Tous les cours de Architecte

Image de cours
MS365: Teams
Découvrez la puissance de Microsoft Teams, l’application de collaboration conçue spécialement pour le travail hybride. Avec Teams, vous et votre équipe restez informés, organisés et connectés au même endroit. Discutez avec vos collègues, collaborez dans des espaces dédiés et utilisez des applications pratiques pour augmenter votre productivité. Demande de formation
 
Image de cours
MS365: Getting started with Microsoft 365
Cette formation offre un guide de démarrage rapide pour Microsoft 365, avec des instructions pour l’utilisation de base, la collaboration, le travail dans Microsoft Teams, le travail à partir de n’importe quel endroit et l’essai des fonctionnalités intéressantes de Microsoft 365. Demande de formation
 
Image de cours
Udemy: Angular - The Complete Guide (2024 Edition)
Master Angular, formerly Angular 2, and build awesome, reactive web apps with the successor of Angular.js. Join the most comprehensive and bestselling Angular course on Udemy and learn all about this amazing framework from the ground up, in great depth! This course starts from scratch, you neither need to know Angular 1 nor Angular 2. This course will teach you all the fundamentals about modules, directives, components, databinding, routing, HTTP access and much more! We will take a lot of deep dives and each section is backed up with a real project. All examples showcase the features Angular offers and how to apply them correctly. 36 hours on-demand video. Demande de formation
 
Image de cours
Exam Prep: Enterprise Architecture Foundations 9.2 (LinkedIn Learning)
The Open Group Architecture Framework, or TOGAF, is a framework and methodology for developing enterprise-level software. TOGAF provides an approach for designing, planning, implementing, and governing enterprise IT architecture. This high-level, systematic approach is designed to reduce error, maintain timelines, keep the project on budget and align IT with business units. If you’re looking to get certified in TOGAF, join Shane Chagpar in this course, as he provides an overview of the TOGAF Foundation exam, taking you step-by-step through the learning objectives for the Level 1 exam. Ce cours n'est disponible qu'en anglais. Si ce n'est pas un problème pour vous, soumettez votre demande. Demande de formation
 
Image de cours
Learning Docker (LinkedIn Learning)
Applications working on one machine but not others is a common problem in software development. Configuration management tools and virtual machines are common solutions, but can be cumbersome and more complicated than necessary for developers who just want their code to run in other places safely. Docker, an open-source containerization platform, simplifies the deployment and management of your applications by packaging your apps into images that run in containers—standardized executable components combining application source code with the operating system libraries and dependencies required to run that code in any environment. In this course, software engineer Carlos Nunez introduces the basics of Docker, including its containers, Dockerfiles (or base images), and capabilities. Watch and learn how to build your own containers.Topics include: Define Docker and explain common use cases. Understand how containers functionally and operationally differ from virtual machines. Explore three key technologies that make Docker different: layered containers, the Dockerfile, and the Docker API. Learn how to create and manage containers using the Docker CLI. Understand how to create custom container images using Dockerfiles. Learn how to push Docker images to the Docker registry and manage them. Troubleshoot common container issues using Docker CLI commands. Understand common best practices and problems when working with Docker containers and images. Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande.This course is in French only. If this is not a problem for you, by all means go ahead and apply.Demande de formation
 
Image de cours
Angular: Testing and Debugging (LinkedIn Learning)
Errors caused by missing dependencies, undefined variables, or poorly formatted data can cause your web application to stop working. In this course, learn how to track down and eliminate these types of errors in your Angular applications through the process of testing and debugging. Instructor Derek Peruo breaks down common error messages and goes over a variety of testing and debugging options. He also covers code linting, shares some tips and tricks for avoiding pitfalls during development, and goes into writing custom error handlers to make it easier to work with errors as your application grows.Topics include:Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande.This course is in French only. If this is not a problem for you, by all means go ahead and apply.Demande de formation
 
Image de cours
Building a Reactive App with Angular and Spring Boot 2 (LinkedIn Learning)
Angular is known for building rich, data-driven single page applications (SPAs), while Spring Boot is a popular and powerful framework for back-end development. In this course, Chris Anatalio shows how to take these two enterprise-scale worthy technologies and build a robust, secure full-stack application. Learn how to build an app that uses this reactive Spring stack to create a REST API on the back end, and an Angular front end that leverages that data. After highlighting the benefits of using reactive programming with Angular and Spring, Chris covers using, configuring, and implementing reactive Spring Data; building a reactive Spring Data client-side functionality with Angular; testing; and more. Topics include: Benefits of using reactive programming with Angular and Spring Bootstrapping your Spring Boot app Building a reactive Spring REST API Creating and testing a WebFlux GET endpoint Building a front-end app with Angular Using and configuring reactive Spring Data Using a REST API GET request Unit testing with Spring Boot and Angular Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation Recommended by Smals Experts //
 
Image de cours
DevOps Foundations: Infrastructure as Code (LinkedIn Learning)
Infrastructure automation—transitioning an organization's system administration from hardware into code—is one of the major DevOps practice areas. By automating configuration management, you can make your systems more reliable, processes more repeatable, and server provisioning more efficient. In this course, learn the basics of infrastructure as code, including how to keep your configuration in a source code repository and have it built and deployed just like an application. Discover how to approach converting your systems over to becoming fully automated—from server configuration to application installation to runtime orchestration. Join notable DevOps practitioners Ernest Mueller and James Wickett as they dive into key concepts, and use a wide variety of tools to illustrate those concepts, including Ansible, Terraform, Docker, Kubernetes, Serverless, and AWS Lambda. Check out this course to gain the knowledge you need to start implementing an infrastructure as code strategy. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Bonheur au travail
Qu'est-ce qui vous attend ?  Une session d'inspiration baptisée "Améliorer le bonheur au travail", animée par Griet Deca. Cette dame inspirante partagera son énergie positive dévorante et nous amènera à réfléchir aux moyens d'augmenter notre bonheur au travail. Une session d'inspiration baptisée "Le pouvoir d'une coopération optimale", animée par Kim Hilgert. Cette dame inspirante partagera son énergie positive dévorante et nous amènera à réfléchir aux moyens de parvenir ensemble à une coopération optimale.
 
Image de cours
IT Security Foundations: Network Security (LinkedIn Learning)
Want to keep your interconnected systems and data safe? In this course, Lisa Bock covers network security and securing an organization's infrastructure. Lisa introduces security devices such as firewalls and honeypots. In addition, she reviews the importance of isolating networks with VLANS and NAT addressing, along with a review of common security protocols. She also provides overviews of how to protect clients with antivirus software, encrypt folders and files, implement software restriction policies, and secure your cloud services. Finally, she looks at the often-overlooked topic of physical security, which includes securing a building's perimeter and the hardware within. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Cybersecurity: Key Policies and Resources (LinkedIn Learning)
Cybersecurity can be daunting because of its technical complexity and the ever-changing threats to individuals and organizations. And more than ever, cybersecurity also is a core business function for organizations of all kinds. Just like other business issues—like finance, legal, or human resources—cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across your organization—and not just within your IT department—can be hugely beneficial to your company. This course seeks to make key cybersecurity policies and resources clear and understandable—whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. Join instructor Gregory Michaelidis to improve your personal or organizational cybersecurity with grounding in the latest regulations, governmental authorities, and resources available. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Learning Confluence 2018 (LinkedIn Learning)
SCORE 4/5 by Smals Colleagues Confluence is content collaboration software that professionals can use to create, organize, and discuss work with their colleagues. In this course, instructor David Rivers shows how to work with this powerful tool as a team member, exploring how to configure and use Confluence to manage business and project information. David dives into creating pages and blogs in Confluence, setting page layouts, and adding content and navigation. He also shares how to collaborate on content and communicate with other team members. Topics include: What is Confluence? Customizing your home page Creating pages and blogs Creating a page for meeting notes Adding content and navigation Creating a table of contents Inviting people to your space Communicating and collaborating with others Restricting access to a page Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Performing a Technical Security Audit and Assessment (LinkedIn Learning)
This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure. Topics include Cite the three phases of external security assessments. Explain the reasons for conducting a log review. Explain what network sniffing is and why it’s used. Describe when to use a file integrity checking tool. Differentiate between active network discovery and passive network discovery. Explain how to scan for vulnerabilities. Relate the three techniques useful for validating target vulnerabilities. Explain the four-stage methodology of conducting penetration tests. Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
DevOps Foundations: DevSecOps (LinkedIn Learning)
Security is a major concern in the DevOps world. There is a constant push for companies to move more quickly, and security teams struggle to keep up with testing. This has led to the rise of a new field: DevSecOps. This course introduces the concept of DevSecOps and explains how an organization can build out a DevSecOps program that helps teams integrate security into the application development pipeline. Learn about the role of APIs, containers, and automation, and how a continuous integration and delivery framework can help your organization run security tests as often as developers want. Instructor Tim Chase also introduces some free tools and resources for starting your DevSecOps journey. Topics include: Identify the main goal of DevSecOps. Recognize the importance of security in the DevOps process. Explain the different steps in the continuous integration and delivery process. Determine the correct tools to integrate into the DevSecOps process. Assess reference materials for further DevSecOps learning. Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Ethical Hacking: Social Engineering (LinkedIn Learning)
Social engineering is a technique hackers use to manipulate end users and obtain information about an organization or computer systems. In order to protect their networks, IT security professionals need to understand social engineering, who is targeted, and how social engineering attacks are orchestrated. In this course, cybersecurity expert Lisa Bock discusses the methods a hacker might use, including embedding malicious links and attachments in emails and using mobile devices and social media to deploy an attack. She discusses the concept of "misuse of trust"—how hackers use charm, power, and influence to penetrate an organization—and why you need to be extra cautious with the disgruntled employee. Finally, Lisa discusses countermeasures security professionals can take to address these attacks. Note: This course maps to the Social Engineering competency of the Certified Ethical Hacker exam. You can review the exam objectives on the official EC-Council website. Topics include: Visualizing the victim Recognizing an attack Using charm, power, and influence Manipulating with social media Preventing insider attacks Stealing identities Pen testing with social engineering Taking countermeasures Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Docker for Developers (LinkedIn Learning)
Projects Build and deploy a Docker app. Discover how to leverage Docker for application development. Instructor Emmanuel Henri—an executive and full-stack developer with 20 years of experience in programming, technology, and design—walks you through deploying your first Docker app, from base application setup to deploying your app to the cloud. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
La sécurité informatique et cybersécurité : Niveau avancé (LinkedIn Learning)
En tant que responsable de la sécurité ou DSI, vous devez mettre en place une politique de cybersécurité pour répondre aux menaces qui pèsent sur votre informatique. Pour cela, Pierre Cabantous vous propose de faire un tour de la cybersécurité en entreprise. Dans ce cours, vous étudierez la démarche d'un pirate, avant et après l'intrusion dans un système, à la suite de l'exploitation d'une vulnérabilité. Vous verrez comment gérer ces vulnérabilités par rapport à un niveau de risque que vous apprendrez à calculer. Vous aborderez aussi une des principales menaces encourues aujourd'hui par tout service accessible en ligne : les attaques par déni de service. Puis vous découvrirez comment protéger votre organisation aux niveaux technique et organisationnel, en suivant des bonnes pratiques, des process ainsi que des normes européennes comme le RGPD. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Learning Cisco CLI Switch Configuration (LinkedIn Learning)
Learn how to configure a Cisco switch to connect and control resources on your network. Join Denise Allen-Hoyt in this course, as she explores the Cisco command-line interface using an out-of-band connection with a cable and terminal program. Denise shows how to access the switch's three modes—user EXEC, privileged EXEC, and global configuration—and use commands to configure essential settings. After addressing the switch and configuring a default gateway, Denise explains how to modify individual port modes, secure those ports, and create and manage virtual LANs (VLANs). In the final chapter, she shows how to verify your settings and reset the switch if necessary. Topics include: Accessing a switch Configuring the terminal program Configuring a switch hostname Saving and viewing configurations Securing access Encrypting passwords Assign an IP address to a switch Exploring port modes and security Creating VLANs Resetting a switch Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
L'essentiel de Power BI (LinkedIn Learning)
Dans cette formation, découvrez Power BI, la solution de Microsoft qui permet d'analyser, consulter et partager les données. André Meyer, consultant expert passionné par la transmission, aborde avec vous les principes, les composants et la configuration de Power BI à l'aide d'exemples concrets. Ensemble, vous verrez comment effectuer des requêtes de données vers Excel ou d'autres sources et préparer ces éléments. Vous apprendrez également à créer des tables, notamment de temps, des relations et à exploiter vos données sous forme de visuels. Puis, vous procéderez au filtrage et à l'exploitation des données aux formats PDF et Excel. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Cisco Network Security: Cisco Firewall Technologies (LinkedIn Learning)
Are you looking to learn the basics of configuring a firewall to secure your Cisco network? In this course, security ambassador Lisa Bock focuses on the most essential Cisco firewall technologies. Explore the core concepts of a firewall, what it is, and how it works in a variety of distinct security contexts, as Lisa shows you how to configure a basic firewall, choosing the option that’s best for you. Learn about stateless, stateful, and application firewalls with best practices for deploying each. Discover the essentials of managing access control lists, implementing network address translations on Cisco ASA, and identifying when and how to leverage a zone-based firewall to monitor traffic between internal and external zones. In closing, Lisa takes a closer look at some of the key features available on the Cisco ASA, such as the basics of access management, the Cisco Modular Policy Framework, high availability technology, and the Hot Standby Router Protocol (HSRP). Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Introduction to Cloud Computing
Cette formation contient trois modules, dispensés par les trois acteurs majeurs du Cloud Computing : Amazon, Google et Microsoft.Amazon: Introduction aux services Web d'Amazon    Résumer les avantages d'AWS    Décrire les différences entre la livraison à la demande et les déploiements cloud    Résumer le modèle de tarification par répartitionGoogle: Cette section identifie certains des principaux avantages de l'utilisation de Google Cloud. C'est ici que nous présentons les composants de l'infrastructure réseau de Google et explorons les différences entre l'infrastructure en tant que service (IaaS) et la plate-forme en tant que service (PaaS).Microsoft: Ce module explique les composants d'infrastructure de base de Microsoft Azure. Vous découvrirez l'infrastructure physique, la gestion des ressources et aurez la possibilité de créer une ressource Azure. Recommended by Smals Experts // Demande de formation
 
Image de cours
Docker Essential Training (LinkedIn Learning)
Docker is one of the most popular container storage solutions in the world. In this course, Carlos Nunez covers everything you need to know to get started with Docker. Join Carlos to learn how to build your first Dockerfile, along with other important topics like operating containers, Docker networking, Docker storage, the Docker Registry, and some advanced Docker operations. Demande de formation
 
Image de cours
Webinar ReUse, Putting IT on the map
Plusieurs experts du SPF Stratégie et Appui (BOSA), de l'IGN et de Smals présenteront des services réutilisables mis à disposition au niveau fédéral pour les adresses belges, ainsi que des solutions de géocodage.
 
Image de cours
I&S@Smals
Vous travaillez chez I&S, vous êtes nouveau ou vous travaillez parfois avec nous ? I&S@Smals est une zone avec du matériel didactique pour et à propos d'I&S. Vous pouvez y découvrir en plus sur notre organisation, nos séances d'information, notre business (eHealth, l'ONSS...), les équipes I&S, nos roadmaps, nos processus tel que notre IT Service Management, notre architecture de haute disponibilité, notre monitoring...  Werk je bij I&S, ben je er nieuw aangeworven of werk je soms samen met ons? I&S@Smals is een zone met leermateriaal voor en over I&S. Je ontdekt er meer over onze organisatie, onze infosessies, onze business (eHealth, RSZ...), de I&S teams, onze roadmaps, onze processen zoals IT Service Management, onze High Availability architectuur, onze monitoring... 
 
Image de cours
EAGlobal (OpenCourses)
Dans le cadre EAGlobal / Reuse Cross-Institutions, nous vous invitons à la présentation d’une solution en cours de développement pour le partage de librairies. Cette solution est basée sur Artifactory et permet de partager des librairies entre institutions.
 
Image de cours
Udemy: Oauth2 in spring-boot applications
The New OAuth 2.0 Stack in Spring Security 5.What you'll learn in this course: OAuth 2.0 OAuth 2 Authorization Flows The New OAuth 2.0 stack in Spring Security 5 Use OAuth 2.0 in Spring Boot Applications Configure OAuth 2.0 Resource Server Keycloak Identity and Access Management Solution Resource Servers behind API Gateway New Spring Authorization Server OAuth 2.0 in MVC Web App OAuth 2 - Social Login OAuth2 + PKCE in JavaScript Application Register Resource Servers with Eureka Service Registry Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation Recommended by Smals Experts //
 
Image de cours
DevOps Foundations (LinkedIn Learning)
SCORE 4/5 by Smals Colleagues DevOps is not a framework or a workflow. It's a culture that is overtaking the business world. DevOps ensures collaboration and communication between software engineers (Dev) and IT operations (Ops). With DevOps, changes make it to production faster. Resources are easier to share. And large-scale systems are easier to manage and maintain. In this course, well-known DevOps practitioners Ernest Mueller and James Wickett provide an overview of the DevOps movement, focusing on the core value of CAMS (culture, automation, measurement, and sharing). They cover the various methodologies and tools an organization can adopt to transition into DevOps, looking at both agile and lean project management principles and how old-school principles like ITIL, ITSM, and SDLC fit within DevOps. The course concludes with a discussion of the three main tenants of DevOps—infrastructure automation, continuous delivery, and reliability engineering—as well as some additional resources and a brief look into what the future holds as organizations transition from the cloud to serverless architectures. Topics include: Distinguish between the DevOps practice levels, values, and principles. Analyze where best practices should be applied. Interpret how best to manage cultural issues within a team and an organization. Explain how lean is used as part of the DevOps building blocks. Apply different approaches for automating infrastructure. Articulate how continuous integration practices and quality assurance play a role in continuous delivery. Explain the different components of reliability for engineering’s design operations. Describe the available resources to learn or apply DevOps. Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation Recommended by Smals Experts //
 
Image de cours
OpenShift v3
SMALS STANDARDS The first book help you to create your first jboss application with the Smals tooling on Openshift. This application use the IAM Smals libs (Common Build for JBOSS EAP6, warlock for JBOSS EAP 7). The second book help you to create your first Spring boot application on Openshift.  This second book is more generic (no dependency to the Smals tooling or to the Smals bases images).These e-learning contents are a complement to the OpenShift@Smals classroom course given by Pierre Herremans and for which registration is possible via the eHR catalogue. Do not hesitate to contact Pierre for any question. My first application- Smals tooling Book My first application G-cloud bootcamp Book Manual deployment on Openshift Page Add datasource Page Deploy integration with secret Page Add a web service call Page Readiness probe Page Command line Page Moose Page Delete your project Page PAAS Best practices Book Demande de formation
 
Image de cours
Passer de l'approche en cascade à la gestion de projet agile (LinkedIn Learning)
Si votre direction cherche à bénéficier des projets agiles en matière de délai, de qualité et de budget, cette formation est faite pour vous. Avec Kelley O'Connell, vous saisirez la différence entre la méthodologie de la cascade et l'approche agile. Vous aborderez les prérequis puis vous mettrez en place un projet pilote, dans lequel vous identifierez aussi bien les supporters que les détracteurs. Outre les notions de base à acquérir, vous devrez également définir une vision et constituer votre équipe et, enfin, grâce aux rétrospectives, vous identifierez ce qui favorise la poursuite de votre déploiement agile. Demande de formation
 
Image de cours
Passer de l'approche en cascade à la gestion de projet agile (LinkedIn Learning) copy 1
Si votre direction cherche à bénéficier des projets agiles en matière de délai, de qualité et de budget, cette formation est faite pour vous. Avec Kelley O'Connell, vous saisirez la différence entre la méthodologie de la cascade et l'approche agile. Vous aborderez les prérequis puis vous mettrez en place un projet pilote, dans lequel vous identifierez aussi bien les supporters que les détracteurs. Outre les notions de base à acquérir, vous devrez également définir une vision et constituer votre équipe et, enfin, grâce aux rétrospectives, vous identifierez ce qui favorise la poursuite de votre déploiement agile. Demande de formation
 
Image de cours
Software ReUse
ReUse in Software Development Project LifeCycle Smals et ses membres ont pour objectif de favoriser la réutilisation de composants logiciels existants et encouragent le développement de nouveaux composants réutilisables. Ce catalogue offre un aperçu des composants réutilisables existants.
 
Image de cours
Webinar ReUse, API Economy
Nous utilisons quotidiennement des API, ou Interfaces de Programmation applicatives, dès que nous accédons à Internet. Non seulement elles facilitent et simplifient l’utilisation des logiciels, mais elles offrent également une modularité et une flexibilité, et aident à réduire les coûts. Mais qu’est-ce qu’une « économie des API » ? En quoi peut-elle être un atout et comment va-t-elle évoluer ? Plusieurs experts présenteront les opportunités et défis d'une économie des API dans un contexte public.
 
Image de cours
Java Info sources
Java Information resources
 
Image de cours
Udemy: Oracle WebLogic 12c for Administrators
Learn how to install, deploy, manage, and troubleshooting Oracle WebLogic in an enterprise environment. In this course, you will learn to: ● Install WebLogic ● Configure WebLogic resources (JMS, JDBC) ● Deploy applications in a production environment ● Control server lifecycle using Node Manager ● Scale out WebLogic deployments using templates ● Create domains using manual and automated methods ● Understand high availability, failover, and load balancing using clusters ● Secure a WebLogic domain and applications ● Script common WebLogic tasks using WLST Demande de formation //
 
Image de cours
Udemy: Introduction to Cloud Computing
In this introduction to Cloud Computing, we answer the key question “What is the cloud?” With a solid, standards based approach and examples from the real word, we look at all the definitions that come together to mean cloud. In this course, you will learn to: ● Understand the fundamental elements of cloud computing ● Filter out the hype and focus on cloud value Demande de formation //
 
Image de cours
Udemy: Docker Mastery with Kubernetes and Swarm from a Docker Captain
Build, compose, deploy, and manage Docker containers from development to DevOps based Swarm clusters. In this course, you will learn:How to use Docker and Compose on your machine for better software building and testing. Skills to build advanced development environments with your code running in containers. Hand's-on with best practices for making Dockerfiles and Compose files like a Pro! Build and publish your own custom images. Build a fancy multi-node Swarm cluster for production deployments! Update and change your Swarm Services without downtime using rolling updates. Experience using multi-host logging and event monitoring for Docker Swarm. Understand the new Windows Containers, and try your hand at ARM Containers. Demande de formation
 
Image de cours
Udemy: Beginning Oracle WebLogic for Administrators
Introductory course to Oracle WebLogic 12c. Learn how to download, install, and create WebLogic domains. In this course, you will learn to:● Understand Basic WebLogic Concepts ● Create a WebLogic Domain ● Install WebLogic ● Access the WebLogic Admin Console Demande de formation //
 
Image de cours
Udemy: Build Security Incident Response for GDPR data protection
FREE GDPR and Incident Response Templates & Documentation - Practical GDPR and Incident Response Blueprint. In this course, you will learn to:● Understand what incident response is ● Will have a list of incident response tools and resources ● Will have a list of templates to use ● Will have a list of incident response playbooks Demande de formation //
 
Image de cours
Advanced Cisco Routing: RIP and EIGRP (LinkedIn Learning)
The decisions you make about routing determine how your information moves from place to place. And if you’re an IT administrator working with Cisco, you need to understand the various routing protocols that are available as well as how to effectively configure and manage them within your organization. In this course, instructor Jarrel Rivera gives you an in-depth overview of advanced routing in Cisco. Explore the basics of the Routing Information Protocol (RIP), before turning to the Enhanced Interior Gateway Routing Protocol (EIGRP), a more advanced distance-vector protocol for network route configuration. Along the way, Jarrel provides step-by-step demos using IPv4 and IPv6 addresses. By the end of this course, you’ll have the skills you need to leverage RIP and EIGRP so you can get the most out of your network topology. Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Webinar ReUse, All that data (OpenCourses)
Les services réutilisables peuvent-ils jouer un rôle dans la gestion de grandes quantités de données ? Comment limiter le volume ? Garantir la qualité ? Maîtriser les coûts ? Plusieurs experts présenteront des services réutilisables dédiés à la gestion, l'amélioration de la qualité, le stockage et l'archivage de grands ensembles de données.
 
Image de cours
Learning Cryptography and Network Security (LinkedIn Learning)
Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Découvrir l'écosystème d'Angular (LinkedIn Learning)
Si vous êtes un développeur formé à JavaScript ou TypeScript, suivez cette présentation de l'environnement de développement Angular. Vous aborderez les différents outils et vous découvrirez quel est le rôle et l'intérêt des serveurs et des bases de données. Vous verrez également les outils de développement pour appareils mobiles, ainsi que les techniques de test et de débogage, avant de passer à l'intégration continue et au déploiement. À la fin de cette formation, vous aurez les bases indispensables pour développer et également pour poursuivre votre formation avec Angular. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Power BI : Visualisations avancées et notions clés du DAX (LinkedIn Learning)
Vous connaissez les bases de Power BI mais vous souhaitez passer à la vitesse supérieure ? Lancez-vous dans l'analyse de données avec les visualisations avancées et les notions indispensables du langage DAX. Dans ce cours, André Meyer, auteur sur Power BI et l'informatique décisionnelle, vous aide à aller plus loin dans le paramétrage des visuels. Vous intégrerez les éléments dynamiques et interactifs dans la requête et dans le tableau de bord. Puis vous aborderez l'écriture de formules en langage DAX conjuguée à la puissance de Power BI. Vous aurez une maîtrise complète de la création d'un tableau de bord, ainsi que les clés du langage DAX pour ouvrir les portes d'une nouvelle dimension de l'analyse. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Power BI Top Skills (LinkedIn Learning)
You don’t need to have a team dedicated to analytics to unlock key insights in your data. All you need is Microsoft Power BI, the user-friendly, data analytics tool that can change your workflow and streamline it anew. In this course, instructor John David Ariansen teaches you the essential skills you need to know to analyze data correctly and effectively with Power BI. Learn about importing data, manipulating data, managing relationships, working with Data Analysis Expressions (DAX), and building visualizations and reports. Get tips and insights on how to get the most out of this powerful analytic tool. Upon completing this course, you’ll be ready to start using Power BI for all your business intelligence and reporting needs. This course was created by Madecraft. We are pleased to host this training in our library. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Ethical Hacking: Introduction to Ethical Hacking (LinkedIn Learning)
What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks. Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. Security expert Lisa Bock explores today's threat landscape, dissecting the top attack vectors and motives for attacks. Lisa identifies a variety of ways to secure an organization, explores policies that help enforce security objectives, and more. Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10. Topics include: Today's threat landscape Managing incidents Creating security policies Protecting data The COBIT framework Conducting penetration testing Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Ethical Hacking: Wireless Networks (LinkedIn Learning)
Wireless networks are convenient and popular, but poor configuration and encryption leave them open to attack. Hackers can use Wi-Fi vulnerabilities to infiltrate your entire network. Security professionals need to know how to detect, prevent, and counter these kinds of attacks using the latest tools and techniques—the subject of this course with cybersecurity expert Malcolm Shore. Malcolm covers everything from configuring basic security to understanding how hackers extract passwords, harvest connections at rogue access point, and attack networks via Bluetooth. He also explains how to select the right antennae for testing and introduces some sophisticated Windows and Linux tools to scan for vulnerabilities, including Acrylic, Ekahau, and Wireshark. By the end of the course, you should be able to shore up your wireless connections and gain confidence that your local network is safe to use. Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/. Topics include: Selecting an antenna Configuring security Extracting WEP and network passwords Testing passwords Harvesting connections from rogue access points Attacking networks via Bluetooth Capturing wireless packets with Acrylic Wi-Fi Heat mapping with Ekahau Wi-Fi sniffing with Wireshark Testing the Internet of Things Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Ethical Hacking: Mobile Devices and Platforms (LinkedIn Learning)
Mobile devices are used for our most sensitive transactions, including email, banking, and social media. But they have a unique set of vulnerabilities, which hackers are all too willing to exploit. Security professionals need to know how to close the gaps and protect devices, data, and users from attacks. Join cybersecurity expert Malcolm Shore as he explores the two dominant mobile operating systems, Android and iOS, and shows ways to protect devices through analysis and testing. Watch this course to review the basics of mobile OS models, the toolsets you need for testing, and the techniques for detecting and preventing the majority of security flaws. These methods are recognized by EC Council as integral part of those looking to earn their Certified Ethical Hacker certification. The complete CEH BOK can be found at https://www.eccouncil.org/Certification/certified-ethical-hacker/CEH-What-You-Will-Learn. Topics include: Statistic and dynamic analysis of mobile applications Testing on Android Analyzing Android applications Securing iOS applications Jailbreaking iOS for command-line access Analyzing iOS apps Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Power BI avancé : Requêtes de données avec Power Query (LinkedIn Learning)
Dans cette formation qui s'adresse aux analystes de données, vous apprendrez à tirer parti des fonctions avancées de l'éditeur de requêtes Power Query, notamment à l'aide du langage M. Avec Nicolas Georgeault, vous aborderez les enjeux de la multiplication des sources de données, puis vous ferez un tour d'horizon de Power BI. Ensuite, à l'aide de cas concrets, vous travaillerez avec les données, l'éditeur de requêtes Power Query et le langage M, puis vous finirez sur l'utilisation de modèles de données et les fonctionnalités avancées. À la fin de cette formation, vous serez à même de mettre en œuvre, de manière optimale, des requêtes de données Power Query. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Power BI avancé : L'analyse de données avec DAX (LinkedIn Learning)
Grâce à la puissance et à la simplicité de Power BI, comprenez rapidement vos données et faites-les parler. Spécialiste en apprentissage automatisé, Nicolas Georgeault vous accompagne dans ce cours sur l'analyse de données avec le langage DAX. À partir de sources de données brutes, vous construirez les différents éléments qui permettent la réalisation d'un rapport Power BI avancé. Vous passerez en revue quelques concepts tels que la conception des modèles de données. Vous verrez aussi comment transformer des données selon leur format afin de constituer les mesures nécessaires à la création d'un tableau de bord. Une fois normalisées, filtrées et augmentées, vos données seront plus faciles à comprendre par les utilisateurs de vos rapports Power BI. Ils seront en mesure de prendre des décisions plus rapidement à la lumière des transformations que vous aurez effectuées. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Software Architecture: Domain-Driven Design (LinkedIn Learning)
It's tough to be agile if you're working with a system that can't handle rapid change. Domain-driven design (DDD)—one of the most effective architectural approaches for both agile environments in general and microservices in particular—can help you build systems that can stand up to change. In this course, Allen Holub provides programmers, software architects, business analysts, and product managers/owners with an overview of this essential architectural process, demonstrating how to use DDD to develop a microservice or other domain-focused system. Alan goes over the basics of DDD (and how it fits with agile), microservices, and bounded contexts and entities. Plus, he compares reactive and declarative systems and details how to approach an event storming session. Topics include: How DDD differs from other architectural approaches How DDD fits with agile Advantages of microservices Bounded contexts and entities Reactive vs. declarative systems Using event storming to develop a DDD architecture Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Programming Foundations: Web Security (LinkedIn Learning)
Learn about the most important security concerns when developing websites, and what you can do to keep your servers, software, and data safe from harm. Instructor Kevin Skoglund explains what motivates hackers and their most common methods of attacks, and then details the techniques and mindset needed to craft solutions for these web security challenges. Learn the eight fundamental principles that underlie all security efforts, the importance of filtering input and controlling output, and how to defend against the most common types of attack. This course is essential for developers who want to secure their websites, and for anyone else who wants to learn more about web security. Topics include Threat models Least privilege Defense in depth Validating and sanitizing input Credential attacks SQL injection Cross-site scripting Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Power BI Quick Tips (LinkedIn Learning)
This collection of Microsoft Power BI quick tip videos is designed to demonstrate helpful tricks and quickly explain useful features. Discover quick ways to connect data, analyze data, and create visualizations in one place. Plus, explore how to connect and embed data, edit a group workspace, customize a dashboard for mobile phone viewing, and more. Topics include: Creating workspaces and sharing dashboards Uploading and publishing data Connecting to online services Creating and arranging tiles Asking questions and getting insights Bookmarks, favorites, and notifications Embedding, exporting, and printing data Creating apps and content packs Using the Office 365 files document library Accessing conversations in Office 365 Pin a report to a team channel Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
DevOps Foundations: Containers (LinkedIn Learning)
Containers are an amazingly versatile and powerful tool in the DevOps toolkit that can remove or smooth over a lot of the usual pain points in application development. Instructor Josh Samuelson goes over what containers are, where and when you can use them, and how to manage them well. Josh begins with a thorough explanation of what containers are, why you should use them, and how containers differ from VMs. He covers using containers in development, packaging, and production, with examples and factors to consider for each. Josh concludes with an in-depth look at how you can use Docker Swarm, Kubernetes, Mesos, and cloud container solutions to manage your containers effectively. Topics include: Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
API Testing Foundations (LinkedIn Learning)
As software companies continue to shift towards cloud computing, mobile apps, and microservice architectures, the ability to quickly and effectively test APIs has become a critical skill for software testers. In this course, instructor Dave Westerveld covers the basics of API testing, sharing how to work with several robust tools for testing APIs at scale in an organization. After providing a primer on web services and important API terminology, Dave shows how to use Postman for some basic API exploration. He then goes over some basic approaches and methodologies used in testing GET, POST, PUT, and DELETE requests; shows how to approach performance testing using SoapUI, a popular automated API testing tool; and more. Topics include: Reviewing API terminology Mitigating risks related to testing APIs Mapping out the layout of an API API authorization and authentication Finding and using bearer tokens Testing GET, POST, PUT, and DELETE calls Using mocks, stubs, and fakes in API testing Testing microservices and the Internet of Things Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Ethical Hacking: System Hacking (LinkedIn Learning)
System hacking is the way hackers get access to individual computers on a network. Ethical hackers learn system hacking to detect, prevent, and counter these types of attacks. This course explains the main methods of system hacking—password cracking, privilege escalation, spyware installation, and keylogging—and the countermeasures IT security professionals can take to fight these attacks. Security expert Lisa Bock also covers steganography, spyware on a cell phone, and tactics for hiding files and tools. These tutorials, along with the other courses featured in the Ethical Hacking series, will prepare students to pass the Certified Ethical Hacker exam and start a career in this in-demand field. Find out more about the exam at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh. Topics include: Acquiring passwords Generating rainbow tables Understanding where passwords are stored Defending against privilege escalation Understanding spyware Protecting against keylogging Detecting steganography How hackers cover their tracks Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Ethical Hacking: Hacking IoT Devices (LinkedIn Learning)
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used by hackers and security professionals against IoT devices, how to assess IoT security threats and vulnerabilities, and how to properly secure the devices by following industry best practices and implementing countermeasures. Topics include: How IoT devices work IoT technologies and protocols IoT communication models Common OWASP vulnerabilities Overcoming inherent IoT challenges Attacks occurring on IoT devices Methodologies used for hacking Securing IoT devices Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Power BI : L'analyse de données avec R (LinkedIn Learning)
Si vous êtes analyste et que vous souhaitez aller plus loin dans la visualisation des données dans Power BI, suivez cette formation consacrée à l'utilisation conjointe du langage de programmation R avec le service d'analyse et de décision de Microsoft. Après vous avoir présenté le langage R, Nicolas Georgeault vous accompagnera dans son installation ainsi que celle de ses dépendances. Puis, vous aborderez les différents moyens de visualisation statique et dynamique. À la fin de cette formation, vous aurez toutes les bases pour tirer parti du langage R au sein de Power BI. Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply. Demande de formation
 
Image de cours
Drupal 8 Essential Training 2: Building Out Your Website (LinkedIn Learning)
Your Drupal site is built. Now what? Web design doesn't stop once the website is launched. Learn how to build out your Drupal site to better fit your visitors' needs. In these tutorials, Tom Geller helps new Drupal designers change the layout and design elements of their sites, control visitor interactions (including comments), arrange content in user-friendly "views," and expand the site's capabilities beyond what's available in core Drupal with Drupal modules. In all the steps you'll learn best practices to ensure your sites remain streamlined, secure, and up to date.If you want to start from the beginning and create your Drupal site from scratch, check out. Topics include Grouping content into categories Managing comments Adding discussion groups Customizing fields and image styles Adjusting menus and navigation to help users Adding new features with Drupal modules Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply.
 
Image de cours
Drupal 8 Essential Training 1: The Basics (LinkedIn Learning)
Drupal 8 Essentials is designed to help anyone create a simple website using Drupal, the free web design software that powers personal blogs as well as the sites of some of the world's largest corporations. Topics include Comparing Drupal to other software Getting help with Drupal Installing Acquia Dev Desktop on Mac and Windows Installing the Drupal database, modules, and themes Creating basic content Establishing your site's look and feel Adjusting security settings Adding images and metadata Adding a sidebar Moving your Drupal website to a server Backing up a Drupal site Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande. This course is in French only. If this is not a problem for you, by all means go ahead and apply.
 
Image de cours
Building a trusted partnership with clients
Créée par Smals Academy, cette image cliquable mène à une série de cours soft skills liés à un domaine.
 
Image de cours
REST API Design
SMALS STANDARDS. REST est devenu la norme industrielle pour le développement d'API sur le Web et constitue la norme de facto pour communiquer entre un navigateur/une application mobile et un serveur dorsal. Dans cette formation, vous découvrirez l'approche de conception RESTful et appliquerez cette méthodologie pour modéliser les données et les fonctionnalités de votre entreprise dans une API REST. Nos API REST seront également conformes au guide de style REST de G-Cloud. Cette formation est développée par Willem Salembier de l'équipe ICC. Si vous avez des questions relatives à cette formation, veuillez envoyer un e-mail à icc-training@smals.be. Si vous avez des questions sur les normes REST, veuillez envoyer un courrier à rest-styleguide@gcloud.belgium.be ou soulever un problème via GitHub. Les sujets inclus dans cette formation sont : * Introduction * Interface uniforme * Ressources de collection * Ressources de documents * Ressources de contrôleurs * Hypermédia * Méthodes * Représentations * Schéma OpenAPI * OpenAPI * Traitement des erreurs * Documentation * Gouvernance * LiensDemande de formation //
 
Image de cours
OpenRefine
Support du cours sur l'outil OpenRefine : "A free, open source, powerful tool for working with messy data"
 
Image de cours
REST Development (JAX-RS)
SMALS STANDARDS. REST est devenu la norme industrielle pour le développement d'API sur le Web et constitue la norme de facto pour communiquer entre un navigateur/une application mobile et un serveur dorsal. Dans cette formation, vous apprendrez à développer une API REST à l'aide de l'approche "contract-first". Nous allons générer des classes d'interface JAX-RS et des classes de modèle Jackson à partir d'une spécification OpenAPI. Ces classes seront notre point de départ pour créer une application REST que nous déploierons sur un serveur d'application standard JBoss EAP 7.3.6. Cette formation est développée par Willem Salembier de l'équipe ICC. Si vous avez des questions relatives à cette formation, veuillez envoyer un courriel à icc-training@smals.be. Les sujets inclus dans cette formation sont : * JAX-RS * Premier contrat * Correspondance des méthodes * Injection * Filtres * Traitement des exceptions * Validation * Négociation du contenu * HATEOAS * CORS * API client * Injection SPRING * Multipart Demande de formation //
 
Image de cours
Service Orientation & API Management
SMALS STANDARDS Smals a adopté une approche orientée services pour intégrer les systèmes informatiques et les fournisseurs de services externes. Toutes les communications entre ces systèmes utilisent des normes ouvertes et sont basées sur des services web (REST ou SOAP). Les applications web et mobiles modernes exploitent ces API pour créer des applications frontales interactives. La réutilisation est un aspect essentiel. Dans ce module, vous apprendrez les principes de la conception orientée services et la gestion d'un large catalogue d'API d'entreprise. Cette formation est développée par Willem Salembier de l'équipe ICC. Si vous avez des questions relatives à ce cours, veuillez envoyer un courriel à icc-training@smals.be. Les sujets abordés sont les suivants * Introduction * Terminologie et concepts * Objectifs et défis stratégiques * Plateformes de services * Microservices * Principes de conception orientée services * Gouvernance Demande de formation
 
Image de cours
Udemy: Conversation on Cryptography: A Total Course with Mike Meyers
Diving into cryptography with The Alpha Geek and Total Seminars team. Learn cyber security and ethical hacking. In this course, you will learn to: ● Define cryptography and the key role it plays in protecting our digital data ● Find out how Web sites use certificates to make sure our usernames, passwords, credit card numbers, and other personal data stay secure ● Understand ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure ● Learn how hashing helps us to be certain the data we receive or download is legitimate ● Prepare for the CompTIA Security+ exam by better understanding cryptography and PKI, one of the six exam domains Demande de formation //
 
Image de cours
Udemy: Real-World Ethical Hacking: Hands-on Cybersecurity
In this course, you will learn to: ● Secure your computer, your network, and your data from 99% of all attacks on the Internet ● Find and fix weaknesses and harden your computer's security ● Keep yourself safe online, at home, at school, or at work ● Test for security vulnerabilities using the tricks the bad guys use ● Avoid phishing, viruses, ransomware, and online scams Demande de formation //
 
Image de cours
Trajet Architecte I&S
Compétences soft skills pour architectes. Accessible en interne suite à un entretien de sélection.
 
Image de cours
Udemy: Docker - Introducing Docker Essentials, Containers, and more
Create and run Docker containers, and build multi-container applications. Compose, Networks, Swarm, Cloud, & more!. In this course, you will learn: Use Docker compose to create multi-container applications. Build your own custom Docker images. Understand best practices of Dockerfiles and Image building. Create a cluster with Docker Swarm. Set up continuous integration workflows with automatic testing on Docker Cloud and Github. Create and run Docker containers. Run Docker Commands on the command line. Understand Docker Cloud and Docker swarm. Publish and host Docker images on Docker Cloud. And more! Demande de formation
 
Image de cours
Udemy: Docker for Java Developers
Learn how you can use Docker to supercharge your enterprise Java Development! In this course, you will learn: How you can run Docker Containers Publish Docker Images to Docker Hub Use Docker Swarm for Cloud Scale Computing How to use Docker Containers for Integration Tests How you can leverage Docker Containers for Integration tests from CI Builds How you can create and run your own Docker Images Learn how to use Docker Compose to Run Multiple Docker Containers Use Maven to Create Docker Images Run multiple Docker containers with Docker Compose Create your own Docker Swarm Cluster Demande de formation
 
Image de cours
Trajet Architecte & senior dev. TO&P
Compétences soft skills pour architectes. Accessible en interne suite à un entretien de sélection.
 
Image de cours
Aspects juridiques de la confidentialité et sécurité des systèmes d'information
Ce cours donne un aperçu des différentes réglementations dans le domaine de la vie privée et de la sécurité des systèmes d'information, tant générales que spécifiques à la sécurité sociale et à la santé (SZ&G). Le grand nombre de réglementations à différents niveaux (européen, fédéral, régional) et les différentes organisations concernées en font une question complexe. De plus, la vie privée et la sécurité sont un domaine en pleine évolution. Ce cours n'est donc pas conçu comme un ouvrage de référence, qui vise à être complet. Il est conçu comme un point de départ pour une étude plus approfondie par les personnes intéressées et est utile pour mettre en pratique le principe de "protection des données par conception & par défaut". Pour en savoir plus, consultez la présentation sur la "data protection by design & by default". Le cours lui-même est, en plus d'une introduction, structuré en 7 sessions, couvrant des domaines spécifiques de la vie privée et de la sécurité.