Back to Courses

Information Technology Courses - Page 120

Showing results 1191-1200 of 1471
Cloud Storage: Qwik Start - Cloud Console
This is a self-paced lab that takes place in the Google Cloud console. This hands-on lab shows you how to perform basic tasks in Cloud Storage using the Google Cloud Console. Watch the short video Google Cloud Storage: Massive Scalability Plus More.
Monitoring and Logging for Cloud Functions
This is a self-paced lab that takes place in the Google Cloud console. In this hands-on lab we take a look through some of the information provided by the Cloud Monitoring tools, and teach some of the concepts you will need to know to take advantage of Cloud Monitoring effectively.
Check Point Jump Start: Cloud Security
Check Point CloudGuard, a comprehensive cloud security portfolio, is designed to prevent the latest fifth generation (Gen V), multi-vector cyberattacks targeting enterprise cloud services Section 1: Overview of CloudGuard Product line In this course you will learn about cloud security challenges and what different Check Point CloudGuard product line can be used to protect your cloud environment. How to Secure your Cloud Environment Cloud Challenges Security in the Cloud What is CloudGuard Security with CloudGuard Section 2: CloudGuard Network security solution In this course we will analyze how CloudGuard Network Security product solution is used to security your cloud posture. Understanding Cloud Security Fundamentals CloudGuard Solutions CloudGuard Components CloudGuard Segmentation Section 3: CloudGuard Network Security Product Labs In this course we will learn how to deploy a CloudGuard Network Security solution in the Azure Cloud. Deploying a CloudGuard Network Security Solution Building an Azure Private Cloud Environment Deploy Check Point R80.40 Management Server Deploy CloudGuard Gateway Deploy a Web Server Part1 Deploy a Web Server Part2 Connecting CloudGuard Controller Check Point Company Overview Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes. With Check Point Infinity, the only consolidated cyber security solution across cloud, networks, endpoints, mobile and IoT, we are continuously pioneering cyber security innovation with the most advanced AI-based threat Intelligence and prevention technologies, unified security management, and cloud security automation to help protect organizations from 6th generation of cyber attacks. With over 3,500 security experts, a world-acclaimed research and intelligence unit, and the broadest ecosystem of business and technology partners, we protect over 100,000 organizations of all sizes across all industry verticals in 88 countries to achieve allow better experiences for in a safer digital world.
Creating and Populating a Bigtable Instance
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you create a Bigtable instance and table and then use a Dataflow template to populate the table from pre-generated data files on Cloud Storage.
Introduction to Budgets in Microsoft Azure Cost Management
By the end of this project, you will create Budgets in Azure Cost management scoped to both Subscriptions and Resource Groups. You will also create a budget using an Azure Resource Manager (ARM) template and examine Cost Analysis and Alerts. An Azure account will be required to complete the tasks within this project and the steps required to create an account are detailed at the outset of the project. It should be noted that dependent on your new or existing Azure subscription that some features that will be enabled during this project are dependent on Azure making these features available in the Portal once activated. This may require that the project be paused as features such as Cost Analysis will not become available immediately. If you enjoy this project, we'd recommend exploring the Microsoft Azure Fundamentals AZ-900 Exam Prep Specialization: https://www.coursera.org/specializations/microsoft-azure-fundamentals-az-900
Splunk Knowledge Manager 102
In this course, you will learn how fields are extracted and how to create regex and delimited field extractions. You will upload and define lookups, create automatic lookups, and use advanced lookup options. You will learn about datasets, designing data models, and using the Pivot editor. You’ll improve search performance by creating efficient base searches, accelerating reports and data models, and how to use the tstats command.
Use Google Forms with Google Sheets
This is a self-paced lab that takes place in the Google Cloud console. Google Forms enables users to easily create and share online forms and surveys, and analyze responses in real-time.
Creating a Streaming Data Pipeline With Apache Kafka
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you create a streaming data pipeline with Kafka providing you a hands-on look at the Kafka Streams API. You will run a Java application that uses the Kafka Streams library by showcasing a simple end-to-end data pipeline powered by Apache.
Build a Database from a Relational Model
In this course you will interpret the components of a relational data model, convert that model into a relational database, and then test the database design. The process of database design begins with requirements analysis to determine who will use the new database and how it will be used. The results of the detailed analysis are recorded in an Entity Relationship Diagram (ERD), which documents entities and their attributes, along with the relationships between entities. The ERD (logical design) is then converted into the Relational Model, which serves as the blueprint for the actual creation of a database in a database management system. By the end of this course, you will have used a blueprint—a Relational Model—to create a database using SQLiteStudio. In addition, you will have developed test data and queries to validate the database design represented by the Relational Model. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Advanced Junos Concepts (Firewall Filters, IPv6, CoS)
This course will describe some advanced Junos OS concepts such as firewall filters and their use as a means of protecting a device from excessive traffic. An overview of the benefits and purpose of class of service (CoS) will be provided along with the implementation of traffic classification, queuing, and scheduling. Recommended Juniper Networks Technical Assistance Center (JTAC) procedures will be described along with the Juniper tools available online to help manage and support Juniper products. The course will be rounded out with a discussion of Juniper security concepts and components.