traffic, implement Azure Active Directory, secure identities, and monitor your solution. It help prepare you for the AZ-103: Microsoft Azure Administrator exam.
Learn to Deploy and Configure Infrastructure, Implement workloads and security, create and deploy Apps, Implement Authentication and Secure Data and develop for the Cloud and for Azure Storage.
Designing for Identity and Security, designing a Data Platform Solution, Design for Deployment, Migration and Integration, Design an Infrastructure Strategy.
This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution.
In this course students will gain the knowledge and skills needed to implement security controls, maintain the security posture, and identify and remediate vulnerabilities by using a variety of security tools. The course covers scripting and automation, virtualization, and cloud N-tier architecture.
Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms.
Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions.
In this course, the students will implement various data platform technologies into solutions that are in line with business and technical requirements including on-premises, cloud, and hybrid data scenarios incorporating both relational and No-SQL data. They will also learn how to process data using a range of technologies and languages for both streaming and batch data. The students will also explore how to implement data security including authentication, authorization, data policies and standards. They will also define and implement data solution monitoring for both the data storage and data processing activities. Finally, they will manage and troubleshoot Azure data solutions which includes the optimization and disaster recovery of big data, batch processing and streaming data solutions.
Embedded microcontrollers have been used for many years within electronic systems, across a huge range of applications from simple environmental monitors through to automotive components and complex consumer appliances. Security issues affecting networked computers running operating systems such as Windows and Linux (including “Embedded Linux”) are well-documented but traditionally, security was not a major concern for many small, microcontroller-based systems. However, the increasing trend to connect devices to a network, both locally and across a wide area (such as the Internet) has sometimes led to security vulnerabilities not expected by the system designers. This course provides an awareness of the security issues affecting microcontroller-based embedded systems and teaches approaches to protect against them. Since many of these systems are developed using the C or C++ programming languages, it looks at how C/C++ should be written to avoid security vulnerabilities. It also considers alternative hardware-based solutions to ensure secure booting, data communication and updates for the embedded software application. The workshops are based around carefully designed exercises investigating security features and issues for a real embedded system to reinforce and challenge the extent of learning, and comprise approximately 50% of class time.
Linux is being used in an increasing number of embedded devices including smart building and energy devices, set-top-boxes, automotive in-vehicle infotainment, WiFi routers and home gateways, smart meters, industrial monitoring equipment and even domestic white goods. Increasingly these devices are being connected to networks and this can leave them vulnerable to remote attacks that can result in brand damage, financial liabilities, product returns and even safety issues. “Hardening” Linux systems to make them more resistant to attack is possible and is something that should be performed for every connected product. This course covers three aspects of system hardening: Hardening the Linux operating system itself Protecting applications running under Linux Running applications in sandboxes - more detail on a specialised approach to protecting systems and the applications running on them Practical workshops comprise approximately 50% of class time and are based around carefully designed hands-on exercises to reinforce learning.
Migrating to AWS discusses how to plan and successfully migrate existing workloads to the AWS cloud. The course focuses on various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization. This course includes hands-on labs, group activities, and case studies to help reinforce the concepts learned.
Migrating Application Workloads to Azure training course is designed for IT Professionals who want to learn how to migrate existing on-premises workloads and assets to the cloud, specifically to the Microsoft Azure platform. In this training class, you will learn how to assess and evaluate an existing on-premises environment in preparation for a cloud migration.
Kafka is designed for distributed high throughput systems. Kafka tends to work very well as a replacement for a more traditional message broker. In comparison to other messaging systems, Kafka has better throughput, built-in partitioning, replication and inherent fault-tolerance, which makes it a good fit for large-scale message processing applications.