Back to Courses

Information Technology Courses - Page 36

Showing results 351-360 of 1471
Visualizing Billing Data with Google Data Studio
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you will harness the power of Data Studio, where you will learn how to build billing graphs and charts so you can slice and dice your GCP bill the way you want.
Online Data Migration to BigQuery using Striim
This is a self-paced lab that takes place in the Google Cloud console. Continuous Data Replication from Cloud SQL for MySQL to BigQuery using Striim
Manage Docker on Linux Servers
Managing Docker on Linux servers is a valuable skill to have if you want to be a Docker administrator, a Docker developer, or want to learn more about Docker in a Linux environment. At the end of this project, you will know how to install Docker on Linux, add a user to the "docker" group, and manage Docker objects on the server. The focus is on Docker Engine instead of Docker Desktop, so you will learn how to use the Command Line Interface! Because of the nature of the virtual environment in this project, you should plan on completing the project during one session.
Check Point Jump Start: Harmony Endpoint Security
Harmony Endpoint is a complete solution that protects the remote workforce from today’s complex threat landscape. It prevents the most imminent threats to the endpoint such as ransomware, phishing, or drive-by malware, while quickly minimizing breach impact with autonomous detection and response. With remote users connecting to your corporate applications from anywhere, your organization’s attack surface is increasingly expanding. Check Point Harmony is the industry’s first unified security solution for users' devices and access.It protects devices and internet connections from the most sophisticated attacks while ensuring zero-trust access to corporate applications. The course modules are: Introduction Architecture Architecture-the Flow Architecture-Accessing the Endpoint Server Deployment Deployment-Installing the Client on Windows Deployment-Installing the Client on Linux Deployment-Visibility Deployment-Change Policy Deployment-Upgrade Deployment-Remove a client Communication Communication-Port, Services, and URLs Exclusions Summary Check Point Software Technologies Ltd. is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry-leading catch rate of malware, ransomware, and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network, and mobile device-held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.
Pub/Sub Lite: Qwik Start
This is a self-paced lab that takes place in the Google Cloud console. Pub/Sub Lite is a zonal service for messaging systems with predictable traffic patterns. In this lab you will create Lite topics and Lite subscriptions, then send and receive messages using the Pub/Sub Lite client library for Python.
Troubleshooting Workloads on GKE for Site Reliability Engineers
This is a self-paced lab that takes place in the Google Cloud console. The Cloud Operations Sandbox is intended to make it easy for you to deploy and run a non-trivial application that lets you explore the Google Cloud Platform services, particularly the Cloud Operations (formerly Stackdriver) product suite.
Networking 101
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will learn how to perform basic networking tasks on Google Cloud Platform by setting up a network and 3 subnetworks; and how GCP might differ from an on-premises setup.
Cloud Top Ten Risks
After completing the course, the student should be able to do the following: ● Associate lists of OWASP Top Ten Risks with major cloud cybersecurity risks. ● Apply appropriate cryptographic techniques to secure authentication mechanisms and cloud data. ● Identify the most effective strategies for resisting injection attacks, cross-site scripting attacks, and object deserialization attacks. ● Assess strategies to address risks posed by administrative failures, including misconfiguration, broken access control, vulnerable software components, and security monitoring.
Building Cloud Native and Multicloud
In this course, we will cover the core concepts and practices of building and running Cloud Native applications and how to run these applications in a multicloud environment. We will cover technologies and practices including; microservices, DevOps, CI/CD, Docker, Kubernetes, and OpenShift. This course is designed for anyone wanting to learn about the guiding principles of building cloud native applications and managing them across multiple cloud platforms, both private and public. Also covered in this course is how to automate many of the common functions of building and running cloud native applications and orchestrating the environment they run in. A basic familiarity with cloud concepts and modern development practices is recommended. For the hands-on labs, an IBM Cloud account will be required as well as basic familiarity with command-line interfaces. This course is designed for anyone wanting to learn about the guiding principles of building cloud native applications and managing them across multiple cloud platforms, both private and public. Also covered in this course is how to automate many of the common functions of building and running cloud native applications and orchestrating the environment they run in.
Linux: SSH to remote server & Networking basics for DevOps
By the end of this course, you will have a solid grasp of SSH and authenticating users and client machines to a server. You will further have a working knowledge of some of the most important Networking concepts and commands in Linux.