Introducing AWS

This course will introduce learners to AWS and the key services that most AWS cloud projects use. During this course learners will be taught about AWS identity and access managment (IAM), Elastic Compute Cloud (EC2) virtual machines, intro to AWS networking, Billing, Storage and an introduction to AWS database services.

Description

This course will introduce learners to AWS and the key services that most AWS cloud projects use. During this course learners will be taught about AWS identity and access managment (IAM), Elastic Compute Cloud (EC2) virtual machines, intro to AWS networking, Billing, Storage and an introduction to AWS database services.

Prerequisites

no prior experience

Similar courses

This course can now be found in the link below

More Information

Cloud identity and access management, Data encryption in the cloud, Key management in the cloud, Data residency

More Information

Why is cloud first here to stay, Focusing on the user, Making use of open source and open standards, Sharing, Reuse and Collaboration, Tools to use in a cloud first world

More Information

The goals of DevOps, Building a DevOps culture, Continuous integration, delivery, and deployment (CI/CD), DevOps Tools

More Information

Setting goals, Building a learning community, Keeping up-to-date with advances in technology, Becoming comfortable with saying “I don’t know” , Learning resources (tools and website to assist with learning)

More Information

The fundamental-level full day course is intended for individuals who seek an overall understanding of the AWS Cloud, independent of specific technical roles. It provides a detailed overview of cloud concepts, AWS services, security, architecture, pricing, and support. It includes lab exercises reinforcing some of the core concepts of the lecture. This course also helps you prepare for the AWS Certified Cloud Practitioner exam.

More Information

This course covers fundamental AWS cloud security concepts, including AWS access control, data encryption methods, and how network access to your AWS infrastructure can be secured. Based on the AWS Shared Security Model, you learn where you are responsible for implementing security in the AWS Cloud and what security-oriented services are available to you and why and how the security services can help meet the security needs of your organization.

More Information

Migrating to AWS focuses on planning and migrating existing workloads to the AWS Cloud. The course covers various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery, application migration planning and design, migration execution, and post-migration validation and application optimization.

More Information

This course will provide foundational-level knowledge of cloud services and how those services are provided with Microsoft Azure. The course can be taken as an optional first step in learning about cloud services and Microsoft Azure, before taking further Microsoft Azure or Microsoft cloud services courses.

More Information

This course provides foundational knowledge on the considerations and benefits of adopting cloud services and the Software as a Service (SaaS) cloud model, with a specific focus on Microsoft 365 cloud service offerings. You will begin by learning about cloud fundamentals, including an overview of cloud computing and specifically Microsoft cloud services. You will be introduced to Microsoft Azure, and you will examine the differences between Microsoft 365 and Office 365

More Information

This course provides learners with a broad overview of Dynamics 365 applications. We will introduce you each of the applications, articulate their business value, and discuss and demo core functionality. We will cover Dynamics 365 security, reporting, and familiarize you with data and product integrations available

More Information

In this course, you will learn how to select the right strategy, people, migration plan, and financial management methodology to move your workloads to the AWS Cloud. You will learn how to build a holistic cloud adoption plan and how to hire people to execute that plan. You will learn best practices for choosing workloads to migrate from your on-premises environment to AWS. You will also learn best practices for managing your AWS expenses and dealing with internal chargebacks. This course focuses on the business aspects of cloud transformation, rather than the technical aspects

More Information

During this course learners will be taught key AWS technologies that they will need to master to connect their networks with AWS. Learners will be taken on a journey from isolated VPCs to highly available hybrid architectures. This course will cover topics such as site-to-site VPNs using virtual private gateways and transit gateways, connectivity using AWS Direct Connect, security for hybrid connections and billing.

More Information

Get exam ready for the AWS Certified Solutions Architect - Professional certification with senior instructor, Mike Brown.

More Information

Get the exam support you need to achieve your AWS Certified Solutions Architect Associate certification.

More Information

Running Container-Enabled Microservices on AWS is designed to teach you how to manage and scale container-enabled applications by using Amazon EC2 Container Service (ECS). The course highlights the challenges of running containerized applications at scale and provides guidance on creating and using Amazon ECS to develop and deploy containerized microservices-based applications

More Information

In this one-day, advanced course, you will learn to design, build, and operate a serverless data lake solution with AWS services. This course will include topics such as ingesting data from any data source at large scale, storing the data securely and durably, enabling the capability to use the right tool to process large volumes of data, and understanding the options available for analysing the data in near-real time

More Information

Types of homeworking Benefits of homeworking Consideration of homeworking for employers Connectivity for home workers Collaboration tools for home workers Security of data when working from home

More Information

We are living unprecedented times. Every day we are learning new ways of working and interacting with each other’s and of course this also applies to the workforce. Hackers are also finding new ways of “working” and are taking advantage of the lack of well configured and prepared Systems. Spoofing, phishing are very know terms for IT Professionals and we get surprise by how so simple some attacks against identities are. Still users fall for then. There is a lot of awareness to be made on the user side, nevertheless we, IT Professionals should prevent this. In this Firebrand One I will share the best practices I have been advising customers around to world to protect their identities. We will speak and demo features like MFA, Self-password reset, Conditional access, PIM, FIDO, …. Join us and see how you can provide a safe cloud identity infrastructure to your users.

More Information

Demistifying the concepts of cryptography and PKI in the working environment and beyond.

More Information

Get a FREE Introduction to Network Security in just half a day.

More Information

In this 3-hour webinar, you'll explore how to make your users aware and stay aware of security risks that consistently evolve and circulate.

More Information

In this half day session we will cover exam techniques, we will go through the Solutions Architect Associate exam overview (publicly available) we will discuss booking an online exam and the process on the day. We will highlight key exam topics before finishing the session with an exam focused Q&A. We will also explain the next levels of certification and how they can be achieved by learning at Firebrand.

More Information

How statistics are used in modern businesses - How statistics and correlation of data can assist a modern business

More Information

Get a FREE introduction to Machine Learning (ML).

More Information

Foundation Data Science Understanding - What is DS, how is it being used in business today, what terms to look out for, how to commission some DS work

More Information

A good CI/CD pipeline is indistinguishable from magic - you commit your code and 2 minutes later the new version of your application is running. Don't believe that you can learn Kubernetes magic in two hours? Challenge accepted, join this course and we'll show you how you can automate a multi-stage docker build and kubectl deployment in just that long.

More Information

You can spin up an AKS cluster and publish a service literally in minutes but hosting a production-grade application will take a little more than that. This course offers a deep dive into kubernetes Services, Ingress Controllers and load balancing.

More Information

All CCNA related topics - The idea is to prepare students 2 weeks out from their exam, by providing an online Q&A session.

More Information

Defining the benefits of SD-Access over traditional campus networks - identifying the core SD-Access components.

More Information

Course Description: DSBIZ (DSZ-110) – CertNexus’ newest THINK level offering – is a credential that offers business leaders, sales and marketing managers, project managers, and other business stakeholders a streamlined course to help make decisions and drive organizational data science strategies. DSBIZ candidates will learn data science concepts, methods of use, plus the challenges and benefits using relative business examples. Successful candidates will earn a DSBIZ digital badge which can be shared via a number of social platforms.

More Information

“In business, you’re either growing or you’re decaying: there’s no middle ground. If you’re standing still you’re decaying.” Alan Arkin. The business world is deterministic – that is to say, every cause has an effect. It is also very complex. The combination of determinism and complexity is chaos and chaotic systems are not readily predictable. What we do know is that to thrive a business must address the perceived threats. We have Security people to address security threats by adjusting the Security Architecture – analogously we are adjusting for Privacy threats and generally we evolve by adjusting for different commercial threats. These include new laws and regulations, process and quality improvements by competitors and a whole myriad of other external changes that threaten our corporate well-being. Understanding how to accommodate responses to subtle threats within our complex corporate environment requires a dispassionate and holistic view which is not easy when it feels like fire-fighting. The role of the Enterprise Architect is to support continuity of business whilst analysing and understanding these threats, then design optimal system modifications to accommodate, reconcile or resist them. This webinar is designed as an overview to the thinking processes that can be used to rationalise the ‘non-security’ commercial threats with a view to understanding the particular skill-set of the Enterprise Architect.

More Information

Understanding how to accommodate responses to subtle threats within our complex corporate environment requires a dispassionate and holistic view which is not easy when it feels like fire-fighting. The role of the Enterprise Architecture is to support continuity of business whilst analysing and understanding these threats, then design optimal system modifications to accommodate, reconcile or resist them. Optimal, in this case, generally includes that they are capable of being implemented whilst minimally compromising the current operational environment – or that a great change is handled with predicted damage limitation. This webinar is designed as an overview to the thinking processes that can be used by the Enterprise Architect to rationalise these seemingly conflicting requirements.

More Information

Explain how a blockchain works, explain the purpose ledgers have in a blockchain, Identify blockchain vulnerabilities, Explain the role of the public witness in a blockchain, Explain the role of decentralized autonomous organizations (DOA) and sophisticated smart contracts, describe possible applications for a blockchain with regard to identity, identify the possibilities of combining a blockchain with internet of things (IOT) or artifical intelligence (AI), describe the role blockchain can play in the supply chain, explain the use of blockchain technology for the protection of intellectual property (IP) and providence

More Information

Get a free official introduction to AWS.

More Information

Get a free official introduction on how to deploy Kubernetes with Azure DevOps.

More Information

A 12 week programme. 10 x 1 day release mid-week or weekends Online Instructor Led, Online directed self-paced, practicals and assignments.

More Information

12 weeks programme. 7 x 1 day release mid-week or weekends Online Instructor Led, Online directed self-paced, practicals and assignments.

More Information

12 weeks programme. 6 x 1 day release mid-week or weekends Online Instructor Led, Online directed self-paced, practicals, assignments and online webinars

More Information

12 weeks programme. 10 x 1 day release mid-week or weekends Online Instructor Led, Online directed self-paced, practicals, assignments and online webinars

More Information

12 weeks programme. 6 x 1 day release mid-week or weekends Online Instructor Led, Online directed self-paced, practicals and assignments

More Information

Get Microsoft Certified in Azure Data Fundamentals in just 1 day!

More Information

Free 1-hour introduction to AWS' Approaches & Options for ML & AI.

More Information

Free 1-hour Introduction to Big Data on Amazon Web Services (AWS).

More Information

Free 1-hour introduction to ML on AWS.

More Information

This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles.

More Information

Join this event to learn how to modernize, unify, and innovate your way to a modern data strategy with AWS.

More Information

Learn how you can unlock new insights and value for your business using machine learning.

More Information

Whether you are thinking of migrating to the AWS Cloud or already have a workload running on AWS, securing your data and resources should be at the top of the list.

More Information

Learn about the AWS strategy and best practices for performing large-scale cloud migrations.

More Information

In this learning day, you practice configuring secure access to workloads using Azure networking.

More Information

In this learning path, you practice storing business data securely by using Azure Blob Storage and Azure Files. The skills validated include creating storage accounts, storage containers, and file shares. Also, configuring encryption and networking to improve the security posture.

More Information

In this course, learners explore how to configure and secure Azure Pipelines.

More Information

Fundamentals into being Anita Skurr

More Information

Description: This course focuses on building and managing canvas apps using Microsoft Power Apps. It covers designing, building, and sharing custom business applications leveraging the low-code approach of Power Apps.

More Information

This course focuses on building and managing canvas apps using Microsoft Power Apps. It covers designing, building, and sharing custom business applications leveraging the low-code approach of Power Apps.

More Information

Free 1 day course to help you prepare for the Microsoft Power Platform Fundamental (PL-900) exam.

More Information

Free 1-day accelerated Microsoft 365 Certified Fundamentals course to prepare for the exam.

More Information

1 day course targeted towards business users who want to enhance their Copilot for Microsoft 365 skills to solve business-related use case scenarios.

More Information