Data Warehousing on AWS introduces you to concepts, strategies, and best practices for designing a cloud-based data warehousing solution using Amazon Redshift, the petabyte-scale data warehouse in AWS. This course demonstrates how to collect, store,...
Migrating to AWS focuses on planning and migrating existing workloads to the AWS Cloud. The course covers various cloud migration strategies with a detailed discussion on each phase of the migration process, including portfolio discovery,...
AWS Security Fundamentals is designed to introduce you to fundamental cloud computing and AWS security concepts including AWS access control and management, governance, logging, and encryption methods. It also covers security-related compliance protocols and risk...
Developing on AWS helps developers understand how to use the AWS SDK to develop secure and scalable cloud applications. The course provides in-depth knowledge about how to interact with AWS using code and covers key...
DevOps Engineering on AWS demonstrates how to use the most common DevOps patterns to develop, deploy and maintain applications on AWS. The course covers the core principles of the DevOps methodology and examines a number...
In this hands-on Internet of Things (IoT) course, you’ll connect Node-RED flows (applications) running on IBM Bluemix (IBM Cloud) to more flows and simple Swift applications. You’ll use those applications to track the temperature of...
This 100-level self-paced course provides you with an overall understanding of the AWS Cloud, independent of specific technical roles. It provides a detailed overview of cloud concepts and AWS services, security, architecture, pricing, and support.
This course provides a review of key concepts to help you prepare to pass the IBM® Cloud Platform Application Development V2 exam. It is structured as a series of video lectures accompanied by demonstrations, hands-on labs, and...
Governance and Enterprise Risk
Legal and Electronic Discovery
Compliance and Audit
Assessment and Authorization process
Information Lifecycle Management
Portability and Interoperability
Traditional Security, BCM, D/R
Data Center Operations
Application Security and Risk Management
Encryption and Key Management
Identity and Access Management