The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.
-
The RSSD: Secure Software Developer course is an intensive,highly interactive two-day program designed to equip software developers with the essential knowledge and skills needed to build secure applications in today’s increasingly hostile digital
landscape.This course is an invaluable resource for developers seeking to enhance their understanding of web application security, understand common threats and vulnerabilities, and implement security best practices from the ground up.
-
This Oracle WebLogic Server 14c: Performance Tuning Workshop Certification is a specialized qualification that demonstrates proficiency in optimizing the performance of Oracle WebLogic Server applications. It covers concepts like JVM performance tuning, garbage collection, and network optimization. It’s crucial for Industries relying on Oracle’s Java EE application server solution as it helps in efficient resource utilization, reduces downtime, lowers costs and improves application performance.
This certification equips IT professionals with the knowledge to diagnose and solve performance problems, appropriate configuration of server elements, and effectively manage and monitor resources, thus enhancing operational efficiency and productivity.
-
-30%
This training course builds on the networking concepts covered in the Networking Fundamentals in Google Cloud course. Through presentations, demonstrations, and labs, participants explore and deploy Google Cloud networking technologies.
These technologies include: Virtual Private Cloud (VPC) networks, subnets, and firewalls; Interconnection among networks; Load balancing ;Cloud DNS; Cloud CDN; Cloud NAT.
The course will also cover common network design patterns.
-
-30%
Learn best practices in cloud security and how the Google Cloud security model can help protect your technology stack. Security Engineers actively assess existing Google Cloud implementations, identifying potential security issues, and prioritizing solutions.
This Google Cloud certification uses lectures, demos, and hands-on labs to teach you about a variety of Google Cloud security controls and techniques. You’ll explore the components of Google Cloud and deploy a secure solution on the platform. You’ll also learn how to mitigate attacks at several points in a Google Cloud-based infrastructure, including distributed denial-of-service attacks, phishing attacks, and threats involving content classification and use.
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.
-
-30%
The Logging, Monitoring and Observability in Google Cloud training course teaches participants techniques for monitoring, troubleshooting, and improving infrastructure and application performance in Google Cloud.
Learn how to monitor, troubleshoot, and improve your infrastructure and application performance. Guided by the principles of Site Reliability Engineering (SRE), this official Google Cloud course features a combination of lectures, demos, hands-on labs, and real-world case studies. In this course, you’ll gain experience with full-stack monitoring, real-time log management and analysis, debugging code in production, and profiling CPU and memory usage.
-
-30%
The next generation of Dataflow: Dataflow Prime, Dataflow Go, and Dataflow ML.
This training is intended for big data practitioners who want to further their understanding of Dataflow in order to advance their data processing applications.
Beginning with foundations, this training explains how Apache Beam and Dataflow work together to meet your data processing needs without the risk of vendor lock-in. The section on developing pipelines covers how you convert your business logic into data processing applications that can run on Dataflow.
This training culminates with a focus on operations, which reviews the most important lessons for operating a data application on Dataflow, including monitoring, troubleshooting, testing, and reliability
-
-30%
In this course, you learn about the internals of BigQuery and best practices for designing, optimizing, and administering your data warehouse. Through a combination of lectures, demos, and labs, you learn about BigQuery architecture and how to design optimal storage and schemas for data ingestion and changes.
Next, you learn techniques to improve read performance, optimize queries, manage workloads, and use logging and monitoring tools. You also learn about the different pricing models.
Finally, you learn various methods to secure data, automate workloads, and build machine learning models with BigQuery ML.
-
PRINCE2® (Projects IN Controlled Environments) is a process-based approach for project management providing an easily tailored and scalable method for the management of all types of projects. The method is the de-facto standard for project management and is practiced worldwide. PRINCE2 is a flexible method that guides you through the essentials for running a successful project regardless of project type or scale. PRINCE2 can be tailored to meet your organization or industry-specific requirements. Upon completion of the course, learners will be able to:
- Define the key concepts of projects and PRINCE2
- Explain how the PRINCE2 principles underpin the PRINCE2 method
- Understand the importance of people in successful projects
- Describe the PRINCE2 practices and how they are applied throughout the project
- Explain the PRINCE2 processes and how they are carried out throughout the project
- Identify the relationships between processes, deliverables, roles, and the management dimensions of a project
In addition to these general learning objectives, the PRINCE2 7 Foundation course also aims to prepare learners for the PRINCE2 Foundation exam. The exam covers the following topics:
- The seven PRINCE2 principles
- The seven PRINCE2 themes
- The seven PRINCE2 processes
- The purpose and major content of all PRINCE2 roles
- The purpose and major content of all PRINCE2 management products
By completing the PRINCE2 7 Foundation course and passing the exam, learners will demonstrate that they have a sound understanding of the PRINCE2 methodology and are ready to apply it to their own projects.
-
This course is based on Red Hat Enterprise Application Platform 7.0. This course is a combination of Red Hat Application Development I: Programming in Java EE (AD183) and Red Hat Certified Enterprise Application Developer Exam (EX183).
In this course, you will learn about the various specifications that make up Java EE. Through hands-on labs, you will transform a simple Java SE command line application into a multi-tiered enterprise application using various Java EE specifications, including Enterprise Java Beans, Java Persistence API, Java Messaging Service, JAX-RS for REST services, Contexts and Dependency Injection (CDI), and JAAS for securing the application.
-
Learn how to tune for optimum performance the IBM DB2 10 for Linux, UNIX, and Windows relational database management system and associated applications written for this environment. Learn about DB2 10 for Linux, UNIX, and Windows in a single partition database environment. Explore performance issues affecting the design of the database and applications using the database, the major database performance parameters, and the different tools that assist in performance monitoring and tuning.
Use tools in class that are common across the Linux, UNIX, and Windows environments. During labs running on DB2 10.1, develop your ability to use monitoring tools. Explain tools and DB2 utilities like RUNSTATS, REORG and db2batch to tune a database running on your local LINUX workstation.
-
This course is for those who administer and maintain an IBM Enterprise Records system.
You work with a fully functioning IBM Enterprise Records system to practice the skills required for system configuration, administration, and system maintenance.