Information systems - Computer science

skills
19
20
21
22

New computer technologies, syntheses

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

A precise summary of the most recent advances in IT and telecommunications, their foreseeable developments in the short and medium term, and their impact on businesses: building service networks, securing them; master Internet technologies; measure the impact of mobility and e-commerce; integrate mobility into development methods; set up client-server and Cloud applications; choose a development process adapted to new technologies.

Who is this training for ?

For whom

IT leaders and all those who have to participate in the development of digital strategies.

23
Prerequisites

No special knowledge.

Training objectives

Identify the main advances in digital technologies
Discover methodological trends
Evaluate the impact on the organization
Identify new IS and telecommunications architectures
Discover new trends in IS security
Understand web technologies and its applications

24

Training program

Telecommunications: market and solutions
  • Principles, architectures and evolution of telecommunications networks.
  • Actors, markets, positioning of operators, content and service providers.
  • Business networks.
  • Main switching and routing architectures.
  • Quality of service and SLA (Service Level Agreement).
  • Evolutions towards virtual networks and network virtualization .
  • Scaling towards server farms and the cloud.
25
Network architectures and technologies
  • Operator networks. Access networks. High speeds. Triple/quadruple play. xDSL, EFM solutions.
  • Techniques. Cable. Optical local loop. Emergence of radio networks: WiFi, WiMax, Mesh, WiGig.
  • Cellular telephone networks: EDGE, UTMS, HSDPA 4G and 5G.
  • Local mobile networks (802.11 a/b/e). /g/n), Bluetooth (802.15), ZigBee and UWB, WiFi Hostpot.
  • Local network architecture.
  • Network technologies: switching, routing and switching label (Ethernet, IP, MPLS).
  • Internet routing (intra-domain and BGP).
  • QoS: DiffServ model.
  • Content distribution networks (CDN) and "overlays". P2P networks.
  • Virtual networks. SDN solutions and their advantages.
  • Virtualization of network functions (NFV: Network Function Virtualization). OpenFlox and OpenStack.
  • Mobility: moving the workstation. Network mobility management.
  • Handover, roaming and mobility management. WIMAX 802.16IP Mobile networks and cellular mobility...
  • Evolution of Internet architecture and protocols. IPv6, ambient Internet, vehicular networks, etc.
  • Synthesis: interaction between networks and applications. Traffic. Metrology. Perspectives.
26
Methodological and technological trends
  • DevOps: focus on collaboration between the different players in the software chain.
  • Big data: positioning the IT department.
  • Data storage in disconnected mode ".
  • BYOD and the integration of new tools: mobility, DaaS, virtual workstation/office, etc.
  • 3D printing. Immersive 3D.
  • Artificial intelligence and robots.
  • Drones and geolocation and map management.
  • Evolution towards the Internet of Things and "Cyberphysical Systems".
  • Free software. Security and sustainability guarantees. Impact on workstations.
  • Application integration: ESB and EAI. .
27
IS infrastructure and security
  • State of the art of IS infrastructure.
  • Mobility and new workstations (PC, Tablet, Hybrid...).
  • New operating systems (Windows 10, Chrome, iOS, Android...)
  • Servers: databases, applications, web.
  • Big. Data. Evolution of databases: in-memory, opening towards virtualization and the cloud, NoSQL.
  • Virtualization: impact on infrastructure and security.
  • Cloud: private, public and hybrid. Outsourcing or densification of server rooms via virtualization.
  • Impact of social networks, semantic web (Web 3.0).
  • Internet of things. .
  • Servers. The push for open source.
  • ETL and data processing. underlying and impacts.
  • IS security. Architecture, protocols, organization. Secure VPNs. Biometrics.
  • Digital signatures, key management infrastructures.
28
Web technologies and its applications
  • Developments and evolutions. Applications.
  • Internet protocols: messaging, forums, web, directories (SMTP, POP, IMAP, HTTP, LDAP).
  • HTML5 JavaScript API (persistence management, access to terminal resources, etc.)
  • Structuring documents. PDF, XHTML, web 3.0.
  • Impact of terminals on browsers (Responsive Design, offline mode...).
  • RIA technologies (Flex, Java), RDA (Air, JavaFX, Java FX8), HTML5, CSS3, xHTML Trends.
  • Performance and scalability.
  • JavaScript framework (jQuery, Angular, BackBoneJS, React, VueJS...)
  • XML: XSLT transformations, parsers. protocols (SOAP, Rosettanet , XHTML, BPML, WSDL).
  • XML and NoSQL DBMS (MongoDB, Hadoop...).
  • Web services: principles. SOAP, REST, UDDI and WSDL. 'access.
29
Evolution of the essential Java, .Net and PHP
  • Microsoft .Net Platform, C#, HTML5, CSS and JavaScript.
  • .Net Framework: ASP.NET, MVC Core, Entity Framewok, WCF, WPF, Web Services, Multicore programming ....
  • Java technology. Java EE platform.
  • Frameworks JSF, Hibernate, Spring...
  • API security and opening to the IS: JCA, JMS, JNDI...
  • Enterprise Java Beans, CORBA integration.
  • Application bus. Adoption of SOAP and REST.
  • PHP trends.
30

Acquisition, conversion, loyalty on the web

★★★★★

  • SII-2
  • 2 Days (14 Hours)

Description

Attracting and seducing even more visitors, encouraging them to buy and then retaining them, these are the main objectives of communication on the Web, mobile phones and tablets. This digital marketing training provides the latest practical tools and recent operational methods to implement to communicate effectively on digital media.

Who is this training for ?

For whom
In charge of marketing and communication. Marketing and digital communications project manager taking up position.
31
Prerequisites

None.

Training objectives

Develop traffic to your site, improve conversion and loyalty rates.
Monitor your campaigns using the right performance indicators (KPI).

32

Training program

Target the consumer at all times
  • The evolving technology landscape: web, mobile, tablets, IoT.
  • Connectivity and geolocation: anytime, anywhere, on any device.
  • Strategies for targeting and collecting consumer data on the web, mobile and cross-channel.
Structuring and managing your web, mobile and omnichannel actions
  • The e-communication plan for conquest and loyalty.
  • Dashboards and campaign analysis tools: web analytics, KPI, ROI.
Generate web and mobile traffic
  • Search engine referencing strategies (SEM): SEO, SEA, SMO.
  • Partners and affiliation.
  • Promotional levers, display (native ads, programmatic) on web and mobile.
Increase the conversion rate of Internet users
  • UX navigation strategies on websites and Responsive design on mobile and tablets.
  • Mapping web and mobile conversion techniques: teasing, videos, games, competitions...
  • Social media for prospecting and marketing: Linkedin and Twitter.
Use social media to build loyalty
  • Define objectives and identify your communities.
  • Examples on Facebook, Instagram, Snapchat, Youtube to build loyalty and engagement.
  • Measuring loyalty at each stage of the customer journey on the web and mobile.
33

Improve the performance of your site with Google Tag Manager

★★★★★

  • SII-298
  • 1 Days (7 Hours)

Description

The Google Tag Manager training allows you to understand the advantages of this free tool for operating and managing website tags.
From developing a tracking strategy to implementing analytics and advertising labels. This one-day operational training makes it possible to make GTM a powerful support for your digital performance.

Who is this training for ?

For whom

Marketing and digital communications manager. Web or digital marketing project manager.

34
Prerequisites

 

  • Aucun

 

 

Training objectives

Use Google Tag Manager to optimize the performance of one or more websites and e-commerce

35

Training program

Define a tracking strategy
  • Understand the key stages of a tag management and web analytics project.
  • Define useful data to collect.
  • Create an effective tagging plan.
  • Monitor the progress of a tag management and web analytics project.
Master Google Tag Manager
  • Understand the challenges of tag management and the benefits of Google Tag Manager.
  • Understand the concepts of tags, trigger rules and variables.
  • Implement Google Tag Manager.
  • Configure and organize your Google Tag Manager account.
Configure advertising tags
  • Understand attribution models and periods.
  • Understand post-click and post-view conversions.
  • Set up Facebook tags.
  • Configure Adwords tags.
36
Implement analytics and advertising tags (practical exercises)
  • Organize e-commerce tracking.
  • Implement Google Analytics events.
  • Create analytics page groups.
  • Create pages virtual analytics.
  • Track forms.
  • Track clicks on outgoing links.
  • Implement Facebook tags.
  • Implement Adwords tags.
  • Implement custom tags.
37

Improve your SEO with Google Ads (SEA)

★★★★★

  • SII-299
  • 2 Days (14 Hours)

Description

Successful running of a sponsored search campaign on Google requires selection of appropriate keywords and effective ad writing. To achieve this, it is necessary to master the appropriate techniques. This Adwords training teaches you the basics to launch sponsored link campaigns on Google and attract qualified visitors to your website.

Who is this training for ?

For whom

Webmaster, webmarketer, Marketing manager, e-commerce manager, communications manager, Internet manager, product manager who wish to launch Adwords campaigns.

38
Prerequisites

Training objectives

  • Understand and master paid SEO techniques
  • Succeed in your first Adwords campaigns
  • Define an SEM (Search Engine Marketing) strategy and set objectives
  • Launch and manage an advertising positioning campaign on search engines
  • Generate targeted traffic to your website and measure ROI

39

Training program

Use sponsored links
  • Issues of sponsored links: profitability, problem of click fraud, law.
  • Advertising networks and formats: Google Adwords / Adsense, Bing...
  • Universal campaigns: desktop, mobile, tablets...
  • The mode of operation: auction systems, Google Quality Score...
  • The Google Adwords interface.
Define your campaign strategy
  • Define your objectives: sales, traffic…
  • Define an advertising media plan.
  • Choose your broadcast period and targeting.
  • Budget and bidding strategy.
  • Complementary strategy with natural referencing.
Create and upload an Adwords campaign
  • Configure your campaign.
  • Choose the keywords and their targeting.
  • Determine your bids.
  • Write your ads.
  • Ad extensions: location, appeal, links, reviews, products...
  • Define your landing pages and optimize them.
  • Focus on mobile campaigns.
40
Create and put Display and Retargeting campaigns online
  • Principles and interests of Display and Retargeting campaigns.
  • Campaigns on YouTube.
  • Display campaigns: targeting by keywords, audience...
  • Remarketing campaigns.
Optimize the performance of Adwords campaigns
  • Monitoring dashboards.
  • Performance analysis: choice of KPIs.
  • Corrective actions.
  • Mastering Google Adwords Editor .
  • Optimize your landing pages using A/B testing.
41

Create a website with Wordpress - Level 1

★★★★★

  • SII-319
  • 2 Days (14 Hours)

Description

By following this continuing education course on creating websites with Wordpress, you will learn the fundamentals necessary to design and publish your first web pages, including how to organize links between different pages, insert text and images, as well as understand the key principles of web layout. This training is an essential step in getting you started creating your first website.

Who is this training for ?

For whom

Anyone who wants to create a website and put it online.

42
Prerequisites

  • Be comfortable using the computer, master the Internet and the functionalities of websites.

Training objectives

  • Create a simple website
  • Incorporate texts and images
  • Create hypertext links
  • Publish a website online

43

Training program

Before the face-to-face
  • A self-diagnosis.
  • A tool to test the composition of your site's home page.
Create a website
  • Organize content.
  • Structure navigation.
  • Acquire the basics of HTML.
Install and use Wordpress
  • Set general options.
  • Start the installation.
  • Use the dashboard.
  • Choose the site theme: charter graphics, typography and colors.
Promote content
  • Create posts and pages.
  • Define categories.
  • Add keywords.
Embed images and elements
  • Retrieve and modify images (PNG, GIF, JPEG).
  • Enrich content.
  • Integrate additional elements (Google Maps).
44
Insert hyperlinks
  • Between pages on your site.
  • To other sites.
  • To email.
  • To PDF files, sound or video.
Complete and enrich the website
  • Manage user accounts.
  • Customize a theme.
  • Install extensions.
  • Save the site.
After face-to-face - Implementation in a work situation
  • A strengthening program: "One challenge per week for 7 weeks".
45

Create a website with Wordpress

★★★★★

  • SII-6
  • 2 Days (14 Hours)

Description

Wordpress is the world's most popular free and open source software for building websites and blogs. This advanced training will allow site designers who are already Wordpress users to personalize and professionalize their website.

Who is this training for ?

For whom
Anyone wanting to professionalize and improve a website with Wordpress.
46
Prerequisites


Training objectives

Master the advanced functions of Wordpress to improve and professionalize a website

47

Training program

Reinforcing the fundamentals
  • Manage pages and articles.
  • Categories and keywords.
  • Menus, widgets and page templates.
Gain productivity
  • Bulk actions.
  • Quick edit.
Use the Media Library
  • Inserting multiple files.
  • Editing and cropping images.
  • Images in articles and featured images.
Customize a Wordpress theme
  • Change the WordPress theme.
  • Customization via theme options.
  • Analyze the code with an inspection tool.
  • Intervene in CSS code.
  • Retrieve, modify and send files to the server.
Enrich the site with new features
  • Reminders about the usefulness and operation of plugins.
  • Improve the user interface.
  • Add social network features.
  • Manage site translation.
48
Secure and manipulate the site
  • Limit access to the site during work.
  • Move the site from one server to another.
  • Backup and restore the database .
  • Creation of an Intranet.
Administer the site together
  • Create users.
  • Manage advanced access rights.
Reference and analyze the site
  • Natural referencing and SEO.
  • Install a traffic analysis tool.
49

Culture digitale

★★★★★

  • SII-301
  • 2 Days (14 Hours)

Description

The future of business is closely linked to technology. Concepts such as digital, artificial intelligence, the Internet of Things, Big data, Blockchain are paving the way for new professional practices. After the advent of the web and social networks, all professions must now integrate these new disruptive technologies.

Who is this training for ?

For whom

Anyone wishing to update their knowledge in the digital field.

50
Prerequisites

None.

Training objectives

Decipher the digital trends that impact professions and businesses

51

Training program

Digital: a revolution in uses
  • Digital at the service of the hyperconnected consumer.
  • From
  • The customer at the heart of the digital experience.
  • Mobile: a service hub.
  • Augmented Reality and Virtual Reality: rethinking the customer journey.
  • Metaverse and digital marketing: towards a new customer experience.
The collaborative economy
  • From individual possession of objects to sharing.
  • C to C platforms.
  • The uberization of markets (Blablacar, Airbnb, drivy.. .).
  • Social commerce & social selling: new modes of consumption.
Artificial intelligence
  • Weak AI, strong AI, evolution of artificial intelligence systems.
  • Machine learning, deep learning and predictive models.
  • Bots and voice assistants: the artificial intelligence in everyday life.
  • Smart Cities & autonomous vehicles.
52
Connected objects
  • The explosion of the IoT market.
  • The 5 components of IoT.
  • Enterprise and consumer applications.
  • Security: the real Achilles heel of IoT
Le Big Data
  • Big data, storage and analysis of data in real time.
  • Structured and unstructured databases (Datawarehouse, Datalake).
  • The Smart Data strategy : Data Driven marketing.
La Blockchain
  • The Blockchain: a new decentralized economic model.
  • The 3 basic uses of the Blockchain: crypto-assets, smart contracts, traceability.
  • The revolution of NFT.
  • The issue of trust and a decentralized Web.
53

HTML5 and CSS3 - level 2

★★★★★

  • SII-312
  • 2 Days (14 Hours)

Description

Web layout has evolved towards a new standard: HTML5 from HTML and CSS3 or style sheets. Mastery of CSS is essential today to create professional websites. With the evolution of surfing devices, the practice of HTML5 (HTML) becomes essential to make your site accessible to everyone.

Who is this training for ?

For whom

Webmaster, web designer. Anyone who wants to create websites and update them with CSS.

54
Prerequisites

None

Training objectives

Master the basics of HTML5
Exploit CSS resources
Create quality web pages

55

Training program

Master the basics of HTML5 Tags, their attributes, the structure of an HTML5 page. Separate content from form: HTML5 for content and CSS3 for form. Identify a page, define a header, a title and the charset.
  • The header, footer, nav, section, aside and article tags.
  • Manage divs for formatting.
  • Center a design whatever the browser window size.
Integrate visuals, video and sound
  • Alt properties for accessibility and title for the tooltip.
  • Figure tag and figcaption.
  • Sound and video formats for the Web.
  • Integrate sound with the audio tag and integrate video with the video tag.
Manage CSS3 custom classes, pseudo-classes, tags and ids.
  • Position CSS: in a tag, in a page, in an external file.
  • Inline tags and block tags.
  • Basic fonts, styles, colors , enrichments, new font management with
  • font-face.
  • Floating elements with the float tag.
  • Image management: size, position, opacity.
Animate your site
  • Integrate dynamic effects.
  • with elements from the jQuery Javascript library: a slideshow and a drop-down menu.
  • Test your site in browsers.
56
Use responsive design
  • Structure a document so that its design adapts to the support (smartphone, tablet, laptop, etc.) using a ready-to-use responsive CSS framework.
  • Personalize the elements design by intervening in the CSS.
  • Use media queries depending on the detected device.
57

Blockchain fundamentals

★★★★★

  • SII-311
  • 1 Days (7 Hours)

Description

First known through the success of bitcoin and cryptocurrencies, blockchain is also establishing itself in all sectors of the economy as a reliable and decisive tool in terms of transactions and traceability. This internship will allow you to define the benefits and opportunities of blockchain for your business.

Who is this training for ?

For whom

Business unit manager, sales or marketing manager, financial manager. Anyone in charge of the digital transformation of the company.

58
Prerequisites

None.

Training objectives

Identify the issues, impacts and opportunities of Blockchain

59

Training program

Before the face-to-face
  • A self-diagnosis.
Identify strategic impacts
  • Definition and positioning of blockchain.
  • Understand the methodological approach.
  • The sectors concerned.
  • Legal aspects.
Define potential features
  • The 'SmartContract' self-executing programs and 'decentralized self-management' systems.
  • The properties: disintermediation, security, proof,...
Recognize architectures and tools
  • Blockchain and DLT: Distributed Ledgers Technology.
  • The principle of the tamper-proof 'ledger' controlled by contributors.
  • Operational tools and actors: Ethereum-Hyperledger- Bletchley-Spuro.
Identify applications and uses
  • Traceability and exchange of documents, certificates, contracts.
  • Examples and illustrations of blockchain (insurance, health, administration, etc.).
  • Assets digital (Token) and cryptocurrencies (Bitcoin, Ether, Litecoin, etc.).
Market Outlook and Operators
  • Blockchain and its players: prospective.
  • The 'business models' of companies using Blockchain.
60
Digital assets
  • The place and uses of Tokens and TEGs
  • The impacts of Cryptocurrencies: Bitcoin, Ether, Ripple, Litecoin, EOS, Stellar etc.
  • Wallet profiles: online, mobile, computer, physical, operational players.
  • Positioning of
  • Analysis of
61

The fundamentals of big data

★★★★★

  • SII-306
  • 2 Days (14 Hours)

Description

Big data is essential for managing a growing mass of data, from diverse backgrounds, unstructured and changing every second. Big data is no longer an option for web marketing and digital communication, it is one of the components of customer knowledge, monitoring of one's e-reputation and monitoring of actions.

Who is this training for ?

For whom

Marketing and digital communications manager, digital manager. Sales and Customer Relations Director.

62
Prerequisites

None.

Training objectives

Identify the issues and key principles of Big data.
Better contribute to Big data projects.

63

Training program

Before the face-to-face
  • A self-diagnosis.
Understanding Big Data
  • Principles and issues of Big data.
  • The 5 Vs of Big data: volume, velocity, variety, veracity, value.
  • Examples of applications for 'business.
Moving from customer data to Big data
  • The customer database: typology and models.
  • Big data: the advent of unstructured data.
  • From analysis to reporting 'predictive analysis.
  • Optimization of customer knowledge and data flows.
Become familiar with Big Data applications
  • Digital communication: monitor and analyze online conversations; manage e-reputation; build and develop the company's notoriety and visibility.
  • Digital marketing: optimize performance sites; personalize the relationship.
  • Commercial: adapt and personalize the offer; propose instant commercial actions and adapt quickly.
Contribute to Big Data projects
  • Expressions and collection of needs.
  • Internal and external expertise.
  • Identify software architectures (Hadoop, NoSQL, Storm, etc.).
  • Identify methodological approaches and team building.
After face-to-face - Implementation in a work situation
  • A strengthening program: "One challenge per week for 7 weeks".
64

Optimize natural referencing (SEO)

★★★★★

  • SII-421
  • 2 Days (14 Hours)

Description

To be visible on the web, it is essential to be well positioned in search engine results, and natural referencing (SEO) can propel a site to the first pages of Google. This training uses real-world examples and explains the results to provide an in-depth understanding of advanced SEO techniques. It constitutes an excellent complement to the training “Effectively manage your SEO strategy” (Ref. 6957) for those who wish to master the workings of SEO.

Who is this training for ?

For whom

Communications manager

Responsible for the content of a site

editorial webmaster

Web Editor

Web project manager.

65
Prerequisites

None.

Training objectives

Define the search engine sorting criteria.
Define your natural referencing strategy.
Acquire the techniques to improve visibility and referencing on the Web.
Acquire the basics of referencing to supervise a developer/integrator.
Master the advanced natural referencing techniques.
Integrate natural referencing into a website redesign project.

66

Training program

The relevance criteria of natural referencing
  • How search engines work: from indexing to positioning.
  • The relevance criteria of natural referencing: technical, editorial, popularity and ergonomics.
  • Know the blocking factors and the enabling factors.
  • Understand the principle of popularity and Social Media Optimization (SMO).
  • Google updates: Panda, Penguin, Hummingbird and Phantom .
Define your natural referencing strategy The long tail strategy.
  • The themes to focus on.
  • Take advantage of keyword generators to identify them.
  • Use universal search.
  • Analyze competitors' strategy.
  • Performance indicators (KPI).
Master advanced techniques
  • Essential tools and plugins.
  • Detect and manage cases of content duplication.
  • Intervene on the CMS to make it SEO-friendly.
  • Optimize meta tags and URLs.
  • Configure XML site maps.
  • Develop the popularity of your site.
  • Implement an SMO (Social Media Optimization) strategy.
67
Optimize mobile SEO Define your mobile strategy: responsive site, mobile site, apps...
  • Mobile specificities and constraints.
  • Learn how to write content for mobile SEO.
Integrate natural referencing into the redesign of a site
  • Create monitoring dashboards.
  • Analyze performance and KPI's.
  • Use the information provided by Google Webmaster Tool.
  • Take corrective action.
68

Veeam Certified Engineer (VMCE) - PREPARATION FOR VMCE V12 CERTIFICATION

★★★★★

  • SII-423
  • 3 Days (18 Hours)

Description

This intensive technical training, combining theory and hands-on practice, will provide you with an in-depth understanding of Veeam solutions in the following areas: features, deployment, configuration, backup job creation, replication, SureBackup, SureReplica, as well as virtual machine and object restoration.
Obtaining this certification is an excellent investment for any IT professional looking to improve productivity, optimize operational costs, advance their career, and enhance credibility with employers and clients.

Who is this training for ?

For whom
  • System engineers.
  • Backup administrators.
  • Pre-sales and post-sales teams.
  • IT architects.
  • IT solution integrators.
69
Prerequisites

None

Training objectives

  • Identify and resolve issues more effectively
  • Gain distinction from your peers
  • Get more features from Veeam solutions

70

Training program

Introduction
Overview of the Veeam product portfolio
  • Veeam Products
  • Veeam Availability Suite
  • Key Concepts
Veeam ONE Features and Features
  • Automatic detection of backups and virtual infrastructure
  • Functional categorization
  • Pre-defined alerts
  • Monitoring without administrator supervision
  • Reporting and dashboards
  • Agentless data collection
  • Hyper-V specific features
  • Veeam ONE deployment
  • Veeam ONE Assessment Tool
Deployment
  • The main components and how they interact
  • Optional components
  • Deployment scenarios
  • Prerequisites
  • Upgrading of Veeam Backup & Replication
71
Initial setting
  • Add servers
  • Add a VMware backup proxy
  • Add an off-host backup proxy for Hyper-V
  • Adding backup targets
  • Configuration backup and restore
  • Network traffic management
  • Global notification settings
  • Socket in hand of the user interface
Protection
  • Creating backup jobs
  • Creating restore points with VeeamZIP and Quick Backup
  • Backup copy
  • Replication
  • Creating VM and file copy tasks
Verification
  • Verifying restores by SureBackup
  • SureReplica
72
Recovery of entire VMs
  • Restoring Data
  • Veeam Backup & Replication Utilities
  • Recovering from Replicas Overview
Restoration of objects
  • Object level recovery
  • Restoring guest OS files
Advanced data protection
  • Tape devices
  • SAN storage systems
  • Storage systems with deduplication
  • Veeam Cloud Connect
  • Veeam Backup Enterprise Manager
  • Support for vCloud Director
Editions
  • Edition comparison
  • Full and free mode features
Troubleshooting
  • Problem Identification
  • Review and Analysis
  • Find More Information
  • Veeam Support
73

Manage, develop digital culture

★★★★★

  • SII-429
  • 2 Days (14 Hours)

Description

Digital is essential. Not everyone reacts the same way to associated tools. Some people have difficulty using them. To encourage the use of different tools, it is necessary to support the teams. Employees must find meaning and engage in a movement of sharing and cooperation. The role of the manager takes on all its importance in developing the digital culture of an organization. The objective of this training is to offer a wide range of tools for success.

Who is this training for ?

For whom
  • Any hierarchical and transversal manager.
  • Project manager in the digital field.
74
Prerequisites
  • No prior knowledge required.

Training objectives

  • Identify the difficulties encountered by employees in the face of digital
  • Remove the difficulties associated with the use of digital
  • Show the contributions of digital to gain efficiency and working comfort
  • Anticipate the possible pitfalls of digital to put risks into perspective

75

Training program

Identify digital tools and their added value
  • The different media.
  • Social networks, wikis, forums, blogs...
  • Their added value, their uses, their image.
Support employees in digital transformation Define the course of the change appropriation process.
  • Take into account resistance to change.
  • Decide on the actions to take.
  • Identify new roles in a digital context: administrator, community manager, members.
Identify stakeholders’ reluctance to use digital tools
  • The actors themselves: knowledge and appropriation of the tools; what will be seen and shared.
  • Managers: their role in a digital context; individual influence in social networks and professionals.
Distinguish between what can be digitalized and what cannot be
  • Mistakes to avoid.
  • The distinction between professional and personal scope.
  • The question of access given to customers and partners.
Charter, training... create the tools to guarantee the appropriation of digital tools by employees Establish an internal charter for the use of digital tools.
  • Train people to use the tools.
  • Rethink the organization to adapt to these new ways of working.
Deploy tools to encourage sharing Use examples of success to successfully implement digital technology in your organization. Remote activity
  • To share feedback at the end of your training: a video.
76

Business Developer "Build and implement a development strategy"

★★★★★

  • SII-368
  • 8 Days (56 Hours)

Description

This complete training cycle for the profession of Business Developer will provide you with the tools and methods to work on two dimensions: the expansion of the company's strategic targets and the application of analysis in commercial action.

Who is this training for ?

For whom

Business Developer, Biz Dev, Sales Engineer, Sales Development Manager.

77
Prerequisites

Have significant commercial experience or master fundamental techniques.

Training objectives

Understand the strategic dimension of Business Development.
Analyze the company's capabilities.
Qualify development opportunities.
Organize development priorities.
Design and deploy the development plan.
Measure performance.
Operationalize his plan on the ground.

78

Training program

PART 1: Building your strategy
  • 1 - Define the added value of the Business Developer
  • The job of Business Developer.
  • The 3 key skills of the job: Analyze, Plan, Realize.
  • 2 - Be market oriented: market monitoring
  • Formalize your monitoring system
  • Internal monitoring, competitive monitoring.
  • Dedicated digital tools on the alert.
  • 3 - Establish the conditions for innovation
  • Take ownership of the 4 key principles of innovation.
  • The contribution of the Business Developer.
  • 4 - Analyze the company's environment and prepare the decision
  • Take stock of the market.
  • Analyze the portfolio of activities of the company.
  • Analyze its competitive positioning.
  • Formalize its value proposition by integrating CSR.
  • 5 - Decide on couples products/market.
  • The ANSOFF model.
  • Development through resources.
  • The synthesis matrix: SWOT
  • The transition to action.
79
PART 2: From strategy to development plan
  • 1 - Plan actions
  • Structure your Business Plan.
  • Use the Business Model Canvas.
  • Develop your activity forecasts.
  • Identify risks.
  • Develop concrete action plans.
  • 2 - Sell the development plan internally
  • The good substantive practices.
  • Good formal practices.
  • Adapt your presentation strategy to your interlocutors.
  • 3 - The transversal Business Developer manager
  • Identify all services contributing to the development plan.
  • Map the actors and understand their objectives, resources and constraints: the resource matrix.
  • Identify the issues and the keys to cross-functional management.
  • Mobilize energies around common objectives.
  • Overcome possible resistance.
  • 4 - Cultivate your network and develop partnerships
  • Partnerships, characteristics and key success factors.
  • Use the power of social networks.
  • Improve your profile on LinkedIn.
80
PART 3: Deploy the development plan and manage the results
  • 1 - The relational strategy of the Business Developer
  • Entering the buyer's bubble: new requirements for the purchasing function - CSR, security.
  • S' adapt to a complex decision-making group: the GRID.
  • Adapt your commercial communication to any type of interlocutor: the commercial CHALLENGE.
  • 2 - Negotiate profitable contributions
  • Evaluate and reestablish the balance of power.
  • Prepare your objectives and negotiation tactics.
  • Develop your argument.
  • Conduct your negotiations while respecting the 6 keys to effective negotiation.
  • 3 - Manage the deployment of actions
  • Identify the indicators to follow and activity ratios.
  • Organize the management action around the dashboard.
  • Communicate around the dashboard and share information to progress.
  • 4 - Ensure customer loyalty
  • Understand the challenge of providing a differentiating customer experience.
  • Analyze the customer journey.
  • Carry out and carry out actions likely to promote enthusiasm and loyalty among customers.
  • Ensure customer loyalty.
  • 5 - Make yourself known with the Pitch
81

Key Account Manager: sustainably develop your strategic accounts

★★★★★

  • SII-12
  • 2 Days (14 Hours)

Description

Because they represent significant development potential, many companies are turning to major and strategic accounts. However, if all the rules concerning sales apply, they are not sufficient. To succeed with major accounts, you must also integrate their specificities. This training in sales to major accounts and strategic accounts provides you with the essential keys to success with major accounts: desire to provide value, lobbying within the account, teamwork to develop the client in the medium term.

Who is this training for ?

For whom
Key Account Manager. Key Account Director or International Key Account Director. Key account manager, sales engineer. Head of sales, sales manager.
82
Prerequisites

None

Training objectives

Build your strategy for your strategic clients: the Account Business Plan.
Expand your influence within the account.
Balance your energy between the 4 strategic missions of KAM.

83

Training program

332Adopting the right balance in one’s responsibilities
  • days in classroom training Diagnose your organization and its missions.
  • Adapt your daily action to your sector.
Manage your market data Evaluate the performance of your strategic accounts.
  • Analyze each client in their global environment.
  • Establish the dual SWOT diagnosis.
Build your
  • Account Business Plan Define an ambition for the account.
  • Formalize your strategy.
  • Decide on your action plan.
  • Evaluate and manage risks.
Manage relationships within the account
  • Identify and engage 'key' players.
  • Analyze the effectiveness of relationships to readjust the strategy.
  • Optimize relationships within the account.
84
Manage the implementation of
  • Business Plan Organize the implementation and mobilize the team.
  • Manage the progress of the action plan.
  • Develop cooperation and avoid conflicts .
  • 0' e-learning modules Manage your action plans as a team Understand your role as pilot of the implementation of the action plan.
  • Organize its implementation work and mobilize the team.
  • Develop cooperation between team members.
  • Manage people effectively in the long term.
  • Raise the major obstacles to your effectiveness KAM, between action and analysis.
  • KAM, team man or solitary.
  • Being KAM: going beyond the frame of reference.
  • Being KAM: knowing how to anticipate.
  • Being KAM: making people want to.
85

Manage and lead a high-performance distribution network

★★★★★

  • SII-423
  • 2 Days (14 Hours)

Description

Led by distribution experts, this training course offers a strategic approach and concrete tools to manage and animate your network, thus increasing its added value.Learn how to motivate distributors, develop sales, negotiate, communicate and train the network - key skills for growth and profitability.

Who is this training for ?

For whom

All network managers and coordinators (integrated, franchised, volunteer).
Sales managers and sales directors.

86
Prerequisites

None

Training objectives

  • Evaluate distribution network performance
  • Develop and deploy sales strategy to expand network
  • Manage and stimulate the network on a daily basis

87

Training program

Master the key strategies for successful collaboration between manufacturers and distributors
Involve your distributor in the Sales Action Plan
Improve distributor sales efficiency
Boost your distribution network every day
88

Photoshop - Level 1

★★★★★

  • SII-14
  • 3 Days (21 Hours)

Description

This Photoshop training allows you to become familiar with the image editing software and learn the basic functions to improve, modify and enrich digital images. Evaluate your level of knowledge about Photoshop.

Who is this training for ?

For whom
Layout designer, graphic designer, DTP operator.
89
Prerequisites

None

Training objectives

Acquire the essential basics of Photoshop to resize, crop, retouch the colors and imperfections of your photos.
Master the main image clippings with Photoshop.
Prepare your visuals for printing or for the Web.

90

Training program

Discover Photoshop
  • The interface and tools.
  • Open, close, store pallets, store your workspaces.
Frame, adapt the size of the image with Photoshop
  • Crop, straighten, enlarge the working area.
  • Prepare an image for the Web.
Crop your images
  • Crop, add, subtract, store your floating selections.
  • The analysis radius and decontamination of the clipping color.
  • Crop images with outlines sharp for printing with a vector plot.
Repair your images Duplicate, remove imperfections with the stamp and correction tools.
  • Remove a portion of an image with missing content analysis.
  • Creating simple patterns and using the pattern stamp tool.
  • Using pro filters to soften and strengthen your images.
Correcting the chroma (the basics)
  • Understand the importance of color modes and image resolutions.
  • Correct tone, saturation, adjust image colors.
  • Use brushes color correction.
  • Replace a color, an element by color ranges
91
Use editing layers (the basics)
  • Creation, duplication, chaining of layers for photomontage.
  • Using layer masks and clipping.
  • Transparency, blending modes and effects.
  • Use layers of texts, shapes or settings.
  • Evaluation of the transfer of acquired knowledge to validate implementation in a work situation
92

Photoshop - Level 2

★★★★★

  • SII-15
  • 3 Days (21 Hours)

Description

Cut out a character while respecting the fineness of their hair, embed them in a new setting without visible connections, change the color of their clothes, create a cast shadow... an artist's work with Photoshop now possible thanks to this training! Evaluate your level of knowledge about Photoshop. Take the test to find out which course is right for you: Photoshop Test.

Who is this training for ?

For whom
Model maker and DTP operator, graphic designer, illustrator, photographer.
93
Prerequisites

None

Training objectives

Create images for the printer and for the Web.
Acquire a rational method.
Save time by using the appropriate tools.
Make credible retouching.
Acquire 'pro' tips and tricks.

94

Training program

Review Photoshop Fundamentals
  • Customize the workspace, navigate Photoshop.
  • Resolution, image resampling, and color modes.
Practice color retouching
  • Accentuate brightness, contrast and saturation.
  • Correct vibrance, tone, warm or cool an image.
  • Mix layers, choose variations of corrections.
  • Use Camera Raw.
Create your libraries
  • Create and store your vector objects.
  • Creation of personal brushes, use of the blending and realistic brush.
  • Preparation of juxtaposable patterns to correct empty areas.
Crop in Photoshop
  • Create selections, improve them, memorize them, refine them (alpha channels).
  • Select a portion of image by color range.
  • Extract from images, correction, analysis and decontamination of clipping color.
  • Cropping with vector tools.
  • Using layer or clipping masks.
Repair your images with Photoshop
  • Add, duplicate pixels with duplication and correction buffers.
  • Fill with missing content analysis and content taken into account.
95
Create nesting montages
  • Advanced use of image layers, adjustments and their associated masks.
  • Conversion of layers into dynamic objects, Illustrator object recovery.
  • Application of editable dynamic filters.
  • Using effects and objects D.
3 Automate tasks
  • Creating and using scripts and droplets.
  • Using Adobe Bridge and mini-Bridge for automation.
Prepare images for photoengraving or
96

DSI training, adaptation to new digital challenges

★★★★★

  • SII-16
  • 2 Days (14 Hours)

Description

Public and private companies are changing with the massive arrival of digital technology both in their internal operations and in their marketing and commercial activities. This seminar aims to help players in the traditional IT department to evolve towards the Digital Department in order to sustain the operation of traditional services, while imagining and developing new solutions with high added value for the business.

Who is this training for ?

For whom
Business manager, financial director, CIO, IT manager, business manager, AMOA, AMOE, auditor, consultant.
97
Prerequisites

None

Training objectives

Understand the impacts of digital technology on business activity Review the positioning of the IT department in the company Knowing how to face new digital challenges Identify ways to accelerate business transformation Identify ways to accelerate IT culture transformation

98

Training program

Introduction
  • The need for a two-speed IT department.
  • The lessons of e-Business departments created on the fringes of traditional IT departments.
  • Challenge no. 1: ensuring operation by professionalizing and optimizing practices.
  • Challenge no. 2: quickly develop new business solutions.
  • New relationships with the professions.
  • Reflection collective.
  • Reflection on the need to better manage the relationship with the profession.
The challenges of the digital economy
  • The IT and telecoms economy: the
  • The digital economy: the
  • The new models of intermediation.
  • The new challenges of information.
99
New digital business organization models
  • Why are traditional business boundaries being challenged?.
  • Why are digital models far superior and making traditional structures and approaches obsolete?.
  • Why today's competitors are not necessarily tomorrow's competitors?
  • The case of the bookseller or retailer:
  • The Benetton case: changing the sector's Business Model by optimizing processes and rethinking its value chain.
  • The Procter & Gamble case: using collective intelligence ("Crowd Sourcing").
  • Internet sales: profound change in the market, supporting figures.
  • The change in logic explained by Chris Anderson's
  • The results of the MIT survey.
  • The Berger, McKinsey and Lemoine reports on the digital economy.
  • The characteristics of the digital enterprise.
  • What positioning for the DSI? Should it still be called DSI?.
  • Demonstration:rnDemonstration of concrete cases of emerging organizational models in the digital enterprise.*
100
The importance of the IT department in the digital business
  • The digital IT department: from team management to coordination of service providers.
  • New profiles and skills.
  • New relationships with the professions: appearance of the Business Relationship Manager.
  • Relations with the Sales and Marketing Department.
  • Relationships with the Communications Department.
  • The new performance indicators of the DSI.
  • The new positioning of the DSI vis-à-vis General Management.
  • The “Lean DSI”: new culture, new processes, new tools.
  • Collective reflection: Collective reflection on the importance of the IT department and the evolution of an organization towards digital.
The bi-modal DSI
  • The need for a two-speed IT department.
  • The lessons of e-Business departments created on the fringes of traditional IT departments.
  • Challenge no. 1: ensuring operation by professionalizing and optimizing practices.
  • Challenge no. 2: quickly develop new business solutions.
  • New relationships with the professions.
101
From idea to product to market
  • How to realize requests addressed to the IT department more quickly?
  • Introduce agile methods and creativity into teams.
  • How to practice co-construction with customers?.
  • Integrate new uses.
  • Mobility "first" or not?.
  • Quality or responsiveness: how to choose?.
  • The advantages of the MVP (“Minimum Viable Product”) for testing the market.
  • The usefulness of a POC (“Proof Of Concept”).
  • “Launch and Iterate”: quickly launch services and evolve them over time.
  • DevOps: the new paradigm for deploying applications.
  • Collective thinking: Reflection on how to quickly and qualitatively implement requests addressed to the IT department.
The voice of the customer
  • Integrate internal or external customers into the development cycle.
  • Set up satisfaction surveys.
  • Set up focus groups.
  • Organize customer feedback loops to develop applications.
  • Collective reflection: Reflection on how to give voice to customers.
102
L'Open Innovation
  • The challenges and pitfalls of Open Innovation.
  • Support structures for innovation in France.
  • Partnership models in the field of collaborative innovation.
  • An innovation monitoring approach and tools.
  • Collective reflection: Reflection on the implementation of an innovation monitoring approach and tools. innovation watch.
The Digital IT Department Ecosystem
  • Understand digital value chains.
  • Map your digital ecosystem (suppliers, customers, competitors, allies, etc.).
  • Identify the right partners on the market.
  • Create alliances with high added value for the IT department (products, services, culture, skills, etc.).
  • Find alternative financing.
  • Demonstration: Demonstration of a method for mapping your digital ecosystem.
103
From idea to product to market
  • How to realize requests addressed to the IT department more quickly?
  • Introduce agile methods and creativity into teams.
  • How to practice co-construction with customers?.
  • Integrate new uses.
  • Mobility "first" or not?.
  • Quality or responsiveness: how to choose?.
  • The advantages of the MVP (“Minimum Viable Product”) for testing the market.
  • The usefulness of a POC (“Proof Of Concept”).
  • “Launch and Iterate”: quickly launch services and evolve them over time.
  • DevOps: the new paradigm for deploying applications.
  • Collective thinking: Reflection on how to quickly and qualitatively implement requests addressed to the IT department.
104

DSI: anticipate and manage a crisis

★★★★★

  • SII-350
  • 2 Days (14 Hours)

Description

This seminar offers a clear summary of the main elements for managing a crisis in an IS management context. You will learn to identify possible crises and organize their management before they occur, and to structure a crisis plan to deal with them.

Who is this training for ?

For whom

Manager, information systems director, IS manager, engineer, project manager and anyone else having to deal with crisis situations.

105
Prerequisites

None

Training objectives

Understand the different types of crises in an IS context
Define the key elements and different scenarios for managing an IT crisis
Structure a crisis plan
Manage the different stages of a crisis
Develop a continuity plan IT

106

Training program

Introduction
  • What is a crisis?
  • Exceptional events due to their magnitude.
  • Exceeding the psychological threshold.
  • Immediate inability to restore the situation.
  • Change, a vector of crises.
  • The ability to react.
  • Typology of computer crises.
  • First mistakes to avoid for the IT department.
107
Crisis potentials and scenarios
  • Crises only happen to other people! Anticipate and prepare.
  • Evaluate the potential for a crisis.
  • Identify all the stakeholders .
  • Goals of the crisis management organization.
  • Use crisis scenarios.
  • Prepare for danger.
  • Reduce the severity of the event when and if it occurs.
  • Study and pre-deploy protective measures in advance.
  • Limit impacts and collateral damage.
  • Formalize trigger levels.
Stages of crisis management
  • Invariable steps.
  • Diagnosis, action and decision.
  • Quickly perceive the seriousness of the situation.
  • Induced priorities and most important decisions adapted.
  • Entry into crisis.
  • Establishment of the crisis unit.
  • Functions to be assumed.
108
Crisis unit
  • Build the crisis unit.
  • Entry into crisis: detection, first actions.
  • Establishment of the crisis unit.
  • Communication.
  • Alert and inform staff, partners, the media.
  • Case studyr nCrisis simulation.
Risk management
  • Crisis and risk detection.
  • Analyze, evaluate and prioritize risks.
  • Risk management: phases of risk management, legal obligations.
  • References and methods (brief introduction).
  • Organization of the 'risk management' function.
109
IT continuity plan
  • Issues and priorities.
  • Recovery options.
  • Input information.
  • Life processes and SLR.
  • Knowledge of the IS (CMDB).
  • Recovery time and recovery point objectives.
  • Diagnosis of the situation.
  • Steps of implementation setting up a BCP.
  • Importance of tests and maturity level.
  • Write the BCP document.
  • Some rules for building an effective BCP.
  • Roles and responsibilities of the teams.
  • Recommendations and keys to the success of an ICP.
110

Master IT and freedoms/GDPR compliance

★★★★★

  • SII-17
  • 2 Days (14 Hours)

Description

With extensive powers in terms of on-site inspections and sanctions, the CNIL increases the number of inspections in companies each year. Each company must now have an effective IT and freedoms compliance culture deployed in a concrete manner. The advent of CNIL labels, mandatory DPO, and the impact of the new European regulation reinforce compliance and performance obligations.

Who is this training for ?

For whom
lawyers and legal managers DPO DSI and CISO Compliance managers and risk managers
111
Prerequisites

Being confronted in your practice with the problems posed by personal data

Training objectives

Identify and bring into compliance processing and files containing personal data
Decipher the concrete doctrine of the CNIL and anticipate the risks of sanctions
Effectively set up an internal or external DPO

112

Training program

Decipher the essential concepts and their application by the CNIL
  • Carry out the correct interpretations of the law and implementing texts, and interpret the CNIL's recommendations
  • Measure the impact of changes to the CNIL's approach, take into account takes into account the reports of the Article 29 Group and the prospects of the new European regulations
Managing the risks linked to CNIL formalities: the register of processing activities
  • Take stock of the old “Exemptions, declarations, authorizations”
  • Compliance documentation: how far to go to certify conformity in the light of the new European regulations and quality labels the CNIL
  • Complete the register of processing activities
Identify the new compliance obligation or “Accountability”
  • Define this new obligation
  • Identify the deliverables to meet this obligation
Identify the new obligation to notify security breaches (security by design)
  • Define when and how to implement it
  • Know who to inform and why
  • Delimit the obligation of security and confidentiality with regard to the new CNIL standards and security breaches, what risks in the absence of notification
Design compliant information systems and processing (privacy by design)
  • Identify the criteria for lawful collection and processing of data
  • Respect the rights of individuals and respond effectively to complaints
  • Measure the strengthening of the liability of subcontractors and co-contracting
Implement compliance actions linked to the reality of risks
Have IT and freedoms audit methods in line with the new CNIL label
  • Case study: inventory and audit using a project approach of known or hidden treatments
Understand the solutions for legal processing outside the EU depending on the situations encountered
  • Sharing experiences: exchange on different contractual clauses, types of BCR, Safe Harbor
Deciphering the legal and technical investigative powers of the CNIL and the escalation of sanctions
  • Case study: review of a concrete sanction file processed by the CNIL
113
Appoint a DPO
  • Carry out a ratio of advantages/disadvantages before designation
  • Identify and anticipate the scope of intervention of the DPO, its status and its missions
  • Anticipate the key points of a credible action plan
114

IS master plan, approach and key elements

★★★★★

  • SII-327
  • 2 Days (14 Hours)

Description

This seminar will show you how to implement planning tools that address your issues. You will be able to take stock of your past actions, identify new projects and best prepare for the future of the IT department using master plans, IT plans and “Road Maps”.

Who is this training for ?

For whom

Information systems directors, IT directors, organization managers, general management, IT project managers, user services managers.

115
Prerequisites

None

Training objectives

Understand the key principles of IT governance
Analyze current planning and management practices for IT governance
Develop and validate a master plan
Implement an action, management and monitoring plan a master plan

116

Training program

Information system and business
  • The evolution of IT concerns.
  • The current pressures of the ecosystem on the company.
  • Projecting into the future.
  • Can we predict and to what extent?
  • The maturity of businesses.
Planning and governance
  • What does the company expect from an IT master plan?
  • Strategic alignment, first pillar of IT governance.
  • Value creation .
  • The implementation of a strategic alignment approach.
  • From the notion of functionality to that of service.
  • The role of universities and consulting firms.
Methods for developing a master plan
  • The emergence of concepts and methods.
  • Different possible technical approaches.
  • Strategic planning of the information system.
  • Reengineering .
  • The IS as an asset.
  • A new paradigm: the master plan vector of company performance.
117
Current practices
  • A new framework.
  • The development of the master plan.
  • Monitoring: the strategic dashboard.
  • Master plan and enterprise architecture.
  • How to map the enterprise?
118
Development of the master plan: from initialization to orientations
  • Understand an approach and build a master plan that will best suit your organization.
  • Phase 0: initialize the project.
  • Establish a charter.
  • Designing a master plan is a project in itself.
  • Phase 1: evaluate the existing.
  • Determine the maturity level of your organization.
  • Carry out an audit.
  • Possibilities regarding the use of COBIT.
  • Human capital.
  • Phase 2: establish a vision of future of the company and its IS.
  • The evolution of the ecosystem.
  • Strategic approach.
  • Phase 3: determine directions and validate.
  • The role of the management committee.
119
The action plan and management
  • Phase 4: establish an action plan.
  • Evolution of the architecture.
  • Management of the portfolio of projects, services and risks.
  • Change management.
  • Management.
  • The link with corporate governance.
  • The use of the Balanced ScoreCard.
120

IS dashboards, managing performance

★★★★★

  • SII-348
  • 2 Days (14 Hours)

Description

This course will show you the benefits of dashboards for managing the performance of your information systems. You will learn to choose the relevant indicators according to your needs and objectives in order to measure the quality of user services, maintenance, operation and studies.

Who is this training for ?

For whom

Information systems directors, any other IS manager, engineers, project managers and any other actor concerned with managing IS performance.

121
Prerequisites

None

Training objectives

Characterize the stakeholders of the system, their objectives, their points of view, their views and their indicators
Analyze frequently encountered problems
Describe the system to be managed in an operational modeling

122

Training program

Introduction
  • The role of the dashboard.
  • Formalization of objectives.
  • Define the indicators.
  • Integrate the components of performance.
  • Relevance of IS indicators.
  • Use dashboards.
The user services dashboard
  • IT approach versus information system.
  • Study of user productivity.
  • Hidden costs.
  • Analysis of frequently encountered problems .
  • User satisfaction.
  • Link between service level and budget.
  • Main dashboard indicators.
  • Practical work Collection of information.
  • User service-oriented dashboards.
123
The maintenance dashboard
  • Project management and application maintenance.
  • The traditional maintenance curve according to the application lifecycle.
  • When to replace its applications?
  • Evaluate the quality of maintenance.
  • Non-investment in the devaluation of IT assets and the increase in maintenance costs.
  • Key indicators of the maintenance dashboard.
  • Exercise: Monitoring the application lifecycle.
  • Measuring maintenance quality.
The operations dashboard
  • Manage operations effectively.
  • Case of availability: technical vision versus user vision versus business vision.
  • Monitor developments.
  • Dashboard of a traditional data center.
  • IT resource usage statistics.
  • Main indicators of the dashboard.
  • Practical work : Different avenues for managing operating performance.
124
The IT studies dashboard
  • The trilogy: compliance with specifications, deadlines and budgets.
  • How to assess the quality of studies?
  • Case of project quality: errors versus defects.
  • The impact of human resources on the success of projects.
  • The degree of satisfaction of IT teams.
  • The main reasons for 'failure.
  • Limitation of the project management - project management approach.
  • Study management model integrating value and future operating costs.
  • Exercise: Study of dashboards in groups.
  • Reflection on the main indicators.
125

The digital business: developing a strategy for performance

★★★★★

  • SII-349
  • 2 Days (14 Hours)

Description

Business leaders, CIOs, must be able to fully participate in the development of a strategy for the digital transition of their organization. This seminar, rich in examples and real cases, aims to decipher the characteristics of the company of the future and to highlight the opportunities offered by new technologies as well as the profound transformations they induce.

Who is this training for ?

For whom

Business manager, financial director, business manager, project management manager, management control, IT department, IT manager, consultant, auditor, IT specialist.

126
Prerequisites

None

Training objectives

Identify the different components of a digital business Raise awareness among decision-makers of the importance of digital in the business Define digital opportunities for the business Integrate digital opportunities into innovation processes Understand and apply the models of digital business management

127

Training program

The digital economy: demonstration by the figures
  • The evolution of our economies over time.
  • A reality that is often ignored.
  • How is value created?
  • Why are developing countries already creating more value than developed countries?
  • Traditional businesses being challenged at a pace never seen before.
  • Examples of successful countries : China, Korea, Singapore, Estonia... everything except the result of chance.
  • Why are our countries down?
  • Place of the IT and telecommunications sector .
  • Why is value mainly visible in the IT and telecoms industry?.
  • Why have public and private organizations not yet been able to fully take advantage of digital opportunities?
128
The fundamentals of business performance and competitiveness
  • Basics of today's business.
  • Difference between productivity, performance, competitiveness and innovation.
  • Analysis methods and tools that it must know.
  • The importance of the value chain by Michael Porter.
  • Business analysis models: BCG, McKinsey...
  • Cost strategy versus differentiation.
  • Structuring choices: productivity, customer intimacy or innovation.
  • How can management by budgets prove dangerous for the organization?.
  • What are the real good indicators of performance?
The role of IT in the successful business
  • Examples of companies that have created a competitive advantage through their IT.
  • Level of computerization of companies according to Porter's value chain model.
  • Positioning integrated approaches, such as ERP, CRM, STP, etc.
  • How to quickly assess the positioning of your IT department within your company?
  • Corporate performance is directly correlated with IT governance.
  • How to assess your current level of governance
129
The digital strategy
  • Method: strategic IS master plan or master plan for the company or digital administration.
  • Importance of awareness and involvement of general management, business lines and the IT department.
  • Imperative need to think and open up your IS to the entire ecosystem.
  • Approach of Alexander Osterwalder and Yves Pigneur, the 'business new generation model'.
  • Digital Business Process Reengineering type approaches.
  • Best methods such as BPM/BPR, Lean Six Sigma, Difotai, etc.
  • Best practices for urbanizing an IS.
  • Frameworks: Zachman, TAFIM, FEAF... why?
  • Assets of TOGAF, Archimate.
130
The components of the digital business
  • The Cloud: a technical, managerial and strategic challenge.
  • IaaS, PaaS and SaaS solutions.
  • WOA: Mashups.
  • Big Data: a rich and complex environment at the same time.
  • Blogs, Wikis, Twitter: how to take advantage of social networks?
  • Moocs, Coocs , etc.
  • : the learning organization.
  • The "Applications Store": how to control them?
  • Web 2: business contributions for digital businesses.
  • HTML 5: possible response to the fragmentation of the Web.
  • Writing in the digital age...
  • Objects connected: why are they revolutionizing so much?
  • 3D printing.
  • Emerging technologies (AI, Robots, etc.).
131
New digital uses
  • Change management: the notions of 'Digital Immigrants' and 'Digital Natives'.
  • Integrate the concepts of SOLOMO: Social, Local, Mobile.
  • ATAWADAC : Culture and Potential Solution.
  • BYOD: ownership of tools changes hands.
  • Do It Yourself.
  • Crowdsourcing.
New digital business organization models
  • Why are traditional business boundaries being challenged?.
  • Why are digital models performing better and making traditional structures and approaches obsolete?.
  • The case of the bookseller or retailer: 'Click' version versus 'Mortar' version.
  • The case of Benetton: changing the sector's Business Model by optimizing processes.
  • The case of Benetton: changing the sector's Business Model by optimizing processes.
  • The case of Procter & Gamble: using collective intelligence ('Crowdsourcing').
  • Internet sales: profound change in the market.
  • The change in logic explained by Chris Anderson's 'Long Tail'.
  • What positioning for the DSI Should it still be called DSI?
132
New digital business management models
  • Can a company without a manager exist? Yes, if we are to believe the unique example of Global Star.
  • Role of the manager: network manager or spider.
  • The 'dual' company: classic and agile at the same time.
  • The 'start-up' philosophy.
  • The biggest risk: homeostasis or resistance to change.
  • What role for the CIO will it still exist and, if so, in what form?
133

Set up a digital project for the public service

★★★★★

  • SII-320
  • 2 Days (14 Hours)

Description

This seminar aims to decipher the challenges of digital transformation to support the evolution of an administration with an agile, efficient organization, a source of cost control and simplification of services. It will provide an overview of digital initiatives at state level in conjunction with communities and in particular the dematerialization and multichannel strategy. It will show you how to carry out such a project taking into account the constraints specific to public administration (legal, organizational, etc.).

Who is this training for ?

For whom

IT managers, consultants (SSII), project managers and all people required to participate in a digital transformation project in public administration.

134
Prerequisites

None

Training objectives

Consider the challenges of digital transformation in public administration
Evaluate the opportunities offered by digital transformation
Develop a digital strategy in a public administration
Lead a digital transformation project in an administration
Understand the main concepts of a Smart City

135

Training program

Identify the challenges of digital transformation in administration
  • Why transform the administration?.
  • How to put the information system at the service of public policies?.
  • Know how to anticipate the evolution of technologies and uses (Web, mobility, multichannel, dematerialization, etc.).
  • Control public spending.
  • How to simplify procedures for those administered?
  • Increase the performance of the administration.
  • Case study Analysis of different projects carried out by other administrations (France and Europe).
136
Identify the challenges to be faced
  • Organizational challenges.
  • Complex governance at the State IS level (SGMAP, DSIC, ministerial IS, State operator IS, etc.).
  • Non-existent governance at the level of community information systems, each community develops an independent approach.
  • Technical challenges.
  • Siloed information system.
  • Lack of support for standards by often proprietary publishers.
  • Non-urbanized information system.
  • Rapid evolution of standards and technologies.
  • Challenges legal.
  • The challenges linked to the public procurement code.
  • Exchanges.
  • Analysis of the main challenges linked to the public sector.
137
Develop a digital strategy in an administration
  • Moving from a silo strategy and governance to a transversal strategy and governance.
  • Towards a unification of business portals.
  • Portal " My public service".
  • Unified web and mobile portal.
  • Identity federation.
  • Sharing infrastructures.
  • Towards a interoperability.
  • Interoperability within the administration: urbanization of the information system.
  • Interoperability between administrations.
  • General interoperability reference framework.
  • Federation of identities.
  • France Connect.
  • Platform state and digital identity.
  • DMD.
  • The relationship with communities (SSO, Online Service, Comedec, Helios...).
  • Business interoperability platform (Helios, Comedec...).
  • Exchanges on projects managed at state level: the creation of DISIC or SGMAP.
  • Exchanges on the multi-channel city of Vincennes project.
138
Develop a dematerialization strategy in a public environment
  • Issues and approach to dematerialization in the public sector.
  • Evaluate the impacts on human resources in the public sector.
  • Legal framework in a public environment.
  • Signature/electronic initialer.
  • Panorama of technical dematerialization solutions.
  • Case study.
  • Dematerialization of a contract crèche signed online by the citizen.
  • Dematerialization of PES V2 invoices.
Develop a multichannel strategy in an administration
  • Overall presentation of multichannel.
  • The new challenges of multichannel.
  • The new business building blocks essential to multichannel.
  • The impacts concerning information system.
  • Technical architectures.
  • The particularities of the public sector.
  • Case study.
  • Analysis of the implementation implementation of a multi-channel solution in a public administration.
139
Develop a mobile application strategy within an administration
  • Why mobile?
  • The challenge of mobile applications in administrations.
  • Simplifying the relationship with users.
  • The performance gain linked to mobile.
  • How to carry out a mobility master plan?.
  • Mobile web or application? What advantages and disadvantages?.
  • Case study.
  • Analysis of the implementation of a city application to bring together all services: road reporting, library, file tracking, parking payment.
140
Lead a digital transformation project in a public structure
  • What is the role of the IT department?.
  • How to move from a resource department to a transformation department?.
  • The choice of tools and solutions.
  • The actors and activities of the project.
  • Planning.
  • Implementation.
  • Steering.
  • Measurement.
  • Managing change.
  • Governance.
  • How to measure the impacts on human resources?
  • The key factors of success.
  • Decision making and Big Data at the service of transformation.
  • Case study.
  • Analysis of a digital transformation project in the sector audience.
141
Smart Cities and their impact in public administration
  • The emergence of Smart Cities or Intelligent Cities.
  • Smart Cities: main concepts.
  • The European vision of Smart Cities.
  • Profile of a smart city.
  • The six dimensions of a smart city.
142

The digital revolution: summary of the evolution of technologies

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This seminar will help you understand how digital and Internet technologies can be used to create flexible, scalable architectures that meet business agility needs. We will examine developments in client-side and server-side technologies, collaborative approaches, security and data-related issues, such as Big Data and business intelligence. Regarding the use of the terms "digital" or "digital", we will discuss them and clarify their meaning in the context of this presentation.

Who is this training for ?

For whom

IT executives, IS managers or anyone wishing to know current and future technological trends.

143
Prerequisites

Basic knowledge of Information Systems.

Training objectives

Understand the concepts of digital technologies Know the developments in networks and geolocation solutions Discover new technologies on the client and server sides Know the new architectures and their security Know Cloud Computing and Big Data solutions Learn governance at the digital era

144

Training program

Digital or Digital?
  • Definition of digital and digital concepts.
  • Digital issues on governance and competitiveness.
  • ROI, TCO, flexibility, impact on architectures, design application.
  • Innovation, essential lever for competitiveness.
Networks: developments
  • Wired networks: VDSL, Giga Ethernet, LTE...
  • Wireless networks (wifi, wimax, 3G+, 4G, 5G), satellite offers, Passpoint certified WiFi.
  • IPv6 and connected objects.
  • Solutions: geolocation, GeoIP and Beacons.
  • HTTP/2, HTTPS, Google Quic exchange protocols.
  • Quality of service QoS, MPLS.
  • Telephony protocols SIP, VOIP.
  • Impact of the network on application design.
145
Terminals, BYOD, Internet of Things
  • Devices: wearable, mobile, tablet...
  • BYOD, CYOD, BYOA.
  • Internet of Things.
  • OS: Windows , MacOS, ChromeOs, iOS, Android...
  • Future of Cloud OS and convergence.
  • OS HTML5.
  • Ergonomics: Flat Design, Responsive Design.
  • ASE internal application stores, public.
Internet and its services
  • Google's SEO algorithm.
  • Impacts on web design.
  • Web 3-0 or Semantic Web? Rich Snippets.
  • Social networks, Viadeo, LinkedIn...
  • Document sharing: Dropbox, Google drive...
  • Office solutions (Zimbra, Office 365...).
  • Telephony solutions / video telephony, Facetime, Whatsapp, Hangout, Skype...
146
Client workstation technologies
  • Browser families (Webkit, Gecko, Blink, Trident).
  • Future role of the browser at the heart of the architecture.
  • HTML5, CSS3: browser solutions storage, network...
  • GUI design frameworks, bootstrap, AngularJs...
  • Return of JavaScript, ECMAScript.
  • Solution hybrid cross platform with PhoneGap, code generator (Xamarin, gwt).
147
IS architecture and urbanization
  • Client-server architecture.
  • Virtualization and monitoring.
  • Container solutions.
  • Web languages.
  • Application and hosting servers.
  • Storage servers: SSD, Cloud, synchronized...
  • Software Defined Data Center.
  • Client protocols- server (Rest, soap, RSS) and exchange formats (json, xml, text).
  • BDD SQL Server, Oracle, MySQL.
  • OData architectures.
  • The "In Memory".
  • SOA architecture.
  • XML at the heart of exchanges.
  • API at the heart of eBusiness platforms.
  • IS urbanization: EAI, monitoring (BAM), modeling (BPMN, BPEL).
  • B2B, B2C portal, collaborative portal.
148
Security
  • Normative and regulatory framework (SOX, COSO...).
  • Backup and continuity plans, PCA/PRA, PSI, RTO/RPO...
  • Workstation and mobile security solutions.
  • Security components (firewall, VPN, DMZ, biometrics, certificates, etc.).
  • Authentication: federation identity (SAML, OAuth), social network API.
  • Dematerialization and digital signature.
  • Security of exchanges.
  • ISO 27002, 27003, 27004 standards .
  • Securing devices, information, applications at the heart of BYOD.
  • Risks of opensource, data, API multi-licenses.
149
Cloud Computing
  • Software vs Cloud Computing model.
  • Regulatory impact, PRA guarantee.
  • Main Cloud players and types of solutions: SalesForce, Amazon, Google, Microsoft, Cloudwatt ...
  • European regulations.
  • Patriot Act and security and encryption solutions.
  • Impact of the cloud on server technologies, emergence of NodeJs and javascript-serveur.
  • Public, private and hybrid cloud.
  • Impact of SaaS and Cloud Computing on Green IT.
150
Big Data, data management
  • Big data challenges.
  • Data life cycle.
  • Solutions on collection, consolidation, analysis and visualization.
  • Complementarity with BI, Business Analytics, DatawareHouse solutions.
  • Data collection: emergence of real-time architectures.
  • Storage solutions: HDFS, NoSQL BDD, Hadoop, HBase, MongoDB. ..
  • Data manipulation, Pig, Hive...
  • Open Data.
  • NoSQL database.
  • Crawling and scraping.
  • Data Scientists at the heart of decision-making.
151
Digital business, governance
  • Disruption, product life cycle, “Time to Market” approach, “Time to value”.
  • Collaboration at the heart of digital transformation.
  • e-Reputation, image monitoring, MRI management.
  • Social network API.
  • Dematerialization.
  • Content management and CMS .
  • Multichannel marketing and governance issues.
  • Budgeting for the digital transition.
  • Agile project management methods and V-cycle.
  • Risk management and audit.
  • Offshore.
  • SLA and ITL serving QoS.
152

IS quality, implement an effective strategy

★★★★★

  • SII-347
  • 2 Days (14 Hours)

Description

Implement an IT quality policy in your company: identify the problems, choose an approach and apply it. A seminar based on in-depth and particularly significant experience.

Who is this training for ?

For whom

This summary course is aimed at IT managers, methods managers, managers of large projects having to implement a quality approach.

153
Prerequisites

None

Training objectives

Understand the concepts of quality within the IS
Master the strategic issues of quality in the DSI
Analyze the quality management approaches, standards and benchmarks IS
Implement an approach and an action plan quality management

154

Training program

The Quality concept
  • Definition and various aspects relating to this concept.
  • Developments and measurements.
Field of action of the DSI on Quality in the company
  • IT customers.
  • Customer expectations.
  • From software to business results.
  • Exchanges on the notion of the IT department value chain.
  • Reflection on the IT stakeholders in your organization.
The need for standardization
  • Control of IT processes in the extended enterprise.
  • The role of quality assurance and certification.
  • Scandals and risk management .
  • IT impacts of the Sarbanes-Oxley Act.
  • Demonstration.
Approaches, standards and benchmarks
  • The different quality excellence awards.
  • Standards and benchmarks: ISO 9000 version 2000, Six Sigma, ITIL, CMMI, COBIT, SPICE.
  • Comparisons and implications for the IT department.
  • Standards relating to IT governance.
155
The Quality approach
  • Ten rules for initiating a Quality approach.
  • Evaluate the level of Quality of your IT department or project.
  • Investment, operating costs.
  • The reallocation of resources.
  • Certification: the benefits for the company.
  • Collective reflection.
  • Plan to start your project and define your progression strategy.
Acting on Quality: methods for IT
  • Calibrate the requirements of your customers. Cope with the abuses of the king customer.
  • Act on value creation. Control complexity (activities, products and services).
  • Master relationships between users (MOA, MOE, teams).
  • IT operations: professionalize customer relations with service levels.
  • Establish a PAQ: set objectives and monitor.
  • Implement a quality management system.
156

Data quality management approach

★★★★★

  • SII-331
  • 2 Days (14 Hours)

Description

Quality management is necessary to guarantee reliable data for operational and decision-making IS. You will address the essential points to initiate this approach: data governance issues, regulatory issues, compliance with business rules, quality measurement and qualification of the input chain.

Who is this training for ?

For whom

Data Quality Analysts, data quality project managers, IS urban planners, AMOA IS data quality consultants, business IS managers, quality method experts, IS managers.

157
Prerequisites

None

Training objectives

158

Training program

Introduction
  • Strategic role of data for the company.
  • Difference between data and information.
  • The different sources of company data.
  • The different forms of data exploitation.
  • Architectures: relational, NoSQL or BigData.
Definition of quality and methodological framework
  • Defining and measuring data quality.
  • Data quality methodologies.
  • Comparison between TDQM/DWQ/AIMQ/ORME Data Quality.
  • The principles for evaluating the quality of business data.
  • Summary of Quality methodologies.
  • Dimensions - definitions and measurements.
  • Case study: Red case: a group launches a Quality approach for compliance with Solvency 2 and wishes to improve the quality of its customer data.
  • General organization of the approach .
159
Data quality management approach
  • The place of quality in the Governance approach.
  • The actors and the organization.
  • The Cobit example.
  • Implementation of the Project approach.
  • The cost of non-quality.
  • Scope of the Quality approach.
  • Level of approach and granularity.
  • Case study.
  • The 10 actions to be launched by the Governance committee.
Quality control and best practices
  • Quality auditing.
  • Identifying low quality data.
  • Collecting and storing quality metrics.
  • An approach centralized data quality system.
  • Types of controls and statistical tools.
  • Exploitation and evaluation of quality measures.
160
Operational monitoring of data quality
  • Quality dashboards.
  • Continuous improvement cycle.
  • What role for Governance?
  • Case study.
  • The group's Data Quality team sets up reporting: definition of indicators and acquisition method.
Raise the level of quality
  • Intervene upstream of the chain.
  • Identification of atypical cases.
  • Targeted management of cases of low quality data.
  • The data reconciliation.
  • Case study: Example of data reconciliation in a group following the integration of a subsidiary.
161

Build the DSI service offering SLA and service contracts

★★★★★

  • SII-342
  • 2 Days (14 Hours)

Description

Current governance practices recommend approaching the IS function from a more marketing angle and developing a service offering. This seminar will provide you with the key elements of this new approach.

Who is this training for ?

For whom

Information systems directors, MOA/MOE managers, IT studies, operations, quality managers, management controllers.

162
Prerequisites

None

Training objectives

Understand the marketing challenges of the IS function Define a relevant service offering Manage service levels Manage the service offering

163

Training program

Introduction: problematic
  • The evolving role of IT in the company.
  • Increasing share of outsourcing.
  • The impact of "Do It Yourself" and globalization.
  • Competition of internal IT services.
  • Benchmarking.
  • Solow paradox.
Construction approach
  • The construction of a model (Porter analysis, BCG, Ohmae).
  • The formulation of the current service offering.
  • The analysis of the market: evaluation of competing offers, strengths and weaknesses of the current offer.
  • Negotiation on the content of the catalog.
  • The choice.
The commercial strategy
  • The PAC, Commercial Action Plan.
  • The packaging and publication of the offer.
  • The Benchmarking.
  • Organization sales and after-sales follow-up: customer service, customer correspondents...
  • Presentation of an example of a service offering.
164
Le Service Level Management
  • SLM and quality management.
  • Development of service levels.
  • Organization of SLM.
  • Achieving consistency SLAs with internal operations and subcontractors.
  • Monitoring the offer.
  • Operation of instances and customer meetings.
  • Possible deviations from SLM and SLA.
  • Presentation of examples of SLA.
Managing the service offering
  • Organizing reviews.
  • Monitoring and evaluating suppliers.
  • Aligning resources.
  • Professionalization MOA/MOE relationships.
Demonstrate the competitiveness of the offer
  • Determining the costs and value of the offer.
  • Benchmarking: advantages and disadvantages.
  • Towards a convergence of IS cost measurements.
  • The offer to demonstrate the performance of the IT department.
165

IT project management

★★★★★

  • SII-19
  • 3 Days (21 Hours)

Description

Managing an IT project involves a pragmatic approach to the project, the ability to manage complex and heterogeneous environments, and mastery of management techniques and tools. Based on observed good practices and current benchmarks (PMI, CMMI), this seminar offers concrete responses to the three imperatives of projects, control of cost, deadline and quality. It also demonstrates the critical role played by the project manager by emphasizing the importance of communication, change management and leadership in his mission.

Who is this training for ?

For whom
Project managers who are beginners or have initial experience and who want to deepen all facets of their role.
166
Prerequisites

None

Training objectives

Define the essential elements for starting a project Understand the techniques and tools for leading an IT project Discover recognized good practices in project management Evaluate the role played by the project manager following the companies Know how to manage costs, deadlines and risks Define the importance of communication, change management and leadership

167

Training program

Project communication
  • Identify the communication "targets", the stakeholders, the actors involved, the operational units.
  • Rules of good communication.
  • Management of the message and the interlocutors.
  • Phases and tools of communication Project, the communication plan.
  • Planning tools for communicating.
Operational management of the project
  • Choice of reporting mode in teams.
  • Problem of analyzing deviations, law of 90%.
  • Project progress indicators.
  • Continuous estimation of the "Remaining to be done".
  • Financial indicators.
  • EVM (Earned Value Management).
  • Tables of the project manager, the indicators to monitor, the contribution of the BSC.
  • Project committee, steering committee, technical meetings, reviews.
  • Crisis management.
  • Process for managing developments, its sizing, its implementation.
  • Management of anomalies: rules.
  • Optimize recovery and anticipate.
168
Management of external services
  • Legal framework.
  • Objectives and stages of implementation, specifications, contract, means of control and reception.
  • Technical and contractual monitoring of the service provider.
  • Personnel delegation: the use of flat-rate technical assistance.
  • Integrating technical assistance employees.
Lead change
  • Analysis of change (processes, actors, culture and organization).
  • Identify levers and resistance.
  • Managing change.
  • Definition of a change management plan.
  • Basic rules for IT professionals in their relationship with users.
Project review and summary
  • Stop a project
  • Know how to transmit it to the Production, Support or Maintenance departments.
  • The contribution of ITIL ®.
  • Administrative closure of the project.
  • Project reports, capitalization and dissemination of experience.
  • Synthesis of best management practices Informatic project.
169

Build a preliminary information system project

★★★★★

  • SII-20
  • 2 Days (14 Hours)

Description

Master the successful launch of an information system project by controlling all facets of the pre-project phase: define the triangle "quality, cost, deadline" and ensure its feasibility, identify the main risks and base the launch decision on the value provided by the project.

Who is this training for ?

For whom
All the players involved in the upstream stages of IS projects, both on the project management and project management side: IT department, project managers, project managers, study managers.
170
Prerequisites

None

Training objectives

171

Training program

Definition of IT projects
  • IT projects (development, software package, integration, etc.) and associated life cycles.
  • Place of the preliminary project.
  • The launch context projects: master plan, IT strategic plan, project portfolio management.
  • The governance of IT investments by the IT department, the COBIT vision: rules and controls.
The preliminary project phase
  • The phasing of the preliminary project following the life cycles: classic, SDLC, PMBOK...
  • The two classic stages: initialization (opportunity), study (feasibility).
  • Objectives, tasks and milestones.
  • Decisions: objectives and budget of the preliminary project, feasibility, coherence and contributions of the project.
  • Sizing of the phase and the teams.
  • Definition and launch of the project: the project plan, standards and development, technical-economic feasibility.
172
The study of the Information System
  • Objectives of a study: reference framework, definition of limits, expected results.
  • The rules and formalisms for defining an IS.
  • L 'study of business processes, their modeling.
  • Process optimization.
  • Functional analysis of needs, definition of requirements: scope and depth.
  • Definition and sizing of the principles of the technical solution.
  • Definition of the application architecture.
  • The place in urban planning of the IS.
  • The reference framework of the IT department.
Economic valuation of the project
  • The value of IS projects: measurements in cost of ownership (TCO) and return on investment (ROI).
  • Use and calculation rules.
  • Estimate of the project cost: different approaches.
  • Estimation of the level of precision of the estimate.
  • Calculation of the cost of the application: taking into account maintenance phases, costs administration and support.
  • Risk analysis, provisions to be established.
  • Budgetary management of costs, standardization of results.
173
Succeed in the preliminary project
  • The actors of the phase.
  • Distribution of MOA/MOE roles.
  • Place and roles of a steering committee.
  • Business Cases, standard plan and essential components, SWOT analysis, VALIT vision.
  • Know how to convince at the end of a preliminary project: the Business Case, decision-making summary.
174

Manage IT project risks

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

This seminar offers you a pragmatic approach to risk management, based on the experience of real projects. It shows you how to identify, estimate but above all reduce risks using modeling methods that facilitate appropriate decision-making.

Who is this training for ?

For whom

This seminar is aimed at project owners, project directors, project managers, IT project managers and project quality managers.

175
Prerequisites

Basic knowledge of project management.

Training objectives

Evaluate the essential elements of risk management for IT projects
Understand risk management practices
Know how to identify, estimate and reduce risks
Understand modeling methods facilitating decision-making
Organize risk management on a project

176

Training program

Risk management concepts
  • What is a risk? The notions of events, causes and consequences.
  • The measurement of a risk: probability, impact and severity.
  • Types of risks (classes): strategic, projects, products, use, maintenance.
  • Risks and levels of responsibility: who manages, who decides, who assumes responsibility? The scope of a risk.
  • Contractual distribution: principal, subcontractors.
  • Collective reflection.
  • The different types of risks.
The risk management process
  • The key moments of risk analysis: defining the project, launching and managing the project.
  • Set up a risk management process adapted to the project.
  • The roles of the actors: project manager, participant, user, manager.
  • The basic principles (SEI), the cost of risk management.
  • Exchanges: The notions of impact and probability of risk.
177
How to identify risks?
  • Define the exact scope of the research and the associated levels of responsibility.
  • Exploit the information: reviews (contract, validation, design, tools), meetings, brainstorming, reporting.
  • Identification: risk checklists, databases, constraints analysis and documentation analyses.
  • Use the analysis of uncertainties in estimates, schedules, technologies, processes, resources.
  • Modeling a risk: Ishikawa diagram, tree of causes/consequences, modeling rules.
  • Problem of causal independence.
  • Case study: Identifying the risks of a real project.
How to estimate the risks?
  • Choose level of precision vs. estimation cost and issues.
  • Subjective vs. frequency probabilities.
  • Use qualitative estimation techniques: probability, impacts.
  • Quantitative estimation technique: Absolute Probability Judgment (Delphi, Betting, Churchman/Ackoff).
  • Poincaré methods, 45° diagram, sensitivity analysis, tornado diagram, VMA (Expected Monetary Value).
  • Estimate the level of exposure to risks and the associated level of confidence: Monte-Carlo simulation.
  • Calculate the impacts on schedules, budgets and the quality or content of the deliverables.
  • Prioritize risks and calculate their severity.
  • Case study Practice of quantitative risk analysis technique.
178
How to reduce risks?
  • The reduction axes: elimination of causes, effects, sharing, early control, acquisition of information...
  • Modeling fallback scenarios and probability of triggering a fallback scenario.
  • Design risk reduction actions, "rework" of the project, examples.
  • Plan and budget preventive reduction actions and emergency plans.
  • Calculate probability and residual impacts, evaluate the profitability of control actions.
  • Know how to present your project strategy.
  • Case study: rnDefine risk management strategies for the project.
Follow and decide
  • Monitoring tools: risk sheet models.
  • Monitoring dashboards, risk management effectiveness indicators.
  • Organization of the reporting.
  • Monitoring milestones or key points.
  • Monitoring risk indicators and monitoring progress.
  • Preparing decision-making, adjusting the project plan, initiating a fallback scenario.
  • Crisis management.
  • Exchanges: Presentation of risk monitoring tools.
179
Organize risk management on a project
  • Choose your approach to risks based on the challenges of the project and the level of maturity of the context.
  • Think about the structure and information tools of the project to know and monitor the risks.
  • Clearly assign risk management roles and responsibilities.
  • Define risk management requirements to subcontractors and establish appropriate contractual clauses.
  • Exchanges: Identify risk management quality indicators.
180

Implement an ITSM solution

★★★★★

  • SII-22
  • 2 Days (14 Hours)

Description

ITIL® has become an essential reference framework for IT service management. However, implementation requires appropriate tools. In this training, you will learn how to choose the right tools and how to successfully integrate an ITSM solution. You will experiment with certain ITSM tools in SaaS mode.

Who is this training for ?

For whom
Understand the issues of integrating ITSM solutions Choose a solution adapted to the needs of its users and the context of the company
Use the main functionalities of Full ITSM ITIL Compliant tools Carry out ITSM tool administration tasks (Codeless)
181
Prerequisites

None

Training objectives

Presentation, feedback and demonstration on EasyVista and iTop ITSM tools

182

Training program

Reminder of ITIL® 2011 “Best Practices”
  • ITIL® 2011 approach and service life cycle.
  • Processes and functions. Processes and workflows.
  • Realities and responsibilities. The RACI matrix.
  • Tools and technologies useful for implementing ITIL® processes.
  • Collective reflection.
  • Discussions on typical problems related to the implementation of ITIL® in an organization.
Choosing an ITSM tool: carrying out a pre-study
  • Organization audit: position an ITIL® maturity level for your organization.
  • Tool audit: position an ITIL® maturity level of the tools used.
  • Exercise.
  • The maturity criteria of the organization and the tools.
183
Write the expression of needs
  • Model process macros: identify activities and allocated resources (RACI).
  • Write functional specifications: list functional needs.
  • Create an ITSM master plan including construction sites and subdivisions.
  • Exercise and discussion based on pre-constructed standard deliverables.
Communicate and train
  • Prepare support for change and a communication strategy.
  • Identify key contributors (Sponsor and key users).
  • Produce training materials.
  • Exercise on a pre-constructed communication and training plan.
184
Integrate the ITSM solution
  • Plan workshops, achieve objectives at the end of the workshop: method and monitoring.
  • Identify, prioritize, approve deviations (loads outside specifications): analysis of deviations.
  • Functional recipe (create the recipe book, manage anomalies): acceptance criteria.
  • Project assessment and implementation of a TMA: monitoring of anomalies and migration tool.
  • Exercise.
  • Discussions on the main issues linked to the integration of an ITSM solution.
  • Presentation of a methodology.
185

Design and manage a Helpdesk service

★★★★★

  • SII-311
  • 2 Days (14 Hours)

Description

Ensuring optimal service center (Helpdesk) performance is a crucial element in ensuring user satisfaction, operational stability and credibility of an IT department. This course aims to provide the skills and knowledge needed to establish and improve an effective Helpdesk.

Who is this training for ?

For whom

Customer service center manager, project manager, manager responsible for setting up a Helpdesk, floor supervisor, front and back office Hotliner. Helpdesk Manager.

186
Prerequisites
  • Basic knowledge of ITIL® processes and architecture.

Training objectives

  • Understand the role of a Helpdesk within the IT department
  • Establish the roles, responsibilities and missions of the actors in a Helpdesk
  • Set up a Helpdesk
  • Track service activity and reports
  • Define performance and quality tools and indicators

187

Training program

Problems, responsibilities and missions of the actors
  • The origins of the Helpdesk. Definition. Purpose.
  • Problems and consequences. Expected, desired, provided service.
  • Responsibilities and missions of the actors.
  • Indispensible function for the effective management of services.
  • Structuring workplace for the provision of services.
  • First line for incident management.
  • Mission, rules and responsibilities of the Helpdesk function.
  • The volume. The sizing of resources.
188
Structuring incident processes
  • Organization and maturity of the service.
  • Service levels (SLA, OLA).
  • Technical infrastructure and typology.
  • Input/output information.
  • Processing of activities and tasks according to the profile.
  • Incident life cycle.
  • Incident models and major incident.
  • Escalate and restart.
189
Helpdesk activities
  • Get back into service while minimizing the impact of incidents.
  • Support requests end-to-end.
  • Track service activity and generate reports.
  • Identify new services.
  • Collapse costs and increase productivity.
  • Improve user satisfaction.
190
Helpdesk resources and tools
  • Smart phone tools.
  • PBX switches.
  • Automatic call distributor (ACD).
  • Telephony/computer coupling (CTI).
  • The interactive voice server (IVR).
  • The integrated park and ticket tools.
  • The status of the Helpdesk specialist.
  • The ideal profile. Skills matrix: customer orientation, focused on business objectives, methodological...
191
Quality management tools
  • Define performance and quality indicators.
  • Availability versus unavailability.
  • Availability indicators defined by the SLA according to ITIL®: MTTR, MTBF, MTBSI, MTRS, AST, etc.
  • Calls served, abandoned, deterred.
  • Flow per hour, day, week, month.
  • Number of employees per time slot.
  • Balanced scorecards, Balance Scorecard (BSC).
192

IT outsourcing, managing outsourcing

★★★★★

  • SII-24
  • 2 Days (14 Hours)

Description

To meet the need for quality and cost control, many companies use subcontracting to manage what is not part of their core business. Based on the eSourcing Capability Model, this seminar presents best practices for organizing subcontracting for the IT department.

Who is this training for ?

For whom
Director of Information Systems, IT manager, management controller, financial department, purchasing department, supplier department, contract manager.
193
Prerequisites

None

Training objectives

194

Training program

Sourcing, outsourcing, value creation and business strategy
  • The problem of IT outsourcing: Business Process Outsourcing, Information Technology Outsourcing.
  • Definitions and associated concepts: offshore, nearshore, onshore, ASP ?.
  • Legal and contractual aspects.
  • Subcontracting and the creation of value.
  • The mission of the IT department, the "core business" skills.
195
Defining an outsourcing strategy
  • The urbanization of IT: a lever for structuring the subcontracting policy.
  • Market supply and its evolution.
  • Perspectives opened up by SOA architectures and EAI, by the urbanization of sectors of activity.
  • Example: eTom.
  • Knowledge management and human resources management.
  • The pitfalls of uncontrolled subcontracting.
196
The life cycle and processes
  • Process to be implemented to control subcontracting.
  • Recognized good practices.
  • The e-Sourcing Capability Model.
  • Presentation of capability areas.
  • Presentation of maturity levels.
  • Structure of the repository.
  • Evaluation of your organization.
197
Outsourcing life cycle, customer and supplier perspective
  • Develop specifications, initialize subcontracting.
  • Subcontracting strategy. Typical content of specifications. Legal aspects and unfair clauses.
  • Single market or subdivision.
  • Management of interactions between lots.
  • Carry out the Subcontractor Benchmark.
  • Planning, setting up the operation.
  • Monitoring and controlling subcontracting . Organization of the internal monitoring structure.
  • Overall presentations of the process, main stages and associated deliverables.
  • Key indicators monitoring, the subcontractor management dashboard.
  • Incident and conflict management.
198
Reversibility and termination
  • Implementation of reversibility.
  • Recovery internally or by another operator.
  • The transfer of operations.
199

TMA, Third Party Application Maintenance (control the cost and quality of maintenance)

★★★★★

  • SII-25
  • 2 Days (14 Hours)

Description

Application maintenance corresponds to the operational exploitation phase of the application. How to have it carried out by a third party? This training covers the practical, technical and contractual aspects of TMA by proposing a methodology based on the experience of numerous outsourcing operations.

Who is this training for ?

For whom
IT directors, project managers. Anyone related to TMA.
200
Prerequisites

None

Training objectives

Define an expected service level and KPIs Mastering contractualization Manage the contractual relationship Anticipate reversibility

201

Training program

A TMA, TMAs?
  • Application outsourcing. TMA requirements.
  • Refocus the IT department on business needs and customer satisfaction.
  • Gains from TMA. Types of maintenance. Pitfalls.
  • Current practices, the TMA market.
202
Service levels, definition
  • Types of services requested. Types of TMA services.
  • Required levels on costs, quality and business needs.
  • Measurement on the progress of the TMA.
  • Definition of indicators.
  • Feasibility constraints.
  • Choice of periodicity.
  • Impact on workload. Interpret the indicators.
Outsourcing contract and contractualization
  • Characteristics of a contract. Objectives pursued. Legal bases. Points to be established.
  • Special clauses. Price. Limitation of amendments. Transfer of employees. Article 122.
  • Contractualization. Choice of additional services.
  • Call for tenders. Conclusion of the contract.
203
Transfer of an application
  • Objectives and planning of the preparation phase. Initial choices.
  • Definition of the scope.
  • Knowledge transfer.
Technical management of the service
  • Maintain project management. Management of developments.
  • Deadline management.
  • Quality control. Progress monitoring. Tests .
  • Anomaly management. Risk management.
Management of the contractual relationship
  • Management of an evolving scope. Creation of partnership relationships.
  • Developments and amendments.
  • Benchmarking of the service and its implications on the price. Monitoring file and contractual facts.
  • Traceability of services and interventions.
  • Termination of the contract: early termination or termination.
204
Reversibility
  • Pitfalls noted. Contractual definition, focus on AFNOR clauses.
  • Legal precautions.
  • Respective responsibilities. Reversibility plan.
  • Dual order period
205

TRA, Third Party Application Recipe

★★★★★

  • SII-26
  • 0 Days (0 Hours)

Description

Master all the elements necessary to successfully organize and manage your Third Party Application Recipe. The relationship with external service providers, roles and responsibilities, testing phases, quality improvement, recipe.

Who is this training for ?

For whom
MOA project managers, consultants, auditors.
206
Prerequisites

None

Training objectives

207

Training program

Changing testing needs
  • Why tests are necessary?
  • Observations, progress and difficulties of testing projects.
  • The causes and areas for improvement, the success factors.
Test during the software lifecycle
  • Why tests are necessary?
  • Observations, progress and difficulties of testing projects.
  • The causes and areas for improvement, the success factors.
TMM and organizational maturity
  • The concept of organizational maturity (CMMI approach) and its consequences.
  • A standard maturity model: TMM.
208
Customer/supplier relationship, roles and responsibilities
  • Legal aspects.
  • The importance of the contract.
  • The actors involved.
  • The obligation to advise.
  • Drafting the outsourcing contract.
  • The different responsibilities.
  • The case of specific software.
  • ERPs and software packages.
209
The Third Party Application Recipe
  • The principles of Third Party Application Recipe.
  • The issues.
  • The types of services.
  • The services.
  • The organization of the Third Party Application Recipe.
  • The phases of a TRA: activities, products, actors.
  • Appropriation.
  • Prepare the tests. functional tests and technical tests.
210
Management and indicators of the Third Party Application Recipe
  • Reporting.
  • Risk management.
  • The different indicators (methods, families, examples).
Contractual documents and conclusion
  • The description of the services.
  • The application scope.
  • The service agreement.
  • The PAQ.
  • The financial conditions.
  • Conclusion: Some recommendations. Industrialize the tests.
211

SLA, define and manage the commitments of your service contracts

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Responding to the needs of customers internal or external to the IT department is formalized with a service level agreement (SLA). This training allows service commitments to be translated into a practical approach to SLA management. This method also facilitates the possibility of outsourcing services.

Who is this training for ?

For whom

Information systems directors, MOA/MOE managers, IT managers for studies, operations, quality, management controllers, financial management, purchasing departments.

212
Prerequisites

A basic understanding of the components and role of the IT department within an organization, as well as concepts related to the notion of service offering are recommended to follow this training.

Training objectives

At the end of this training, participants will be able to understand the concept of a service contract, to transform the IT department's commitments into SLAs, to supervise and execute a contract, as well as to analyze the implementation setting up an SLA in the context of outsourcing and Cloud Computing

213

Training program

ALS: definition
  • Contract or service agreement.
  • Reminder of the different ITIL® commitments: needs, catalog, agreements, contracts, improvement plan, etc.
  • The management of service levels: availability, capacity, costs, continuity, security.
  • Performance measurement.
  • Definition and characteristics of outsourcing.
  • The place of e-SCM-CL in outsourcing contracts.
  • Exercise: Reflections on SLA practices.
SLA: assessment
  • Positioning of services.
  • Implications of the service provider and the client.
  • Required means.
  • ISO9000 version 2000 objectives.
  • Criteria for choosing a service provider.
  • Selection process.
  • Exercise:
  • Reflections on drawing up a catalog service.
  • Establishment of indicators and their relevance for a service desk.
214
SLA : cas d'application
  • The Help Desk: examples of financial metrics, qualities.
  • The user station.
  • Fleet management.
  • Exercise: rnReflections on the indicators of a Datacenter with capacity management.
SLA: implementation and monitoring of the contract
  • Principal diagram.
  • Measuring tools.
  • Macro-planning.
  • The kick-off meeting.
  • Monitoring the activity.
  • Exercise: Reflections on the implementation of a TMA.
Offshore and information system
  • State of the art of the market.
  • The decision-making process towards offshore.
  • Implementation and governance.
  • The particularities of treatments with an offshore component.
215
The case of Cloud Computing
  • Changing consumption patterns.
  • Points of view: decision-maker, user, IT specialist.
  • SaaS offers.
  • Contracting.
216

IT contracts, understanding the specifics and (controlling hardware purchases, software, services, etc.)

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

This course is aimed at anyone wishing to deepen their understanding of the different types of IT contracts such as hardware, license, service, outsourcing and Internet contracts. It also allows you to acquire essential legal knowledge related to the IT field.

Who is this training for ?

For whom

This course is suitable for everyone involved in IT contract management, such as managers, IT buyers, license managers, lawyers, etc.

217
Prerequisites

No specific knowledge prerequisites are necessary.

Training objectives

After completing this training, participants will be able to:

  • Identify the different types of IT contracts and understand their particularities
  • Master the fundamental principles of contract reading
  • Understand the rights and obligations of the different parties involved in the contract
  • Explain typical clauses that can be found in IT contracts

218

Training program

Introduction
  • Main concepts.
  • Definitions: contract, obligation, products, services...
  • Introduction to contract law.
  • Particularities of IT contracts.
The stages of the contract life cycle
  • Initialization of the contract (needs, duration, mutual agreement, call for tenders).
  • Negotiations of clauses and prices.
  • Completion of negotiations and signature of contracts.
  • Life of the contract.
  • Resolution of disputes.
  • Renewal of contracts (tacit renewal, notice).
  • Amendments and orders.
  • Termination of the contract (term, early, dispute).
Hierarchy of contracts and contractual documents
  • The main contractual documents.
  • Hierarchical principles of contracts.
  • Management of the contract.
219
Obligations of the parties and contractual clauses
  • The duty to advise.
  • Intellectual property.
  • Audit, transferability benchmark and non-poaching clauses.
  • Obligation of confidentiality.
  • Duties of the client, duty of cooperation, discretion...
  • Exchanges: Examples of clauses, analysis.
  • Jurisprudence.
The costs
  • Determination of prices.
  • Change in prices during the contract.
  • Terms and execution of payments.
Particularities
  • Maintenance and support.
  • Subcontracting.
  • Transfer of ownership.
  • Guarantees.
  • Training and skill transfer.
220
Presentation of the different types of contracts and their specificities
  • The service contract (management, package).
  • The service contract (Outsourcing, Cloud).
  • The equipment sales contract (products, defects , hidden defect, guarantee of conformity).
  • The rental contract.
  • The license contract (right of use, maintenance).
  • The contract software package (copyright, source code, absence of eviction, use, update).
  • Mixed and distribution contracts.
  • Other types of IT contracts.
221

IS management, legal risks and responsibilities

★★★★★

  • SII-29
  • 2 Days (14 Hours)

Description

IT managers and management are exposed to legal obligations due to new uses of IT tools: illegal content, digital rights, information leaks, etc. This course, through practical cases and their case law, gives the keys to rights and duties of IT stakeholders.

Who is this training for ?

For whom
IS manager, IS director and project manager, CISO.
222
Prerequisites

None

Training objectives

Develop an overview of civil, criminal and professional legal risks
Know the responsibilities of stakeholders
Implement prevention measures
Build an IT charter

223

Training program

Introduction to risks
  • Examples of legal risks linked to IT.
  • Category of risks.
  • Illustration by case law.
  • Responsibilities of different parties.
  • What is civil liability?.
  • What is criminal liability?.
  • What is professional responsibility?
Liability and risks of the company and the employer
  • Cases where liability may be incurred.
  • Risks incurred by the legal entity in the event of liability incurred.
  • Concrete case law.
  • Liability and risks of the employer.
  • Risks incurred in the event of liability incurred.
  • Concrete case law.
224
Responsibility of the CIO/CISO
  • Cases where liability may be incurred.
  • Risks incurred in the event of liability incurred.
  • Concrete case law.
User Responsibility
  • Cases where liability may be incurred.
  • Risks incurred in the event of liability incurred.
  • Concrete case law.
Preventive measures
  • Technical measures to be put in place within the company.
  • Legal measures to be put in place to define responsibility or non-responsibility in the event of an incident.
Legal obligations
  • Obligations regarding data.
  • Obligations regarding the system.
  • Obligations regarding individuals.
  • Obligations of the employer in relation to the measures put in place.
IT and Internet charter
  • How to properly build an IT charter?.
  • The important points to address when implementing an IT charter in the company.
  • Limits not to be exceeded.
  • Examples of IT charter.
225
International environment
  • What are the responsibilities and risks incurred during an incident involving the international?.
  • What are the means of prevention?
226

Green IT, approach and implementation

★★★★★

  • SII-361
  • 2 Days (14 Hours)

Description

This course will allow you to identify the main action levers to implement to become eco-responsible in IT management. You will see how to significantly reduce certain financial charges, particularly those corresponding to electricity consumption.

Who is this training for ?

For whom

DSI, Sustainable Development manager, Datacenter manager, Purchasing manager, Workstation manager.

227
Prerequisites

Desirable knowledge of networks and systems, security, virtualization or workstation environments.

Training objectives

Know the developments in Green IT
Analyze the life cycle of computer equipment
Propose different solutions to reduce data center costs
Implement and monitor the Green IT project

228

Training program

The progress of Green IT
  • Issues of the ecological footprint.
  • Impact of ICT on the environment.
  • Demarcation of the perimeters of Green IT 1.0 and 2.0, Fair IT, sustainable ICT and sustainable IT.
The main tools for analyzing IT assets
  • Understand the phases of the equipment life cycle.
  • Count energy consumption.
  • Manage the end of life of equipment and the opportunity to recycle.
  • Practical work.
  • Life cycle analysis of computer equipment.
The workstation environment
  • Impact of the software layer.
  • Labels, regulations and alternatives to purchasing.
  • Prolong the lifespan and power consumption.
  • Manage the end of life of equipment and WEEE.
  • Practical work: Case study of workstation environment and calculation of electricity consumption.
229
Environmental impact of printing
  • Ecolabels and technical criteria.
  • Interesting offers from manufacturers.
  • Alternatives to traditional consumables.
  • User awareness.
Optimisation des datacenters
  • Electric consumption and cooling issues.
  • Cost of unused equipment and calculation of their density.
  • Virtualization and energy savings.
  • Cost reduction.
  • Increased utilization rate.
  • Construction of a "green" data center.
  • Practical work: Donate different solutions to reduce the costs of a given data center.
230
Reussir and project Green IT
  • Main stages of the project.
  • Responsible purchasing.
  • Green IT dashboard and indicators.
  • Managing change with users.
  • Eight success factors.
  • Best Practices.
  • Practical work: Construction of Green IT indicators in subgroups on a given case.
231

Green Data Center, optimize your energy performance

★★★★★

  • SII-31
  • 2 Days (14 Hours)

Description

At the end of this training, you will be able to identify the key areas for reducing the electricity consumption of a data center and will be able to implement improvement solutions. This training is part of the PrimeEnergyIT project of the European Commission.

Who is this training for ?

For whom
DSI, Data Centers manager, project manager.
232
Prerequisites

None

Training objectives

Optimize different Green IT projects Carry out an inventory of energy and environmental performance Choose the IT solutions appropriate to your needs Select the right infrastructure solutions

233

Training program

Understanding the challenges of Green IT
  • The challenge of sustainable development.
  • The place of information systems in the issue of sustainable development.
  • The different scopes of Green IT.
  • Practical work: Identify the different Green IT projects already deployed in your company.
Understand the key issues of data centers
  • Undersizing of the current fleet.
  • Densification and related cooling needs.
  • The change of economic model from CAPEX to OPE.
Master the regulatory context
  • European directives impacting computer equipment: EuP, RoHS, WEEE, "batteries".
  • The legal obligations of data centers in Europe.
  • The legal obligations of data centers in France.
  • Voluntary initiatives: code of good conduct, etc...
Measure to identify areas of progress
  • With what tools (indicators, methodology, etc.
  • ) to take stock of the situation?
  • The main performance indicators energy and environmental aspects of data centers: PUE, CUE, - WUE, DCcE, etc...
  • Physical measurement.
  • Practical work: Calculate the PUE of a computer center.
234
Les solutions IT
  • Implement application governance.
  • Manage the data lifecycle.
  • Hierarchical data storage, deduplication.
  • Consolidate and virtualize equipment.
  • Choose equipment adapted to energy efficiency issues.
  • Ecolabels and technical standards for selecting equipment.
  • Study of case: Analysis of several materials using ecolabels and appropriate standards.
Infrastructure solutions
  • The impact of the availability level (third party) on energy needs.
  • Modular architecture of the POD type.
  • Spatial organization of equipment in the data center: hot aisle, cold aisle.
  • Precision cooling.
  • Free cooling, water cooling.
  • Feedback.
  • Study feedback from companies that have already implemented these solutions.
235

CCNA Routing and Switching Certified Cisco Network Administrator Training

★★★★★

  • SII-361
  • 5 Days (35 Hours)

Description

Cisco CCNA Routing Switching training provides participants with practical, fundamental knowledge, ranging from networking theory to interconnect hardware such as routers and switches. From the start of the training, participants have access to Cisco hardware, learn the different ways to configure routers and switches, and create infrastructures similar to those of corporate networks. In addition, the training covers the concepts of security, VoIP and Wi-Fi networks. Primary importance is given to practical work on operational Cisco equipment, in order to prepare participants for environments identical to those they may encounter in business as a Cisco CCNA Routing & Switching certified network administrator. Cisco CCNA training prepares participants for certification by providing content developed by Cisco-certified technical experts and experienced educators, ensuring rapid knowledge assimilation.

Who is this training for ?

For whom

This CCNA training is aimed at systems and network engineers, network administrators, responsible for the installation, operation and support of the corporate network. This official Cisco training is also strongly recommended to candidates for CCNA certification regardless of the specialization subsequently chosen: routing & switching, security, voice, Wi-Fi.

236
Prerequisites
  • General knowledge of networks
  • Internet browsing and use of a PC operating system
  • General knowledge of IP addressing

Training objectives

  • This training aims to enable you to master the knowledge and skills necessary to install, configure and operate small and medium-sized networks
  • It covers the fundamental areas of networking, security and automation to give you a solid foundation in these areas
  • This training is also designed to prepare you for the CCNA 200-301 exam which, once passed, will allow you to obtain CCNA certification

237

Training program

Basic computer networking skills and related practices
  • Identify the different components of a computer network and explain their fundamental characteristics.
  • Understand the end-to-end communication model between hosts in a network.
  • Explain the features and functions of the Cisco IOS® operating system.
  • Describe LAN networks and the critical role that switches play in these networks.
  • Describe Ethernet as a network access layer of TCP/IP and explain how switches work.
  • Perform the installation of a switch and carry out its initial configuration.
  • Describe the Internet layer of TCP/IP, including IPv4, its addressing scheme and subnets.
  • Describe the transport layer of TCP/IP and the application layer.
  • Put into practice the knowledge acquired through practical work.
238
Discovered routing features using Cisco.
  • Set Up a Cisco Router: Basic Steps
  • Understand Host-to-Host Communications Through Switches and Routers
  • Troubleshoot Common Switched and Networking Issues 'IPv4 addressing
  • IPv6: main features, addresses and basic connectivity
  • Static routing: operation, advantages and limitations
  • VLANs and trunks: configuration and verification
  • Inter-VLAN routing: application and configuration
  • Dynamic routing protocols: introduction to OSPF and its components
  • ACL: operation and use in the network
  • Internet access via DHCP and configuration of NAT on Cisco routers
  • Practical work: putting the concepts studied into practice
239
Practical work
  • Get started with the Cisco Command Line Interface (CLI)
  • Observe how a switch works
  • Perform basic switch configuration
  • Implement initial switch configuration
  • Inspect TCP/IP applications
  • Configure an interface on a Cisco router
  • Configure and verify protocols layer 2 discovery tool
  • Implement an initial router configuration
  • Configure the default gateway
  • Explore packet forwarding
  • Troubleshoot switch media and port issues
  • Troubleshoot duplex port issues
  • Configure basic IPv6 connectivity
  • Configure and verify IPv4 static routes
  • Configure IPv6 static routes
  • Implement IPv4 static routing
  • Implement IPv6 static routing
  • Configure VLAN and Trunk
  • Troubleshoot VLANs and Trunk
  • Configure a Router on a Stick
  • Implement Multiple VLANs and Basic Routing Between VLANs
  • Configure and Verify OSPF for a Single Area
  • Configure and Verify EtherChannel
  • Improve Redundant Switched Topologies with EtherChannel
  • Configure and Verify Checklists IPv4 access network
  • Implement numbered and named IPv4 ACLs
  • Configure a provider-assigned IPv4 address
  • Configure static NAT
  • Configuring Dynamic NAT and Port Address Translation (PAT)
  • Implement PAT
  • Connect to the WLC
  • Monitor the WLC
  • Configure a dynamic interface (VLAN)
  • Configure a DHCP scope
  • Configure a WLAN
  • Set a RADIUS (Remote Access) server Dial-In User Service)
  • Explore management options
  • Explore Cisco DNA™ Center
  • Configure and verify NTP
  • Configure recording system messages
  • Create Cisco IOS Image Backup
  • Upgrade Cisco IOS Image
  • Configure WLAN to Wi-Fi Protected Access 2 (WPA2) Pre-Shared Key (PSK) help using the GUI
  • Secure console and remote access
  • Enable and limit remote access connectivity
  • Secure administrative device access
  • Configure and verify port security
  • Implement hardening devices
240

COBIT® 2019 Foundation, certification

★★★★★

  • SII-363
  • 4 Days (28 Hours)

Description

This training will introduce you to the architecture of COBIT® 2019 and its model for overall governance and management of the company. You will master the key concepts and attributes for a process capability assessment via the COBIT® 2019 PAM (Process Assessment Model).

Who is this training for ?

For whom

Executive directors. Business directors. IT/IS auditors. Internal controllers. Information security managers. Members of the DSI. Information systems directors. Consultants.

241
Prerequisites

Have good basic knowledge of information systems.

Training objectives

Master the architecture of the COBIT® 2019 framework.
Master strategic alignment and value creation.
Design a tailor-made governance system using COBIT® 2019.
Prepare and take the COBIT exam ® 2019 Foundation.

242

Training program

The COBIT® 2019 framework
  • Concepts and benefits of IT governance.
  • Relationship between stakeholder needs and governance.
  • The benefits resulting from the use of COBIT®.
  • Recognize the context, benefits and main reasons why COBIT®2019 is used.
  • The key attributes of the COBIT® 2019 framework.
  • The format and the COBIT® 2019 product architecture.
  • Product family.
  • COBIT® and other standards: differences and complementarities.
The principles of COBIT® v2019
  • The principles of the governance system.
  • The principles of the governance framework.
The governance system and its components
  • Governance and management objectives.
  • The components of the governance system.
  • The areas of intervention.
  • The design factors .
  • Areas of interest.
  • The 11 design factors.
  • Cascading objectives.
243
Governance and management objectives
  • Zoom in on the core of the model.
  • Relationships between objectives.
  • Objective descriptions.
Performance management
  • Definitions and principles of performance management.
  • Skill levels versus maturity, capability versus maturity.
  • Process performance management.
  • Management of other components of the governance system.
Adapted governance system
  • The impact of design factors.
  • Design a suitable system.
  • Introduction to the COBIT® business case.
Implementing corporate governance in IT
  • Purpose and scope of the implementation guide.
  • Implementation life cycle.
  • Relationships between the implementation guide and the design guide.
Review and certification
  • Revision of the COBIT® v2019 program. Foundation.
  • Mock exam and collective correction. Tips for the exam.
  • The exam is a 120-minute multiple choice , comprising 75 questions. A minimum score of 65% is required to pass the exam.
244

Introduction to Cisco IOS Network Security Training V3.0

★★★★★

  • SII-37
  • 5 Days (35 Hours)

Description

At the end of the Cisco security training, trainees will be able to: Describe the components of network security strategies that can be used to counter threats against IT systems, in a context of service continuity Develop and implement security measures that protect network and infrastructure elements Deploy and maintain threat controls and threat mitigation and detection technologies for the security perimeter in small and mid-sized networks.

Who is this training for ?

For whom
This seminar is aimed at network administrators, technicians and engineers.
245
Prerequisites

None

Training objectives

This Cisco Security course will help participants understand the need to apply security policies in networks
They will be able to improve tasks to secure networks using security features available in IOS (Cisco Router, SDM, Command Line Interface)
The course also covers Cisco Asa equipment

246

IS Architect certification cycle

★★★★★

  • SII-301
  • 12 Days (84 Hours)

Description

This training program provides the skills necessary to practice the profession of information systems (IS) architect. It presents the technical-functional standards of new architectures and emphasizes the urbanization of IS and the implementation of a service-oriented architecture (SOA). Finally, this cycle ends with a specialized module in the use of the TOGAF® standard.

Who is this training for ?

For whom

IS architect, project manager, project director, IS manager and anyone wishing to discover how to develop and manage the architecture of an information system.

247
Prerequisites
  • Good knowledge of technical infrastructures (operating systems, databases, networks, etc.) and basic knowledge of architectures (services, servers, connections, flows, etc.)

Training objectives

  • Understand key concepts and the basics of IS architectures
  • Evaluate the challenges of urbanization the generic model and general approaches
  • Understand the components and layers of a SOA architecture
  • Develop an IS architecture with TOGAF
  • Know how to manage an IS architecture

248

Training program

Founding principles of IS architectures
  • Web technologies, Web 2.
  • 0 and the new HMI.
  • Architectures: from centralized server to n-tier architectures.
  • Presentation of JEE and .
  • NET.
  • The Open Source alternative.
  • Principles of IS urbanization.
  • Integration-oriented architectures and Web Services.
  • Principles of an EAI (Enterprise Application Integration).
  • Traditional integration application interfaces.
  • Management content and documents (WCM, GED, WDM).
  • Mobility: decryption of actors, technologies and uses.
  • Web infrastructure and operation: Cloud, performance, SEO, SEM.
  • E-Business standards.
  • History.
  • Standardization attempts (BPSS, cXML, xCBL, Pharma ML.
  • ).
  • Principles of service-oriented architectures.
249
Urbanization, generic model and general approaches
  • The challenges of urbanization.
  • Mastery and increasing complexity of information systems, the company in an ecosystem.
  • The emergence of best practices , the example of ITIL® and TOGAF®, contribution to IT governance.
  • General presentation of the generic model and general approaches
  • The layered organization of the IS.
  • IS urbanization approaches.
  • Managing the complexity of existing heritage.
  • Urban planner, architect, expert.
  • What role, what positioning, what know-how?
  • Metaphor of the city, cartography and modeling.
  • The four layers of IS: Business, Functional, Application and Infrastructure.
  • Manage the company's urbanization project.
  • Roles and responsibilities of the actors (MOA/MOE).
  • Modeling tools.
  • Synthesis of market tools.
  • Examples of tools.
250
SOA, service-oriented architecture
  • Presentation of a SOA architecture.
  • Components and layers of a SOA architecture.
  • Services and processes.
  • The service concept.
  • Service exposure, loose coupling, synchronism vs asynchronism.
  • Technical aspects of a SOA architecture.
  • Implementation of Web Services (JEE, .
  • NET, PHP, etc.
  • ).
  • XML Foundations.
  • XML Schema for Interoperability and the description of application data.
  • Description of services with WSDL.
  • Invocation with SOAP.
  • SOA design methodological approach.
  • The links between SOA and the object approach.
  • The different approaches and metamodels (RUP, PRAXEME, etc.
  • ).
  • Conceptual model of an SOA.
  • The modeling of services within the application architecture with UML.
  • SOA: market players and products.
  • Platforms EAI.
  • SOA orchestrators.
  • Platform providers.
251
Develop the IS architecture with TOGAF®
  • TOGAF®: essential concepts and method for developing an IS architecture.
  • The business continuum and TOGAF® tools.
  • Governance of the enterprise architecture.
  • TOGAF® and the ISO 42010 standard.
  • The reformulation of the enterprise strategy and the business architecture.
  • Reference business models and business processes.
  • Business objects and data architecture.
Manage IS architecture with TOGAF®
  • Technical architecture and its stakeholders.
  • Technical architecture and its meta-model.
  • Applications/services, functions and components.
  • Use architecture, organize IS governance.
  • IT architecture and project/service portfolio management.
  • Architecture and information system security.
  • Architecture and outsourcing strategy.
  • Corporate architecture and strategy.
252

Urbanization and architecture of information systems (integrate IT into company strategy)

★★★★★

  • SII-361
  • 3 Days (21 Hours)

Description

The evolution of information technologies and the rapid development of services on the Web have driven new approaches allowing the implementation of flexible, scalable architectures, capable of satisfying the agility needs of the company. How to undertake an urbanization process? How can we take advantage of the contributions of new service architecture concepts? These are the challenges of the urbanization of information systems. This seminar presents the approaches and concrete methodological benchmarks for dealing with them.

Who is this training for ?

For whom

IS managers, functional or technical, wishing to understand the urbanization of information systems in a concrete way.

253
Prerequisites

None

Training objectives

Establish the essential notions of IS urbanization
Specify the architect's offer within the company
Know and evaluate the tools, methods and standards of IS urbanization
Know how to model the company and its IS
Providing the keys to the success of an IS architecture project

254

Training program

Architecture essential notions and IS issues
  • Point on IS architecture.
  • Findings and promises.
  • Architecture and mastery of concepts: taxonomies, terminologies, ontologies.
  • Role and importance of standards.
  • Information systems, purposes: value creation, agility.
  • Links between concepts: architecture, quality of information systems and value.
  • From IS architecture to enterprise architecture.
  • Architectural patterns.
  • IS issues: complexity, changes, knowledge management , business ontologies, digital business.
  • Exchanges Exchanges on the essential notions of an IS architecture in the digital age.
255
Enterprise architecture, a response to this problem
  • French and Anglo-Saxon approaches.
  • Urbanization (Sassoon, Longépé), BSP (IBM), taxonomies of plans (Zachman).
  • Objectives and general principles of enterprise architecture.
  • Skills, missions, training, certifications of the enterprise architect.
  • Expected deliverables, performance indicators.
  • Agile methods (Scrum, RUP) and the role of the architect.
  • References: urbanization of IS, TOGAF and its derivatives (FEA, DODAF, MODAF, NAF).
  • International standardization, ISO42010: objectives and requirements.
  • The new paradigm: service and service architectures (SOA, ITIL, ISO20000).
  • The basic building blocks of SOA and the OASIS ontology.
  • Evaluation of benchmarks: towards a Blended Method.
  • Certify your architecture.
  • Architecture and maturity of companies.
  • Urbanization offer.
  • Exchanges Exchanges on the need to integrate IS architecture into business architecture.
256
Methods and tools
  • The principles and different approaches.
  • Analytical and systemic approach: contributions and limits.
  • Systemic approach as the preferred method of the urban planner.
  • Models and modeling: relationship between model and language, main stages of the process.
  • Models, abstractions, representations (diagrams, boxes, graphs), canonical models.
  • Geographical systems and cartography of IS: rules and best expert practices.
  • Patterns and base maps: longépine pattern, SOA pattern.
  • Perspectives in terms of representation of IS (surface tactile, virtual universe, supervisor).
  • Development of a modeling language: composition of ontologies, meta-model, ideographic languages.
  • Sectoral models and standard solutions (eTOM, IAA, ERP, Core Banking).
  • Architecture development methods (ADM, Longépé, URBA/EA, Praxeme), populating CMDBs (TADDM).
  • Demonstration rnExamples of architectures from Longépée and/or derived from TOGAF.
257
Architecture illustrated layer by layer
  • Understand the sociological and business ecosystem (digital natives, cybersphere).
  • Understand conceptual and technological advances.
  • The evolution of information processing: Noosphere , (MDM, EAI, ESB, BIG DATA).
  • The evolution of business processes, services and infrastructures (SOA, BAM, SAM, PBM, Cloud).
  • Points of view and illustrated views: general management, marketing, BU, Data, techniques.
  • Construction and consistency techniques.
  • Modeling of the strategic environment (Porter) - Strategy and tactics capture (SWOT, CFS, KPI).
  • Business modeling (Porter, Hamel and Prahalad).
  • Representations of the real world (MCD, objects, objects) connected, flows).
  • Modeling of the effort: processes and services (BPMN, SOA).
  • Representation of the infrastructure (Supervision, Openview, Tivoli) - CMDB (Taddm ).
  • Exchanges Exchanges on the particularities of each layer of an IS architecture.
258
Architecture, an essential tool for governance
  • Definition of governance and related issues.
  • Architecture, an essential tool for ensuring security and governance of the company.
  • L architecture and regulatory constraints in the US and France.
  • Architecture within governance standards and frameworks (Cobit, ITIL, ISO 20000).
  • Architecture and project management: importance of PBS and multi-project management.
  • Demonstration Demonstrations on the contribution of IS architecture to IS governance.
Succeed in your architectural project
  • Main risks and key success factors.
  • The organization of IS and Business co-evolution (Sponsor, Architecture Board, RACI).
  • The choice of tools constituting a Blended Method and a repository.
  • The modeling tools (panorama, issues, benefits and limits).
  • The implementation plan.
259

New information systems architectures

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

The information system constitutes an essential support for the company. It must be able to adapt to business changes, it must allow users to move around in complete security, it can be hosted in the cloud in order to facilitate its maintenance... This seminar presents the different IS architectures as well as their problems.

Who is this training for ?

For whom

IT management. Functional management. User project manager. Technical Project Manager/Director. Technical architect.

260
Prerequisites

Basic knowledge of technical architectures.

Training objectives

Discover the different types of information system architectures

Understand the challenges of the main developments in IS architectures

Evaluate the positioning of key market players

Understanding the foundations of IS urbanization

Define a strategy to evolve the technical architecture of the IS

261

Training program

Introduction to IS architectures and principles of IS urbanization
  • Market history, positioning of players.
  • Technical architecture today, roles, challenges.
  • What is urbanization? Mapping the existing system.
  • Define the target IS.
  • Who are the stakeholders? What are the deliverables?
  • What management structure? What approach? Maturity, integration, costs, risks.
  • Feedback from the field.
  • Convergence plan: cultural shift for the company and the IT department.
262
Web architectures: the fundamentals
  • Web technologies.
  • Birth of the network, technical heritage, contributions of architectures and functional constraints.
  • TCP/IP, HTTP/HTTPS, HTML5, CSS3, JavaScript.
  • The fundamentals.
  • Architectures: from centralized server to n-tier architectures.
  • The client, the application servers, the connected and disconnected mode.
  • The notions of context, transaction, middleware, components, objects.
  • Where is the Java EE architecture today And tomorrow?
  • Presentation of the architecture.
  • NET.
  • The Open Source alternative: the philosophy, the benefits, the risks.
  • The platform PHP.
  • Exchangesv Exchanges on the choice of an Open Source strategy.
263
Integration-oriented architectures
  • Why are integration issues more organizational and functional than technical?
  • Principles of an EAI (Enterprise Application Integration).
  • The architecture of an EAI (Workflow, BPM, messaging, connectors, etc.
  • ).
  • Asynchronism as an architectural principle.
  • ETL, beyond decision-making!
  • Market tools, the offerings of major publishers and specialists.
  • Exchanges Exchanges on the role of ETL.
264
Service Oriented Architectures (SOA)
  • What is a service?
  • Differences between managers and brokers.
  • Service orchestration.
  • Transactional aspects.
  • Loose coupling and its four dimensions.
  • Security, supervision and maintenance.
  • Application examples.
  • ESBs ( Enterprise Service Bus): SOA convergence? EAI, a sustainable architecture model?
  • Web Services.
  • Concept and associated standards (SOAP, WSDL, WS-*).
  • Develop and deploy Web Services.
  • The essential Pivot format in an integration project.
  • Positioning of the main market players.
  • Exchanges Exchanges on the problem of defining services.
265
Architectures Cloud
  • Cloud (SaaS, PaaS, IaaS), virtualization.
  • The SaaS (Software as a Service) vision: architectures for customer service.
  • The Cloud: the models of the main players: Amazon, Microsoft, Google, OVH, etc.
  • What benefits?
  • Major advantage: scalability.
  • The success of SaaS for CRM and collaboration.
  • Impact on deployment.
  • Organizational impacts.
  • Performance: Backend, Frontend, CDN.
  • Exchanges Exchanges on how to choose a Cloud strategy
Mobile Terminals
  • Players and market.
  • How many platforms to favor?
  • Operating systems and supports.
  • Technologies, native development vs. Framework.
  • Uses, equipment, networks, trends.
  • Types of applications: native, web and hybrid.
  • Exchanges Native application or Web application ?
266
Conclusion
  • How to reduce adoption time?
  • Success factors in terms of technical architecture.
  • Expected developments.
  • Comment organize your technological watch?
267

Analysis of the value of information systems

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This seminar will teach you how to implement a consensual design approach between the different stakeholders in an IT project, such as project management, project management and users, in order to optimize the value of the information system created. Indeed, the value of an information system is defined as the ratio between its capacity to satisfy the real needs of users and its cost. Value analysis is an approach that makes it possible to optimize this ratio from the upstream phases of projects and in the development of project portfolios. This seminar will present in detail the methodological tools to implement this approach, explaining its profitability and its limits.

Who is this training for ?

For whom

This seminar is aimed at all stakeholders involved in the design of information systems: CIOs, directors and project managers, project owners, project managers and users.

268
Prerequisites

No special knowledge.

Training objectives

At the end of the training, participants will be able to:

  • Understand the particularities of a value analysis approach applied to information systems
  • Identify the French and European standards linked to this approach
  • Master the main methodological tools to conduct a value analysis
  • Discover the key concepts of functional needs analysis
  • Implement a value analysis approach to optimize the value of information systems

269

Training program

The specificities of the “Value Analysis” approach
  • Definitions: value, functional analysis, value analysis, value management.
  • French and European standards.
  • The specificities of the approach: design in a facilitated multidisciplinary group.
  • Design in view of costs and dissociation by services provided.
  • The complete costs of computer systems.
  • The complete costs of information systems.
  • The structure of the value analysis process.
Basic concepts of functional needs analysis
  • Analysis of the causes of gaps between the expression of user needs and their actual needs.
  • The concepts and vocabulary of functional analysis.
  • Service functions, their natures, their levels.
  • Constraints.
  • Rules for the expression of service functions.
270
The service function tree
  • The service function tree, analysis grid in terms of a tree of services provided.
  • The key element of the entire design process.
  • The rules for constructing the tree of functions.
  • The tools to help develop the tree: diagram of the surrounding environment, matrix of interactors.
  • Function analysis by element, intuitive search, function validation.
Expected performance of service functions
  • The criteria for assessing the performance of functions, with their levels and the associated flexibility.
  • The negotiation of expected performances.
  • The tools to help the assessment of expected performance.
  • The recurring costs of the existing system, the issues that can really be mobilized.
  • Prioritization of service functions.
  • The acceptable levels of recurring costs and investments by service function.
271
The search for conceptual solutions
  • Conceptual solutions, upstream of techniques.
  • The principle of structuring systems through performance and associated tools.
  • Methods of group creativity.
  • The search for conceptual solutions by service function.
  • The combination of ideas.
Measuring the value of systems
  • The instantaneous measurement of the value of a system.
  • The instantaneous measurement of the increase in value provided by a project or a set of projects.
  • Relationship between service functions and solutions.
  • Satisfaction level of expected performance per service function.
  • Investment and recurring gain per service function.
  • Correlations with the relative importance of each service function.
  • The evolution of value over time: evolution of overall satisfaction with expected performance and ROI.
  • The use of value measurement tools as arguments and decision aids.
272
The process of conducting a project value analysis
  • The stages of the value analysis process on a project.
  • The tools used and the distribution of roles in each stage.
  • The deliverables.
  • The application of the method to software package choices and technical overhauls.
Conducting a Master Plan Value Analysis
  • Analysis of the causes of discrepancies between the priorities given to projects and their actual priorities.
  • The process of selecting and planning a portfolio of projects.
Implementation of the approach
  • The rules for the constitution of the working group and the choice of participants.
  • The techniques for leading value analysis groups.
  • The complementarity with IT project management methods.
  • The impact of the approach on project costs and deadlines.
  • The costs generated, costs, deadlines, and profitability of the approach itself.
  • The use of the tools of the approach in a personal working method as a project manager.
  • The conditions for success.
  • Case study The approach and the main methodological tools will be illustrated by real cases.
273

Master the complexity of IS, standards and methods

★★★★★

  • SII-43
  • 2 Days (14 Hours)

Description

How to master the complexity inherent in information systems? What are the benchmarks and methods that can be used? This seminar aims to present a summary of the techniques, methods and tools that make it possible to control this problem.

Who is this training for ?

For whom
Information systems directors, information systems architects (all specialties). Any IT manager of both project management and project management.
274
Prerequisites

None

Training objectives

275

Training program

Concepts and definitions
  • Knowledge management.
  • Standardization - The Dublin Core Metadata Initiative.
  • Concepts relating to systems and their modeling.
  • Architecture Development Language and UML.
  • Semantic Web.
276

TOGAF® 9.1 Training Program - Part 1 Foundation, cert ification

★★★★★

  • SII-361
  • 3 Days (21 Hours)

Description

TOGAF® certification training recognizes the skills and expertise of IT architecture professionals. It provides a basic level of knowledge on TOGAF concepts and methodology for designing and maintaining an enterprise architecture.

Who is this training for ?

For whom

Architects, managers, leaders and members of architecture programs, all those involved in architectural projects or wishing to have an initial understanding of TOGAF® concepts.

277
Prerequisites

No prerequisites for this training. However, an initial knowledge of enterprise architecture is recommended.

Training objectives

This training will allow participants to:

  • Understand the place of TOGAF in the landscape of existing architecture benchmarks
  • Become familiar with the different artifacts recommended by TOGAF to describe architectural elements
  • Acquire notions of architectural governance
  • Understand the architecture maturity model and its evaluation criteria
  • Prepare for and pass the TOGAF Foundation level certification

278

Training program

The objectives and added values ​​of Enterprise Architecture
  • Definition and reasons for Enterprise Architecture.
  • The main standards.
  • Positioning of TOGAF.
TOGAF® 9.1 modules.
  • TOGAF and its developments.
  • Overall vision of TOGAF.
  • Modular structuring.
  • Roles, dependencies and objectives of modules.
  • Summary.
Details of the content repository and its meta-model
  • Objects and relationships of the meta-model by architectural domain.
  • Meta-Model - Core and extensions.
  • Typology of artifacts and deliverables.
  • Notions of Building Blocks of architecture and solutions.
Architecture governance
  • The different levels of governance.
  • Architectural principles, the notion of contract.
  • Architectural governance process.
  • Use of the ADM.
  • The architecture committee.
279
The phases of ADM
  • The different phases.
  • Requirements management.
  • Description of objectives, input and output elements.
  • Diagram artifacts, catalogs and matrices.
  • Artifacts recommended by TOGAF to describe architectural and solution elements.
ADM processes and tools
  • Architecture rules.
  • Stakeholder management. Business scenarios.
  • Gap analysis. Migration planning techniques.
  • Architecture patterns. Interoperability requirements.
  • The Business Transformation Readiness Assessment.
  • Risk management.
  • Capability-Based Planning.
  • The notions of views, points of view and stakeholders.
The capacity and maturity model
  • The 6 levels of maturity.
  • The 9 evaluation criteria and their content by level.
280

TOGAF® 9.1 Training Program Certified, certification part 2

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

The “Certified” certification level is today the most recognized for acquiring practical TOGAF®9.1 mastery. This training aims to put the principles and concepts of the framework into practice and to prepare for the TOGAF®9.1 Certified certification.

Who is this training for ?

For whom

Architects, managers, leaders and architectural program members, all those involved in architectural projects.

281
Prerequisites

Be TOGAF®9 Level 1 certified

Training objectives

TOGAF9
1 Certified training aims to put into practice the principles and key concepts of the TOGAF®9
1 standard and to prepare for the TOGAF®9
1 Certified certification

282

Training program

The content repository and its meta-model
  • Objects and relationships of the meta-model by architectural domain.
  • Meta-Model - Core and extensions.
  • Typology of artifacts and deliverables.
  • The notions of Building Blocks of architecture and solutions.
The Architecture Development Method (ADM)
  • Introduction to ADM.
  • Preliminary Phase and Requirements Management.
  • Phase Details.
  • Business Architecture.
  • IS Architecture.
  • Technological Architecture.
  • Opportunities and Solutions.
  • Migration Planning.
  • Governance of implementation.
  • Architecture Change Management.
283
ADM processes and tools
  • Architectural rules.
  • Stakeholder Management.
  • Business scenarios.
  • Gap analysis.
  • Migration Planning Techniques.
  • Architectural Patterns.
  • Interoperability Requirements.
  • Business Transformation Readiness Assessment.
  • Risk management.
  • Capability-Based Planning.
  • Notions of Views, Points of View and Stakeholders.
The business continuum and the Architecture framework
  • Structuring the Business Continuum.
  • Continuum architecture and solutions.
  • Objective and content of the architecture framework.
  • Use of the Enterprise Continuum in ADM.
  • Architecture Partitioning.
  • Architecture Development Tools.
284
TOGAF®9.1 Reference Models - TRM and IIIRM
  • The TOGAF® 9 Architecture Base.
  • 1.
  • The Technical Reference Model (TRM).
  • Its adaptation.
  • Components of the Integrated Information Infrastructure Reference Model (III-RM).
  • Detailed view of the III-RM.
The Governance of Architecture
  • The levels of governance.
  • The principles of architecture, the notion of contract.
  • Architecture governance process.
  • Use of the ADM.
  • The architectural committee.
The Capacity and Maturity Model
  • The 6 levels of maturity.
  • The 9 evaluation criteria and their contents per level.
285

Create a microservices architecture in Java

★★★★★

  • SII-46
  • 5 Days (35 Hours)

Description

Microservices architectures have many advantages but require great maturity in development, deployment and maintenance practices in operational conditions. In this training, you will implement the essential technologies to build such an architecture.

Who is this training for ?

For whom
Developers and architects.
286
Prerequisites

None

Training objectives

Define a microservices-based architecture
Develop and consume REST services
Implement microservices using a Java framework
Deploy microservices in Docker containers
Administer and monitor microservices

287

Training program

Introduction
  • A look at software and organizational evolution.
  • Advantages and disadvantages of monolithic applications.
  • Agile methodologies and DevOps practices.
  • Processes continuous integration and continuous deployment.
Microservice architectures
  • Definition of a microservices architecture.
  • Characteristics of microservices.
  • The emergence of microservices architectures.
  • The main players.
  • Some examples of Web giants.
Communications in a microservices architecture
  • Choice of collaboration style: REST request/reply vs Publish-Subscribe Messaging.
  • Basic principles and HTTP callbacks.
  • Implement REST services with Java.
  • The HATEOAS principle.
  • Document a REST service with Swagger.
  • Test a REST service.
  • Practical work rnDefining a Rest API with Swagger and implementing services with Jersey.
  • Testing a REST service with SoapUI.
288
Develop a microservice in Java
  • Presentation of "all-in-one" Java Frameworks.
  • Comparison between SpringBoot and Dropwizard.
  • Develop an application with Dropwizard or SpringBoot.
  • Package a production-ready application.
  • Practical work Develop an application with Dropwizard or SpringBoot.
Run a microservice using containers
  • Introducing Docker.
  • How containers work with Docker.
  • Design custom images.
  • Set up and start containers.
  • Practical work Creating a custom container with Docker.
Deploying a microservices architecture
  • Deployment optimization techniques.
  • Implement a multi-container application with Docker Compose.
  • Infrastructure solutions for microservices (Kubernetes, Mesos , Swarm).
  • Cloud solutions (Cloud Foundry, Heroku).
  • Practical work Implementation of a multi-container architecture with Docker Compose.
289
Administration et Monitoring
  • Centralization of logs.
  • Monitoring microservices.
  • Metrics and Health Check.
  • Practical work Implementation of metrics of an application to visualize them.
290

Talend Open Studio for ESB, service integration, routing and mediation

★★★★★

  • SII-340
  • 3 Days (21 Hours)

Description

This training will allow you to get to grips with the Talend Open Studio for ESB development environment. Its features will allow you to quickly design loosely coupled integration solutions based on message exchange, web services, intelligent routing and data transformation.

Who is this training for ?

For whom

Developers, project managers, software architects.

291
Prerequisites

None

Training objectives

Design data integration jobs using XML feeds and databases
Develop SOAP and REST web services
Create Camel routes leveraging a wide variety of protocols
Leverage key enterprise integration design patterns (EIP)
Deploy web services and routes on Talend ESB runtime (karaf) and audit their activity

292

Training program

Introduction: ESB and Service Integration
  • Service integration technologies: MOM, JCA.
  • Mediation and intelligent routing.
  • Expected functionalities of an ESB.
  • Practical work Installation/configuration of Talend Open Studion for ESB, verification of correct operation.
Price en main de Talend Open Studio for ESB
  • Functionalities and architectural components.
  • Main design elements of a TOS job.
  • Reminders about XML: XSD schema and validation.
  • Learning the tXmlMap component.
  • Design of data integration jobs, export and deployment on the Talend ESB runtime.
  • Produce logs.
  • Exercise Store a multilevel XML flow in the base, reconstruct it from the elements present in the base.
293
Design SOAP and REST web services
  • SOAP service versus REST service.
  • Creation/import of WSDL, uploading schemas to the repository metadata.
  • Design of jobs implementing SOAP services.
  • Design of jobs implementing REST services.
  • Simple orchestration of Web services.
  • Deployment on the Talend ESB runtime: export.
  • kar and activation of services.
  • Testing correct operation via SoapUI.
  • Exercise Development of CRUD in the form of SOAP and REST services.
Connect to existing systems
  • The Apache Camel infrastructure (message, endpoint.
  • ).
  • The Mediation perspective: graphical editor and palette of EIP components.
  • Overview of messaging-oriented components: File, FTP, CXF, JDBC, SEDA, Timer.
  • JMS: producer/consumer and point-to-point models.
  • Design of routes using different protocols.
  • Route testing locally, deployment on the Talend ESB runtime and activation.
  • Exercise Transfer files locally and via ftp , carry out broadcasts by email and via JMS.
294
Dynamic routing and transformation
  • Carry out routings based on the content of messages and the execution context.
  • Enrich the content of messages via calling a service and/or accessing a database.
  • Adapt the message format and protocols.
  • Manage exceptions thrown by routes.
  • Exercise Implementation of the VETRO pattern.
Using infrastructure services
  • Administer the Talend ESB runtime via the karaf console.
  • Audit activities (data services, routes).
  • Manage security.
  • Maintaining the availability of services.
  • Exercise Implement an automatic failover strategy on a Web service.
295

Talend Open Studio for Data Quality, manage data quality

★★★★★

  • SII-48
  • 2 Days (14 Hours)

Description

This course will teach you how to effectively use the Talend Open Studio for Data Quality tool to evaluate the level of data quality in an information system. You will implement analyses, verify business rules and define correction strategies for erroneous data.

Who is this training for ?

For whom
Business analysts, data integrators, data managers.
296
Prerequisites

None

Training objectives

Connect to data sources, produce statistics, identify data to profile
Choose the different types of indicators and analyzes adapted to the data to be monitored
Implement complex analyzes to verify business rules
Define strategies for correcting erroneous data via Talend Data Integration jobs

297

Training program

The problem of data quality
  • Evaluation of the data quality of an information system.
  • Fundamental criteria: completeness, precision and integrity of data.
  • Product positioning Talend Open Studio for Data Quality in the Talend suite.
  • Practical work Product installation, configuration of preferences.
The fundamental concepts of TOS for Data Quality
  • Metadata: connections to databases, delimited files and Excel files.
  • Presentation of the different types of analyses.
  • Tools and indicators to help with carrying out analyses.
  • The data explorer.
  • Practical work Perform a first column analysis on data from a csv file, exploitation of the results obtained.
Simple analyzes
  • Duplicate search, respect of interval constraints, date format, email.
  • Table metrics, functional dependencies between columns.
  • Identification of value redundancies.
  • Consistency checks between foreign and primary keys.
  • Use indicators, models, rules and source files.
  • Practical work Carry out an analysis of each type on a set of partially erroneous data.
298
Advanced analytics
  • Analysis of schema and table structure via the data explorer.
  • Multi-table and multi-column analysis, compliance with business rules.
  • Search and visualization of correlation between columns.
  • Create your own indicators and source files.
  • Manage analyses.
  • Practical work Create a complex business rule involving several tables and associate it with a task.
  • Publish the rule in the Talend forge.
Advanced elements
  • Use context variables.
  • Create models based on regular expressions.
  • Export/import analyzes and analyzed data.
  • Correct erroneous data with Talend Data Integration.
  • Practical work Configure metadata and analyzes using context variables, export analyzed data to correct them in Talend Data Integration
299

Big Data And Hadoop

★★★★★

  • SII-304
  • 2 Days (14 Hours)

Description

Hadoop is certainly the Open Source technology today most closely associated with volume data management and so-called Big Data applications.

Who is this training for ?

For whom

Any person interested in Big Data And Hadoop

300
Prerequisites

None

Training objectives

Understand Big Data and its challenges - Know how to deploy Hadoop and its ecosystem
Understand HDFS, MapReduce
Structure data with HBase
Write queries with HiveQL
Launch an analysis with Pig

301

Training program

Explain the fundamentals of Apache Hadoop, Data ETL (extract, transform, load), data processing using Hadoop tools
302
Performing data analysis and processing complex data using Pig
  • » Network architectures and technologiesOperator networks.
  • Access networks.
  • High speeds.
  • Triple/quadruple play.
  • xDSL, EFM solutions.
  • Techniques.
  • Cable.
  • Optical local loop.
  • Emergence of radio networks: Wifi, WiMax, Mesh, WiGig.
  • Cellular telephone networks: EDGE, UTMS, HSDPA.
  • 4G and 5G.
  • Local mobile networks.
  • Wifi (802.
  • 11 a/b/e/g/n), Bluetooth (802.
  • 15), ZigBee and UWB, Wifi Hostpot.
  • Local network architecture.
  • Cabling.
  • Network technologies: Switching, routing and label switching (Ethernet, IP, MPLS) .
  • Internet routing (intra-domain and BGP).
  • QoS: DiffServ model.
  • IP telephony and video.
  • Content distribution networks (CDN) and
  • P2P networks.
  • Virtual networks.
  • SDN solutions and their advantages.
  • Network Function Virtualization (NFV).
  • OpenFlox and OpenStack.
  • Mobility: moving the workstation.
  • Managing network mobility .
  • Handover, roaming and mobility management.
  • WIMAX 802 networks.
  • 16IP Mobile and cellular mobility, .
  • Evolution of the architecture and protocols of the Internet.
  • IPv6, ambient Internet, vehicular networks, etc.
  • Synthesis: interaction between networks and applications.
  • Traffic.
  • Metrology.
  • Perspectives.
303
Perform data management and text processing using Hive Extending, troubleshooting, and optimizing Pig and Hive performance
Analyze data with Impala
  • .
Comparative study of MapReduce, Pig, Hive, Impala, and Relational Databases
304

Fortigate Security – Infrastructure

★★★★★

  • SII-414
  • 5 Days (35 Hours)

Description

This FortiGate security and infrastructure training will provide you with all the knowledge related to Unified Threath Management (UTM) on the same platform. The “security” part will provide you with knowledge of practices related to general rules for management and protection against malware. The “infrastructure” part will allow mastery of the advanced architectural functions of FortiGate.

Who is this training for ?

For whom

Network engineers/administrators and technicians and anyone involved in the design of network and security architectures based on FortiGate hardware.

305
Prerequisites

Basic knowledge of IT security as well as good knowledge of TCP/IP.

Training objectives

Deploy the appropriate operating mode for your network (proxy, flow, NGFW, etc.)
Use the graphical and CLI interfaces jointly for administration
Control network access to networks configured using security policies fire
Apply port forwarding, source Network Address Translation (NAT), and destination NAT
Authenticate users using firewall policies
Understand encryption features and certificates
Decrypt SSL/secure traffic TLS in order to inspect it
Configure security profiles to neutralize threats and abuse
Apply network application control techniques
Use standard or non-standard protocols and ports
Fight against hacking and denial of service ( DoS)
Collect and interpret items collected in logs
Identify Fortinet Security Fabric characteristics
Analyze a FortiGate routing table
Route packets using static routes and rule-based routes
Deploy load-balanced multipath
Split FortiGate into two or more virtual devices
Configure virtual domains (VDOM)
Understand the fundamentals and benefits of using ZTNA
Offer SSL VPN for secure access to your private network
Establish an IPsec VPN tunnel between two FortiGate devices
Implement a mesh or partially redundant VPN
Diagnose failed IKE exchanges
Provide Single Sign-On (FSSO) access to network services by leveraging access to Microsoft Active Directory (AD)
Deploy FortiGate devices in high availability cluster
Improve fault tolerance and deliver high performance
Deploy SD-WAN virtual interface
Implement dynamic flow distribution based on measured performance on member interfaces
Diagnose and fix common problems

306

Training program

Safety - Introduction and Initial Settings
  • High-level features.
  • Initial decisions.
  • Basic administration.
  • Basic maintenance.
Security - Firewall Policy
  • Configuring policies.
  • Managing policies.
  • Best practices and troubleshooting.
Security - Network Address Translation
  • Introduction.
  • Policy-backed NAT versus central NAT.
  • Best practices and troubleshooting.
Security - Firewall authentication
  • Firewall authentication methods.
  • User groups.
  • Firewall rules with authentication.
Security - Logging and monitoring
  • Log basics.
  • Local or remote logging.
  • Logging settings, searching logs.
  • Protecting logs logging data.
307
Security - Certificate Operations
  • Authenticate and secure data using certificates.
  • Inspect encrypted data.
Security - Web filtering
  • Inspection modes.
  • Web filtering basics.
  • Additional proxy-based web filtering features.
  • Video Filtering.
  • Best practices and troubleshooting.
Security - Application Control
  • Application Control Basics.
  • Configuring Application Control.
  • Logging and Monitoring Application Control Events.
Security - Antivirus
  • Fundamentals.
  • Scan modes.
  • Antivirus configuration.
Security - Intrusion prevention
  • The intrusion prevention system.
  • Denial of service.
308
Security - Security Fabric
  • Safety fabric concept.
  • Deployment.
  • Expand the safety fabric.
  • Safety fabric rating system and view of the topology.
Infrastructure - Routing
  • Routing on FortiGate.
  • Routing Monitoring and Routing Attributes.
  • Equal Cost Load Sharing.
  • Test Reverse Path Forwarding (RPF), fight against address spoofing.
  • Link health probes and route toggle.
  • Diagnostics.
Infrastructure - Virtual Domains
  • VDOM concepts.
  • VDOM administrators.
  • Configuring VDOMs.
  • Inter-VDOM links.
  • Best practices and troubleshooting.
309
VDOM concepts. VDOM administrators. Configuring VDOMs. InterVDOM links. Best practices and troubleshooting.
  • Function and deployment.
  • FSSO with Active Directory.
  • Tuning and troubleshooting.
Infrastructure - Zero Trust Network Access (ZTNA)
  • Introduction.
  • Comparing ZTNA to IPsec and SSL VPNs.
Infrastructure - VPN SSL
  • Deployment modes.
  • Configuration.
  • Monitoring and troubleshooting.
Infrastructure - IPsec VPN
  • Introduction.
  • Configuration.
  • Routing and firewall rules.
  • Redundant VPNs, mesh VPN.
  • Monitoring, logging.
Infrastructure - High availability
  • Active/passive versus active/active operating modes.
  • HA cluster synchronization.
  • HA failover.
310
Infrastructure - SD-WAN
  • Motivation, dynamic flow distribution.
  • Implementation.
  • Performance probes.
  • SD-WAN rules.
Infrastructure - Diagnostics
  • General.
  • Stream debugging.
  • CPU and memory.
  • Firmware and hardware.
311

CAPM

★★★★★

  • SII-50
  • 3 Days ( Hours)

Description

Certified Associate in Project Management or CAPM is a certification in project management, whose accreditation program is managed by the Project Management Institute (PMI)

Who is this training for ?

For whom
Future project manager , beginner project manager, project manager . Member of the project team, people regularly involved in project design . Anyone to assume project management functions . Any actor in projects wishing to prepare for CAPM certificationt.
312
Prerequisites

None

Training objectives

define a work plan and acquire the key points of the areas and process personal work with coaching on the areas and processes covered by the PMBOK Deepen knowledge and prepare for the exam Deepening of processes Intensive training tests and exercises on the X-AM CAPM exam simulator

313

Training program

Project Integration Management
  • Project Scope Management
Project Schedule Management
Project Cost Management
Project Quality Management
Project Resource Management.
Project Communications Management
Project Risk Management
Project Procurement Management
  • Project Stakeholder Management
314

Manage an IT project, development

★★★★★

  • SII-51
  • 2 Days (14 Hours)

Description

Managing a project requires first of all mastering the techniques and basic rules of the project manager profession. But this first approach is supplemented by a practical, even opportunistic approach, which must integrate the different components, act and decide proactively.

Who is this training for ?

For whom
This course is aimed at IT project managers, user project managers, project owners who want to learn more about the "Managing an IT project" course (ref. GPI).
315
Prerequisites

Knowledge of basic IT vocabulary.


Training objectives

Build and present the budget for your project
Anticipate hazards on the project using the monitoring dashboard
Advance the planning of your project within constraints
Build a motivating system of objectives and productivity measurement
Manage discrepancies by now a common vision

316

Training program

Budget and profitability of the project
  • Building a Business Case: the information system delivered by the project, its risks and its gains.
  • Justify the cost of the project: cost of the investment, calculation of ROI.
  • Report expenses: simply measure costs and justify them.
  • Living with an evolving forecast: approach changes in needs and platforms as a constant.
  • Dashboards for monitoring developments.
  • Case study Build and present a project budget and the associated reporting dashboard.
  • Predict and manage development requests.
Deadlines and decision
  • Optimization under deadline constraints: reconciling realism and respect for objectives, building a project.
  • Know how to present your project (defend it).
  • Progressive and adaptive planning.
  • The progressive definition of feasible and motivating objectives, the measurement of productivity.
  • Monitoring deadlines and decisions: the operational choices of the Productivity triptych, Quality and Deadlines.
  • Case study Adapt a project plan to an external deadline constraint.
  • Build the schedule for a phase.
  • Face a difficult situation and defend your solution.
317
Lead a team towards project objectives
  • Welcome and motivate: know your collaborator, define the rules with them, establish your authority.
  • Conflicts and divergences: tensions due to project constraints, imprecision of roles or to personalities.
  • Productivity, quality, deadlines and convergence.
  • The notion of common vision, its practical reality.
  • Case study Internal resources and external resources, choice and harmonization.
  • The integration of a specialist.
  • An observation of a drop in productivity.
Win with business
  • Capturing real needs: difficulties in expressing users, lack of knowledge of the subject by the project.
  • Communicating a vision in the company: knowing how to state this early and realistically. what will be the IS delivered by the project.
  • Manage change: set up permanent monitoring of foreseeable deployment difficulties.
  • Help the company to take ownership of the results of the project.
  • Case study On a case study, the trainees address the concrete questions asked to the project manager.
  • Their proposals are compared to the rules and recommendations of the standards project management.
318

Lead and motivate your IT project team

★★★★★

  • SII-52
  • 3 Days (21 Hours)

Description

Beyond the skills of manager and organizer, the IT project manager must be able to energize, motivate and lead his team around a common objective. This internship will allow you to acquire the know-how and interpersonal skills essential to succeed in this mission.

Who is this training for ?

For whom
Any IT project manager responsible for supervising his team.
319
Prerequisites

None

Training objectives

Carry out a self-assessment of your own managerial style
Develop the skills matrix for your project
Master the verbal and non-verbal in your communication
Prepare and conduct a delegation interview
Master the essential techniques for motivating your team
Apply conflict resolution and reframing techniques

320

Training program

Reconcile the roles of project manager and project team leader
  • Know the role and mission of the project manager.
  • Understand his managerial style.
  • Define the characteristics of a project team and understand its dynamic.
  • Differentiate between individual objectives and Project objectives.
  • Become aware of your powers and responsibilities.
  • Find your place in the organization.
  • Exercise: Questionnaire on your management style.
  • Exchange of experiences.
Build and organize your project team
  • Map the required skills and integrate the skills development of individuals.
  • Negotiate resources with your hierarchy and subcontractors.
  • Involve the team in the construction of the schedule.
  • Define meeting times and their contents: project team meeting, progress meeting.
  • Learn to lead effective meetings.
  • Exercise: Team meeting scenario.
  • Developing a skills matrix.
321
Communicate effectively
  • Be aware of the framework of your communication, set realistic and measurable objectives.
  • Assert yourself in your communication.
  • Act your presence through posture, gaze, gestures.
  • Control your emotions and manage your stress.
  • Listen actively.
  • Enter the " map of other ".
  • Master communication.
  • Deal with rumor, withholding information.
  • Exercise: Active listening, priority matrix .
  • Communication situations followed by debriefings.
322
Master daily relationships
  • Maintain daily relationships.
  • Identify and manage conflictual relationships.
  • Know how to say no.
  • Argument.
  • Respond to objections.
  • Integrate new employees, define their missions.
  • Delegate and control.
  • Manage, integrate difficult employees .
  • Reframe gaps.
  • Scenario Delegation interview.
  • Resolving a conflict.
Motivate your project team members
  • Identify and concretize motivation factors.
  • Share your vision and values, give meaning.
  • Unify the teams dispersed on the project.
  • Maintain team cohesion and involvement throughout the project.
  • Collective reflection Identify the causes of demotivation and motivation.
  • Implementation in situation: motivational interview, give signs of recognition.
323

Project management, moving effectively into iterative mode

★★★★★

  • SII-53
  • 3 Days (21 Hours)

Description

The move from a predictive process (V-shaped cycle) to an iterative process seems essential today to respect the "time to project". This course will teach you how to manage an IT project according to an iterative cycle with the unified process (UP) through practical cases and feedback from successful experiences.

Who is this training for ?

For whom
IT project managers and any actor with a role in project management.
324
Prerequisites

None

Training objectives

Identify the main artifacts of the unified process
Carry out an overall estimate of a project with the use case method
Evaluate the project scope and risks in the inception phase
Define the requirements forming the content of the first iteration
Implement progress estimation methods, during the construction
Test phase and deploy the application and capitalize on project experience

325

Training program

The life cycle of a project
  • The different life cycles.
  • The V-shaped or waterfall cycle.
  • Agile methods: the main principles.
  • Collective reflection The role of project manager.
  • The factors of success or failure.
The Unified Process (UP)
  • The 9 disciplines: business modeling, requirements, analysis and design, implementation.
  • The 4 phases: inception, development, construction and transition.
  • Iterations: the representativeness of the 9 disciplines within each iteration evolves over time and phases.
  • The instantiations of UP (OpenUP, RUP, EUP, AUP.
  • ).
UP best practices
  • Iterative development.
  • Requirements management.
  • Change management.
  • Improvement and control continue.
  • The UP artifacts.
  • Exercise: Identification of the main artifacts by discipline by browsing the "OpenUP" framework.
326
La phase d'inception
  • Define the scope of the project.
  • Identify risks.
  • Methods for estimating the load (macro-estimates): function points, planning poker .
  • Break down and plan the project (phases and WBS).
  • Case study Identification of the scope and risks (risk table).
  • Macro-costing of the project (calculation using the Use Case method).
  • Production of the phase plan and the WBS of the project.
The development phase
  • Iteration and team management.
  • Define the content of an iteration.
  • Define and validate the architecture.
  • Specify 80% of the requirements.
  • Setting up the environment (development, configuration and testing).
  • Case study Definition of the content of the an iteration.
327
The construction phase
  • Minor clarification of requirements.
  • Manage and test changes.
  • Track and report project progress.
  • Deepening the notion of progress, notion of "earned value".
  • Preparation for deployment.
  • Case study Putting into practice several estimation methods progress (S-curve or Earned Value method)
The transition phase
  • Test and evaluate the beta version.
  • Deploy the application for acceptance and production.
  • Train and transfer skills.
  • Capitalize, project feedback.
  • Practical work Construction of an action plan: good practices to implement on your projects.
328

Supporting change to succeed in your IS projects

★★★★★

  • SII-297
  • 2 Days (14 Hours)

Description

This course presents the methods to apply and the actions to carry out to successfully implement an IT project. It proposes a participatory approach capable of fully involving all stakeholders and facilitating organizational developments.

Who is this training for ?

For whom

Any person who must play a role in supporting change associated with an Information System project.

329
Prerequisites

None

Training objectives

Establish a change management strategyChoose, justify and organize a deployment method
Organize migration operations
Identify the workforce to be trained and organize their skills development
Create the project communication plan

330

Training program

Problematic
  • Definition and origin of change management.
  • Actors, resistance to change.
  • Technology acceptance model (TAM).
  • Actors in change management.
  • Levers of change (communication, participation, experimentation, migration, dissemination, documentation, training).
  • Strategy.
  • Objectives.
  • Risk factors/success.
331
La communication
  • Define the strategy.
  • Describe the objectives.
  • Determine the timing of actions.
  • Plan communication actions.
  • Build the communication plan.
  • Carry it out, monitor it, develop it.
  • Identify and involve the different stakeholders.
  • Adjust according to the progress of the project.
  • Coordinate communication with the life cycle of the project.
  • Mistakes to avoid.
  • Indicators of monitoring and dashboard.
Participation
  • Involve users to facilitate appropriation.
  • Use of UML as support for training and user documentation.
  • Participatory approach.
  • JRP technique.
  • Real-scale simulation.
332
Experimentation
  • Check suitability for needs, proper functioning, reliability.
  • The objectives of the experiment.
  • Implementation: actors and roles, pilot sites.
  • Measure the results of the study.
Site organization
  • Organize the implementation in the sites to be deployed.
  • Define the actions to be carried out and the necessary materials.
  • Equipment: inventory of needs, specifications, orders, installation.
Migration
  • Data required for startup.
  • Problem.
  • Actions to carry out.
  • Strategy.
  • Define, plan, execute and monitor the migration plan.
Diffusion
  • Strategies and deployment assistance.
  • Planning and monitoring.
  • Impact on training and migration.
333
User documentation
  • The operating procedure.
  • Writing, content.
  • Online help.
  • Design and create the help .
334

Planning and monitoring of IT projects

★★★★★

  • SII-55
  • 3 Days (21 Hours)

Description

Even for a modest-sized project, as a project manager you must control deadlines and be accountable for the use of resources and the allocated budget. Defining the optimal schedule for a project, being able to monitor its progress and providing key performance and progress indicators will be one of the keys to the success of your project. Through this internship, you will learn to control and communicate on the "cost, deadline, resources" parameters of the project in order to support the decisions of the steering committee.

Who is this training for ?

For whom
User project manager, IT project manager, project owner.
335
Prerequisites

None

Training objectives

Represent dependencies between tasks to define the PERT network Realize the association of resources with tasks and optimize their distribution in the Gantt chart Translate the project schedule into cost Calculate project progress indicators and analyze them Use MS-Project to enter and track project data

336

Training program

Basic planning process
  • Breaking down the project into tasks (WBS: Work Breakdown Structure).
  • Scheduling or highlighting the connections that exist between the different tasks of a project.
  • Types of links, lead and delay, earliest and latest dates, calculation of free and total margins.
  • Representation of task scheduling constraints: PERT method approaches and Gantt.
  • Optimization of the task sequence to minimize the critical path.
Introduction to MS-Project
  • Initializing a project.
  • Presentation of the working environment. How to personalize it?
  • Current views.
Construction of the Gantt chart and allocation of resources
  • Understand the equation Work (Load) - Unit (Nb of resources) - Duration.
  • The association of resources with tasks.
  • Calendar and availability of resources on the project.
  • Types of resources (human, material).
337
Optimize planning and manage costs
  • Audit resources.
  • Leveling or how to reduce the number of parallel paths.
  • Smoothing to optimize the use of resources.
  • Understand the task types (capacity/duration/fixed work) and MS-Project calculations.
  • Management by resources or by duration in MS-Project.
  • Management by resources or by duration in MS-Project.
  • Translation of resources into costs.
  • Define and manage costs: from offer to budget.
Monitoring and controlling the progress of the project
  • The different methods of project management (by deadlines, by charges, by costs).
  • Physical progress indicators of the project: utilization coefficient, speed and performance .
  • Progress of batches, evolution of remaining charges.
  • Economic indicators Project: CBTP, CBTE, CRTE.
  • Activity and progress reports.
  • Construction of the project dashboard: choosing the right indicators.
  • How to highlight relevant project data project with MS-Project?
  • Use progress reports in MS-Project, view resource usage and track project costs.
  • Data analysis and processing hazards during the project. The project triangle.
338
Multi-project planning and monitoring
  • The justification for dividing it into sub-projects.
  • The project division axes: Products (PBS), Activities (WBS), Resources (RBS).
  • Inter-project planning constraints, shared resources.
Collaborative work and multi-project management with MS-Project
  • Input of information by resources, consolidation in MS-Project by the project manager.
  • How to carry out updates? The roles of the project manager and sub-project managers project managers.
  • Multi-project management with MS-Project, main project and sub-projects, shared resource files.
  • Consolidated projects and component projects.
  • Why and how to link projects?
  • Operating principle of MS-Project Server: presentation of the major functionalities.
339

Estimated costs and deadlines for IT projects

★★★★★

  • SII-56
  • 2 Days (14 Hours)

Description

More than half of IT development projects exceed estimated budget and deadline limits. This internship will provide you with a set of know-how, derived from real experiences, to identify as accurately as possible the costs and deadlines to be expected and improve the reliability of estimates.

Who is this training for ?

For whom
Anyone involved in IT projects: project manager, project manager, developer, etc.
340
Prerequisites

None

Training objectives

Identify all costs in the context of software package development Practice several cost estimation methods Implement criteria for weighting the estimates made Discover best practices for estimating deadlines Build a data repository for future estimates

341

Training program

Introduction to the problem
  • Have an idea of ​​the workload and deadlines of a project.
  • Can we trust estimation methods?
  • Exchanges on real situations.
Types of estimates
  • The case of V-cycle projects, rapid development (RAD), Agile methods.
  • Estimates in the context of software packages.
  • Collection charges and analysis of needs, definition of specifications, acceptance, deployment, training.
  • Development tasks: Web interface, Windows client, processing... Unit tests.
Cost estimation methods
  • Expert judgment methods (Delphi...).
  • Analogue methods: extrapolations based on experience.
  • Algorithmic methods. COCOMO method, the sources delivered, loads per phase.
  • Function point method.
  • Analytical methods or based on charts.
  • Parametric methods. Merise and UML, determination of the weight of data groups.
  • Ten parameters method Estimation with Planning Poker.
Estimated deadlines
  • The trap of applying a rule of three.
  • The perfect square.
  • Boehm formulas (COCOMO).
342
Weight the estimates
  • Taking risks and reserve periods into account.
  • Weightings: optimistic, realistic, pessimistic.
  • Weighting criteria.
The distribution of burdens between the actors
  • Distribution of charges between project management and project management on a project.
  • Distribution of MOE charges.
Synthesis
  • How reliable should we give to the estimates?
  • Constitution of a benchmark. Updating the charts.
343

Master the function point method

★★★★★

  • SII-57
  • 1 Days (7 Hours)

Description

During this internship, you will learn to use the function point method to evaluate the size of software and thus be able to estimate the effort necessary to develop and maintain it. You will also see the strengths and limitations of this method compared to measuring by the number of lines of code.

Who is this training for ?

For whom
Anyone involved in the functional estimation of an IT project.
344
Prerequisites

None

Training objectives

Define the fundamentals of the function point method
List the function points of a program
Cypher the complexity of a program

345

Training program

General presentation of the function point method
  • The origin of the function point method and issues.
  • Function point method vs. line of code method.
  • Fundamentals: the components to estimate (GDI-GDE-ENT-INT-SOR).
  • Taking into account the complexity of the components.
  • Use, distribution, IFPUG certification.
Definition of scope
  • Application boundaries: definition of the scope of the domain.
  • Relationships between the domain studied and the users.
  • Relationships between the domain studied and interchanges -areas.
Data encryption and complexity determination
  • GDI: internal data group.
  • GDE: external data group.
  • DE: elementary data; definition and concept.
  • SLD: logical subset of data.
  • GDR: reference data group.
  • Special cases.
346
Costing of treatments and determination of complexity
  • ENT: inputs (Input, Update, Deletion).
  • SOR: outputs (Screens, Lists, States).
  • INT: queries .
  • Special cases: drop-down lists, calculations, searches, controls.
Weighting of function points
  • The reasons for weighting.
  • Weighting criteria and degree of influence.
  • Transition from gross counting to net counting.
Synthesis
  • Summary of the approach.
  • Points of attention and limits of the method.
  • Accounting for a functional evolution.
  • Take taking into account new components.
  • Presentation of tools.
  • Recommendations.
  • Evaluations of the participants' performance.
  • Interest of the capitalization of the results obtained.*
347

Properly structure your software projects, processes and documents

★★★★★

  • SII-58
  • 2 Days (14 Hours)

Description

This internship will present you with a set of good practices based on the definition of structured and reusable processes and deliverables. It will teach you how to formalize the different phases and expected results of a project.

Who is this training for ?

For whom
User project manager, MOE project manager and any actor with a role in project management.
348
Prerequisites

None

Training objectives

Understand the different project life cycles and their advantages and disadvantages
Master the major stages of the life of a project, in the different project modes
Understand the content and frequency of the different ceremonies of a project
Validate the quality and completeness of a project's deliverables
Follow the different quality processes inherent to any project

349

Training program

Organizational processes
  • Management and organization.
  • Quality management: benchmarks and measures.
  • Risk management: risk assessment file.
  • Dashboards: measurement, measurement results.
  • Knowledge management: knowledge record.
  • Process improvements: process performance record.
  • Establishment: process file.
  • Evaluation: evaluation report.
Horizontal processes
  • Documentation: documentation file.
  • Configuration: standard configuration sheets and configurations file.
  • Quality assurance: quality assurance file.
  • Verification and validation: conformity evaluation grids and acceptance sheets.
  • Acceptance reports.
  • Cross-review: report and implementation plans actions.
  • Audit: audit grid, audit report, recommendations.
  • Problem resolution: cause graph and action plans.
  • Usability: process performance record.
350
Engineering process
  • Project stages: life cycle architecture, internal and external factors.
  • Input/output components and components to be produced at each stage.
  • Preparation and planning: Quality assurance plan, Project plan, Development plan.
  • Specification: requirements specifications and needs definition file.
  • Design: general design file and detailed design file.
  • Construction: programming file, unit test file and test book, anomaly sheets.
  • Integration: design file integration tests and validation test file.
  • Operation: installation file and maintenance file, maintenance request forms.
Project management approach
  • Organization in project mode.
  • Issues and risks of the software project; actors, roles and responsibilities.
351

IT project management

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

Managing an IT project involves a pragmatic approach to the project, the ability to manage complex and heterogeneous environments, and mastery of management techniques and tools. Based on observed good practices and current benchmarks (PMI, CMMI), this seminar offers concrete responses to the three imperatives of projects, control of cost, deadline and quality. It also demonstrates the critical role played by the project manager by emphasizing the importance of communication, change management and leadership in his mission.

Who is this training for ?

For whom

Project managers who are beginners or have initial experience and who want to deepen all facets of their role.

352
Prerequisites

None

Training objectives

Define the essential elements for starting a project
Understand the techniques and tools for leading an IT project
Discover recognized good practices in project management
Evaluate the role played by the project manager following companies
Know how to manage costs, deadlines and risks
Define the importance of communication, change management and leadership

353

Training program

Project review and summary
  • Stop a project "on time": indicators and rules.
  • Know how to transmit it to the Production, Support or Maintenance departments.
  • The contribution of ITIL®.
  • Administrative closure of the project.
  • Project reports, capitalization and dissemination of experience.
  • Synthesis of best practices of IT project management.
Lead change
  • Analysis of change (processes, actors, culture and organization).
  • Identify levers and resistance.
  • Managing change.
  • Definition of a change management plan.
  • Basic rules for IT professionals in their relationship with users.
Management of external services
  • Legal framework.
  • Objectives and stages of implementation, specifications, contract, means of control and reception.
  • Technical and contractual monitoring of the service provider.
  • Personnel delegation: the use of flat-rate technical assistance.
  • Integrating technical assistance employees.
354
Operational management of the project
  • Choice of reporting mode in teams.
  • Problem of analyzing deviations, law of 90%.
  • Project progress indicators .
  • Continuous estimation of "Remaining to be done".
  • Financial indicators.
  • EVM (Earned Value Management).
  • Project manager dashboards, indicators to monitor, the contribution of the BSC.
  • Project committee, steering committee, technical meetings, reviews.
  • Management of crisis.
  • Process for managing developments, its sizing, its implementation.
  • Management of anomalies: rules.
  • Optimize recovery and anticipate.
355
The challenges of transversal management, leadership
  • Lead without hierarchical power.
  • Relationships with hierarchies.
  • Involve the company's management in your project.
  • Management
  • Know how to challenge a part-time participant from another department.
  • Work in multidisciplinary teams , despite "cultural" differences.
  • Case of multi-site projects, use of remote working tools.
  • Collaborative tools.
Organize team management
  • Structuring teams: setting up, training, integrating employees, managing their departure.
  • Identify individual skills and motivation of employees.
  • Assign work: define, challenge, verify and validate the agreement.
  • Control deadlines and results.
  • Create team performance, work under deadline pressure.
  • Rules to accelerate team development and cohesion.
  • Take a decision as a team.
  • Manage conflicts and negotiate, principles and rules .
356
Project communication
  • Identify the communication "targets", the stakeholders, the actors involved, the operational units.
  • Rules of good communication.
  • Management of the message and the interlocutors.
  • Phases and tools of communication Project, the communication plan.
  • Planning tools for communicating.
Control deadlines and risks
  • Define the list of works, common errors, rules.
  • Work planning: rules for constructing a PERT.
  • Work plan team load.
  • Load estimation techniques.
  • Cost estimation.
  • Time management on the project: all the means and tools management strategies.
  • Simultaneous management of several projects.
  • Identify and evaluate the impact of project risks.
  • Provide a risk management dashboard .
357
The essential elements for starting a project
  • Upstream of the project, the "business case", value analysis, ROI or added value.
  • Mission letter from the project manager or how to establish its legitimacy and its role.
  • Project Plan: choice and implementation of processes and rules on the project.
  • How does the project fit into the standards and company standards? Determine the Quality factors of the project, the associated Quality means and measures.
  • Adapt the project plan to the nature of the project (development, integration, implementation of software package, deployment.
  • ).
IT project management
  • Recognized findings, good practices and project.
  • Roles: project management and project management, user project manager, IT project manager.
  • Project approaches: sequential, incremental, evolutionary.
  • Expected skills of the project manager, the knowledge areas of the PMI, the evolution of the profession.
  • Role of the project manager project following the companies.
  • Specificities of the philosophies of agile projects.
  • Murature level of the company (CMMI reference framework).
  • Success criteria of a project: determine, validate and monitor over time.
358

Control your IT project contracts

★★★★★

  • SII-60
  • 2 Days (14 Hours)

Description

The IT project is no longer reduced to a contract for carrying out specific developments. It presents new risks, multiple facets and requires an adapted legal approach. This seminar proposes to outline the broad outlines on the basis of real-life experiences.

Who is this training for ?

For whom
Project management, project management (DSI, DI, project manager), purchasing management of intellectual services, legal management.
359
Prerequisites

None

Training objectives

Understand the guiding principles of an IT contract
Understand the pre-contractual phase
Master the framing, drafting and conclusion of the contract
Lead the execution and end of the IT contract

360

Training program

The end of the IT contract
  • rnPeaceful end: resolution, termination or expiration.
  • Contractual dispute management mechanisms.
  • IT litigation: termination or resolution before the judge.
  • Premeditated exit from contract.
  • Transaction.
  • Reversibility.
  • Passing of the baton.
  • Guarantee, plan, price of reversibility.
361
Drafting and concluding the contract
  • Technical, legal and financial parts.
  • Powers: apparent mandate, representation of company law.
  • Third parties: subcontracting, beneficiaries, others .
  • Contractual architecture and IS governance.
  • Applicable law.
  • Exchange of consents.
  • Principle of consensualism.
  • Defect in consent.
  • Conditional commitments: desired effect.
  • Purpose of the contract and scope of the project.
  • Nature of the services: consistency with the 'object.
  • Duration as a negotiating lever.
  • Intellectual property.
  • Contractual management, transfer of rights, licenses, guarantees.
  • Contractual fault and obligation of means/result.
  • Clauses limiting or exonerating liability.
362
The framing of the contract with regard to the constraints of the project
  • Framework and "sequencing" of discussions, following the service provider selection stage.
  • Definition of an appropriate contractual structure.
  • Tools for double legal and financial reading of the main clauses of the contract.
  • Distribution of responsibilities and main indicators for contract management and monitoring.
363
The pre-contractual phase
  • Expression of needs/regulations/standards.
  • Constraints.
  • ERP approach.
  • Global integration project .
  • Service levels expected from outsourcing.
  • Offer to contract: the commercial proposal.
  • Acceptance of the offer: express/tacit: pitfalls.
  • General conditions: enforceability.
  • Revocation of the proposal.
  • Distinction between public contracts and private contracts.
  • Choice of service provider and the legal prerequisites.
  • Pre-contractual negotiation.
  • Pre-contracts.
  • Protecting the company's know-how.
The IT contract for what reality?
  • The operational reality: diversity of projects.
  • The search for a contractual balance around the issues and constraints to avoid certain errors.
  • A context omnipresent and structuring regulatory framework.
364

IT multi-project management

★★★★★

  • SII-61
  • 3 Days (21 Hours)

Description

When projects in a company are numerous, interpenetrate and involve players from different professions, it becomes imperative to put in place appropriate management. Planning, establishing the roles and responsibilities of each person, arbitrating and communicating are the keys to multi-project management.

Who is this training for ?

For whom
Project managers, department managers in charge of several projects, members of steering committees, managers or members of the Project Management Office.
365
Prerequisites

None

Training objectives

Calculate financial indicators in order to select and prioritize projects Organize and subdivide projects taking into account constraints between projects Adapt project monitoring in a multi-project context Resolve inter-project conflicts Understand the principle of multi-project planning and monitoring solutions, from selection to reporting

366

Training program

Tools for multi-project management.
  • Summary of the possibilities of MS Project in multi-project management.
  • Main project and sub-projects.
  • Resource sharing.
  • Summary tasks.
  • Project Server, multi-project planning and monitoring solution.
  • The roles and settings in this type of solution.
  • L organization of information flows on projects.
  • Tools for the qualification and selection of projects.
  • Project performance analysis, arbitration.
  • Capitalization on projects.
  • Practical work Demonstration of tools for multi-project management.
The multi-project dashboard
  • Define multi-project dashboards.
  • Techniques and examples.
  • Exchanges between levels.
  • Decisions (steering committee) .
  • Prepare dashboards for the steering committee.
  • Practical work Create a dashboard for reporting for pilots.
367
Monitor the progress of projects, replan
  • Reminders on monitoring indicators: committed, necessary to finish, gaps, forecasts.
  • Adaptation of monitoring in multi-projects.
  • Impact of slippages.
  • Management of planning modifications.
  • Budget monitoring.
  • Practical work Produce a summary of the progress of the projects according to the workload plan and the declarations of progress on shared resources.
  • Calculation of budgetary monitoring indicators.
368
Optimize multi-project management
  • Build teams, clarify roles and contributions.
  • Obstacles to planning.
  • The different sources of conflict.
  • Optimize the management of resources and time.
  • The myth of the man x months.
  • Motivate the actors.
  • Solidarity between projects.
  • Search for synergy and balance between projects.
  • The basics of multi-project communication.
  • Scenario setting From problematic situations (diverging interests , critical resources etc.
  • ), take action to resolve them.
369
Plan in multi-projects
  • Reminder on planning techniques.
  • Four-level planning system.
  • Use key parameters in multi-projects.
  • Assign resources.
  • Practical work Establish a project plan for a program, taking into account phasing and inter-project constraints.
  • Argument two possible scenarios.
  • Review resource allocation.
Structuring prior to multi-project management
  • The "clients" of the multi-project management system.
  • The role of the Project Management Office.
  • The different types of organization.
  • The objectives: load/capacity adequacy, monitoring of costs and deadlines.
  • Standardization of monitoring.
  • Structuring projects: phases, activities, deliverables.
  • Harmonize schedules, cost and resource categories.
  • Role of the Project Management Office.
  • Practical work Identify the projects and necessary resources.
  • Carry out the phasing of projects, constraints between projects.
370
The challenge of working in multi-projects
  • Reminders on project management The different types of project.
  • Possible optimizations: deadlines, products, resources.
Align strategy, economy and projects
  • Understand the company's strategy.
  • Position each project in relation to the strategy.
  • Selection of projects.
  • Define priority criteria between several projects.
  • Types and techniques for choice criteria: strategic alignment, financial, risks.
  • Financial criteria: Return On Invest, Expected Monetary Value .
  • Typology of profit objectives.
  • Evaluate costs, revenue.
  • Calculate parameters.
  • Classify projects and select them.
  • Practical work Return on investment calculations for projects.
371

MS-Project Server, installation et administration technique

★★★★★

  • SII-326
  • 3 Days (21 Hours)

Description

This course will teach you to master the steps necessary for installing the Microsoft Project Server 2013 platform and connecting to an existing SQL server database. It offers a summary study of the functionalities necessary for implementation and technical administration.

Who is this training for ?

For whom

System administrators, database managers. This training is dedicated to anyone wishing to prepare for the implementation and technical administration of Project Server 2013.

372
Prerequisites

None

Training objectives

Understand the architecture of Project Server 2013 and the role of its different layers.
Install the SharePoint components necessary for the proper functioning of MS-Project Server
Install Project Server and create an instance of the Project Server 2013 application
Configure the various associated services (Analysis Services, BIS and Excel Services)
Configure the various client accesses (Project Professional 2013, Project Web Access, Outlook, etc.)
Carry out monitoring and administration of servers after installation

373

Training program

Administration technique
  • Event viewer, logs, and service management.
  • Creating additional instances of Project Server 2013.
  • Project services and the queue waiting.
  • Backups and restorations.
  • Management of the OLAP database.
  • Project site parameters.
  • Configuring alerts and reminders.
  • Considerations on the evolution of the solution (Service pack, Cumulative update.
  • ).
  • Exercise: Backup and restoring the server farm.
Customer access and testing
  • Project Professional 2013 client access configuration.
  • Exchange configuration for Outlook linking.
  • Settings for access to Project Web Access.
  • Considerations on possible tests before commissioning.
  • Exercise: Configuring rich and thin clients for connection to the server.
374
Post-installation tasks
  • Optimization of the farm.
  • Configuration for the Analysis Services cube.
  • Configuration of the secure information bank (BIS).
  • Configuring Excel and PerformancePoint Services.
  • Exercise: Configuring Analysis Services, BIS and Excel Services.
Installation de Project Server 2013
  • Installing the Project Server 2013 binary.
  • Installing language packs.
  • Installing updates.
  • Using the SharePoint 2013 configuration wizard.
  • Creating and configuring a new server farm.
  • Creating and configuring an instance of the Project Server 2013 application.
  • Exercise: Installing SharePoint and Project Server
Installation de SharePoint 2013
  • Using the wizard to install server prerequisites and roles.
  • Installing SharePoint Server 2010 binaries.
Preparing for installation
  • The necessary service accounts and security groups.
  • Preparing SQL Server and Analysis Services.
  • Exercise: Preparing the service, SQLServer, and Analysis Services accounts.
375
Introduction
  • Presentation of the Project Server 2013 architecture.
  • The different layers and their role in the architecture: database, application layer, rich and thin clients.
  • Link with Microsoft SharePoint Server 2013.
  • Deployment typologies.
  • Plan the installation.
376

Agile Scrum Method

★★★★★

  • SII-422
  • 2 Days (14 Hours)

Description

Who is this training for ?

For whom
377
Prerequisites

 

 

Training objectives

378

Training program

379

Agile Scrum method, improvement

★★★★★

  • SII-64
  • 3 Days (21 Hours)

Description

This course, based on practical exercises and examples, will allow you to analyze the situations experienced in the implementation of the Scrum method and to emphasize good practices. The different roles involved in Scrum will find concrete answers to the difficulties encountered.

Who is this training for ?

For whom
Scrum Master, Product Owner, developer, tester, any actor involved in an Agile mode project.
380
Prerequisites

None

Training objectives

Understand the roles and artifacts of the Scrum method
Clarify an expression of needs and define a "business value"
Define user stories and build a realistic product backlog
Improve in the daily management of the sprint
Train on agile planning situations
Equip yourself with tools and best practices to better estimate loads, and monitor the progress of the project in Scrum

381

Training program

Reminders on Scrum and Agility
  • Agility, another vision.
  • Roles and artifacts.
  • Meetings called "ceremonies".
  • Complementary contributions (Lean, XP.
  • ).
  • Collective reflection Exchange and sharing of experiences.
The activities of the Product Owner
  • Clarify the expression of needs.
  • Plan based on business value.
  • Accept or reject the product.
  • Study case study Analysis of the Product Owner's activities.
382
Organization and collaboration in a Sprint
  • Iteration planning.
  • Frozen content, change.
  • Prepare well and lead the Scrum Meeting so that it is effective.
  • Management of iteration by Kanban.
  • Review of self-organization, role of the Scrum Master.
  • Developments aligned with technologies rather than cases of use: task-story difference.
  • Presence of the functional representative, demonstration at the end of iteration.
  • Role of the Product Owner.
  • Improve the retrospective , make better use of sprint debriefs.
  • Scenario Exercises on several cases of anti-patterns observed.
Agile planning
  • The four levels (roadmap, version plan, .
  • ).
  • Basic principles.
  • Of the infernal triangle squarely virtuous.
  • Implement a viable rhythm for all.
  • How to react if the prioritization of User Stories does not take into account development constraints? Implementation situation Planning Game between Product Owner and Developer roles.
383
Other advanced points
  • Effort points vs H/J.
  • Planning Poker, estimation by similarity.
  • Estimate stories and features.
  • Tools for expressing needs, planning and visual management.
  • Reporting: Burndown, Burnup Charts, other indicators.
  • The application does not pass the tests.
  • Organization to fix bugs (Stop the line).
  • The four rules of simple design.
  • Test Driven Development.
  • Implementation situation Agile tools and practices.
384

★★★★★

  • SII-65
  • 4 Days (28 Hours)

Description

Who is this training for ?

For whom
385
Prerequisites

None

Training objectives

386

Training program

General presentation
  • Agile methods.
  • The positioning of XP.
  • XP objectives.
  • An evolution for driving of IT projects.
  • History.
  • Theory
387
XP coding best practices
  • Panorama.
  • Metaphors.
  • Coding conventions.
  • Using the Checkstyle tool.
  • Pair work.
  • Collective code ownership.
  • Simple, good design.
  • Design principles: KISS, Keep It Simple Stupid.
  • DRY, Don't Repeat Yourself.
  • YAGNI, You Aren't Gonna Need It".
  • Practical work Review code checked by Checkstyle.
  • Apply simple design principles.
388
The organization of production in eXtreme Programming
  • Continuous integration, a practice from eXtreme Programming.
  • Setting up a continuous integration server.
  • Regular deliveries .
  • Sustainable pace.
  • On-site client.
  • Practical work Install and use the integration server.
  • Calculation of team velocity to ensure regular deliveries.
389
» Testing with eXtreme Programming
  • Unit and functional tests.
  • Unit tests with JUnit.
  • Web functional tests with Selenium.
  • Business functional tests with Fit and FitNesse.
  • Refactoring.
  • TDD, test-driven development.
  • Definition and principles TDD, development cycle, test-driven documentation.
  • Practical work Refactoring of existing code.
  • Implementation of unit tests with JUnit.
  • Implementation of GUI tests with Selenium.
  • Implementing functional tests with FitNesse.
390
Manage your project with XP
  • Building a team.
  • Where to start? Expressing the need.
  • Designing the schedule.
  • The progress of the project: design, tests, deliveries, feedback.
  • Prepare and follow iterations.
  • Change management.
  • Communication.
  • Risk management.
  • Practical work Identification of user stories and definition of a schedule.
391

Information systems, for project management

★★★★★

  • SII-296
  • 3 Days (21 Hours)

Description

Aimed at project management and non-IT specialists, this course provides a comprehensive overview of the most recent methods in information systems. It notably analyzes the issues, methods, techniques and roles associated with the development of today's information systems.

Who is this training for ?

For whom

Project owners, user project managers, technical-sales personnel having to communicate with project management

392
Prerequisites

No special knowledge.

Training objectives

  • Specify the essential notions regarding information systems
  • Understand the principles of information systems development
  • Understand the roles associated with IS development
  • Discover the main tools, methods and techniques of IS development

393

Training program

Projects and information system
  • Architecture, components, management, standards.
  • The role of project management: expression of needs, validations, recipes, steering.
  • The cycle of life of a project: the definition, organization and result phases.
  • Standards.
  • Agile and iterative approaches.
  • Management risks.
  • How to identify, measure and anticipate risks?
The process approach - UML
  • The urbanization of processes.
  • Evaluate and improve.
  • Architectures: business, functional, application.
  • Unified Modeling Language.
  • Use in the field.
  • Use cases and other UML diagrams.
  • Scenarios to refine the analysis of the problem.
394
Modern distributed architectures
  • Internet developments.
  • Developments.
  • Protocols: messaging, forum, Web, directory.
  • The 3-tier architecture.
  • Browsers.
  • Trendy client technologies.
  • The rise of the rich client: Ajax, frameworks.
IS management: portals, integration, SOA
  • Characteristics of a portal.
  • EAI: utopia or axis of the future? The BPM approach.
  • SOA and XML service bus.
  • XML language: data structuring, inter-application exchanges.
  • XSL, DTD, XSD components.
  • Bizztalk Server, Streamserve engines.
395
The world of free software
  • The main software.
  • The sectors covered.
  • Security.
  • Sustainability.
  • Impact on positions work.
  • Linux.
  • Apache.
  • PHP, Eclipse, MySQL.
396
Development platforms
  • The platform.
  • Net from Microsoft.
  • Operation and implementation techniques (Framework, Enterprise Server, ASP.
  • Net, CLR.
  • ).
  • The Java Enterprise Edition (JEE) platform.
  • Java interfaces: JCA, JDBC, JMS, JNDI.
  • Applet, servlet, EJB.
  • SOAP and Web Services.
  • Application server offerings: IBM WebSphere, Weblogic, Oracle, JBoss, Tomcat.
  • Component-oriented AGL (Visual Studio, Eclipse.
  • ).
Security management
  • Electronic signature.
  • Encryption.
  • Firewalls.
  • DMZ.
  • Securing infrastructure protocols.
397
Business Intelligence et DataWeb
  • BI serving users.
  • The principles of multidimensional storage (MOLAP, ROLAP, HOLAP).
  • Decision modeling.
  • The tools.
398

Business Analysis, IQBBA Foundation, certification

★★★★★

  • SII-351
  • 3 Days (21 Hours)

Description

The "Business Analysis" or analysis of business requirements in the IQBBA certification covers all the tasks, knowledge, tools and techniques necessary to identify and formalize business needs, and be able to determine innovative IT solutions.

Who is this training for ?

For whom

Professionals in business process analysis, solution modeling: MOA, AMOA, Product Owners, product designers, architects, business analysts.

399
Prerequisites

Basic knowledge of software life cycle (information systems) specification and design

Training objectives

Be able to understand the discipline of "Business Analysis"
Know how to identify the business processes and stakeholders of an organization
Understand how to model a business requirement following an expression of need
Be able to define and validate a business requirements framework
Know the tools, techniques and methods for the business analyst
Have the necessary knowledge to pass the official IQBBA certification exam

400

Training program

Fundamentals of Business Requirements Analysis
  • Why is business analysis necessary? Definition and basic concepts.
  • The areas covered by "Business Analysis".
  • Role and responsibilities of the business analyst.
Business Analysis Process
  • Identification of stakeholders. Identification of business processes.
  • Business needs and definition of objectives. Business case definition.
  • Solution: definition, scope, scenarios.
The business analysis process
  • Communication with stakeholders.
  • Management of business analysis process requirements.
  • Change management.
  • Management tools 'support of the business analysis process.'}
Elicitation
  • Concept of business requirements elicitation. Positioning of business requirements -in a solution.
  • Traceability of business requirements. Documentation.
  • Communication on requirements. standards.
Analysis of business requirements
  • Modeling and specification.
  • Requirements and constraints.
  • Verification and validation.
  • Quality of business requirements.
401
Validation of the solution and improvement
  • Evaluation.
  • Validation of the solution.
  • Process improvement.
  • Simulation and re-design.
Support skills, tools and techniques
  • Analysis tools and support.
  • The main business analysis techniques.
  • Business skills.
  • Relational skills of the 'analyst.
  • Technical and animation skills.
L'innovation.
  • Role. Competitive analysis.
  • Innovative design.
  • Methods, tools and techniques.
  • Innovate with the end user.
402

REQB Requirements Manager, Advanced Requirements Manager certification (Syllabus V2 compliant certification)

★★★★★

  • SII-66
  • 3 Days (21 Hours)

Description

Mastering the requirements engineering process allows the customer to express what they want to do. This training, REQB accredited, will teach you to master Software Requirements Management to guarantee their quality and traceability. It will allow you to certify yourself as a “Requirements Manager”.

Who is this training for ?

For whom
Professionals in the activity of specifying software systems, project owners, project managers, testers, users.
403
Prerequisites

None

Training objectives

Know the best practices for managing the integrity of a requirements repository
Understand the activities related to Requirements Management
Understand the mechanism for managing and developing Requirements in a Software Product cycle
Master the Requirements Management activities

404

Training program

Basics of Requirements Engineering
  • Needs, problem and solution.
  • Constraints and requirements.
  • Requirements levels and classification.
  • Functional and non-functional requirements.
  • Requirements Engineering and Requirements Management.
  • Conditions of completion Illustrated reminders on the Foundation Level.
  • Typical exam questions.
Context of Requirements Management
  • Requirements Management Activities.
  • Requirements Engineering Processes.
  • Requirements Management and Related Processes: Management, Development, Deployment, Maintenance and Retirement of software.
  • Estimation, risk management.
  • Exercise: Conduct a simple risk analysis.
  • Typical exam questions
405
Requirements engineering processes and roles
  • Typology and role of actors.
  • Responsibilities, contract.
  • Knowledge and skills of a Requirements Manager.
  • Exercise: rnDiscuss the responsibilities of a requirements engineering professional.
  • Typical exam questions.
Requirements Management Activities in Practice
  • Requirements Planning.
  • Requirements Tracking: Characteristics, Supervision, Stability.
  • Change Management: Process, Request, Committee.
  • Configuration management and delivery.
  • Traceability and impact analysis.
  • Communication around requirements.
  • Capitalization and reuse for the process.
  • Exercise: Illustration of a requirements engineering process implementation and exchanges.
  • Typical exam questions.
406
Quality Assurance and Requirements Engineering Process Improvement
  • Quality Assurance: ISO 9001, TickITPlus, ISO 15504.
  • Maturity models: CMMI, SPICE, TickITPlus.
  • Example Examples of implementation of maturity module.
  • Typical exam questions.
Requirements management in practice
  • Software Product Life Cycle and Requirements Management: V and Agile.
  • Commercial Product and Requirements Management: Market and Customer products, Internal/outsourced product, critical product.
  • Case study Feedback in illustration.
  • Typical exam questions.
Requirements Management Tools
  • Reasons for using a tool.
  • Using a tool.
407

REQB Requirements Developer, certification

★★★★★

  • SII-67
  • 3 Days (21 Hours)

Description

Mastering the profession of requirements engineering allows you to express what the customer wants. This training, REQB Advanced Developer accredited, will teach you to identify and structure requirements, to formalize them to guarantee their quality and traceability.

Who is this training for ?

For whom
MOA, developers, testers of IT solutions.
408
Prerequisites

None

Training objectives

Know in depth the development of requirements (activities, actors, etc.)
Know in depth the principles and best practices of requirements management
Understand the use and advantages of techniques (elicitation, refinement, etc.)
Know the main functionalities of requirements repository management tools

409

Training program

Requirements Engineering Basics
  • Definition of the concept of requirement.
  • Necessity, constraints, problem and solution.
  • Classification and levels of requirements.
  • Requirements engineering process.
  • Business analysis and requirements engineering.
  • Requirements development.
The development of requirements with regard to its context
  • Requirements development activities.
  • Requirements development and other project activities.
  • Risks in requirements development.
  • Roles and responsibilities.
  • Requirements development tools.
  • Example Process illustration.
  • Tools demonstration.
410
Development of requirements in practice
  • Elicitation of requirements.
  • Analysis and negotiation around requirements.
  • Documentation of requirements: formalization, structuring, template.
  • Verification and validation: reviews, prototyping, validation models, customer acceptance.
  • Practical work Determination of a customer requirements framework based on a case study.
  • Implementation of elicitation techniques, analysis methods, prioritization and estimation.
Software solution and system modeling in practice
  • The 3 levels and the main notations: BPMN, UML, SYSML.
  • Use of models: links, advantages, disadvantages, completeness.
  • Modeling of a system according to the 4 views: Logic, Process, Implementation, Installation.
  • Use of models as support for communication to different stakeholders.
  • Practical work Description of a solution and a system.
Development of requirements in the project
  • The influencing factors of requirements development.
  • The product life cycle versus requirements development: different approaches (Sequential, COTS, Agile).
  • The development of requirements in a customer operational context (customized, standard, product lines).
  • Selection and implementation of requirements development tools.
  • Example rnIllustration and presentation of tools.
411
Passing the exam
  • Mock exam and correction.
  • Passing the official REQB Advanced Developer Requirements exam.
412

PowerDesigner, design a database

★★★★★

  • SII-301
  • 2 Days (14 Hours)

Description

During this internship, you will discover the major features of PowerDesigner. You will learn to build, formalize and maintain the models used to design a database (object-oriented model - UML, conceptual and physical model, dictionary, etc.).

Who is this training for ?

For whom

Designer and database administrator, developer analyst.

413
Prerequisites

No special knowledge. However, knowledge of a computer language is a plus.

Training objectives

  • Establish a data dictionary in PowerDesigner
  • Implement and verify a conceptual data model in PowerDesigner
  • Configure the rules for transforming the conceptual model into the physical data model
  • Generate the physical model of the data with PowerDesigner and analyze its result
  • Practice Reverse Engineering with PowerDesigner

414

Training program

Introduction
  • Presentation of PowerAMC.
  • The main functionalities.
  • The interface and the menus.
  • Practical work Getting started from PowerDesigner.
Data identification
  • Learn how to create a data dictionary.
  • Data description and controls.
  • How to define attributes? Practical work Analysis of documents and identification of the data contained.
  • Enter the selected attributes and the associated rules into PowerDesigner.
415
Semantic data modeling
  • The object-oriented model (OMO - UML class diagram).
  • Identification of classes, associations, constraints.
  • The approach to developing a model.
  • Normalization: the role of normal forms in understanding data.
  • The main concepts proposed by PowerDesigner.
  • The checks proposed.
  • The Conceptual Data Model (CDM).
  • Presentation of the concepts of the CDM by analogy and difference with the MOO.
  • Practical work Build a class diagram from the data dictionary.
  • Enter the result with PowerDesigner.
  • Carry out the proposed checks.
  • Generate the MCD with PowerDesigner and analyze the result.
Physical data modeling
  • Presentation of the rules for transforming a semantic model into a physical data model.
  • The main optimization rules.
  • How PowerDesigner generates a MPD? The generation of the corresponding SQL scripts.
  • Practical work Transform the semantic model into a physical model.
  • Generate the MPD with PowerDesigner and analyze the result.
416
Reverse Engineering
  • Presentation.
  • Reverse Engineering with PowerAmc.
  • Functions to create a MPD from an existing database.
  • How to generate an MOO or an MCD from an existing MPD? Practical work Add new attributes to a database.
  • Regenerate upstream models.
Conclusion
  • Presentation of PowerDesigner processing functions.
  • Other diagrams.
417

Economic and technical challenges of the testing professions

★★★★★

  • SII-321
  • 1 Days (7 Hours)

Description

Testing is used to improve the quality of the software. This seminar will present you with the essential elements to know to size a software testing project, and will allow you to identify the opportunity and the risk of such a project.

Who is this training for ?

For whom

Director of information systems, project management manager, anyone wishing to be involved in projects related to testing.

418
Prerequisites

None

Training objectives

Understand the role of testing in the software development process Discover the different families of tests and their purpose Follow the different phases of a functional validation process Know the key indicators of the cost and profitability of a test project Browse the advantages and disadvantages of test management solutions Understand the benchmarks and maturity models in force today for testing

419

Training program

History and definitions
  • Definitions.
  • Role in the software development process.
  • History of approaches.
  • Testing in the software life cycle: BOEHM model.
  • Roles on the project (MOA, MOE, acceptance team, users).
  • Different processes.
  • The Independent V&V.
  • Reviews, inspections.
  • Test families: unit, functional, base consistency, integration, load.
  • Non-regression tests.
  • Deliverables (specifications, specifications).
Test Opportunities Today
  • Why are tests necessary? Observations of the software testing situation.
  • Advancements and difficulties of testing projects.
  • Areas for improvement, factors for success.
420
Key elements of functional validation
  • The five foundations.
  • The recipe process.
  • The recipe plan.
  • Organization and follow-up.
  • Dataset management.
  • Test campaigns.
  • Recording results and anomalies.
  • The packaging and delivery.
  • Receipt clauses.
421
Costs and profitability of the test project
  • The validation team, the need for resources.
  • The professionalization of the tester profession.
  • Certifications (ISTQB.
  • ).
  • Estimated cost of tests by test family.
  • Costs and gains.
  • Costs and gains of non-regression.
  • Estimation of the cost of test maintenance.
  • TRA for test maintenance.
  • Offshore models.
  • Test profitability.
422
Testing approaches today
  • Criticality and confidence level.
  • The testability of an application.
  • The concept of test coverage.
  • The risk-based approach.
  • The contributions of Agile approaches (Scrum, XP.
  • ).
  • Test-Driven Development (TDD).
  • Process maturity (TMMI, Test Process Improvement, ISO/SPICE).
Test management solutions
  • Requirements and traceability managers.
  • Test repository managers.
  • Anomaly managers, principles and market solutions.
  • Cost of using the different tools.
  • Quantitative and qualitative gains.
  • Measurement of Return on Investment (ROI).
Synthesis
  • Success factors/failures.
  • Review of good practices.
  • Continuous improvement of the process.
423

Create a user guide for a computer application

★★★★★

  • SII-69
  • 2 Days (14 Hours)

Description

This internship will teach you to prepare, organize and write user guides for applications developed for the company. You will see how to select, organize and present the information to be transmitted as well as the good practices to adopt for the final publication of the document.

Who is this training for ?

For whom
This course is aimed at anyone who has to write an application user guide, in particular developers and project managers.
424
Prerequisites

None

Training objectives

Identify the objectives of the user guide and ask the right questions
Select the information to transmit
Organize the user guide
Present the information in a relevant way
Write and publish the user guide

425

Training program

Identify the objectives of the guide and ask yourself the right questions
  • The basic diagram of communication.
  • The specificities of written communication.
  • The uses of a user guide.
  • The target audience and their level of knowledge.
  • Methods of accessing the user guide.
  • The tools at our disposal.
  • The different possible formats.
Select the information to transmit
  • When to write the user guide?.
  • How to determine the information to transmit?.
  • How to work with test users?.
  • What is the process approach?.
  • What is the typology of users?.
Organize the user guide
  • The different possible plans.
  • Associate processes by user type.
  • Select important processes.
  • Use mind maps to organize your ideas.
  • Appendices and what to put there.
426
Present information in a relevant way
  • Use graphics and images.
  • Highlight important information.
  • Determine the essential, the useful and the accessory.
  • How to use the technology at our disposal?. -Include simulations or videos.
  • Layout the user guide.
Write and publish the user guide
  • Adapt your vocabulary to your interlocutors.
  • Know who you are speaking to.
  • Adapt the users' vocabulary.
  • Jargon, anglicisms and acronyms: how to avoid them or how to make them understood?.
  • The style of the user guide: simple style, short sentences.
  • Create tables to make it easier to use 'access to information.
  • Where and how to publish?.
  • Manage updates.
427

HP Unified Functional Testing, advanced automation programming and script editing

★★★★★

  • SII-324
  • 2 Days (14 Hours)

Description

Respecting the quality level of deliveries is essential in the application development cycle. In this internship, you will learn how to become an expert in test automation with HP UFT (formerly QTP). You will see in particular how to design scripts to manage your tests more precisely.

Who is this training for ?

For whom

Project managers, testers, validation managers.

428
Prerequisites

None

Training objectives

Handle a test in expert mode
Create steps in the progress of a test
Configure a test with complex data
Use functions and libraries to manage dynamic objects
Overload an object method with a method personalized
Create a test with personalized activities

429

Training program

Overview of advanced UFT features
  • Reminder on automation by keywords, principle and interest.
  • Expert-View: enrich your tests with the Script view.
  • Custom functions and libraries .
  • Unified view for GUI testing and API testing.
Expert View, working with objects
  • Reminder about VBScript: data types, variables and functions, operators, loops.
  • Comments.
  • Presentation of the editor, completion.
  • Replay a “saved” test in expert mode and modify it.
  • Work with object properties (GetROProperty).
  • Create steps.
  • Retrieve data from external sources.
  • Practical work Create a test, modify it in expert mode.
  • Create a test manipulating a Web table.
  • Use the Reporter to create steps.
  • Working with an XML file: configuring with complex data.
430
Expert View, use programmatic description
  • Using programmatic description for an object: principle and interest.
  • Description of static programmatics.
  • Description of dynamic programmatics.
  • Use Windows APIs.
  • Practical work Use programmatic description to manage dynamic objects.
  • Using the User32 library.
  • dll in a UFT script.
Functions and libraries
  • Why create functions or subroutines.
  • Create functions and use them in a test.
  • Create reusable libraries.
  • Practical work Create functions and use them in a test in the form of actions then via a library.
  • Overload an object method (click) with a custom method.
  • Add a method to an object.
431
API Testing
  • Use standard activities (flow controller, Date, database, XML, java class).
  • Create custom activities (WebService).
  • What is -what a WebService? Use the Wizard to create the custom activity.
  • Use the custom activity in a test.
  • Create mixed tests.
  • Practical work Creating a test with standard activities.
  • Creating a test with custom activities.
432

Analysis and ergonomics of Web HMIs

★★★★★

  • SII-300
  • 3 Days (21 Hours)

Description

This training, which focuses on Web interfaces, will teach you the fundamentals of ergonomics and “User-Centered Design”. You will see how to model and audit your HMI, model target users, optimize a home page, improve accessibility and navigation elements.

Who is this training for ?

For whom

Webmasters, graphic designers, website designers, web application designers.

433
Prerequisites

No special knowledge.

Training objectives

  • Modeling the users of an application in order to design a Web interface
  • Understand the standards and the different existing techniques to master the quality of Web interfaces
  • Create a Web HMI model using a design tool
  • Audit the quality of an existing web interface by following the different ergonomic criteria presented
  • Create a user test scenario, implement it and analyze its results

434

Training program

Introduction: what is ergonomics?
  • Definition of ergonomics.
  • Why do we need ergonomists?
  • The role of ergonomics. Ergonomics and innovation.
  • ISO 9241 usability standards.
  • UX Design and
  • Usefulness, usability.
  • Emotional design.
Ergonomics in the development cycle
  • The V-shaped design cycle.
  • Types of intervention, design or correction.
  • The ROI of ergonomics.
  • Ergonomics in depth. Design and structuring.
  • Panorama of different ergonomics methods.
  • Ergonomics in the context of Agile and iterative methods.
435
UCD User-centered design, modeling users
  • Personas.
  • Task analysis.
  • Modeling tools. Mind Mapping (XMind).
  • User interviews. Validate a content structure: card sorting.
  • Modeling: When to make a HMI model? Vertical mock-up and horizontal mock-up.
  • Low, medium and high fidelity of models: market tools .
Understanding humans to create an HMI
  • Human cognitive functioning: visual perception and understanding. Attentional resources.
  • Levels of business expertise.
  • Basic principles of good UX: management of time, concepts of affordance and mapping, Gestalt laws.
  • Colors. Use of images and icons.
  • The context: environment, mobility, interaction methods and guidelines.
  • Menus, Widgets and shortcuts.
  • Man-machine dialogue: principles of Grice, maxims of Nielsen.
Evaluation: expert/heuristic analysis of software
  • Methodology of expert analysis based on heuristics.
  • The different categories of HMI analysis criteria (control, User Experience, error management, help, etc.) .
  • Review of criteria on examples.
436

Ergonomics of mobile HMIs for tablets and smartphones

★★★★★

  • SII-71
  • 2 Days (14 Hours)

Description

This course concerns application interfaces for mobiles, tablets and smartphones. It presents the foundations of mobile HMI ergonomics and shows good practices for designing and improving the user experience. Practical modeling and audit work is carried out during the training.

Who is this training for ?

For whom
Anyone in the field of IT directly or indirectly concerned by the quality of Human-Machine interfaces.
437
Prerequisites

None

Training objectives

438

Training program

Introduction: what is ergonomics?
  • Definition of ergonomics.
  • Why do we need ergonomists? The role of ergonomics.
  • Benefits of 'ergonomics.
  • Ergonomics at the intersection of several disciplines.
  • Ergonomics and accessibility: constraint or complementarity.
  • Score: law of FITTS.
Design an ergonomic mobile interface
  • Introduce ergonomics into the HMI design cycle.
  • Types of intervention: design or correction.
  • The return on investment of ergonomics.
  • Waterfall, V-cycle, Agile: how to take ergonomics into account.
  • ISO 9241-210 usability standards.
  • Specificities of mobile HMIs: display, interactions, new audiences and uses.
  • Common ergonomic problems.
  • Example Familiarization with ergonomics.
  • Audit of different HMI presenting ergonomic problems.
  • Observation and identification by participants of points for improvement.
439
Study users, their tasks and context
  • Human cognitive functioning.
  • Optimize mobile display.
  • Mobile sites, dedicated apps or responsive design? Colors, images, menus, icons : the rules for mobiles.
  • Navigation in a mobile interface.
  • The target population: establishing Personas.
  • Tactile gestures, specificities by operating system.
Mock up a mobile interface
  • What is mock-up? Sketching, low-fidelity mock-up.
  • Medium-fidelity mock-up.
  • High-fidelity mock-up.
  • The tools available on the market.
  • Practical work Interface design using low visual fidelity tools (Balsamiq, Wireframe Sketcher).
Heuristic analysis of mobile HMIs
  • The heuristic analysis method: strengths, weaknesses, ROI.
  • The "universal" heuristic criteria.
  • Analysis methodology heuristic.
  • An analysis grid for mobile HMIs.
  • Study of analysis and audit grids.
  • Practical work rnAudit 'mobile interfaces.'}
440

ISQI CMAP, Mobile App Testing Foundation, certification

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

The number of downloaded mobile applications continues to increase and the quality of these applications becomes increasingly important. This training will introduce you to the essential tools and techniques for testing these mobile applications. At the end of the training, you will be able to take the CMAP Mobile App Testing Foundation certification.

Who is this training for ?

For whom

Any participant in a mobile application testing project: project manager, quality manager, developer, tester.

441
Prerequisites

Basic knowledge of software testing concepts. Recommended knowledge of the ISTQB® Foundation framework.

Training objectives

After completing this training, participants will be able to:

  • Get an overview of the mobile world
  • Understand mobile application testing tools and methods
  • Know the different levels and types of testing on mobile applications
  • Master all the activities of a testing process on mobile applications
  • Pass the ISQI® CMAP Mobile App Testing Foundation certification

442

Training program

Panorama of the mobile world
  • Figures and scale of the market, players in the mobile space, audiences and target customers.
  • Economic models specific to the mobile space.
  • Panorama of mobile terminals.
  • The different types of mobile applications based on the types of terminals or the type of use.
  • General architecture of mobile applications.
  • Mobile application development platforms: development environment, publication procedure.
Types of Mobile App Testing
  • The challenges inherent in testing mobile applications.
  • Emulators and simulators: understanding the use of emulators and terminals when testing mobile applications.
  • Testing mobile applications and testing traditional applications: the differences.
  • Understand and implement the different types of tests adapted to mobile terminals.
Mobile App Testing Procedures and Techniques
  • The mobile application testing procedure and its strategy.
  • Experience-based testing: techniques.
Tools and Automation
  • Approaches to automation: approaches based or not on code.
  • The various automation solutions for mobile applications.
  • The different stages of the automation procedure.
  • Discovering mobile test automation tools: existing tools and main characteristics.
  • Test environment and test laboratory: the different approaches creation of a testing laboratory.
443
Examen CMAP Mobile App Testing Foundation
  • Tips for the exam.
  • Mock exam with commented correction.
  • Mock test under exam conditions.
  • Passing the exam.
444

Functional safety and software risks, software FMEA and AEEL

★★★★★

  • SII-358
  • 3 Days (21 Hours)

Description

This course will show you how to implement risk analysis and software reliability/availability techniques. It will allow you to meet the main software security requirements and to carry out these activities through practical cases.

Who is this training for ?

For whom

Developers, project managers, validation managers faced with the development of critical systems requiring a strong software component.

445
Prerequisites

None

Training objectives

Understand the principles and approach to software risk and reliability analysis Understand the stages and components of a software Operational Safety system Analyze a program, in order to check the coding rules, from a perspective software reliability Carry out an analysis of the Effects of Software Errors (AEEL), applying the phase-by-phase approach

446

Training program

Concepts and principles of software SdF
  • The scope of application of the SdF and the challenges.
  • Definition of risk.
  • Main characteristics.
  • Nature requirements for the software.
  • Practical work Identification of the main operational safety requirements of the software.
Challenges and problems of the software SdF
  • Construction and terminology of the software SdF.
  • SdF insurance.
  • The SdF Plan.
  • The constituent elements.
  • Practical work Construction of the operational safety of the software.
System study
  • Safety and harmlessness.
  • SIL level assignment (according to IEC 61508).
  • Notion of independence (according to IEC 61508, ISO 26262).
  • SdF requirement.
  • Reliability requirement.
  • Practical work Specification of a safety function according to IEC 61508.
447
Software reliability
  • Definition.
  • Triggers and inputs to software reliability (standards and benchmarks).
  • Metrology.
  • The different types of software.
  • Why and when to evaluate reliability? Examples.
  • Experimental reliability, its implementation.
  • Practical work Estimation of the reliability of software.
Software security
  • Safety barrier.
  • Approach according to the IEC 61508 standard.
  • Approach according to the STD 882E standard.
  • Practical work Safety program (harmlessness) according to STD 882E.
448
FMEA
  • Software FMEA theory: analysis of failure modes, their effects and their criticality.
  • Phase by phase analyses.
  • The analysis of failure mechanisms.
  • Evaluation of criticality.
  • Proposals for corrective actions.
  • Presentation and interpretation of results.
  • FMEA or FMEA.
  • Difference with AEEL (Analysis of the Effects of Software Errors).
  • Practical work Performing an analysis AEEL.
COTS
  • Integration of COTS components.
  • COTS for critical systems (safety and safety).
  • Example of a security study process integrating COTS.
  • Architectural devices.
Conclusion
  • Normative aspects.
  • Industrial practices.
  • The main limitations of the FMEA method.
449

Team Foundation Server 2015, implementation of software testing

★★★★★

  • SII-300
  • 3 Days (21 Hours)

Description

In this course, you will learn how to implement a software testing strategy using Microsoft's Visual Studio and Team Foundation Server 2015. You will implement unit tests, web tests and load tests and will also take charge of the tools dedicated to functional tests.

Who is this training for ?

For whom

Project managers, testers, developers or member of a development team.

450
Prerequisites

None

Training objectives

Evaluate the components of the TFS 2015 solution Develop a software testing strategy Carry out functional, unit, Web and load tests on a project Implement automated tests with graphical interfaces Monitor the progress of the tests

451

Training program

Introduction to Visual Studio 2015 ALM
  • Introduction to Team Foundation Server 2015 and Visual Studio 2015.
  • ALM (Application Lifecycle Management) at Microsoft.
  • The principles.
  • The product range.
  • Managing the development process from design to deployment.
Project management
  • The main principles.
  • Creating a team project.
  • Managing requirements with different tools.
  • Practical work Setting up a project.
Functional tests
  • The principles.
  • The organization.
  • Create the test plan.
  • Configure the execution of a test plan .
  • Manually run a test campaign.
  • Report an anomaly to the developers.
  • Practical work Implementation of a test plan on a project and its execution.
452
Unit tests
  • Understanding unit tests.
  • Principles.
  • Creating a unit test.
  • How to do it? What to test? Linking to a data source.
  • Impacted tests and code coverage.
  • Practical work Implementation of data-driven unit tests.
Web testing and performance testing
  • The load test cycle.
  • The different stages.
  • Creating a web test.
  • The key elements.
  • Executing a load test.
  • Practical work Setting up a load test.
Automated GUI testing
  • The main concepts.
  • Create a basic GUI test.
  • Validate the GUI.
  • Extensibility and custom code .
  • Practical work Implementation of automated tests of graphical interfaces.
453
Managing test environments
  • The main concepts.
  • Best practices.
  • Install and configure a test environment.
  • Use a test environment.
  • Using exploratory tests.
  • Discover lab management.
  • Practical work Setting up a testing agent.
Monitor testing progress
  • Reporting concepts.
  • Use basic reports.
  • Create and evolve Excel reports.
  • Practical work r nCreation of reports of different types.
  • Basic formatting.
454

Team Foundation Server 2013, implementation of software testing

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

This course teaches how to implement a software testing strategy using Microsoft Visual Studio and Team Foundation Server 2013. It will also allow you to discover and carry out unit tests, web tests and load tests and to use tools dedicated to functional tests.

Who is this training for ?

For whom

Project managers. Testers. Developers or any member of a development team who wants to improve the quality of their daily work.

455
Prerequisites

Basic knowledge of software development.

Training objectives

Evaluate the components of the TFS 2013 solution Carry out functional, unit, Web and load tests on a project Implement automated tests with graphical interfaces Monitor the progress of the tests Develop a software testing strategy

456

Training program

Introduction to Visual Studio 2013 ALM
  • Introduction to Team Foundation Server 2013 and Visual Studio 2013.
  • ALM (Application Lifecycle Management) at Microsoft.
  • The principles.
  • The product range.
  • Managing the development process from design to deployment.
Project management
  • The main principles.
  • Creating a team project.
  • Managing requirements with different tools.
  • Practical work Setting up a project.
Functional tests
  • The principles.
  • The organization.
  • Create the test plan.
  • Configure the execution of a test plan .
  • Manually run a test campaign.
  • Report an anomaly to the developers.
  • Practical work Implementation of a test plan on a project and its execution.
457
Unit tests
  • Understanding unit tests.
  • Principles.
  • Creating a unit test.
  • How to do it? What to test? Linking to a data source.
  • Impacted tests and code coverage.
  • Practical work Implementation of data-driven unit tests.
Web testing and performance testing
  • The load test cycle.
  • The different stages.
  • Creating a web test.
  • The key elements.
  • Executing a load test.
  • Practical work Setting up a load test.
Automated GUI testing
  • The main concepts.
  • Create a basic GUI test.
  • Validate the GUI.
  • Extensibility and custom code .
  • Practical work Implementation of automated tests of graphical interfaces.
458
Managing test environments
  • The main concepts.
  • Best practices.
  • Install and configure a test environment.
  • Use a test environment.
  • Using exploratory tests.
  • Discover lab management.
  • Practical work Setting up a testing agent.
Monitor the progress of your tests
  • Reporting concepts.
  • Use basic reports.
  • Create and evolve Excel reports.
  • Practical work r nCreation of reports of different types.
  • Basic formatting.
459

Automatic testing and continuous integration in C++

★★★★★

  • SII-423
  • 4 Days (28 Hours)

Description

This course presents and implements an application testing process in a C++ environment. You will see how each step of the testing process can be automated. You will learn how to check the effectiveness of your unit tests and how to write system tests. You will implement continuous integration.

Who is this training for ?

For whom

Software quality and testing managers, developers, test automation engineers.

460
Prerequisites

None

Training objectives

Set up the content and monitoring of the automation project Define the coverage of the test plan and organize the test repository Implement specific tools to automate unit tests in C++ Automate HMI, Web Service and scalability Implement continuous integration and analyze results reporting

461

Training program

Reminders on the testing process
  • Definition.
  • Test levels: unit, integration, systems and acceptance, confirmation and non-regression.
  • The different testing techniques.
  • The testing process.
  • The development and testing cycles.
  • Test strategy.
  • Interest in end-to-end strategies.
  • Automation decision.
  • What follow-up? Exchanges Definition of tasks to carry out an automation project for a C++ application.
Analysis and design
  • Testing techniques overview.
  • Requirements, test, test condition, test cases, test procedure, prerequisites.
  • What is 'a coverage? Presentation of an Open source testlink tool.
  • Good practices: coverage, valorization, writing of tests.
  • Practical work Implementation of the test repository.
  • Overview of open source and paid tools for test management, presentation of other tools (TFS).
462
Unit Test Automation
  • Unit tests: what is a driver? Using plugs to automate your tests.
  • Types of coverage: instruction, branch, condition, decision .
  • Practical work Implemented the Google unit testing framework in C++ (GTest) and a test plug.
  • Code coverage check with Gcov .
Automation of system tests
  • Organize test execution: test environments, anomaly manager.
  • Automate system tests.
  • API tests, WebService.
  • HMI tests.
  • Load tests.
  • Best practices in automation.
  • Presentation of Selenium for the Web.
  • Solutions for other types of HMI.
  • Practical work HMI test automation/Web with AutoIT/Selenium/QTTest.
  • Automating Web Service tests with SOAP UI.
  • Setting up load tests with SOAP UI.
463
Continuous integration
  • Continuous integration: principle and advantages.
  • Presentation of Hudson or Jenkins, presentation of plug-ins.
  • Reporting results.
  • Practical work Implementation with Hudson SVN and Make.
  • Reporting coverage and test results, integration with Testlink.
Conclusion
  • How to set up automation.
  • "Keyword testing": demonstration with robot framework.
  • Choice of tools.
  • Open source or paid tools?
464

Automate testing with QuickTestPro

★★★★★

  • SII-396
  • 3 Days (21 Hours)

Description

This training will show you how to use QuickTestPro (QTP) to design and run tests without programming. You will also learn how to modify saved scripts, debug them, and save test results to the Quality Center/Test Director repository.

Who is this training for ?

For whom

Test professionals, project management and project management.

465
Prerequisites

None

Training objectives

Create and run an automatic test script
Create checkpoints on interface objects
Execute an iterative test, with parameterization of input and output data
Decompose an automatic test script into actions
Execute an iterative test, with configuration of input and output data
Decompose an automatic test script into actions
Build and manipulate a repository of the application objects to be tested
Analyze the test results in Quality Center

466

Training program

Getting started with Quick Test Pro
  • The organization of the tool.
  • The concept of active window.
  • The data table.
  • The screen work.
  • Tool settings.
  • General settings.
  • Specific settings.
  • Recording a script.
  • Execution of the script.
  • Execution step by step.
  • Practical work Getting started and configuring QTP.
  • Creation and execution of test scripts.
Checkpoint management with QTP
  • Creating control points on Object.
  • Creating control points on Bitmap.
  • Creating control points on Text.
  • Creation of checkpoints on a database.
  • Practical work Setting up different checkpoints in a script.
467
Test iteration: data management
  • Configuration of inputs using external data.
  • Use of data tables (local, global).
  • Execution of an iterative test.
  • Setting up input and output data.
  • Practical work Setting up data for a test script.
  • Executing iterative tests.
The notion of functional action under QTP
  • Decomposition of user tasks into functional actions.
  • Calling an action from another action.
  • Calling a group of actions from another action .
  • Chaining and dissociating actions.
  • Practical work Dissociating a script into several actions.
468
Management of objects to test. Repository
  • Identification of the application objects to be tested.
  • Object manipulation.
  • Local or shared object repository.
  • Synchronize execution on an object, on a text display.
  • Resumption scenario.
  • Practical work Object handling: local or shared repository.
  • Setting up synchronization points on objects.
  • Implementing a recovery scenario.
QTP integration with Quality Center/TestDirector
  • Connecting to Quality Center/TestDirector.
  • Running tests.
  • Analyzing test results in Quality Center/TestDirector.
  • Practical work Manage tests with the Quality Center test repository/TestDirector.
469

Lean Software Development, implementation

★★★★★

  • SII-360
  • 3 Days (21 Hours)

Description

This training introduces you to the fundamental principles of Lean Thinking. It will teach you how to map your software development process, integrate Lean Software Development practices and tools into your projects and implement them.

Who is this training for ?

For whom

Development project managers, developer analysts, project method managers.

470
Prerequisites

None

Training objectives

Understand the philosophy and major principles of "Lean Thinking"
Use Value Stream Mapping (VSM) to detect waste
Develop and measure development performance indicators
Implement good Lean practices for product quality code
Build customer satisfaction indicators in a Lean vision
Position Lean in relation to other development quality management methods

471

Training program

Introduction au Lean Thinking
  • The history of Lean.
  • The major principles of "Lean Thinking".
  • First presentation of Lean Software Development.
Lean principles
  • Eliminate waste.
  • Build intrinsic quality.
  • Foster knowledge.
  • Deliver quickly.
  • Delay the decision.
  • Respect people.
  • Optimize the system as a whole.
  • Practical work Reflection on the principles of Lean.
  • Application.
472
Tools to measure and calibrate the project
  • Tool for calibrating the project, choosing the actors and defining the target.
  • Value Stream Mapping (VSM): a tool for seeing waste.
  • Define its performance objectives.
  • Quantify your activities.
  • Measure software development efforts.
  • Practical work Define the target of a software development project. 'improvement.
  • Identify waste.
  • Define performance indicators.
  • Measuring activities and comparing them to indicators.
Implementation of Lean Software Development principles
  • Reduce work partially done.
  • Reduce excess functionality.
  • Reduce information transmission problems, waits or delays.
  • Preserve the team's ability to react.
  • Permanent feedback.
  • Aim for quality: tests, TDD, TDR, continuous integration.
  • Best practices for code quality: standards, code reviews, Refactoring, Pair Programming.
473
Lean measures
  • Lean and product vision, product value and rapid delivery.
  • Cycle time measurement.
  • ROI measurement.
  • Measuring customer satisfaction.
Lean and other methods
  • Lean and Six-Sigma.
  • Lean and CCMI.
  • Lean and agile methods (XP, Scrum.
  • ).
  • Practical work Reflection on the positioning of the different methods.
Case study
  • Choice of a subject.
  • Applications of Lean principles.
  • Implementation of an action plan to support changes.
474

Building a Data Warehouse data quality and performance of decision-making IS

★★★★★

  • SII-75
  • 3 Days (21 Hours)

Description

The Data Warehouse is at the heart of decision analysis. Through a structured and pragmatic approach, you will discover the best methods and tools for developing a data warehouse, based on business needs, feeding it and making it reliable and scalable. You will also discover what the key roles are in this type of project, and what the impact is on the IS architecture and the quality of the corporate data repository. A seminar focused on practical experience which will also give you a first approach to "star" modeling.

Who is this training for ?

For whom
Infocentre managers, IT managers, study managers, information systems architects, functional and technical project managers.
475
Prerequisites

None

Training objectives

Understand the strategic issues of a decision-making IS and its advantages Identify the different layers of the organization of a decision-making system Model Data Warehouse at the heart of the decision-making system Identify the essential steps in the process of building a Data Warehouse Master the roles and deliverables on a Data Warehouse construction project Have a complete and synthetic view of BI solutions on the market

476

Training program

The Data Warehouse, purpose and principles
  • The strategic challenges of a decision-making IS The technical and cultural reasons which lead to the Data Warehouse.
  • Definition of the Data Warehouse according to Bill Inmon.
  • The solutions provided by the technical and functional architecture of the Data Warehouse.
  • Characteristics of the data of the decision-making IS The Infocenter and the decision-making IS.
  • Presentation of the different Data approaches Warehouse and Infocentre, their advantages and disadvantages.
The architecture of a business decision-making IS
  • The different layers of the organization of a Data Warehouse.
  • Data collection and integration.
  • The Operational Data Store and Data Staging area.
  • The presentation layer, the decision-making portal.
  • OLAP analysis engines: (MOLAP) and/or relational OLAP (ROLAP).
  • "Data Mining" analysis techniques: predictive methods, descriptive methods.
  • Growth in the volume and nature of data, the challenges of Big Data.
  • Documentation of DW data: notions of data repository.
  • How the DW makes data repository management (MDM) more reliable.
  • Flow management: capturing data source data, transformation rules.
  • Example Presentation of examples of various decision analysis projects.
477
The principles of Data Warehouse modeling
  • Operational and denormalized relational models.
  • Hybrid models.
  • Generic models.
  • Understanding the star model, its purpose .
  • Understand the notions of facts and analysis.
  • The hierarchies of the axis of analysis.
  • The snowflake model.
  • The problem of evolving dimensions.
  • Management of aggregates and stability of the functional scope.
  • Which approach favors detailed information or aggregates Best practices, questions? to ask the profession.
  • Collective reflection Collective construction and enrichment of a star data model, following several given case studies.
  • Development of the questions to be proposed for collect user needs.
478
The process of building a Data Warehouse
  • Identify the candidate functional scope.
  • Determine the objective and the management events to follow.
  • Estimate the volume of the scope.
  • Functional analysis, collection of user needs.
  • Design of the detailed technical architecture.
  • Establish a generic implementation approach.
  • The contributions of 'an iterative approach, the content of an iteration.
  • First iteration or pilot project, choose it carefully.
  • Role of the sponsor, of the MOA, of the MOE, impact on the organization.
  • Administration and monitoring of the operational solution.
  • Exchanges Presentation of the design approach for a functional scope of the Data Warehouse.
479
Project organization, actors and deliverables
  • The fundamental role of the sponsor or promoter.
  • The steering committee.
  • Role of the functional team, of the user project group: validate the design of the user environment.
  • The transfer of skills to end users by the functional team: training and documentation.
  • The technical team, the architects.
  • The main deliverables of a decision-making project.
  • Exchanges Presentation of the deliverables and their manager following the stages of the process.
480
Tools in the field of decision-making
  • The latest technical developments in RDBMS in the field of decision-making.
  • Panorama and typology of BI solutions on the market.
  • Offers in SaaS mode.
  • Reporting solutions: SSRS, IBM Cognos, SAS, BusinessObjects.
  • Implementation of query tools.
  • Server-side OLAP analysis tools and client side: Usage, scalability, DataMart approach, response time.
  • Data Mining analysis solutions: SAS Enterprise Miner, IBM, OBI Datamining.
  • Requirements and strengths.
  • ETL solutions: IBM, Informatica, Oracle, SAP, Talend.
  • .
  • Relational modeling tools: possibilities and limits.
  • Example Presentation of the possibilities of various BI tools.
Synthesis
  • Evolution trends in decision-making systems.
  • Best practices for modeling.
  • Recommendations for organizing the Data Warehouse project.
481

Data Mining: summary

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Data Mining is a technique that allows you to extract knowledge from raw data. This seminar offers a theoretical and practical overview of Data Mining, covering its applications, its advantages for the company, as well as the most commonly used methods and tools. You will learn the theoretical principles and will have the opportunity to participate in practical experiments to better understand this technique and its use in a professional context.

Who is this training for ?

For whom

Infocentre managers, marketing managers, statisticians, IT managers, project managers and decision-making experts. Users and business database managers.

482
Prerequisites

Basic knowledge of decision analysis. Basic knowledge of statistics.

Training objectives

Understand the principles and purpose of Data Mining (DM) Identify the main techniques of DM and their use case Implement scoring and geomarketing methods on a simple case Discover the predictive methods and descriptive methods of DM Know the main stages of a Data Mining project

483

Training program

The Decision Information System (SID)
  • The challenges of SID: needs, areas of application.
  • Typical architecture of a SID, state of the art.
  • Development of decision-making information.
  • Design of a SID: steps, optimization, data organization, dictionaries.
Understanding Data Mining (DM)
  • Definition and purpose of Data Mining (DM).
  • What link between DM and statistics, what dependence between DM and IT? Difference between DM and OLAP ? Business expectations, DM responses.
Data mining techniques
  • The different families of DM.
  • Predictive methods and descriptive methods.
  • Factor analysis, typological.
  • Classification.
  • Decision trees, neural networks.
  • Classification of DM techniques.
The descriptive method of Clustering
  • Definition and methodology.
  • The criteria for structuring the data to be classified.
  • Evaluation and validation of the classes obtained.
  • The different subsections -Clustering families.
  • Example Presentation of Clustering applications.
484
Examples of application of DM
  • Scoring: definition, purpose, methodology.
  • Geomarketing: definition, purpose, methodology.
  • Example Implementation of the scoring method .
  • Practical use case for geomarketing.
Company data
  • Reminder of IS data issues.
  • Data quality and data administration.
  • Collection and exploration process.
  • Creating aggregates and new data.
  • Transforming data.
Data Mining project methodology
  • Definition of the business problem to be solved and the objectives to be achieved.
  • Inventory, describe and classify the data.
  • Design and populate the Data Mining database.
  • Explore, segment analyzed entities.
  • Establish and apply analysis models.
  • Iterate, deploy to users.
  • Maintain the model and associated software.
485
Overview of tools
  • Main tools on the market: SAS, R, IBM SPSS.
  • Focus on the SAS tool and the Powercenter ETL.
  • What selection criteria for this type of tools?
486

Hadoop, installation et administration

★★★★★

  • SII-315
  • 4 Days (28 Hours)

Description

The Apache Hadoop platform makes it easier to create distributed applications. This internship will allow you to understand its architecture and give you the knowledge necessary to install, configure and administer a Hadoop cluster. You will also learn how to optimize it and maintain it over time.

Who is this training for ?

For whom

Hadoop cluster administrators, developers.

487
Prerequisites

None

Training objectives

Discover the concepts and issues related to HadoopOptimize the platform
Understand how the platform and its components work
Install the platform and manage it

488

Training program

Overview of the Apache Hadoop Framework
  • Big Data challenges and contributions of the Hadoop framework.
  • Presentation of the Hadoop architecture.
  • Description of the main components of the Hadoop platform.
  • Presentation of the main market distributions and complementary tools (Cloudera, MapR, Dataiku.
  • ).
  • Advantages/disadvantages of the platform.
Hadoop cluster preparations and configuration
  • Hadoop Distributed File System (HDFS) working principles.
  • MapReduce working principles.
  • Cluster "type" design.
  • Hardware selection criteria.
  • Practical work Configuration of the Hadoop cluster.
Installing a Hadoop platform
  • Deployment type.
  • Installation of Hadoop.
  • Installation of other components (Hive, Pig, HBase, Flume.
  • ).
  • Practical work Installation of a Hadoop platform and main components.
489
Managing a Hadoop cluster
  • Management of Hadoop cluster nodes.
  • TaskTracker, JobTracker for MapReduce.
  • Management of tasks via schedulers.
  • Management of logs.
  • Using a manager.
  • Practical work List jobs, queue status, job status, task management, access to the web UI.
Data management in HDFS
  • Import of external data (files, relational databases) to HDFS.
  • Handling of HDFS files.
  • Practical work Import external data with Flume, consult relational databases with Sqoop.
Advanced configuration
  • Authorization and security management.
  • Recovery from name node failure (MRV1).
  • NameNode high availability (MRV2/YARN).
  • Practical work Configuration of a service-level authentication (SLA) and an Access Control List (ACL).
490
Monitoring et optimisation Tuning
  • Monitoring (Ambari, Ganglia.
  • ).
  • Benchmarking/profiling of a cluster.
  • Apache GridMix tools, Vaaidya .
  • Choose block size.
  • Other tuning options (use of compression, memory configuration.
  • ).
  • Practical work Understand cluster monitoring and optimization commands as they come.
491

Talend Open Studio for Big Data, exploit your massive data

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Talend's data integration platform extends its capabilities to Big Data technologies such as Hadoop (HDFS, HBase, HCatalog, Hive and Pig) and the NoSQL Cassandra and MongoDB databases. This internship will provide you with the basics to properly use Talend components created to communicate with Big Data systems.

Who is this training for ?

For whom

Data managers, architects, business intelligence consultants.

492
Prerequisites

Experience using the Talend Open Studio For Data Integration tool or skills acquired during the "Talend Open Studio, implementing data integration" training

Training objectives

Read/write data to HDFS/HBase/HCatalog

Perform transformation jobs using Pig and Hive

Using Scoop to facilitate migration of relational databases into Hadoop

Adopt good practices and design flexible and robust information systems

493

Training program

Présentation de Talend Open Studio for Big Data
  • Big Data issues: the 3V model, use cases.
  • The Hadoop ecosystem (HDFS, MapReduce, HBase, Hive, Pig...)
  • Unstructured data and NoSQL databases.
  • TOS for Big Data versus TOS for Data Integration.
  • Practical work: Installation/configuration of TOS for Big Data and a Hadoop cluster (Cloudera or Hortonworks), verification of proper operation.
Data integration in a cluster and NoSQL databases
  • Definition of Hadoop cluster connection metadata.
  • Connection to a MongoDB, Neo4j, Cassandra or Hbase database and data export.
  • Simple data integration with a Hadoop cluster.
  • Capture tweets (extension components) and direct import into HDFS.
  • Practical work: Read tweets and store them as files in HDFS, analyze the frequency of the themes covered and memorize the result in HBase.
Import / Export with SQOOP
  • Use Sqoop to import, export, update data between RDBMS and HDFS systems.
  • Import/export partial, incremental tables.
  • Import/Export a SQL database from and to HDFS.
  • Storage formats in Big Data (AVRO, Parquet, ORC, etc.).
  • Practical work: Carry out a data migration relational tables on HDFS and vice versa.
494
Perform manipulations on the data
  • Presentation of the PIG building block and its PigLatin language.
  • Talend's main Pig components, Pig flow design.
  • Development of UDF routines.
  • Practical work: Identify trends in the use of a website from the analysis of its logs.
Architecture and best practices in a Hadoop cluster
  • Design efficient storage in HADOOP.
  • Datalake versus Datawarehouse, should we choose?
  • HADOOP and the Activity Return Plan (PRA) in case major incident.
  • Automate your workflows.
  • Practical work: Create your data lake and automate its operation.
Analyze and store your data with Hive
  • Hive connection and schema metadata.
  • The HiveQL language.
  • Hive flow design, query execution.
  • Implement implements Hive's ELT components.
  • Practical work: Store the evolution of the price of a stock in HBase, consolidate this flow with Hive so as to materialize its evolution hour by hour for a given day.
495

Apache Storm, developing applications for Big Data

★★★★★

  • SII-343
  • 3 Days (21 Hours)

Description

In this training, you will learn to develop applications allowing you to process data and services placed in the Cloud in real time. You will also discover the advantages of Storm compared to traditional Big Data and understand its real-time distributed computing system.

Who is this training for ?

For whom

Designers, developers.

496
Prerequisites

None

Training objectives

Process data placed in the Cloud in real time
Coordinate exchanges
Develop services for the Cloud
Synchronize data between a private Cloud and a social network

497

Training program

Le Big Data
  • Definition of the scope of Big Data.
  • The Hadoop project, positioning of the Storm project.
  • The basic concepts of Big Data projects.
  • Difference between private and public Cloud Computing.
  • Big Data architectures based on the Storm project.
  • Demonstration Examples of Storm use.
Introduction to the Apache Storm project
  • Defining the development environment.
  • Creating projects based on Storm.
  • Defining Storm components (spout and bolt).
  • Defining Storm flows.
  • Data model (key, value).
  • Hands-on Use the Storm API to manage user records.
498
Horizontal scalability
  • Definition of high availability.
  • Possible topologies.
  • Parallelization of calculations and data processing.
  • Scalability of Web servers.
  • Using Storm cluster.
  • Database scalability.
  • Practical work Manage the increase in load by increasing web servers.
Guaranteed message processing
  • Definition of a "fully processed" message.
  • Lifecycle of a message.
  • The Storm API for defining reliability .
  • Strategy for implementing reliability for an application using Big Data.
  • Practical work Regulate customer messages and ensure their follow-up.
499
Fault Tolerance
  • Management of Bolts.
  • The Apache Kafka project.
  • Definition of transactions.
  • Transactional topology and Storm cluster.
  • Roles of Nimbus and ZooKeeper.
  • Practical work Using ZooKeeper for distributed negotiation.
Development of services for the Cloud
  • Programming services with the different languages ​​Clojure, Java, Ruby, Python.
  • Introduction to new languages.
  • Practical work Apply interoperability in real-time Big Data.
Interconnection with social networks
  • Using Twitter4J.
  • Configuring access security.
  • Event management with Storm.
  • Defining callback.
  • Practical work Synchronize data between a private Cloud and a social network.
500

Elasticsearch, Logstash and Kibana: indexing, searching and data visualization

★★★★★

  • SII-361
  • 2 Days (14 Hours)

Description

In this training, you will discover the innovative search and analysis features of Elasticsearch, a search and data indexing engine. You will learn how to install and use it to index, search and visualize data and documents. You will also be introduced to the main associated development approaches.

Who is this training for ?

For whom

CTO, technical project managers, application managers, operations managers.

501
Prerequisites

Basic knowledge of development and administration of the Windows or Linux/Unix operating system.

Training objectives

  • Gain a thorough understanding of the key principles related to installing and configuring Elasticsearch
  • Examine the possibilities offered by Elasticsearch
  • Master the use of Elasticsearch for indexing, searching and visualizing data and documents
  • Explore the main application development approaches related to Elasticsearch

502

Training program

Introduction and implementation of Elasticsearch, logstash and Kibana.
  • Introduction to Elasticsearch, Logstash and Kibana: overview and historical development.
  • Installation prerequisites and cloud installation options.
  • The practical implementation of Elasticsearch, Logstash and Kibana.
  • Configuration of Elasticsearch and its important aspects in administration.
  • Using Elasticsearch for application development .
  • Consequences of using Elasticsearch on architecture and pre-existing applications.
  • The respective roles and functions of Logstash and Kibana.
How Elasticsearch works
  • Presentation of Apache Lucene.
  • The architecture and key concepts.
  • The JSON exchange format by Service Container.
  • The REST API.
  • Scoring and relevance of queries.
  • Data storage and simple search.
  • Importing data from another relational database.
503
Possibilities offered by Elasticsearch
  • Indexing documents and data.
  • Researching documents and data.
  • Analyzing documents and data.
  • Calculation of response lists.
  • Filtering and sorting of results.
  • Query suggestions.
  • Highlighting of results.
Index, search and view data and documents
  • How to make sense of data with Elasticsearch and Kibana?
  • How to improve data indexing.
  • How to improve search queries .
  • The geographic relevance of research.
  • Percolation.
504

SAP BusinessObjects 4, installation and administration of the platform

★★★★★

  • SII-79
  • 2 Days (14 Hours)

Description

This training will provide you with the knowledge necessary to install and configure the different components of SAP BusinessObjects® BI 4. You will discover the architecture, tools, services, the management console as well as best practices for daily server administration.

Who is this training for ?

For whom
Systems administrators and engineers.
505
Prerequisites

None

Training objectives

Discover and understand the architecture and organization of the different SAP BusinessObjects® BI services 4
Know the SLS tools and good administration practices for the different servers
Have an overview of the configuration possibilities on others specific or transversal services
Identify possibilities for optimizing the platform

506

Training program

Presentation and installation
  • Presentation of the different installation modes: enterprise, installation (standard/custom/silent).
  • Overall architecture of SAP BusinessObjects® Enterprise.
  • Presentation of the server architecture.
  • Client architecture: thin clients, deployment of thick clients.
  • Supported environments, required disk space, prerequisites.
  • Configuration wizards for configuring servers.
  • Practical work Installation of the server and client modules of the SAP BusinessObjects® BI suite.
Common administration tasks
  • Overview of administration tools.
  • Using the CMC (Central Management Console).
  • Roles of the CMS (Central Management Server) and the CCM (Central Configuration Manager).
  • Server management, monitoring server status, reading error reports.
  • Practical work Using the CMC.
Presentation and configuration of the main services
  • Crystal Reports: Job Server, Cache Server and Processing Server.
  • Web Intelligence Servers: Processing Server, Adaptive Job Server.
  • Dashboard Servers: Cache Server, Processing Servers.
  • Sizing method.
  • Practical work Adjusting parameters for the main services.
507
Configuring other services
  • Adaptive Servers.
  • Data access: Connection Server, Adaptive Connectivity Service.
  • Schedules: Event server, File Repository Server, configuration of " events".
  • Java Tomcat application server management.
  • Sizing, memory and cache usage, monitoring.
  • Exampler nMonitoring of some specific services.
  • Introducing standard application server configurations.
For further
  • Multi-server organization: principle of nodes and SIA (Server Intelligence Agent) for server management.
  • Management of data copy between servers.
  • Backup and restoring server settings.
  • Setting up the audit.
  • Demonstration Presentation of the main configuration elements.
508

SAP BusinessObjects 4, Web Intelligence, niveau 1

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

This training is designed for users of SAP BusinessObjects Web Intelligence version 4.1 and 4.2, and aims to provide an in-depth understanding of all concepts and components of this tool, including querying and analysis functions. Please note that new features in version 4.3 will not be included in this training.

Who is this training for ?

For whom

This training is intended for end users, those responsible for writing reports as well as those involved in managing the company using SAP BusinessObjects

509
Prerequisites

No specific prerequisites are necessary.

Training objectives

After completing this training, participants will be able to:

  • Build a query from universe data
  • Design data tables and customize them
  • Apply filters and group data for analysis
  • Create relevant graphics for data presentation
  • Use calculation functions, alerts, and formulas to interpret data
  • Organize the distribution of reports for effective communication

510

Training program

Overview of SAP BusinessObjects® Web Intelligence
  • The WEBI environment and architecture.
  • Principles and main functions.
  • Connecting and disconnecting from InfoView/BI LaunchPad.
  • Selecting the Web Intelligence document editor.
  • Practical work Getting started with the SAP BusinessObjects® environment.
Queries and filters
  • Data providers and universes.
  • Creating a simple query.
  • How it works and using predefined filters.
  • The prompt filters, custom filters.
  • Hands-on Creating queries and filters.
Using reports and tables
  • Web Intelligence table templates.
  • Adding tables to reports.
  • Formatting operations on a table.
  • The crosstabs.
  • Practical work Creating reports.
  • Adding tables.
511
The diagrams
  • Diagrams and diagram templates.
  • Creating, using, and formatting diagrams.
  • Formatting shortcuts.
  • Practical work Creation and configuration of diagrams.
  • Work on formatting.
Sections, breaks and sorts
  • Group data by section.
  • Group data in tables.
  • Organize sections and data.
  • Practical work rnManipulation of data and various presentation elements.
Filtering the values ​​displayed in a report
  • How report filters work.
  • Applying multiple filters in a report.
  • Editing and removing report filters.
  • Jobs practices Handling filters in reports
512
Calculations, alerts, variables
  • Insertion of calculations in simple/crosstabs.
  • Creation of advanced alerts.
  • Creation of formulas.
  • Variables .
  • Practical work Creation of calculations, formulas.
  • Use of variables.
Supplements
  • SAP BusinessObjects® Web Intelligence Rich Client: Inserting data from external providers.
  • Creating multi-query documents and merging data.
  • Planning the execution and distribution of reports.
  • Saving and managing WebI documents in InfoView, saving in various formats.
  • Practical work Data fusion.
  • Handling various document formats.
  • Execution planning.
513

OMG Certified UML Professional, certification UML OCUP 2 Foundation

★★★★★

  • SII-361
  • 3 Days (21 Hours)

Description

Based on a case study, this course will allow you to learn and use the UML language effectively and pragmatically in your software development projects. It will also prepare you for the UML OCUP 2 Foundation certification from OMG (Object Management Group).

Who is this training for ?

For whom

Software architects, developers, project managers, MOA, AMOA, MOE.

514
Prerequisites

Experience required in software development, in an Object-oriented language preferably.

Training objectives

Use UML in different software engineering activities
Master structural modeling
Master behavioral modeling
Master all the elements addressed by the OCUP 2 Foundation certification

515

Training program

Why model?
  • The interest of UML modeling in the development project, from business modeling to implementation.
  • The organization of modeling using structuring in packages.
  • Getting started with the case study: understanding the general needs of the client.
Business modeling
  • Model business processes with the activity diagram.
  • Model the domain with the class diagram.
  • Model the statuses of business entities with the class diagram 'state-transitions.'}
Requirements modeling
  • Model the external environment of the system with the actors.
  • Define the behavior of the system with the use cases.
  • Use case diagram.
  • Sequence diagram.
  • Non-functional requirements using the FURPS approach and the notion of "requirement" UML.
516
System design modeling. Structural view
  • Define the technical platform - deployment diagram.
  • Define the code architecture.
  • Package diagram.
  • Best practices for separation of concerns and limitation of dependencies - layered structuring pattern.
  • Modeling classes from a structural point of view.
  • Defining attributes.
  • Link objects with associations between classes.
  • Factorizing code with generalization: good use of inheritance.
System design modeling. Behavioral view
  • Describe the internal interactions of the system with the sequence diagram.
  • Define the operations to meet the functional requirements.
  • Synthesize the behavior of an object with the state-transition diagram.
Model deployable components
  • Define components and their interfaces - component diagram.
  • Define component deployment - deployment diagram.
Preparation for the practical course of the OCUP 2 exam
  • General review.
  • Practice on standard questions.
517

SAP BusinessObjects Information Design Tool 4, create and manage your universes

★★★★★

  • SII-82
  • 2 Days (14 Hours)

Description

SAP BusinessObjects® Information Design Tool is a complementary tool to the Designer, allowing you to create universes based on several relational sources and/or on OLAP cubes. This course will teach you how to create enriched universes via the Information Design Tool module of the SAP BusinessObjects® BI 4 suite.

Who is this training for ?

For whom
Analysts and business experts, project management assistants.
518
Prerequisites

None

Training objectives

Create a project with Information Design Tool
Build a data foundation based on several relational connections
Define a relational management layer and associated objects
Organize security on the data for restitution
Build queries on the data

519

Training program

Introduction
  • Reminder about BI and the SAP BusinessObjects® company.
  • Principles of the Designer and the design tool.
  • The design stages.
Information Discovery Design Tool
  • First connection to the application.
  • Creating a project.
  • The concept of sessions.
  • Repository resources.
  • Connection management.
  • Shortcuts.
  • Exercise: Creating a project.
  • Creating a connection based on E Mode data and an Excel file.
520
Data Foundation
  • What is a data foundation? Principle.
  • Management of tables and joins, notions of optimization.
  • Presentation and management of views.
  • Families.
  • Data profiling.
  • Calculated and time columns.
  • Derived tables.
  • Exercise: Creating a multisource data foundation based on two connections.
Creation of management layers
  • Creation of a relational management layer.
  • Creation of classes and objects.
  • Object properties.
  • Objects candidates.
  • The views of the management layer.
  • The format editor.
  • Exercise: Creating a relational management layer .
521
Maintain and optimize the universes
  • The parameters of the universe.
  • Manage the structure, updating.
  • Check the integrity.
  • Resolving loops with aliases and contexts.
  • Object navigation paths.
  • Exercise: Using the integrity test on a universe with loops.
  • Resolution via context creation.
Test and distribute the universes
  • Query editor overview.
  • How to create a query? Filtering data in a query.
  • Profiling values.
  • Publishing the universe.
  • Convert a file ".
  • unv" to ".
  • unx".
  • Exercise: Insert a query and use filters.
522
Security management
  • Presentation of security issues.
  • Insertion and modification of a data and management security profile.
  • Assignment of security profiles to users.
  • Exercise: Create a management data security profile.
  • Assign security to a user.
523

SAP BusinessObjects XI 3, Desktop Intelligence, niveau 2

★★★★★

  • SII-83
  • 1 Days (7 Hours)

Description

This internship details the use of SAP BusinessObjects® Desktop Intelligence XI to learn how to design and develop rich and complex documents

Who is this training for ?

For whom
Advanced user, future world designer.
524
Prerequisites

None

Training objectives

Create advanced conditions on queries
Combine several queries
Improve the classification of data in the document with breaks or sections
Create advanced functions
Add conditional formatting on data
Restore data from multiple sources

525

Training program

Advanced query conditions
  • Reminders about SAP BusinessObjects®: the universe, classes and objects.
  • The query editor.
  • Report management.
  • Creation of personal objects: dimensions or indicators.
  • Interactive queries: questions asked to the user.
  • Aggregation problems.
  • Advanced operators: Minus, Intersect, Union.
  • List of custom values.
  • Combination of queries.
  • Using subqueries.
  • Exploitation of user responses.
  • Practical work Exercise: manipulation to get back to grips with the tool and become familiar with the case studied.
  • Improving queries.
526
Improved reporting structure
  • Set general filters.
  • Choose breaks or sections.
  • Management of placements and layout of blocks.
  • Management of the Header and Footer areas.
  • Management of page breaks.
  • Relative positioning: automate the layout.
  • Conflict between classifications, filters and sorts.
Analysis and enhancement of data
  • Study of SAP BusinessObjects® functions.
  • Text manipulation.
  • Date management functions.
  • IS conditional functions.
  • Statistical functions and aggregate levels.
  • Variable contexts: For, In, Each.
  • Conditional display of constants, formulas and variables.
  • Conditional formatting.
  • Creating graphical indicators.
527
Exploitation of multiple data sources
  • The different data sources.
  • Local data: Xls, Txt, Csv.
  • Gains and constraints of a multisource report.
  • Automatic linking of data sources.
  • Manual data synchronization.
  • Resolving complex synchronization cases.
  • Requalifying data.
  • Creating variables for synchronization.
  • Define and operate custom hierarchies.
528

SAP BusinessObjects XI 3, rights administration

★★★★★

  • SII-84
  • 1 Days (7 Hours)

Description

This training will help you understand the architecture of SAP BusinessObjects® Enterprise XI and learn how to manage resources, publish and schedule reports in a secure environment.

Who is this training for ?

For whom
User administrators of the Designer and Desktop Intelligence modules of SAP BusinessObjects® XI.
529
Prerequisites

None

Training objectives

Have an overall vision of the SAP BusinessObjects® architecture
Understand the principle of the CMC (Central Management Console)
Create and manage application users and groups
Define access levels to data and applications
Organize the publication of reports

530

Training program

Discovery of SAP BusinessObjects® Enterprise
  • Presentation of SAP BusinessObjects® Enterprise XI.
  • Overview of the architecture of SAP BusinessObjects® Enterprise
  • Connecting to InfoView XI.
  • CMC (Central Management Console) Overview ).
  • Exercise: rnGetting started with the environment in Administrator mode.
  • Scheduling a report execution.
  • Customizing your InfoView.
Content design
  • Security in SAP BusinessObjects® Enterprise XI.
  • Groups and users.
  • Objects and applications.
  • Folders and categories.
  • Which solution to recommend? Creation of the functional matrix.
  • Exercise: Creation of the functional matrix associated with a case study.
  • Apply security levels on data and applications to groups defined in the case, refine security by folder.
531
Creation of the application matrix and resource management
  • Creating groups, users and folders.
  • Managing user accounts.
  • Authentication methods in SAP BusinessObjects® Enterprise XI.
  • Enterprise authentication, Windows NT, LDAP, Windows AD.
  • Password management.
  • Security management.
  • Login rights advanced access and rights.
  • Defining common access levels.
  • Exercise: Creating and organizing accounts by groups.
  • Word management password.
  • Updating access levels.
532
Publishing and planning
  • Presentation of the organization of objects.
  • Folder management.
  • Category management.
  • Publishing objects in SAP BusinessObjects®.
  • What means and what tools? The publication assistant, the CMC.
  • Object planning.
  • Planning with events, following a personalized calendar.
  • Instance management.
  • Exercise: Application of access rights from a defined matrix, from an Excel file.
  • Using categories.
  • Schedule a simple report execution, event-based, calendar-based.
533

Cognos BI, overall view

★★★★★

  • SII-353
  • 1 Days (7 Hours)

Description

Cognos® BI is a reporting solution for creating and distributing reports, producing and using multidimensional analyses. This course will allow you to discover the different functionalities of this solution, starting from the needs of novice users to more advanced profiles.

Who is this training for ?

For whom

Domain manager, user, consultant, architect, project manager, administrator.

534
Prerequisites

None

Training objectives

Know the IBM/Cognos®10 BI architecture
Have an overview of the components of the IBM/Cognos® 10 BI solution
Understand the different reporting components
Know how to handle the different reporting components and model administration

535

Training program

Presentation of the IBM/Cognos® architecture and its different components
  • User roles and licenses.
  • Technical concepts.
  • Installation of the solution.
  • Configuration and deployment.
Simple user profile
  • Create a simple report with Query Studio.
  • Examine the main features: grouping, sorting, sectioning, filtering, and calculation.
  • Demo Using Query Studio.
Intermediate user profile
  • Create a report with Workspace Advanced.
  • Examine the main features: grouping, sorting, display, navigation, formatting.
  • Demo Overview of Workspace Advanced.
Explorer user profile
  • Create a simple report with Analysis Studio.
  • Examine the main features: navigation, nested table, filter, context, chart.
  • Demo Demo creating a simple report.
536
Advanced user profile
  • Create a simple report with Report Studio.
  • Examine the basic features of Report Studio: grouping, sorting, filtering, sectioning.
  • Create a multi-page report with Report Studio.
  • Examine key features such as: guests, pages, variables, multi-object management.
  • Demo Introduction to advanced features.
Overview of Cognos Connection and Workspace
  • Cognos Connection: organizing entries and managing the portal.
  • Review portal features: managing entries, versioning reports, scheduling.
  • Create a space working with Workspace.
  • Examine the possibilities of content management, filter, display, navigation, tab, export.
  • Demonstration Demonstration on Cognos Connection and Workspace
The components of creating relational and multidimensional models
  • Framework Manager.
  • Overview of features for creating a relational package.
  • Transformer Powerplay.
  • Overview of features for creating a relational package. 'a multidimensional cube.
  • Dynamic Designer Cube.
  • Overview of the features of creating an in-memory cube.
  • Demo Component overview administration.
537

Cognos 10 BI, Report Studio

★★★★★

  • SII-333
  • 2 Days (14 Hours)

Description

This course will teach you how to use the different functions of Cognos 10 BI Report Studio. It is aimed at advanced users and IT professionals wishing to define simple or more elaborate reports based on relational and dimensional packages.

Who is this training for ?

For whom

Advanced users of the solution and IT professionals.

538
Prerequisites

None

Training objectives

Select and sort data to be rendered according to different criteria
Improve the presentation of data by grouping it and adding calculations
Use the graphical representations offered by Cognos Report Studio
Add advanced objects in a report and format them
Use filters and prompts to drill down into a report

539

Training program

Introduction to Report Studio
  • Discover Report Studio and its interface.
  • Study the different types of reports.
  • Create a simple, sorted and formatted report.
  • Practical work Create a list type report.
  • Select data according to several criteria.
Create and format simple reports
  • Group data.
  • Apply grouping level scope and sort criteria.
  • Add totals for each data group.
  • Create list headers and title blocks.
  • Practical work Create groupings and sections.
  • Create intermediate subtotals.
540
Review other report types
  • Create a crosstab.
  • Create a chart.
  • Create a repeater.
  • Enable drill-down and drill-down features 'access to detail.
  • Practical work Create a circular type graph to analyze facts according to several dimensions of analysis.
  • Change the type of graphic representation.
  • Run a report in HTML format.
Filter data
  • Create filters.
  • Know when to apply filters.
  • Define filter properties and types.
  • Create drill-through to another report.
  • Practical work Extract data on a range of specific dimension values.
541
Create and use prompts
  • Learn how to use parameters and prompts.
  • Learn about prompt types.
  • Navigate between pages with the Page Explorer.
  • Hands-on Create a report with cascading prompts to analyze specific values.
  • Create prompt pages by type of criteria to choose.
  • Ensure automatic submission.
Perfect reports
  • Use insertable objects such as table, block and text.
  • View object placements.
  • Add page headers and title blocks.
  • Examine report expressions.
  • Format report data and objects.
  • Add calculations.
  • Add pages and sets of pages.
  • Master/detail report and multi-query management.
  • Set Report Studio report burst publishing options.
  • Practical work rnCreate a multi-query report combining multiple display types.
  • Add formatting objects to improve readability.
542

Cognos 10 BI, Query Studio

★★★★★

  • SII-334
  • 1 Days (7 Hours)

Description

Cognos 10 BI Query Studio is a tool dedicated to creating simple reports. Easy to use, Query Studio allows you to create ad hoc reports, based on specific needs. At the end of this internship, you will know how to quickly query and extract Cognos data and produce your own reports.

Who is this training for ?

For whom

This course is aimed at users and IT professionals wishing to define simple reports such as a list, a crosstab or a graph.

543
Prerequisites

None

Training objectives

Navigate the Cognos Connection portal
Create a report based on one or more selection criteria
Refine and present the analysis well with graphs, prompts and filters
Enrich the formatting of the different elements of a report
Use the different report execution and distribution modes

544

Training program

Cognos Connection
  • Discover the Cognos Connection portal.
  • Set preferences.
  • Display, working language, etc.
  • Study the Cognos Connection objects.
  • Customize Cognos Connection.
  • Hands-on Discover the portal and connect to it.
  • Change the display and working language.
  • Create a new folder to save reports.
Introduction to Query Studio
  • Discover Query Studio.
  • Getting started with the tool.
  • Open a report.
  • Insert data into a report.
  • Discover the different types of reports.
  • Practical work Restore data based on one or more criteria.
  • Add, move and group columns.
  • Sort on a column.
545
Create reports in Query Studio
  • Create lists, grouped lists, and crosstabs.
  • View data in graphs.
  • Filter data.
  • Use prompts to define filter criteria.
  • Practical work Create an analysis report on certain dimensions.
  • Add columns.
  • Create a combined filter on several dimensions.
Format Query studio reports
  • Format data.
  • Calculate and sort data.
  • Apply conditional formatting.
  • Apply a template.
  • Practical work Create a TOP 10 best values ​​report.
546
Edit and navigate Query Studio reports
  • Run a report.
  • Discover the execution options.
  • Produce the report in HTML, PDF and CSV.
  • Create custom report views.
  • Manipulate dimensional data.
  • Hands-on Create a report view and report output.
  • Extract data in report versions in English/French and HTML/PDF.
Administer reports in Cognos
  • View report execution history.
  • Save a report to a public folder.
  • Deliver reports by email.
  • Print reports.
  • Schedule reports.
  • Hands-on Create and schedule multiple reports to run.
  • Schedule its execution at a given frequency.
547

Cognos 10 BI, Analysis Studio

★★★★★

  • SII-352
  • 1 Days (7 Hours)

Description

Navigating the data from a multidimensional source such as Cube or from Framework Manager allows you to quickly give meaning to the data for the purpose of decision support. This course will help you discover how to explore and highlight data from an OLAP cube using the Cognos 10 BI Analysis Studio tool.

Who is this training for ?

For whom

Analysis managers, study managers, reporting managers, users who use Analysis Studio to extract relevant information and navigate within dimensional packages.

548
Prerequisites

None

Training objectives

Navigate the Cognos Connection portal
Move through the data to analyze
Choose row, column data and indicators for dynamic analysis
Add custom calculations to the analysis
Filter data from the dynamic analysis analysis
Using graphs to highlight data

549

Training program

Introduction to Cognos Connection and Analysis Studio
  • Discover Cognos Connection.
  • The Cognos Connection portal.
  • Log in to the portal.
  • Customize the environment.
  • The different parameters for personalization.
  • Display, language, description, etc.
  • Discover the portal objects.
  • Discover the Analysis tool Studio.
  • Open Analysis Studio reports.
  • Use a report type.
  • Practical work Set up your analysis environment with the Cognos portal.
  • Log in to the portal.
  • Choose your preferences.
  • Explore the portal.
  • Launch Analysis Studio and choose a report type.
550
Analysis Studio Basics
  • Discover the different areas of the workspace.
  • The rows.
  • The columns.
  • The measurements.
  • The context and the summary line.
  • Replace the dimensions.
  • Make passage to the lower/higher level or "drilling".
  • Create subtotals and custom sorts on the data.
  • Classify the data.
  • Nest dimensions.
  • Run the report analysis.
  • Demonstration Create a dynamic analysis table.
  • Place information in rows, columns and a measurement indicator.
  • Analyze a value in detail.
  • Change measurement.
551
Perfect an analysis
  • Discover member sets.
  • Define complex crosstabs (skewed, stacked).
  • Expand a level in a crosstab.
  • Discover graphs.
  • Define advanced calculations (members, summaries, measure).
  • Demonstration Display the best and last values ​​of a measure for a set of criteria of given dimension.
Filters in Analysis Studio
  • Set filters in Analysis Studio.
  • Apply a context filter.
  • Hide and exclude options.
  • Set a filter using an expression.
  • Exercise: Practical filtering exercises on Cube data.
552

Cognos 10 BI, Framework Manager

★★★★★

  • SII-354
  • 2 Days (14 Hours)

Description

The Framework Manager tool allows you to create “package” models which will be used by users to create reports with Cognos 10 BI studios. Through the different stages of package creation, you will learn, using a database, to present business data to users.

Who is this training for ?

For whom

IT project managers, consultants or technical administrators.

553
Prerequisites

None

Training objectives

Follow the steps for creating a Framework Manager project
Choose a data source and import the tables necessary to create a "package"
Prepare the metadata that will be used in the reports and test them
Publish and set package security Prepare DMR dimensional packages

554

Training program

Introduction to Framework Manager and Cognos 10 BI tools
  • Overall view of the architecture and the different studios.
  • The stages of creating a Framework Manager project.
  • Structure of the database and definition objects.
  • Establish the differences between transactional databases and reporting.
  • Taking into consideration good practices.
  • Exchanges Questions to multiple choice.
Create a Framework Manager project file
  • Discover the interface and the different objects.
  • Create a new data source and import metadata.
  • Define the different layers of the project file.
  • Exercise: Multiple choice questions.
  • Create a new project.
  • Choose your data source.
  • Import the tables in the physical layer.
555
Prepare metadata
  • Import and create query subjects.
  • Edit query item properties.
  • Edit and set relationships between query subjects and their cardinalities.
  • Create specific calculations.
  • Define parameter tables and apply them in macros.
  • Define filters.
  • Exercise : Set query item properties.
  • Usage and aggregation.
  • Relationships between tables.
  • Modify a query subject.
  • Expression calculation of multiple query elements.
  • Test the query.
556
Prepare and publish packages
  • Create a package from business layers.
  • Prepare combined query subjects and dimensional views.
  • Specify determinants.
  • Exercise: Create a package.
  • Include the business layer.
  • Publish to the portal.
Prepare DMR dimensional packages
  • Defining dimension objects, hierarchies, and attributes.
  • Create measures and apply scope.
  • Exercise: Create a multidimensional model.
  • Define dimensions and their levels.
  • Define measurements.
Implement security
  • Cognos Security Principles 10.
  • Secure access to the package.
  • Define access to objects and data.
  • Exercise : Apply security to a package.
  • Define rights on objects and data.
557
Managing OLAP cubes
  • Creating a Framework Manager project using an OLAP source.
  • Differences between Framework dimensional model and OLAP cube.
558

Cognos 10 BI, administer the solution

★★★★★

  • SII-335
  • 2 Days (14 Hours)

Description

This internship will introduce you to the technical architecture of the Cognos 10 BI software and will introduce you to the administration and security functions of this tool. You will learn how to monitor system performance and manage backup and scheduling functions.

Who is this training for ?

For whom

Application administrators, project management assistants.

559
Prerequisites

None

Training objectives

Customize the data access portal, the pages accessed by users, and the delivery of reports
Create users, groups and roles in Cognos
Define user profiles and access rights on modules and data
Implement security in Cognos Framework Manager
Monitor and control the performance of execution servers
Implement system administration strategy (application deployment, data backup)

560

Training program

Introduction
  • Presentation of the Cognos 10 BI suite.
  • Cognos 10 BI architecture.
  • Type of content to administer.
  • Tools to administer .
Security Administration
  • Security model.
  • Security implemented by default.
  • Authentication mode.
  • Create users, groups and roles .
  • Access rights for reading, writing, execution.
  • Passage rights and rule definition rights.
  • Controlling access to modules Cognos BI via protected functions and functionalities.
  • Controlling access to packages via object functions.
  • Exercise: Practical cases of security administration, creating user groups and controlling templates.
561
Content Administration
  • Presentation of the IBM Cognos Connection interface.
  • Personalization, creation of pages.
  • Managing activities.
  • Managing communication options reports and custom views.
  • Managing report execution.
  • Defining user profiles.
  • Managing data sources.
  • Report version management, report distribution modes.
  • Exercise: Practical cases of content administration in the IBM Cognos Connection interface.
System Administration
  • Introduction to the IBM Cognos Administration module.
  • System performance monitoring.
  • Service administration.
  • Server performance.
  • Management of simultaneous execution of queries.
  • Data backup strategy.
  • Deployment strategy.
  • Exercise: r nPractical cases of system administration, performance monitoring.
562
Advanced administration options
  • Input planning.
  • Indicator monitoring management via the Metric Studio module.
  • Setting up alerts and adding users to a alert list.
  • Language settings.
  • Logging configuration.
  • Cognos Framework Manager.
  • Security with Cognos Transformer.
  • Implementing security in Cognos Framework Manager.
  • Demonstration Demonstration of monitoring via Metric Studio, configuring security in each module of the Cognos 10 BI suite .
563

MCSA Certification Training - Windows Server 2012 System Administrator

★★★★★

  • SII-85
  • 5 Days (35 Hours)

Description

This MCSA Windows Server 2012 Administrator training lasting 5 Jours prepares for the Microsoft Certified Solutions Associate MCSA certification: Windows Server 2012, essential validation for any system/network administrator. Its objective is to provide participants with all the knowledge necessary for the administration of a computer park based on the Microsoft Windows operating system, and to enable them to acquire all the MCSA Windows Server 2012 administrator skills.

Who is this training for ?

For whom
This MCSA training: Windows Server 2012 System Administrator is aimed at IT professionals, technicians, administrators and network engineers
564
Prerequisites

None

Training objectives

Deploy and manage Windows Server 2012 •
Manage Active Directory Domain Services •
Secure Windows servers using Group Policy Objects •
Configure and troubleshoot DNS •
Maintain Active Directory Domain Services •
Ensure monitoring Windows Server 2012 •
Implement Dynamic Access Control •
Implement distributed deployments of AD DS (Active Directory Domain Services) •
Implement AD RMS (Active Directory Rights Management Services) •
Implement and administer Active Directory Federa

565

SAS Base, getting started

★★★★★

  • SII-86
  • 2 Days (14 Hours)

Description

SAS (Statistical Analysis System) allows you to perform statistical analyzes on large volumes of data and create personalized reports using its own language. This internship will teach you the concepts and functionalities of SAS Base, as well as how to manipulate and visualize data with this tool.

Who is this training for ?

For whom
Statisticians, DataMiner analysts, statistical study managers.
566
Prerequisites

None

Training objectives

Navigate the SAS work environment
Create and update the database for analysis
Program processing and procedures for statistical analyses
Personalize your analyzes by creating personalized libraries
Present graphically and format the data resulting from the analysis

567

Training program

Introduction
  • Presentation of the SAS Base software and its functionalities.
  • The advantages and disadvantages.
  • Positioning in relation to the SAS offer.
  • Positioning in relation to market tools.
Discovery of the software
  • The environment: the log, the editor, the explorer, the outputs.
  • How to launch a first command (F3) (data set => table creation)? Presentation and use of libraries (work, libname, create and assign.
  • ).
  • Tables in SAS.
  • Structure.
  • Description of tables and variables.
  • Usage.
  • The principle of SAS programming.
  • Data step and procedure step.
  • Help and feedback.
568
The Data Stage: generation and manipulation of data
  • Data steps.
  • How to create variables? Instructions for handling variables.
  • Keeping, deleting, renaming, etc.
  • Functions of various types: mathematical, characters, logic, etc.
  • ).
  • Data step options.
  • The filters and iterative blocks.
  • Exercise: Exercises for applying the concepts of creating variables.
Formats and dates
  • The manipulation and creation of formats.
  • The principle of dates.
  • Format.
  • Usage.
  • Functions relating to dates.
  • Use in various cases.
  • Exercise: Application exercises for creating and manipulating date formats and functions.
569
Simple data generation, concatenation, and analyzes
  • Importing and exporting data.
  • Copying data.
  • Joins (merging and concatenation).
  • Simple statistical calculations, PROC MEANS.
  • Frequency analysis.
  • Other statistical indicators (correlation coefficients, confidence intervals, Student tests.
  • .
  • ) Exercise: Table mergers and import/export.
  • Simple statistical calculations.
  • Editing frequency tables .
  • Displaying results.
Visualization and outputs
  • Generation of reports in different formats: RTF, PDF, HTML.
  • Creation of basic graphics: histogram, scatter plots, boxplot, etc.
  • Chart options.
  • Save a chart.
  • Exercise: Generating reports in various formats.
  • Creating charts.
570

QlikView, getting started with Business Intelligence and data visualization

★★★★★

  • SII-328
  • 2 Days (14 Hours)

Description

This internship will allow you to use the main functionalities of QlikView, a very effective Business Intelligence tool. In particular, it will teach you how to create a QlikView application from text files or a relational database.

Who is this training for ?

For whom

Consultants, developers, analysts and business experts, project management assistants.

571
Prerequisites

None

Training objectives

Navigate the QlikView application
Load data into QlikView
Manage sheets in a QlikView document
Manipulate sheet objects to choose or render data
Organize objects on the sheet
Create a chart to highlight the data

572

Training program

Introduction
  • Qliktech company overview.
  • Overview of QlikView features and benefits.
  • Demo Use case examples.
Basic manipulation of a Qlikview application
  • Presentation of the interface.
  • QlikView principle and terminology.
  • Opening existing documents.
  • Manipulating data by combinations of selections .
  • Perform a search for values ​​or texts.
  • Adding favorites.
  • Saving documents.
  • Export data to a file.
  • Exercise: Practical exercises for handling existing files.
573
Editing documents
  • Addition of sheet and properties of a sheet, links between sheets.
  • Addition of descriptive text object, addition of a selection list.
  • Properties selection lists, format, sort.
  • Addition of a statistics zone.
  • Addition of a multiple list.
  • Addition of a zone table.
  • Basic action on sheet objects (adding, modifying, formatting).
  • Using the "Design" toolbar.
  • Exercise: Practical exercises for enriching QlikView documents.
Data representation
  • Creating simple and crosstabs.
  • Basic actions and properties of simple and crosstabs.
  • Converting crosstab to chart.
  • Chart type.
  • Creating a chart with the "Instant Chart" wizard.
  • Creating a chart with the "Full Chart" wizard
  • Basic actions and graph properties.
  • Exercise: rnPractical exercises for creating interactive tables and graphs.
574
Getting started with loading data
  • Principle of loading data into QlikView.
  • Creation of a QlikView document from data in a text file or a table in a relational database.
  • Adding a second file and impact on the document.
  • Using the table viewer.
  • Managing model fields and basic actions.
  • Exercise: Exercises for creating a QlikView application from a file and a relational connection.
Conclusion
  • What to remember? Go further with QlikView.
575

Talend Open Studio, optimize your data flows advanced development

★★★★★

  • SII-87
  • 2 Days (14 Hours)

Description

Talend ETL makes it easy to add new functions and components to carry out complex processes. This internship will allow you to master the advanced features of Talend Open Studio, in order to achieve optimized and reliable implementation of data flows.

Who is this training for ?

For whom
576
Prerequisites

None

Training objectives

Master the advanced components of TOS Know how to integrate Java into Talend jobs Know how to create custom components Know how to optimize the performance of Talend jobs Know how to debug and deploy jobs in production Know the community around Talend and know how to interact with it

577

Training program

Introduction
  • Presentation of Talend Open Studio.
  • Reminder of ETL principles.
  • TOS installation.
Advanced use of Talend
  • Contexts and their management.
  • Implement complex transformations.
  • Manipulate XML feeds.
  • Implement ELT components.
  • Use regular expressions.
  • Exercise: Associate a group of contexts to a job, use transformation components, create XML files from a flat file , use ELT MySQL components.
578
Java and component creation
  • Presentation of the principles of implementation in Java.
  • Consult the Java code associated with a job.
  • Talend Java components.
  • Use routines.
  • Anatomy and creation of a component.
  • Export a component to the palette.
  • Internationalize its components.
  • Exercise: Using tMemorizeRows, tJavaFlex, tJava.
  • Write a routine and use it in a job.
  • Create a first component.
  • Edit javajet files to extend functionality.
Performance optimization and debugging
  • Monitor job performance.
  • Set up your own logging system.
  • Optimize job performance.
  • Debugging.
  • Modify variables in memory on the fly.
  • Exercise: Add monitoring components to a job, set up your log system, use buffers.
579
Production deployment
  • Run a job outside TOS.
  • Schedule the execution of a job under Windows.
  • Schedule the execution of a job under Linux.
  • Talend Enterprise and the TAC.
  • Exercise: Export the first job created outside TOS, schedule the execution of the exported job via the Windows Task Scheduler.
For further
  • Good development practices.
  • Create an Eclipse plug-in.
  • Integrate an Eclipse plug-in into Talend Open Studio.
  • Presentation of Talend ESB.
  • Presentation of Talend Big Data.
  • Exercise: Sharing connections, using Rollback.
Conclusion
  • Presentation of resources on Talend.
  • Promote your development within the Talend community.
580

Oracle 11g Administrator certification cycle

★★★★★

  • SII-88
  • 15 Days (105 Hours)

Description

This complete cycle will provide you with the knowledge necessary to practice the profession of Oracle 11g DBA in an optimal manner. It first details the architecture of the DBMS and the administration techniques. It then delves deeper into backups/restorations and tuning to teach you how to establish effective backup strategies in order to respond to crisis situations and improve the performance of your databases.

Who is this training for ?

For whom
Oracle database administrators, application administrators and database consultants.
581
Prerequisites

None

Training objectives

Understand the architecture of an Oracle 11g DBMS
Know how to install and configure the DBMS
Administer and manage the security of a database
Master the backup and restoration management tools
Know the tools for measuring, diagnosing and optimizing the SDBG
Know how to analyze and optimize the performance of the Oracle 11g DBMS

582

Training program

Administration
  • Oracle 11g architecture.
  • The files constituting the database.
  • The storage structure.
  • The memory areas.
  • Background processes.
  • Transaction management.
  • Software installation.
  • Prerequisites depending on the system.
  • Unix installation tasks.
  • The OFA architecture.
  • Using Oracle Universal Installer (OUI).
  • Enterprise Manager Configuration Assistant.
  • The architecture of ASM.
  • Configuration and control.
  • Instance management.
  • Identification control methods.
  • Starting an instance.
  • Stopping.
  • Dynamic views.
  • Data dictionary .
  • Trace files and alert files.
  • Configuring Oracle Net Services.
  • Database management.
  • The configuration wizard.
  • Management of the control file.
  • Management of logging files.
  • Size the redo log buffer and redo log files.
  • Database storage management.
  • Creation of a permanent, temporary and undo tablespace.
  • Management of tablespaces.
  • The structure of a block.
  • Storage of BLOB or CLOB type data.
  • Table storage statistics.
  • The High Water Mark.
  • Reorganizing storage and unused space.
  • Manage undo data.
  • Undo segments.
  • The retention period for cancellation information.
  • Flashback Database.
  • Flashback Query, Version Query and Transaction Query.
  • User management and security.
  • Creating a user.
  • Privileges.
  • Roles.
  • Profiles.
  • Jobs practices Modification of the database settings.
  • Create the SPFILE file from a PFILE file.
  • Configuration of SQL*Net.
  • Multiplex the control file, view its contents.
  • Modify the group size of the logging files.
  • Put the database in ARCHIVELOG mode.
583
Backups and restores
  • Management and backup with RMAN.
  • Configuration and commands.
  • Automatic backup of the control file.
  • Execution in parallel backup sets.
  • Compressed and encrypted backups.
  • Catalog creation and management.
  • Using stored scripts.
  • Duplicate a database with RMAN.
  • Recovering the database.
  • Rebooting with missing files.
  • Losing control files.
  • Recovering read-only tablespaces.
  • The RESTORE and RECOVER commands.
  • Recovering with the administration console.
  • Simplified recovery via RESETLOGS.
  • Flashback Database.
  • Configure and monitor Flashback Database.
  • Back up the fast recovery area.
  • Perform a flashback on deleted tables.
  • Manage Flashback Data Archives.
  • Moving data.
  • Using Data Pump Export and Import.
  • Use external tables to move data.
  • Transport a tablespace.
  • Exercise: Defining the location of backups with RMAN and setting up the backup strategy retention of backups.
  • Examples of full and incremental backups.
  • Light clone a database.
  • Back up the control file and restore it.
  • Use FLASHBACK.
584
Tuning
  • The approach and tools.
  • The optimization approach.
  • Possible gains.
  • Measuring tools.
  • OEM.
  • Dynamic performance views.
  • Alert and user trace file.
  • Wait events.
  • Manage the repository, AWR snapshots, and execution plans.
  • Identify object access.
  • SQL Plan Management.
  • Use SQL Profile to optimize queries.
  • Management of changes.
  • Types of possible changes.
  • SQL Performance Analyzer (SPA).
  • Use of DB Replay.
  • Defining filters.
  • Replay function.
  • Adaptive thresholds and reference measurements.
  • Set thresholds 'adaptive alerts.
  • Configure normalization measures.
  • Diagnosis and adjustments.
  • Identify problems related to the SHARED POOL area, buffer cache, PGA memory, at I/O.
  • Architectural elements.
  • Understand the activity of the library cache area.
  • Sizing the buffer cache .
  • Automatic memory management.
  • Features.
  • SGA.
  • Manage space in segments.
  • BIGFILE and SMALLFILE tablespaces.
  • Optimize I/O.
  • Stripping and Mirroring.
  • RAID.
  • Exercise: Query dynamic performance views to display Wait events.
  • Change AWR snapshot collection interval.
  • Generate reports with SQL* More.
  • Use SQL Plan Management.
  • Optimize the library cache.
  • Reorganize database objects.
585

Oracle 12c, what's new

★★★★★

  • SII-89
  • 2 Days (14 Hours)

Description

This seminar offers you an overview of the new features of the Oracle 12c DBMS. Topics covered include multi-tenant architecture, automatic data optimization, real-time database diagnostics, adaptive execution plans, and obfuscation protection.

Who is this training for ?

For whom
Oracle database administrators, developers, consultants, project managers and application managers who want to think about upgrading their databases to version 12c.
586
Prerequisites

None

Training objectives

Evaluate the new features offered by the Oracle database version 12c.
Judge Oracle's efforts regarding Cloud Computing and virtualization
Evaluate the advantages and opportunities brought by Oracle version 12c.

587

Training program

Enterprise Manager and other tools
  • EM Cloud Control et Database Express.
  • OUI et DBCA.
  • SQL Developer.
Shared architecture
  • Root container (CDB).
  • Inserted containers (PDB).
  • Manage logs, flashbacks and tablespaces.
  • Manage common/local schemas, privileges, and roles.
  • Create or clone a PDB insert database.
  • Extracting a PDB insert database from a container and insertion into another.
  • Connections to inserted PDB databases.
  • Manage tablespaces, users, privileges, common/local roles.
Backup and Restore
  • The new SYSBACKUP and SYSDG privileges.
  • The use of SQL in RMAN.
  • Multisection backups.
  • Transport between platforms .
  • Saving, duplicating and flashback.
588
Automatic data optimization
  • Analysis of database activity.
  • Automatic movement and compression.
  • Types of compression and strategies.
  • The archiving solution in the database.
  • Manage temporal and historical validity.
Audit, monitoring, diagnosis
  • Setting up and managing the unified audit.
  • Monitor a BDD ADDM operation in real time.
  • Define the dimensions of the overall load .
  • ADR repository and network enhancements.
  • Handle resources and blocked requests.
  • Changes to shutdown procedures.
  • Active database operation report.
Privileges
  • Implement segregation of duties.
  • Use database privilege scanning.
  • Ombre protection.
  • Security policies masking.
589
The diagrams
  • Schema editing and synchronization.
  • The data comparison flow.
  • Multiple indexes on the same set of columns.
  • Create a table with invisible columns.
  • Advanced row compression.
  • Redefinition and inline modifications.
  • Partitioned tables.
SQL queries
  • The new data types.
  • The row limitation clause.
  • Handling adaptive execution plans.
  • Improvements in collecting statistics.
590

Oracle, getting started

★★★★★

  • SII-373
  • 5 Days (35 Hours)

Description

This training will allow you to acquire all the skills necessary for the efficient and reliable use of the product: relational principles, concepts and practice of SQL language, physical organization and transaction management. The main orders will be analyzed and implemented.

Who is this training for ?

For whom

IT professionals having to develop for Oracle or wanting a first approach to administration.

591
Prerequisites

Basic knowledge of programming.

Training objectives

Know the architecture of an Oracle database.
Understand the relational model.
Create a database with its schema objects.
Manipulate data with SQL and PL/SQL.
Discover management tasks of a base.

592

Training program

Introduction
  • The Oracle server.
  • The different versions.
  • The different editions.
  • The relational model.
  • The notions of table and relationship.
  • Integrity constraints.
  • Tools.
  • SQL Developer.
  • The ISQL*Plus tool.
  • SQL introduction.
  • Oracle data types.
  • Creating tables.
  • Introduction to setting statements up to date.
  • Using sequences.
  • Introduction to querying (SELECT).
  • Manipulating data.
  • Introduction to transactions.
593
Langage d'interrogation SQL
  • Different SQL features.
  • Sorting and removing duplicates.
  • Functions and aggregates.
  • Type conversion and NULL value.
  • Queries on multiple tables.
  • Joins. Nested queries.
  • Set operators.
Introduction to PL/SQL
  • PL/SQL language instructions.
  • Types of variables.
  • Control instructions: conditions, iterations.
  • Error management using the exception mechanism.
  • Structuring PL/SQL programs.
  • Procedures and functions.
  • Definition and use of stored procedures.
  • Specification of packages.
  • Interaction with the database.
  • Implicit and explicit cursors.
594
Triggers LMD dans Oracle
  • Presentation of Oracle triggers.
  • Structure of a trigger (Event/Action).
  • Types of LMD triggers (statement and row triggers).
  • Actions of a trigger (automatic updating of data, cancellation of an illegal action, audit).
  • Using triggers.
  • Creation and use of instruction triggers.
  • Use of line triggers: NEW and: OLD in these triggers Trigger management.
Architecture and objects of a database
  • Manipulation of tables. Creation of tables.
  • Definition of integrity constraints.
  • Deferred integrity constraints.
  • Deletion of tables and the trash.
  • Using temporary global tables.
  • Using views and synonyms: creating and using views and synonyms.
  • Organizing data: Oracle storage models. Definition and use of indexes.
  • Data dictionary: Data dictionary tables and views.
595
Transaction management
  • Access to the database by transactions: partial cancellation of transactions. PL/SQL and transactions.
  • Concurrency management and data locking. Characteristics of standard management.
  • Read-only transactions, isolation levels, explicit locking.
Security and users
  • Access rights.
  • Object privileges, system privileges and roles.
  • Assigning and revoking access rights.
  • Rights to stored views and processing.
  • User management.
  • User authentication.
  • User profiles and resource usage limits.
596

Oracle 12c/11g, new features for developers

★★★★★

  • SII-374
  • 3 Days (21 Hours)

Description

This course aims to present the contributions of this new version and their implementation. It will allow each participant to take full advantage of Oracle 12c/11g.

Who is this training for ?

For whom

Project managers, design engineers, developers, consultants, having to develop in optimal conditions with Oracle 12c/11g.

597
Prerequisites

None

Training objectives

598

Training program

What's new in SQL 11g
  • Regular expressions for extraction and verification.
  • Using virtual columns for indexing.
  • Managing external tables: compression and preprocessing.
  • Subpartitioning.
  • Functions for XML.
  • Transposition functions (PIVOT and UNPIVOT).
  • Expression of common tables with the clause WITH, application to recursion.
  • Exercise: Queries with regular expressions and graphs.
  • Setting up virtual column indexes.
  • Creating a compressed external table.
  • Manipulating XML content.
599
What's new in SQL 12c
  • Cascading deletions with TRUNCATE.
  • Row limiting with FETCH.
  • Using DEFAULT for sequences and NULLs.
  • Creation of identity columns.
  • Session sequences.
  • Constructing views with LATERAL.
  • Creating joins with CROSS APPLY and OUTER APPLY.
  • Pattern recognition with MATCH_RECOGNIZE.
  • SQL functions for JSON content.
  • Temporal validity with PERIOD.
  • Exercise: Using auto -increment.
  • Template searches.
  • Manipulating JSON content.
600
What's new in PL/SQL 11g and 12c
  • Sequences, loops and duplicates.
  • Compound triggers.
  • Result Cache functions.
  • Object versions with Edition-Based.
  • Assigning rights with ACCESSIBLE BY.
  • Role management with Code Based Access Control.
  • Binding variables for dynamic SQL.
  • Implicit results.
  • Exercise: Caching function results.
  • Defining structured variables to construct SQL statements.
  • Assigning roles to a program unit.
601
New features in 11g and 12c packages
  • BMS_SQL for dynamic SQL and for returning cursors.
  • UTL_CALL_STACK for obtaining detailed information about subroutines.
  • DBMS_FLASHBACK for auditing and recovering transactions ( transaction backout).
  • DBMS_STATS for new histograms and extended statistics.
  • (CREATE_EXTENDED_STATS, SEED_COL_USAGE and REPORT_COL_USAGE).
  • DBMS_SQLTUNE for automating SQL profiles.
  • DBMS_SPM to manage execution plans with SQL Plan Management.
  • Exercise: Subroutine call traces.
  • Collecting extended statistics.
  • Analysis of query tuning.
602

Oracle Application Express, develop applications for Oracle

★★★★★

  • SII-372
  • 3 Days (21 Hours)

Description

Thanks to this practical course, you will be able to develop Web-type applications whose goal is to access and present data from the Oracle database. You will understand how the Oracle Application Express development environment, more commonly known as ApEx, works.

Who is this training for ?

For whom

Application developers and administrators.

603
Prerequisites

None

Training objectives

Discover APEX components Master APEX architecture Develop tailor-made RAD applications Implement APEX security Install external resources

604

Training program

Introduction
  • Installation and configuration of Application Express.
  • Using database objects.
  • Presentation of the user interface.
  • Manage and maintain the application development process.
  • Workspace login page.
  • Workspace home page.
  • Practical work Taking control of the environment and creating a workspace.
Application Builder
  • Creation of simple applications.
  • Creation of forms, regions.
  • Creation of reports based on queries.
  • Creation interactive states, personalization of presentations.
  • Definition of the authentication model.
  • Creation and management of a theme.
  • Choice of the theme and copy of shared components.
  • Practical work Creating an application with forms and reports.
605
Event management
  • Process triggering.
  • Creation of graphs and interactivity of these graphs.
  • Implementation of session variables.
  • Setting up controls on forms.
  • Creating interactive reports based on dynamic queries.
  • Practical work Creating graphs and interactive reports.
Dynamic actions
  • Programming input controls in APEX forms in JavaScript.
  • Read and write access to APEX form data from stored procedures.
  • Triggering techniques of PL/SQL calculations in the background.
  • Creation of dynamic trees based on Oracle views.
  • Definition of master-detail structures.
  • Cascading selection lists.
  • Programming controls, in PL/SQL, on tabular forms.
  • Practical work Creating master-detail reports and lists cascade selection.
606
Workspace administration
  • Application Express organization.
  • Roles in Application Express.
  • Access in Application Express Administrator mode.
  • Creation of workspaces and editing of different parameters.
  • Increasing the size of a workspace.
  • Practical work Creating and managing workspaces work.
607

Oracle 12c, administration

★★★★★

  • SII-90
  • 5 Days (35 Hours)

Description

During this intensive and very practical course, you will learn how to implement and administer the Oracle12c DBMS under optimal conditions. Among the main points covered are the architecture of the DBMS, installation, as well as the management of the instance, databases, disk spaces, objects, undo data, users and access rights .

Who is this training for ?

For whom
Oracle database administrators, application administrators and consultants.
608
Prerequisites

None

Training objectives

Break down the architecture of the Oracle 12c database
Install the Oracle 12c DBMS
Determine the main functionalities of administering an Oracle database
Create and manage a database
Manage user access
Manage security from the database

609

Training program

Architecture d'Oracle 12c et installation
  • Files constituting the database.
  • Data storage.
  • Memory areas.
  • Background processes.
  • Transaction management.
  • Tasks of an administrator.
  • Prerequisites depending on the system.
  • Installation tasks under Unix.
  • OFA architecture.
  • Using Oracle Universal Installer (YES).
  • Installation in interactive or silent mode.
  • The architecture RAC.
  • The shared architecture (CDB) and the inserted databases (PDB).
  • EM Database Express and SQL Developer.
  • The architecture Automatic Storage Management (ASM).
  • Practical work Installation of Oracle 12c.
610
Creating and deleting databases
  • Understanding and using Oracle Managed Files (OMF).
  • Storage in ASM disk groups.
  • The Database Configuration Wizard.
  • The creation and management of a CDB container and a PDB inserted database.
  • Practical work Creation of a new database from scripts generated by DBCA.
Instance management and network configuration
  • Identification control methods, SYSDBA, SYSBACKUP, SYSDG, SYSKM.
  • Setting the instance with PFILE or SPFILE.
  • Shutdown options and starting an instance.
  • Starting and stopping a CDB container and an inserted PDB database.
  • Views: dynamic, data dictionary.
  • Trace files, alert file and ADR repository.
  • Network configuration, Oracle Net Services configuration, service management.
  • The management of an ASM and Oracle Restart instance with crsctl and srvctl.
  • Practical work Modifying the database settings.
  • Create the SPFILE file from a PFILE file.
  • Configuring SQL*Net to connect a PDB inserted database.
611
Managing the control file and log files
  • The functions of the control file.
  • Its contents.
  • Multiplex the control file.
  • Creating and managing log files .
  • ARCHIVELOG mode.
  • Managing archive files.
  • Practical work Multiplex the control file, view its contents.
  • Create and modify log file group sizes.
  • Put the database in ARCHIVELOG mode.
Managing logical disk spaces
  • Creating a permanent, temporary and undo tablespace.
  • Set a default permanent, temporary and undo tablespace.
  • Permanent and temporary tablespace in the architecture shared.
  • Enlargement/move a tablespace online.
  • Group of temporary tablespaces and compaction of a temporary tablespace.
  • Practical work Creating different tablespaces, setting default permanent, temporary and undo tablespaces.
  • Create a group of temporary tablespaces.
612
Database Structures
  • The storage structure.
  • The tablespace storage parameters.
  • The use of extents.
  • The structure of a database block.
  • Storage of BLOB or CLOB type data.
  • Statistics and table storage information.
  • The High Water Mark and the block chaining.
  • Reorganization of storage and unused space.
  • Analysis of activity, compression and automatic movement of data.
  • Work practices Reorganizing a table.
  • Automatically moving and compressing tables.
613
Object administration
  • External and temporary tables.
  • Index: B
  • tree, bitmap and function-based.
  • Tables organized as indexes (IOT).
  • Partitioning tables, indexes and IOTs.
  • Materialized views.
  • Practical work Creation of indexes B
  • tree, bitmap index and a materialized view.
Cancellation data management
  • The undo segments and the retention period of undo information.
  • Ensure that undo information is retained.
  • Use the Undo wizard.
  • Flashback Database.
  • Flashback Query, Version Query and Transaction Query.
  • Flashback archive and use of Flashback table.
  • Practical work rnChanging how undo information is retained.
  • Put UNDO records from temporary tables into the temporary tablespace.
614
User management and security
  • Creating a local or common user.
  • Expiration and logging of passwords.
  • System and object privileges granted locally or commonly.
  • Local and common roles.
  • Profiles.
  • Manage resources in a database.
  • Practical work Configuration of user rights.
  • Setting up a schema and users to connect and work with this application.
Supplements
  • Manage the AWR repository and ADDM monitor.
  • Set alert thresholds and use automated tasks.
  • Datapump architecture overview.
  • Implementing audit trails.
615

Oracle 12c, new features for administrators

★★★★★

  • SII-371
  • 4 Days (28 Hours)

Description

This course is intended for Oracle 11g administrators having to migrate the DBMS to Oracle 12c. Among the main points covered, trainees will see the new shared architecture, as well as the improvements made in terms of security, manageability and performance.

Who is this training for ?

For whom

This course is aimed at Oracle 11g database administrators.

616
Prerequisites

None

Training objectives

Identify the new administration features of the new version of the Oracle 12c database Evaluate the new interface Use the new administration features of version 12c

617

Training program

Shared architecture
  • Root container (CDB).
  • Inserted containers (PDB).
  • Triggers on inserted database.
  • Log management, flashback and tablespaces.
  • Manage schemas, privileges and roles.
  • Exercise: Create and manage a shared architecture.
Backup and Restore
  • The new privileges.
  • The use of SQL in RMAN.
  • Transport between platforms.
  • Backup and flashback.
  • Duplicate a database.
  • Exercise: Backup/restore inserted databases.
618
Automatic data optimization
  • OAD levels.
  • Automatic moving and compression.
  • Compression types and strategies.
  • The solution
  • New temporal data type in SQL.
  • Exercise: rnSet up the policy online movement and compression of data files.
Audit, monitoring, diagnosis
  • Setting up and managing the unified audit.
  • Define and monitor a database operation.
  • Define the dimensions of the overall load .
  • ADR repository related enhancements.
  • Handle resources and blocked requests.
  • Changes to shutdown procedures.
  • Exercise: Implement an audit strategy as well as real-time diagnosis.
619
Privileges
  • Implement segregation of duties.
  • Use database privilege scanning.
  • Ombre protection.
  • Security policies masking.
  • Exercise: Manage privileges and implement a data masking strategy.
The diagrams
  • Schema editing and synchronization.
  • The data comparison flow.
  • Index on the same set of columns.
  • Create a table with invisible columns.
  • Advanced row compression.
  • Redefinition and inline modifications.
  • Partitioned tables.
  • Exercise: Comparison of several database diagrams.
620
SQL queries
  • The new data types.
  • The row limitation clause.
  • Handling adaptive execution plans.
  • Improvements in collecting statistics.
  • Exercise: Perform a statistics collection.
621

Oracle 12c, advanced administration

★★★★★

  • SII-298
  • 5 Days (35 Hours)

Description

This course is essential for anyone who wants to improve their skills in Oracle 12c database administration. It will allow them to implement advanced functionalities, including shared architecture management, task scheduling and database resource management.

Who is this training for ?

For whom

Oracle 12c database administrators, application administrators, system administrators and consultants.

622
Prerequisites

Basic knowledge of Oracle 12c administration or equivalent.

Training objectives

Deep your knowledge of Oracle SDBG administration
Evaluate the advanced features of Oracle SDBG administration
Configure and start a database remotely
Manage a database with EM Cloud Control
Create a CDB container
Put implement a monitoring strategy

623

Training program

Introduction and reminders
  • Automated installation by response file, application of patches.
  • Create and manage basic services.
  • Using DBMS_JOB and DBMS_SCHEDULER.
  • Practical work Create a service and a service start trigger.
  • Schedule a task.
EM and other tools
  • Remote listener and connection filtering.
  • EM Cloud Control, EM Database Express and SQL Developer.
  • Configuring network compression.
  • Practical work Configure and start a DB remotely.
  • Manage the DB with EM Cloud Control.
Shared architecture
  • Creating a CDB container database.
  • Create, clone and delete a PDB database.
  • Move a PDB database from one CDB container to another.
  • Manage tablespaces, users and privileges.
  • Practical work Move a PDB database to a CDB container.
624
Advanced monitoring
  • Automatic Diagnostic repository and ADRCI.
  • Trace DDL orders.
  • Set alert thresholds and use alerts.
  • Implementation unified audit strategies.
  • Monitor database operations.
  • Protection by obfuscation.
  • Practical work Setting up an audit strategy.
Maintenance
  • Monitoring used space and storage structures.
  • Analyze database activity.
  • Automatic moving and compression.
  • Archiving in the database.
  • Practical work Automatically move and compress tables and partitions.
625
Resource Manager
  • Configuring Database Resource Manager.
  • Create a new resource allocation plan.
  • Active session pool and maximum execution time.
  • Create groups of resource consumers.
  • Manage resources between PDB databases.
  • Practical work Creation of a resource plan.
Grid Infrastructure (ASM)
  • ASM architecture, features, and installation.
  • Instance and disk group management.
  • Oracle Restart.
  • Exercise: Migrating a database to ASM.
Table partitioning
  • Partitioning by interval, system, virtual column, reference and composite.
  • Managing partitioned tables.
  • Exercise: Creating partitioned tables/indexes .
626

Oracle 12c, tuning

★★★★★

  • SII-370
  • 4 Days (28 Hours)

Description

This training will teach you to identify performance problems with your Oracle12c databases and to implement the appropriate solutions to deal with them. You will learn in particular how to size the different areas of memory (PGA, buffer cache, Shared Pool) and how to optimize logging and I/O.

Who is this training for ?

For whom

Experienced administrators on Oracle12c.

627
Prerequisites

None

Training objectives

628

Training program

Introduction
  • The optimization approach.
  • The possible gains.
  • The objectives.
  • Creation of a monitoring service.
  • Network compression.
Statistics and events Wait
  • Dynamic performance views.
  • EM Cloud Control or BD Express.
  • Alert file, user trace and Wait events.
  • AWR and Statspack repository, snapshots and reports.
  • Exercise: Find Wait events.
  • Modify the snapshot collection periodicity.
  • Generate reports.
629
The optimizer and SQL Plan Management
  • Manage statistics and execution plans.
  • Identify access to database objects.
  • SQL Plan Management.
  • Automatic management of maintenance tasks.
  • Using SQL Profile to optimize queries.
  • Managing adaptive SQL plans.
  • Exercise: Calculate statistics for a database.
  • Generate execution plans.
  • Use SQL Plan Management in the case of application developments.
Resource Manager
  • Configuring BD Resource Manager.
  • Create a plan and manage consumers.
  • Manage resources between PDB databases.
Manage baseline measurements
  • Adaptive thresholds and reference measurements.
  • Define adaptive alert thresholds.
  • Configure normalization measurements.
  • Operations and ADDM diagnosis in real time.
  • Exercise: Monitor the processing of a service.
630
Diagnosis and adjustments
  • Issues related to SGA, PGA and automatic memory management.
  • The dedicated, shared server and connection pools.
  • Activity of the Library Cache.
  • The Buffer Cache, Flash Cache and block size.
  • Segment optimization, automatic movement and compression.
  • Tablespaces, checkpoints, I/O, Striping And Mirroring Everywhere.
  • Exercise: Library Cache, Buffer Cache optimization and automatic memory management.
Journaling
  • Checkpoint settings.
  • Buffer Redo Log and log files.
  • Impact of archiving.
  • Exercise: Optimize file size.
Database Replay
  • Capture, processing of the global load, re-execution.
  • Production system before modifying or cloning the PDB.
631

Oracle 12c, high availability architecture

★★★★★

  • SII-358
  • 3 Days (21 Hours)

Description

This course will teach you how to implement a high availability architecture with Oracle 12c. You will also see the new features of Grid Infrastructure, Real Application Clusters and Data Guard which will be implemented in a multi-tenant database architecture context.

Who is this training for ?

For whom

Oracle 12c database administrator, application administrator, systems administrator and consultants.

632
Prerequisites

Good knowledge of Oracle 12c and Oracle Data Guard administration or knowledge equivalent to that provided by the Orsys OAD and DMO reference courses.

Training objectives

  • Set up and ensure high availability of an Oracle 12c database
  • Discover what a shared architecture is
  • Install a Flex ASM architecture
  • Install and configure a Flex cluster
  • Create databases in a high availability architecture

633

Training program

Introduction to multitenant architecture
  • Contribution of the implementation of the shared architecture.
  • Creation of a CDB container database.
  • Create, clone and delete a PDB database.
  • Move a PDB database from one CDB container to another.
  • Manage talespaces, users and privileges.
  • Integration with RAC and Data Guard .
Architecture Data Guard
  • Data Guard remote and transport synchronization.
  • Data Guard enhancements.
  • Non-concurrent database upgrades.
  • Improvements to Data Guard Broker.
634
ASM et Flex ASM
  • The architecture.
  • Configure and manage Flex ASM.
  • Monitor Flex ASM connections and transfer an ASM client.
  • Improvements made to ASM Fast Mirror Resync.
  • Rebalancing enhancements.
  • Proactive data integrity validation.
  • ASM password file management.
  • Global change of file owner.
Oracle Clusterware
  • The architecture.
  • Configure the shared GNS service.
  • Transferring the GNS service to another cluster.
  • Cluster Health Monitor services .
  • Grid Infrastructure management framework.
635
Flex Clusters
  • The architecture.
  • Install and configure Flex Clusters.
  • Flex Clusters and failure detected on a node.
  • Presentation of the management of a Cluster based on strategies.
  • Classification of servers into categories.
  • Evaluation of an order by simulation.
  • Evaluation of the impacts of a failure.
New RAC features
  • RAC and Flex ASM.
  • RAC and policy-based Cluster Management.
  • RAC and order evaluation by simulation.
  • RAC and application continuity.
Global Data Services
  • Introduction.
  • Logical components.
  • Physical components.
  • Global services and RAC.
  • Global services and Data Guard Broker.
  • Global connection load balancing.
636

Oracle 12c ASM, administration

★★★★★

  • SII-93
  • 2 Days (14 Hours)

Description

This internship will teach you how to administer Oracle's Grid Infrastructure solution. You will see how to install and configure ASM to manage disk volumes and ensure performance. You will also learn how to use the Oracle Restart tool to manage the shutdown/startup of all components of a database.

Who is this training for ?

For whom
This course is aimed at database administrators, technical consultants, support engineers.
637
Prerequisites

None

Training objectives

Learn about Oracle Clusterware and ASM architecture Install the Grid Infrastructure tool Migrate a database to ASM Implement efficient disk volume management Manage a Database with the Oracle Restart Tool

638

Training program

Introduction
  • Basic grid components.
  • Oracle Clusterware and ASM architecture.
  • Disk groups.
  • File systems clustered.
Installer Grid Infrastructure
  • Hardware configuration and the SYSASM privilege.
  • Installing ASMLib.
  • Disk and network configuration.
  • DNS and DHCP configuration .
  • Grid Plug and Play considerations.
  • Tasks to complete after installation.
  • Exercise: Install the Grid Infrastructure tool.
Oracle Restart
  • The installation phases.
  • Oracle Restart.
  • CRSCTL and SRVCTL utilities.
  • Exercise: Attach a base of data to be managed by the Oracle Restart tool.
639
L'instance ASM
  • ASM initialization parameters.
  • Adjust the parameters of ASM instances in SPFILE files.
  • Dynamic views.
  • Start ASM instances with ASMCA and ASMCMD.
  • Start and stop the ASM listener process.
  • Managing ASM password files.
  • Exercise: rnConfigure the ASM instance and save the settings file.
ASM disk groups
  • Create and delete ASM disk groups.
  • Attributes.
  • Maintenance tasks.
  • Dynamic rebalancing.
  • Preferred failure groups for reading.
  • Show ASM disk statistics.
  • Exercise: r nConfigure the disk groups needed for database migration.
640
ASM files
  • Different client tools to access ASM files.
  • Fully qualified ASM file names.
  • Create ASM files, directories and aliases.
  • Manage disk group templates.
  • ASM file names.
  • Global ownership change (files/privileges).
  • Commands SQL and file names.
  • Exercise: Migrate a database to ASM.
Flex ASM
  • Architecture and deployment alternatives.
  • Configure and manage Flex ASM.
  • Monitor Flex ASM connections.
  • Transfer an ASM client.
  • Exercise: Implementation of a Flex ASM architecture.
641

Oracle 11g, administration

★★★★★

  • SII-368
  • 5 Days (35 Hours)

Description

You will learn how to implement and administer the Oracle11g DBMS under optimal conditions. Among the main points covered are the architecture of the DBMS, installation, as well as the management of the instance, databases, disk spaces, objects, undo data, users and access rights .

Who is this training for ?

For whom

Oracle database administrators, application administrators and consultants.

642
Prerequisites

None

Training objectives

Break down the architecture of the Oracle 11g database Install the Oracle 11g DBMS Determine the main functionalities of database administration Create and manage a database Manage user access Manage database security data

643

Training program

L'architecture d'Oracle 11g et installation
  • The files constituting the database.
  • The structure of data storage.
  • The memory areas.
  • The processes of background.
  • Transaction management.
  • Multi-threaded Server architecture.
  • The tasks of an administrator.
  • Installation of the SDBGR.
  • Prerequisites depending on the system.
  • Installation tasks under Unix.
  • The OFA architecture.
  • Usage of Oracle Universal Installer (YES).
  • Advanced installation in silent mode.
  • Enterprise Manager Configuration Assistant.
  • The architecture of Automatic Storage Management (ASM).
  • Exercise: Discovery of the structure of the Oracle database.
  • Installation of Oracle 11g.
644
Instance management and network configuration
  • Identification control methods.
  • Instance configuration with PFILE or SPFILE.
  • Instance startup states.
  • Options for stopping an instance.
  • Views: dynamic, data dictionary.
  • Trace files and alert files.
  • Network configuration.
  • Oracle Net Services configuration.
  • The " listener file.
  • ora ".
  • Client configuration.
  • Network configuration and name resolution by LDAP.
  • Exercise: Modifying the database settings.
  • Create the SPFILE file from a PFILE file.
  • Configuring SQL*Net.
645
Creating and deleting databases
  • Understand and use Oracle Managed Files (OMF).
  • The Database Configuration Wizard.
  • Exercise: Creating a new database from scripts generated by DBCA.
Manage control file and manage log files
  • The functions of the control file.
  • Its contents.
  • Multiplex the control file.
  • Manage log files.
  • The role of log files.
  • Manage, multiplex and archive log files.
  • Exercise: Multiplex the control file, visualize its content.
  • Change logging file group size.
  • Put the database into ARCHIVELOG mode.
Logical disk spaces
  • Types of tablespaces.
  • The creation of a permanent, temporary and undo tablespace.
  • The extension of a file.
  • Enlarging and moving a tablespace.
  • Exercise: Creating different tablespaces, defining the default permanent, temporary and undo tablespaces from the base.
646
Database Structures
  • The storage structure.
  • The tablespace storage parameters.
  • The use of extents.
  • The structure of a database block.
  • Storage of BLOB or CLOB type data.
  • Statistics and table storage information.
  • The High Water Mark and the block chaining.
  • Storage reorganization and unused space.
Manage cancellation data
  • Undo segments.
  • Configure the retention period for undo information.
  • Ensure retention of undo information.
  • Use the Undo wizard.
  • Flashback Database.
  • Flashback Database architecture.
  • Flashback deleted tables.
  • Flashback Query, Version Query and Transaction Query.
  • Exercise: Changing the way undo information is retained.
647
Object administration
  • Create and use directory objects.
  • External and temporary tables.
  • Index: B
  • tree, bitmap and based on a function.
  • Partitioning tables, indexes.
  • Materialized views.
  • Exercise: Creating indexes B
  • tree, bitmap index and a materialized view.
User management and security
  • Creating a user.
  • Expiration and logging of passwords.
  • System and object privileges.
  • Roles.
  • Profiles.
  • Exercise: Configuring user rights.
648
Supplements
  • Backups and restorations.
  • ARCHIVELOG and NOARCHIVELOG modes.
  • Base backup stopped and database open.
  • Manage the AWR repository.
  • Use the ADDM monitor.
  • Set alert thresholds.
  • Use server-generated alerts.
  • Use tasks
  • Unblock user sessions.
  • Collection of statistics.
  • Presentation of Export and Import Datapump.
649

Oracle 11g, advanced administration

★★★★★

  • SII-94
  • 5 Days (35 Hours)

Description

This course is essential for those who wish to administer their databases while taking advantage of advanced features. Among the points covered are: OEM, advanced network configuration, task scheduling, redefinition of online tables, use of alerts and Flashback.

Who is this training for ?

For whom
Oracle 11g database administrators, application administrators, system administrators and consultants.
650
Prerequisites

None

Training objectives

651

Training program

Introduction and reminders
  • Control files, redo log.
  • Transactions.
  • Identification of a database.
  • Automated installation by response file, application of patches.
Advanced configuration
  • Network.
  • Remote listener.
  • Connection filtering.
  • OEM.
  • Architecture.
  • Grid Control vs Database Control.
  • The repository.
  • Administration console and modules.
  • Exercise: Configuring the network to to start the database remotely.
  • Configuring EM Database Control.
652
Task Scheduling
  • Using DBMS_JOB.
  • Introduction to Oracle Scheduler.
  • Definition of jobs.
  • Exercise: Schedule a job with Oracle Scheduler.
Monitoring, advanced maintenance
  • Automatic Diagnostic Repository (ADR).
  • Alert log.
  • Workbench support.
  • Set alert thresholds.
  • Use alerts.
  • Monitoring used space.
  • Oracle memory structures.
  • Automatic management.
  • Database storage structures.
  • Flashback techniques: Flashback Transaction, presentation of Flashback Data Archive technology.
  • Exercise: Monitor the database and its objects.
  • Redefine tables online.
  • Use Flashback.
653
Resource Manager
  • Concepts, configuring Database Resource Manager.
  • Create a new resource allocation plan.
  • Active session pool.
  • Maximum execution time.
  • Create groups of resource consumers.
  • Exercise: Creating a resource plan with EM.
Automatic Storage Management (ASM)
  • Architecture.
  • Features.
  • Installing the Grid Infrastructure.
  • The Oracle Restart tool.
  • Managing an ASM instance.
  • ASM disk groups.
  • Migrating a database into ASM.
  • Exercise: Update in place of Oracle 11g ASM (Grid Infrastructure).
Database Replay
  • System architecture: capture, global load processing, re-execution.
  • Production system before modification.
  • Use the Capture wizard.
654
Table partitioning
  • Compression of tables and tablespaces.
  • Partitioning by interval, by system, by virtual column and by reference.
  • Maintenance of partitioned tables.
  • Exercise: Creating and modifying partitioned tables and indexes.
655

Oracle 11g, tuning

★★★★★

  • SII-95
  • 4 Days (28 Hours)

Description

This training will teach you to identify performance problems with your Oracle11g databases and to implement appropriate solutions to deal with them. You will learn in particular how to size the different areas of memory (PGA, buffer cache, Shared Pool) and how to optimize logging and I/O.

Who is this training for ?

For whom
This course is aimed at experienced administrators on Oracle11g.
656
Prerequisites

None

Training objectives

657

Training program

Introduction
  • The optimization process.
  • Possible gains.
  • Determination and control of objectives.
Statistics, Wait events, AWR
  • Measurement tools.
  • OEM.
  • Dynamic performance views.
  • Alert file.
  • User trace files.
  • Wait events.
  • Manage the repository and AWR snapshots.
  • States.
  • Practical work rnQuery dynamic performance views to display Wait events.
  • Change AWR snapshot collection interval.
  • Generate reports with SQL*Plus.
658
The optimizer and SQL Plan Management
  • Manage statistics and execution plans.
  • Identify access to database objects.
  • SQL Plan Management.
  • Automatic management of maintenance tasks.
  • Use SQL Profile to optimize queries.
  • Practical work Calculate statistics for a database.
  • Generate the execution plans.
  • Use SQL Plan Management to preserve performance in the case of application developments.
Management of developments
  • Types of possible developments.
  • SQL Performance Analyzer (SPA).
  • Using DB Replay.
  • Defining filters.
  • Replay function.
Manage baseline measurements
  • Adaptive thresholds and baseline metrics.
  • Set adaptive alert thresholds.
  • Configure normalization metrics.
659
Diagnosis and adjustments
  • Problems related to the SHARED POOL area, buffer cache, PGA memory, temporary tablespaces, I/O.
  • Architectural elements.
  • Understand the activity of the library cache area.
  • Size the buffer cache.
  • Automatic memory management.
  • Characteristics.
  • Manage space in segments.
  • BIGFILE and SMALLFILE tablespaces.
  • Optimize I/O.
  • Stripping and Mirroring.
  • RAID.
  • Practical work Configure the database for better conservation of SQL queries in the library cache.
  • Define the storage zones for blocks of a size other than the default.
Journaling
  • Adjustment of checkpoints.
  • Impact of archiving.
  • Size the redo log buffer and the redo log files.
  • Practical work Optimize the size of files and the redo log buffer.
660

Oracle 10g, administration

★★★★★

  • SII-418
  • 5 Days (35 Hours)

Description

Implement and administer the Oracle10g DBMS under optimal conditions. Among the main points covered are the architecture of the DBMS, administration techniques, management of data partitioning, information security.

Who is this training for ?

For whom

This course is aimed at Oracle database administrators, application administrators and consultants.

661
Prerequisites

A basic knowledge of relational database concepts.

A general understanding of database management systems.

Training objectives

Understand the fundamental concepts of Oracle database management.
Learn how to install and configure an Oracle database.
Master database administration techniques, including managing users, roles and privileges.
Know how to perform database backups and recoveries.
Learn how to monitor and optimize database performance.
Understand advanced Oracle database management features, such as space management storage and control files.
Be able to troubleshoot common problems encountered when administering an Oracle database.
Prepare to take associated Oracle Database Administration certifications, if applicable.

662

Training program

Architecture et installation d'Oracle 10g
  • Memory areas.
  • Multithreaded Server architecture.
  • Prerequisites depending on the system.
  • Installation under Unix.
  • Enterprise Manager Configuration Assistant.
  • Exercise: Installing Oracle 10g.
Instance management and database creation/deletion
  • Administrator credentials.
  • Setting the instance with PFILE or SPFILE.
  • Stopping and starting an instance.
  • Understanding and using Oracle Managed Files (OMF).
  • Creating and deleting a database.
  • Exercise: Changing the database settings data.
  • Creation of a new database from scripts generated by DBCA.
663
Network configuration
  • Configuring Oracle Net Services.
  • The "listener.
  • ora".
  • utilities LSNRCTL, TNSPING.
  • Configuring the client.
  • Oracle Net Manager and Net Configuration Assistant.
  • Exercise: Configuring Oracle Net.
Logical disk spaces (tablespaces)
  • Types of tablespaces.
  • Modifying a tablespace.
  • The extension of a file.
  • Exercise: Creation of different types of tablespaces.
  • Moving database files.
Database Structures
  • The storage structure.
  • The extents.
  • Reorganization of storage and unused space.
  • Exercise: r nSwitching from manual mode to automatic UNDO segment management mode.
664
Management of objects, users and security
  • Schema concept.
  • Table management.
  • Creating a user.
  • Locking an account.
  • Exercise: Activating data-violated constraints.
  • Configuring user rights.
Log files, backups and restores
  • The role of logging files.
  • Manage checkpoints.
  • Backups by copying files.
  • ARCHIVELOG and NOARCHIVELOG.
  • Exercise: Put the database in ARCHIVELOG mode.
  • Performing backups and recovery.
Administration tools
  • Using SQL*Loader.
  • Using Data Pump Export and Import.
  • Exercise: Unloading and loading data with SQL*Loader and Expdp/ Impdp.
665

Oracle, exploitation

★★★★★

  • SII-369
  • 5 Days (35 Hours)

Description

What you need to know to operate Oracle 9i/10g/11g in the best conditions of efficiency and security. This course will allow you to master the main mechanisms of Oracle, the basics of SQL and SQL Plus languages, startup processes and backup and import/export techniques.

Who is this training for ?

For whom

IT professionals wishing to guarantee reliable and efficient operation of Oracle.

666
Prerequisites

None

Training objectives

667

Training program

Introduction
  • Oracle environment.
  • File types used.
  • Valid processes.
  • Tablespaces.
  • Dictionary .
  • File types used.
  • Valid processes.
  • Tablespaces.
  • Dictionary.
  • Tasks 'operation: monitoring instances, recovering error messages.
  • Required tools.
  • Presentation of SQL.
  • Validation of scripts.
  • Using SQL*Plus in operation.
  • Recovering the structures of a DB.
668
User concept
  • User characteristics.
  • Recovery of login names, privileges and roles.
  • Unlock a user account.
  • Stopping a blocked connection.
  • Monitoring locks.
  • Privileged users.
  • SYS and SYSTEM.
  • Using groups sysoper and sysdba.
Management of storage structures
  • OFA architecture.
  • Tablespaces.
  • Find the storage structures of a base and the occupancy rate.
  • Segments of rollback/undo.
  • Identifying and monitoring rollback segments/undo.
669
Starting and stopping the database
  • Base states.
  • Use of the various states.
  • Startup.
  • Files implemented at startup.
  • Troubleshooting.
  • Automatic procedures.
  • Shutting down.
  • Monitoring established connections.
Network access
  • For the server and clients.
  • Activation of the SQL*Net/Net layer on the server.
  • Configuration files.
  • Startup scripts.
  • Testing the connection.
670
Network access
  • For the server and clients.
  • Activation of the SQL*Net/Net layer on the server.
  • Configuration files.
  • Startup scripts.
  • Testing the connection.
Backups and restores
  • Backup types.
  • Cold backup of a database.
  • Archive mode.
  • Test for presence of archive mode.
  • Files to save for a hot backup.
  • Hot backup.
  • Recovery of error messages when activating the database.
  • Identifying/restoring corrupted files.
  • RECOVER function.
671
Fonctions import/export et SQL*Loader
  • EXPORT to save a schema, a database.
  • Loading tables.
  • Message files.
  • Load processing .
  • Constraints.
Oracle 11g specifics
  • Performance.
  • Simplified maintenance.
  • Security.
  • Oracle Restart.
  • Data Recovery Advisor and RMAN enhancements.
  • Database migration.
672

SQL Server 2014/2012 Query (70-461) exam preparation

★★★★★

  • SII-316
  • 5 Days (35 Hours)

Description

This course will teach you how to write Transact SQL queries for SQL Server 2012/2014. You will see how to perform simple queries, use built-in functions and also, how to group and aggregate data. This course covers all the topics necessary to prepare for the Microsoft 70-461 exam.

Who is this training for ?

For whom

Database administrators, developers.

673
Prerequisites

None

Training objectives

Write Transact SQL queries for SQL Server 2012/2014
Know how to use built-in functions
Learn to query data with stored procedures

674

Training program

The basic structure of T-SQL queries
  • The architecture of SQL Server.
  • The SQL Server Management Studio application.
  • The basis of the language.
  • Predicate logic .
  • The SELECT statement.
  • Using column and table aliases.
  • Hands-on Running queries with SELECT.
  • Sort data with ORDER BY.
  • Use CASE expression.
Joins and sorting
  • Query multiple tables with joins.
  • Inner and outer joins.
  • Cross joins and free joins.
  • Sorting and data filtering.
  • The WHERE clause.
  • Filtering with TOP and OFFSET-FECTCH.
  • Practical work Example of join and sorting data.
675
Data types
  • Working with SQL Server 2014 data types.
  • Character data.
  • Using DML to modify data.
  • Insert, modify and delete data.
  • Practical work Example of using different types of joins.
Built-in functions
  • Queries with built-in functions.
  • Conversion and logic functions.
  • Functions and the NULL value.
  • Practical work rnApplication examples of built-in functions.
676
Data grouping and aggregation
  • Use aggregate functions.
  • The GROUP BY and HAVING clauses.
  • Included table views and functions.
  • Use aggregate functions. game operators (UNION, EXCEPT.
  • ).
  • Pivot and grouping.
  • The PIVOT and UNPIVOT clauses.
  • Practical work Examples of grouping and data aggregation.
  • Working with grouping sets.
677
Stored Procedures and Programming with Transact-SQL
  • Querying data with stored procedures.
  • Passing parameters to stored procedures.
  • The basics of T-SQL programming.
  • Program flow control.
  • Error handling.
  • Transaction control and isolation levels.
  • Practical work r nCreate simple stored procedures.
  • Work with dynamic SQL.
  • Redirect errors with TRY/CATCH.
Improve query performance
  • Write efficient queries.
  • Monitor execution.
  • Evaluate the impact on SQL Server.
  • Practical work r nQuery SQL server metadata.
  • Query catalog and system function views.
678

Administration of a SQL Server 2014/2012 database (70-462) exam preparation

★★★★★

  • SII-307
  • 5 Days (35 Hours)

Description

This training will provide you with the knowledge necessary to install, configure and administer SQL Server 2012. You will also learn backup and restore operations as well as server monitoring. This course covers all the topics necessary to prepare for the Microsoft 70-462 exam.

Who is this training for ?

For whom

Database administrators, operations managers, system administrators and engineers.

679
Prerequisites

None

Training objectives

Install and configure SQL server 2012/2014Monitor and track server activity
Plan and implement a backup strategy
Plan and implement a backup strategy
Enter an educational objective here

680

Training program

Basics and installation of SQL Server 2012/2014
  • Introduction to SQL Server administration.
  • Administrative tools and tasks.
  • Plan an installation.
  • Configuration of the database.
  • Practical work Getting started with SQL Server Management Studio.
  • Installation and configuration of SQL Server 2012/2014.
Storage and databases
  • How SQL Server stores data? Storing system and user databases.
  • Buffer pool extension.
  • Works practices Create a database.
Backing up and restoring a SQL Server database
  • How to set up a backup? The different options.
  • Backup and reliability.
  • The restoration process.
  • Advanced restore operations.
  • Hands-on Perform a database backup and restore.
  • Restore database transaction log backups.
681
Data transfer
  • Importing and exporting data.
  • Tools and techniques for transferring data.
  • Copying or moving a database.
  • Practical work Example of data transfer.
Monitor and track server activity
  • The activity monitor.
  • The performance analyzer.
  • Tracing the activity of the SQL Server workload.
  • Troubleshooting.
  • Optimizing database performance.
  • Hands-on Using the performance analyzer.
  • Example of database troubleshooting.
682
Security management
  • Basic security concepts in the SQL Server security architecture.
  • Security at the server and database level.
  • Permissions .
  • Data access audit.
  • Data encryption.
  • Practical work Set up security and audit.
  • Example of data encryption.
Server maintenance and task automation
  • The importance of data integrity.
  • Organize maintenance.
  • Automate management tasks.
  • Practical work rnCreate a task and automate it.
Alerts and notifications
  • Overview of alerts and notifications.
  • Check SQL Server errors.
  • Hands-on Implement notifications and alerts.
683

SQL Server administration, the essentials

★★★★★

  • SII-309
  • 2 Days (14 Hours)

Description

This training will allow Windows administrators to learn the essentials for managing a SQL Server database. It presents the fundamental configuration elements as well as the tools and best practices necessary to monitor, ensure consistency, and back up database data.

Who is this training for ?

For whom

Windows system administrator.

684
Prerequisites

None

Training objectives

Understand the architecture and main components of the SQL Server DBMS
Define a backup strategy and implement it
Implement security at different levels of the database (base, schemas, users)
Monitor the processing, maintain the quality and integrity of data on the database
Anticipate and resolve blocking situations on the database

685

Training program

Installing and configuring the SQL Server engine
  • General presentation of SQL Server: editions, services.
  • The general architecture of SQL Server.
  • The important steps of the installation.
  • The arrangement of files on the disks: data files, transaction log, tempdb.
  • Important elements of the configuration: server and database properties.
  • The important elements of the configuration: server and database properties.
  • SQL Server administration tools.
  • Command line utilities.
  • Practical work Observing the transaction log and tempdb.
Backup and recovery
  • The architecture of backup and restoration.
  • The different backup modes.
  • Establish a database backup strategy.
  • Perform complete or partial restorations.
  • Backups on network shares.
  • Practical work Setting up a backup strategy.
  • Restoring a corrupted database.
686
Security management
  • SQL Server security overview.
  • Service accounts.
  • Connection authentication.
  • Permissions in databases.
  • Protecting backups.
  • Practical work Creating logins and permissions on a table.
Server maintenance
  • Integrity verification, recovery of pages in case of corruption.
  • Defragmentation of indexes, reconstruction and reorganization.
  • Updating statistics .
  • Scheduling administrative tasks.
  • Running SQL Server Agent jobs.
  • The Maintenance Plan Wizard.
  • Practical work Implementation of a maintenance plan.
687
SQL engine monitoring
  • Performance counters to monitor, processor, memory usage, disk activity.
  • How to proactively identify problems? Manage blocking situations, deadlocks .
  • Manage memory and processors.
  • Practical work Monitoring with the performance monitor.
  • Resolving a deadlock situation.
688

SQL Server Administration for Other DBAs

★★★★★

  • SII-313
  • 3 Days (21 Hours)

Description

This internship will provide you with the necessary knowledge to install, configure and administer SQL Server 2012. You will discover the architecture of the server, learn how to configure it, optimize data storage, automate tasks as well as secure and guarantee data integrity.

Who is this training for ?

For whom

Experienced non-SQL Server database administrators, application administrators, and consultants.

689
Prerequisites

None

Training objectives

Install and configure the SQL Server database
Organize and optimize the physical storage of objects on the database
Automate common administrative tasks
Use several modes of saving and restoring database data
Repair damaged databases
Ensure the maintenance of indexes and statistics

690

Training program

Installation et configuration
  • SQL Server architecture.
  • Installation, migration.
  • Service configuration tools.
  • SQL Server Management Studio and SQLcmd.
  • exe.
  • Instances, schema databases.
  • Objects and system databases.
  • The "Data Management Views" .
  • Administration policies.
  • Configure the instance.
  • Practical work Use dynamic consultation tools.
  • Configuration using Policy Based Management (PBM).
691
Storage space management
  • Storage engine and physical storage.
  • Object allocation.
  • Table partitioning and indexes.
  • Calculated columns.
  • Manage database growth.
  • Database snapshots (SNAPSHOT).
  • Transparent Data Encryption: encrypt storage.
  • Practical work Creating a database.
  • File management.
  • Creating snapshots.
  • Setting up TDE.
692
Automation of administrative tasks
  • SQL Server agent scheduling tasks.
  • MSDB specific roles.
  • Execution log, monitor.
  • Alerts and notifications.
  • Operator management.
  • Sending emails: configure settings.
  • Multi-server work.
  • Redirection of emails events.
  • DDL triggers.
  • Events: performance, WMI, WQL.
  • Hands-on labs Automate and schedule jobs.
693
Backups and restores
  • Backup types.
  • Recovery modes and their influence.
  • Backup strategy.
  • Security.
  • Planning.
  • Restoration, repair of damaged environments.
  • The different restorations.
  • Backup of system databases.
  • Practical work Configure backups and restores.
694
Routine maintenance
  • Check physical integrity.
  • Recover engine information (DBCC).
  • Repair damaged databases.
  • Diagnostics of indexes in SQL Server.
  • Query metrics and execution plan.
  • Setting up indexes.
  • Maintaining indexes and statistics.
  • The maintenance plan tool.
  • Practical work Maintain indexes and statistics.
  • Check storage integrity.
Introduction to High Availability
  • The principle of "log shipping" and mirroring.
  • AlwaysOn: availability groups, replicas, listeners.
695

object-oriented design object software engineering

★★★★★

  • SII-311
  • 4 Days (28 Hours)

Description

How to approach object-oriented design? How to move from a functional approach to an Object approach? How to write an Object-oriented program with real scalability and reusability capabilities? This course offers you concrete and practical training in Object design.

Who is this training for ?

For whom

Developers, project managers wishing to train in Object-oriented design.

696
Prerequisites
  • Basic knowledge of application design and software development.

Training objectives

  • Why use object-based technologies?
  • The challenges of new IT: modularity (Plug-Ins), reusability, scalability
  • The use of component libraries
    How does the Object approach respond to these challenges?
  • In what state of mind should you approach an Object problem?
  • Learning from other areas of computer science and other disciplines

697

Training program

What to expect from the Object approach?
  • Why use object-based technologies? The challenges of new IT: modularity (Plug-Ins), reusability, scalability.
  • The use of component libraries.
  • How does the object approach respond to these challenges? In what state of mind should you approach an object problem? Learning from other areas of computer science and other disciplines.
The basic concepts of the Object approach
  • Objects: a procedure/data duality.
  • Classes as models of structure and behavior of objects, instances as representatives of classes.
  • The methods, procedures defined in classes and used by instances.
  • Interactions between objects by sending messages.
  • How are messages interpreted by objects? L 'inheritance.
  • Inheritance and typing of variables in strongly typed languages ​​(C++, Java).
Diagrams and representation of objects using UML
  • The main diagrams (class diagrams, sequence diagrams) and their use for Object design.
  • Object notation and representation tools: getting started with a modeler of the walk.
698
The main principles of object design
  • What do we put in the form of an object? Principle of reification.
  • Criteria to apply to decide what should be put in the form of Object.
  • Mistakes to avoid.
  • How to structure object software? Principle of modularity and domain decomposition.
  • How to structure a set of classes? Principle of abstraction and classification.
  • How to think about the interaction between objects? Principle of encapsulation and autonomy.
  • Analyze complex systems in terms of communications.
  • The general approach .
  • Mistakes to avoid.
  • Criteria to apply to have "good" class hierarchies.
  • Mistakes to avoid.
How to approach object software?
  • Development principles.
  • From spiral development to incremental development.
  • Identification of domain entities and description of interactions.
  • Reuse and scalability of programs.
  • Designing by objects is not using an Object tool! Mistakes to avoid.
699
From design to implementation
  • How to translate UML class diagrams into programming languages ​​and databases?rnThe principles of implementing object applications.
  • The importance of distributed.
  • Generalized client-server models.
  • The major current object platforms: technologies.
  • NET from Microsoft and JEE from SUN.
  • The importance of distributed.
  • Class libraries.
  • Programming languages ​​and 'use of components.'}
The approach by frameworks and components
  • The software life cycle problem.
  • Evolution and maintenance problems require a software approach that allows evolution.
  • The software approach frameworks and components, which is based on Object thinking, is a response to this need.
  • How to design and build applications quickly using frameworks and reusable components? How to integrate software components in an existing framework? How to build frameworks? Know how to take an existing application to transform it into a framework and thus make it scalable.
  • Major classes of frameworks.
  • Models of current components.
700
Les Design Patterns
  • How to reuse experience when designing and developing object applications? Design Patterns or "design patterns" as software solutions resulting from recurring general problems.
  • The different types of Design Patterns.
  • Example of Design Patterns.
  • Advantages and limitations of Design Patterns.
  • How to use Design Patterns practically ?Learn to implement Design Patterns through practice.
701

UML 2 modeling with Enterprise Architect

★★★★★

  • SII-345
  • 3 Days (21 Hours)

Description

Based around a complete case study, this condensed and practical course will allow you to master the essential UML notations and the main uses of Enterprise Architect within a development approach, from business modeling to to design.

Who is this training for ?

For whom

Software architects, designers, developers.

702
Prerequisites

None

Training objectives

Know how to use UML in different software engineering activities (business, requirements, design)
Know how to implement UML with the Enterprise Architect tool (class, sequence, state diagrams, etc.)
Know develop a quality design using architectural patterns (layers, MVC)
Know how to express the design with Enterprise Architect using static and dynamic modeling

703

Training program

Introduction to business modeling
  • The project approach and software engineering activities.
  • Importance of the design activity.
  • UML within the project approach.
  • The different diagrams.
  • The notion of stereotype and profile.
  • Business modeling: business process - activity diagram and domain class diagram.
  • Practical work Getting started with the Enterprise Architect case study: structuring the project into packages and using profiles.
  • Modeling the business with the business diagram activity.
Specify requirements
  • Functional and non-functional requirements.
  • FURPS approach.
  • Definition of actors.
  • Definition of use cases.
  • Use case diagram.
  • Illustration of use case scenarios with the sequence diagram.
  • Practical work Specification of the requirements of the case study: use case and sequence diagrams.
704
Design the system - Static modeling
  • Code architecture.
  • Layered patterns/layers.
  • MVC pattern.
  • Structuring in packages.
  • Class identification.
  • Attributes.
  • Operations.
  • Class diagram.
  • Association relationships between classes .
  • Generalization relations.
  • Practical work Carry out static modeling with Enterprise Architect: structure the code in packages.
  • Create the class diagram .
705
Design the system - Dynamic modeling
  • Define operations.
  • Design-level use case scenarios.
  • Describe interactions with the sequence diagram.
  • State management.
  • State diagram.
  • Practical work Perform dynamic modeling with Enterprise Architect: sequence diagram.
  • Define states with the state machine diagram.
Design the system - Deployment modeling
  • The definition of deployable components and their interfaces.
  • Component diagram.
  • The deployment of components on the hardware architecture.
  • Deployment diagram.
  • Practical work Carry out deployment modeling: component and deployment diagram.
Introduction to the tool's advanced functions
  • Code generation and "reverse engineering".
  • Documentation generation.
  • Completion of large projects and collaborative use.
706

MySQL, tuning

★★★★★

  • SII-306
  • 3 Days (21 Hours)

Description

This training will show you how to efficiently optimize your MySQL database servers and applications. You will learn to improve performance by configuring servers, organizing data and better writing SQL queries.

Who is this training for ?

For whom

System administrators and database administrators.

707
Prerequisites

None

Training objectives

Understand MySQL SDBG measurement and diagnostic tools
Master application optimization techniques
Analyze and optimize server and application performance
Optimize the relational schema and SQL queries

708

Training program

Introduction
  • MySQL architecture.
  • Choice of storage engine.
  • Choice of data types.
  • Normalization/denormalization.
  • Processing an SQL statement.
  • The INFORMATION_SCHEMA database.
  • Collection of statistics.
  • Practical work Collection of statistics, choice data types.
Measurement and diagnostic tools
  • Tracing and profiling.
  • EXPLAIN command.
  • Using the BLACKHOLE engine.
  • Using mysqlslap.
  • Logging and slow query log.
  • Practical work Profiling, using the EXPLAIN command, using the mysqlslap tool, slow query log.
709
Data organization and indexing
  • MyISAM tables.
  • Internal architecture.
  • Indexing MyISAM tables.
  • Acceleration of searches with "Fulltext" indexes.
  • Maintenance of MyISAM tables, problem solving.
  • InnoDB transactional tables.
  • Internal architecture of InnoDB tables.
  • Table structure and InnoDB indexes.
  • Maintenance.
  • Management of tablespace(s).
  • Use of MEMORY type tables.
  • Partitioning.
  • Practical work Using Fulltext indexes and MEMORY tables.
  • Compressing MyISAM tables.
710
Optimisation des applications
  • How the MySQL optimizer works.
  • EXPLAIN tool and execution plans.
  • Using prepared statements.
  • Locking tables .
  • Transactional operation and isolation levels (InnoDB).
  • Using views.
  • Optimize load operations.
  • Practical work Execution plans.
  • Using prepared queries, data loading optimization.
  • Transactions and improving concurrency.
Server Optimization
  • Observing server activity.
  • Dynamic variables.
  • Memory usage in MySQL.
  • Query cache.
  • Index cache.
  • Optimization of the InnoDB and MyISAM engine.
  • Practical work Using the query cache and the index cache.
711

MariaDB, getting started

★★★★★

  • SII-322
  • 3 Days (21 Hours)

Description

An intensive course which will allow you to acquire all the skills necessary for the efficient and reliable use of the Maria DB database: practice of the SQL language, database objects, security... This course also offers an introduction to administration.

Who is this training for ?

For whom

This course is aimed at all IT professionals who have to use MariaDB.

712
Prerequisites

None

Training objectives

713

Training program

MariaDB Data Server Overview
  • The MariaDB server, history, versions and other projects from MySQL.
  • Databases under MariaDB (creation, deletion, options).
  • MariaDB tools.
  • Tables (type, constraints, indexes, virtual columns, constraints, etc.
  • ).
  • Introduction to the MariaDB storage engine ( MyISAM/Aria,XtraDB/InnoDB, etc.
  • ).
  • Practical work Creation of databases and different types of tables, modifications.
SQL language
  • The relational model.
  • Referential integrity (show, information_schema, performance_schema).
  • The LMD language: SELECT, GROUP BY, HAVING, ORDER BY, LIMIT, UNION.
  • SQL functions and expressions (CASE, IF, LIKE, numeric functions, date functions, handling of NULL values).
  • Introduction to transactions (ACID and MariaDB standard) .
  • Practical work Implementation of a data model, analysis of constraints and creation of queries.
714
Advanced queries
  • Multitable queries (INNER, JOIN, CROSS JOIN, LEFT/RIGHT OUTER JOIN).
  • Subqueries (scalars, lists, derived tables).
  • Transactions (operation, data consistency).
  • Isolation levels (READ COMMITED, REPEATABLE READ, READ UNCOMMITED, SERIALIZABLE).
  • Table locking (type of locks, visualization, deadly locks).
  • Comparison of joins/subqueries: advances in MariaDB.
  • Practical work Creation of queries with joins, subqueries, prepared queries, transactions, and table lock analyzes.
Query Optimization
  • Execution plan (EXPLAIN, SHOW EXPLAIN, STATISTICS).
  • Query execution and query caching.
  • Indexing and best practices.
  • Securing stored procedures and views.
  • Practical work Analysis of execution plans, indexing of queries.
Introduction to programming
  • Stored procedures and functions.
  • Cursors.
  • Error handling.
  • Triggers: type, usefulness.
715

Administration PostgreSQL

★★★★★

  • SII-405
  • 3 Days (21 Hours)

Description

This training will teach you how to install and administer your PostgreSQL database server on a daily basis. You will see how to manipulate data, how to manage a database and you will learn to master the main administration techniques and tools.

Who is this training for ?

For whom

Project managers, developers, database administrators and system administrators.

716
Prerequisites

None

Training objectives

Break down the PostgreSQL database architecture
Install the PostgreSQL DBMS
Determine the main features of PostgreSQL database administration
Create and manage a database
Manage user access
Manage database security

717

Training program

PostgreSQL Overview
  • Presentation of projects and tools.
  • Comparison with other RDBMS engines.
Installation
  • Installation steps.
  • Linux distributions: from RPM or sources.
  • Binaries for MS-Windows.
  • Installation wizard.
  • Preparing the operating system.
Initializing and Running an Instance
  • Principle.
  • Stopping and starting the server.
  • Server process architecture.
  • Creating additional instances.
718
Connections and administrative tools
  • Sessions.
  • Server side (pg_hba.conf).
  • Security (SSL.
  • Access rights.
  • Role management (users and groups).
  • Granting and revoking privileges.
  • Command line and graphical tools.
  • psql (shell SQL).
  • PgAdminIII, phpPgAdmin, Pgpool.
Data definition
  • Creating schemas, tables, indexes, domains.
  • Data types, operators and functions.
719
Programming for administration
  • Server side.
  • Stored procedures.
  • PL/pgSQL.
  • PL/Perl.
  • Extensions in C.
  • Triggers.
  • Stored functions.
  • Client side.
  • Web applications in PHP.
  • PostgreSQL and PDO drivers.
  • Web applications in Java.
720
» Daily administration
  • Definition of files.
  • Creation of namespace (tablespaces, files).
  • Tree of directories and files of the server.
  • Server administration.
  • Configuration.
  • Binary logs and memory.
  • Statistics collector and activity logs.
  • Maintenance and operation tasks.
  • Analyzing queries with Explain.
  • Analyzing and cleaning table spaces and indexes with Vacuum .
  • Index reconstruction with Reindex.
Backups and restoration
  • Backups with pg_dump and pg_dumpall.
  • Restores with pg_restore and psql.
  • Binary logs: Write Ahead Logging (WAL).
721

Optimizing PostgreSQL High Availability

★★★★★

  • SII-423
  • 2 Days (14 Hours)

Description

With this course, PostgreSQL administrators will gain an in-depth understanding of high availability mechanisms and discover a range of available solutions. They will master the implementation of an operational solution with PostgreSQL, including the different forms of replication and load balancing.

Who is this training for ?

For whom

Database Administrator (DBA) and SysAdmin.

722
Prerequisites

Training objectives

  • Implement physical replication between instances
  • Improve replication in relation to physical backups
  • Change replication configuration
  • Implement logical replication between databases
  • Control load distribution
  • Create and test failure scenarios

723

Training program

High availability solutions
  • High availability under PostgreSQL.
  • The different types of replication (synchronous, asynchronous, load balancing).
Le Warm Standby
  • Definition of the concept.
  • Setting up master and slave servers.
  • Implementing replication.
  • Recovery from an incident .
  • Exercise: Implementing a Warm Standby server.
724
Asynchronous replication with Slony
  • Concepts.
  • Installing Slony-I.
  • Configuring nodes and server group.
  • Defining replication sets.
  • Initialization.
  • Starting the Slony-I program.
  • Creating the table set.
  • Modifying the schema.
  • Modifying replication sets.
  • Changing provider and disaster recovery.
  • Exercise: Setting up an asynchronous replication solution with Slony-I tool.
725
The connection manager: PgPool
  • Installing PgPool.
  • Installing the system database.
  • Installing the administration tool.
  • Configuration ( pgpool.conf).
  • Use cases.
  • Starting PgPool.
  • Exercise: Setting up a load balancing solution with PgPool .
Strategic choices
  • Elements to take into account when defining the architecture.
  • Best Practices.
726

DB2-UDB, price a main

★★★★★

  • SII-299
  • 5 Days (35 Hours)

Description

This internship will allow you to discover DB2-UDB in a Windows or Linux environment and will provide you with the necessary knowledge to be able to develop and ensure a first level of administration.

Who is this training for ?

For whom

All people required to develop or manage the UDB database at level 1.

727

Training program

Rappel's sur DB2 UDB
  • Windows and Linux/Unix environments versus Z/OS
  • Presentation of DB2 UDB
  • The different editions of DB2
  • Run Time Environment (RTE)
  • Other products in the UDB range
  • Architecture example
  • Administrative tools
  • Installed services
  • Components of DB2 UDB
  • The Control Center
  • Client Configuration Wizard
  • The Command Center
  • The script management center
  • The help and information center
  • The logbook
  • Command Line Processor
  • Help
729
Items
  • Object hierarchy
  • Systems
  • Instances
  • Database
  • Tablespace
  • Tablespace type
  • Characteristics of user tablespaces
  • Creation from the control center
  • Data types
  • DATE ​​and data TIME
  • Terminology
  • Creation from the control center
  • Index. Creation from the control center
  • General diagram
  • UDB object naming rules
  • Limits
730
Installation et configuration
  • User management with UDB
  • The DBADM authority
  • Other database users
  • Granting and withdrawing rights : GRANT and REVOKE instructions
  • At the database, schema, tables or views level
  • Configuration of stations in a Windows environment
  • Server and client workstation
  • System architecture
Import and export utilities
  • Presentation
  • File types. WSF, DEL, ASC, IXF file
  • IMPORT, EXPORT and control center utilities
731
Recovery utilities
  • Presentation
  • Definitions
  • Logging. Circular and linear logging
  • The BACKUP utility. Use. Syntax. Parameters
  • Backup image
  • BACKUP and Advanced Backup Center
  • The RESTORE utility. Use, syntax, parameters
  • RESTORE and Control Center. Advanced backup
  • The ROLLFORWARD utility. Usage, syntax.
  • ROLLFORWARD and control center
Base Tracking Utilities
  • Maintenance
  • The RUNSTATS and REORGCHK commands
732

JEE Developer certifying cycle professional certificate FFP

★★★★★

  • SII-101
  • 15 Days (105 Hours)

Description

This intensive cycle which will allow you to discover the principles of Object programming, syntax and the useful bases of languages. You will learn how to develop professional web solutions and JEE enterprise applications with EJBs.

Who is this training for ?

For whom
Application developers, engineers, project managers close to development.
733
Prerequisites

None

Training objectives

Master object concepts Master the Java programming language
Develop JEE Web applications based on Servlet, JSP and EJB

734

Training program

The Object in Java
  • The principles of Object programming.
  • An introduction to models and UML notation.
  • The basic elements of the Java language.
  • The class definition.
  • Inheritance, interfaces and polymorphism.
  • Practical work Getting started with the development environment.
Java packages
  • The design of graphic interfaces.
  • The virtualization of graphic components.
  • Event management.
  • Listeners and Adapters.
  • Introduction to Web programming.
  • Applets.
  • Connecting to databases.
  • Practical work Construction small applications with HMI.
735
Web/JEE application development
  • Reminder on the context of Web applications.
  • Web server and client.
  • HTTP protocol.
  • The JEE platform.
  • Servlets and JSP pages.
  • Concepts.
  • Html form management.
  • Session tracking.
  • The different methods.
  • Java Server Pages for Web development.
  • Practical work r nSetting up the JEE/Eclipse/Tomcat environment.
  • Development of a Web application using servlets and JSP.
  • Development of tag libraries.
736
Useful supplements
  • Access to databases.
  • JDBC.
  • Transaction.
  • Object-Relational Mapping.
  • Use of an MVC framework, introduction to Struts.
  • Practical work Development of a Web application presenting data from an RDBMS.
  • Adaptation of the application to MVC model with Struts.
  • Added access security.
The development of EJB 3
  • Distributed component architectures and EJB 3.
  • JEE application servers.
  • Constituent elements and functionalities of the servers.
  • The Jboss and GlassFish Open Source application servers.
  • The EJB 3 specification.
  • The EJB sessions, entities and message-driven.
  • Architecture: the Bean class, business interfaces, annotations, optional XML deployment descriptor.
  • Practical work Implementation of EJB sessions and EJB entities.
737

Web Developer certification cycle in Java

★★★★★

  • SII-102
  • 16 Days (112 Hours)

Description

An intensive cycle which will allow you to acquire in-depth mastery of the Java language to develop JEE Web applications and implement Web Services.

Who is this training for ?

For whom
Developers, engineers, project managers close to development.
738
Prerequisites

None

Training objectives

Master object concepts
Know how to develop JEE Web applications based on Servlet, JSP and Web Services
Master the Java programming language

739

Training program

The Object in Java
  • The principles of Object programming.
  • An introduction to models and UML notation.
  • The basic elements of the Java language.
  • The class definition.
  • Inheritance, interfaces and polymorphism.
  • Practical work Getting started with the development environment.
Java packages
  • The design of graphic interfaces.
  • The virtualization of graphic components.
  • Event management.
  • Listeners and Adapters.
  • Introduction to Web programming.
  • Applets.
  • Connecting to databases.
  • Practical work Construction small applications with HMI.
740
Web/JEE application development
  • Reminder on the context of Web applications.
  • Web server and client.
  • HTTP protocol.
  • The JEE platform.
  • Servlets and JSP pages.
  • Concepts.
  • Html form management.
  • Session tracking.
  • The different methods.
  • Java Server Pages for Web development.
  • Practical work r nSetting up the JEE/Eclipse/Tomcat environment.
  • Development of a Web application using servlets and JSP.
  • Development of tag libraries.
741
Useful supplements
  • Access to databases.
  • JDBC.
  • Transaction.
  • Object-Relational Mapping.
  • Use of an MVC framework, introduction to Struts.
  • Practical work Development of a Web application presenting data from an RDBMS.
  • Adaptation of the application to MVC model with Struts.
  • Added access security.
Web Services
  • The role of Web Services.
  • Main technologies (SOAP, WSDL, UDDI).
  • Service oriented architecture (SOA).
  • Reminder about XML and Java APIs.
  • Data exchange.
  • Create and use Web Services with JAX-WS, JAX-RS APIs.
  • XML digital signatures, XML encryption.
  • Practical work Manipulate XML data via the SAX, DOM and JAXB APIs.
  • Programming Web Services with JAX-WS and JAX -RW.
742

Java/Java EE frameworks, state of the art

★★★★★

  • SII-299
  • 2 Days (14 Hours)

Description

During this training, you will discover the main frameworks and APIs of the Java ecosystem. You will learn to choose the tools best suited to your needs and exploit their potential to improve your developments. This training will allow you to better understand the different Java technologies and integrate them effectively into your projects.

Who is this training for ?

For whom

Project managers, architects, analysts, designers and developers wishing to understand the challenges of developing applications in the Java ecosystem.

743
Prerequisites

Basic knowledge of Java development.

Training objectives

Discover the architecture of Java EE applications
Understand the benefit of an application server
Discover the main Java EE Frameworks (presentation, service, persistence, business)

744

Training program

Introduction to the Java ecosystem
  • Programming paradigms: object, declarative, functional.
  • Languages: Java, Kotlin, Scala, Groovy, Clojure, etc.  Execution environment: JVM.
  • The technical base (Java SE) supplemented by libraries.
  • The specification for enterprise applications (Java EE - Jakarta EE) and frameworks.
  • Build tools: Maven, Graddle.
Modern App Design Principles
  • The objectives: scalability, productivity, testability, resilience, scalability.
  • Monolithic architecture or micro-services architecture.
  • Access to data (blocking and responsiveness). - Transactions: strong consistency and final consistency. - The stateless architecture.
  • The separation between commands and requests (CQRS - The cloud ready application, 12 factors.
Managing application components
  • The life cycle.
  • Dependency injection.
  • Interceptions.
  • APIs and frameworks: CDI, Spring.
745
Access to data
  • Access to relational databases.
  • Nosql bases.
  • Polyglot persistence.
  • Distributed processing.
  • APIs and frameworks: JDBC, R2DBC, JPA, Spring Data, Hadoop.
  • The new HTML5 protocols (WebSocket, SSE).
The exchange of messages
  • Queues.
  • Mailing lists (topic).
  • APIs and frameworks: AMQP, STOMP, JMS, Kafka.
The Web
  • Expose operations with SOAP.
  • Expose resources with REST.
  • Expose pages with MVC and MVP patterns.
  • API and frameworks: Spring MVC, JAX-RS, JSF.
Security
  • The OpenID Connect standard.
  • Authentication by token, by cookie.
  • Protection against XSS and CSRF attacks.
746
Deliverables and deployment
  • The principle of self-supported applications.
  • The
  • The presentation of GraalVM.
  • Servlerless execution.
  • Configuration management.
  • Containerization with Docker, CRI-O.
  • Orchestration with Kubernetes.
  • Monitoring an application in production.
747

Introduction to Object/Java programming

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

By using the concepts of class and exception, object programming allows for easy reuse and optimal maintenance of code. In addition, the appropriate use of interfaces allows effective harmonization between user needs and technical implementation. This course covers in detail all the essential principles of object-oriented development based on the creation of numerous programs in Java.

Who is this training for ?

For whom

Project managers wanting to acquire a precise vision of the techniques used by their collaborators or subcontractors. Traditional developers wanting to move towards the object.

748
Prerequisites

Basic knowledge of programming.

Training objectives

At the end of the training, participants will be able to:

  • Understand the fundamentals of the object
  • Master the syntax of the Java programming language
  • Collaborate effectively with technical development teams
  • Master the construction of Object type functional specifications

749

Training program

General presentation
  • Founding principles of the object: abstraction/encapsulation.
  • Inheritance, implementation.
  • General presentation: the language, the tools, the library.
  • Java distributions.
750
Syntactic aspects, types and expressions
  • Syntactic structuring of a Java application.
  • Example of syntax for a simplified application.
  • External view of a class: usage syntax.
  • Internal view of a class: implementation syntax.
  • Notion of type.
  • Comparative use of base types and Object types.
  • Simple use of basic types: integers, floats, Char and Boolean types.
  • Notion of expression.
  • Examples of declarations: variables and constants.
  • Comparative designation of base types and Object types.
  • Use of operators with objects.
  • Case of static fields or class variables.
  • Additional information on types: basic use of arrays.
  • Conversion of basic types/object type.
  • Writing conventions.
751
Methods and instructions
  • Method invocation syntax.
  • Class methods and instance methods.
  • Definition and use of methods.
  • The method overloading.
  • Concept of sub-block.
  • Categories of instructions.
  • Main control instructions: if, while, for, return, break .
Using abstraction
  • Simple example of using an object: declaration, instantiation or fabrication, delegation.
  • Using object constructors: discovering the online documentation.
  • Using the programmatic interface of objects: example of the Date class.
  • A widely used class: the String class.
  • Particularities related to character strings.
  • Using the StringBuffer class: example of using method overloading.
752
Using inheritance
  • Reminder of the principle of inheritance and terminology.
  • Use of inheritance.
  • Example of inheritance graph.
  • The Object class and genericity.
  • Use of polymorphism.
  • Specialization of a polymorphic reference.
  • Reference typing/object typing.
  • Behavior of methods and typing.
  • Genericity of container classes: example of the Vector class.
  • Additions of JAVA 5 (TIGER): generics.
Using the interface mechanism
  • Implicit and explicit interface of a class.
  • Syntax associated with explicit interfaces.
  • Use cases for interface references: flexibility, limitation of scope, polymorphism.
  • Example of multiple implementation of interfaces.
  • Summary of the interest of interfaces for methods.
  • Use of interfaces for constants.
  • Advanced examples of using interfaces.
753
Class development
  • Methodological approach, static, dynamic, business analysis.
  • UML notation: class, state/transition, sequence diagram.
  • Skeleton of a class: basic constituents, automatic generation tools.
  • Additions on access rights.
  • Organization in packages.
  • Constraints linked to packages.
  • Writing constructors.
  • Default constructor.
  • Additions on writing constructors.
  • Self-reference
  • Static fields and methods.
  • The Main method.
754
Interface development
  • Reminders and additions to the principles.
  • Syntax associated with interfaces, case of constants.
  • Definition of interfaces for methods.
  • Multiple interface implementation and extensions.
  • Partial interface implementation.
  • Examples of using interfaces.
Developing derived classes
  • Reminders of the principles.
  • Methodological approach for dividing into classes.
  • Methods and abstract classes.
  • Abstract classes and interfaces.
  • Field access rights and inheritance.
  • Constructor chaining and inheritance.
  • Redefinition and overloading.
755
Developing derived classes
  • Reminders of the principles.
  • Methodological approach for dividing into classes.
  • Methods and abstract classes.
  • Abstract classes and interfaces.
  • Field access rights and inheritance.
  • Constructor chaining and inheritance.
  • Redefinition and overloading.
The exceptions
  • Principles and general kinematics.
  • Detection, observation and notification of an exceptional situation.
  • Report of an exception: Throws clause of the signature, Try block /Catch.
  • Unchecked exceptions.
  • Example with exception handling.
756

Best practices in Java programming

★★★★★

  • SII-105
  • 3 Days (21 Hours)

Description

This training covers particularly sensitive points of the Java language and the APIs of the Java SE platform. It allows you to assimilate good practices in Java development and acquire the automation essential to the design of robust business applications.

Who is this training for ?

For whom
Java application developers, architects and project managers.
757
Prerequisites

None

Training objectives

Assimilate good practices in Java development
Discover the subtleties of the Java language and its Java SE platform
Acquire the automation essential to the design of robust business applications

758

Training program

Subtlety of language
  • In-depth study of all keywords (final, static, throw, throws, volatile, native.
  • ).
  • Visibility levels.
  • The Initializers.
  • The Classloaders.
  • Practical work Test of the best use of keywords, visibility levels.
Interfaces and generics
  • Interfaces.
  • Generics (including their processing by the compiler).
  • Anonymous classes.
  • Inner Class.
  • Practical work Use of interfaces and generics.
Memory management
  • Understanding the Garbage Collector.
  • Detection and resolution of a memory leak.
  • Practical work Memory analysis, resolution of leak problems.
759
The Object class and some basic interfaces
  • Studies of the methods of the Object class (getClass, hashCode, equals, toString, wait, notify.
  • ).
  • Studies of the main interfaces offered by the framework (Comparable, Serializable.
  • ).
  • Practical work Manipulation of class methods in derived classes.
  • Manipulation of interfaces.
The collections
  • The collection interface and the main implementations (List, Set, Queue, Deque, Stack).
  • The right use at the right time of the right type of collection.
  • Practical work rnUsing collections, testing and choosing the right objects.
Best practices for designing an application
  • Layer division.
  • Presentation of the challenges of business development.
  • Introduction to the Java ecosystem (JEE, Spring, Hibernate, Struts.
  • ).
  • Practical work Thinking about layered design.
  • Demonstration of the use of frameworks.
760

Master the Eclipse environment

★★★★★

  • SII-301
  • 2 Days (14 Hours)

Description

During this practical course on Eclipse, the essential IDE for Java developers, you will learn to master all aspects of a Java project. You will see how the IDE can be integrated with the rest of the software factory with: the unit test manager, the version server and the builder (MAVEN).

Who is this training for ?

For whom

Developers and project managers.

761
Prerequisites
  • Basic knowledge of the Java language.

Training objectives

  • Get to grips with the Eclipse development interface
  • Use different Eclipse tools to develop Java applications: editing, compilation, debugging
  • Configure Eclipse to match your development needs
  • Set up unit tests with JUnit
  • Automate Java application building tasks with Maven
  • Manage versions of a Java application with SVN

762

Training program

Introduction
  • The objectives and principles of Eclipse.
  • The basic concepts: view, editor, perspective, workspace, project, directory, file, nature.
  • Starting Eclipse. Help functions. Managing views and perspectives. Managing resources.
  • Navigation, search functions. Project management.
Programming with Java Development Toolkit
  • The main concepts.
  • Code organization and editing.
  • Completion and assisted correction mechanisms.
  • Code generation functions. Refactoring functions.
The unit test: JUnit
  • The principles of unit testing.
  • Writing test cases and test suites, executing the test. Launching the tests.
And debug
  • The Debugger perspective in Eclipse.
  • The different Breakpoints and Watchpoints.
  • Inspection of variables or expressions, navigation in the execution stack.
  • Execution control. Distributed debugging.
763
Versioning: Introduction to SVN
  • General concepts related to version management.
  • SVN concepts: repository, projects, revisions, trunk, branches and tags.
  • The main operations offered to the developer. Conflict management.
  • Branch management. SVN perspectives offered by Eclipse plug-ins.
Task automation: Maven
  • Definition of the structure of a project.
  • Conventions. Dependencies between projects. Predefined tasks: compilation, generation of archives...
  • Maven perspectives offered by Eclipse plug-ins.
Eclipse configuration
  • Managing preferences. Managing properties.
  • Referencing between projects. Adding Plug-ins and Features. Setting up Eclipse.
764

Certifying cycle Website designer professional certificate FFP

★★★★★

  • SII-107
  • 9 Days (63 Hours)

Description

This cycle will teach you how to design attractive and effective sites that meet your company's strategy. Very concrete, it will first present to you all the technologies necessary for creating a site: HTML, CSS and JavaScript languages, animation techniques and database querying. You will then see how to take into account design, ergonomics, accessibility, content management, organization, as well as techniques to improve SEO and promote your site.

Who is this training for ?

For whom
Website developers, Web designer, project manager, Webmaster wishing to design Intranet/Internet type websites and promote them.
765
Prerequisites

None

Training objectives

Design an attractive and effective site that meets your company's strategy
Build interactive and accessible Web pages in HTML and CSS
Interface the JavaScript language with the graphic elements of Web pages
Access data from a relational database
Optimize SEO and promote its website

766

Training program

Introduction to web technologies and servers
  • Management of the domain name.
  • The choice of host.
  • Web servers (Apache, IIS).
  • TCP/IP, HTTP, FTP protocols.
  • URLs.
  • Additional network services (DNS, DHCP, .
  • ).
  • Administration and security of the web server.
  • Certificates, the firewall, the proxy.
767
Creating web pages
  • Presentation of HTML and XHMTL languages.
  • Structure, hypertext links, images, frames, style sheets, vector formats, tables, layers.
  • Forms.
  • Constraints and advantages.
  • Structure, input fields, buttons, check boxes, lists.
  • Accessibility standard.
  • Impact on development.
  • Flash, Java, ActiveX components, plug-ins.
  • Graphic and multimedia design.
  • Animation development with Flash.
  • Graphic resources GIF, JPEG, PNG, Shockwave.
  • JavaScript and DHTML language: language syntax.
  • Input controls a form.
  • Cookie management.
  • DOM and Ajax.
  • ECMAScript and ActionScript presentation.
  • Web 2 technologies.
  • 0: presentation of blogs and wikis, Rich Internet Applications, AIR, SilverLight and GWT.
  • Practical work Creation of complex HTML pages with Dreamweaver.
  • Creating style sheets.
  • Designing an HTML page template with Fireworks, Flash component.
  • Using JavaScript to add DHTML effects and form controls, event handling in JavaScript.
768
Implementation of dynamic sites
  • Operating mode, security.
  • Server variables.
  • Web servers on the market.
  • Server languages ​​and their development platforms : ASP, ASPX, JSP, PHP.
  • Calling Web services.
  • Access to databases.
  • Practical work Creation of a form with sending data to the server.
  • Develop dynamic pages, query a database, web services.
Website positioning
  • Intranet, Internet, Extranet.
  • Corporate strategy and site design.
  • SWOT techniques.
  • Which design based on mobile terminals? Optimize your chances of reaching your target.
769
The design and accessibility of its site
  • Internet and Intranet user behavior.
  • Definition of usability.
  • Traditional site errors.
  • Design and implementation techniques tests.
  • Standards and constraints of Web terminals.
  • Editorial techniques for the Web.
  • How to create fluid navigation.
  • Accessibility: update on legislation in France and Europe.
  • Accessibility standards: W3C, WCAG.
  • The impact of an accessibility charter on HTML and CSS.
  • ADAE and accessibility.
  • Content design and management.
  • Methodology for creating sections.
  • Organization of content, publication.
  • Content management tools.
  • Multi-source content.
  • Strategy, how to present your brand? How to link web design to strategy? How to promote a brand based on design? Creative brief, creative strategy.
  • Concept board.
  • Graphic charter.
  • Practical work Test the accessibility of a site.
  • Creation of a valid and accessible page.
  • Correction of accessibility errors.
  • Define a graphic charter and use a functional mock-up tool.
770
Web project monitoring
  • Legal audit of the site: risks.
  • Project management.
  • Modeling, development, deployment, launch campaign.
  • Organization human of the project.
771
SEO and promotion of the site
  • What type of search engine to use? Understand search techniques.
  • SEO audit: measure your positioning on the Internet.
  • Audit by keywords, compared to competitors.
  • Audit tools.
  • Page Rank audit, popularity.
  • Analysis and action plan.
  • SEO techniques: SEO by indexing, by positioning.
  • Definition of good SEO.
  • SEO: Search Engine Optimizer.
  • Automatic SEO tools.
  • Pull or Push strategy.
  • Pay per click.
  • Sponsored links.
  • Contextual links.
  • Purchasing keywords: how to choose them? Google AdWords management interface.
  • Website optimization.
  • Testing keywords.
  • Technical optimization: url, alt.
  • Impact of rich technologies on SEO.
  • Promote your site.
  • Setting up a Web advertising campaign.
  • Log analysis tools.
  • Animation techniques.
  • NetLinking, competitions .
  • Affiliation, loyalty, sponsorship, press relations.
  • Practical work Referencing on multiple engines, directories, dedicated areas.
  • Implementation a website audit, SEO tools and different techniques.
  • Setting up an SEO campaign.
  • The key elements.
772

Front-End Application Developer certification cycle

★★★★★

  • SII-301
  • 16 Days (112 Hours)

Description

Responsible for the visual ergonomics and functional ergonomics of a website, the Front-End application developer must have both Web Design and development skills. This cycle will provide you with all the skills in HTML 5, CSS 3 and JavaScript necessary for developing responsive sites. You will gain efficiency during your development by implementing AngularJS, the benchmark for client-side JavaScript infrastructures. You will also discover the tools that will allow you to industrialize your developments.

Who is this training for ?

For whom

Web Developers and Project Managers.

773
Prerequisites
  • Know the principles of the Internet and the basics of development. Practice in a programming language will be a plus.

Training objectives

Design and develop modern and dynamic web applications in HTML 5 and CSS 3

Make the web pages of a site Responsive Design

Integrate advanced aspects of the JavaScript language into rich application development

Manage asynchronous Ajax exchanges Develop high-performance web applications with AngularJS

Optimize development times by mastering modern utilities

774

Training program

Web technologies
  • The composite structure of an HTML document: images, CSS, JavaScript.
  • The document model (DOM).
  • The HTTP protocol.
  • HTTP client/server interaction.
  • Interpretation of HTML by the browser.
775
HTML 5 tags
  • The traditional elements structuring an HTML document (doctype, html, head, body, meta).
  • The HTML 5 structuring elements (nav, section, article, aside, header, footer) .
  • Content categories (Metadata content, Flow content, Sectioning content.
  • ).
  • New tags: , ,
  • Microformats.
  • Presentation and SEO advantages.
  • New form fields: range, autofocus, placeholder .
  • Video and audio management with the new
  • SVG images for vector drawing.
  • Canvases for drawing "bitmap".
  • Practical work Setting up and validating the structure of an HTML 5 document.
  • Creation of HTML 5 templates.
  • Creating a multimedia player.
776
CSS 3 selectors
  • Syntax reminder: selectors, rules.
  • Repetition, target, only child and prior sibling selectors.
  • Media Queries for conditional loading of CSS according to the resolution or orientation of the terminal.
  • Colors.
  • The hsl and hsla models.
  • The opacity property.
  • Text formatting.
  • Management of overflows.
  • Management of sequences.
  • Multicolumn modes with column-count, column-width.
  • Formatting boxes.
  • Shadows.
  • Rounded corners.
  • Formatting backgrounds.
  • The background gradients.
  • The backgrounds adjusted to the containers.
  • The transformations: translations, rotations, scaling.
  • Animations: animations, transitions.
  • Practical work Application of colors.
  • Formatting texts.
  • Applying shadows and rounding.
  • Animations and transition effects.
777
Advanced aspects of the JavaScript language
  • The main new features of ES6/2015 JavaScript supersets: TypeScript, Babel, Traceur.
  • Operation and integration of the jQuery Framework.
  • jQuery for Ajax exchanges and forms management.
  • JavaScript and Object-Oriented Programming.
  • Methods.
  • Inheritance.
  • Scope private and public data.
  • Mapping and serialization.
  • Structure and syntax of a regular expression.
  • Mastering the debugging environment.
  • Embedded data storage solution: SQLite, LocalStorage, Cookies.
  • Understand the notion of server-side JavaScript with Node.
  • js JavaScript programming under HTML5 .
  • Practical work Create a jQuery Plug-in.
  • Putting OOP into practice.
  • Performance optimization with ChromeDevtools.
  • Calling Web services.
  • Using an embedded database.
  • Handling HTML5 JavaScript APIs.
778
With the AngularJS Framework
  • Features and general principles.
  • AngularsJS guidelines, HTML compiler.
  • Expressions.
  • Bidirectional Data-Binding.
  • Filters.
  • Creation and use of controllers.
  • Context management, the $scope variable.
  • Propagation of events.
  • API.
  • Dirty Checking.
  • Principle of dependency injection.
  • Notion of module.
  • Configuration.
  • Definition of routes: Routing.
  • API ($routeProvider).
  • The "deep linking".
  • Data functionality, Server Exchange.
  • Testing utilities: Jasmine.
  • Angular-scenario.
  • Test: controllers, services.
  • Use with Karma .
  • Practical work Preparation of an HTML mockup to develop with AngularJS.
  • Modularization of the application.
  • Creation of a " Single Page Application".
779
Le Responsive Web Design
  • Types of terminals (mobile, tablet.
  • ) and their resolution.
  • Devices, OS, browsers.
  • Design approach: Marcotte's concept, Mobile First.
  • Adaptation of CSS to the characteristics of the terminal.
  • MediaQueries.
  • Flexible, fluid grid principle.
  • Break points.
  • Principle of boxes, layout with CSS3.
  • Responsive content: text break, multicolumns.
  • Hyphenation and cutting.
  • Responsive frameworks and libraries (BootStrap, Less.
  • ).
  • Practical work Construction of CSS according to portrait/landscape modes, terminal resolution .
  • Building ergonomics based on a flexible grid.
780
Industrialisation du Front-End
  • Components of a Web application, the "JavaScript SuperSet".
  • Choose the development environment (SublimeText, Eclipse, Cloud 9.
  • ) .
  • "Version" with GIT.
  • Organize development branches.
  • Node.
  • js as a development utility .
  • The Node Package Manager and Bower.
  • Task automation with GRUNT.
  • Automated testing integration.
  • Testing utilities : Jasmine, Mocha.
  • Create a project template.
  • Which utilities: Yeoman, Lineman?rnPractical work rnCustomize the SublimeText IDE.
  • Create a module to configure project dependencies.
  • Unit testing with Jasmine.
  • Automation with Karma.
781

Web technologies, summary

★★★★★

  • SII-320
  • 3 Days (21 Hours)

Description

This summary seminar will allow you to take a complete look at Web technologies. It will present to you in a simple and concrete way the underlying infrastructures and techniques, the standards and the tools available to develop efficient and secure applications. It will show you the impact of the introduction of new technologies such as mobility or e-commerce on applications and more generally on behavior and society.

Who is this training for ?

For whom

Project managers, IT decision-makers, developers, IT managers, Webmasters.

782
Prerequisites
  • No special knowledge.

Training objectives

  • Understand the concepts of web technologies
  • Know the basic Internet infrastructures and services
  • Discover new client-side and server-side technologies
  • Know the new architectures and their security

783

Training program

The information system
  • Role of intranet, Internet, Extranet applications in the IS.
  • New infrastructure.
  • Evolution towards n-tier architectures.
  • Evolution towards Cloud Computing.
Operation of an Internet infrastructure
  • Architecture.
  • IP protocols, IPv6, GeoIP.
  • Addressing, application ports, DNS, routing.
  • MPLS quality of service.
  • Impact of the network on web performance.
  • Network topology: access providers.
  • Operators.
  • Evolution towards high speeds: FTTH optical fiber.
784
Basic services
  • Messaging: MIME.
  • Protocols (POP3, IMAP4, SMTP).
  • Spam.
  • Email clients and servers.
  • Directories: concept.
  • User management, Whois, X.
  • 500.
  • LDAP protocol.
  • LDIF.
  • OpenLDAP, Domino.
  • Selection criteria.
  • Search engines: indexing, referencing, traffic analysis, sponsored links (Criteo, Adwords).
  • Collaborative tools: which tools for which needs? Portal, blog, wiki, online office.
  • Corporate social networks, collaborative spaces, CMS (SharePoint) , Joomla, Drupal.
  • ).
  • Multimedia over IP: image, sound, video on demand, streaming.
  • Multicast broadcast.
  • IPTV.
  • SIP protocol, VoIP, H323.
  • E-commerce: principle.
  • Platforms (Prestashop.
  • ).
  • E-payment.
785
Security
  • Types of attacks on TCP/IP.
  • Security services: confidentiality, authentication, integrity, denial of service, non-repudiation.
  • Authentication : oAuth, Active Card, Secure ID, biometrics.
  • SSO, Kerberos authentication.
  • Access security: firewall, proxy.
  • Architecture, the DMZ.
  • Packet filtering, filtering routers, ACL.
  • Virtual private network: VPN.
  • IPSEC operation, L2F secure protocols, PPTP .
  • Security tunnel, SSH.
  • Cryptography: legislation.
  • Public key (PKI/EGC), certificate, electronic signature, SSL.
  • The trusted third party.
  • Legal obligations: CNIL, ISO 2700x standards.
786
Client-side technologies
  • Browsers, their impacts.
  • Plug-ins.
  • URIs, the HTTP protocol.
  • HTML5, CSS3 languages and JavaScript.
  • The contributions of EcmaScript 6.
  • The HTML 5 JavaScript APIs (persistence management, access to terminal resources.
  • ).
  • JavaScript frameworks (AngularJS, jQuery.
  • ).
  • The specificities of mobile terminals and tablets: screen size, memory capacity, OS.
  • Impact of mobile terminals, tablets, computers on web interfaces: Responsive and Material Design.
  • Front End industrialization technologies (Grunt, Bower, Yeoman, Jasmine.
  • ).
  • XML language, XML Schema.
  • Parsers.
  • XML graphical interfaces: SVG, XAML.
  • Definition of Android interfaces via XML.
  • Rich interfaces and their ergonomics: Java FX8, QT, Flash.
  • XSLT processing.
  • Publishing with XSL-FO.
  • Web services.
787
Server-side technologies
  • N-tier architectures.
  • Component-oriented approaches.
  • The Java EE architecture (JSF, JPA, EJB, JAX-RS.
  • ).
  • The Spring framework.
  • The framework.
  • NET and associated frameworks (NHibernate.
  • ) .
  • PHP, Zend Framework 2, Symfony 2.
  • Genesis of server-side JavaScript and Node.
  • js.
  • The Google V8 engine.
  • Access to data.
788
Web servers and application servers
  • Servers: databases, applications, Web.
  • Their positioning in relation to the Internet.
  • Load balancing and high availability, NginX.
  • The cluster approach.
  • Web servers (Apache, IIS.
  • ).
  • NodeJS JavaScript servers.
  • Hosts.
  • Application servers.
  • Presentation, distributed object and administration services.
  • The commercial offer: IBM WebSphere, Oracle Application Server.
  • The Open Source offering: Tomcat, JBoss WildFly, GlassFish.
789
Distributed architectures and Web Services
  • Standards (SOAP, WSDL, UDDI, BPML, BPEL), implementation.
  • SOAP and REST Web services.
  • Connecting Web Services to existing applications.
  • SOA architectures.
  • Specificities.
  • Overview of other technologies.
  • Cloud Computing platforms: IAAS , PASS, SAAS (Amazon Web Services, Azure.
  • ).
  • Big Data and NoSQL (Hadoop, Cloudera, MongoDB, Cassandra).
  • Resource virtualization.
790
Mobility
  • PANs and WI-FI, Wimax, Bluetooth standards.
  • LAN networks, Wireless Wan, radio loop.
  • Technologies in a cellular environment: high-speed networks .
  • 3G, 4G.
  • VoIP over LTE (VoLTE).
  • High-speed networks.
  • Private wireless networks.
  • IP in a mobile environment.
  • Mobile terminals.
  • Security.
  • Connected objects.
  • Low-speed iot networks: SigFox, LoRa.
Understanding Digital
  • Difference between Digital and Digital.
  • e-Reputation and web publication.
  • Issues of private data, European regulations.
  • Impact of time to market on the risks for the company.
791

Design of Web architecture technologies, uses and impacts on the IS

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

The training will provide you with a comprehensive overview of the essential knowledge for designing web architecture. It will make it possible to analyze the different areas of application, evaluate market offers, examine practical implementation approaches, while emphasizing the technological, organizational and methodological impacts.

Who is this training for ?

For whom

Project managers, IT decision-makers, developers and IT managers.

792
Prerequisites

Basic knowledge of application architecture.

Training objectives

At the end of the training, participants will have acquired the following skills:

  • Understand the implications of Web technologies on company information systems
  • Understand the role of different technologies in a Web architecture
  • Discover the different services and uses accessible via the Web
  • Discover practical steps to implement Web technologies

793

Training program

Web application architecture, state of the art
  • Understanding the evolution and challenges of IS.
  • Intra-Inter-Extra Net architectures.
  • The customer market.
  • Servers and virtualization.
  • The thin client at all costs? Mobility has a price but meets new needs.
  • Client-side applications and components.
  • Internal, shared hosting, hybrid, private Cloud solutions.
  • Application impact.
Client-side applications and components
  • Application ergonomics: responsive, material, MVC impact.
  • JavaScript.
  • Java, JavaFX, Flex, SVG and Canvas components.
  • What future for plugins and web components?rnWhat limits for multi-channel deployment?rnHTML5: opportunities for business applications with its API and CSS3.
  • The formats Widgets, Gadgets, MicroFormats.
  • Ajax fashion and development frameworks (AngularJs, jQuery, GWT.
  • ).
  • What border between components Desktop (RDA) and Internet (RIA) ?}
794
Role of XML in application architecture
  • Presentation of XML.
  • XSLT transformation engines and XML parsers.
  • Web services, their connection with existing applications.
  • XML protocols (SOAP, WSDL).
  • The REST protocol.
  • The JSON format XML impact on Web applications.
  • Adoption of XML as a metadata repository (DSML, XMI.
  • ).
795
Development of application components
  • PHP, JSP, ASPX, JavaScript scripts.
  • Component-oriented approaches (EJB from Oracle, Microsoft.
  • Net).
  • Web services
  • ), developments (Microsoft.
  • NET, Oracle.
  • ) .
  • The application server offering: WebSphere, Microsoft server, Oracle Application Server 10g, JBoss Wildfly, Tomcat.
  • The architecture.
  • NET.
  • Mode of operation and implementation (Framework, ASP.
  • NET, Common Language Runtime.
  • ).
  • The platform -Java EE platform.
  • The concept of independence of execution hardware platforms.
  • The popular Java frameworks (Spring, Hibernate, JSF).
796
Publication space
  • The Web, publication-distribution support.
  • Services: publication of documents and data.
  • Researching documents.
  • Engine technologies: full-text indexing, statistics, semantics, linguistics.
  • Panorama of offers: Lucene, Verity, Convera.
  • Content management ( CMS).
  • Support for the document lifecycle and validation.
  • Management of XML metadata, authorizations, validation workflows, presentation.
  • CMS offerings (Drupal, Alfresco, Joomla, Spip.
  • ).
  • Importance of XML-oriented versions of office tools (OpenOffice/OpenDocument).
797
Collaboration space
  • SMTP, POP3, IMPA4 protocols.
  • The MIME protocol.
  • Directories and the LDAP protocol.
  • Opening messaging to the Net.
  • The advent of instant messaging (Google, Microsoft, Facebook, Skype).
  • Perspective in terms of shared calendar management.
  • Use of SMS messaging and Push Mail.
  • Forums and working groups.
  • Which application areas for collaborative work?
  • Workflow via the Internet.
  • Circulation of forms, process monitoring and coordination of tasks.
798
Business applications
  • The integration portal.
  • Syndication of content and service sources.
  • The portals: single point of access, customization of services according to the user.
  • Publisher offers: LifeRay, IBM.
  • Open source: Drupal, SPIP.
  • The craze for SOA and 'market offering.
  • Tibco, Microsoft, Oracle, IBM.
  • The real challenges of the SOA concept.
  • Customer Relations, Business Intelligence and DataWeb.
Impacts on IS security
  • Security: above all a global approach.
  • The new risks.
  • The means available.
  • The role of security in distribution of components.
  • Implementation of a PKI and certificates in the Intranet architecture.
  • SSL, HTTPS, oAuth protocols and SSO solutions.
  • MDM, asset management and security in a BYOD environment, multi-channel.
  • Solutions for e-commerce applications.
799
Impacts on enterprise data management
  • Integration of company data.
  • Market DBMS: Oracle, SQL Server, MySQL, PostgreSQL.
  • Interfacing with the Web.
  • Evolution.
  • Databases in the clouds.
  • Big Data: impact on real-time architectures (lambda), how to manage large volumes.
  • Strengthening Business Intelligence at the heart of the architecture.
  • Example of Hadoop architecture and operation (requester, Data Mining, .
  • ).
800
Design and implementation approach
  • The graphic charter and usability, obtain an AccessiWeb label.
  • The usability charter: role, technical content.
  • Impact of web technologies: tests , project management, creation of functional and ergonomic specifications.
  • Role of the model, how to achieve it.
  • The POC: what modeling techniques?r nThe principles of interaction to respect, where to start, what skills to have?rnWeb project methodology.
  • What methodology?rnThe inventory of documentary, application, decision-making sources .
  • Maintain overall consistency of information.
  • What new services to offer? Determine the validation and security processes.
  • Establish the site map .
  • What use of outsourcing? What are the benefits for the "virtual office"?
801

Java EE, practical introduction

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

You will explore the Java EE platform and learn how to structure applications deployed on this platform. You will develop dynamic web interfaces using technologies such as servlets, JSPs and frameworks. You will also implement distributed components in the form of EJBs, as well as SOAP/REST web services. Finally, you will discover the cross-functional services offered by Java EE, such as transaction management, security, resource management, etc."

Who is this training for ?

For whom

Developers, architects, design engineers and project managers.

802
Prerequisites

Basic knowledge of Java development. Experience required.

Training objectives

At the end of the training, the participant will be able to:

  • Master the different components of the Java EE platform
  • Develop Web GUIs
  • Develop EJB
  • Develop REST and SOAP Web Services
  • Deploy Java EE web applications

803

Training program

Introduction to Java EE
  • The contributions of the N-tier architecture (cluster, reuse of services.
  • ).
  • The main Java EE concepts.
  • Java EE services (JNDI, Web, EJB, JTA, JAAS, JMX.
  • ).
  • Market offerings (JBoss, GlassFish, WebSphere, Jonas.
  • ).
  • Panorama of the Java/Java EE ecosystem: components, Design Pattern and the main frameworks that can be used.
  • Practical work Implementation of the environment: installation of a JDK, an Open Source application server (JBoss, GlassFish.
  • ) and an IDE (Eclipse, NetBeans.
  • ) .
  • Application demonstrations.
804
Java EE web technologies
  • Web architecture, HTTP server and thin client.
  • HTTP protocol, client request and server response.
  • Operation and role of Servlets and JSPs.
  • Tag libraries or taglibs.
  • Standard structure of a Java EE web application.
  • The standardized web configuration file.
  • xml .
  • Deployment of Java EE web applications, JAR, WAR and EAR archives.
  • MVC frameworks (JSF, Struts 2.
  • ).
  • Practical work Demonstration and details of the operation and configuration of a Java EE Web application.
805
Enterprise Java Beans
  • Problem of reuse and remote access to services.
  • Principles and technologies of EJB (Stub, Skeleton, Remote, Local, RMI, IIOP.
  • ) .
  • The annotations.
  • The different specifications (EJB1.
  • x, 2.
  • x and 3.
  • x).
  • Need for simplification of the EJB2 architecture.
  • Description of the EJB 3 architecture.
  • x.
  • The different types of EJB (session, entity and message).
  • EJB 2 interoperability.
  • x with EJB 3.
  • 0.
  • Practical work Implementation of EJBs.
  • Develop an example of EJB.
  • Explanation of use cases and demonstrations.
806
Web Services
  • What is a Web Service? Objective.
  • Principle.
  • Main technologies (REST, SOAP/WSDL/UDDI).
  • Service contracts.
  • The role of XML and the Java platform.
  • Service oriented architecture (SOA).
  • Description of the SOAP protocol.
  • The WSDL language for describing Web Services.
  • Publishing Web Services with UDDI.
  • Description of REST services.
  • Resources.
  • URIs.
  • Programming tools for creating and using Web Services (Axis, JAX-WS, JAX-RS.
  • ).
  • Practical work Implementation of REST and SOAP Web Services.
807

Java EE 6, develop enterprise applications

★★★★★

  • SII-112
  • 5 Days (35 Hours)

Description

This training will allow you to be operational in the development of business applications in Java and to understand how an application server works. It highlights the latest trends (POJO objects, XML configuration, etc.), the main frameworks and new Java EE 6 features.

Who is this training for ?

For whom
Developers, architects and project managers.
808
Prerequisites

None

Training objectives

Master the Java EE application development environment
Set up the data access layer with JPA
Develop remote services based on EJB
Develop the application user interface with JSF and Ajax
Develop and expose web services in SOAP and REST

809

Training program

Introduction
  • The building blocks of Java EE.
  • The contributions of Java EE 6.
  • Stateful architectures (DDD) versus Stateless.
  • Panorama of the Java EE offer.
The work environment
  • Development tools.
  • The Eclipse environment.
  • Maven dependencies.
  • The "deployment assembly".
  • Unit tests (with JUnit and JeeUnit).
  • The domain file.
  • xml.
  • JNDI, the standardization proposed by Java EE 6.
  • The transactional monitor.
  • The Web server.
  • Modular operation: OSGI.
  • Practical work Install the IDE and the server.
810
Accessing data with JPA
  • The principles and operation of mapping.
  • The handling of persisted instances.
  • Lazy loading.
  • The metamodel.
  • The entityManager, Query and Criteria interfaces.
  • Management of the entityManager by the container.
  • Practical work Implementation of persistent entities in a Java project.
  • Setting up the data access layer with JPA within the common thread application.
811
Les EJB Session
  • Declaring a class as an EJB Session.
  • Lifecycle management (
  • Stateless.
  • ).
  • The contributions of Java EE 6.
  • Dependency injection.
  • Injection outside CDI.
  • Interceptions.
  • Transactions.
  • Security.
  • Timers.
  • Remoting.
  • Practical work Update setting up services with EJB Sessions.
812
Les Messages Driven Beans (MDB)
  • The asynchronous dialogue between applications.
  • The JM API.
  • The concepts.
  • The JMS elements: connectionFactory, connection, session, destination, message, messageProducer, messageConsumer.
  • Configuration in Glassfish.
  • Advanced features.
  • Practical work Setting up a client application notification system.
The Web and Java Server Faces
  • JSF 2.
  • 0 and configuration by annotations.
  • The concepts (MVP, Presenter, View).
  • The facelets, taglibs, jsf-el.
  • JSR303 validation.
  • Implementation of Ajax.
  • Practical work Implementation of JSF and d 'Ajax within a web application.
813
The Web and Java Server Faces
  • The possibilities offered.
  • The JAX-WS and JAX-RS APIs.
  • Using a Custom Serializer in both cases.
  • Practical work Development of a Web facade exposing the services of the exercise developed.
814

Java, servlet and JSP development

★★★★★

  • SII-113
  • 5 Days (35 Hours)

Description

This course will allow you to develop enterprise web projects based on the Java EE platform. You will discover MVC architectures through the implementation of a presentation layer based on JSP then on JSF 2. You will discover the mechanisms of Servlet, learn to persist your data and secure your Java applications. You will implement the Eclipse IDE in order to build and deploy your solutions on the various Java EE application servers on the market such as JBoss Wildfly or WebSphere.

Who is this training for ?

For whom
Computer scientists wishing to develop Web applications with Java/Java EE technologies.
815
Prerequisites

None

Training objectives

Master the architecture of Java EE applications
Develop a presentation layer based on JSP, tag libraries and JSF
Develop control and navigation components based on Servlets
Manage access to a database
Secure a Java EE application

816

Training program

Reminder on the context of enterprise web applications
  • Web server and client.
  • Application protocols (HTTP).
  • Reminders about URLs.
  • Session management.
  • Access to enterprise resources.
  • The Java EE platform.
  • Multi-tier architecture models.
817
Architecture des applications Java Web
  • The components needed to use Java on the server side.
  • The Java Virtual Machine.
  • Java EE web servers and application servers.
  • Role of the container (Servlet engine).
  • Standardized structure of a Java EE Web application.
  • The main components: Servlets, JSP pages, JSF.
  • Java EE APIs.
  • JSP/Servlet architecture models Apache Tomcat web container architecture.
  • The web deployment descriptor .
  • xml.
  • Notion of pluggability.
  • Development, testing and debugging tools: Eclipse, Netbeans, IntelliJ.
  • Deployment and packaging of Java EE applications.
  • Practical work Install a development environment and a Tomcat Apache web application server.
  • Deploy a Java EE application on a Tomcat container.
818
JSP pages: presentation components
  • What is a JSP page? JSP life cycle.
  • Predefined objects.
  • Scriptlets, directives, expressions, actions.
  • Error management.
  • Scopes.
  • Communication between WEB components.
  • Use of JavaBeans from JSP pages.
  • Unified Expression Language (UEL) overview.
  • JSTL (Java Standard Tag Library) overview.
  • Design JSP with JSTL.
  • Principle of libraries (taglib).
  • Tag extension development.
  • Simple tags, with attributes, with body.
  • Deploy and operate a library.
  • Practical work Develop the presentation layer (JSP, JSTL and tag libraries).
819
Servlet API 3.0: control and navigation components
  • The Servlet container.
  • The life cycle of a Servlet.
  • Initialize a Servlet.
  • Write the service methods .
  • The Servlet interface.
  • HTTP servlets.
  • Managing HTML forms.
  • Processing the response, 'sending information, generating HTML.
  • Retrieving HTTP parameters.
  • Filtering requests/responses.
  • Programming Servlet filters .
  • Information retrieval: from the Web server, the client and the environment.
  • Invocation of other Web resources.
  • Inclusion and transfer control.
  • Execution error handling.
  • Event logging.
  • The different session tracking methods.
  • Obtaining, consulting and abandoning a session.
  • Session context.
  • Combination of JSP and Servlets.
  • Practical work Development of a database-based application. of Servlets using the Web container environment.
820
Access to databases
  • Setting up the relational database and the JDBC interface.
  • Connection to the database, retrieving information, updating data.
  • Transaction.
  • Connection pool.
  • DataSources.
  • Resource annotation.
  • BDR/Object models correspondence .
  • Objectives.
  • Java approaches and tools.
  • Presentation of JPA and the different solutions on the market (Hibernate.
  • ).
  • JNDI concepts.
  • Access to resources via JNDI.
  • Declare a resource of type JavaBean, DataSource.
  • Practical work Present data from an RDBMS in the application.
821
The JSF 2 Presentation Framework
  • Presentation of the Framework.
  • The essential components.
  • Life cycle of processing a JSF page.
  • The UI components.
  • Facelets.
  • The Servlet “FacesServlet”.
  • Notion of FacesContext.
  • Implementation of Managed Beans.
  • Define navigation between pages.
  • Convert and validate data.
  • Practical work Adaptation of the existing application with the JSF 2 Framework.
822
Securing a Java EE Web Application
  • Security in a Web context.
  • Notions of users, realms, roles.
  • Authentication and authorization.
  • Declarative security.
  • Security and Servlet programming.
  • Choose an authentication mechanism.
  • Configure access restrictions.
  • List application roles.
  • Setting up a Realm.
  • Configuring Tomcat.
  • Install and configure SSL.
  • Certificates
  • Java Authentication and Authorization Service.
  • Practical work rnSecuring access to the built site.
  • Setting up a Realm DataSource .
823

Hibernate, object/relational mapping

★★★★★

  • SII-344
  • 3 Days (21 Hours)

Description

Writing a persistent data access layer in Java quickly becomes complex and expensive to develop. The objective of the Hibernate framework is to simplify development. This course will provide you with all the elements necessary to effectively develop a persistence layer via Hibernate.

Who is this training for ?

For whom

Project managers, analysts, designers, software architects and developers.

824
Prerequisites

None

Training objectives

Perform object/relational mapping with Hibernate
Perform queries with HQL language and the Criteria API
Create, update, delete and load persistent objects
Manage transactions and concurrent access
Configure the Hibernate cache

825

Training program

Java persistence techniques
  • Persistence techniques.
  • Persistence framework.
  • The Hibernate project.
  • Hibernate vs JPA.
Develop a simple persistent class
  • Install the framework.
  • Code the persistent class.
  • Set configuration properties.
  • Run Hibernate.
  • Performing an HQL query.
  • Practical work Mapping a simple class.
  • Executing an HQL query.
Object/relational mapping with Hibernate
  • Objectives.
  • Development of persistent classes.
  • Perform the mapping of the most common cases.
  • Hibernate annotations vs JPA annotations.
  • Choose an identifier generator.
  • Implementation of a one-to-one, one-to-many and inheritance relationship.
826
Handle persistent objects
  • CRUD operations.
  • Object life cycle.
  • Synchronization with the database.
  • Cascading persistence.
  • Load persistent objects.
  • Improve the mapping of classes and properties.
  • Mapping bag, list and map associations.
  • Work practices Create, update, delete, and load persistent objects.
  • Use a derived attribute.
  • Mapping a collection of values.
  • Implementation of a many-to-many association.
HQL language and Criteria API
  • Create queries with join, query.
  • Use projections with HQL.
  • Queries on sets.
  • Practical work Perform an optimized HQL query.
  • Code a query using the Criteria API.
827
Concurrent Transactions and Access
  • Presentation of the properties of a transaction.
  • Atomicity management.
  • Data isolation management.
  • Technical locking.
  • Practical work Implementation of a transaction.
Use Hibernate cache
  • Objectives.
  • First and second level cache.
  • Practical work Configuring the Hibernate cache.
828
Automatic generation of resources
  • Hibernate Tools.
  • Generation of the hibernate configuration file.
  • cfg.
  • xml.
  • Generation of classes of the model (DAO/POJO) from the SQL schema (Reverse Engineering).
  • Automation with ANT tasks.
  • hbm2ddl (SchemaExport).
  • Generation of tables from mapping files.
  • Practical work Installation of the Eclipse Hibernate tools plug-in.
  • Reverse Engineering of an existing database.
829

★★★★★

  • SII-298
  • 4 Days (28 Hours)

Description

Who is this training for ?

For whom
830
Prerequisites

Training objectives

831

Training program

Website technologies
  • Web servers (Apache, IIS). Wampserver.
  • Understand the basic functioning of the TCP/IP, HTTP, FTP protocols. URLs. Additional network services (DN ).
  • Purchase and management of the domain name.
Website administration
  • Implementation of all administration operations carried out by the Webmaster.
  • Management of domain names, ftp transfer.
  • Creation of messages 'custom error, log file management.
  • Statistics monitoring and analysis.
Creation of web pages: HTML, XML, XHTML
  • Presentation of the HTML, XHTML, HTML5 languages. Differences between browsers.
  • Structure, links, hypertext.
  • Images, frames. Vector formats.
  • Layout. Style sheets. CSS language.
  • Tables and layers.
  • Techniques for successful SEO on search engines. Meta-tags.
  • Definition and integration of Flash, Silverlight, Java, ActiveX components.
The forms
  • Constraints and advantages. Syntax, structure, input fields, buttons, check boxes, lists, text boxes, selection...
832
Graphic and multimedia design
  • Create a graphic charter. Integrate a graphic charter.
  • Implementation of graphic tools to design an advanced interface.
  • Development of animations with Flash.
  • Graphic resources GIF, JPEG, PNG Use Photoshop or Gimp.
Ergonomics and accessibility of a web application
  • Graphic charter. Usability rules. Graphical pitfalls to avoid to make an effective site (navigation, layout).
  • Accessibility. Standard. Impact on development. Bring into compliance a website for testing and validation.
Dynamic pages
  • Difference between Web server and application server.
  • Mode of operation, security. GET and POST methods. Server variables.
  • Web servers of the market.
  • Server scripting languages ​​and their development platforms: ASP, ASPX, JSP, PHP.
  • Calling Web services.
  • Request integration SQL in the page to insert, delete, modify data from the database.
Client-side technologies
  • Graphical interface technologies: HTML5, XAML, Flex.
  • Presentation and implementation of Rich Internet Application (RIA) and Rich Desktop Application (RDA) solutions.
  • Presentation of Adobe AIR, Microsoft SilverLight, Google Framework solutions.
833
Introduction to JavaScript language and DHTML
  • Language syntax. Form input controls.
  • DOM and Ajax.
  • Ecmascript presentation and emergence of the Actionscript language.
  • Presentation of market offers based on Javascript (Google API, Widgets...).
  • Recover, know how to debug your programs.
834

Dreamweaver CC, create and integrate responsive web interfaces

★★★★★

  • SII-299
  • 4 Days (28 Hours)

Description

Dreamweaver is one of the most popular web page design software on the market, developed by Adobe. By discovering the features of Dreamweaver, you can learn to master the XHTML/HTML page editor, as well as graphic formatting techniques using CSS style sheets. It's also important to consider website accessibility when designing, and Dreamweaver offers features to help you create accessible websites.

Who is this training for ?

For whom

This practical course is aimed at all computer scientists wishing to master the techniques for developing a website and building an interactive and dynamic web interface.

835
Prerequisites

Basic knowledge of the components of a Web architecture.

Training objectives

  • Create complex pages using CSS, templates and input controls
  • Create responsive websites using the wizard
  • Manage accessibility
  • Create pages with Twitter Bootstrap
  • Connect the site to a database

836

Training program

Reminders of the fundamentals of the Web
  • The protocols of a website: HTTP, FTP, SMTP, POP3.
  • How a website works: HTML pages, hypertext links (URL).
L'interface Dreamweaver
  • Presentation of the Adobe CC suite.
  • Getting started with Dreamweaver.
  • Configuring the interface.
  • Page templates
  • Bootstrap pages.
  • Interactions with Photoshop.
Composition de pages HTML5
  • Creating HTML5 pages.
  • How to use the CSS Designer panel with CSS 3?.
  • Creating forms.
  • Input controls HTML5.
  • Responsive newsletter templates.
  • Creating complex pages.
837
Composition de pages HTML5 responsives
  • Responsive Web Design in Dreamweaver.
  • Media queries and breakpoints.
  • Edit template queries.
  • Build a responsive page.
  • Integrate responsive images and videos.
  • Manage the different display modes.
Creating pages with Twitter Bootstrap
  • Bootstrap overview.
  • Create a page from the Bootstrap page template.
  • Edit the page.
  • Embed Bootstrap components .
  • Edit Bootstrap components with CSS Designer.
  • Use the DOM Inspector.
838
Creating pages with jQuery mobile and jQuery UI
  • Introduction to jQuery, jQuery mobile, and jQuery UI.
  • Introduction to Javascript with Dreamweaver behaviors.
  • Discovery of jQuery mobile components.
  • Creating a simple mobile interface.
  • Discovery of jQuery UI.
  • JQuery UI component integration.
839

Java, advanced programming

★★★★★

  • SII-298
  • 5 Days (35 Hours)

Description

This training has a dual objective. On the one hand, delve deeper into certain advanced aspects of the language (generic types, annotations, reflective programming, class loading). On the other hand, present a synthetic overview of the main libraries concerning the following themes: Thread management, communications via the network, administration and supervision of applications. This course also emphasizes associated architectural techniques.

Who is this training for ?

For whom

Developers, engineers, project managers close to development.

840
Prerequisites

Good knowledge of the Java language. Experience required in Java programming.

Training objectives

Master the advanced aspects of the Java language
Implement concurrent programming based on Threads
Implement different communication techniques (Socket, RMI, JMS)
Understand the security model and loading of Java classes
Administer a Java application via JMX, monitor the JVM
Implement reflective programming

841

Training program

Some advanced aspects of the language
  • The Inner Classes.
  • Anonymous classes.
  • The covariant redefinition of methods (jdk1.
  • 5).
  • The new for loops (jdk1.
  • 5).
  • The Import Static (jdk1.
  • 5).
  • Auto-boxing, auto-unboxing (jdk1.
  • 5).
  • The varargs (jdk1.
  • 5).
  • Enumerated types (jdk1.
  • 5).
  • Usage and definition.
  • Generic types (jdk1.
  • 5) .
  • The use and definition of simple generic types.
  • Genericity and the subtyping relationship.
  • Generic types at runtime , generic types and instantiation, generic types and arrays.
  • Generic methods.
  • The simultaneous use of generic and non-generic types.
  • Annotations (jdk1.
  • 5 and jdk1.
  • 6).
  • Principles.
  • Predefined annotations (
  • override,
  • deprecated,
  • generated.
  • ).
  • The definition of new annotations.
  • Meta-annotations (
  • Retention,
  • Target,
  • Documented,
  • Inherited).
  • Reflexive use of annotations.
  • .
  • Wildcard support in the classpath (jdk1.
  • 6).
  • New features on collections (jdk1.
  • 5 and jdk1.
  • 6): Queues, ConcurrentMap.
  • Practical work Using types generics and annotations.
842
Concurrent programming
  • Definitions relating to concurrent programming: Threads.
  • The creation/destruction of Threads.
  • Scheduling of Threads.
  • The synchronization of Threads.
  • The locking of methods and instructions (synchronized).
  • Monitors.
  • Methodological principles for the design of multithreaded applications.
  • The problems posed by multithreaded programming.
  • The deadlock problem (characterization, avoidance, prevention, detection).
  • The starvation problem.
  • The JDK1 competing library.
  • 5.
  • The new collections.
  • The new synchronization tools: shared locks /exclusives, semaphores, cyclic barriers.
  • Practical work rnConstruction of a concurrent application with synchronization and deadlock resolution.
843
Socket communication
  • Reminders of the main network concepts.
  • Programming in non-connected mode (by datagram).
  • The Peer to Peer model.
  • Communication in connected mode (by stream).
  • The client/server model.
  • Sequential server vs concurrent server.
  • Use of serialization.
  • The nio library.
  • Buffers, channels.
  • Selectors and their use.
  • Practical work Programming of the case study in client-server mode (sequential and concurrent).
Communication by remote method invocation: RMI
  • The general principles.
  • The base classes.
  • The naming service.
  • The client and server development process .
  • Security and class loading constraints.
  • Practical work Programming the case study using RMI.
844
Communication by messages: JMS
  • The general principles of communication by messages.
  • The concepts of JMS, the interfaces and the corresponding classes.
  • The different forms of messages.
  • Communication in point-to-point mode.
  • Communication in publish/subscribe mode.
  • Practical work Programming from the case study to the JMS help.
Security and class loading
  • The advanced and lesser-known aspects of the JVM.
  • The mechanisms related to the JVM to ensure security.
  • The security model of Jdk1.
  • 2: permissions, policies, security domains.
  • The security manager and the access controller.
  • The class loading mechanisms.
  • The development of specific class loaders.
845
Presentation of JMX (Java Management Extension)
  • The distinction between the application to be administered and the administration application.
  • The concepts of JMX: MBean, MBeanServer, Agent, Connector.
  • The JMX API.
  • The implementation of the different categories of Mbeans (standard, dynamic, model).
  • The use of adapters and connectors.
  • Administration consoles.
  • Practical work Setting up an administration-supervision layer for the case study.
Reflective programming
  • Objectives and principles.
  • Class loading.
  • The Class object.
  • Dynamic discovery of information (properties and methods) relating to a class or an object.
  • Dynamic instantiation.
  • Invoke a method.
  • The reflexivity of annotations in Java 5.
846

Programming in HTML5 with JavaScript and CSS3 (70-480) exam preparation

★★★★★

  • SII-117
  • 5 Days (35 Hours)

Description

This course will teach you how to develop web applications using JavaScript programming, HTML5 and CSS3. You will see how to make your sites more dynamic and enrich them with multimedia content using HTML5. This course covers all the topics necessary to prepare for the Microsoft 70-480 exam.

Who is this training for ?

For whom
Web developers.
847
Prerequisites

None

Training objectives

Learn to develop sites and web applications with HTML5 and CSS3
Make websites more dynamic and more interactive
Know how to insert multimedia content using HTML5

848

Training program

The structure of language
  • The HTML language and CSS.
  • The JavaScript language.
  • The concept of tags.
  • The objects of a document.
  • Titles and paragraphs of text.
  • Size, color and font.
  • Introduction to JavaScript.
  • Insert a script in an HTML/XHTML document.
  • Practical work Create pages in HTML5.
Forms with HTML5
  • The form declaration.
  • Single and multi-line text box.
  • The drop-down menu.
  • The different buttons.
  • Organize the elements of a form.
  • Forms in a mobile environment (phone, tablet).
  • Validation with JavaScript.
  • Practical work Create a form with user input validation with HTML5.
849
HTML5 styling with CSS3
  • How to use CSS3.
  • Layout and positioning.
  • Presentation level.
  • Positioning by grid.
  • Practical work Applying styles with CSS3.
The JavaScript language
  • Basic elements (syntax, variables.
  • ).
  • Functions.
  • Custom objects.
  • Global objects (Array, Date.
  • ).
  • Arrays.
  • Practical work Example of using JavaScript.
850
Les API HTML5
  • Use APIs to have interactive functions.
  • Drag and Drop.
  • Multimedia.
  • Offline mode for Web application.
  • Practical work Insert video.
Adaptive user interface
  • Create pages that auto-adapt to devices.
  • Draw in HTML.
  • SVG.
  • Interactive graphics using of scalable vector graphics.
  • Add animations.
  • CSS transitions.
  • Practical work How to use SVG in a page Use transitions? CSS.
851
Data transmission and real-time communication
  • Communicate with a remote data source.
  • Data transmission.
  • Serialization.
  • XMLHTTPRequest.
  • WebSocket.
  • Exchanges between client and server.
  • The Web Socket API and JavaScript.
  • Practical work Example of data transmission.
852

HTML5, CSS3, direct your design towards modern and dynamic websites

★★★★★

  • SII-314
  • 2 Days (14 Hours)

Description

This training will teach you how to create web pages and applications using HTML5 and CSS3. You will discover the advances offered by HTML5, particularly in terms of rich Web interfaces/RIA, multimedia and means of communication allowing the implementation of attractive client/server applications.

Who is this training for ?

For whom

Web developers and project managers.

853
Prerequisites

None

Training objectives

Design and develop Web applications in HTML 5 and CSS 3 Implement and validate the HTML 5 structure of Web pages Dress up Web pages in CSS 3 to make them more attractive Make the Web pages of a site responsive Integrate animations and multimedia content

854

Training program

Reminders
  • Reminders about HTML versions (HTML 4, XHTML 1.
  • x, XHTML 2).
  • DTDs: strict, transitional, frameset.
  • The different components of an HTML document: titles, paragraphs, links, tables, forms.
  • Comments.
  • The composite structure of an HTML document: images , CSS style sheets, JavaScript, Flash.
  • The document model (DOM).
  • The HTTP protocol.
  • HTTP client/server interaction.
  • Interpretation of HTML by the browser.
  • Position of browsers regarding HTML technologies.
855
Introduction au HTML 5
  • The objectives of HTML 5.
  • The WhatWG versus W3C.
  • The main concepts and contributions.
  • The different components: tags, forms, audio, video, API, etc.
  • HTML 5 development tools.
  • Compatibility testing, HTML 5 detection method.
  • Practical work rnDemonstrations.
  • Discoveries of possibilities and scope.
856
New structure
  • The traditional elements structuring an HTML 5 document (doctype, html, head, body, meta.
  • ).
  • The
  • The
    element and the setting up of content blocks.
  • The
    element and the setting setting up content independent of the document.
  • The
  • The
    and < elements footer> and the establishment of introductory and concluding sections of a block.
  • Other structure tags.
  • New content categories: Metadata content, Flow content, Sectioning content, Heading content.
  • New content categories: Phrasing content, Embedded content, Interactive content.
  • Page validation with the official W3C validator.
  • Interest of its new structure tags.
  • Nesting and content type.
  • Practical work Setting up and validating the structure of a document HTML 5.
857
New HTML tags
  • Deprecated tags and attributes.
  • SVG images for vector drawing.
  • Canvases for "bitmap" drawing.
  • Difference Canvas vs SVG.
  • New tags: , , , , .
  • HTML tag extensions
  • New attributes: a, fieldset, iframe, area, button.
  • Microformats.
  • Presentation and SEO advantages.
  • Forms.
  • The new types of the tag (email, date, week.
  • ).
  • New form fields: range, autofocus, placeholder, menu.
  • Form control and validation.
  • Multimedia formats.
  • Codecs and Multimedia API.
  • Video and audio management with the new and HTML 5 tags.
  • Practical work rnCreation of HTML 5 templates.
  • Absolute positioning of elements.
  • Numerous practical exercises on the implementation of HTML 5 tags (forms, design.
  • ) .
  • Creating a multimedia player.
858
CSS 3 selectors
  • Reminder about syntax: selectors, rules.
  • Nth-child(even) repetition selectors.
  • Target selectors target.
  • Previous sibling selectors ~.
  • Only-child selectors.
  • Media Queries for conditional loading of CSS based on device resolution or orientation.
  • Creation of layout with flexbox (organization of elements according to a grid).
  • Practical work Integration of CSS 3 into Web applications.
  • Selecting elements from an HTML 5 page.
859
Text colors and formatting
  • Reminder about rgb and rgba declarations.
  • The hsl and hsla models.
  • The opacity property.
  • Support for remote fonts
  • font-face.
  • Text formatting.
  • Management of overflows by text-overflow.
  • Management of sequences by wrap -option, white-space-treatment.
  • Color and shadow effects on text text-fill-color, text-shadow.
  • Multicolumn modes with column-count, column-width.
  • Practical work Application of colors.
  • Formatting texts.
  • Multi-column management.
860
Formatting boxes and backgrounds
  • Shadows with box-shadow.
  • Rounded corners with border-radius.
  • Multiple backgrounds.
  • Background gradients (-webkit-gradient).
  • The backgrounds adjusted to the containers.
  • Practical work Applying shadows and rounds.
The transformations
  • Transformations: translations, rotations, homotheties (-webkit-transform).
  • Animations: animations, transitions (?webkit-transition).
  • Practical work Animations and transition effects.
861

Amazon Web Services, developing “scalable” web applications for the Cloud

★★★★★

  • SII-297
  • 2 Days (14 Hours)

Description

This training will show you how to leverage a Cloud IaaS/PaaS infrastructure to deploy scalable and resilient applications. You will discover how this infrastructure paves the way for the design of innovative applications (polyglot persistence, real time data processing, data streaming, etc.).

Who is this training for ?

For whom

Project managers, architects, developers.

862
Prerequisites

None

Training objectives

Understand the total cost of ownership of a Cloud Computing environment
Implement a polyglot approach to data persistence with DynamoDB, Redshift and Cloudsearch
Make good use of file storage and HTTP cache with Amazon S3 and Amazon Cloudfront
Understand the principle of resilient stateless architecture based on EC2 and autoscaling group
Apply zero downtime deployment with Route 53 and Beanstalk

863

Training program

Introduction
  • The challenges of Cloud Computing.
  • Difference and complementarity between IaaS and PaaS.
  • Exercise: Implementation of RDS, DynamoDB, Cloudsearch, Redshift and Kinesis.
Data storage
  • The principle of polyglot persistence.
  • The NoSQL (DynamoDB), document (Cloudsearch), SQL (RDS) databases.
  • The data warehouse (Redshift) .
  • What type of base for what need? How to synchronize data?
Horizontal scaling, resilient architectures and stateless applications
  • Principle of n-tier slicing, stateless architectures.
  • Making applications accessible by HTTP via REST.
  • Using a load balancer, configuring automatic scaling .
  • Setting up websocket.
  • Exercise: Deploy a RESTful application with Beanstalk, configure the load balancer to manage websocket calls, synchronize EC2 instances with SNS.
Single Page Application and File Server
  • The principle of Single Page Web Applications.
  • The deployment of HTML, CSS and JavaScript files on a static file server.
  • The call to endpoints REST, principle of Cross Origin Resource Access.
  • Cost optimization.
  • Exercise: Deploy an AngularJS SPA on an Amazon S3 bucket, communication with the REST API .
864
A CDN for HTTP cache
  • Storing files with Amazon S3.
  • What is a Content Delivery Network? A CDN for static resources.
  • Optimize costs through the use of a CDN for HTTP responses from REST endpoints.
  • Exercise: Create a Cloudfront distribution for static files and for REST endpoints.
Data streaming and “near real time” data processing
  • Distributed processing of Big Data: MapReduce, Pregel, Dremel, Percolator.
  • Batch mode processing with MapReduce.
  • Stream consumption with AWS Lambda.
  • Exercise: Coupling dynamoDB streams with a Lambda function.
Le zero downtime deployment
  • The problems posed by automatic scaling.
  • What is zero downtime deployment? Blue-green deployment with Beanstalk.
  • L 'URL swapping with Amazon Route53.
  • Exercise: Deploy an application with Amazon Beanstalk.
865

Java/JEE, deploy and administer your applications

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This course will help you master the Java solution deployment process. You will find the essential elements of a JEE architecture there. Applications will be bundled and deployed to an application server. Finally, you will learn how to monitor these applications and analyze their performance.

Who is this training for ?

For whom

Integration architects, deployment managers, production architects, integrators, analysts and operations engineers.

866
Prerequisites

Basic knowledge of technical architectures (system, notions of deployment and integration, n-tiers).

Training objectives

Mastery of various Java EE/Jakarta EE architectures

Package Java EE / Jakarta EE applications and deploy them to an application server

Monitor and analyze the performance of Java EE / Jakarta EE applications

867

Training program

Introduction to the language and platform
  • Java: language concepts.
  • The object, the Garbage Collector.
  • JVM, JRE, JDK.
  • The architecture Java.
  • J2SE, its evolution, that of JVM.
  • Java for the enterprise.
  • JEE: Java 2 Enterprise Edition.
  • JSP/servlets/EJB.
One platform, different architectures
  • Architectures: from 1 to n-tiers.
  • What do we mean by tier? Java, but where? The business brick: the application server.
  • Web and EJB containers, message queues.
  • Data access management.
  • JDBC.
  • EJB 2.
  • x entities, Hibernate and TopLink.
  • EJB3/JPA.
  • XA Drivers.
868
Application packaging and integration
  • Overview.
  • JAR, WAR, EAR.
  • JAR.
  • Packaging tools.
  • Ant and Maven: concepts and implementation.
  • Coordination with development.
  • The development tool.
  • Configuration management.
  • Integration and its tests.
  • Component integration.
  • How to track dependencies?
869
Deploying JEE applications
  • The different topologies.
  • Web and EJB container.
  • Decoupling: HTTP, WEB, EJB.
  • Static resources aside.
  • Deployment strategies.
  • 1, 2, n-servers? Session: what do we maintain? Security: general view.
  • Clustering.
  • Hardware or software? Session affinity.
  • Automation of deployments.
  • Publisher solutions, scripts.
  • Archiving versions, deployment rates.
870
Monitoring d'applications JEE
  • Information sources.
  • http, application, OS and DBMS logs.
  • Generation of Java logs (Java, Log4J, common loggings).
  • Log analysis.
  • Open Source Tools (Chainsaw.
  • ), the link with HTTP logs.
  • Real-time monitoring.
  • SNMP support in Java, the MIB, JMX and the Jconsole.
  • Points to monitor.
  • Memory, use by the JVM, leaks.
  • I/O disks.
  • Pools.
871
The performance of JEE applications
  • What performance? Response time.
  • JVM behavior.
  • Focus on response times.
  • End-to-end analysis bout.
  • Load tests.
  • Application server stability and scalability.
  • JVM tuning.
  • The GC according to Java versions.
  • Anticipate the evolution of the platform.
  • Hardware and application improvements.
872

JavaScript, dynamic HTML

★★★★★

  • SII-120
  • 1 Days (7 Hours)

Description

The JavaScript language has become essential in website development, both for its strong relationship to the graphical interface and for client/server processing. This course will provide you with all the knowledge to interface the language with the graphic elements of web pages and thus be able to create drop-down menus, animations, dynamically modify presentation styles or even react to user actions... It will teach you also to launch requests to the server (Ajax) and to manipulate XML data.

Who is this training for ?

For whom
Web developers and project managers.
873
Prerequisites

None

Training objectives

Master the syntax of the JavaScript language
Manipulate the DOM structure of an HTML page
Manage event-driven programming
Interact with CSS style sheets
Manage AJAX asynchronous exchanges

874

Training program

Web technologies
  • Presentation of browser types.
  • Impact on the portability of JavaScript programs.
  • Versions of JavaScript.
  • Web components: HTML , XHTML, CSS, JavaScript, Flash, Java.
  • HTTP, HTTPS protocols.
  • Impact of JavaScript on accessibility and SEO.
  • Importance of JavaScript on Web 2.0 sites.
  • Impact of XHTML compliance on the dynamic use of JavaScript.
  • Development tools (editor, debugger).
  • Positioning and illustration of DHTML technologies.
875
The JavaScript language
  • Variable declaration and scope.
  • Data types (Number, Boolean, Date, Math, String, Array).
  • Type conversion.
  • Type detection with typeof.
  • Array management.
  • Logical and arithmetic operators.
  • Loops (for, while.).
  • Creation of functions and variable parameterization.
  • Provide secure coding with error management and exceptions.
  • Reminders of object concepts.
  • Object development in JavaScript: creation of classes (methods, properties).
  • Constructor.
  • Overload.
  • Reserved words prototype, this.
  • Instance creation.
  • Use of Object on dynamic classes.
  • Use of JSON format for class creation.
  • The predefined objects of the language (Array, Date, String, Regexp.) and their use.
  • Extension of predefined objects.
  • Exercise: Implementation of the different JavaScript functionalities through multiple practical work.
876
Events and data
  • Organization of events.
  • Impact of events on browser types and DOM versions.
  • Positioning listeners on events programmatically and setting HTML tags .
  • Rules for cross-browser coding.
  • Create, destroy listeners.
  • JavaScript event processing: keyboard, mouse, forms, rollover, menus dynamic.
  • The Event object and its use.
  • DOM objects (window, document.) and their manipulation.
  • Manipulation of URLs (redirects http .).
  • Cookie management (reading and writing).
  • Exercise: Programming multiple events on form, mouse, keyboard elements.
HTML form management
  • Manipulation of form content.
  • Access and dynamic modification of form components: input zone, check boxes, option boxes.
  • Functions of form validation.
  • Events related to form elements: change, initialization, click.
  • Exercise: Design custom functions controlling user activities.
877
Interacting with Cascading Style Sheets
  • Reminder about cascading style sheets (CSS-1, CSS-2).
  • Tools to manipulate them.
  • Implementation of CSS as properties of DOM objects.
  • Direct modification of CSS properties of DOM objects.
  • Modification of the CSS stylesheets object.
  • Make the page dynamic via changing style properties.
  • Exercise: Creating simple pages to familiarize yourself with the use of style sheets and their manipulation through JavaScript.
Manipulating the XML DOM
  • Presentation of the XML language (attribute elements).
  • Implementation of XML parsers at Microsoft IE and others: variations between browsers, maintenance.
  • Object manipulation of the DOM (reading, adding, deleting, modifying nodes).
  • Exercise: Familiarization with constructing an access path to a DOM element.
878
Ajax
  • Presentation of Asynchronous JavaScript And Xml.
  • Issues, solutions and alternatives.
  • Libraries on the market.
  • HTTP and Ajax: exchanges HTTP and the XMLHttpRequest object.
  • Exercise: Retrieving XML data and displaying the data.
  • Querying a database.
  • Creating a login form.
879

Ecmascript 6, implement the new JavaScript to anticipate application migration

★★★★★

  • SII-121
  • 3 Days (21 Hours)

Description

The JavaScript language has become an essential language in web and mobile development on both the client and server sides, notably with Node.js. This training will allow you to use the new features of the latest EcmaScript 2015 version in production today.

Who is this training for ?

For whom
Experienced JavaScript developers, architects and project managers.
880
Prerequisites

None

Training objectives

Discover the new syntactic features of JavaScript Master the new APIs Use ES6/ES2015 in production Anticipate the evolution of Front-End Frameworks Prepare for new JavaScript development methods

881

Training program

From JavaScript ES5 to ES2015
  • ES5, JS.
  • next, ES6 / ES2015 evolution and "roadmap.
  • ES5, reminder of best practices.
  • Establish programming rules.
  • ES5 ''use strict" and lesser-known methods.
  • APIs from the JavaScript community.
  • Current support for ES6: compilers, polifylls, server browsers.
  • Environment and tools for the developer.
  • Practical work rnYou will program, using examples provided, a micro application framework JavaScript.
882
Fundamental syntactic developments
  • Constants and block variables.
  • Unstructured assignment.
  • Character strings: multiline, template, formatting.
  • Function, parameters by default, operators "rest / spread".
  • "Arrow Function": lexical scope.
  • Uses.
  • Generator function: " yeld" and "generator object".
  • Iterator function: "iterator".
  • Literal object: evolution.
  • Practical work Migrating code to ES2015.
883
OOP, new features for object design
  • Class models and inheritance.
  • Static methods.
  • Creating "proxy".
  • Design pattern.
  • New types: Set, Weakset, Map, Weakmap.
  • Inheritable native objects.
  • Practical work Organization and structuring of the code for an Object by class approach.
  • Revision of "Design Pattern".
New JavaScript APIs with ES6
  • Promise: management of asynchronous processing.
  • Object.
  • API: revisiting the methods.
  • Practical work Development of an Ajax data service using the Promise API.
Modules JavaScript
  • Asynchronous Module Definition or CommonJS.
  • Native module management system.
  • Dependency management and resolution.
  • Dynamic loading.
  • Practical work Structuring your development by modules.
884
Put into production
  • Strategy: "transpiler", "package manager" and module system.
  • Choice of "transpiler": presentation of the solutions.
  • Implementation of TypeScript, Tracer, Babel.
  • Why "package" your code? Advantages and solutions.
  • Creating a package with npm, bower and jspm.
  • Choose between RequireJS, Browserify, WebPack and SystemJS.
  • Interactions with other tools (linting, testing.
  • ).
  • Practical work Creation and integration of packages in development.
885

JavaScript, improvement

★★★★★

  • SII-122
  • 4 Days (28 Hours)

Description

The JavaScript language has become essential for the development of rich client applications. This course will give you all the technological know-how to implement real web applications from advanced JavaScript ES5 concepts, while preparing you to use ES2015.

Who is this training for ?

For whom
Web Developers and Project Managers.
886
Prerequisites

None

Training objectives

Learn advanced JavaScript ES5 concepts Putting Object Oriented Programming into practice Master the debugging environment Implement the jQuery JavaScript Framework Manipulate HTML5 JavaScript APIs Understanding the notion of server-side JavaScript with Node
js

887

Training program

JavaScript callbacks: ES5, DOM, event, manipulation
  • Methods for dynamic object creation.
  • Event phases capture, capturing, bubble.
  • Event management.
  • Event type objects.
  • XML and JSON data structure Advanced methods in ES5.
  • Exercise: JSON data exchange.
  • Creating events.
Framework jQuery
  • Operation and integration.
  • Event management and delegation.
  • jQuery for Ajax exchanges and forms management.
  • Practical work Create a jQuery plugin.
Introduction to ES6 / 2015
  • The main new features.
  • JavaScript supersets: TypeScript, Babel, Traceur.
  • ES6 in production.
  • Practical work r nProduction of ES2015 code with TypeScript and Node.
  • js.
888
Object Oriented Programming
  • Callbacks about the object.
  • Properties.
  • The scope chain.
  • The prototype chain.
  • Methods.
  • Inheritance.
  • Private and public data scope.
  • Mapping and serialization.
  • Design Pattern Keys in JavaScript .
  • Closure function.
  • Singleton and Modules.
  • Exercise: Putting OOP into practice.
  • Developing a micro framework for managing the DOM.
Regular expressions
  • Structure and syntax of a regular expression.
  • Using the RegExp object correctly.
  • Asynchronous validation.
  • Practical work Date check, email.
889
Debugging environment
  • Chrome Devtools, Firefox Developer, Node-debug Handle client error messages in production.
  • Cross-browser testing.
  • Test storage.
  • Performance tests.
  • Practical work Bug finding and performance optimization with ChromeDevtools.
Data exchange, interactions
  • Embedded data storage solution: SQLite, LocalStorage, Cookies.
  • Compensate for communication latencies.
  • JSON Web Token, secure exchanges.
  • Ajax and XMLHttpRequest, consumption of remote services.
  • JavaScript Node server.
  • js.
  • Practical work Calling Web services.
  • Use an onboard base, exchanges with the remote base.
890
JavaScript programming under HTML5
  • New events.
  • Multimedia API management.
  • Client/server communication modes.
  • Using Web Workers.
  • Mobile development "offline first".
  • Technique for optimizing client/server communications.
  • Practical work Manipulation of JavaScript APIs under HTML5.
891

Ajax, client-side programming

★★★★★

  • SII-290
  • 3 Days (21 Hours)

Description

Ajax has become an essential technology for developing rich Web 2.0 applications. During this course, you will learn how to manipulate its components, CSS, DOM, as well as how to establish client-server exchanges.

Who is this training for ?

For whom

This course is aimed at Webmasters, Web developers, IT professionals.

892
Prerequisites

Good knowledge of Javascript and client-side web technologies.

Training objectives

Manipulate classes and objects

Create well-formed and valid XML structures Know XSLT Processing to manage RSS feeds

Implement asynchronous and multithreaded requests

Programming in Ajax with HTML5

893

Training program

Ajax
  • The objectives of Ajax.
  • Operating principles.
  • Strength of the Ajax/REST/Web 2 technology mix.
  • 0.
  • Choose between Ajax and Flash, Applet, Html.
  • Application.
894
XML and Javascript callbacks
  • The XML structure.
  • The namespaces.
  • The means of XML validation: DTD and XSD.
  • XPath limit.
  • Implementing XSLT in Ajax.
  • Object programming.
  • Types.
  • Variables.
  • Arrays.
  • Ecmascript.
  • Emergence of ActionScript.
  • Practical work Creation of a well-formed and valid XML structure.
  • Manipulation of classes and objects.
Javascript Object Notation (JSON)
  • Advantages and disadvantages in exchanges.
  • Objects, Arrays, syntax and JSON parser.
  • JSON, advantages and disadvantages.
  • Serialization between client and server.
895
Programming you DOM
  • Importance of the XHTML language.
  • DHTML components.
  • The role of the DOM in XML programming.
  • Dynamic handling of CSS.
  • Practical work Dynamic modification of the DOM of an HTML page.
XML processing in Javascript
  • XSLT presentation.
  • Xpath language.
  • RSS format.
  • Practical work XSLT processing.
  • Use of RSS feeds.
896
XMLHttpRequest
  • Create and use an XMLHttpRequest object.
  • Debugging tools (IE Toolbar, Firebug).
  • Modifying HTTP headers.
  • Encoding and decoding data.
  • Error management.
  • Cache management.
  • Practical work Manage a product table, a login form in Ajax.
  • Dynamically fill a drop-down menu.
897
Ajax patterns
  • Threads.
  • Use of iFrame for client/server calls.
  • Asynchronous, synchronous processing.
  • Securing Ajax exchanges (encryption, sessions.
  • ).
  • Security and performance issues: encryption, compression, debugging, obfuscation.
  • Setting up crossDomain proxy.
  • Presentation and implementation of the jQuery framework.
  • Practical work Implementation of asynchronous and multithreaded queries.
  • Ajax development in jQuery.
Supplements
  • Framework Ajax, Java, .
  • NET.
  • Ajax and XUL.
  • Overview of Ajax programming with HTML5.
  • Ajax and the Google APIs: Google Search and Google Maps.
  • Practical work Develop an example of cartography in Javascript.
  • Ajax development under HTML5.
898

Create a website, from Photoshop mockup to HTML/CSS integration

★★★★★

  • SII-123
  • 3 Days (21 Hours)

Description

This course will teach you how to create a website from delivering a Photoshop PSD file to building its structure and template pages on the client side. You will design the site using HTML/CSS standards and enhance it with features from the jQuery JavaScript library.

Who is this training for ?

For whom
Graphic designers and integrators.
899
Prerequisites

None

Training objectives

Use Photoshop for Image Cutting and Optimization Implement an integration methodology Carry out an HTML integration while respecting the semantics Restore the design of a site with CSS styles while respecting W3C recommendations Discuss the implementation of the jQuery JavaScript library

900

Training program

Project organisation
  • Analysis of the Photoshop PSD file.
  • Zoning.
  • Choice of development tools.
  • The development environment.
  • Methodology.
  • Taking constraints into account.
  • Exercise: Editing the PSD file provided.
  • Exploring layers.
  • Carrying out zoning.
  • Determining the number of page templates.
901
Cutting in Photoshop
  • Think carefully about cutting.
  • Layers.
  • The slice tool.
  • Image optimization.
  • The choice of image format.
  • Merging slices.
  • Exporting slices.
  • The dangers of HTML export in Photoshop.
  • Exercise: Organizing the cutout.
  • Creating the cutout in Photoshop.
  • Optimizing the images.
902
XHTML integration
  • Reminder of HTML syntax.
  • Choice of Doctype.
  • The main HTML tags.
  • Use the right tags.
  • Validate your code.
  • Exercise: Construction of the HTML structure of the site based on the zoning carried out previously.
  • Discovery of the WC3 validator.
903
Design with CSS
  • Targeted browsers.
  • CSS localization.
  • The main CSS selectors.
  • The main properties.
  • The CSS flow.
  • The concept of boxes.
  • Merging margins.
  • The concept of container.
  • Priority of selectors.
  • The block and inline tags.
  • The conditional comment.
  • Exercise: Constructing the site's external style sheet.
  • Discovery or reminder of CSS syntax: selectors and properties.
  • Inspection of CSS code with Firebug or Chrome.
  • CSS and the site menu.
904
Good practices
  • Compliance with CSS development standards.
  • Target HTML elements correctly.
  • Shortened syntax.
  • Grouping selectors .
  • Validate your CSS code.
  • Comment your code.
  • Convention for writing CSS code.
  • Exercise: Preview the page in different browsers.
  • Correcting the code.
  • Putting CSS writing conventions into practice.
  • Discovering the CSS validator.
  • Building a style sheet for IE.
905
Carousel jQuery
  • Installing jQuery.
  • Installing jquery.
  • jcarousel.
  • pack.
  • Integrating a slider to the site.
  • Exercise: Installation of jQuery and jquery.
  • jcaroussel.
  • pack.
  • Discovery of the syntax.
  • Integration of a slider.
  • Modification of CSS and JavaScript script.
906

Create cross-platform mobile apps

★★★★★

  • SII-301
  • 4 Days (28 Hours)

Description

This training provides an overview of techniques for creating cross-platform applications. Participants will learn the differences between traditional responsive web applications and mobile applications. They will also discover the different frameworks available and how to use mobile features such as data storage or geolocation.

Who is this training for ?

For whom

Mobility developers and project managers.

907
Prerequisites
  • Good knowledge of the Web, HTML and CSS. Basic knowledge of JavaScript and XML.

Training objectives

  • Identify the specificities of a mobile application
  • Discover mobile development solutions
  • Build a complete mobile application
  • Understand the process of publishing a mobile application
    Manage a mobile project

908

Training program

Basic technology reminders
  • Presentation of terminal families: Smartphones, tablets, their specificities.
  • Reminder on HTML, CSS, JavaScript technologies.
  • Reminder on modern development tools (NodeJS, NPM, Bower, Gulp.
  • ).
  • Presentation of Webkit, Gecko engines.
  • Importance and integration of the useragent.
  • Ajax communication: importance and limits depending on mobile devices.
  • Development, testing, simulation tools.
  • Practical work Setting up a working environment dedicated to mobile.
Embedded solutions
  • Presentation of existing technologies and their development environments: limits, cost, portability.
  • Objective-C and Swift (iPhone, iPad), Java (Android), C#.
  • Net (Windows 10, Xamarin), Tizen, Firefox OS.
  • Method of publishing an application in the official catalogs of operators (Apple Store, Google Play.
  • ).
  • Administrative procedures (iPhone Developer Program, Certificates.
  • ).
909
Difference between traditional and mobile web application
  • Differences between browsers: JavaScript engines, CSS, plug-in limits (Flash, PDF.
  • ), other specificities.
  • Difference in screen sizes and solutions.
  • Hardware differences (CPU, memory).
910
Construction XHTML, HTML5
  • META and specific tags: Viewport and dynamic CSS settings.
  • Traditional page construction tags.
  • Table constructions.
  • Links and dedicated options accesskey.
  • Images and the importance of images on terminals (format, weight of images).
  • Texts p, span.
  • Div blocks and canvas blocks in HTML 5.
  • Forms.
  • New data types (daterange, slider.
  • ) .
  • Activation of the numeric keypad.
  • CSS, importance in multichannel mode.
  • Positioning of elements, navigation between elements (zindex, display.
  • ).
  • Bringing CSS3 to HTML5.
  • Simplify the creation and maintenance of CSS with Bootstrap, Sass, Compass and Less.
  • Importance of the DOM for multi-terminal porting.
  • Mobile environment (sensors, battery, network detection.
  • ).
  • Multitouch events specific to terminals (gesture, touch , drag and drop.
  • ).
  • Communication protocols (websocket, ajax), advantages of Node.
  • js.
  • Graphics library: drawing API (rectangle, line.
  • ), color palette, image manipulation.
  • W3C conformance tests: validation tools.
  • Practical work Implementation of input forms; buttons and components; rotation of the terminal by CSS; dynamic management of "touch" events; of drag&drop; of mini drawing manager.
  • Setting up a websocket server with Node.
  • js.
  • Detecting network outages.
911
Data storage in mobile
  • Implementation of a "disconnected mode" strategy.
  • Manifest and caching of mobile site resources.
  • SQLite databases , indexedDB integrated into the browser.
  • SQL language and administration tools.
  • Management and control in JavaScript (table creation, queries.
  • ).
  • Use of Google Gears for terminals not compatible with HTML 5.
  • Client-side cache management for working in offline mode (localStorage, sessionStorage).
  • Practical work Creation of a note manager with storage in the embedded database.
Mapping and geolocation
  • Managing the Google Maps map.
  • Options for supporting mobile geolocation.
  • Practical work Displaying the map in relation to the location of the mobile and display of markers on the map.
912

JQuery Mobile Framework, developing mobile applications

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

In this internship, you will learn to use the jQuery Mobile framework to develop applications for mobiles, tablets and smartphones. In a multichannel and Responsive Design approach, you will see how to take advantage of its features to create quality websites and mobile applications.

Who is this training for ?

For whom

Developers, mobility project managers, webmasters, designers.

913
Prerequisites
  • Have completed the training "The fundamentals of developing graphical interfaces with HTML5, CSS3 and JavaScript" or equivalent knowledge
  • Knowledge of jQuery or jQuery UI is a plus to follow the training

Training objectives

  • Design responsive multichannel applications
  • Install and configure the jQuery Mobile development environment
  • Implement different graphic components to design mobile web interfaces
  • Create and customize themes for your applications
  • Manage multiple events allowing interaction with the user
  • Ensure the loading and persistence of your data

914

Training program

jQuery Mobile Overview
  • Presentation and jQuery reminders.
  • jQuery Mobile vs other frameworks on the market.
  • HTML5 presentation, Ajax.
  • Presentation of sites created with the framework.
  • Presentation of the Codiqa editor.
  • Practical work Implementation of editors and preparation of the development environment.
Ergonomics and mobile specificities
  • Multi-device test environments.
  • Design approach for tactile approaches.
  • Performances and specific constraints.
  • Practical work Performance testing and overview of component types.
jQuery Mobile themes
  • Using the theme editor.
  • Import, export, migration of a custom theme.
  • Customizing a theme.
  • Practical work Creation of multiple themes and integration into the jQuery project.
915
Types of pages
  • Structure of a jQuery page.
  • Transition modes between pages, cache management.
  • Dialog boxes.
  • Navigation between pages.
  • Internal and external links.
  • Practical work Implementation of page types and navigation between pages.
Graphical components
  • Buttons: button link, inline button, custom with icon, button group.
  • Header bar: navigation buttons, title, images.
  • Footer bar: icons, navigation bar.
  • Simple, numbered, personalized lists (icon, text, etc.
  • ), autosuggest, list with search filter .
  • Practical work Implementation of different components, Ajax loading from a database.
The forms
  • Text input, ranges, calendars, search forms, standard formats.
  • Sliders, dynamic list, radio buttons, checkboxes.
  • Send form and control of the form.
  • Practical work Creation of a complete form and sending to a server.
916
Les API jQuery
  • Event management (page loading, binding, etc.
  • ).
  • Ajax calls.
  • Navigation settings (Slide, Flip, etc.
  • ).
  • Storage methods and passing arguments between pages.
  • The $ object.
  • mobile.
  • Practical work Management of multiple events and storage solutions.
917

Sencha Touch 2, developing cross-platform mobile applications

★★★★★

  • SII-404
  • 3 Days (21 Hours)

Description

This internship will allow you to master the Sencha Touch 2 library allowing you to design cross-platform mobile applications. You will install Sencha Touch and its environment, implement its graphic components, create your own components, develop your themes and manage your data.

Who is this training for ?

For whom

Developers and project managers.

918
Prerequisites

Have initial experience in mobile development (Javascript, HTML, CSS, XML, etc.).

Training objectives

Master the fundamental concepts of Sencha Touch 2
Develop rich mobile applications with Sencha Touch 2
Package a Sencha Touch 2 application into a native application

919

Training program

Framework overview
  • Overview of the Sencha Touch framework.
  • The environment: Sencha Cmd.
  • Run and Debug an application.
  • Status places for Test solutions.
  • Documentation.
  • Structure of a Sencha Touch application, the MVC model.
  • Responsive Design vs Adaptive Design.
  • Practical work Installation of Sencha Touch and its environment.
  • Creation of a workspace.
  • Creation of the skeleton of an MVC application with Sencha Cmd.
920
Fundamental concepts
  • Instantiation of an object: procedural vs declarative, Ext.
  • create() vs new.
  • DOM management.
  • The basic elements: components, containers and events.
  • The class system.
  • The "Toolbars" and "Button" objects.
  • Understand "Layouts".
  • Windows.
  • Practical work Create custom components.
  • Create buttons and windows.
The MVC pattern
  • Model concepts.
  • The Controller.
  • Dependency: requires, controllers, views, models and stores.
  • Component references : ComponentQuery.
  • Sending custom events.
  • Practical work Defining and using a Controller.
  • Sending custom events.
921
Data managment
  • All data: Models, Proxies, Stores.
  • Sending and receiving data: HTTP requests and responses, Ajax/JsonP.
  • Practical work Manage data.
Data-driven graphics components
  • List: the Ext. component.
  • List, XTemplate.
  • Navigation View: Ext.
  • NavigationView, back button.
  • Trees: root node/children, TreeStore, Proxy.
  • Forms: submission object, fields, layout, submission, validation, loading.
  • Practical work Setting up a list, navigation view of trees and forms.
Themes
  • Default themes.
  • Create custom themes.
  • Edit CSS and themes with Sass and Compass.
  • Hands-on rnChange the application theme.
Using native APIs
  • Hybrid applications: Build the application for iOS, Android.
  • Native API: Camera, notification, gyroscope.
  • Practical work Use of the Device API.
922

Flex and ActionScript 3.0, web interface programming

★★★★★

  • SII-126
  • 4 Days (28 Hours)

Description

In this course, you will learn how to develop rich internet applications (RIA) using the Flex platform. You will discover its programming model based on MXML and Actionscript 3.0. You will develop interactive graphical interfaces using XML data and web services.

Who is this training for ?

For whom
This practical training is aimed at site developers, IT specialists and designers.
923
Prerequisites

None

Training objectives

924

Training program

Flex 4 Overview
  • Presentation of Flex builder.
  • Integration in a J2EE or .
  • Net.
  • The Flash 10 player.
  • DisplayObject concept.
  • Presentation of Adobe Catalyst for Flex design.
  • Practical work Creating a project and implementing the debugger.
Actionscript 3.0 language
  • XML callbacks: model, validation schema.
  • Actionscript 3 specificities.
  • 0 and Ecmascript XML (E4X).
  • Variables and operators.
  • Creating packages and classes.
  • Practical work Getting started with Actionscript 3.
  • 0.
Langage MXML
  • Structure of a Flex application: script blocks, Model.
  • Event management: propagation, three phases.
  • Practical work Programming of events: click on a button, change of state.
925
Controls and containers
  • Architecture of graphic components.
  • Spatial properties, styles, settings, ViewState.
  • ApplicationControlBar, TitleWindow containers.
  • ModuleLoader components and Repeater.
  • Navigation controls List, LinkButton, PopUpButton, PopUpMenuButton.
  • Navigation containers Accordion, ViewStack.
  • Practical work Creation of multi-state buttons, personalized datagrids.
  • Dynamic construction of graphic areas from Repeater.
  • Implementation of menu bars, tabs, dynamic buttons to the Web.
The forms
  • Input components: text, radio buttons, menus.
  • Input controls: dateFormator.
  • Submitting the form.
  • Practical work Creation of login forms, product data entry controls.
Styles
  • Component design: themes, styles, fonts.
  • Effects and transitions: rotation, sequence, parallel.
  • Graphic construction with Adobe Catalyst.
  • Practical work Putting multiple effects into practice.
926
Data access
  • Access to Web services.
  • RPC and Soap exchanges.
  • The data manager under Flex4.
  • Practical work Call web service, URL call, ShareObject creation.
Graphics
  • Implementation of graphics: pie, plot, bar, line,.
  • Connection between data and graphics.
  • Practical work Creation of graphics.
927

RUBY On Rails 4, web development

★★★★★

  • SII-127
  • 3 Days (21 Hours)

Description

This course will teach you to master the Ruby On Rails 4 framework to develop your web applications. You'll see how to take advantage of the simplicity and speed of Rails 4 to create rich, scalable applications using the MVC pattern and connect them to Web Services.

Who is this training for ?

For whom
Programmers, Web developers and Webmasters wishing to design professional Web Services-oriented websites.
928
Prerequisites

None

Training objectives

Master the development of advanced web applications using the Ruby On Rails 4 framework
Master the RESTful architecture, the MVC design pattern
Dynamize a web application by integrating the JQuery and CoffeeScript libraries
Apply test-driven development to Ruby On Rails 4 development

929

Training program

Introduction
  • Internet reminder, HTML and CSS, XML, JSON, YAML.
  • MVC Design Pattern.
  • Rails hosts.
Prepare your work environment
  • Working environment (Ruby interpreter).
  • Prepare the working folder.
  • Command line tools.
  • Install the development tools.
  • Practical work Installation of the environment.
Program a Ruby
  • Object callback (modules, classes, instances, UML.
  • ).
  • Rails naming conventions.
  • Ruby syntax (module , class, scope, methods.
  • ).
  • Ruby help (RI, Rubycore, inspect).
  • Practical work Create a first program.
930
Discovery of Rails
  • Rails architecture (ActiveRecord, ActiveModel, ORM, ActionVue, ActionController, request routing.
  • ).
  • Prepare an HTML/CSS mockup in accordance with the standards (XHTML/WCAG 2).
  • Create a static page controller.
  • Establish page templates (application/controller).
  • Update setting up view scripts ERB, RHTML, HAML, Liquid, SASS, SCSS, RJS, CoffeeScript, RXML.
  • Use pagination helpers.
  • Managing gems in the application.
  • Place shared resources.
  • Configuration of the database (database.
  • yml), creation and "migration" of a database data.
  • Practical work Create an application with Rails.
931
Advanced Rails concepts
  • CRUD, RESTFul Web Services, ActiveRecord and resource-oriented routing, advanced query routing.
  • ActiveRecord migrations.
  • Transactions.
  • Rails forms (form_for.
  • ).
  • Filters.
  • Internationalize "i18n".
  • Integrate UNICODE on the client and server side.
  • Manage sessions, Cookies and cache.
  • Protect and secure your pages on the client and server side.
  • Debug, the iRb console, breakpoints.
  • Dynamize your site with Ajax, JQuery and CoffeeScript.
  • Practical work Writing forms.
  • Integration of JQuery and CoffeeScript in developments.
932
Tests et versioning
  • TDD (Test Driven Development).
  • Rails Tests and RSpec.
  • Manage versions with GIT.
  • Practical work Application of TDD.
  • Source management with GIT.
Migration vers Rails 4
  • Rails features converted to gems.
  • Migration utility.
  • Practical work Migrate a Rails 3 application.
933

Edge Animate, create interactive animations for the Web

★★★★★

  • SII-128
  • 3 Days (21 Hours)

Description

This course will allow you to design interactive content for all types of mobile terminals compatible with iOS and Android systems, as well as for all modern computer browsers. You will implement HTML5, JavaScript and CSS3 functionality without having to manipulate code.

Who is this training for ?

For whom
Webmasters, graphic designers, layout designers or anyone responsible for website communication.
934
Prerequisites

None

Training objectives

Customize and save your workspace Add animations to an existing HTML page Create a responsive layout Use the timeline to create animations Manage typography within animations

935

Training program

Interface Overview
  • Installing and starting the software.
  • Create a workspace.
  • The toolbar, Elements panel, and Stage.
  • The Properties panel.
  • The Library, Assets, Symbols and Fonts panels.
  • The Scenario and Code panels.
  • The timeline: general overview.
  • Case study Personalize and save your workspace.
Create and save an Edge document
  • The Rectangle, Rounded Rectangle and Ellipse tools.
  • The Text tool.
  • Place an image.
  • Create content for Edge Animate with Photoshop, Illustrator and FW.
  • Formats and image weights for the Internet.
  • Preview a document.
  • Practical work Create three versions of sites, small, medium and large.
936
Modify, enrich and reuse
  • Manipulate objects on the stage.
  • Reorder, align and distribute.
  • Function for prioritization, object groups and overflow.
  • Export/Import symbols.
  • ansym.
  • Practical work r nAdd animation to existing HTML.
Typography and proportional layout
  • Add Webfonts to an animated composition.
  • Free online fonts.
  • Downloadable, local and CSS fonts.
  • Subscription fonts.
  • Resizing options.
  • Percentage and pixel guides.
  • Symbol scaling.
  • Practical work Creating a responsive layout.
937
Animate
  • Use the timeline (basic rules, player).
  • Create an animation (movement, appearance, rhythm, acceleration).
  • Transitions and animation keys .
  • Copy/paste transitions.
  • Lock mark and pop.
  • Use the rotation or tilt function of an object.
  • Displaying symbols, labels, and inserting moving text.
  • Practical work Producing an animation.
Interactivity
  • Add interactivity.
  • Code on the timeline.
  • Actions on objects.
  • Cursor property.
  • Exercise: Exercise: on interactivity.
938
Exporter / diffuser
  • Overview of the anatomy of an Edge Animate project.
  • Export an animation.
  • Bottom level scene (IE 6, 7 and 8).
  • PreLoader, Poster.
  • Publish to the web.
  • Publish to InDesign and Digital Publishing Suite or iBooks Author.
  • Practical work rnExport your project.
939

Java EE 7, web application design and development

★★★★★

  • SII-129
  • 5 Days (35 Hours)

Description

The Java EE 7 platform significantly improves developer productivity and offers better HTML 5 integration. This training will allow you to develop enterprise applications based on the Java EE 7 APIs: JPA, JMS, CDI, EJB , JSF, JAX-RS and WebSocket.

Who is this training for ?

For whom
Developers, architects and project managers.
940
Prerequisites

None

Training objectives

Design and develop an n-tier application based on Java JEE 7 specifications
Implement a data access layer with JPA.
Implement a distributed architecture with EJB and JMS
Implement a presentation layer with JSF and Ajax
Develop and consume REST webservices
Set up a communication channel between an HTML5 browser and a server via Websockets

941

Training program

Introduction
  • Java EE 7 Specification Building Blocks.
  • Best Design Practices: Segregation of Responsibilities, KISS, DRY, POJO.
  • What's New in Version 6 .
  • Panorama of the Java EE offering, the Spring framework.
Working environment
  • Eclipse environment.
  • Maven dependencies.
  • Unit tests with the embedded container.
  • Using webtools, getting started with the server.
  • Practical work Install the IDE and the server.
N-tier splitting and dependency injection
  • Layering, POJO approach.
  • Scopes and state management.
  • Dependency injection.
  • Interceptors.
  • Practical work Implementation of an n-tier application, use of CDI (dependency injection.
  • ).
942
Data access with JPA
  • Mapping relational object (xml, annnotations).
  • Lazy loading.
  • Manipulation of API 2.
  • 1: EntityManager.
  • JPA-QL, API Criteria, MetaModel, EntityGraph.
  • Transactions, annotation
  • Transactional JTA 1.
  • 2.
  • Practical work Setting up the data access layer.
Distributed architecture with EJB and JMS
  • EJB API technical services: security, remoting, concurrent access, asynchronous access, timers.
  • Positioning of EJBs in relation to CDI beans.
  • JMS 2.
  • 0 for message exchanges.
  • Practical work Setting up services with EJB Sessions and a message exchange bus with JMS.
943
Web et JSF
  • Concepts (MVP, Presenter, View).
  • Facelets, taglibs, jsf-el.
  • JSR303 validation.
  • Implementation of Ajax.
  • Practical work Implementation of JSF 2.
  • 2 and Ajax.
Web Services REST
  • JAX-RS API 2.
  • 0 for RESTful web services.
  • HTTP callbacks: verbs, contentType.
  • CORS : Cross origin shared resource.
  • HATEOAS.
  • Produce and consume objects via the Java JSON processing API.
  • Practical work Exhibitor of services, consume these REST services via a web client (AngularJS).
Websockets
  • Web concepts "real time".
  • Browser support, fallback mechanisms.
  • Server and client side implementation.
  • Practical work Adding a websocket connection to the web client.
944
Getting started with JSF
  • Reminders: Servlet, JSP, MVC 2.
  • Market frameworks.
  • Compatibility between JSF 1 and JSF 2.
  • Configure the 'web application.
  • Configure JSF.
  • Create a backing-bean and a form.
  • Simplified configuration with JSF 2.
  • 0.
  • Practical work First JSF application.
945

Zend Framework 2 and 3, mastering web development

★★★★★

  • SII-130
  • 4 Days (28 Hours)

Description

This course will provide you with best practices for web development with the Zend Framework version 2. After installing it, you will discover its architecture and concepts. You will design modules, forms, tackle dependency injection and use the main components of the framework.

Who is this training for ?

For whom
Developers and architects.
946
Prerequisites

None

Training objectives

Install and configure a Zend Framework 2 and 3 application
Master object design patterns, particularly MVC
Use the main components of Zend Framework
Automate tests in Zend Framework
Develop business components with Zend\Db and Doctrine

947

Training program

Introduction
  • Definition of a framework and its benefits.
  • General presentation of the Zend Framework.
  • Successive evolutions since Zend 1.
  • Installation of Zend Framework with Composer.
  • MVC architecture.
  • Application skeleton.
  • Practical work Creation of a project.
Object Oriented Programming
  • Reminders: classes, objects, visibility, encapsulation, accessors, constructor, magic methods.
  • Object design: references, associations, inheritance, abstract classes, interfaces.
  • Design patterns: Factory, Model View Controller, Data Mapper, Table Gateway, Front Controller, Two Step View.
  • PSR standards (0/1/2) and class autoloading.
  • Practical work Design of an Object model.
Using the framework
  • Code type for Model, Controller, View? Using Layout, ViewModel, available and custom view helpers.
  • Error handling, plugins Controllers.
  • Practical work Development of an address book under Zend Framework.
948
Access to databases
  • Databases simplified with Zend\Db.
  • The Doctrine ORM and the Doctrine Module.
  • Practical work Data manipulation via the ORM Doctrine.
The forms
  • Zend\Form: forms management.
  • Filtering and validation: Zend\Filter, Zend\Validate, Zend\InputFilter.
  • Object conversions /paintings with Hydrators.
Best practices with Zend Framework
  • Dependency injection: Zend\Di and Zend\ServiceManager.
  • Writing unit tests with PHPUnit.
  • Mock injection via the ServiceManager.
  • Creating modules, using popular Zend Framework modules: ZfcUser, ZendDeveloperTools, BjyProfiler.
  • Debugging and profiling with XDebug.
Other components
  • Authentication and rights management.
  • Mails, Logs, Session, Config.
  • Internationalization with Zend\ I18n.
  • Zend EventManager.
949
What's new and changes in Zend Framework 3
  • PSR-7, zend-diactoros and zend-expressive.
  • The new ServiceManager.
  • The new EventManager.
  • Migrate an application Zend Framework 2 to Zend Framework 3.
950

Programming in HTML5 with JavaScript and CSS3 (70-480) exam preparation

★★★★★

  • SII-131
  • 5 Days (35 Hours)

Description

This course will teach you how to develop web applications using JavaScript programming, HTML5 and CSS3. You will see how to make your sites more dynamic and enrich them with multimedia content using HTML5. This course covers all the topics necessary to prepare for the Microsoft 70-480 exam.

Who is this training for ?

For whom
Web developers.
951
Prerequisites

None

Training objectives

Learn to develop sites and web applications with HTML5 and CSS3
Make websites more dynamic and more interactive
Know how to insert multimedia content using HTML5

952

Training program

The structure of language
  • The HTML language and CSS.
  • The JavaScript language.
  • The concept of tags.
  • The objects of a document.
  • Titles and paragraphs of text.
  • Size, color and font.
  • Introduction to JavaScript.
  • Insert a script in an HTML/XHTML document.
  • Practical work Create pages in HTML5.
Forms with HTML5
  • The form declaration.
  • Single and multi-line text box.
  • The drop-down menu.
  • The different buttons.
  • Organize the elements of a form.
  • Forms in a mobile environment (phone, tablet).
  • Validation with JavaScript.
  • Practical work Create a form with user input validation with HTML5.
953
HTML5 styling with CSS3
  • How to use CSS3.
  • Layout and positioning.
  • Presentation level.
  • Positioning by grid.
  • Practical work Applying styles with CSS3.
The JavaScript language
  • Basic elements (syntax, variables.
  • ).
  • Functions.
  • Custom objects.
  • Global objects (Array, Date.
  • ).
  • Arrays.
  • Practical work Example of using JavaScript.
954
Les API HTML5
  • Use APIs to have interactive functions.
  • Drag and Drop.
  • Multimedia.
  • Offline mode for Web application.
  • Practical work Insert video.
Adaptive user interface
  • Create pages that auto-adapt to devices.
  • Draw in HTML.
  • SVG.
  • Interactive graphics using of scalable vector graphics.
  • Add animations.
  • CSS transitions.
  • Practical work How to use SVG in a page Use transitions? CSS.
955
Data transmission and real-time communication
  • Communicate with a remote data source.
  • Data transmission.
  • Serialization.
  • XMLHTTPRequest.
  • WebSocket.
  • Exchanges between client and server.
  • The Web Socket API and JavaScript.
  • Practical work Example of data transmission.
956

Fundamentals of Windows Store app development using C# (70-484) exam preparation

★★★★★

  • SII-389
  • 5 Days (35 Hours)

Description

Fundamentals of Windows Store app development using C# (70-484) exam preparation

Who is this training for ?

For whom

Experienced developers.

957
Prerequisites

Know the C# language - Have basic knowledge of XAML programming

Training objectives

Describe the features of the Windows 8 platform and explore the basics of a Windows Store app interface
Create the structure and layout of the user interface using XAML
Use data binding to display data in the UI
Use templates to create the GUI
Deploy an app for the Windows Store or for an enterprise.

958

Training program

Overview of the Windows 8 platform and Windows Store apps
  • Introduction to the Windows 8 platform
  • The principles of the Windows 8 user interface
  • WinRT projections and languages
  • Practical Workshops : Exploring the Windows 8.1 Platform - Exploring a Windows App Store
Creating user interfaces using XAML
  • The basics of XAML
  • XAML Code-behind
  • Advanced XAML
  • Practical Workshops: Creating the user interface Visual Studio 2013 Help - Improving the User Interface Using Visual Studio 2013
Data presentation
  • Working with data presentation controls
  • The GridView control
  • Hands-on Labs: Presenting grade data in the GridView control
Implementing Layout with Windows 8 Intrinsic Controls
  • WinRT Controls
  • AppBar Control
  • Snap and Fill
  • Hands-on Workshops: Setting up the layout using Built-in controls in Windows 8.1
959
Getting started with files in Windows Store apps
  • Getting started with files and streams in the WindowsStore application
  • Working with user file interface components
  • Practical Workshops: Using the API file to read and write data from note files - Adding photos to a note using File Picker
Managing the life process of Windows Store applications
  • Manage the life process
  • Launch Windows Store apps
  • Implement the state management strategy
  • Hands-on Workshops: Explore the different PLM states - Management of the implementation state
Working with templates, styles, and assets
  • Create styles and templates
  • Create shared resources
  • Hands-on Workshops: Working with styles and templates - Creating a control style and template
Design and implementation of navigation in Windows Store applications
  • Getting started with navigation in Windows Store applications
  • Semantic Zoom
  • Practical Workshops: Adding navigation to the ILoveNotes App - Semantic Zoom implementation
960
Implementing Windows 8 contracts
  • Designing charms and contracts
  • The research contract
  • The sharing contract
  • Manage application settings and preferences
  • Practical Workshops: Implementing the search contract - Implementing the Share contract - Adding a new parameter in the Parameters pane - Optional: Search implemented with the SearchBox control
Implementation of user notifications and tiles
  • Implement tiles, live tiles, secondary tiles and badge notifications
  • Implement notification popups
  • Hands-on Workshops: Activating the Live Tile functionality on the main tile
Design and implementation of data access strategies
  • Evaluate data access strategies
  • Working with data remotely
  • Practical Workshops: Answering Questions
Respond to mouse and keystrokes
  • Working with mouse events
  • Working with gesture events
  • Practical Workshops: Setting up mouse and gesture events
Planning for Windows Store app deployment
  • The Windows Store Apps Manifesto
  • Certifying Windows Store Apps
  • Deploying Enterprise Apps
961
Presentation of MCSD 70-484 certification
  • Certification content details
  • Taking and correcting a mock test
  • Corrected workshops
  • Questions/answers, management of time when taking the exam
962

Machine Learning - Foundation

★★★★★

  • SII-132
  • 2 Days (14 Hours)

Description

Machine Learning has been emerged as the new sensation in the IT industry; this facilitates evaluation, optimization and representation; all of these are the components of the algorithm. The training on Machine Learning Programs help the candidates to excel in their fields & the organizations to cope up with adequate IT needs. The training Programs consist of creating interfaces for maintaining organizational data & Process flow.

Who is this training for ?

For whom
Anyone interested in Machine learning .
963
Prerequisites

None

Training objectives

this formation will prepare you for advanced, research level machine learning papers

964

Training program

fundamental concepts and methods in machine learning.
Several important modern algorithms, provides the theoretical underpinnings of these algorithms, and illustrates key aspects for their application.
The authors aim to present novel theoretical tools and concepts while giving concise proofs even for relatively advanced topics.
965

Fundamentals of Windows Store app development using HTML5 and JavaScript (70-481) exam preparation

★★★★★

  • SII-389
  • 5 Days (35 Hours)

Description

This course will teach you how to develop Windows Store apps with HTML5 and JavaScript. You will see how to create user interfaces, present data and implement navigation in applications. This course covers all the topics necessary to prepare for the Microsoft 70-481 exam.

Who is this training for ?

For whom

Application developers.

966
Prerequisites

None

Training objectives

Learn to develop Windows Store applications with HTML5 and JavaScript
Know how to create user interfaces
Learn to implement navigation in applications

967

Training program

File and process management
  • Files in Windows Store Apps.
  • Flows in Windows Store apps.
  • Wraps for files.
  • Manage the application lifecycle.
  • Activate applications.
  • Background tasks.
  • Hands-on Lifecycle example of an application.
Data access and deployment
  • Data access policy.
  • Evaluate data access strategies.
  • Remote data.
  • Events pointer and movement.
  • Deploy Apps to the Windows Store.
  • An app manifest.
  • Certify a Windows Store app.
  • Practical work Example of implementing mouse and movement events.
968
The development platform
  • Windows 8.
  • 1 and Windows Store Apps.
  • The user interface.
  • The WinRT system and the different languages.
Conception d'applications
  • The MVVM design pattern.
  • Single page applications.
  • The MVVM design pattern.
  • The WinJS library.
  • WinJS APIs.
  • Practical work Example of using the WinJS library.
969
Layout
  • Layout apps.
  • Layout controls.
  • Implementing WinJS templates and controls.
  • The AppBar control .
  • How to present data? Data presentation controls.
  • The ListView control.
  • Practical work Example of implementation page of an application.
  • Using data presentation controls.
User notifications
  • Tools for notifying users.
  • The "tile", the "live tiles".
  • The secondary and "tiles" "tile" notifications.
  • What are "toast" notifications? Practical work Example of setting up user notifications.
970
File and process management
  • Files in Windows Store Apps.
  • Flows in Windows Store apps.
  • Wraps for files.
  • Manage the application lifecycle.
  • Activate applications.
  • Background tasks.
  • Hands-on Lifecycle example of an application.
Navigating apps
  • Design navigation in Windows Store apps.
  • How to implement navigation in apps? Using "Semantic Zoom".
  • Work practices Implement "Semantic Zoom".
Windows 8.1 contracts
  • The concepts of charms and contracts.
  • The search and sharing contract.
  • Application settings.
  • Practical work Implement a search contract.
971
Data access and deployment
  • Data access policy.
  • Evaluate data access strategies.
  • Remote data.
  • Events pointer and movement.
  • Deploy Apps to the Windows Store.
  • An app manifest.
  • Certify a Windows Store app.
  • Practical work Example of implementing mouse and movement events.
972

Object Oriented Programming in .NET in C# or Visual Basic .NET

★★★★★

  • SII-133
  • 3 Days (21 Hours)

Description

This training will allow you, through simple and progressive examples, to familiarize yourself with the concepts of object-oriented programming (OOP) necessary for .NET development. You will learn the basics of using Visual Studio as well as how to structure an application into logical layers.

Who is this training for ?

For whom
Developers accustomed to procedural programming who want to move to OOP with .NET technologies.
973
Prerequisites

None

Training objectives

Understand the notion of object
Master common manipulations of objects in .NET
Discover the basics of using Visual Studio
Identify the key points of object-oriented programming in .NET

974

Training program

Interests of OOP
  • Reminder of the principles of procedural programming.
  • Advantages and disadvantages of this approach.
  • Example of an Object-oriented application.
  • Practical work Comparison of the same simple program carried out with a functional and Object-oriented division.
The concept of application architecture
  • From Mainframe to client-server.
  • From client-server to multi-tier architectures.
  • Global architecture of applications in .
  • NET: organization in layers and levels.
  • Principle of the three-layer model: presentation, business and data access.
  • Principle of distributed applications and SOA architectures.
  • Practical work Analysis of a simple application (starter kit) architected in three logical layers.
The notion of object
  • Demystify the notion of object and associated terminology.
  • Design and manipulation of objects (classes, instances).
  • Using the UML class diagram.
975
Implementing a class
  • Implement the encapsulation mechanism.
  • Implement a method with overloads.
  • Add constructors.
  • Create a static member .
  • Define the visibility of a member and control its access.
  • Practical work Handle the different types of members of a class.
OOP concepts
  • Principle and interest of the inheritance mechanism.
  • Redefining a derived member.
  • Role of abstract classes and interfaces.
  • Do of polymorphism with an interface.
Common object manipulations in .NET
  • Principle of early or late binding and reflection.
  • Role and behavior of value and reference types.
  • Grouping objects into collections.
  • Principle of DataBinding.
  • Principle of LINQ.
  • Practical work Become familiar with the manipulation of objects in .
  • NET, with example of LINQ, LINQ To Object and To SQL.
976
Tools and methods
  • Analysis techniques overview (RUP; Agile).
  • Taking advantage of UML (key diagrams, pitfalls to avoid.
  • ).
  • Principle and interest of Design Patterns.
  • Practical work Creation of the Singleton pattern and analysis of the patterns used in the framework.
  • NET.
977

.NET, creating WPF Windows Presentation Foundation and VS 2015/2013 applications

★★★★★

  • SII-306
  • 4 Days (28 Hours)

Description

As a graphics specification of Microsoft .NET, Windows Presentation Foundation is an overlay of DirectX. This hands-on training, which uses Visual Studio as well as C# or VB .NET and MS Blend, will help you acquire the skills needed to design various types of WPF applications.

Who is this training for ?

For whom

.NET developers who want to discover the possibilities offered by WPF and understand the tools allowing its implementation.

978
Prerequisites
  • Knowledge of the XML language and the .NET platform (framework 3.5 or higher, Visual Studio and C# or VB .NET).

Training objectives

  • Understand how Windows Presentation Foundation (WPF) works
  • Acquire Windows development skills with WPF technology
  • Master the syntax of Windows development with the C# (or VBNet) language
  • Use the Visual Studio integrated development environment
  • Discover the basics of MS Blend

979

Training program

Introduction
  • Objectives, architecture of WPF and the different types of projects available.
  • XAML.
  • VS, MS Blend and SDK tools.
  • Structure of a WPF application.
  • Programming model.
  • Practical work Typical applications.
  • Create a simple interface in XAML and add behavior with Visual Studio.
Conception des interfaces
  • Window design and element positioning techniques.
  • Element families.
  • Using routed events.
  • Integration of multimedia elements.
  • Document management.
  • Practical work Create, personalize and program common elements.
  • Carry out a personalized control.
980
Resource management
  • Roles of logical and physical resources.
  • Design of control styles and templates.
  • Role and use of different types of triggers.
  • Labs Formatting controls with styles.
  • Designing a custom control.
DataBinding
  • Reminders.
  • Markup extension expression editor.
  • Configuring linking mode with markup extensions or by code.
  • Management of different types of sources.
  • Data presentation model.
  • Conversion and validation operations with error handling.
  • DataGrid control and CollectionViewSource.
  • Practical work Perform data bindings on a collection of business objects, with validation and conversion.
981
L'application WPF
  • Startup and execution cycle.
  • Using commands.
  • Modal windows, attached windows, and standard dialog boxes.
  • Organization of logical resources.
  • MVVM pattern (principle and implementation).
  • Pages and navigation system.
  • Browser type applications.
  • Practical work Implementation of predefined commands.
  • Creation of a modal window with data exchange, a navigation system and a Browser type application.
Getting started with MS Blend
  • Organization of the interface and integration with VS.
  • Management of resources and assets.
  • Creation of animations and templates.
  • Practical work Creation of an input interface with MS Blend.
982

★★★★★

  • SII-136
  • 5 Days (35 Hours)

Description

Who is this training for ?

For whom
983
Prerequisites

None

Training objectives

984

Training program

Introduction
  • Reminders about .
  • NET writing an application.
  • Practical work Writing an application in console mode.
User interface: Windows Forms
  • Creating user interfaces.
  • Managing user interface components.
  • Managing drag and drop.
  • Click Once Deployment.
  • Practical work Creation of applications using HMI controls.
Windows Forms HMI controls and creation of MDI interfaces
  • Basic controls (textbox, checkbox, listbox, etc.
  • ) and more complex (calendar, DataGridView, WebBrowser.
  • )rnDevelopment of controls
  • Principle.
  • Interaction between MDI windows.
  • Practical work rnCustomization of controls.
  • Advanced manipulations.
  • Creating an application using the MDI interface.
985
Globalization and localization of applications
  • Separation of processing and HMI.
  • Management of cultures and national parameters.
  • Manual management of channels.
  • Management resources.
  • Practical work Localization of an application.
  • Multilingual interface.
Graphics management: GDI+
  • GDI+ graphical interface, creation of a drawing.
  • Management of images, text and prints.
  • Practical work Creation of applications using the GDI GUI.
Windows Forms and multitasking
  • Multithreading and multiprocessing in .
  • NET.
  • Windows Forms doing multithreading.
  • Practical work Writing an application multithread/Windows Forms.
986
Using XML in .NET and accessing data
  • Principle of XML.
  • Data.
  • XSD Schema.
  • Exchanges.
  • Principle of ADO.
  • NET.
  • Reading by stream.
  • Using commands.
  • Using in offline mode.
  • Access to databases.
  • Access to a database schema.
  • Asynchronous access.
  • Practical work Manipulation of XML creation classes (inputs/outputs).
  • Using ADO.
  • NET for data access.
987
Using web services
  • Introduction to Web Services.
  • WSDL Description.
  • SOAP.
  • Hands-on Using Web Services for Access to the data.
988

Drupal 8, create and administer a content management site preparation for Drupal 8 Webmaster certification

★★★★★

  • SII-137
  • 3 Days (21 Hours)

Description

Drupal 8, create and administer a content management site preparation for Drupal 8 Webmaster certification

Who is this training for ?

For whom
Administrators, Webmasters, developers, Web designers and anyone in charge of a Drupal site.
989
Prerequisites

None

Training objectives

Install and configure the Drupal 8 CMS Create, organize and navigate content Install, configure and operate modules Install, configure and customize themes Administer a Drupal 8 site on a daily basis

990

Training program

Drupal 8 overview
  • Positioning of Drupal compared to other CMS.
  • Main features and new features.
  • Components of a Drupal site: Nodes, Modules, Views.
  • Mobile management.
  • Multilingualism management.
  • Practical work Install Drupal 8 on a server.
Create and manage content
  • Content types, their fields.
  • Define publishing options for a content type.
  • Create, edit, access, delete, search for a content type.
  • Define new fields.
  • Format content with an editor (CKEditor).
  • The filter system.
  • Integrate multimedia content.
  • Manage the publishing workflow.
  • Practical work Create personalized content.
991
Taxonomies
  • Create vocabularies.
  • Associate a vocabulary to a content type.
  • Work with multiple vocabularies.
The navigation system
  • Create a main menu, secondary menu, a footer.
  • Add a menu item.
  • Practical work Adding a navigation system in the form of menus allowing access to the content and services available from the home page.
the blogs
  • Position blocks on a page.
  • Configure blocks.
  • Create custom blocks.
  • Block and layout management .
Modules
  • Install and configure a module.
  • Module Field: build your own content type.
  • Module Views: customize the display of content.
  • Other useful modules (CKEditor, Entity reference, referencing.
  • ).
  • Practical work Install and use a new module (Field, Views.
  • ).
992
The themes
  • structure of a theme.
  • How it works.
  • Install, configure a new theme.
  • Customize a theme.
  • Practical work Install and configure a new theme.
  • Adapt an existing theme.
Administer a Drupal site
  • Administrator tasks.
  • The dashboard.
  • Use the console, know Drush make, compose.
  • Management access: users, roles, permissions.
  • Back up and restore the site.
  • Production, cloning and updating of a site.
  • Task automation (content publishing.
  • ).
993

Drupal 8, developer preparation for Drupal 8 Developer certification

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

In this course, you will use Drupal as a framework to accelerate your development by relying on its APIs (Entity API, Schema API, etc.). You will learn how to create modules capable of interacting with Drupal. You will adapt its operation or its community modules without touching their source code.

Who is this training for ?

For whom

Developers, project managers.

994
Prerequisites

Good knowledge of PHP object, HTML and CSS. Knowledge equivalent to that provided by the course.

Training objectives

Install, configure Drupal and its development environment

Install and create modules

Create and manage blocks

Create and modify forms

Secure access to resources

995

Training program

Introduction
  • Presentation of Drupal (node, taxonomy).
  • Presentation, installation of development tools.
  • Installation of Drupal 8.
  • The developer tools: Firebug,
  • Object concepts (classes, interfaces, dependency injection, PSR-4).
  • Practical work Installation of Drupal 8 and WAMP.
Creating a module
  • The necessary files.
  • File structures (autoloading).
  • PSR-0 and PSR-4.
  • Container, services and dependency injection.
  • Practical work Install and create modules.
The routing system
  • Routing management.
  • Matching a URL to a page.
  • Using the create() and __construct() methods.
  • Create dynamic URLs.
  • Adding menu, context, action and tab links.
  • Practical work Display a page with arguments.
996
The block system
  • Block management with Drupal 8.
  • Introduction to block types.
  • How to create a block with Bloc Plug-in? Practical work Display a block, protect access to it.
The knots
  • What is a node? Create a "node module".
  • Manipulate nodes by programming.
  • Intercept actions performed on the nodes.
  • Adding a tab on each node page.
  • Practical work Create an update history.
The forms
  • Create forms programmatically (Form API).
  • Manage validation and submission of a form.
  • AJAX forms.
  • Change the presentation of a form.
  • Modify a Drupal form without touching its source code (hook_form_alter).
  • Practical work Create a form.
997
Config API
  • Configuration Management: YAML files, import/export.
  • Create a form in the Drupal back office.
  • Add your own configuration: the object Config.
  • Configuration translation.
  • Practical work Dynamic route.
  • Use the API Schema.
  • Create an update up to date.
Security
  • Protect access to a block.
  • Protect access to a page.
  • Create your own access control system.
  • Practical work Protect access to a block.
  • Protect access to a page.
  • Custom access control.
998

.NET, ADO.NET data access, LINQ

★★★★★

  • SII-139
  • 4 Days (28 Hours)

Description

This training will allow you to familiarize yourself with the different data access techniques available in .NET. Standard scenarios will be presented through practical workshops, carried out in C# or VB.NET, in the context of Windows Forms, WPF and Web applications.

Who is this training for ?

For whom
Developers who want to discover ADO.NET and associated techniques with concrete examples to develop professional applications based on the .NET framework.
999
Prerequisites

None

Training objectives

1000

Training program

Introduction
  • Philosophy and architecture of ADOs.
  • NET.
  • Principle of managed data access providers.
  • Organization of classes and namespaces.
  • Application architecture model in three layers.
  • Principle of DataBinding in Windows Forms, WPF and Web.
  • The different uses of XML in ADO.
  • NET.
  • Practical work Data binding of a property of a visual control on an object in Windows and Web.
1001
Programming with ADO.NET objects
  • Managing a connection (configuration, pooling,.
  • .
  • ).
  • Configuring and executing a command.
  • Reading data with a DataReader.
  • Untyped/typed DataSet.
  • Generic data access techniques.
  • Work practices Program with ADO.
  • NET (Connection, Command and DataReader objects) and create a generic data access class.
Introduction to LINQ
  • Philosophy and architecture of LINQ.
  • MRO (Object Relational Mapping).
  • Programming techniques: anonymous types, extension methods and lambda expressions.
  • LINQ To Objects (query operators).
  • Manipulate XML (creation and query) with LINQ To XML.
  • Practical work Query a collection of objects and manipulate an XML file.
1002
LINQ To SQL
  • Overview of advantages and limitations.
  • Using the Object Relational Designer, with configuration of stored procedures.
  • Insert, Update, Delete operations.
  • Resolution of conflicts linked to concurrency access.
  • Practical work Data manipulation on a SQL Server database.
Entity Framework
  • Presentation: architecture, functionalities, mapping.
  • Design, configuration and diagram of the data model.
  • "Domain Driven Development" approach with generation of the base from the model.
  • Query operations (LINQ to Entities and Entity SQL) and data updating.
  • Using functions and stored procedures.
  • Customize the model: associations, projections, type inheritance, manipulation of object graphs.
  • Exception and concurrency management.
  • Presentation of the REST architecture and implementation of ADO data services.
  • NET.
  • Practical work rnExamples of configuring the entity model, with data manipulation.
  • Consuming a WCF service.
1003

ADO.NET Entity Framework, mastery and optimization

★★★★★

  • SII-323
  • 4 Days (28 Hours)

Description

During this internship, you will gain an understanding of all of the Entity Framework services, and see how to use them to simplify access to data in your .NET applications. You will learn how to perfect your queries and obtain optimal execution times.

Who is this training for ?

For whom

Developer in charge of data access in .NET applications. Project manager, software architect wishing to have a complete view of the possibilities of the Entity Framework solution.

1004
Prerequisites

None

Training objectives

1005

Training program

Entity Framework
  • Principle and Interest of Object Relational Mapping.
  • Entity Framework Architecture.
  • Getting started with the Visual Studio designer.
  • Exercise: Creating a data model.
LINQ
  • Architecture and operation.
  • Lambda expressions and extension methods.
  • Executing queries using LINQ expressions and operators.
  • Exercise: Creating LINQ To Objects and LINQ To Entities queries.
Entity Data Model
  • Introduction to VS.
  • Schema of the EDMX file.
  • Choice of a method (BaseFirst, ModelFirst, Code First).
  • Services associated with the designer in VS.
  • Comparison with other tools.
  • Exercise: Manipulating the model.
1006
From the relational model to the object model
  • Principles.
  • Data mapping.
  • The EDMX file.
  • Conditional mapping.
  • Inheritance.
  • Customize entity validation.
  • Complex and enumerated types.
  • Exercise: Add entities to the model.
  • Customize data mapping.
Query with LINQ to Entities and Entity SQL
  • SQL generation mechanism.
  • LINQ To Entities queries.
  • Use of Entity SQL.
  • Loading data and related entities .
  • Refreshing loaded data.
  • Using stored procedures from the Entity Framework.
  • Exercise: Common queries with the different scenarios loading related entities and updating loaded data.
1007
Data updates and customization of model generation
  • Insertion, deletion, modification.
  • Transactions.
  • Competitive conflicts.
  • Stored procedures.
  • The code T4.
  • Generate the base according to a model.
  • POCO classes.
  • Entity Framework 5 and 6 improvements.
  • Model First Approach and Code First Approach (Annotations and Fluent API).
  • Exercise: Perform data update operations with or without a stored procedure.
  • Create POCO classes.
1008
Different uses of Entity Framework
  • Linking to data in ASP.
  • NET.
  • Principle of a Dynamic Data site.
  • Principle of a data service data.
  • Data bindings in WPF, Silverlight and Windows Phone.
  • Exercise: Using a data model in an ASP application.
  • NET, with validation from the model.
1009

Drupal 7, webmaster administer your sites

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This course will provide you with the useful knowledge to administer a site designed with Drupal on a daily basis. After installing and configuring Drupal, you will learn the main administration tasks. You will learn how to analyze a site's monitoring dashboards, create a distribution and deploy it.

Who is this training for ?

For whom

Web master and anyone having to install and configure a site created with Drupal.

1010
Prerequisites

Have fundamental knowledge of website creation and HTML/CSS languages.

Training objectives

Set up and configure the Drupal 7 content management system (CMS)

Develop, structure and navigate content elements

Set up, configure and use extensions

Deploy, configure and customize graphic templates (themes)

Regularly manage a site under Drupal 7

1011

Training program

Drupal overview
  • The positioning of Drupal compared to other CMS.
  • Main features.
  • Architecture: Nodes, Core, Modules, Themes.
  • Multilingual management.
  • Install Drupal on a local, remote server.
Create and manage content
  • Content types.
  • Set content options.
  • Content: create, edit, access, delete, search.
  • Configure the display of a content type.
Taxonomies
  • Create vocabularies.
  • Associate a vocabulary to a content type.
  • Work with multiple vocabularies.
The navigation system
  • Create a menu.
  • Add a menu item.
the blogs
  • Position blocks on a page.
  • Configure blocks.
  • Create custom blocks.
1012
Modules
  • Install and configure a module.
  • The Views, Panels, Nicemenus, Nodequeues, Webform modules.
  • The Token module.
  • The SEO modules (Pathauto, Metatag, Google Analytics, RDF and Schema.org).
The themes
  • How it works.
  • Install, configure a new theme.
  • Customize a theme.
Administer a Drupal site
  • Administrator tasks.
  • Users, roles, permissions.
  • Back up and restore the site.
  • Track activity of the site.
  • Putting a Drupal site into production.
1013

WCF, develop Web Services in .NET create distributed Windows applications

★★★★★

  • SII-387
  • 4 Days (28 Hours)

Description

This internship will allow you to master the main Web Service architectures based on SOAP and REST. You will implement clients and web services on different platforms: IIS, WAS, App Fabric, Azure and secure exchanges via different authentication modes.

Who is this training for ?

For whom

Developers, project managers wishing to master SOAP and REST Web Services.

1014
Prerequisites

None

Training objectives

Evaluate the main Web Services architectures based on SOAP and REST Create SOAP clients and Web services Create REST clients and Web services Develop distributed Windows applications

1015

Training program

Windows Communication Framework Fundamentals
  • Endpoint ABCs: Address, Binding.
  • Hosting a service with IIS, WAS, App Fabric.
  • VS-generated ChannelFactory and proxy clients.
  • Service version management.
  • Service life cycle, concurrency management, sessions.
  • Exposure of WS metadata.
  • Serialization of data with DataContract, DataMember.
  • Practical work Creation of a WCF service and its client.
  • Comparison of ChannelFactory and Proxy clients.
1016
Advanced SOAP Web Services
  • Local and distributed transactions.
  • Callbacks.
  • Service behaviors.
  • Reliability.
  • WS testing , traces and debugging.
  • Exception transmissions with FaultContract.
  • Automatic discovery of the address of services on the local network with ServiceDiscovery and ServiceAnnouncement.
  • Services in line with the NetMSMQBindin connection.
  • Practical work Creation of a distributed transaction to have consistent data.
WCF Security
  • Message and Transport Security.
  • Identity transport and authorizations.
  • Available authentication modes.
  • Management of roles with MemberShipProvider.
  • Windows authentication management.
  • Impersonification.
  • Hands-on Creating Internet security.
1017
Services REST Web API
  • Introduction to REST architectures.
  • Controllers, attributes.
  • URL routes.
  • Content negotiation.
  • Self-hosting with Owin.
  • Practical work Creation of a Web API service.
WCF Data Service for data-driven REST services
  • OData and LINQ URLs for queries in URLs.
  • Hosting in IIS and self-hosting.
  • Secure your WCF Data Services.
  • Volume and pagination.
  • Fine security by query with QueryInterceptor.
  • Practical work Development of a WCF Data server with Entity Framework.
1018
Le Bus de Services Windows Azure
  • Azure Service Bus Relay to make firewalls more flexible.
  • Hybrid mode for performance.
  • One-way messages and request/response.
  • BrokeredMessages queues to persist messages in the absence of the consumer.
  • Topics and subscriptions.
  • Filters.
  • Demonstration Bus relay demonstration service and queues.
1019

Alfresco, use and administer a DMS solution

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

This internship will teach you how to install, configure and administer the Alfresco solution, which is one of the main references for enterprise content and web content management. You will also learn how to manage documents in this work environment.

Who is this training for ?

For whom

GED project managers, project managers, project owners, users/administrators.

1020
Prerequisites

Basic knowledge of the concepts and components of content management systems.

Training objectives

At the end of the training, the participant will be able to:

  • Understand the technical architecture of Alfresco
  • Install a filing plan on Alfresco
  • Create a Document Validation Workflow
  • Create user accounts and groups and associate usage rights
  • Create a collaborative site with Alfresco Share by associating a content model

1021

Training program

Alfresco presentation
  • Fundamentals of content management and document management.
  • The positioning of Alfresco in relation to other CMS.
  • The functionalities of Alfresco.
  • The different editions: Community and Enterprise.
  • The technical architecture.
  • The structure of the warehouse.
  • Access to the warehouse: interfaces (Explorer and Share), protocols, APIs.
  • Practical work Installation of Alfresco on a local server.
  • Study of directories and installation files.
Using Alfresco
  • Start and stop Alfresco.
  • Connect to the warehouse.
  • Folder operations.
  • Content operations .
  • Simple and advanced search.
  • Practical work Installation of the classification plan.
  • Creation, modification and deletion of content.
1022
Advanced document management
  • Using version tracking.
  • Managing types and aspects.
  • Creating content rules.
  • Creating simple workflows.
  • Executing advanced workflows.
  • Publishing content on social networks.
  • Practical work Management of life cycle of a document.
  • Creating a validation workflow.
Administering Alfresco
  • Administration tools.
  • Category management.
  • Creating user and group accounts.
  • Adding publication channels.
  • programming replication tasks.
  • Using the node browser.
  • Practical work Creating users and groups.
  • Setting rights to folders.
1023
Configure Alfresco
  • Configuring IMAP attachments.
  • creating a Share collaborative space.
  • Location of configuration files.
  • Extension of the content model.
  • Impacting graphical interfaces.
  • Practical work Creation of a collaborative site with Alfresco Share.
  • Creation of a simple content model.
1024

Alfresco, personalize and extend the solution

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This training aims to teach you how to customize and integrate the Alfresco solution into your document and web content management environment according to the needs of your organization. It covers all stages of customization and integration of the solution to meet the specific needs of your business.

Who is this training for ?

For whom

Project managers, Web masters, developers.

1025
Prerequisites

Basic knowledge of Java and Javascript as well as knowledge equivalent to that provided by the “ALFresco, use and administer a GED solution” course (ref. ALF).

Training objectives

Design content templates
Manage the entire lifecycle of content Create a custom template
Develop web content with JavaScript

1026

Training program

Alfresco presentation
  • Functionalities: document management, records management, collaboration, web content management.
  • The warehouse and its interfaces.
  • Administration tools.
  • Content operations.
  • Practical work Manage the entire life cycle of content: creation, publication, access rights, content rules.
Extend the content model
  • Alfresco meta-models.
  • Types, aspects, properties, associations.
  • Create a content model.
  • Deploy the content model.
  • Impact graphical interfaces.
  • Practical work Create and deploy a personalized content model.
Presentation templates
  • Location of ftl files.
  • Using ftl files in the GUI.
  • The FreeMarker templating language.
  • Objects and template properties TemplateNode.
  • Accessing presentations by URL.
  • Hands-on Create and deploy a custom presentation template.
1027
Advanced workflows
  • The workflow administration console.
  • Display the list of jbpm and activity workflows.
  • Create and deploy an advanced workflow.
  • Practical work Creation of an advanced validation workflow.
Components and APIs
  • Structure of the warehouse.
  • Basic services: Node, Content, Search.
  • Warehouse access protocols.
  • APIs.
The development environment
  • The Alfresco extension mechanism.
  • The SDK.
  • Set up a development environment.
  • Packaging and deployment.
  • Practical work Configure the development environment with Eclipse
1028
Access the warehouse via APIs
  • Create content with JavaScript.
  • Access the warehouse using JCR.
  • Use Alfresco Web services.
  • Access the warehouse and manipulate content using CMIS.
  • Practical work r nCreate content with JavaScript.
  • Create content with JCR.
  • Create a Web Script.
  • Create content with CMIS.
1029

Optimization of applications in .NET

★★★★★

  • SII-311
  • 4 Days (28 Hours)

Description

This training presents a methodology to improve the efficiency of your .NET and .Net Core applications. You will learn how to use the most important performance analysis and diagnostic tools, and you will master the different code optimization techniques in C# language. This will allow you to optimize your applications so that they work faster and more efficiently.

Who is this training for ?

For whom

Developers, engineers, architects, project managers.

1030
Prerequisites

Good knowledge of the C# language. Experience required.

Training objectives

  • Master the architecture of
    Net applications
  • Diagnose memory allocations and avoid memory leaks
  • Optimize C# code with reference to the latest C# versions 7, 8 and 9
  • Master operations on arrays and collections
  • Optimize and measure performance gains via parallelism
  • Code in C# to solve real-world problems

1031

Training program

Introduction
  • Evolution of the .Net platform and its ecosystem.
  • Optimize: what, how, when? Objectives.
The GC garbage collector, allocation optimization and diagnosis
  • Memory management by garbage collection and GC API.
  • Diagnostic tools from Visual Studio, JetBrains and BenchmarkDotNet.
  • The Pattern Disposes and the implementation of IDisposable.
  • Recommendations to avoid potential memory leaks in a .Net application.
  • Guards to design time via Code Analysis Rules.
  • Tools from the .Net ecosystem to trace boxing, closure and null reference errors.
C# methods and language constructs
  • C# methods and the evolution of coding.
  • Extension methods and LINQ architecture.
  • Asynchronous methods and the use of async/await keywords.
  • Performance metrics for Value type allocations compared to Reference types.
  • New ValueTuple value type in C# 7.0.
  • Parameter passing and returning by reference in C# 7.2.
  • Advantages of functional programming in C# and comparison to the functional language F#.
  • Pattern Matching in C#.
1032
Paintings and collections
  • Performance of data operations.
  • .Net collections and characteristics.
  • Implementation of the IEquatable interface.
  • IntPtr pointer and the C# 7.2 stackalloc keyword to allocate on the stack.
The .Net 4.7 TPL library: asynchronism and parallelism
  • Evolution of the management of asynchronous calls via the async/await keywords.
  • The new classes of System.Threading.Tasks.
  • Parallelize the iterations for and foreach. Design pattern in terms of parallelism.
  • Using the PLinq infrastructure.
  • Performance diagnosis via JetBrains BenchmarkDotNet and DotTrace NuGet.
Conclusion
  • Impact of C# 8 and C# 9 features on .Net code and applications.
  • A summary and some advice.
  • Book recommendations and internet references .
1033

C#, programmation multithread

★★★★★

  • SII-298
  • 4 Days (28 Hours)

Description

This training will show you the advantages of multithreaded processing as well as how to implement it effectively in C#. You'll see how to manage memory sharing, synchronization issues, thread pools, and development best practices.

Who is this training for ?

For whom

Developers, engineers, architects, project managers.

1034
Prerequisites

Good knowledge of C# programming.

Training objectives

Master the basic tools for creating threads
Implement the framework's synchronization classes
Master asynchronous calls
Know how to use diagnostic tools

1035

Training program

Introduction
  • Multiple threads: why? The objectives.
  • Two models of multithreading: concurrent/parallel.
  • Difficulties and challenges of multithreaded programming.
The basic tools of the framework
  • What is a thread? Components of a thread.
  • Memory sharing by threads.
  • The Thread class of the framework (version 2 and above).
  • The need for synchronization and the lock instruction.
  • Practical work Thread creation.
  • Synchronization.
  • Influence of the number of processors.
1036
Framework synchronization classes
  • Windows historical synchronization objects: Event, Mutex, Semaphore.
  • The equivalent classes of the framework.
  • The critical sections of Windows and the Monitor class of the framework.
  • The danger of fatal embrace and its detection.
  • Conditional variables and the Monitor class.
  • The ReadWriteLock class.
  • The Interlocked class.
  • Practical work Synchronization of two threads, producer and consumer of data.
  • Using classes.
Le pool de threads
  • The ThreadPool and its two categories of threads.
  • Setting the number of threads.
  • Explicit and implicit use of worker threads.
  • Practical work Explicit use of pool threads.
1037
Using asynchronous executions
  • The underlying Windows mechanics.
  • The Design Pattern Begin/End and the Stream or other classes concerned.
  • Asynchronous in ASP.
  • NET.
  • The Async Design Pattern of the socket framework.
  • Practical work Writing a program using asynchronous calls.
Code instrumentation and profiling
  • Competition for data, forgetting synchronization and its granularity.
  • Broken memory reads/writes, reordering of instructions.
  • The use of diagnostic tools to judge the relevance of the use of threads.
  • Practical work Highlighting the impact of certain application design choices.
Program design and architecture
  • Thinking/designing multithreaded and parallel.
  • Threads and GUI.
  • Thread vs AppDomain.
1038

IIS 8.5/8.0, administer a web server, for Windows Server 2012 Best

★★★★★

  • SII-385
  • 3 Days (21 Hours)

Description

This course will teach you how to install, configure and administer an IIS 8.5/8.0 Web server under Windows 2012. You will also learn to set up, control and administer sites and applications by integrating security and performance constraints. to this server.

Who is this training for ?

For whom

Administrators and system engineers responsible for administering web servers.

1039
Prerequisites

None

Training objectives

Install and configure IIS 8
0 / 8
5 under Windows Server 2012 Create, install and configure sites and applications Secure an IIS server Back up and restore an IIS environment Manage the performance of an IIS server

1040

Training program

Configuration de base
  • Service management, post-installation configuration.
  • Administrative tools, WMI, PowerShell, Appcmd.
  • Structure of a website, virtual directory, application pool.
  • Exercise: Creating sites, applications, and virtual directories.
Presentation
  • IIS 8 architecture.
  • 5, what's new.
  • Install IIS with Server Manager, DISM and unattend.
  • xml.
  • How to migrate from an IIS 7 website.
  • 0 to IIS 8.
  • 5? Exercise: Installing IIS 8.
  • 5.
Configuration de base
  • Service management, post-installation configuration.
  • Administrative tools, WMI, PowerShell, Appcmd.
  • Structure of a website, virtual directory, application pool.
  • Exercise: Creating sites, applications, and virtual directories.
1041
Setting up sites and web applications
  • Static sites, site binding, host header, ISAPI filters.
  • Web server configuration, inheritance and conflict.
  • Initializing applications: splash page, CPU consumption, NUMA scalability.
  • Configure features: default document, http error pages, http redirect.
  • Configure ASP applications.
  • NET, PHP and Fast-CGI.
  • Exercise: Installation and configuration of sites.
  • Configuring ASP.
  • NET , PHP.
1042
Security
  • The main attacks: how to defend yourself, security tools in IIS.
  • Anonymous authentication, by ASP impersonation.
  • NET, client certificate.
  • Authorization: Application Pool Identity.
  • Create a self-signed server certificate, certificate centralization.
  • Request filtering.
  • ISAPI, CGI, IP and domain restrictions, URL authorization rules.
  • Exercise: Setting up SSL certificates.
  • Installing a security system 'authentication.
  • Security testing on an IIS server.
Maintaining a web server
  • Log format, logging improvement.
  • Event tracking: ETW integration.
  • Monitoring work processes, configuring request tracking.
  • Backup and restore.
  • Exercise: Log analysis and reporting tools.
  • Backup and restore an IIS environment.
1043
Performance management
  • Dynamic activation of sites.
  • Compression, static / dynamic caching.
  • Performance analyzer, counters to monitor.
  • Configure website performance, manage application pool performance.
  • Exercise: Monitor an IIS server.
  • Install a traffic management tool.
  • Setting up a cache for dynamic content.
1044

IIS 7.0, administer a web server

★★★★★

  • SII-384
  • 3 Days (21 Hours)

Description

This course will allow you to discover and master the IIS server. At the end of the course, you will know how to install and configure IIS 7.0 under Windows 2008 Server; install, configure and secure sites (static and/or dynamic) and applications; audit and maintain an IIS server.

Who is this training for ?

For whom

Administrators and system engineers responsible for administering web servers.

1045
Prerequisites

None

Training objectives

1046

Training program

Presentation
  • What's new in IIS 7.
  • 0.
  • Migrating from IIS 6.
  • 0.
  • Administration via the MMC (IIS Manager) and the command line tool (AppCmd).
  • The different types of installations.
  • Practical work Installation of IIS 7.
  • 0 on Windows 2008 Server.
Presentation
  • What's new in IIS 7.
  • 0.
  • Migrating from IIS 6.
  • 0.
  • Administration via the MMC (IIS Manager) and the command line tool (AppCmd).
  • The different types of installations.
  • Practical work Installation of IIS 7.
  • 0 on Windows 2008 Server.
1047
Configuration de base
  • Managing IIS services.
  • Post-installation configuration.
  • Structure of a website.
  • Configuration: web.
  • config.
  • Application pools.
  • Practical work Creation of sites, applications and virtual directories.
Setting up sites and web applications
  • Migration of sites and web applications.
  • Publishing static and dynamic sites.
  • Installation and configuration of development languages.
  • Illustration ASP.
  • NET.
  • Practical work Installation and configuration of sites.
  • Configuration of ASP.
  • NET, PHP, FastCGI.
  • Installation of an application interacting with a database.
1048
Security
  • Reminder: the security of a server on the Internet and web applications.
  • Classic attacks.
  • Encryption via SSL.
  • Client- and server-side certificates.
  • Configure access permissions.
  • Hosted application security.
  • Reduce risks with IIS modularity 7.
  • 0.
  • Practical work Setting up SSL certificates.
  • Installation of an authentication system.
  • Security testing on an IIS server.
1049
FTP, WEBDAV et SMTP
  • Configuring the FTP service.
  • Managing users, groups and permissions.
  • Configuring WEBDAV access.
  • Upgrading updating a website.
  • Configuring the SMTP service.
  • Security.
  • Relaying.
  • Practical work r nSetting up and configuring an FTP and SMTP server.
  • Transfer of sites via FTP.
  • Setting up a web form for sending emails.
Performance management
  • Analysis tools.
  • Manage server load, number of requests per second and network traffic.
  • Practical work Monitor a server IIS.
  • Install a traffic management tool.
  • Setting up a cache for dynamic content.
1050
Maintaining a web server
  • Managing IIS logs.
  • Troubleshooting.
  • Backing up and restoring the web server configuration.
  • Managing a server IIS with PowerShell.
  • Practical work Log analysis and reporting tools.
  • Backing up and restoring an IIS environment.
1051

Editorial website design

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Designing an editorial charter requires method and creativity. In this training, you will see how to apply writing rules adapted to websites and take into account visual constraints and requirements linked to mobility. You will also learn how to define your own editorial processes.

Who is this training for ?

For whom

Communications manager, web editor or any person responsible for the design or redesign of a predominantly editorial site or participating in the development of its content.

1052
Prerequisites

Experience in writing (print or Web).

Training objectives

Design and write an editorial charter for a site

Know the writing rules adapted to sites Define editorial processes

1053

Training program

Overview of different content-oriented sites
  • Optimize content in order to better reach your targets.
  • Deciphering what works and does not work.
  • Relevance of the speech.
  • Public expectations.
  • Practical work Analysis of the strengths and weaknesses of representative sites.
  • Work on practical cases.
Write your editorial charter
  • The link with the company's strategy.
  • The foundations: objectives, targets and means.
  • Design an editorial charter.
  • Typical plan: who speaks? To whom? About what? How? Practical work Define a tone and treatment within your charter.
Typology of contents and formats
  • Understand the role of the different levels of content.
  • Presentation of the different editorial genres: brief, article, interview, report, press review.
  • Presentation of the different formats: title, subtitle, intertitle, heading, legend.
  • Practical work Identify the different formats in several websites.
Editorial processes
  • Define your editorial processes: contribution and animation on a content-oriented site.
  • The different roles within the editorial team (the editor, the proofreader.).
1054
Le champ lexical
  • Understand the importance of good use of the lexical field.
  • How to develop it for your Web content? Practical work Develop your lexical field.
  • Design your editorial charter.
The specifics of reading on the Web
  • Ergonomic constraints: readability, reading on the screen, eye movement on the screen.
  • Where to place information on a screen? Practical work Improvements in terms of readability and ergonomics.
The rules of writing on the web
  • The inverted pyramid.
  • The rule of "5 W" or how to extract the essential message from the subject to be discussed? The rule of "4 C" ( Credibility, Clarity, Conciseness, Coherence).
  • Practical work Writing exercises.
Design the mobile version of your site
  • The constraints of different terminals.
  • The impacts on editorial design and ergonomics.
  • The key tools for building a mobile wireframe.
  • Practical work How to build the mobile version of your website?
1055

Create your newsletters in HTML/CSS and manage sending

★★★★★

  • SII-147
  • 3 Days (21 Hours)

Description

This training will teach you how to create a newsletter whose content and formatting can be faithfully rendered by email routers. You will discover the constraints specific to creating and sending newsletters, as well as the legal, editorial and graphic aspects.

Who is this training for ?

For whom
This practical course is aimed at all newsletter designers.
1056
Prerequisites

None

Training objectives

Design an HTML/CSS template
Structure the textual content respecting the rules of writing for the Web
Master the legal aspects concerning unsubscription
Know the parameters for sending a newsletter

1057

Training program

Introduction: importance and challenges of the newsletter
  • What is a newsletter?rnSpecial features of the newsletter, the issues.
  • The newsletter and the website.
  • Demonstration rnPresentation of different newsletter models.
Construction du gabarit (HTML/CSS)
  • Reception of the graphic model, graphic issues, use of pre-existing templates.
  • Preparation of the integration and organization of the project.
  • Specific constraints: routers messaging (webmail).
  • HTML, CSS, WYSIWYG editor (Dreamweaver).
  • Construction of the structure of the newsletter in the form of tables (use of the corresponding HTML attributes) .
  • Newsletter design (styles integrated into HTML tags).
  • Tests and rendering on mobile devices.
  • Practical work Construction of a simple newsletter template from a template with graphic elements provided.
Editorial content
  • Web writing techniques, placement of text on screen.
  • Title and paragraphs.
  • Images, links.
  • Taking accessibility into account.
  • Practical work Structuring a standard paragraph respecting the rules of writing for the Web using textual elements provided.
1058
Judicial aspects
  • Subscription management, subscription and unsubscription process.
  • Recipient files, the LCEN law.
  • Best practices, netiquette, archiving of newsletters.
  • Practical work Use of subscription and unsubscription processes.
Sending the newsletter
  • The different technical possibilities.
  • Why hire an external service provider to manage the sending of the newsletter?rnThe risks of spam, the different precautions to take before sending.
  • Prepare the sending of the newsletter, the tests.
  • Analysis of feedback statistics, satisfaction survey, tracking.
  • The different offers from service providers 'sending newsletter (mailer).
  • Practical work rnPreparation of the file containing all the constituent elements of the newsletter until sending to the remote server via ftp.
  • Tests.
1059

IIS 8.5/8.0, administer a web server, for Windows Server 2012

★★★★★

  • SII-383
  • 3 Days (21 Hours)

Description

This course will teach you how to install, configure and administer an IIS 8.5/8.0 Web server under Windows 2012. You will also learn to set up, control and administer sites and applications by integrating security and performance constraints. to this server.

Who is this training for ?

For whom

Administrators and system engineers responsible for administering web servers.

1060
Prerequisites

None

Training objectives

Install and configure IIS 8
0 / 8
5 under Windows Server 2012 Create, install and configure sites and applications Secure an IIS server Back up and restore an IIS environment Manage the performance of an IIS server

1061

Training program

Presentation
  • IIS 8 architecture.
  • 5, what's new.
  • Install IIS with Server Manager, DISM and unattend.
  • xml.
  • How to migrate from an IIS 7 website.
  • 0 to IIS 8.
  • 5? Exercise: Installing IIS 8.
  • 5.
Setting up sites and web applications
  • Static sites, site binding, host header, ISAPI filters.
  • Web server configuration, inheritance and conflict.
  • Initializing applications: splash page, CPU consumption, NUMA scalability.
  • Configure features: default document, http error pages, http redirect.
  • Configure ASP applications.
  • NET, PHP and Fast-CGI.
  • Exercise: Installation and configuration of sites.
  • Configuring ASP.
  • NET , PHP.
1062
Security
  • The main attacks: how to defend yourself, security tools in IIS.
  • Anonymous authentication, by ASP impersonation.
  • NET, client certificate.
  • Authorization: Application Pool Identity.
  • Create a self-signed server certificate, certificate centralization.
  • Request filtering.
  • ISAPI, CGI, IP and domain restrictions, URL authorization rules.
  • Exercise: Setting up SSL certificates.
  • Installing a security system 'authentication.
  • Security testing on an IIS server.
Maintaining a web server
  • Log format, logging improvement.
  • Event tracking: ETW integration.
  • Monitoring work processes, configuring request tracking.
  • Backup and restore.
  • Exercise: Log analysis and reporting tools.
  • Backup and restore an IIS environment.
1063
Performance management
  • Dynamic activation of sites.
  • Compression, static / dynamic caching.
  • Performance analyzer, counters to monitor.
  • Configure website performance, manage application pool performance.
  • Exercise: Monitor an IIS server.
  • Install a traffic management tool.
  • Setting up a cache for dynamic content.
1064

IIS 7.0, administer a web server

★★★★★

  • SII-148
  • 3 Days (21 Hours)

Description

This course will allow you to discover and master the IIS server. At the end of the course, you will know how to install and configure IIS 7.0 under Windows 2008 Server; install, configure and secure sites (static and/or dynamic) and applications; audit and perform maintenance on an IIS server.

Who is this training for ?

For whom
System administrators and engineers responsible for administering web servers.
1065
Prerequisites

Good knowledge protocols and Web architectures. Basic knowledge of Windows administration Server 2008.

Training objectives

This course will allow you to discover and master the IIS server
At the end of the course, you will know how to install and configure IIS 7
0 under Windows 2008 Server; install, configure and secure sites (static and/or dynamic) and applications; audit and maintain an IIS server

1066

Training program

Configuration de base
  • Managing IIS services.
  • Post-installation configuration.
  • Structure of a website.
  • Configuration: web.
  • config.
  • Application pools.
  • Practical work Creation of sites, applications and virtual directories.
Setting up sites and web applications
  • Migration of sites and web applications.
  • Publishing static and dynamic sites.
  • Installation and configuration of development languages.
  • Illustration ASP.
  • NET.
  • Practical work Installation and configuration of sites.
  • Configuration of ASP.
  • NET, PHP, FastCGI.
  • Installation of an application interacting with a database.
1067
Security
  • Reminder: the security of a server on the Internet and web applications.
  • Classic attacks.
  • Encryption via SSL.
  • Client- and server-side certificates.
  • Configure access permissions.
  • Hosted application security.
  • Reduce risks with IIS modularity 7.
  • 0.
  • Practical work Setting up SSL certificates.
  • Installation of an authentication system.
  • Security testing on an IIS server.
1068
FTP, WEBDAV et SMTP
  • Configuring the FTP service.
  • Managing users, groups and permissions.
  • Configuring WEBDAV access.
  • Upgrading updating a website.
  • Configuring the SMTP service.
  • Security.
  • Relaying.
  • Practical work r nSetting up and configuring an FTP and SMTP server.
  • Transfer of sites via FTP.
  • Setting up a web form for sending emails.
Performance management
  • Analysis tools.
  • Manage server load, number of requests per second and network traffic.
  • Practical work Monitor a server IIS.
  • Install a traffic management tool.
  • Setting up a cache for dynamic content.
1069
Maintaining a web server
  • Managing IIS logs.
  • Troubleshooting.
  • Backing up and restoring the web server configuration.
  • Managing a server IIS with PowerShell.
  • Practical work Log analysis and reporting tools.
  • Backing up and restoring an IIS environment.
Introduction
  • General presentation of services and protocols.
  • TCP/IP configuration of a Unix or Linux server.
1070

Apache, improvement

★★★★★

  • SII-325
  • 3 Days (21 Hours)

Description

In this course, you will learn how to secure exchanges with HTTPS and control access to an Apache server. You will implement URL rewriting, filters and high availability features. You will finally see how to make PHP 5 and PHP 7 applications coexist on the same server.

Who is this training for ?

For whom

Web server administrators, operators, integrators or technical architects.

1071
Prerequisites

Good knowledge of Apache Web server administration or equivalent to that provided by the "Apache, administering a Web server" course (ref. LIA). Experience desirable.

Training objectives

Hosting PHP applications
Control access and authentication to an Apache server
Implement redirections, URL rewriting and filters
Implement a high availability reverse proxy
Secure exchanges with HTTPS

1072

Training program

Apache HTTPD 2.4: reminders and new features
  • Compilation, installation and initial testing.
  • General server configuration.
  • Choosing the right MPM, managing load and limits.
  • Loading modules, which modules to activate? The new types of contexts.
  • Panorama of Apache 2 modules.
  • 4.
  • Support of the HTTP/2 protocol.
  • Practical work Compilation and installation of Apache HTTPD 2.
  • 4.
Host PHP applications
  • Bringing PHP 5 and PHP 7 together.
  • CGI, CGID, Fast CGI and PHP-FPM.
  • Rights and dedicated identity, sessions.
  • Practical work Manage several versions of PHP5 and PHP7 via Fast CGI / PHP-FPM.
1073
Access control and authentication
  • Access control: mod_authz* modules.
  • LDAP authentication with mod_authnz_ldap.
  • External authentication and DBMS (dbm, mysql, .
  • ).
  • Practical work Setting up authentication based on an LDAP directory and a MySQL database.
Redirection, address rewriting, filters
  • DocumentRoot and the mod_alias module.
  • Notion of virtual directory and alias.
  • URL rewriting rules and mod_rewrite.
  • Examples of filters with mod_filter, mod_header.
  • Practical work Implementation of redirects and filters.
1074
Reverse Proxy and Cache
  • Proxy and Reverse Proxy features.
  • The mod_proxy* modules in Apache HTTPD 2.
  • 4.
  • Load balancing and session affinity.
  • Server state management, fail-over, heartbeat.
  • KeepAlived and Reverse-Proxy High Availability.
  • Management of memory and disk cache.
  • Practical work Implementation of high availability reverse-proxy.
Secure exchanges with HTTPS
  • Implementation of HTTPS.
  • CA and management of server certificates.
  • Authenticate users.
  • Creation of certificates and HTTPS virtual hosts.
  • Practical work Generation of server certificates and setting up an HTTPS virtual site.
  • Authentication of visitors to an HTTPS site by presentation of certificate customer.
Security and attack detection
  • What is mod_security? The principle of mod_security rules.
  • Detect and block attack attempts.
  • An alternative to an IDS like Snort.
1075

NGINX, administer a web server

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

Nginx is a high-performance web server that stands out from its main competitor Apache thanks to its modular design. Present on around 20% of Web servers in France, Nginx continues to appeal to Web administrators looking for high performance. For professionals who have chosen this solution, a 3-day training course is available to teach them how to install and administer an Nginx server with the necessary knowledge and skills.

Who is this training for ?

For whom

Anyone wishing to configure, install and operate an Nginx server

1076
Prerequisites

Know the basics of TCP/IP and web technologies

Training objectives

To understand how an Nginx server works, it is important to know how to install, configure, secure and monitor it in production
Additionally, it is essential to have the necessary knowledge to successfully migrate Apache servers to Nginx

1077

Training program

Introduction
  • Presentation, history, license
  • Features: http server, reverse proxy, messaging proxy, video content streaming, ...
  • Supported platforms
  • Architecture: asynchronous server principle, modularity
Implementation
  • Choice of modules, a version/distribution
  • Practical work: installation, startup, basic configuration
Protocole HTTP
  • How it works, query format
  • Methods
  • Syntax of a URL
Nginx Server Configuration
  • Study of the file /etc/nginx/nginx.conf: http-block, server-block, location-block
Setting up a primary site
  • Internal name of the server, DNS reminder, home page, file types, aliases, definition of relative paths
  • Practical work: implementation with creation of a Nginx server site and configuration
Virtual Hosts and locations
  • Principle, configuration, virtual hosts based on the IP address, on the name
  • Configuration of URLs
Scripts CGI
  • Running applications in PHP, in Python
Proxy server
  • Nginx configuration as reverse proxy and messaging proxy
1078
Exploitation
  • Site administration
  • Log files: creation of separate log files for each virtual hotel
  • Log file rotation mechanism
  • Analysis of information stored in logs
  • Practical work: loading the site and visualizing behavior
Security
  • The HttpAuthBasicModule module
  • Implementation of the auth_basic and auth_basic_user_file directives
  • Creation of login/password: htpasswd-b or htpasswd-perl
  • Access restriction based on IP address: allow and deny directives, and with password restriction: satisfy directive
Migration
  • Comparison of Nginx and Apache servers
  • Migration tips
1079

Optimize the scalability of web servers

★★★★★

  • SII-150
  • 3 Days (21 Hours)

Description

This training will allow you to put into practice different free software solutions in order to optimize the increase in load of your servers in the face of exponential growth in traffic on the Web. You will test their capacity and interpret the results in order to validate your configuration choices.

Who is this training for ?

For whom
Web server administrator or technical architect having to design and implement a platform meeting strong workload constraints.
1080
Prerequisites

None

Training objectives

1081

Training program

Introduction
  • Reminder on the processing of HTTP requests, persistent request, session.
  • From the DNS question to the application server.
  • Role of the components located upstream of the servers.
  • High-Availability, Load Balancing and Failover.
Test the ramp-up
  • Server stress testing and DOS attack.
  • Load testing and scaling scenarios: JMeter, OpenSTA.
  • Observation of the system during stress- test.
  • Practical work Stress and DOS of an HTTP service, load test with AB and JMeter.
DNS and load balancing
  • Load balancing at the DNS level.
  • Cache issues in the event of a failure.
  • Life testing and dynamic updating.
  • Practical work DNS configuration with load balancing, dynamic update principle.
Frontal, proxy et reverse proxy
  • Role and interest of proxy-cache.
  • Reverse proxy and impact on application servers.
  • Squid: cache configuration and transparent proxy.
  • Practical work Configuration of Squid as a transparent reverse proxy.
1082
Load balancing with LVS
  • LVS: Linux Virtual Server.
  • Configuring LVS upstream of web servers.
  • Load balancing modes and algorithms.
  • Fault management and life tests.
  • Practical work Configuration of a pool of web servers with LVS.
Load balancing with HAProxy
  • HAProxy features.
  • Installation and launch mode.
  • The configuration file and general options.
  • The graphical interface and statistics.
  • Practical work Configuration of an HTTP service and backends, failure management and life tests.
Nginx : serveur HTTP, proxy ou Load Balancer ?
  • Proxy mechanisms and load balancing.
  • URL filtering and redirects.
  • Configure Nginx as a Load Balancer.
  • Practical work Configuration of Nginx as a filtering reverse proxy and load balancer.
1083
Manage the load of Apache and other servers
  • Clients, processes and memory.
  • Prefork/Worker MPM tuning parameters.
  • Serve static content via a lightweight front-end.
  • Tuning an application server like Tomcat.
1084

Selenium 2.0 platform, implementation to automate your software tests

★★★★★

  • SII-152
  • 2 Days (14 Hours)

Description

As test campaigns can contain thousands of scenarios to execute, we quickly understand the benefit of automation. This is the purpose of the Selenium platform. This course will help you get to grips with the tools of this platform in order to simulate real activity on a website and carry out the tests.

Who is this training for ?

For whom
Test managers in MOA or MOE, responsible for validation or acceptance processes, test automation engineers.
1085
Prerequisites

None

Training objectives

Get to grips with Selenium tools (IDE, WebDriver, WebGrid)
Develop a test suite in Firefox and port them to other platforms
Implement Selenium as part of continuous integration servers
Integrate Selenium into repositories of testing
Building your testing framework around Selenium tools

1086

Training program

Introduction to the Selenium 2.0 platform
  • Reminder about functional testing of web applications.
  • Test frameworks and languages.
  • The Selenium project (history, roadmap).
  • Architecture of the Selenium 2 platform.
  • Practical work Installation of the Selenium 2 platform.
Creating tests with Selenium IDE
  • Recording test cases and replay.
  • Constitution of test suites and replay.
  • Language primitives (Selenese), assertion and verification mechanisms .
  • Activation of Selenium from the command line.
  • Selenium IDE and web browsers, Selendroid.
  • Practical work Creation and development of test cases , creation of test suites, launching tests.
Les API Web Drivers
  • Selenium API and Selenium Remote Control.
  • API Web Driver - Architecture.
  • Drivers (proxy) for different browsers (IE, Firefox, Chrome, Android , HtmlUnit.
  • Management of actions.
  • Recognition of components on the interface.
  • Practical work Implementation of examples illustrating the Web driver API .
1087
Selenium Server
  • Porting test suites to target languages.
  • Selenium Server implementations.
  • Remote management of a test suite.
  • Remote WebDriver.
  • Practical work Preparation, execution and monitoring of test suites via Selenium Server or Remote WebDriver.
The server grid
  • Preparation of a server grid.
  • Configuration of the different components (OS, browsers, versions).
  • Practical work Setting up a server grid and implemented with Selenium Grid.
Presentation of advanced concepts
  • Selenium and continuous integration servers.
  • Integration of Selenium in a specification approach by example.
  • Setting up a capture of the
  • Selenium IDE API extension.
  • Bridge to test managers.
  • Building your own testing framework (principles, key points) .
  • DemoDemonstrations on some advanced features.
1088

Introduction to programming with Visual Basic

★★★★★

  • SII-423
  • 3 Days (21 Hours)

Description

Acquire fundamental programming and algorithmic skills. This internship will enable you to master the key stages in building a computer program in Visual Basic, including lexicon, syntax, tools, code structure and tests.

Who is this training for ?

For whom

Anyone who needs to learn to program.

1089
Prerequisites

None

Training objectives

  • Design programs based on algorithms
  • Write programs using language syntax and vocabulary
  • Run and execute programs
  • Correct and validate programs
  • Interact with databases
  • Understand the key concepts of OOP

1090

Training program

The basic principles of programming
    • What is a program?  What is a language?  The different paradigms.  
    • Which language for which application?.
    • Compilers, executables.
    • The responsibilities of a programmer.
    • What is an algorithm?.
    • Algorithm requirements.
    • The idea of pseudo-language.
    • Practical exercises: Introduction to various programming languages such as Java, C#, Visual Basic, C and C++, Writing a first algorithm in pseudo-code.
Origins of an initial program
    • Write a basic program: syntax and commands.
    • Compile and run the program.
    • What is a library?  Its function and use.
    • Practical exercises: Exploration of the development and execution environment, Writing, compiling and running a first program.
Programming directives
    • Naming by convention.
    • Syntax convention.
    • Exploiting comments: Why comment on changes?
    • Improve program clarity: code formatting, code division, etc.
The variables
    • What is a variable?
    • Importance of variable typing.
    • Primitive data types: integers, strings, reals, etc.
    • Variable management: declaration, definition, initialization.
    • Constants.
    • Operations on variables: input, display, assignment, conversion.
    • Data organization: arrays.
    • Advanced data types: record, matrix, tree.
    • Practical work: Simple variable manipulation programs.
Operators and Logics
    • Operator types: Arithmetic (multiplication, addition), Relational (comparison, equality), Logic, Assignment.
    • Combinatorics.
    • Boolean expressions.
    • Practical work: Handling operators and logical expressions
Control mechanisms
    • Conditional choices (if-then-no instructions, case selection).
    • Instruction organization (the notion of beginning... end).
    • Repetitive loops (while-repeat, repeat-until, for-from-to).
    • Nesting of different instruction types.Adding comments to code.
    • Practical exercises: Apply control structures to build an algorithm.
Procedures and functions
    • Definitions: procedure, function.
    • Importance in programming: Reusability of code, Improved readability, Facilitates modularity, Simplifies maintenance.
    • Passing parameters: Passing the value of a variable, Awareness of the limits of passing by value, Notion of passing by address.
    • Function return code.
    • Calling functions.
    • Practical exercises: Debugging example programs.
Discovering object-oriented programming
    • Fundamental concepts: class, attribute, method, argument.
    • Object-oriented design: learning to model from functional requirements.
    • Code organization: Introduction to best practices in program design and structuring.
    • Practical exercises: Highlighting object concepts by example.
Access to databases
    • Structuring and storing information.
    • Fundamental operations (connection, queries, data extraction).
    • Client application and data server.
    • Displaying and manipulating data in the client application.
    • Practical exercises: Design a form to search for information in a database.
Maintenance, debugging and testing techniques
    • Be able to read and understand various error notifications.
    • Use a debugger to: execute a program step by step, set breakpoints, inspect variables during execution.
    • Anticipate and organize unit tests.
    • Practical exercises: Use a debugger to control program execution.
1091

Introduction to programming with Python

★★★★★

  • SII-299
  • 2 Days (14 Hours)

Description

This course will introduce you to the basics of programming and algorithms. You will implement the different key stages of building a computer program using the Python language. You will discover lexicon and syntax elements, tools, code organization and tests.

Who is this training for ?

For whom

Anyone who needs to learn to program.

1092
Prerequisites

No special knowledge.

Training objectives

Structuring programs according to an algorithm

Master the lexicon and syntax elements of a language to write a program

Compile and run a program

Debug and test a program

1093

Training program

A program
  • What is a program?
  • What is a language? The different paradigms.
  • What is 'an algorithm? The pseudo-language.
  • Compilers. Executables.
  • Presentation of a first algorithm in pseudo-language.
Genesis of a first program
  • Writing a program: syntax and instructions.
  • Compilation and execution of the program.
  • What is a library? Its role, its usage.
  • Exercise: Writing, compiling and running a first Python program.
Programming rules
  • Naming convention. Syntactic convention.
  • Use of comments. Why comment on developments?
  • Improve the readability of programs: code indentation, code splitting. ..
1094
The variables
  • What is a variable?
  • Primitive types: integers, strings, real numbers, others.
  • Declaration, definition and initialization of a variable. Constants.
  • Input, display, assignment, type conversion.
  • Organize your data in the form of tables.
  • Practical work
Operators and expressions
  • The different operators (addition, equality...).
  • Combination of operators.
  • Boolean expression.
  • Exercise
Control structures
  • Alternative selections (if, if-then-else...).
  • Instruction blocks (concept of Start...End).
  • Iterative loops (while-repeat, repeat-until, for-from-to).
  • Nesting instructions.
  • Exercise
1095
Procedures and functions
  • Definitions: procedure, function. Interest.
  • Passing parameters.
  • The return code of a function. Calling functions.
Maintenance, debugging and testing of programs
  • Know how to interpret the different error messages.
  • Use a debugger: execution of a program step by step, breakpoints, inspect variables.
  • Using a debugger: executing a program step by step, breakpoints, inspecting variables.
  • Practical work
1096

PHP 7 and 5, master object-oriented programming from design to class implementation

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

You will discover the foundations of object-oriented programming in PHP and learn how to design an "object" application based on UML notation. You will create a website by implementing advanced concepts such as business objects, abstraction layers or design patterns.

Who is this training for ?

For whom

Developers wishing to improve the sustainability and maintainability of their developments.

1097
Prerequisites

Good knowledge of procedural PHP or knowledge equivalent to that provided by the course "PHP 7 and 5, developing a dynamic website"

Training objectives

Specify requirements based on use cases
Master the basic concepts of Object implementation
Manage object persistence
Implement Design Patterns

1098

Training program

Object approach in a Web context
  • Initial expression of needs and requirements.
  • Use cases and simplified unified process.
  • UML: sequence and class diagrams.
  • Presentation of the HMI.
  • Collective reflection Based on specifications, define the objects of the application to be created.
Basic Concepts of Object Implementation
  • Eclipse: an IDE adapted to OOP in PHP.
  • Define a class and generate it from UML.
  • PHP namespaces.
  • Instantiate a class.
  • Properties, statics and constants: This, Self and ORP.
  • Visibility and protection.
  • Accessors, mutators and overload according to PHP.
  • Constructor and destructor.
  • Master instantiation: Factory and Singleton.
  • Practical work Using UML software, design and generate the participating classes.
1099
OOP: advanced concepts and contributions of PHP5
  • Object typing and interfaces.
  • The interfaces of the standard library (SPL).
  • Equalities and sorting of objects, Design Pattern Strategy.
  • Reference, cloning, inheritance, aggregation and association.
  • Polymorphism, collections and Design Pattern Iterator.
  • Abstract and final classes.
  • Traits.
  • Practical work Implementation of classes implementing advanced concepts.
Object persistence
  • Export and auto-serialization.
  • Save to database and session.
  • JSON for asynchronous client requests.
  • Transmission http.
  • Practical work Classes for data persistence.
  • Asynchronous access from an Ajax-XHR interface.
1100
Refactoring MVC
  • Loading of classes: automatic or configured.
  • ADO classes, model, view.
  • File management.
  • Exceptions: management object-oriented error.
  • Practical work Implementation of the Chain of Responsibility design pattern.
  • Refactoring of the project in MVC.
Reverse engineering
  • Introspection and Reflection class.
  • PEAR library framework.
  • Documentation tools.
  • XMI and class diagrams.
  • Practical work Generate XMI files for all classes of the project and visualize the UML diagrams.
1101

PHP 7 and 5, for object developers to create a web application in OOP

★★★★★

  • SII-156
  • 5 Days (35 Hours)

Description

This course will allow you to operationally master the PHP language in the context of object development. You will learn how to create a dynamic website and address the implementation of aspects related to this type of development. The entire course is object oriented.

Who is this training for ?

For whom
Developers and webmasters.
1102
Prerequisites

None

Training objectives

Master the basics of the PHP language
Master the basic concepts of Object implementation
Design and navigate web pages
Monitor user sessions
Implement forms
Manage data persistence

1103

Training program

Introduction
  • What is PHP? Interactivity with Internet users.
  • The differences between PHP 4, PHP 5 and PHP 7.
  • Presentation of the example used during training.
PHP Language Basics
  • Automation of a Web page.
  • The client-server.
  • First elements of the language.
  • Integration of PHP in a page HTML.
  • Variables and functions.
  • Libraries.
  • Basic functions, server variables and PHP variable.
  • Flow controls and loops.
  • Practical work Creating custom functions.
1104
Object Oriented Programming (OOP)
  • UML reminder.
  • Modeling classes.
  • Tools.
  • Classes, properties, methods.
  • Visibility and protection.
  • Constructor, destructor.
  • Implicit vs. explicit call.
  • Inheritance and aggregation.
  • Propagation.
  • Polymorphism.
  • Serialization and storage.
  • Organization of files.
  • Practical work Creation of a PageWeb class.
1105
User session management
  • Persistent variables: Cookies and Session.
  • Advantages, limitations and precautions.
  • Session variables and related functions.
  • Cookies.
  • Serialization of complex variables.
  • Usage.
  • Practical work Creation of a shopping cart object that can be stored in Cookie or Session.
  • Order quantity management.
Using a MySQL database
  • Concepts: bases, tables, fields, records.
  • PHP Mysqli functions.
  • Introduction to the SQL language.
  • Queries and processing of results.
  • Practical work Creation of a MySQL database and product sheets on the fly.
1106
A professional web application
  • Multi-layer architecture concepts.
  • MVC principles.
  • Complex forms.
  • Data binding.
  • Advanced selection functions: searches and sorting.
  • Graphics in PHP: from the GD library.
  • Site integration.
  • Practical work Production of a search engine.
  • Improvement of the SQL class.
  • Multi-layer implementation.
  • Integration of the different modules produced.
1107

PHP 7 and 5, improvement

★★★★★

  • SII-157
  • 3 Days (21 Hours)

Description

In this course, you will study advanced aspects of the PHP language related to authentication and database manipulation. Opening up to new perspectives (Web 2.0) is addressed through an introduction to Ajax and the use of rich clients communicating in XML streams with the server. Finally, you will use some software bricks like PEAR or PHPLib to optimize your developments.

Who is this training for ?

For whom
PHP developers who already have good practice with the language in procedural mode.
1108
Prerequisites

None

Training objectives

Discover the object paradigm of the PHP language
Manage the dependencies and packages of a PHP project
Implement LDAP authentication
Implement data persistence with the PDO library
Implement SOAP and REST web services
Manage the sending of emails and PDF generation

1109

Training program

Introduction
  • Optimization of developments through the use of software bricks.
  • Development and reusability: strategies and challenges.
Object Oriented Programming (OOP)
  • Classes, properties, methods.
  • Automatic methods.
  • Visibility and protection.
  • Constructor, destructor.
  • Implicit vs. explicit calling.
  • Inheritance and aggregation.
  • Propagation rules.
  • Polymorphism and typing.
  • Advanced OOP concepts .
  • Abstract class.
  • Interface.
  • SPL.
  • Design Pattern.
  • Cloning.
  • Practical work Creation of a form class.
1110
Namespaces
  • Relevance of Namespaces.
  • Basic syntax.
  • Implementation and impacts on loading.
  • Practical work Modification of classes carried out to take into account a Namespace.
Composer / Packagist
  • Principle and issues.
  • The Composer dependency manager.
  • Share your packages with Packagist.
  • Installation / basic configuration.
  • Constraint syntax.
  • Universal loader and PSR.
  • Practical work Configuration and use of Composer for the integration and debugging of the form.
Error management
  • Handling errors and exceptions with PHP.
  • Creating an error handler.
  • Buffering and Log files.
  • Practical work Creation of a personalized exception class.
  • Implementation of a buffered display and a Log file in the class.
1111
Authentification LDAP
  • Introduction.
  • OpenLDAP.
  • Configuration and startup (conf and ldif files).
  • Reading.
  • Anonymous login.
  • Querying and retrieving data.
  • Writing.
  • Administrator login.
  • Data formatting and inserting.
  • Practical work Implementation of an authentication class.
Databases: moving to PDO
  • The PDO library (PHP Data Object/abstract database access API).
  • The advantages and disadvantages of PDO (performance, portability, cache.
  • Transaction management.
  • Errors and exception management.
  • Security: formatting of inputs and parameterized queries.
1112
XML/DOM/XSLT
  • XML.
  • Format and validation.
  • DOM and XPath.
  • Creation, parsing.
  • XSL transformers .
  • Using XSLT.
  • Practical work Creating a Google siteMap.
Web Services
  • Presentation of web services.
  • REST approach (JSON/XML).
  • Implementation of a REST client and web service.
  • SOAP approach (WSDL).
  • Create a SOAP Web Service and its description file.
  • Implementation of a SOAP client in multi-service query.
  • Practical work Creation of SOAP web services and cross-requests.
  • Creation of RSS feeds (REST mode) based on third-party feeds (aggregation).
1113
PDF and Email
  • Presentation of the main PDF libraries: PDFLib and FPDF.
  • Basic operations.
  • Text and layout.
  • Advanced operations.
  • Images and vector paths.
  • Mail and MIME: attachments and HTML format.
  • Mixed, Multipart, Alternative/Related formats.
  • Configuration of a test server.
  • The PhpMailer class.
  • Practical work rnImplementation of 'an FPDF library for the automated generation of a report.
  • Creation of an xMail class for sending emails in mime format.
  • Use of the class created for 'send a PDF invoice as an attachment.'}
1114

PHP 7 and 5, improvement for object developers

★★★★★

  • SII-158
  • 2 Days (14 Hours)

Description

This course will teach you how to take advantage of PHP extensions and existing software building blocks. You will see the advanced aspects related to databases (LDAP extension, Oracle API, PostgreSQL, MySQL), XML (DOM and SAX), AJAX, web services and Mail and PDF extensions.

Who is this training for ?

For whom
Developers.
1115
Prerequisites

None

Training objectives

Discover the PEAR and PHPLib libraries
Implement LDAP authentication
Implement data persistence with the PDO library
Implement SOAP and REST web services
Manage sending emails and generating PDFs

1116

Training program

Reminder: Object Oriented Programming (OOP)
  • Classes, properties, methods.
  • Visibility and Protection.
  • Inheritance.
  • Propagation rules.
  • Polymorphism.
PEAR et PHPLib
  • Structure, conventions and parameters.
  • Main libraries.
  • Practical work PEAR: use of Html, Forms, CSS and DB libraries.
  • PHPLib: use of Template, Authentication libraries.
1117
Authentification LDAP
  • Introduction.
  • OpenLdap.
  • Configuration and startup.
  • Reading.
  • Anonymous connection, query and recovery of data.
  • Writing.
  • Administrator connection.
  • Data formatting and insertion.
  • Practical work Implementation of an authentication class.
1118
Databases: advanced manipulations
  • Multitable databases and join: advantages and limitations.
  • Transactional integrity: ensure data consistency.
  • Stored procedures: reuse during technology migrations.
  • Multidimensional fields.
  • XML.
  • Security: formatting of inputs and parameterized queries.
  • ODBC.
  • Practical work Oracle: Commit / Rollback and abstract pointers for stored procedures.
  • MySQL: multitable conversion and adaptation of DML queries.
XML/DOM/XSLT
  • XML (format and validation), DOM (creation, analysis), XSL/XSLT (transformation).
  • Rich clients: Ajax.
  • Principle and issues .
  • Practical work Creation of an XML feed for an Ajax page and an RSS feed.
Web service et SOAP
  • Service directories and accessibility.
  • WSDL and SOAP.
  • Create a Web service and its description file.
  • Practical work rnUsing a Web service.
1119
PDF pour Acrobat Reader
  • Basic operations.
  • Text and layout.
  • Advanced operations.
  • Images and vector paths.
  • Practical work Implementation of a PDF class.
E-mail
  • MIME: attachments and HTML formats Mixed, Multipart, Alternative/Related formats.
  • Special encodings.
  • Configuring a server test.
  • Study of a bookstore.
  • Practical work Manage the sending of emails in Mime format and PDF attachments.
1120

PHP 7 and 5, industrialization of developments, good practices

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This advanced course focuses on three themes: optimization of code at the algorithmic level, adaptation of software architecture to the needs of working in multidisciplinary or multisite teams, and rationalization of developments oriented towards maintainability and reusability.

Who is this training for ?

For whom

Developers wishing to improve the sustainability and maintainability of their developments.

1121
Prerequisites

None

Training objectives

Analyze the performance of an application and optimize the associated PHP code
Improve the productivity of developing a PHP web application
Implement a multi-layer software architecture
Introduce Design Patterns in the design of a PHP web application

1122

Training program

Introduction
  • Classic problems encountered in development.
  • Corporate culture: long and medium term impacts.
  • Uncontrolled code inflation and avalanche theory.
  • Reusability: strategies and challenges.
Code optimization
  • Tools: measurement (Pear), client/server load simulation, optimization.
  • On-the-fly compression.
  • Principle of compression /decompression of pages.
  • Precautions and limits.
  • Optimization of algorithms.
  • Optimization of loops, SQL queries.
  • Text files and databases.
  • Output stream management.
  • Server cache.
  • Creating a cache.
  • Existing classes.
  • Practical work Gradual optimization of a typical page, with comparative measurements of the performances obtained.
1123
Productivity
  • OOP: benefits and limits.
  • Case study, relevance of the OOP vs procedural approach.
  • The mixed solution.
  • IDE and documentation.
  • The main IDEs on the market.
  • Documentation tools and conventions.
  • Configuration.
  • Swinging servers load.
  • Hardware approach.
  • Impact on development.
  • Practical work Performance analysis and memory consumption.
  • Use of an IDE and a documentation generator.
  • Study of a "session" class for data conservation in a multi-server environment.
1124
Rationalization of developments
  • Multi-layer architecture.
  • "Spaghetti" programming and maintainability.
  • Multidisciplinary approach and outsourcing.
  • MVC: divide to rule better.
  • MVC without the object.
  • Advanced OOP concepts: abstract classes, interfaces.
  • Automatic methods, overloading, saving, cloning.
  • Frameworks (frameworks).
  • Philosophy.
  • Study of an in-house framework.
  • Main frameworks on the market .
  • Design patterns.
  • Basic principle and advantages.
  • Structure of Factory patterns.
  • Singleton.
  • Command string.
  • Observer.
  • Strategy.
  • Encapsulation of variable concepts.
  • Practical work Transition from a "spaghetti" page to an MVC model.
  • Creation of a search engine with a framework.
  • Implementation of a connection class for the conservation of resources.
1125

PHP Zend Certified Engineer, preparation for certification

★★★★★

  • SII-160
  • 3 Days (21 Hours)

Description

This course will provide you with all the information you need to pass the PHP certification exam. This is a PHP review-based preparation test and not a PHP course. The main concepts of the language will be illustrated by the implementation of examples for better assimilation.

Who is this training for ?

For whom
Developers.
1126
Prerequisites

None

Training objectives

Obtain information relating to taking the Zend Certified Engineer exam
Revise in depth the 12 subjects of the certification
Acquire cognitive reflexes in relation to the certification procedure
Implement the concepts covered through practical examples

1127

Training program

Introduction
  • PHP Certification: Why Certification? Exam Basics.
  • Questions and Strategies.
  • Certification Topics.
PHP Basics
  • Embedded PHP.
  • Variables & Constants, scope.
  • System variables.
  • Data types and casting.
  • Character strings.
  • Operators: arithmetic, boolean, binary.
  • Flow controls: conditions & loops.
  • Iterators.
  • Functions: declaration, parameters & references.
1128
Tableaux
  • Creating, filling, splitting.
  • Adding and removing elements.
  • Looping.
  • Checking values.
  • Comparisons.
  • Sort, custom sort.
  • Merge
PHP and OOP
  • Classes, properties, methods, instance.
  • Constants.
  • Static properties and methods.
  • Inheritance.
  • Propagation.
  • Interfaces and abstract classes.
  • SPL.
  • Autoloading.
  • Reflection.
1129
Advanced manipulations
  • Extracting strings.
  • Compare and count strings.
  • Phonetic functions.
  • Strings and arrays.
  • Formatted output.
  • Regular expressions.
  • PHP differences 4/5.
Design and theory
  • Design patterns: active record, factory, iterator, MVC, Proxy, Singleton.
  • Files, streams, networks: resources and output files.
  • Reading /writing, file operations, wrappers, feeds.
  • Web features: HTTP POST & GET, access data, file uploads, cookies.
  • XML and Web Services: XML , SOAP, WSDL; create and use a Web Service, debugging.
1130
Data base
  • DBMS theory.
  • Typing, dimension and field constraints.
  • Indexes and foreign keys.
  • SQL: DDL,DML and DQL.
  • Sorting: order and direction.
  • Grouping.
  • Joins (left and right).
Security
  • Defense in depth and best practices.
  • XSS: understanding Cross Site Scripting.
  • CSRF: principles and counting of attacks.
  • Remote File Injections (RFI).
  • Remote Execution.
  • Sessions: session theft and corruption.
  • Security configuration.
  • Uploads: errors, sizes and mime-type checks.
1131

Programming in C

★★★★★

  • SII-161
  • 5 Days (35 Hours)

Description

This intensive course will allow you to acquire a truly operational knowledge of the language. He will explain to you how the different mechanisms work and show you their implementation through numerous practical exercises. At the end of this internship, you will be able to write robust and portable C programs.

Who is this training for ?

For whom
Developers, engineers, project managers close to development.
1132
Prerequisites

None

Training objectives

Master the production chain of a program written in the C language
Implement the operators, expressions and control structures of the C language
Manipulate data structures, tables, pointers and character strings
Organize the code a program using functions.
Exploit the main standard libraries of the C language

1133

Training program

First steps in C
  • Presentation of the C language, its advantages.
  • C++ compared to C.
  • C++11 and C11 standards.
  • Source files (.
  • c, .
  • h).
  • General structure of a program.
  • Basic syntax of the language.
  • Data types and basic constants.
  • Global and local variables.
  • Storing and passing parameters.
  • Formatted inputs/outputs.
  • Comments.
  • Basic use of the production chain.
  • Editing, compilation and 'execution.
  • Execution of a first program.
1134
Operators and expressions
  • Arithmetic operators.
  • Expression evaluation mechanisms.
  • Post and decrement pre-increment.
  • Precedence and associativity of operators .
  • Assignment operators.
  • How logical expressions work.
  • Logical expressions in while, if statements.
  • Comparison operators: <, >, ==, !=.
  • Logical operators: AND, OR, negation.
  • Compound numeric types.
  • Rule conversions in mixed expressions.
  • Implicit/explicit conversions.
  • Initialization of variables.
  • Arithmetic on addresses.
  • Input/output formats associated with numeric types.
  • Bitwise operators: AND, OR, exclusive OR, 1's complement, negation.
  • Shift operators: >> , <<.
  • Conditional expression with the ternary operator.
  • Practical work Implementation of operators and expressions.
1135
Control structures
  • Concept of blocks.
  • Loop structures: while, for.
  • Loop control instructions: break, continue.
  • Choice structures: if, else, else if.
  • Multiple choice structure: switch.
  • Practical work Implementation of control structures.
Arrays, pointers and strings
  • Definition, initialization and access to the elements of an array.
  • Definition of a pointer.
  • Retrieve the memory address of an object.
  • Access the content of a pointer.
  • Pointer/array equivalences.
  • Calculations on pointers.
  • Character strings.
  • Examples of manipulating character strings.
  • Unicode character strings of C11.
  • Practical work Manipulation of arrays, pointers and strings of characters.
1136
The structures
  • Interests of structures.
  • Declare, initialize and access the fields of a structure.
  • Use nested structures.
  • Create new new types using Typedef.
  • Bit fields.
  • Unions.
  • Enumerations.
  • Anonymous structures and enumerations of C11.
  • Define pointers to structures.
  • Practical work Implementation of new data structures.
1137
Functions
  • Definition of a function.
  • Calling a function.
  • Passing parameters: by value or by reference.
  • Code return of a function.
  • Return types.
  • The "main" function.
  • Practical work Cut your code 'function help.
  • Handle function calls.
1138
Separate compilation, allocation class
  • Operating mechanism of the production line.
  • Use of source library.
  • Notion of Makefile.
  • Memory configuration of a C program (stack, heap.
  • ).
  • Variable allocation classes (auto, register, static, extern).
  • Different cases of figure of the separate compilation.
  • Notion of external object.
  • Case of global and static data.
  • Case of local data.
  • Visibility rule.
  • Additions on functions and initializations.
1139
The preprocessor
  • Using predefined macros (symbolic constants).
  • Define your own macros with #define.
  • Define macros as functions.
  • Using # and ## markers.
  • Undo constant definition with #undef.
  • Conditional compilation: #if, #ifdef, #ifndef, #elif, #endif .
  • Include resources with #include.
  • Practical work Using preprocessor directives.
  • Setting up conditional compilation.
1140
Standard libraries
  • Mathematical calculation functions (sqrt, sin.
  • ).
  • Input/output functions (fprintf, fscanf.
  • ).
  • File access functions (fread, fwrite.
  • ).
  • Character string manipulation functions (strlen, strcat.
  • ).
  • Memory management functions (malloc, free.
  • ).
  • Setting up linked structures (linked lists, n-ary trees.
  • ).
  • The “secure” functions of the C11 standard library (strcat_s, strlen_s, .
  • ).
  • Practical work Use of the main functions of standard libraries.
1141

C programming, improvement

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

This advanced C language course will allow you to deepen and expand your knowledge in the subject. Through a variety of practical exercises, you will approach the most advanced concepts such as pointers, recursion, major developments in the C11 standard as well as object-oriented programming.

Who is this training for ?

For whom

Designers, developers.

1142
Prerequisites

Good knowledge of C language or equivalent knowledge.

Training objectives

Manipulate pointers, function pointers and libraries integrated into the language
Master recursive data structures and their intrinsic algorithms
Use the development tools associated with the C language
Master object-oriented developments and major additions to the C11 standard

1143

Training program

Pointers and arrays
  • Reminders about pointers and arrays, differences and commonalities between the two.
  • The three arguments of the main() function, the environment variables.
  • Arrays with multiple indices.
  • Function pointer, array of function pointers.
  • Dynamic allocation identified by pointers.
  • Practical work r nDevelopment of programs using pointers intensively.
Function libraries
  • Standard language libraries: ctype.h, math.h, stdlib.h, time.h.... and others.
  • Advanced math libraries: Linpack, Lapack.
  • Dynamic allocation management: calloc(), realloc() functions.
  • Functions with existing variable number of arguments and created by the programmer.
  • Practical work Using several function libraries.
Recursion
  • Definition of recursion.
  • Recursive functions.
  • Recursive data structure: lists, trees.
  • Intrinsic algorithms on data structures recursive data (insertion, removal.).
  • Practical work Creation of a library for handling recursive data.
1144
Development tools for the C language
  • Error detection in programs: the debugger.
  • Dependency management tools: make and touch.
  • Dynamic analysis of programs: the profiler.
  • Test tools: CUnit.
  • Practical work Using development tools for the C language.
From C language to object-oriented programming
  • Definitions of object-oriented notions: object, encapsulation, class, inheritance, polymorphism.
  • Object-oriented domains treated with the C language.
  • From the C language to the language C++.
  • From the C language to the Java language.
  • Practical work Object-oriented design using the C language.
Advanced aspects of the C11 standard
  • Multi-threading.
  • Anonymous structures and unions.
  • Generic functions.
  • Unicode coding management.
  • Rewriting certain functions, checking data sizes.
  • Practical work Use of concepts added by the C11 standard.
1145

C11, C developer upgrade

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

This training will allow you to assimilate the new features introduced by the C11 ISO/IEC 9899:2011 standard. You will discover multithreading management, generic function selection as well as many other functions from the standard library offering safe operating interfaces.

Who is this training for ?

For whom

C developers wishing to know the new features defined by the C11 standard.

1146
Prerequisites

Good knowledge of the C language. Practical programming experience with this language is strongly recommended.

Training objectives

Understand the new features of C11
Develop applications using standard C11
threadsImprove the reliability of an application using the new standard C11 functions

1147

Training program

The advent of C11
  • The different C standards ANSI, C99, C11.
  • New features of C11 and objectives of this ISO standard.
  • Compatibility with old versions.
  • Development tools (compilers, IDE).
  • Practical work Setting up a C11 compilation chain.
Reminders on C99 progress
  • Arrays of variable size.
  • Inline functions.
  • The new data types long, _Complex, _Bool.
  • Pointers "restricted" (restrict).
  • Mixing instructions and variable declarations.
  • The problem of non-compliance of compilers.
  • Reworks /abandonment of C99.
  • Practical work rnCompile in C99 and C11 and know which version you are in.
1148
Le multithreading
  • The concept of thread.
  • Lightweight versus heavyweight process.
  • Thread life cycle (execution).
  • Sharing data between threads.
  • Synchronization, appointments, semaphores.
  • Proposals for other languages: Java, C#, C++.
Use C11 threads
  • Understand the concepts present in the standard and the differences/similarities with Pthreads.
  • Create a thread, make it executable.
  • Define pauses, wait for the end of execution.
  • Use mutexes.
  • Implement a producer-consumer.
  • Practical work Use C11 threads.
Atomic objects
  • Understand the issues of data sharing between threads and the concept of atomic objects.
  • Define atomic data.
  • Use atomic operations.
  • Non-atomic data management.
  • Practical work Carry out data sharing between threads.
1149
Operational safety
  • The removal of gets() by gets_s().
  • The fopen_s() function.
  • Other functions: strcat_s(), strcpy_s().
  • Practical work Manipulation of functions.
Miscellaneous improvements
  • Structure alignment ().
  • - Unicode string management (char16_t...).
  • - Support for anonymous structures and unions.
  • - Generic selection of functions within macros (_Generic) - Handling of complex numbers.
  • - The new mode of fopen().
  • - Static assertions.
  • Practical work
  • Implementation of improvements.
1150

Object programming in C++

★★★★★

  • SII-298
  • 5 Days (35 Hours)

Description

This intensive course has two objectives: to present to participants the methods and reflexes of object programming; provide them with complete operational mastery of the C++ language. It is the result of long experience in development in C++ and is built according to a rigorous pedagogy based on numerous progressive practical works. During these 5 days, the trainer will present the evolution of the standards from C++98 to C++20.

Who is this training for ?

For whom

Developers, engineers and project managers close to development.

1151
Prerequisites

Good knowledge of a programming language such as C, Java, Python, C#, VB.NET or PHP.

Training objectives

Mastery of syntax in C++
Apply object-oriented design concepts

Use of development tools related to the C++ language
Master the major new features of the C++ 11 standard

1152

Training program

C++ syntax (differences between C and C++)
  • Data: definition, initialization, data types.
  • Expressions: notion of reference, casting mechanisms.
  • Operators (: :, new, delete).
  • Functions (passing parameters and return value by reference, default values, inlining, overloading).
  • Using C code in a C++ program.
  • References (arguments and return values).
  • Constant types.
  • Namespaces.
  • "Automatic" typing with keyword auto (C++ 11).
  • Practical work Getting started with the development environment and programming a simple program.
Object-oriented approach
  • The general principles of object-oriented techniques.
  • C++ and object programming.
  • An introduction to object-oriented methodologies.
  • An introduction to models and UML notation (static model, dynamic model, cooperation model, scenario).
  • Practical work Application of concepts to a case study which will be one of the guiding threads of the following exercises .
1153
C++ classes and objects
  • Syntactic aspects: fields, methods, constructors.
  • Access control.
  • Self-reference.
  • Static fields and methods.
  • Functions.
  • Methods and friend classes.
  • Dynamic creation of object arrays.
  • Methodological aspects: class design.
  • Copy and move constructors (C++11).
  • Constructor delegation (C++11).
  • Introduction to memory management issues (stack, heap, garbage collector).
  • Practical work Programming the case study.
  • The design and the construction of a hierarchy of classes and interfaces.
1154
Derivation and inheritance
  • Principle of derivation.
  • Syntactic aspects: the definition of derived classes, constructors.
  • Access control.
  • Implementing polymorphism: virtual functions.
  • Code reuse: abstract classes.
  • Interfaces.
  • Multiple derivation.
  • Semantic and methodological aspects: code factorization.
  • Practical work The implementation of polymorphism in the case study.
The exceptions
  • Syntactic aspects: try blocks, generation of exceptions.
  • Methodological aspects: construction of an exception hierarchy, use of exceptions.
  • Practical work The introduction of exceptions in the case study.
1155
Operator overloading
  • Principle of overloading.
  • Overloading of binary operators.
  • Special overloading: the index, function, conversion operator.
  • Overloading memory management operators.
  • Overloading the '<<' and '>>' operators.
  • Practical work The overloading of some simple operators.
The models
  • Class model.
  • General principles and mechanisms.
  • Template overloading and method redefinition.
  • Function model.
  • General principles and mechanisms.
  • Model overloading.
  • Models and operator overloading.
  • Models and derivation mechanisms.
  • The improvements proposed by C++ 11.
  • Practical work Exercises on models.
1156
I/O and overview of the STL
  • I/O.
  • The principle of streams and the hierarchy of input/output classes.
  • Description of some input classes /outputs.
  • Overview of the STL.
  • Objectives and principles.
  • Descriptions of some models and classes.
  • Containers, iterators, interval-based loop (C++11).
Conclusion
  • Software life cycle: testing, integration, production method.
  • Interaction with other environments.
  • Critical analysis of C++.
  • Evolution of C++.
1157

C++11, C++ developer upgrade

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This training will allow you to assimilate the new features introduced by the C++ 2011 standard. You will discover lambda expressions, exploit the possibilities of functional programming, master memory management and exploit the other new features of the C++ standard library.

Who is this training for ?

For whom

C++ developers wishing to know the new features defined by the C++11 standard.

1158
Prerequisites

None

Training objectives

Understand the new features and improvements of the C++11 language
Use lambda-expressions
Exploit the possibilities of functional programming
Master object allocations-destructions
Develop a multi-threaded application

1159

Training program

The advent of C++11
  • The different standards C++98, C++03 and C++0x, C++11.
  • The new features of C++11 and the objectives of this standard.
  • The future of BOOST, STL.
  • The question of compatibility of old codes.
  • The availability of development tools (compilers, debuggers, IDE) .
  • Practical work Verification of the tooling using C++11 code provided.
Language improvements
  • Strongly typed enumerations.
  • Fixed-size arrays.
  • The auto keyword to simplify typing.
  • The loop based on an interval.
  • Other improvements: templates with variable arguments, null pointer, literals.
  • Practical work Implementation of improvements.
1160
Changes at class level
  • The delegation of constructors, the constraints linked to inheritance.
  • The new semantics of movement and the constructor by movement (move constructor).
  • Adaptation of the normal form of classes with new features (move constructor).
  • The =delete, =default directives.
  • The initializers of containers and member data.
  • Practical work Creation of C++11 classes.
Using threads
  • Declaration and execution of a thread.
  • Waiting for execution to end with join().
  • Management of data local to a thread, the use of volatile.
  • Retrieve a result with future<> and async().
  • Obtain information on the platform's execution capabilities with hardware_concurrency().
  • Practical work Multithreading a sequential code and measuring the gain in terms of execution time.
Other new features of the standard library
  • Time management with the chrono namespace.
  • The new tuple container.
  • Practical work Implementation of the new features.
1161
Functional programming with lambda expressions
  • Declaration, typing, implementation and use.
  • The interest of auto with lambda-expressions.
  • The management of closures, with capture by value or by reference of variables linked to the context.
  • Practical work Functional programming exercises.
Memory management and containers
  • Smart pointers: shared_ptr, weak_ptr, unique_ptr, auto_ptr.
  • Joint use with the STL.
  • Practical work Implementation of memory management C++11.
1162

C++, upgrade for C# and Java developers

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Windows 8 has revived interest in the C++ language among developers practicing C# and Java. Based on your object knowledge, this course will ensure a smooth transition to C++ 11. You will learn how C++ and its standard library allow you to write efficient and robust code for your applications.

Who is this training for ?

For whom

This course is aimed at Java and C# developers wishing to acquire specific knowledge of C++ development.

1163
Prerequisites

None

Training objectives

Know basic syntax
Write classes and structures
Manipulate strings and collections in C++
Create a hybrid C# metro application with interoperability

1164

Training program

Overview of advanced C++ concepts
  • The different types of constructors (by default, by copy.).
  • Management of memory without garbage collector (manually or using smart pointers from the standard library).
  • Multiple inheritance: practical cases and pitfalls to avoid.
  • Templates.
  • Object orientation and comparison with C#.
  • Practical work Workshop on handling smart pointers from the standard library.
Standard library: the BCL of C++
  • Possible memory representations of a character string and manipulation with std::string and std::wstring.
  • Introduction to the stl (standard template library).
  • Containers and iterators, C++ collections.
  • Practical work Workshop for manipulating character strings and collections in C++.
Advanced C++ syntax
  • Type inference and automatic keyword.
  • Functional orientation of the language: Lambdas, Functors.
  • and use with the stl.
  • Asynchronism and parallelization with C++ 11.
  • Using Microsoft COM objects, with and without smart pointers.
  • Practical work Exercise: introduction to the parallel platform library , and manipulation of Lambda expressions.
  • Practical case of consumption of COM objects, illustration with Direct 2D.
1165
C++ and interoperability
  • Publishing reusable Windows COM objects.
  • Interoperability with .
  • Net on Desktop: C++ CLI.
  • Interoperability with .
  • Net and JavaScript in Metro applications: C++ / CX.
  • Practical work Creation of a hybrid metro application C# / Xaml + C++ / Direct 2D.
Reminder of the basic concepts of C++ development
  • The different source files (.h, .cpp.).
  • Linking and compilation of code written in C++.
  • Writing classes and structures: syntax basic.
  • Reuse of already compiled components: .lib, .dll, .h etc.
  • Practical work Creation of a multi-project solution in C++, with static linking and dynamic.
1166

C++, development of graphical applications in QT

★★★★★

  • SII-298
  • 5 Days (35 Hours)

Description

QT is an object-oriented framework that offers components for graphical interface (widgets), data access, network connections, etc. This training will teach you to identify the important elements of a QT project and the different graphic components offered, and to use them with XML.

Who is this training for ?

For whom

Developers and project managers.

1167
Prerequisites

Good knowledge of the C++ language. Basic knowledge of XML. Experience required in C++ development.

Training objectives

Develop graphical applications with the QT Framework

Discover the different types of projects and their structuring

Master the different graphic components and their interactions

Understand and implement the QT plugin system

1168

Training program

Overview of the QT language
  • History of the language.
  • The different possibilities of use.
  • Other existing graphics libraries.
The different types of projects
  • Presentation of the different types of projects with QT.
  • Presentation of QT Creator.
  • The basic structure of a HMI-based application.
  • Exercise: Creating a first QT application.
Important elements of a project
  • Pro files, graphic design (ui).
  • Internationalization management files (ts and qm).
  • Basic types of the language ( qint, qfloat.).
  • Compiling with qmake.
  • The QObject class.
  • Presentation of the MVC model.
  • The model MVC in QT.
  • Exercise: Study of a project file for setting up the application.
1169
The different graphic components
  • The basic components of the HMI (QMainWindow, QFrame, QLabel.).
  • Management of component positioning.
  • Dialog boxes (QDialog ).
  • Menus (QMenu).
  • Predefined and custom templates.
  • QT visual design tools (QT Designer.).
  • Exercise: Setting up the application structure.
Event management
  • Signal and slot concepts.
  • Declaration of signals and slots.
  • Install event filters.
  • Access the application during heavy processing (timer and hasPendingEvents).
  • Exercise: Adding event management to the application.
The QT Plug-in System
  • Understand what plug-ins are with QT.
  • The different plug-in classes (QStylePlugin.).
  • The elements necessary for setting up installation of a plug-in for QT.
  • Development of application managing plug-ins.
  • Exercise: Development of a simple plug-in.
1170
Go further with QT
  • Using XML with QT.
  • Reminder about XML, DOM and SAX parsers.
  • Parsing XML documents using QT.
  • Internationalization.
  • Reminder about Unicode.
  • The QTranslator object.
  • The QT Linguist application.
  • Cross-platform applications .
  • QT Mobility.
  • Exercise: Using an XML file to store application data.
  • Internationalization of the application .
1171

C++, program with CUDA under Visual Studio use the GPU to improve performance

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

This training will allow you to learn how to use NVIDIA's CUDA SDK, a leader in GPU usage, to improve data parallelism performance. You will learn the knowledge necessary to implement CUDA, which will allow you to evaluate and manipulate this technology.

Who is this training for ?

For whom

Application designers and developers in C/C++, software architects.

1172
Prerequisites

Good knowledge of C/C++ language and threads, experience required. Basic knowledge of C++11.

Training objectives

At the end of the training, the participant will be able to: Understand the benefit of using the GPU as an independent computing resource
Use the GPU with CUDA in the Visual Studio environment
Ensure the link between C++11 threads and the use of the GPU
Check the interest in the context of a complete project

1173

Training program

Introduction
  • Presentation of GPU usage compared to CPU.
  • The CUDA SDK from NVIDIA.
  • Alternatives and complements to CUDA.
  • Demo Presentation of the test application and evaluation of the results on the CPU.
Installation de CUDA
  • Installation of the specific CUDA driver and SDK.
  • Installation of NSIGHT, the specific CUDA environment under Visual Studio.
  • Exploration of application examples .
  • Recovering the capacities of installed graphics cards.
  • Practical work Installation of CUDA, creation of a project and validation of the installation.
Basic implementation
  • The fundamentals of executing a kernel function.
  • Creating a kernel function.
  • Calling a kernel function.
  • Memory transfers between the host and the GPU.
  • Asynchronous execution of a sequence of GPU code.
  • Debugging the code executed on the GPU.
  • Practical work Addition of a sequence of code to be executed on the GPU to the test application, comparison of the results with the existing one in C++11.
  • Using the NSIGHT debugger.
1174
Using CUDA's different memory options
  • Shared memory within a block of threads, the different options.
  • Optimization between the memory devoted to data and the size of the code to execute.
  • The allocations mapped between host memory and graphics card memory.
  • Portable memory usage between host and multiple graphics cards.
  • Practical work Manipulation of the different options in the test application.
  • Search for the best solution according to a case studied.
Other uses of CUDA
  • The use of Streams, parallel execution on different graphics cards.
  • The use of CUDA in C++ with Thrust.
  • Alternatives or complements to CUDA such as C++ AMP, OpenCL, OpenAPP.
  • Case study Exploration of complementary and alternative solutions, comparison using the test application.
Conclusion
  • The scope of using GPU as an alternative to CPU.
  • Best practices.
1175

Perl language Unix/Linux/Windows system scripts

★★★★★

  • SII-169
  • 3 Days (21 Hours)

Description

This course will teach you to program or maintain operating procedures written in Perl. It will allow you to master the language itself but also to discover the "Perl philosophy" with in particular the use of a large number of modules allowing you to expand its possibilities almost infinitely.

Who is this training for ?

For whom
Computer scientists concerned with operating procedures in Unix, Linux or Windows environments.
1176
Prerequisites

None

Training objectives

Master the syntax of the PERL language
Implement regular expressions
Manage files and directories
Interact with the operating system
Use data from a relational database
Write Perl scripts in a Web context

1177

Training program

Presentation
  • History of the language.
  • Perl, for what use? Characteristics of the Perl language.
  • The different distributions and versions.
  • The official documentation.
  • Installation and first execution of a Perl program.
  • Source files, extension and interpretation.
  • Tools for using Perl.
  • Practical work Installation of the Perl interpreter.
1178
The essentials of the language
  • Structure of a Perl program, script header.
  • Coding conventions and naming rules.
  • Added comments.
  • Character strings, interpretation of codes.
  • Variables, naming and typing.
  • Scope of variables.
  • Scalars.
  • Operators: calculation, increment, assignment, comparison.
  • Arrays, initialization, display of content.
  • Associative tables (hash table), key and values ​​functions .
  • Memory references.
  • System variables.
  • The notion of blocks.
  • Conditional control structures: if, if.
  • else, if.
  • elsif.
  • else.
  • Iterative control structures: while, for, until, foreach.
  • Standard input/output streams (stdin, stdout, stderr).
  • Practical work Manipulation of the language through the writing of different programs.
1179
Regular expressions
  • Use cases for expressions.
  • Panorama of different patterns: meta-characters, quantifiers, special characters.
  • Pattern Matching.
  • The Pattern Substitute.
  • Command line options for the interpreter.
  • Third-party program: sed, awk.
  • Perl used as an additional filter.
  • Practical work Implementation of regular expressions.
1180
Functions, procedures, modules
  • Definition of functions.
  • Difference between functions and procedures.
  • The declaration of a function, the calling mechanism, passing arguments and retrieving results.
  • Visibility of variables, the my operator.
  • Using references.
  • The functions built into Perl: chomp, chop, length.
  • Notion of "package" and module.
  • Modules of the standard distribution.
  • CPAN modules, census, documentation, resource sites.
  • Installation of modules.
  • Using a "classic" module and an "Object-Oriented" module.
  • The functions required and use.
  • Creating a module.
  • Documenting the modules created.
  • Practical work Writing functions.
  • Integration of a module in a development.
  • Creation of a module.
1181
Managing files and directories
  • Notion of filehandle.
  • File management: opening, reading, writing, closing.
  • Information on files (owner, size, rights.
  • ), the stat function.
  • The diamond operator.
  • Directory management: change, browse, creation, deletion.
  • Management of errors when handling files and directories.
  • Practical work Reading/writing to a file.
  • Handling directories.
Interactions with the operating system
  • Access to operating system information.
  • Commands acting on the system: mkdir, rmdir, chown, chroot, chmod, .
  • Process management .
  • Creation of child processes: system, exec.
  • Back quotes.
  • Interactions with the Windows system (Win32 and Win32API modules).
  • Practical work Creation of child processes.
1182
Advanced aspects, databases, object implementation
  • Custom sorts.
  • Additional processing on character strings.
  • Data structures developed using anonymous references.
  • Access to databases using the DBI module.
  • Establishing and configuring a connection, querying and retrieving results.
  • Creating the structure of a class and instantiation: package, subroutine and reference.
  • Object constructor and destructor.
  • Invocation of methods of a class.
  • The garbage collector .
  • Practical work Exploitation of data from a relational database.
Perl scripts in a web context, CGI module
  • HTTP protocol, web server, CGI functional diagram.
  • The CGI module.
  • Environment variables, GET and POST methods.
  • Generation of HTML elements of the form with Perl.
  • Processing forms, exploitation of results.
  • Practical work Writing a CGI script in Perl.
1183

Perl language, advanced programming

★★★★★

  • SII-301
  • 2 Days (14 Hours)

Description

This course will allow you to improve the performance of your programs and maintain them efficiently by teaching you the main primitives of the kernel, the creation of graphical interfaces and input masks. You will also be introduced to the modern approach to Object programming, allowing you to better master this essential tool for creating high-performance software.

Who is this training for ?

For whom

Computer scientists concerned with operating procedures in Unix, Linux or Windows environments.

1184
Prerequisites

Good knowledge of the Perl language or knowledge equivalent to that provided by the "Perl Language" course ref. PRL.

Training objectives

  • Manipulating system functions with Perl
  • Implement Object concepts
  • Using Perl/Tk
  • Implement GTK

1185

Training program

System programming
  • Reminder of the principles of processes: fork and exec.
  • Reminder of the principles of signal management.
  • Send a signal to processes: the kill function rnManage signals: the sigtrap pragma, install a signal manager.
  • Programming sockets and services from IO::Socket to Net::Server.
  • Programming presentation threads.
  • Practical work rnWriting Perl programs to manipulate system functions.
Perl and the object
  • Some definitions: object-oriented programming, class, instance, constructor, destructor, inheritance.
  • Implementation of the object: the package for the class, the hash for the attributes, functions for methods.
  • Instance creation: the blessing of the object reference.
  • Programming a constructor.
  • Act when the object is destroyed, the DESTROY method.
  • Inheritance: the table
  • ISA and the UNIVERSAL class.
  • Method overloading, the use of SUPER.
  • Abstraction: the future of the object in Perl, from Class::Std and Class::Accessor to Moose.
  • Practical work Programming classes .
  • Implementation of object concepts (inheritance, overload).
1186
Graphical interface: from Perl/Tk to GTK
  • Understand and maintain code written in Perl/Tk.
  • Overview and installation of Perl/Tk.
  • Geometry manager: Pack, Grid, Place .
  • Widgets by family.
  • Buttons: Button, Checkbutton, Radiobutton.
  • Label and input area: Label, Entry.
  • Lift, list, menu and text entry: Scrollbar, Listbox, Menubutton, Optionmenu, Text.
  • Containers: Canvas, Frame, Toplevel.
  • Practical work Creation of an application with a graphical interface in Perl/Tk and event management.
Write new code using GTK
  • Link between Pert and GTK: install GTK and its libraries.
  • Widget: hierarchy, creation, keyboard accelerators, base containers, .
  • Widget: signals and events.
  • Types of buttons: Toggle (switches), radio, .
  • Practical work Manipulation of different components: buttons, button box, Widget frame, .
1187
Evolutions
  • Features brought by Perl 5.10, 5.12, 5.14.
  • Perl 6: a new language.
  • New features: sigils, static and dynamic typing, formal parameters of functions.
  • A true Object language.
  • Junctures and lazy evaluation.
1188

Python, object programming

★★★★★

  • SII-299
  • 5 Days (35 Hours)

Description

This 5-day training course is designed for new Python developers, who must learn the essential notions of object programming and the syntax of the language before being able to benefit from all the advantages of the Python language. Participants will learn about the tools and features offered by Python, such as module stacks, built-in debugger, and rich documentation, and learn how to design, develop, deploy, and maintain Python applications. This training also prepares you for TOSA Python certification.

Who is this training for ?

For whom

Developers, engineers, project managers close to development.

1189
Prerequisites

Have basic knowledge of programming (ideally in object language)

Training objectives

Master the syntax of the Python language
Acquire the essential notions of object programming
Know and implement the different Python modules
Implement the tools for testing and evaluating the quality of a Python program
Design graphical interfaces

1190

Training program

Python language syntax
  • Identifiers and references.
  • Coding conventions and naming rules.
  • Blocks, comments.
  • The available data types.
  • Variables, formatted display, local and global scope.
  • Manipulation of numeric types, manipulation of character strings.
  • Using files.
  • The conditional structure if/elif /else.
  • Logical operators and comparison operators.
  • While and for iteration loops.
  • Interrupting iterations break/continue .
  • The range function.
  • Writing and documenting functions.
  • Lambda expressions.
  • Generators.
  • Structuring the code into modules.
  • Practical work rnInstallation and getting started with the Python interpreter.
1191
Object Oriented Approach
  • The principles of the Object paradigm.
  • The definition of an object (state, behavior, identity).
  • The notion of class, attributes and methods.
  • Data encapsulation.
  • Communication between objects.
  • Inheritance, transmission of the characteristics of a class.
  • The notion of polymorphism.
  • Association between classes.
  • Interfaces.
  • Presentation of UML.
  • The class, sequence, activity diagrams.
  • Notion of design pattern.
  • Practical work UML modeling of a case study simple.
1192
Object Programming in Python
  • The particularities of the Python object model.
  • Writing classes and their instantiation.
  • Constructors and destructors.
  • Access protection of attributes and methods.
  • The need for the Self parameter.
  • Single inheritance, multiple inheritance, polymorphism.
  • The notions of visibilities.
  • Special methods.
  • Introspection.
  • The implementation of interfaces.
  • The good ones practices and common design patterns.
  • The use of the exception mechanism for error handling.
  • Practical work rnPractice of different object concepts through the 'implementation of the case study.'}
1193
Utilisation StdLib
  • The arguments passed on the command line.
  • Using the Python regular expression engine with the "re" module, special characters, cardinalities.
  • Handling the file system.
  • Presentation of some important modules of the standard library: module "sys", "os", "os.
  • path".
  • Packaging and installing a Python library.
  • Access to relational databases, how the DB API works.
  • Practical work Implementation of Python modules: regular expressions, access to a database,
1194
QA tools
  • Static code analysis tools (pylint, pychecker).
  • Analysis of analysis reports (types of messages, warnings, errors).
  • Automatic documentation extraction.
  • The Python debugger (step-by-step execution and post-mortem analysis).
  • Test-driven development.
  • Python unit testing modules (Unittest.
  • ).
  • Test automation, test aggregation.
  • Coverage testing code, profiling.
  • Practical work Use of the pylint and pychecker tools for verifying Python code.
  • Implementation of unit tests.
1195
Creation of TkInter HMI
  • The principles of programming graphical interfaces.
  • Presentation of the TkInter library.
  • The main containers.
  • Presentation of the available widgets ( Button, Radiobutton, Entry, Label, Listbox, Canvas, Menu, Scrollbar, Text.
  • ).
  • The window manager.
  • The placement of components , the different layouts.
  • Event management, the event object.
  • Multiwindow applications.
  • Practical work Design of an interface graphic with the Tkinter library.
1196
Python/C interface
  • Presentation of the Ctypes module.
  • Loading a C library.
  • Calling a function.
  • Rewriting a a Python function in C with the Python/C API.
  • Creating C modules for Python with Pyrex.
  • The Python interpreter in C.
  • Using the code profiler.
  • Practical work Calling functions written in C from Python.
  • Creating C modules for Python with Pyrex.
Conclusion
  • Critical analysis of Python.
  • The evolution of the language.
  • Elements of Webography and bibliography.
1197

Python, improvement

★★★★★

  • SII-299
  • 4 Days (28 Hours)

Description

The Python language has established itself today as a technological base for the development of large software projects. In this training, you will implement advanced techniques of the Python language as well as its main libraries in order to be able to meet the quality requirements of these projects.

Who is this training for ?

For whom

Engineers and developers.

1198
Prerequisites

Good knowledge of Python development, or knowledge equivalent to that provided by THO or PYT courses. Experience required.

Training objectives

Rigorously implement recognized Design Patterns
Use advanced Python language techniques: Context Manager, metaclasses, closures, advanced functions
Optimize the performance of your programs using monitoring and parallelism
Packager and deploy its Python artifacts
Exploit libraries contributing to the success of the language: scientific computing, artificial intelligence, XML, network

1199

Training program

Important reminders about language
  • Assignment by reference and modifiable, non-modifiable (mutable) data types.
  • Passing arguments, default values ​​and local variables.
  • Class variables and instances.
  • Slices and advanced data structures.
  • Introspection.
  • Advanced elements of control structures: the else clause of instructions for, while, try/except.
  • Practical work
Advanced functions
  • Advanced use of decorators (from generation to consumption, consumer pipeline).
  • Decorators and Design Patterns.
  • Closure/closure.
  • Practical work.
1200
Advanced Object Oriented Programming
  • Properties.
  • Iterators.
  • Multiple inheritance and its pitfalls.
  • Context Managers.
  • Abstract classes and methods (ABC).
  • Metaclasses.
  • Practical work.
Deployment and quality
  • Install third-party libraries (pip, easy_install).
  • The Python Package Index (PyPI).
  • Package your libraries (distutils, setuptools).
  • Deploy an autonomous environment (virtualenv and buildout).
  • Practical work.
Parallelism: optimize the performance of your programs
  • Profile your programs with Timeit and cProfile.
  • Parallelization: avoid multithreading and go for multiprocessing.
  • Distributed computing with the Celery library.
  • Practical work.
1201
Libraries contributing to the success of the language
  • Scientific computing and statistics with Numpy, Scipy, Matplotlib and Pandas.
  • Artificial intelligence and learning algorithms with Scikit-learn.
  • Searching information in XML files with ElementTree.
  • Network: tcp relay with Twisted and SNMP supervision with PySNMP.
  • Practical work.
1202

Django, web development with Python

★★★★★

  • SII-173
  • 4 Days (28 Hours)

Description

Django is an MVC (Model-View-Controller) web framework based on the Python language. This course will teach you how to implement this framework and use its different modules effectively in the development of web applications.

Who is this training for ?

For whom
The training is intended for developers wishing to acquire in-depth knowledge of the basics of the Django framework.
1203
Prerequisites

None

Training objectives

1204

Training program

Introduction
  • Reminder of the principles of OOP.
  • The MVC Design Pattern.
  • Presentation of the Django framework.
  • Origin and history.
  • Objectives and benefits.
  • Django framework components.
  • Exercise: Preparing the environment.
  • Installing Python , Django, Apache Server, MySQL and Eclipse.
  • Creating a new project.
Accessing data with Django
  • The Django ORM model.
  • The Django models: Model, Field, Table, Column, Primary Key.
  • Mapping associations: OneToMany, ManyToOne, ManyToMany, OneToOne.
  • Inheritance mapping strategies: Meta Class, OneToOneField, ManyToManyField.
  • Data access with QuerySets.
  • Exercise: r nDevelop a data access layer.
  • Interfacing Django with MySQL.
1205
View management
  • Simple views or view functions.
  • The HttpResponse, HttpRequest and QueryDict classes.
  • URL configuration: UrlConf.
  • Generic views.
  • Generic view examples: Redirects, Create, Update, Delete.
  • Exercise: Develop dynamic HTML views with Django.
Les templates
  • The role of templates.
  • Creating and loading templates.
  • Context management.
  • Using custom tags and filters.
  • Reusing templates: inheritance between templates.
  • Exercise: Develop a template to facilitate presentation generation.
1206
Forms management
  • The advantages of Django forms.
  • Creating forms.
  • The different types of fields.
  • Validating data from a form .
  • Management and personalization of error messages.
  • Generation of forms from models.
  • Exercise: Develop the forms associated with operations CRUD from the previous workshop.
Advanced functions
  • Internationalization.
  • Authentication and session management.
  • Optimization and caches.
  • Ajax integration.
  • The administration interface.
  • Unit tests.
  • Exercise: Integrate Ajax through the JQuery framework.
1207

Swift language basics for Mac OS X and iOS development

★★★★★

  • SII-361
  • 2 Days (14 Hours)

Description

New programming language created by Apple, Swift presents itself as a modern and more efficient alternative to Objective-C. In this training, you will learn how to develop Swift 3 in a MacOS environment. You will discover the basic concepts of Swift 2 and its innovative aspects.

Who is this training for ?

For whom

Developers, project managers.

1208
Prerequisites

None

Training objectives

  • Discover the basic concepts of the Swift language
  • Create a Swift projectLearn Swift Standard Library
  • Understand how to integrate Cocoa and Objective-C code into a Swift application

1209

Training program

Introduction to Swift
  • Why a new programming language in the Apple universe? The different use cases of Swift (Mac OS X, iOS).
  • The contributions and new features of Swift .
  • Swift's relationship with classic Apple tools: Objective-C, XCode.
  • Openness to Open Source and other systems.
The development environment
  • Discovery of the XCode environment, new features of XCode 8, migrating from Swift 1 and 2 (Swift Migrator).
  • Installation and configuration of the development environment, targeting a specific OS version.
  • Creation of a Swift project and basic operations (editing, execution.
  • ).
  • Discovery of the Swift project 'REPL evaluation and development (Read-Eval-Print-Loop).
  • Practical work Setting up the development environment and discovery of a first project.
Basic concepts of Swift
  • Philosophy of language: syntax, memory management, type inference, object or functional orientation.
  • Classic mechanisms: typing, variables and constants, instructions, functions.
  • Object concepts: concept of classes, method.
  • The manipulation of character strings.
  • Practical work Creation of several applications implementing the concepts presented.
1210
Swift Standard Library
  • Types: String, Array, Dictionary and numeric.
  • Protocols: Equatable, Comparable, Printable.
  • Free functions and algorithms.
  • Practical work Implementation of concepts.
Innovative and advanced aspects
  • Swift's typing mechanisms, genericity, protocol support.
  • The concept of a playground (Interactive Playground).
  • Closures ).
  • Memory management: constructor, destructor, reference management, lazy instantiation.
  • Error management.
  • Multi-threading.
  • Introduction to graphical interfaces with Swift (Cocoa, Cocoa Touch, iOS) The future with Swift 3.
  • Practical work Discovery of the Playground.
  • Putting closures and genericity into practice.
  • Using the Cocoa and Cocoa Touch frameworks.
1211
Innovative and advanced aspects
  • Swift's typing mechanisms, genericity, protocol support.
  • The concept of a playground (Interactive Playground).
  • Closures ).
  • Memory management: constructor, destructor, reference management, lazy instantiation.
  • Error management.
  • Multi-threading.
  • Introduction to graphical interfaces with Swift (Cocoa, Cocoa Touch, iOS) The future with Swift 3.
  • Practical work Discovery of the Playground.
  • Putting closures and genericity into practice.
  • Using the Cocoa and Cocoa Touch frameworks.
Integration with Cocoa and Objective-C
  • Using the Cocoa and Cocoa Touch frameworks from a Swift application.
  • The joint use of Swift and Objective-C.
  • The three operating modes : Interoperability, Mix and Match, Migration.
  • Practical work Integration of Swift and Objective-C code.
1212

Develop in PL/SQL

★★★★★

  • SII-425
  • 3 Days (21 Hours)

Description

The PL/SQL course aims to master the PL/SQL language and the use of stored processing and triggers in applications. The concepts covered are systematically put into practice.

Who is this training for ?

For whom
  • Analysts and programmer analysts.
  • Database administrators, operators.
1213
Prerequisites

Training objectives

  • Know and use the PL/SQL procedural language and the objects stored in the core: procedure, function, package, trigger
  • Know how to create PL/SQL blocks that can be shared by several applications, forms or reports
  • Have practical indications for developing more efficient and above all more relevant PL/SQL code

1214

Training program

Introduction and reminders
  • Transactional processing in Oracle.
  • Objects and dictionary of an Oracle database.
  • SQL and PL/SQL.
  • Overview of PL/SQL.
  • Tools used.
  • Oracle documentation.
1215
Elements of language
  • Host environments.
  • Syntactic introduction.
  • Declarations of PL/SQL variables and constants.
  • Data types and conversion.
  • Predefined functions.
  • Control statements: IF-ELSE, LOOP loop, FOR loop.
  • Composite types: records, indexed tables.
  • Object types.
  • Defining subroutines.
  • Configuring subroutines.
  • Exercise: Declaring variables.
  • Date manipulation.
  • Typing attributes.
  • Using collections and their methods.
1216
Access to the database
  • The basis and the notion of cursor.
  • Access via implicit cursor: update, delete, insert, select.
  • Use the RETURNING and BULK COLLECT clauses.
  • Collections and FORALL.
  • Cursor FOR loops.
  • Updating cursors.
  • Explicit cursors.
  • Cursor variables.
  • Exercise: Using explicit cursor and BULK COLLECT.
Stored treatments
  • Management of stored subroutines, stored libraries and packages.
  • Management of stored processes: access rights, dictionary views and dependencies.
  • Using packages.
  • Exercise: Creating procedures, stored functions, and packages.
1217
Error management
  • Handling an exception.
  • Using RAISE_APPLICATION_ERROR.
  • Triggering an exception via RAISE.
  • Propagation and transactional management.
  • Exercise: Using Raise and RAISE_APPLICATION_ERROR.
Triggers
  • Definition and types of Event/Action triggers.
  • Triggers Order.
  • Lines (use of: NEW and: OLD), E/C/ A (Event/Condition/Action).
  • " INSTEAD OF " on views, on system events.
  • Using autonomous transactions.
  • Exercise: Creation of order triggers and line triggers.
Supplements
  • Dynamic SQL.
  • Using dbms_application_info and WRAP to hide source code.
1218

PostgreSQL, prise en main

★★★★★

  • SII-175
  • 3 Days (21 Hours)

Description

The PostgreSQL DBMS has the majority of features that can be found in commercial products like Oracle or DB2. This training will teach you how to use it effectively, in particular how to create and operate a database, or how to program with the PL/pgSQL language.

Who is this training for ?

For whom
Developers, operators and anyone else wishing to make the best use of PostgreSQL or migrate to PostgreSQL.
1219
Prerequisites

None

Training objectives

1220

Training program

Introduction
  • PostgreSQL presentation, versions.
  • The relational model, the schema.
  • Tables, constraints.
  • User interfaces.
1221
SQL avec PostgreSQL
  • The SQL standard.
  • Positioning PostgreSQL.
  • Setting up a database schema.
  • PostgreSQL data type.
  • Tables.
  • Sequences.
  • Views.
  • Integrity constraints on tables.
  • Addition , modification and deletion of data.
  • Querying the schema of a database.
  • Selection, restriction, sorting, joining.
  • Complex extractions.
  • Using operators.
  • PostgreSQL SQL specificities.
  • Advanced PostgreSQL features.
  • Transactions.
  • Views.
  • Tables.
  • Table inheritance.
  • Practical work Creating a schema.
  • SQL DDL script.
  • Creating views.
  • Transaction scenarios.
1222
Le langage PL/pgSQL
  • Instructions, types of the language.
  • Code blocks.
  • Control structures.
  • Errors and exceptions.
  • Cursors.
  • Declare, move and close.
  • Procedures and functions.
  • Adding subroutines to a database.
  • Triggers, triggers.
  • Structure.
  • Practical work Stored functions.
1223
Data maintenance
  • Import/export data.
  • With COPY TO and COPY FROM.
  • With Psql.
  • Backup and restore data.
  • pg_dump tools.
  • Query optimization.
  • Indexes.
  • The optimizer.
  • EXPLAIN and VACUUM.
  • Practical work Importing/exporting data.
  • Creating indexes and analyzing query execution plans.
User and group management
  • Creation.
  • Authentication.
  • Granting privileges.
  • Practical work Creation of users, allocation of rights.
  • Authentication tests.
1224
Configuration de PostgreSQL
  • Installing and starting a database.
  • The Postmaster.
  • The Postgresql file.
  • conf.
  • System tables.
  • Practical work Installation of a base and configuration.
Supplements
  • Programming interfaces.
  • Connecting PostgreSQL with PHP, JDBC, ODBC.
1225

PostgreSQL, optimize your developments

★★★★★

  • SII-361
  • 3 Days (21 Hours)

Description

This training is intended for those who want to go further in the use of PostgreSQL. This database management system is one of the most advanced in implementing the SQL standard. It allows you to apply the latest specifications such as, for example, the WINDOW and PARTITION BY directives.

Who is this training for ?

For whom

This course is aimed at developers wishing to have in-depth knowledge of the possibilities offered by PostgreSQL.

1226
Prerequisites

Good knowledge of SQL language and PostgreSQL.

Training objectives

List the new features of the SQL standard
Identify the development possibilities offered by PostgreSQL
Develop applications optimized for PostgreSQL.

1227

Training program

Reminders
  • Server and access configuration.
  • The command line and graphical client.
  • Exercise
Creating databases, schemas and data types
  • Choice of template and charset. The search_path.
  • Predefined types (monetary...) and table types.
  • Domains and user types.
  • Definition of new basic types in C language.
  • Exercise
Creating tables and views
  • Foreign key constraints.
  • Inherited tables (EXTENDS). Partitioned tables.
  • Indexing. Materialized views.
  • Practical work
Implementing complex queries
  • Aggregates, joins and subqueries.
  • WINDOW and PARTITION BY clauses.
  • Search in FULL TEXT mode.
  • Query analysis with EXPLAIN.
  • Exercise
1228
Transaction management
  • Transaction management
  • Crosspoints. Isolation levels.
  • Explicit row and table locks.
  • Informational locks for applications.
  • Exercise
Management of users, roles and rights
  • Users and roles.
  • Role inheritance, organization into groups.
  • PUBLIC role. Rights.
  • Exercise
Implementing stored procedures
  • Procedures written in PL/pgSQL in Perl and C.
  • Cursors. Definition of operators.
  • Setting up triggers.
  • Exercise
Client programming interfaces
  • Programming in C, Perl and PHP.
  • Retrieval of graphic elements from the database.
  • Processing of SQL transactions using exceptions.
  • Exercise
1229

Cobol Programming

★★★★★

  • SII-425
  • 2 Days (14 Hours)

Description

This training aims to provide trainees with real skills in Cobol programming. All of the fundamental concepts are developed. At the end of this course, participants know how to read, write and develop Cobol applications.

Who is this training for ?

For whom
  • This training is aimed at IT professionals who wish to acquire operational training to develop or maintain Cobol applications.
1230
Prerequisites

None

Training objectives

  • Master the overall syntax of the Cobol language
  • Understand and implement the links between programs and subprograms
  • Know how to manage files
  • Master printing

1231

Training program

First steps in Cobol
  • The Cobol language: its origins and its evolutions. Its general principles.
  • The new versions of Cobol, Cobol and the Object approach.
  • The different parts of a program (division).
  • The different areas (order numbers, indicator, A, B).
  • The main symbols of the language (words and literals).
  • Compilers: their usefulness.
  • Debugging tools.
The data
  • The different formats, character strings (or Pictures), levels.
  • Figurative constants. Redefining data.
  • Data manipulation . Inspect, the parameters used in the String and Unstring commands.
Instructions et expressions
  • The description of the treatments. The division procedure. Basic structure of an instruction.
  • Accept, Display, Move, the different zones (alphabetical, alphanumeric, numeric).
  • Arithmetic instructions: Compute, arithmetic expressions, evaluation rules, Add, Subtract, Multiply, Divide.
  • Conditional expressions and connection: Evaluate and Continue. Goto, Perform, Exit Alter.
  • For proper use of these instructions.
1232
The tables
  • Presentation, Set, Search.
  • A different use of tables.
  • Implementation.
Functions
  • Different call modes: example function.
  • Financial, statistical, date, mathematical functions.
  • Other interesting functions.
Programs and subprograms
  • The conditions of use of subprograms.
  • Call, Exit Program, Cancel, Stop, End Program.
The files
  • The description of the files. The Data Division, organization and structure, the Linkage Section.
  • The file management commands: Open, Close, Read, Start, Write, Rewrite, Delete .
The impressions
  • Presentation. The different types of editing. The different formats of the editing command: Write.
1233

SOA, service-oriented architecture, synthesis

★★★★★

  • SII-319
  • 2 Days (14 Hours)

Description

This seminar presents the functional and technical issues linked to the implementation of Service Oriented Architectures or SOA. It also presents an overview of best practices for defining a SOA architecture as well as the link with Web Services. The challenge: moving from IT essentially composed of applications to service-oriented IT in order to improve the responsiveness of the information system.

Who is this training for ?

For whom

Business and IT decision-makers wanting a holistic view of the SOA landscape and business opportunities.

1234
Prerequisites

None

Training objectives

Understand the benefit of adopting a SOA approach
Discover the components, services and layers of a SOA architecture.
Recognize the main technical building blocks underlying a SOA architecture
Discover the approaches and models SOA design and architecture
Identify the key market players and products

1235

Training program

Introduction: why the SOA approach?
  • The challenges for the company.
  • Multilevel architectures and business components: limits of the interoperability of classic middleware.
  • Web services and IS interoperability .
  • From components to service-oriented architectures (SOA): limits of IS project management.
  • Introduction to services, service contracts, service orchestration, service bus 'enterprise (ESB).
  • Gains: alignment of IS with business processes, cost reduction, standardization, reuse, interoperability.
Presentation of a SOA architecture
  • Components and layers of an SOA architecture.
  • Data access service, transaction management.
  • Process management, user interaction (portal.
  • ), security, administration, supervision.
  • Web Oriented Architecture (WOA) and architectures based on micro-services.
  • The principle of weak coupling between service provider and consumer.
1236
Services and processes
  • The concept of service.
  • Service exposure, weak coupling, synchronism vs asynchronism.
  • Service provider and consumer, service contract, typology of services ( business, technical.
  • ).
  • Differences between services and components, specification of quality of service.
  • Business application components.
  • Operating unit in SOA, implementation of contracts, dependencies between components and orchestration.
  • Mapping business processes/services.
  • Alignment of IS on processes business: the importance of process modeling by businesses.
  • The OMG BPMN modeling standard.
  • Positioning in relation to BPM.
  • Moving from a business process model to a service.
1237
Aspects techniques
  • Implementation of Web Services (Java EE, .
  • NET, PHP.
  • ).
  • XML foundations.
  • XML schema for interoperability and description of application data.
  • Description of services with WSDL and invocation with SOAP.
  • RESTfull approach.
  • Search and publish services (directories).
  • Design Patterns linked to Web Services.
  • Link between SOA and EAI.
  • Message Oriented Middleware (MOM) ).
  • Enterprise Service Bus: concept of ESB, ESB vs SOA.
  • Update on standards.
  • Web service orchestration and process integration professions (BPM, BPEL.
  • ).
  • Standards and their level of implementation: OMG, W3C, OASIS, WS-I.
  • Security and Web services (WS-Security), transaction management (WS-Coordination).
  • Message delivery (WS-ReliableMessaging), interoperability and message identification (WS-Addressing).
  • Links with other IS components and emerging technologies: Cloud, mobility, Big Data.
1238
SOA design and architecture patterns
  • SOA seen as an integration model and EIP patterns (Enterprise Integration Patterns).
  • SOA patterns.
  • Attempts at standardized SCA approaches and SDO.
  • Can we design a SOA architecture with REST? The question of orchestration and the place of BPEL, BPMN and traditional development technologies.
The governance of an SOA IS
  • The specificities induced by the SOA model on the organization.
  • Organize the initial implementation and reuse with a SOA center of excellence.
  • The key roles: business director, technical director, domain architect, technical architect.
  • Typical governance activities: manage a service application, its implementation and its developments.
  • Moving from setting up an on-demand service to anticipating needs.
  • How to stay agile with what seems to be an extremely centralized model? Pitfalls and mistakes to avoid .
1239
SOA design methodological approach
  • The links between SOA and the Object approach.
  • Methods available on the market: UP, EUP, TOGAF, NAF, Praxeme.
  • Life cycle of an SOA project: strategic vision and organizational process.
  • Urbanization metaphor and aggregation levels.
  • Conceptual model of a SOA.
  • The modeling of services within the application architecture with UML.
  • The transition from the organizational process to business services, from business services to application services.
  • The MDA approach of OMG.
1240
Market players and products
  • Typology of existing products.
  • Enterprise Service Bus (ESB).
  • EAI platforms for new Web Services functionalities (Tibco, WebMethods.
  • ).
  • SOA orchestrators, the upper layers for directories, orchestration, administration.
  • Platform providers (IBM, BEA, Oracle.
  • ).
  • Cloud players (Amazon, Google.
  • ).
  • BPMN modelers and their orchestration possibilities.
  • Monitoring tools (business and technical) and administration solutions.
  • Open Source offering and projects: Apache ServiceMix/FUSE, Mule, Celtix, Synapse.
1241

Network/Internet cybersecurity, summary of IT and corporate communications protection

★★★★★

  • SII-423
  • 3 Days (21 Hours)

Description

This training program guides you in integrating security into your Information System architecture, while addressing the security requirements of modern businesses. It offers an in-depth analysis of threats and intrusion techniques, along with an overview of the main security solutions available on the market. You will gain the technical and legal knowledge necessary to ensure and effectively manage the security of your information system.

Who is this training for ?

For whom
  • CISO.
  • CIO.
  • Architects.
  • Developers.
  • Project managers.
  • Pre-sales salespeople.
  • System & network administrators.
1242
Prerequisites

None

Training objectives

  • Understand the evolution of cybercrime and its implications
  • Manage the security of cloud environments, applications, and endpoints
  • Grasp the fundamentals of cryptography
  • Implement and oversee information system security monitoring processes

1243

Training program

Introduction to Information Security and Cybercrime
    • Core Security Principles: defense-in-depth, cyber risk modeling.
    • Risk Management Methods: ISO 27005, EBIOS Risk Manager.
    • Overview of ISO 2700x Standards.
    • The Evolution of Cybercrime.
    • Emerging Threats: APTs, spear phishing, watering hole attacks, crypto-jacking, etc.
    • Software Vulnerabilities and Security Flaws.
    • The Cyberattack Lifecycle (Kill Chain model).
    • Zero-day Vulnerabilities, Zero-day Exploits, and Exploit Kits.
Firewall, virtualisation et Cloud computing
    • Perimeter Protection: firewalls and DMZ zones.
    • Types of Firewalls: UTM, enterprise, next-generation (NG), and NG-v2 firewalls.
    • Intrusion Prevention Systems (IPS): traditional and next-generation IPS (NG-IPS) solutions.
    • Virtualization: assessment of security vulnerabilities.
    • Cloud Computing Risks: insights from CESIN, ENISA, and the Cloud Security Alliance (CSA).
    • CASB (Cloud Access Security Broker) solutions: securing cloud-based data and applications.
    • Cloud Controls Matrix (CSA CCM): using the framework to evaluate Cloud service providers.
Client workstation security
    • Understanding key threats targeting endpoints.
    • Anti-virus and anti-spyware solutions.
    • Effective management of security patches on endpoints.
    • Ransomware: preventive measures and remediation strategies.
    • Securing removable devices.
    • Vulnerabilities in web browsers and plugins.
    • Understanding drive-by download attacks.
    • Threats via USB devices, including BadUSB and Rubber Ducky.
Crypto Fundamentals
    • Key cryptographic techniques.
    • Public-key and symmetric algorithms.
    • Hash functions: simple, salted, and keyed (HMAC).
    • Public Key Infrastructure (PKI) and its architecture.
    • Common Criteria (CC) certification and ANSSI qualification of cryptographic products.
User authentication and authorization
    • Biometric authentication and related legal considerations.
    • Challenge/response authentication mechanisms.
    • Common attack techniques: brute force, keyloggers, credential stuffing, and more.
    • Multi-factor authentication (MFA).
    • Smart card authentication and X.509 client certificates.
    • HOTP and TOTP standards by OATH.
    • FIDO Alliance protocols UAF and U2F (Fast ID Online).
Flow security
    • Crypto APIs for SSL and the evolution from SSL v2 to TLS v1.3.
    • Common attacks against SSL/TLS protocols.
    • Vulnerabilities and attacks on HTTPS traffic.
    • Hardware-based key protection and FIPS 140-2 certifications.
    • Quick methods to evaluate the security of an HTTPS server.
    • IPsec standard: AH and ESP modes, IKE protocol, and key management.
    • Overcoming issues between IPSec and NAT.
    • SSL VPNs: benefits and comparison with IPSec.
    • Using SSH and OpenSSH for secure remote administration.
    • Legal considerations of real-time network traffic decryption.
Wifi security
    • Specific attacks targeting Wi-Fi networks.
      Techniques for detecting rogue access points (Rogue AP).
    • Security mechanisms of wireless access points.
    • Identification and overview of Wi-Fi related risks.
    • IEEE 802.11i security standard.
    • KRACK attack on WPA and WPA2.
    • Advances in WPA3 and DragonBlood vulnerabilities.
    • User and device authentication over Wi-Fi.
    • Wi-Fi authentication best practices in corporate environments.
    • Audit tools and open-source software: aircrack-ng, Netstumbler, WiFiScanner, etc.
Smartphone Security
    • Threats and attacks targeting mobile devices.
    • Strengths and weaknesses of iOS and Android platforms.
    • Viruses and malware affecting smartphones.
    • Mobile device management solutions: MDM and EMM.
Application security
    • Applying the defense-in-depth principle.
    • Security differences between web and mobile applications.
    • Main risks according to OWASP.
    • Focus on XSS, CSRF, SQL injection, and session hijacking attacks.
    • Key secure development practices.
    • Including security clauses in development contracts.
    • Web Application Firewalls (WAF): roles and operation.
    • Assessing an application’s security level.
Active security management and supervision
    • Security audits: scope and frameworks (ISO 27001, GDPR, etc.).
    • Penetration testing: black box, gray box, and white box approaches.
    • Using Bug Bounty platforms.
    • Effective incident response strategies.
    • Implementing a Security Information and Event Management (SIEM) solution.
    • In-house management versus outsourcing of a Security Operations Center (SOC).
    • Advanced SOC 2.0 technologies: CASB, UEBA, Deceptive Security, EDR, SOAR, machine learning, and more.
    • ANSSI certifications (PASSI, PDIS, PRIS) for outsourced security services.
    • Incident response procedures according to ISO 27035 and NIST SP 800-61 R2.
1244

Computer cabling and new networks

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Computer cabling is a crucial item in the company, due to its cost and its amortization over more than 10 years. This course revisits copper and optical techniques with illustrations by typical CCTP analysis. Promising new optical technologies and the place of carrier currents will be discussed.

Who is this training for ?

For whom

Technicians and engineers involved in the design and implementation of computer cabling, but also in charge of physical network infrastructure projects.

1245
Prerequisites

Basic knowledge desirable in computer cabling techniques.

Training objectives

Assimilate the copper and optical infrastructures of computer cabling
Know the TIA, ISO and IEEE standards for cabling components
Test cabling using a cabling circuit scanner
Be able to analyze a CCTP (cabling specifications)
Understanding developments in networks and new technologies

1246

Training program

Developments in copper and optical networks
  • Panorama of the evolution of techniques and performances over a quarter of a century.
  • Description of the different transmission media currently available.
  • Twisted copper pairs, fibers classic optics and recent developments.
Network characterization and architecture
  • Twisted pairs: characterization and classification: categories 5, 5E, 6, 6A, 7, 7A, 8.
  • U/UTP, F/FTP, SF/FTP cables ... Certifications de-embedded (cat5E,6), re-embedded (6A).
  • Evolution of twisted pair tests: NEXT, attenuation, delay skew, return loss…
  • Silica optical fibers: multimode and single mode (OM1, OM2, OM3, OM4. OS1. OS2).
  • VCSEL injectors for multimode fibers. Recent contributions from active optical cables, MPO/MTP cassettes.
  • The change brought by OFDM in high speeds in difficult environments (Wi-Fi, 4G, CPL, ADSL, terrestrial TNT, etc.).
Standards and performances
  • TIA/EIA, ISO/IEC standards for all computer cabling components.
  • Next evolution to 40 Gbit (40Gbase-T) of twisted pair Ethernet.
  • New advances in optical technologies.
Indoor and outdoor, local, campus and metropolitan deployments
  • Optical fibers indoors and outdoors (Campus networks, operator networks).
New networks
  • Carrier currents (IEEE P1901). Complement to copper and optical LANs.
  • Privileged targets: hotels, conferences, hospitals, museums, (surveillance camera, music and remote screens).
  • New types of fibers: FMF (restricted modes), MCF (multi-core) to increase single-mode throughput.
  • For new applications: HCF fibers (cores) hollow), microstructured fibers, bandgap fibers.
1247

Raspberry Pi 3, create your own embedded system under Linux

★★★★★

  • SII-318
  • 3 Days (21 Hours)

Description

The Raspberry Pi is an excellent platform for discovering embedded Linux, because it offers numerous input-output interfaces at a relatively low cost. You will learn to master this system to easily develop your own embedded project (home automation, media player, robotics, connected object, etc.).

Who is this training for ?

For whom

Technicians, project managers.

1248
Prerequisites

None

Training objectives

Take control of the Raspberry Pi to install a standard distribution.
Adjust and configure the system according to your specific needs.
Communicate using input-output interfaces such as RS-232, SPI, I²C, GPIO.
Develop custom applications for embedded Linux.
Recompile the system kernel and add additional drivers.

1249

Training program

Getting started with the Raspberry Pi
  • Introduction: presentation of the Raspberry Pi, the BCM2835/2836/2837 systems-on-chip and the Arm 1176 processor.
  • Linux distribution for Raspberry Pi: download, installation, test .
  • Distribution discovery: essential settings, standard tools.
  • Basic usage: system configuration, users, GUI.
  • Using Linux on Raspberry Pi: advantages and disadvantages of an SD card system.
Configuration and customization
  • Network: network configuration (Ethernet+WiFi), Internet, remote connection.
  • Network services: starting services, choice suitable for an embedded system.
  • Update: installation of packages, update.
  • Servers: configuration of a Web server on the Raspberry Pi.
  • Remote control: display offset and capture remote control.
I/O and communication interfaces
  • RS-232 interface: communication between Raspberry Pi and PC. Boot traces.
  • GPIO I/O: use from the Shell, in a Python or C program.
  • SPI: dialogue in SPI with a microcontroller.
  • I²C: interrogation in I²2 of a sensor temperature.
  • Bluetooth: identification, connection, communication.
1250
Application programming on Raspberry Pi
  • Programming in C/C++: native compilation or cross-compilation, debugging, examples.
  • Python programming: Python interpreter and modules. Graphical applications.
  • Shell scripts : example scripts for system initialization or application launch.
Advanced customization
  • Kernel recompilation: benefits of recompilation, adjusted configuration.
  • Additional drivers: compilation and installation of external drivers.
  • Configuration "from scratch
1251

Internet of Things: Summary

★★★★★

  • SII-180
  • 2 Days (14 Hours)

Description

The Internet of Things in addition to Web technology are the major tools of the new era of digital transformation. Through the Internet of Things we are researching the potential of new technologies in the Digital world and their impacts in improving the real world. This seminar is a state of the art in the emerging field of the Internet of Things. It makes it possible to offer services in many sectors such as e-health, monitoring, traceability, automation of production lines, and many other areas where technological innovation is very promising...

Who is this training for ?

For whom
This seminar is aimed at network managers, study managers, decision-makers and entrepreneurs in the field of the future Internet of Things service.
1252
Prerequisites

None

Training objectives

Evaluate the main aspects of the Internet of Things field
Identify the problem and the inherent technical solutions
Discover the advantages and disadvantages of the Internet of Things field
Judge the economic and innovation opportunities provided by the Internet of Things field
'Internet of Things

1253

Training program

Concept of Things and Internet of Things
  • Definition of the term Internet of Things (Internet of Things, Thing to Thing, Internet of Everything.
  • ).
  • Concepts, model and principles.
  • Connected object concepts (QRCode, RFID Tag, Sensor.
  • ).
  • Microcontroller architecture: microchip, digital systems (Arduino, System On Chip.
  • ).
  • Single-interface, multi-interface/multi-mode terminal.
  • Wearable terminal.
  • Around the operating system of the connected object (TinyOS, Contiki, RIOT.
  • ).
  • Electronics industry and connected objects.
  • Issues of optimized energy consumption at the level of integrated circuits.
  • Demonstration Connected watch, connected vehicle, industrial sensor, human body sensor.
1254
IoT communication features and technologies
  • Identifying Thing, Feeling Thing, and Location capabilities.
  • Inference, Smart Thinking, and Actionning capabilities.
  • Communication technologies.
  • CPL (Power Line Carrier).
  • Short-range radio communication and wireless networks: Wifi, ZigBee, HomeRF, RFID, NFC, WirelessHart.
  • Long-range mobile radio communications (LORA, SigFox, LTE NarrowBand.
  • ).
  • Notions of gateways and interaction between heterogeneous technologies.
  • Other technologies: nanotechnology.
  • Robotics, tactile Internet, augmented reality.
  • Service scenarios with technological choices.
  • Demonstration rnService scenarios and technological choices.
1255
Networking and Internet of Things Architectures
  • Limits of the IP/Internet model and energy consumption of the Internet of Things.
  • Evolution of the IP/Internet model to meet the new needs of the Internet of Things .
  • Nano-IP architecture and 6LowPan architecture.
  • Routing: ROLL.
  • IP compression.
  • Naming and identification techniques 'objects.
  • Object Name Service (ONS).
  • Service access architecture, service composition for the Internet of Things.
  • Geolocation in indoor and outdoor.
  • Object tracking.
  • Traceability and new Beaconning solutions.
  • New approaches: "Autonomic communication", "Information Centric Network".
  • Exchanges Exchanges on the main limits of the IP/Internet model.
1256
Areas of application and new services
  • Surveillance and monitoring: ecology, security.
  • Automation of processes around the person: home, in the office.
  • Automation of processes around the company and of industry: automation of production lines.
  • Automation and critical systems (CPS).
  • Automation of processes around health: e-management of patient files.
  • Automation of meter reading (electricity, water, etc.
  • ): Smart Cities.
  • Demonstration Demonstrations on the different areas of application .
1257
Standardization, Industrial Alliances, IoT Platforms and Security
  • Standardization of cellular networks (LTE Narrowband.
  • ).
  • Standardization of IoT networks (OneM2M, ITU, GS1, EPCGlobal.
  • ).
  • ITU standardization.
  • Industrial alliances: AllSeen, OIC, IPSO.
  • Communication gateway with heterogeneous technology objects.
  • One-hop or multi-hop connected object management solution.
  • IoT and Cloudification platforms (ThingWorks, Oracle, Cisco.
  • ).
  • IoT security.
  • Authentication and access control.
  • Encryption and integrity control.
  • Security and safety.
  • Data ownership and private life.
  • Collective reflection Reflection on the different alliances.
1258
Internet of Things Products on the Market
  • Connected object products with application scenarios.
  • Gateway products (Cisco, Microsoft, SAP, Oracle products.
  • ).
  • Products information storage and processing servers.
  • Specific constraints around health information.
  • Specific constraints around real-time applications, CAN BUS and embedded systems.
  • Demonstration Presentation of market products.
Internet of Things and Big Data
  • Internet of Things traffic sizing.
  • Data storage architectures.
  • Internet of Things data processing in local loop or in the Cloud.
  • Complexity management algorithms.
  • Inference approaches and algorithms.
  • Example Example of BIG DATA and Internet of Things application objects.
1259
Strategy, innovation, entrepreneurship in the IoT field
  • New needs and services.
  • Internet of Things network services.
  • Mobile and NFC banking payments.
  • Mobile payment system surveillance.
  • Location based services, Crowdsensing and Urban Sensing.
  • Network experimental platforms: Senslab, IoT Lab, Winlab, Arduino.
  • The smartphone at the center of new applications and services.
  • Innovation and entrepreneurship: WorldSensing, WiThings, SigFox.
1260

Network Administrator certification cycle professional certificate FFP

★★★★★

  • SII-181
  • 13 Days (91 Hours)

Description

This cycle will provide you with all the knowledge necessary to understand, install and administer business networks. You will learn the operation and implementation of the main network protocols such as TCP/IP, DNS, HTTP, as well as different interconnection equipment such as switches and routers. A module entirely dedicated to system and network security will complete this training cycle.

Who is this training for ?

For whom
Computer technicians.
1261
Prerequisites

None

Training objectives

1262

Training program

General principles and different networks
  • A network for what? The different elements and their role.
  • Classification of the different types of networks.
  • Advantages and disadvantages of the different technologies.
  • Share resources.
  • Nature and purpose of a protocol.
1263
Connection alternatives and local networks (LAN)
  • Twisted pair, coaxial and optical fiber.
  • Cabling principle and rule.
  • Wireless.
  • Why and when use a local network? The type of addressing of the Ethernet standard.
  • Constraints, advantages and mode of operation of Ethernet (CSMA/CD).
  • Several speeds from 10 MB to several GB (10/100 base T/Gigabit Ethernet/.
  • ).
  • Wireless local networks (802.
  • 11x).
  • The different equipment, their roles and their respective advantages.
  • Practical work Creation of a local network with switches and workstations.
  • Installing a network analyzer.
  • Configuring IP address parameters on workstations.
  • Identify and work with MAC addresses, ARP requests and the ARP table.
  • Connection tests between stations.
1264
TCP/IP and high-level protocols
  • Network addressing constraints.
  • The IP protocol.
  • The addressing plan.
  • Broadcast and Multicast .
  • The TCP and UDP protocols.
  • Concept of port number.
  • The DNS name service.
  • Role and interest .
  • The operating principles.
  • The notion of domain.
  • The DHCP server.
  • The basic principles.
  • Know how to assign IP addresses dynamically.
  • Other services provided by DHCP.
  • SMTP, POP3, IMAP4 messaging protocols.
  • HTTP, HTTPS, FTP, TELNET and SSH.
  • Practical work Example of using FTP between workstations and the FTP server (tracing and analysis of frames and packets).
  • Telnet connection to routers (tracing and analysis of frames and packets).
  • Integration of workstations as DNS and DHCP client.
1265
Cisco routers, implemented over IP
  • The architecture of a Cisco router.
  • Installation and configuration.
  • Configuring Cisco switches.
  • Configure IP routing.
  • Routing protocols.
  • RIP v1 and v2 distance vector routing.
  • EIGRP.
  • Operating principles.
  • Loop processing.
  • OSPF routing protocols.
  • Database and topology.
  • Link states.
  • Convergence.
  • Topology, tables, loops, routes, political routing.
  • Multicast routing.
  • Configure a router for WAN networks .
  • Address translation.
  • Public addresses and private addresses.
  • Access for a given application.
  • Extended Access Lists.
  • Practical work rnPhysical connection of routers.
  • Configuration of IP addresses on routers.
  • Identify and work with the MAC addresses, ARP requests and the ARP table of routers.
  • Analyze the routing table.
  • Connection tests between stations and routers.
  • Configuration of 'a translation table.'}
1266
The everyday Cisco router
  • How to recover the password.
  • Configuration register states.
  • Download a new software package version.
  • Save via TFTP.
  • Downloading a new configuration.
  • Router supervision.
  • Software verification.
  • Management modifications and configuration.
  • Security.
  • Public addresses and private addresses.
  • Maintenance techniques.
  • Recognize and repair faulty hardware components.
  • Hardware maintenance.
  • Interface testing.
  • Software maintenance.
  • Debugging.
  • Practical work Backup and reinstallation of configuration and IOS via the network.
  • Recovery after loss of IOS in Flash.
  • Recovery and replacement of word exceeds.
1267
Risks and threats, security architectures
  • Introduction to security.
  • Low-layer attacks and application attacks.
  • Which architectures for which needs? Firewall: pierre cornerstone of security.
  • Server proxy and application relay.
  • Data and exchange security.
  • Securing a system, "Hardening".
  • Daily audit and security.
  • Practical work Installation and use of Wireshark.
  • Implementation of an application attack.
  • Installing a Cache/Authentication proxy.
  • Deploying an SMTP relay and an HTTP/FTP Antivirus proxy.
  • Carrying out an attack Man in the Middle on an SSL session.
  • Implementing IPSec.
1268

Cisco, voice over IP

★★★★★

  • SII-182
  • 5 Days (35 Hours)

Description

This training covers the fundamentals of the problem of voice transport and telephony over IP. It will allow you to acquire the knowledge and skills necessary to implement voice and telephony over IP on today's networks.

Who is this training for ?

For whom
This course is intended for network technicians and engineers involved in Voice over IP technology in a Cisco environment.
1269
Prerequisites

None

Training objectives

Understand the technical aspects and analysis methods for integrating voice transport into an IP network
Know how to locate the characteristics of the different protocols
Be able to carry out sizing calculations
Master the concepts of quality of service, reservation (RSVP ) and architecture Diffser
Be able to choose VOIP technologies adapted to your needs

1270

Training program

Reminders on traditional telephony
  • Standard components.
  • Role and operation of a PBX.
  • The principles of signaling.
  • Multiplexing techniques.
  • The usual interfaces.
Telephone signaling
  • The principles of telephony on packet networks.
  • The T1 and E1 interfaces.
  • CSS, ISDN, QSIG, SIGTRAN and SS7 signaling.
Configuring voice interfaces
  • Configuration of FXS, FXO and E&M interfaces.
  • Configuration of timers.
  • Configuration of digital ports.
  • Configuration of ISDN interfaces.
  • Configuring CCS options.
  • Voice quality improvement techniques.
  • Monitoring and Troubleshooting interfaces.
1271
Transport of voice in packets
  • Problem.
  • The principles of voice digitization.
  • The main Codecs.
  • The constraints inherent to VoIP.
  • The components.
  • The RTP, RTcP, CRTP protocols.
  • Calculation of the necessary bandwidth.
  • VoIP security.
Fax over IP
  • The T38 and T37 standards.
  • The Fax Pass-Through technique.
1272
QoS techniques
  • Principles of QoS.
  • Definitions.
  • Mechanisms of network congestion.
  • The causes of network congestion.
  • Presentation of the different QoS models.
  • The Integrated Services model: the RSVP protocol.
  • The Differentiated Services Model: classification, marking, ToS / DSCP / CoS, 802.
  • 1p, PQ, CQ, WFQ, CB-WFQ, etc.
The H323 protocol
  • Presentation of the H323 protocol.
  • The components of the architecture.
  • Establishing a direct call.
  • Establishing a call via a Gatekeeper.
  • Role and operation of an MCU.
  • Protocol configuration.
  • Monitoring and Troubleshooting of H323.
1273
The SIP and MGCP protocol
  • Presentation of the SIP and MGCP protocols.
  • The components of the architecture.
  • The different addressing.
  • Direct call and via a proxy.
  • Configuring SIP and MGCP.
1274

Cisco switches, multi-tier networks

★★★★★

  • SII-183
  • 4 Days (28 Hours)

Description

At the end of this course you will be able to implement a level 2 switched network and ensure its reliability through redundancy. You will also see how to implement the QoS necessary for VoIP processing, as well as how to secure the ports of a switch.

Who is this training for ?

For whom
Network technicians and administrators.
1275
Prerequisites

None

Training objectives

Deploy Enterprise Network Infrastructure with Cisco Multi-Tier Switches Configure distribution and access switches Securing switch ports Implement redundant Ethernet switching Implement QoS

1276

Training program

Campus networks
  • Evolution of LANs.
  • Bridging, routing and switching.
  • Advantages and disadvantages of the different possibilities.
  • Choose a suitable solution.
  • Organization of a network of switches.
  • Topology rules.
1277
Building a campus network
  • The elements of the physical layer.
  • From 10MB Ethernet to Gigabit Ethernet.
  • Full Duplex Ethernet.
  • Principles and protocols.
  • Virtual LAN: VLAN.
  • VLAN design criteria (ports, addresses).
  • Extended virtual LANs.
  • VLAN Truncking Protocol (VTP).
  • Mobile access assignment.
  • Dynamic Trunk Protocol (DTP).
  • Cisco Discovery Protocol (CDP).
  • Switch-to-switch link.
  • Inter Switch Link (Cisco ISL) or 802.
  • 1.
  • q (IEEE standard ).
  • Link grouping: Ether Channel.
  • Practical work Configuration of a switched network.
  • Implementation of interconnected virtual LANs.
  • VTP configuration.
1278
Management of redundant links
  • Spanning Tree Protocol (STP).
  • Principles, algorithm.
  • Configuring a redundant topology.
  • Implementation precautions.
  • Impact on convergence.
  • PVST+ (Per VLAN Spanning Tree), evolution of Spanning Tree.
  • Inter-VLAN routing.
  • Define working groups.
  • Practical work Redundant Gigabit interconnections of switches.
  • Implementation of STP.
  • Configuration of priorities, management of emergency.
  • Incident handling based on settings.
1279
Traffic management
  • VLAN-to-VLAN traffic.
  • Integration via a backbone.
  • IP routing performance with multi-level switching.
  • Storm management and associated actions.
  • Configuration of quality of service for data traffic and VoIP traffic.
  • 802 service classes.
  • 1P and their DSCP mapping.
  • Flow marking, prioritization and resource reservation.
  • VoIP VLAN.
  • MPLS (Multi Protocol Label Switching) contributions.
  • IP Switches.
  • Practical work Implementation of different traffic.
  • Performance comparison.
1280
Reliability
  • The HSRP (Hot Standby Routing Protocol).
  • Implementation of a reliable solution.
  • Validation of failovers.
  • Practical work Configuration of a switch control cluster with transparent fallback by HSRP.
  • Validation of failovers.
  • Configuration of priorities and preemption.
Network Access Control
  • Filtering mechanisms.
  • Traffic filtering.
  • Standard lists, extended.
  • By address, port, applications, flows.
  • Secure ports and associated actions.
  • Practical work Implementation of access protection by criteria.
  • Filtering on physical access.
  • Traffic filtering.
1281

Cisco Firewall ASA, configuration et administration

★★★★★

  • SII-184
  • 4 Days (28 Hours)

Description

This training will allow you to acquire all the knowledge necessary to deploy and maintain a security solution based on Cisco ASA. At the end of this course, you will see how to configure essential functions using a WEB interface with ASDM (Cisco Adaptive Security Device Manager) and CLI command line, configure dynamic and static address translations and carry out the first maintenance operations.

Who is this training for ?

For whom
Security manager. Systems and network engineer. Security architect. Network or security technician.
1282
Prerequisites

None

Training objectives

Know the functionalities of the Cisco ASA firewall Configure an ASA firewall Configure essential functions using ASDM and CLI Configure access policy based on ACLs (Access Control Lists) Analyze and restrict the flow (incoming and outgoing) Configure a VPN for remote access Optimize security rules

1283

Training program

Introduction
  • The technologies and characteristics of firewalls.
  • Presentation of firewalls.
  • Terminology and functionalities.
  • Architecture examples.
  • The ASA range.
  • Starting with an ASA.
  • The user interface.
  • Firewall configuration.
  • NTP configuration.
  • ASA security levels.
  • Syslog configuration.
  • Practical work Basic configuration of an ASA.
1284
Address translation and connections
  • Dynamic NAT, PAT and Static NAT.
  • The TCP Intercept function.
  • Connections, port forwarding.
  • DMZ configuration.
  • Practical work Configuration of an ASA in PAT with two and three interfaces.
  • Publishing a Web server.
ACL et Content Filtering
  • ACL Overview.
  • Configuring ACLs.
  • Malicious Active Code Filtering.
  • URL Filtering.
  • Object groups.
  • Presentation of object groups.
  • Uses.
  • Configuration of object groups.
  • Practical work HTTP and FTP network traffic filtering.
  • Creation and use of object groups in ACLs.
1285
Configuration AAA
  • Cisco Secure ACS Overview.
  • Installing Cisco Secure ACS.
  • Configure Authentication and Authorization.
  • Downloading the ACL.
  • AAA troubleshooting.
  • Practical work Installing CSACS.
  • Configuring ASA in AAA.
Routing and switching
  • Reminders about VLANs.
  • Supported features.
  • Static and dynamic routing.
  • Multicast.
  • Practical work Configuration of ASA in multi-VLAN, RIPv2 and OSPF.
1286
VPN
  • Setting up VPNs.
  • Configuring IPSec.
  • The Cisco VPN client.
  • Configuring remote access with Easy VPN.
  • Easy VPN server configuration.
  • Easy VPN remote features.
  • Client overview and configuration.
  • Presentation and configuration of WebVPN.
  • Practical work Setting up a site-to-site VPN, VPN remote access and WebVPN.
Transparent firewall
  • Transparent vs.
  • Routed firewall.
  • Unsupported features.
  • Configuring IP addresses, ACLs and ARP.
  • Maintenance and troubleshooting.
  • Practical work Setting up a transparent firewall.
1287
Failover
  • Presentation of Failover modes.
  • Configuring Failover and Lan Failover.
  • Setting up the Failover.
  • Configuring Failover .
  • Configuration of Lan Failover.
  • Setting up the Failover in Active/Active mode.
  • Practical work Setting up a failover in Active/Standby mode, as well as in Active/Active mode.
Cisco Security Appliance Device Manager
  • Using ASDM for configuring ASA.
  • Creating site-to-site VPN and remote access VPN.
  • Practical work Installation of ASDM.
  • VPN Configuration.
1288
Maintenance
  • Access configuration.
  • Privilege levels.
  • Password Recovery.
  • IOS management.
  • Configuration management.
  • License management.
  • Practical work IOS update.
  • Configuration backup .
  • Password Recovery.
1289

Cisco ICND2, CCNA Routing & Switching, certification preparation

★★★★★

  • SII-185
  • 5 Days (35 Hours)

Description

This training will allow you to acquire all the techniques and methodologies necessary to pass the ICND2 exam to obtain CCNA certification. It will teach you how to design and manage a medium-sized enterprise network and show you problem-solving techniques.

Who is this training for ?

For whom
Network engineers/administrators and technicians
1290
Prerequisites

None

Training objectives

Identify advanced switching technologies
Implement EIGRP and OSPF routing protocols
Troubleshoot and resolve routing issues
Configure different encapsulation types: HDLC, PPP, Frame relay
Prepare for ICND2 certification exam/ CCNA

1291

Training program

Ethernet switching
  • Identify advanced switching technologies.
  • The IEEE 802 Spanning-Tree Protocol (STP).
  • 1D, root bridge election.
  • IEEE 802 Rapid Spanning-Tree Protocol (RSTP).
  • 1w.
  • Aggregate links with Etherchannel.
  • Troubleshooting LAN switching.
  • Practical work rnModify the default behavior of STP in order to impose the choice of a primary root switch, a secondary root switch.
  • Configure PortFast, RSTP.
IP routing
  • The startup sequence of a CISCO router under IOS.
  • Management of IOS images, licensing.
  • Routing methods, routing protocols, distance concepts administrative, metric, horizon sharing.
  • The EIGRP routing protocol, notions of feasible distance, feasible successor, feasibility condition.
  • The OSPF routing protocol, theory, OSPF states, notions of Router ID, adjacency, types of LSA.
  • Implementation of OSPF v2, v3 in a multi-area context.
  • Practical work Configure and troubleshoot EIGRP then OSPF in a pre-built topology on a simulator.
1292
Wide-area network technologies
  • Identify the different WAN technologies and their areas of use: Metro Ethernet, MPLS, T1/E1, DSL, Frame Relay.
  • Configure and verify a WAN serial link between two routers .
  • Configure and verify a PPP link between two routers.
  • Frame Relay, concepts, configuration and troubleshooting.
  • Implement and troubleshoot PPPoE.
  • Practical work Configure different types of encapsulation (HDLC, PPP, Frame relay) on the WAN links of a pre-built topology on the simulator.
Troubleshooting training
  • How to troubleshoot and resolve issues caused by the Spanning-Tree protocol? Learn how to troubleshoot and resolve routing issues.
  • Learn how to troubleshoot and resolve issues caused by routing between VLANs.
  • Troubleshoot and resolve problems caused by the implementation of WAN wide networks.
  • Practical work Training on preconfigured problems on simulators.
Final preparation
  • Activities allowing the revision and memorization of the subjects of each chapter.
  • Practice on MCQs and LAB.
  • Scenario Intensive test session in conditions similar to examination with collective exploitation of the results.
1293

Cisco ROUTE, CCNP Routing & Switching, preparation for certification

★★★★★

  • SII-186
  • 5 Days (35 Hours)

Description

In this training, you will acquire all the techniques and methodologies necessary to take the ROUTE exam to obtain CCNP certification. You will learn advanced routing concepts and their implementation with Cisco routers in small and large enterprise networks.

Who is this training for ?

For whom
Network engineers/administrators and technicians.
1294
Prerequisites

None

Training objectives

In this training, you will acquire all the techniques and methodologies necessary to take the ROUTE exam to obtain CCNP certification
You will learn advanced routing concepts and their implementation with Cisco routers in small and large enterprise networks

1295

Training program

Plan routing services
  • How to assess needs? The case of complex business networks.
  • What is the methodology to adopt? The case of remote sites, connection through the Internet , VPN.
EIGRP
  • EIGRP CCNA reminders, overview.
  • EIGRP neighbor relationships, established via WAN links.
  • Constructing the EIGRP topology table and the routing table, convergence optimization.
  • Plan the deployment of EIGRP.
  • Practical work Verifying the operation of EIGRP and troubleshooting in several pre-built scenarios on the simulator .
Multi-area network with OSPF protocol
  • Neighborhood and adjacency relationships on LAN and WAN.
  • The Link State database, LSAs, exchange and update processes.
  • Implementation of different types of areas, virtual links.
  • Configure and verify OSPF authentication.
  • Practical work rnVerification of the operation of OSPF and troubleshooting in several pre-constructed scenarios on the simulator.
Path Control
  • The basics of route redistribution.
  • Redistribution in EIGRP and OSPF.
  • Redistribution using route maps and lists
  • Policy-based conditional routing.
1296
Connect the corporate network to an ISP network, BGP protocol
  • Routing in the Internet, how to keep routing tables of acceptable size.
  • Introduction to BGP, routing to the Internet.
  • External/ Internal BGP, enterprise perspective, check BGP table, inject routes into BGP.
  • Influence the enterprise's choice of outbound routes, influence the choice of inbound routes with MED.
  • Practical work Verification of the operation of BGP and configuration in several pre-constructed scenarios on the simulator.
The IPv6 protocol
  • Global addressing, routing and subnetting, SLAAC, Stateless DHCP, Stateful DHCP.
  • Routing protocols RIPng, EIGRP, OSPF v3.
  • Static routes, redistribution of routes.
  • IPv4 and IPv6, cohabitation, migration.
  • Static point-to-point tunnels 6in4, GRE, dynamic multipoint 6to4, ISATAP.
  • Practical work rnImplementation of IPv6 on routers, encapsulation of IPv6 in IPv4.
1297

Cisco SWITCH, CCNP Routing & Switching, preparation for certification

★★★★★

  • SII-187
  • 5 Days (35 Hours)

Description

This internship will allow you to acquire all the techniques and methodologies necessary to pass the SWITCH 2.0 exam to obtain CCNP R&S certification. You will learn to plan, configure and verify the implementation of complex Cisco Enterprise Campus switched network infrastructures.

Who is this training for ?

For whom
Network engineers/administrators and technicians.
1298
Prerequisites

None

Training objectives

Implement VLANs and inter-VLAN routing
Implement Spanning-Tree
Implement VLANs and inter-VLAN routing in a campus network
Master security features in a switched network
Prepare for the exam SWITCH/CCNP certification

1299

Training program

Campus network
  • The architecture of a campus network.
  • Design.
  • Layer 2 switching, multilevel switching.
  • Switching in complex architectures .
  • Memory resource management, SDM models.
VLANs and the campus network
  • Virtual LAN, static, dynamic VLANs, VMPS.
  • VLAN Trunks, ISL, 802.
  • 1Q, VLAN Trunk Configuration.
  • VTP - VLAN Trunking Protocol, configuration.
  • Link aggregation with EtherChannel, traffic distribution.
  • Practical work Integration of several level 2 and 3 switches in a campus network, configuration trunk links, on simulator.
1300
The Spanning-Tree Protocol
  • IEEE 802.
  • 1D, overview.
  • Different types of STP.
  • Configuration, topology administration and the election of the root bridge.
  • Convergence time optimization, STP timers, PortFast mechanisms, UplinkFast, Backbone Fast.
  • The Rapid Spanning-Tree and the Multiple Spanning-Tree.
  • Practical work Implementation of different Spanning-Tree scenarios.
Multi-level switching
  • Inter-VLAN routing.
  • Configure DHCP (IPv4, IPv6, relay).
  • Configuration of ports in layers 2 and 3, concept of SVI.
  • Multi-level switching with CEF, FIB.
  • Practical work Implementation of IPv6 Stateless Autoconfig associated with DHCPv6 Lite.
Monitor campus networks
  • Time stamp SYSLOG messages with NTP, SNTP.
  • SNMPv3 protocol, overview and configuration.
  • Monitor performance with IP SLA probes.
  • Monitor traffic using traffic mirroring.
  • Practical work Monitor traffic local to the switch, monitor traffic when source and destination are placed on different switches.
1301
High Availability (HD) Networks
  • How to implement HD in a network?rnLeverage logical switches, StackWise, VSS.
  • Supervisor redundancy, RPR, SSO, NSF.
  • The VRRP and GLBP protocols.
  • Configuration.
  • Practical work rnImplementation of 'a redundant HSRP gateway for IPv4 and IPv6 on 2 multilevel switches.'}
Security management in a campus network
  • Security issues impacting switches.
  • Identity theft, how to protect yourself? Secure access from the switch port with 802.
  • 1X.
  • The Storm Control mechanism.
  • Security with VLANs, securing trunk links.
  • Mechanisms to fight against theft.
  • Practical work Integrating security.
1302

Cisco TSHOOT, CCNP Routing & Switching, certification preparation

★★★★★

  • SII-188
  • 5 Days (35 Hours)

Description

This training will allow you to acquire all the techniques and methodologies necessary to pass the TSHOOT 2.0 Cisco exam. You will learn to identify and resolve problems that may arise as well as the maintenance operations necessary for the proper functioning of a complex network.

Who is this training for ?

For whom
Network engineer/administrator and technician.
1303
Prerequisites

None

Training objectives

1304

Training program

Network maintenance
  • Maintenance methods.
  • Plan maintenance operations.
  • Identify common procedures to apply.
  • Toolbox: essential applications and tools.
Network Troubleshooting
  • Common troubleshooting methods (top-down method).
  • The steps that mark the process from collecting information to resolving the problem.
  • Impact of troubleshooting on maintenance procedures.
  • Updating network documentation.
  • Establishing a functional reference level.
  • Case study Discuss the benefits of different troubleshooting approaches based on a collection of observations of a network problem.
Means necessary for network maintenance and troubleshooting
  • Toolbox for maintenance and troubleshooting.
  • Diagnostic tools offered by CISCO IOS.
  • Other more specific tools including the tools
  • SNMP and Netflow: creating a functional reference level.
1305
Maintenance and troubleshooting of switched campus networks
  • How to troubleshoot VLANs, VTPs and trunks? Resolving issues related to Spanning-Tree and Aggregated Links in Layer 2 (Layer 2 Etherchannel).
  • Problems arising from inter-Vlan routing and aggregated links in Layer 3 (Layer 3 Etherchannels).
  • HSRP, VRRP, GLBP protocols: detect and resolve problems.
  • Resolve problems that degrade performance switches.
Routing Maintenance and Troubleshooting
  • Issues concerning addressing in IPv4, DHCP, NAT.
  • Issues concerning addressing in IPv6, the NDP protocol, SLAAC, Stateful DHCPv6.
  • The issues problems concerning access lists in IPv4, in IPv6, prefix lists.
  • Troubleshoot static IPv4, IPv6 routes as well as IPv6 tunnels in IPv4 or in GRE.
  • Troubleshooting RIPv2, RIPng, EIGRP, OSPF, BGP protocols in both IPv4 and IPv6.
  • Resolving route redistribution issues.
  • Performance issues.
Problems arising from management protocols
  • Problems with Syslog, NTP, SNMP protocols.
  • Problems arising from SLA probes, SPAN and RSPAN tools.
  • Problems arising from access to equipment console, vty, Telnet, SSH, AAA.
1306

Cisco ICOMM, CCNA Voice, certification preparation

★★★★★

  • SII-189
  • 5 Days (35 Hours)

Description

This training will allow you to acquire all the techniques and methodologies necessary to pass the ICOMM exam to obtain CCNA certification. You will learn the architecture, functionalities and daily administration of these different communication solutions.

Who is this training for ?

For whom
Network engineer/administrator and technician.
1307
Prerequisites

None

Training objectives

A Describe the components of the Cisco Unified Communications architecture
Implementing a system using UC 500 Cisco Configuration Assistant
Implementing Cisco Unity Express in a Cisco Unified Communications Manager Express environment using CLI commands
A Perform basic maintenance and operations tasks to support UC 500 and Cisco Unified Communications Manager express deployments

1308

Training program

Reminders on traditional telephony
  • Standard components.
  • The role and operation of a PBX.
  • The principles of signaling.
  • Multiplexing techniques .
The Cisco unified communications solution
  • Architecture components.
  • How voice is transported.
  • Types of signaling.
  • Quality of Service (QoS) .
  • What are the QoS mechanisms? How to implement it within our network.
L'interface CUCM (Cisco Unified Communications Manager)
  • Presentation of the graphical interface for administration.
  • Administration using the command line.
  • How to define user access rights .
  • The other elements: CUCME, CUE, CUCX and CUPS.
1309
Flowcharts with CUCM and CUCM Express
  • How to establish call legs.
  • Configuration of Dial-peer pots and VoIP on CUCME.
  • Configure the applications.
  • How to route calls with CUCM.
  • Perform extension groups.
  • Notion of Region, Location and CAC with CUCM.
Administrative tasks
  • How to administer terminals.
  • Recurring tasks to administer user accounts.
  • Know how to register an IP phone on CUCM and CUCME.
Features available to users
  • What are the telephone functions on CUCM and CUCME.
  • Learn how to configure them.
  • The extension and Unified Mobility.
1310
Le « Cisco Unity Connection » et « Cisco Unified Presence »
  • How to set up CUC and CUP.
  • Implementation of the procedure.
  • The characteristics of user mailboxes.
  • How to configure voicemail boxes.
  • The different options for configuring user mailboxes in CUCX.
  • Presentation of the architecture and user management with Cisco Unified Presence.
Maintenance and troubleshooting
  • Maintenance operations.
  • How to troubleshoot phone registration and QoS issues.
  • Reporting with Cisco Unified Reporting, CDR Analysis and Reporting , Cisco Unified Real-Time Monitoring Tool.
  • Voicemail monitoring in Cisco Unity Connection.
  • Disaster Recovery System.
1311

Juniper, introduction to the JunOS operating system

★★★★★

  • SII-337
  • 1 Days (7 Hours)

Description

This training will allow you to acquire the necessary skills and knowledge on JunOS product families. You will learn about user interface options, configuration tasks, secondary system configuration, and the basics of monitoring and maintenance.

Who is this training for ?

For whom

Navigate the JunOS user interface (CLI) Manage basic operations of the Juniper OS and its devices Configure and control network interfaces

1312
Prerequisites

None

Training objectives

Basic knowledge of enterprise networks and TCP/IP

1313

Training program

JunOS fundamentals
  • The JunOS operating system.
  • A modular software architecture: highly available software, version evolution, compatibility.
  • Traffic management, routing engine , packet forwarding engine.
  • Starting and stopping a Juniper device.
User interface
  • Console access, management port, Web interface (J-Web).
  • The command line interface: the CLI interface.
  • Move to the different levels of the hierarchy.
  • The different keyboard shortcuts.
  • Adding comments, filtering the result.
  • The operating mode, the configuration mode (active configuration, candidate configuration).
  • Practical work Connect to the CLI interface.
  • Navigate the interface and the different menus.
  • Using the first commands: add a time zone, change the date.
1314
The initial setup
  • Composition and structure of a configuration (blocks.
  • ).
  • The factory configuration.
  • The initial configuration.
  • Interface configuration.
  • Validate changes under JunOS: validate, delete modifications.
  • Practical work Display the active configuration, modify the host name, show interface configuration.
  • ).
  • Filter result.
1315
Configuration, operational control and maintenance
  • User configuration, their authentications.
  • Event logging and tracing.
  • Virtual network or Virtual LAN (VLAN) configuration with JunOS.
  • Time configuration, NTP protocol.
  • Monitoring, SNMP protocol.
  • Archiving configurations.
  • Monitoring platforms and operation of the interface.
  • Network utilities.
  • Maintenance of the JunOS system Practical work Archiving the configuration.
  • Configure the system.
  • Add a password to root.
  • Recover a password.
  • Modify and validate settings.
1316

Juniper, routing and switching, improvement

★★★★★

  • SII-332
  • 5 Days (35 Hours)

Description

This advanced level course will allow you to master the concepts of distance vector, link state and path vector protocols. You will also learn the characteristics of RIP, OSPF and BGP routing protocols, the mechanisms of IP switching and the design of VPNs.

Who is this training for ?

For whom

Network engineer/administrator and technician.

1317
Prerequisites

None

Training objectives

Master advanced routing and switching techniques
Configure a multi-area OSPF network with redistribution of static routes and RIP
Configure a Mutli-AS network with BGP routing, with OSPF in IGP
Implementation of MSTP and VSTP
Implementation of quality of service at levels 2 and 3 on the same IP network

1318

Training program

Routing infrastructure in JUNOS
  • Static, aggregated, generated routes.
  • Multiple instance routing tables, VRF.
  • Load sharing and filtering routing.
  • IP tunnels: GRE, IP-IP.
  • IPSec introduction.
  • Practical work Configuration of aggregated routes, summarized announcements, virtual routers, configuration of a GRE tunnel.
Advanced OSPF and multi-area
  • Link state routing theory-OSPF: detailed review.
  • Reminders on basic single-area OSPF.
  • Multi-area OSPF, redistribution of external routes.
  • Configuration of advanced features (Stub Area, NSSA, Authentication).
  • Practical work Configuration of a multi-area OSPF network with redistribution of static routes and RIP.
BGP path vector routing
  • BGP, Autonomous Systems and the Internet.
  • Basic BGP configuration, INGP and EBGP.
  • BGP attributes review, advanced features.
  • Advanced BGP: route reflectors and confederations.
  • Practical work Configuration of a multi-AS network with BGP routing, with OSPF in IGP and route reflectors.
1319
Multicast routing
  • Multicast at levels 2 and 3, the protocols and their merits.
  • The PIM protocol in Dense mode.
  • Intelligent Pim: Sparse and Sparse-dense modes.
  • Practical work Implementation of a multicast routing network in dense mode, then sparse.
Advanced Ethernet Swinging
  • VLAN assignment by filtering.
  • Private VLAN.
  • Automated VLAN management: the MVRP protocol.
  • Tunneling at level 2 : Q-in-Q.
  • Practical work Use of VLAN/filtering, Private VLAn, management by MVRP, use of Q-in-Q.
Advanced Spanning Tree Protocol
  • The weaknesses of the Spanning Tree (STP).
  • Rapid Spanning Tree (802.
  • 1D-2004).
  • Multiple Spanning Tree (802.
  • 1Q-2003) and the VSTP exception.
  • Protection against attacks on STP.
  • Practical work Implementation of MSTP and VSTP.
1320
Quality of service at levels 2 and 3
  • Guarantee the highest and most reliable throughput possible through an IP fabric.
  • QoS: classification, classes, queues, priorities, congestion, scheduling, BA rewriting.
  • 1p).
  • Layer 3 configuration (DSCP, TOS, IP precedence).
  • Practical work rnImplementation of quality of service at both levels on the same IP network.
1321

ISO 27001 Foundation

★★★★★

  • SII-423
  • 2 Days (14 Hours)

Description

The ISO/IEC 27001 Foundation training allows you to learn the basic elements to implement and manage an information security management system as specified in ISO/IEC 27001. During this training, you will be able to understand the different modules of the ISMS, including the ISMS policy, procedures, performance measures, management commitment, internal audit, management review and 'continuous improvement. After completing this course, you can sit for the exam and apply for the “PECB Certified ISO/IEC 27001 Foundation” credential. A PECB Foundation certificate shows that you have understood the fundamental methodologies, requirements, framework and management approach.

Who is this training for ?

For whom
  • RSSI.
  • Risk Manager.
  •  IT directors or managers.
  • MOE/MOA
  • Engineers or Security correspondents.
  • Project managers
  • Internal and external auditors.
  • Future “auditees”.
1322
Prerequisites

None

Training objectives

  • Understand the elements and operations of an information security management system (ISMS)
  • Recognize the correlation between ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
  • Understand the approaches, standards, methods and techniques used for the implementation and management of an ISMS

1323

Training program

Day 1: Introduction to information security management system (ISMS) concepts required by ISO/IEC 27001
Day 2: Information Security Management System Requirements and Certification Exam
1324

★★★★★

  • SII-422
  • 5 Days (35 Hours)

Description

Who is this training for ?

For whom
1325
Prerequisites

Training objectives

1326

Training program

1327

PCI-DSS: protection of bank card data, summary of control points and compliance

★★★★★

  • SII-361
  • 2 Days (14 Hours)

Description

This training will allow you to understand the new version of the PCI-DSS standard relating to the protection of bank account data, including card payment and the key security elements necessary to bring your business into compliance, while taking into account specificities of its context.

Who is this training for ?

For whom

CISO or security correspondents, security architects, security engineers, project managers (MOE, MOA) who must integrate regulatory security requirements.

1328
Prerequisites

Good knowledge in IT security management.

Training objectives

Understand the protection of banking data
Understand the current PCI-DSS 3.x standard and prepare for version 4.0
Implement PCI compliant security solutions
Define your company's compliance project

1329

Training program

Introduction
  • The participation of the brands VISA, MASTERCARD, AMEX, etc.
  • The relationship between PADSS and PCI DSS.
  • Understand the ecosystem of players (QSA, ASV , certified publishers).
  • The DSS standard and other PCI standards (PA DSS, PTS, CP, etc.).
Preparing your project
  • To be or not to be PCI DSS? merchant, PSP, issuing bank and/or acquirer, third-party supplier.
  • The different contexts of applicability of the regulations, the role of brands .
  • The “right” choice of scope: from “flat network” to “controlled network”.
  • The impact of PCI DSS on virtualization choices.
  • Sharing PCI security in the cloud: which cloud service to choose?
  • The available documentary base.
  • Know how to use the FAQ and official guidance.
  • At what point in the project should I seek the informed advice of QSA auditors.
The twelve “historical” requirements of the PCI DSS standard
  • Condition 1: Install and manage a firewall configuration to protect CB data.
  • Condition 2: Do not use default system passwords and other security settings.
  • Condition 3: Protect stored cardholder data.
  • Condition 4, 5, 6, 7, 8, 9, 10, 11 and 12.
1330
Compliance objectives and certification
  • The scope of the evaluation of conformity with the conditions of the PCI DSS standard.
  • The unquestionable choice of devices in contaminating and contaminated areas.
  • Preparing for SAQs: carry out a self-assessment and a mock audit.
  • Carry out official pentests and vulnerability scans.
  • Prepare for compliance audits and anticipate deviations.
  • The obligatory presentation of its AOC to the stakeholders.
Managing your PCI-DSS project
  • Adopt the priority approach proposed by PCI.
  • Avoid a tunnel effect to your project: the steps towards the AOC.
  • Define a road map towards PCI DSS certification.
  • The PCI-DSS standard in relation to global SSI compliance.
  • QSA auditors and preparation of the testing methodology.
  • The maintaining compliance over time: assess recurring costs.
  • Anticipate the new features of version 4.0 in order to maintain compliance in 202x.
  • The necessary links between projects under PCI compliance .
1331

Server Virtualization Training with Hyper-V and System Center 2012 R2

★★★★★

  • SII-298
  • 5 Days (35 Hours)

Description

This course is delivered according to the terms defined by Microsoft: in collaboration with a training center approved by Microsoft Learning, Microsoft Certified Trainer, Microsoft Official Lab, Microsoft Official Course Support. At the end of this training, participants will learn how to use System Center Virtual Machine Manager to optimally manage and distribute hardware resources and virtual machines.

Who is this training for ?

For whom

This training is aimed at system engineers responsible for planning and implementing a virtualized environment in business.

1332
Prerequisites

Basic knowledge of Windows 2012 administration.

Training objectives

Learn how to install and manage a Microsoft virtualization platform using Hyper-V

Be able to use System Center Virtual Machine Manager to manage virtual machines

Learn how to monitor a network of virtual machines using System Center Operation Manager

Develop the skills to manage storage infrastructure and networking with System Center 2012 R2 VMM

1333

Training program

1) Microsoft virtualization products
  • The System Center 2012 R2 application.
  • Identify virtualization-compatible components.
  • Virtualization and the Cloud.
2) Virtualization with Hyper-V
  • Installation procedure and configuration of Hyper-V.
  • Disks and virtual machines (VMs).
  • The network of virtual machines
  • Practical work
3) High Availability and Clustering with Hyper-V
  • High availability in a virtualized environment.
  • Moving virtual machines.
  • Replicating virtual machines.
  • Shared storage.
  • Practical work
4) System Center 2012 R2 Virtual Machine Manager
  • System Center and server virtualization.
  • Getting started with the application.
  • Hosting servers and server groups.
  • Storage and network management with SC 2012 R2 VMM
  • Practical work
1334
5) VM management with System Center 2012 R2 VMM
  • VM administration.
  • Creation, cloning and conversion of VMs.
  • How to update VMs?
  • The library, profiles and VM models.
  • Practical work
6) Cloud management with System Center 2012 R2 VMM
  • Cloud concepts.
  • User roles and administration delegation.
  • Service management with SC 2012 R2 VMM and App Controller.
  • Know how to use SC 2012 R2 App Controller
  • Practical work
7) Protection and monitoring of virtualization infrastructure
  • Back up and restore VMs.
  • Protect infrastructure with Data Protection Manager.
  • Monitoring and performance with System Center Operations Manager
  • Practical work
1335

ISO 27034, application security, Lead Implementer, certification

★★★★★

  • SII-361
  • 5 Days (35 Hours)

Description

This intensive course will allow you to understand the principles and concepts of application security according to ISO 27034. You will learn how to implement this standard within organizations to help them integrate security into applications throughout of their development cycle.

Who is this training for ?

For whom

IS managers, project managers, software developers, application owners, IS managers, IS architects, programmer/tester analysts.

1336
Prerequisites

None

Training objectives

Understand the implementation of SA according to the international standard ISO/IEC 27034

Obtain an understanding of the concepts, approaches, standards, methods and techniques required to effectively manage AS

Understand how the SA integrates risk management, controls and compliance with third party requirements

Acquire the necessary expertise to help an organization implement, manage and maintain its SA, according to ISO 27034

Acquire the expertise necessary to manage a team that will implement ISO 27034

Advise organizations on recommended practices for Security management

Application Improve your analysis and decision-making capacity in an Application Security context

1337

Training program

Introduction to Application Security concepts
  • Introduction to Application Security and the global vision provided by ISO/IEC 27034.
  • Review of the fundamental principles of information security.
  • Concepts , principles, definitions, scopes, components, processes and actors involved in Application Security.
  • Implicit, integrated concepts.
  • Presentation of the 27034 series: organization, projects, validation/verification /certification, structure, XML schemas.
Implementation of Application Security based on ISO/IEC 27034
  • Goals of Application Security at the level of an organization.
  • The Normative Framework of the Organization (CNO).
  • The CNO committee.
  • The NOC management process.
  • The integration of ISO/IEC 27034 elements into the organization's existing processes.
  • Design, validation , implementation, verification, operation and evolution of CSAs.
  • CSA library and traceability matrix.
  • Draft the certification process.
Implementation of application security based on ISO/IEC 27034 (continued)
  • The process of managing the security of an application.
  • Delivering and operating an application.
  • Maintaining the current trust level at the target trust level.
  • SA validation development.
1338
Application security validation
  • Internal application security audits.
  • Minimize the cost of an audit.
  • Ensure that all evidence is available.
  • Validation and certification of application security according to ISO 27034: organization and project.
CSA protocols and data structures
  • A free formal language for communicating: CSA.
  • XML schemas offered by ISO 27034 (data structure, descriptions, graphic representation).
Guides for specific organizations and applications
  • 27034 to help resolve the establishment of CSAs meeting the requirements of conflicting laws in an application.
  • Develop CSAs.
  • Acquire CSAs.
Certification exam
  • Examen Examen de certification ISO 27034 Lead Implementer.
1339

ISO/IEC 27032 Lead Cybersecurity Manager

★★★★★

  • SII-422
  • 5 Days (35 Hours)

Description

By following this intensive training, you will be able to acquire the skills and knowledge necessary to set up and manage a cybersecurity program based on the ISO 27032 standard. In addition, this training will allow you to obtain the ISO 27032 certification.

Who is this training for ?

For whom
  • Cybersecurity professionals
  • Information security experts
  • Project managers and IT security consultants.
1340
ISO 27032, lead cybersecurity manager, cybersecurity, IT manager, systèmes informatiques Prerequisites

Training objectives

This in-depth training will allow you to understand in detail the components and operations of a cybersecurity program compliant with ISO/IEC 27032 standards and the NIST Cybersecurity Framework

You will be able to know the objectives, content and correlation between these operational standards and frameworks, as well as with other standards and frameworks
Additionally, you will be able to master the concepts, approaches, standards, methods and techniques to effectively establish, implement and manage a cybersecurity program within an organization

You will be able to interpret the ISO/IEC 27032 guidelines in the specific context of your organization

You will also gain the expertise necessary to plan, implement, manage, control and maintain a cybersecurity program in accordance with the specifications of ISO/IEC 27032 and the NIST Cybersecurity Framework

Finally, you will be able to advise an organization on best practices for managing cybersecurity

1341

Training program

Day 1: Introduction to cybersecurity and related concepts, as recommended by ISO/IEC 27032
    • Course objectives and structure.
    • Standards and regulatory frameworks.
    • Fundamentals of cybersecurity.
    • Cybersecurity program.
    • Launching a cybersecurity program.
    • Analyzing the organization.
    • Leadership.
Day 2: Cybersecurity policies, risk management and attack mechanisms
    • Cybersecurity policies.
    • Cybersecurity risk management.
    • Attack mechanisms.
Day 3: Cybersecurity control measures, information sharing and coordination
    • Cybersecurity control measures.
    • Information sharing and coordination.
    • Training and awareness program.
Day 4: Incident management, follow-up and continuous improvement.
    • Business continuity.
    • Cybersecurity incident management.
    • Cybersecurity incident response and recovery.
    • Conclusion of training.
    • Cybersecurity testing.
Day 5: "PECB Certified ISO/IEC 27032 Lead Cybersecurity Manager" certification exam
    • The certification exam will take place online at the end of the course.
1342

Citrix Virtual Apps and Desktops 7 On-premises and Citrix Cloud administration

★★★★★

  • SII-421
  • 5 Days (35 Hours)

Description

This training provides a complete portrait of Citrix Virtual Apps and Desktops 7, installation, configuration and management of the different functionalities: profile management, policy management, print management, basic security of a solution Citrix, publishing applications and desktops, etc. It will also give you the opportunity to improve your skills in the deployment and management of a Citrix Workspace solution as well as the implementation of a Citrix Cloud solution and the migration to it.

Who is this training for ?

For whom

Experienced IT professionals looking to become familiar with Citrix Virtual Apps and Desktops 7 On-Premises environments and potentially Citrix Cloud

Administrators or engineers responsible for the end user's workspace who take care of all solution administration tasks

1343
Prerequisites

Basic knowledge of Active Directory, Windows storage and networks

Have a quick experience with Citrix Virtual Apps and Desktops

Training objectives

Acquire fundamental knowledge of Citrix Virtual Apps and Desktops 7
Know how to install, configure and manage an application on a site Citrix Virtual Apps and desktops 7
Master the installation, configuration and management of an application on a site Citrix Virtual Apps and Desktops 7 Service with a Citrix Cloud connector
Be able to publish applications and desktops to a Citrix Virtual Apps and Desktops site and to Citrix Virtual Apps and Desktops Service
Know how to publish applications and desktops to a Desktop resource and Server

1344

Training program

Discovery of architecture
  • Introduction to Citrix Virtual Apps and Desktops
  • Introduction to the architecture
  • Features
  • Solution hosting platforms
  • Citrix Virtual Apps and Desktops Service
  • User login process on Citrix Virtual Apps and Desktops
Deploying a site
  • Deployment prerequisites
  • Configuring the Citrix license server
  • Configuring the
  • Configuring and managing a site
  • Best practices for high availability
Images for apps and desktops
  • Best practices for creating a
  • Prerequisites for a
1345
Provision and deliver applications and desktops
  • Catalogs and delivery groups
  • Provisioning solutions and best practices
  • Machine Creation Services (MCS) Deep Dive
  • Best practices for using an MCS environment
  • Resource Locations
Give access to application and desktop resources
  • Workspace and StoreFront feature comparison
  • Authentication with Workspace
  • Workspace App
  • The sign-in process
Manage user experience
  • Methodology for managing user experience
  • The main parameters of user experience
Overview and management of published applications and desktops
  • Properties of a published application
  • Optimizations on applications published on an OS Server
  • Presentation of published applications
  • Application groups
  • Applications and desktops overview
1346
Manage impressions in user sessions
  • Mapping printers in a user session
  • Printer drivers
  • Citrix environment specifics
Citrix Profile Management
  • Introduction and best practices
  • Configuring
Managing a site
  • Admin Delegation
  • Using PowerShell with Citrix Virtual Apps and Desktops
  • Best practices in power management
Basic security on Citrix Virtual Apps and Desktops
  • Best practices for Citrix Admin accounts
  • Best practices for securing XML services
  • Securing HDX traffic for external access
1347
Monitoring a Citrix site
  • Introduction to Citrix Director
  • Monitoring user sessions on Director
  • Monitoring published applications
  • Monitoring Virtual Desktop Agent (VDA) machines in production
  • Monitoring a Citrix Virtual Apps and Desktops site
  • Alerts and notifications
  • Configuring Citrix Director for monitoring an HDX session with Citrix ADM
Introduction to Citrix Virtual Apps and Desktops support and troubleshooting
  • Introduction to troubleshooting a Citrix Virtual Apps and Desktops site
  • Tools
  • Proactive administration tasks
Migrating to Citrix Cloud
  • Migration best practices
  • Deploying Citrix Cloud Connector
  • Citrix Virtual Apps and Desktops Service with On-Premises resources
  • Migration process
Citrix Analytics
  • Introduction
  • Prerequisites
  • Citrix Analytics Use Cases
1348

Securing a Linux/Unix system

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

During this practical course, you will learn how to define a security strategy, secure Linux servers and maintain an optimal level of security. The training includes components such as securing the isolated system, securing the network in the enterprise and conducting a security audit. This is an opportunity to acquire practical skills essential to ensuring enhanced security of IT systems.

Who is this training for ?

For whom

System and network technicians and administrators.

1349
Prerequisites

Good knowledge of systems and network administration.

Training objectives

Measure the security level of your Linux/Unix system
Know system security solutions
Know how to set up security for a Linux/Unix application
Establish security at the network level

1350

Training program

Introduction
  • Secure domain access with IPsec.
  • The advanced Windows 2008 Server firewall.
  • Configuration and administration of the RAS service.
  • VPNs: principle of tunneling.
  • Practical work Implementation of IPSec under Windows.
  • Advanced configuration of the firewall.
  • Setting up instead of a RAS server and a RADIUS server under Windows 2008 Server.
Security and Open Source
  • Corrections are quick, bugs made public.
  • A hacker's approach technique: knowing the flaws, knowing how to attack.
  • Example of a vulnerability and security solution.
  • What solution?
Installation too complete: Linux example
  • Debian, RedHat and other distributions.
  • Avoid the easy installation trap.
  • Kernel lightweighting.
  • Drivers peripherals.
  • Practical work Optimization of installations with a view to security management.
1351
Local system security
  • Examples of maliciousness and inadvertence.
  • Low permissiveness by default.
  • Effective file rights checking, scripts and commands to diagnose.
  • Tripwire tools.
  • Retention of logs, how long?rnThe tool log analysis: logwatch.
  • React in real time: example script.
  • Use RPM as HIDS.
  • Configuring PAM in different contexts.
  • Containment of process execution.
  • DAC, MAC, RBAC terminology, context, model.
  • Practical work rnWork on rights, logs and processes.
1352
Network-level security
  • Use a firewall? Use wrappers? Set up service access filters.
  • Configure a firewall securely.
  • The diagnostic commands.
  • Setting up a NetFilter firewall under Linux.
  • Philosophy and syntax of iptables.
  • The xinetd super-server.
  • Access restrictions by the wrapper, trace files.
  • Perform an audit of active services.
  • Ssh.
  • Practical work Configure a Firewall.
  • Audit functional services.
Security audit utilities
  • Proprietary products and free alternatives.
  • Crack, John the Ripper, Qcrack.
  • HIDS and NIDS intrusion detection systems.
  • Test the vulnerability with Nessus.
  • Implementing a security tool.
  • Practical work Implementing some tools.
1353

Java/JEE, application security

★★★★★

  • SII-196
  • 3 Days (21 Hours)

Description

This training will allow you to understand the security management mechanisms offered by Java, thanks to the theoretical study of the concepts and their progressive implementation, within standalone applications, JEE application servers as well as SOAP and REST web services.

Who is this training for ?

For whom
Developers and project managers required to secure Java and JEE applications.
1354
Prerequisites

None

Training objectives

Implement security at the Java virtual machine level Leverage specific APIs such as JAAS, JSSE and JCE to secure your applications
Secure your web services with the WS-Security and oAuth APIs

1355

Training program

Overview of security concepts
  • Identification and authentication methods.
  • Authorizations and permissions.
  • Confidentiality, non-repudiation, encryption, public/private keys, certificate authorities.
  • Firewalls and DMZ, protocol breakage.
  • Types of attacks.
Java Virtual Machine Security
  • Loading classes.
  • Sandbox concept.
  • SecurityManager, AccessController and definition of permissions (files.
  • policy).
  • Create your permissions with Java Security Permission.
  • Mechanisms to protect bytecode integrity, decompilation and code obfuscation.
  • Specificities of Applets in terms of security.
  • Practical work Definition of .
  • specific policies.
1356
Java Authentication and Authorization Service
  • JAAS architecture.
  • Authentication via PAM, notion of Subject and Principal.
  • Permission management, files.
  • policy.
  • Use JAAS with Unix or Windows, JNDI, Kerberos and Keystore.
  • SSO support.
  • Practical work Configure the policy. access control, implementation of authentication.
SSL with Java
  • Functions of Java Secure Socket Extension (JSSE).
  • Authentication via X certificates.
  • 509.
  • TLS and SSL.
  • Encryption based on public keys, Java Cryptography Extension (JCE).
  • Using SSL with HTTP.
  • Practical work Configure SSL and implementation of SSL sockets.
  • Use JDK tools (Keystore).
1357
The security of a JEE application
  • Web and EJB container-level authentication.
  • Application roles, permissions and XML deployment descriptors.
  • Dynamic controls via Servlets and EJB APIs.
  • Security in APIs: JDBC, JNDI, JTA, JMS, JCA.
  • Practical work Security of an application deployed in Tomcat.
SOAP web services security
  • Security at HTTP level.
  • Security at SOAP & WSDL level with WS-Security (WSS4J, XWSS.
  • ) & WS-Policy.
  • WS-Security SOAP handlers using JAAS.
  • Practical work Practical use with an implementation of WS-Security (XWSS).
Security of REST web services
  • Using SSL with JAX-RS.
  • The contributions of oAuth (authentication on the Internet).
  • oAuth 1.
  • 0 and 2.
  • 0.
  • Practical work Practical work with an Apache CXF implementation of JAX-RS.
1358

ISO/IEC 27035 Lead Incident Manager ''Information security incident management''

★★★★★

  • SII-425
  • 5 Days (36 Hours)

Description

During this training, you will acquire in-depth knowledge of the process model for designing and developing an incident management plan for organizations. This training's compatibility with ISO/IEC 27035 also supports ISO/IEC 27001 by providing guidelines for managing information security incidents.

Who is this training for ?

For whom

Information security incident managers. ICT managers. Information technology auditors. Managers looking to set up an incident response team. Managers interested in learning more about how to effectively operate an incident response team. Information security risk managers. Professional IT systems administrators. Professional computer network administrators. Incident response team members. People responsible for information security within an organization.

1359
Prerequisites

Training objectives

  • Master the concepts, approaches, methods, tools and techniques that enable effective management of information security incidents according to ISO/IEC 27035
  • Know the correlation between the ISO/IEC 27035 standard and other standards and regulatory frameworks
  • Acquire the expertise necessary to support an organization during the implementation, management and maintenance of an information security incident response plan
  • Acquire the skills to effectively advise organizations on information security management best practices
  • Understand the importance of adopting well-structured procedures and policies for incident management processes
  • Develop the necessary expertise to manage an effective incident response team

1360

Training program

Day 1: Introduction to concepts relating to information security incident management, as defined by ISO/IEC 27035
Day 2: Design and preparation of an information security incident management plan
Day 3: Launch of an incident management process and handling of information security incidents
Day 4: Monitoring and continuous improvement of the information security incident management plan
Day 5: Certification exam
1361

Master Unix

★★★★★

  • SII-317
  • 5 Days (35 Hours)

Description

This intensive course has several objectives: to allow participants to achieve real mastery of the system thanks to rigorous educational progression and numerous practical exercises under the main versions of Unix (AIX, HP/UX, Solaris and Linux), provide a summary of the information necessary for daily use and understanding the operation of the system, detail a selection of varied and representative examples of the system's possibilities and present the fundamental differences between the main versions of the Unix system. /p>

Who is this training for ?

For whom

IT professionals who need to use or evaluate Unix in a professional context. Future Unix administrator needing to acquire a good foundation in Unix.

1362
Prerequisites

None

Training objectives

Master the file management system
Use shell commands and programming
Know how to handle processes
Implement network configuration
Master the main daily operating tasks of a Unix server

1363

Training program

Getting started with the machine
  • Standards, architecture.
  • Connection, identity, information, logout.
  • Use of graphical interfaces (CDE, GNOME, KDE).
  • Directory and files, assembly.
  • Versions of Unix (Aix, HP/UX, Solaris, Linux.
  • ).
  • Why are there different versions of Unix? How far does the compatibility go? Which version for what type of application?
First exploration of the system
  • Tree and path.
  • Principle of protections.
  • Attributes of files and directories.
  • Use the help correctly online.
  • Practical work Start the system, log in, use online help, execute the first commands.
1364
File organization and management
  • Implementation aspects.
  • Hard links and symbolic links.
  • Logical representation of files.
  • The contents of directories.
  • Create and delete directories.
  • File permissions under Unix.
  • Standard tree structure.
  • Using regular expressions.
  • Compared operation of the editors (ed, sed and vi).
  • Using vi, editing files.
  • Special files.
  • Links physical, symbolic.
  • Practical work Use, creation, modification of content and permissions on files.
  • Manipulation of links, of the vi editor.
  • Using regular expressions.
1365
Command execution and the shell
  • The role of the shell.
  • Basic principle: operation of the shell.
  • Processes and environment.
  • Shell execution modes -scripts.
  • Basic shell functionalities: variables and special characters, redirections, dynamic command generation.
  • Script arguments, return code management.
  • Shells (ksh, bash, csh): functions, startup files.
  • Improvements to bash and ksh.
  • Practical work rnExecution of commands, shell.
1366
Shell programming
  • Variables.
  • Operators.
  • Loop instructions.
  • Conditional instructions.
  • Operator test.
  • Control structures.
  • Session and shell settings.
  • Examples of interactive programs.
  • Work practices Shell editing.
  • Using the vi editor.
1367
Process management and interprocess communication
  • Multitasking and associated calls.
  • Signals, responding to a signal (trap).
  • Process dynamics and associated commands, process priorities.
  • Process priorities.
  • Concept of thread.
  • Pipes: principle and operation.
  • Interprocess communication: pipes, named pipes.
  • IPCs, sockets, RPCs.
  • Internal mechanisms of file management: system calls and tables, relationship with process management.
  • Practical work Process manipulation (fg, ps, .
  • )
1368
Local and network communication. TCP/IP
  • Local communication.
  • Unix in local network (TCP/IP).
  • ARPA commands (telnet, ftp).
  • R-commands (rcp, rsh, rlogin).
  • Secure ssh and scp commands.
  • File sharing by NFS.
  • The different services name (hosts, NIS and DNS).
  • First element of network administration (ping, netstat, ifconfig).
  • Practical work Configure the network.
  • Use file transfer commands.
1369
System operation
  • Backups and restores: tape management, commands (tar, crontab, etc.).
  • Task scheduling: implementation of crontab, the at command.
  • File system: standard trees, study of systems (AIX, HP_UX, Solaris, Linux), basic operation.
  • Starting the system: starting and stopping, the different run levels.
  • Starting the system: starting and stopping, the different run levels.
  • User management: basic principles and files.
  • Creation, deletion and management of groups.
  • Security concepts: file system, network, control tool.
  • Practical work Creation, deletion and management of users and groups.
A daily Unix server
  • How does Oracle activity translate into Unix? The user environment.
  • Oracle files and processes.
  • Principles of a Web server under Unix .
  • Fundamental settings and sample session.
  • Cohabitation with Windows.
  • Samba functions.
1370
Tools available
  • Cutting, comparing, analyzing files.
  • View file contents.
  • Operation tools.
  • Filter, sort: grep commands, sort.
  • Compare files, find files.
  • Complex tools.
  • The awk utility.
  • Works practices Use the tools.
1371

AIX administration, level 1

★★★★★

  • SII-198
  • 5 Days (35 Hours)

Description

This course will allow you to administer and best operate a client-server site using an AIX environment. All important aspects of AIX operation and administration will be covered.

Who is this training for ?

For whom
This course is intended for operators and system administrators who are responsible for AIX systems.
1372
Prerequisites

Participants in this course must have a good knowledge of the system Unix.

Training objectives

This course will allow you to best administer and operate a client-server site using an AIX environment.
All important aspects of AIX operation and administration will be covered.

1373

Training program

Introduction
  • Different AIX versions.
  • AIX administrator roles.
  • Documentation sources.
  • System administration: smit and wsm.
  • Analysis of incidents management of system dumps, error messages.
  • Using errpt.
  • Practical work Handling smit.
Network configuration and TCP/IP services
  • Description of communication methods over TCP/IP.
  • Modifying network characteristics.
  • Stopping and starting a service.
  • Registering a service.
  • inetd and network services.
  • Network security.
  • Practical work Configure the network.
Printer management
  • Description of printer types.
  • Installing a local and remote printer.
1374
Management of hard drives, peripherals
  • Adding, removing, and modifying hard drive specifications.
  • Introduction to high availability.
  • Administering LVM and file systems.
  • Mounting, taken into account on restart.
  • Swap: addition, deletion.
  • Display of zone characteristics.
  • System disk mirror.
  • Peripherals: ODM description.
  • Adding, deleting and modifying device characteristics.
  • Practical work Disk and device management.
Backup and Restore
  • Principles, backup procedures.
  • Tar, pax and cpio commands.
  • Using backup and restore.
  • Bootable system backup ( mksysb).
  • Practical work Save, restore.
1375
User and group administration
  • Characteristics of user accounts and groups.
  • Files and commands implemented.
  • Practical work Addition, deletion and modification of an account and group of users.
NIS (Network Information Service), NFS (Network File System)
  • Principles of a name service.
  • Description of the NIS service and the LDAP service.
  • Setting up an NIS Master Server, a Slave Server NIS and a NIS client.
  • Administration.
  • Adding a new table.
  • Integration of the automounter into NIS.
  • NFS: setting up the server and client.
  • Administration and configuration.
  • Automount: files and options.
AIX deployment
  • Commands (at, cron).
  • The different types of installation.
  • Applications: deployment, software patches.
  • Add, delete, view the lpp and rpm applications.
1376

AIX administration, level 2

★★★★★

  • SII-199
  • 3 Days (21 Hours)

Description

This training will allow you to deepen the system and network administration mechanisms under AIX. You will learn advanced LVM mechanisms as well as high service availability concepts.

Who is this training for ?

For whom
This course is intended for operators and system administrators who are responsible for AIX systems.
1377
Prerequisites

Basic knowledge of administration.

Training objectives

This training will allow you to deepen the system and network administration mechanisms under AIX
You will learn the advanced mechanisms of LVM as well as the concepts of high availability of services.

1378

Training program

Description of ODM
  • Presentation of the ODM.
  • Definition of the structure.
  • Using the text interface.
  • Role of the different files.
  • Practical work Handle the ODM database.
Advanced LVM and FS management
  • RAID-0, striping.
  • RAID-1, mirroring.
  • File system management.
  • Group management of volumes.
  • Additional information on logical volumes.
  • System disk mirror.
  • File systems: management of quotas, Hot Spares.
  • Online enlargement.
  • Practical work Disk management, file system (user, quotas, .
  • , ).
1379
Network configuration
  • TCP/IP principles.
  • Managing subnet masks.
  • Routing concepts.
  • Viewing IP configuration .
  • The lsdev, ifconfig, lsattr and entstat commands.
  • Using "inetd".
  • Other network commands.
  • Practical work Configure the network (IP, routing).
System performance analysis
  • Setting up accounting.
  • System performance analysis utilities.
  • CPU, memory, disk, network analysis.
  • Management of Hots Spots.
  • Practical work Measuring and analyzing system performance.
TCB Security
  • Authentication procedures.
  • Advanced file permissions.
  • Configure the Trusted Computing Base (TCB).
  • Practical work Security implementation, Trusted Computing Base (TCB).
1380
The syslogd daemon
  • Identifying errors and alerts with "syslogd".
  • Create and maintain the "syslogd.
  • conf".
  • Redirect log messages.
  • Describe the error reporting mechanism "errnotify".
  • Practical work Implementation of syslogd.
Concepts of high availability of services
  • The redundant components of a Cluster.
  • The elements of a redundant network.
  • All the components of redundant storage.
  • Redundant power supplies.
Network deployment with NIM
  • Presentation of the Network Installation Manager (NIM) mechanism.
  • Setting up the server.
  • Deployment to clients.
  • Customization.
1381

Mac OS

★★★★★

  • SII-200
  • 2 Days (14 Hours)

Description

A very practical training which will teach you to use the Mac OS environment as well as network connections and services.

Who is this training for ?

For whom
Users wishing to take charge of a Mac OS X environment.
1382
Prerequisites

None

Training objectives

1383

Training program

User interface
  • New developments in the Apple/Mac OS range.
  • Presentation of the Finder.
  • Customization of the Dock.
  • Essential parameters .
  • The mouse, the menus, the keyboard modifiers, the aliases.
  • Navigate in the tree.
  • The manipulation of files and folders.
  • Smart folders.
  • Deleting documents.
  • The recycle bin.
  • The concept of active application.
  • Practical work Exploration of the tree structure.
  • Creation of folders and documents to organize information.
1384
Essential concepts
  • Volumes.
  • Organizing files.
  • Searching documents.
  • Presentation of Spotlight.
  • Applications: user programs, web browsing, mail manager, text editor.
  • Other applications: PDF viewer, calendar, mobile phone synchronization.
  • Practical work Using Spotlight.
System Preferences
  • The Apple menu (Apple).
  • The display.
  • The date and time.
  • Sleep.
  • Shutdown and restart.
  • Closing sessions.
  • Practical work Stopping, starting and implementing user sessions.
1385
Network integration
  • Network configuration.
  • Configure Internet access.
  • Shares.
  • Configure file and folder sharing .
  • Remote connection.
  • Access to network printers.
  • The right reflexes to deal with the most common problems.
  • Practical work Configure the network and share folders.
Troubleshoot common issues
  • Handling and procedure in case of failure.
  • Resolving printing problems.
  • Updating the system.
1386

Mac OS X, maintenance and troubleshooting

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This internship will provide you with the skills necessary to maintain and diagnose and resolve hardware and software problems on computers running the MAC OS X operating system.

Who is this training for ?

For whom

System/network technician. Mac OS X Administrators.

1387
Prerequisites

Good knowledge of administering a Mac OS X workstation.

Training objectives

  • Know the different system installation methods
  • Know how to identify and resolve startup problems
  • Troubleshoot user accounts
  • Manage backup issues
  • Know how to troubleshoot application problems

1388

Training program

System installation
  • Reminders of OS X features.
  • Prerequisites and their impact on troubleshooting.
  • Possible installation methods.
  • Installation of OS X.
  • Practical work rnInstallation and configuration of the OS
Getting Started Steps
  • Analysis of the boot sequence.
  • Relates to the displayed items for easier troubleshooting.
  • Identify abnormal OS X boot symptoms.
  • Search for probable causes.
  • Practical work Simulation of failure at system startup: identification and resolution.
User accounts
  • The types of accounts available in OS
The Time Machine backup tool
  • How Time Machine works.
  • Configuration, use and troubleshooting.
  • Practical work Simulating problems during backup.
  • Implementation of troubleshooting techniques.
1389
Application problems
  • Types of applications.
  • Managing .
  • plist.
  • Kernel Extensions.
  • Frameworks.
  • Practical work Troubleshoot an application.
Troubleshooting
  • Printing and network: common problems.
  • Network: order of services, configuration, import/export.
  • Miscellaneous troubleshooting: screen sharing, Bootcamp .
  • Airport, PPP, PPPoE and Ethernet.
  • Communication (Mail, iChat.
  • ).
  • Practical work r nSimulation and troubleshooting.
1390
Tools and techniques
  • Activity Monitor, Console.
  • Special system troubleshooting techniques.
  • Single-User, Verbose, Boot Manager.
  • Troubleshooting utilities.
  • Best practices.
  • Practical work Examples of using the tools.
1391

Mac OS X Server, administration

★★★★★

  • SII-202
  • 4 Days (28 Hours)

Description

This training concerns the implementation and administration of a network infrastructure based around the server version of the Mac OS centralized and collaborative services and to share files.

Who is this training for ?

For whom
Mac OS X administrators who need to administer Mac OS X Server network services.
1392
Prerequisites

None

Training objectives

Install macOS printers
Save and quickly restore a configuration (image)
Have a mail server (Apple Mail Server)
Offer collaborative services to users (WEB server, wiki, blog, webmail, etc.)
Implement your own podcast service

1393

Training program

Server installation and configuration
  • Presentation of the Mac OS X Server architecture.
  • Installation of Mac OS administration.
  • Basic configuration.
  • Disk partitioning.
  • Monitoring tools.
  • Hands-on Mac installation OS X Server.
Network services
  • Configuring the DNS service.
  • Configuring the DHCP service.
  • Automating the IP configuration.
  • Configuring the VPN service.
  • Secure remote access management.
  • Firewall configuration.
  • Practical work Implementation of a DNS and DHCP server.
File services
  • Configuration of AFP, SMB(CIFS), NFS shares.
  • Access rights management.
  • Backup, archiving and restoration.
  • Practical work Sharing files with Mac and Windows clients.
1394
Courier services
  • Configuring Mail Server.
  • Configuring Mailing Lists.
  • Configuring filters.
  • Practical work Configure the mail server. mail.
Collaboration services
  • Configuring the Apache server.
  • Configuring Wikis and Blogs.
  • Configuring iCal server.
  • Practical work Configure the Apache server.
Deployment solutions
  • Creating disk images for clients.
  • Deploying images.
  • Configuring the NetBoot service.
  • Practical work Configure the NetBoot server.
1395

Exchange 2016, advanced administration

★★★★★

  • SII-203
  • 3 Days (21 Hours)

Description

This advanced training course will provide you with mastery of the administration of a messaging solution based on Exchange 2016. It details the migration from previous versions, supervision, automation via PowerShell as well as advanced management of message transport, storage and security.

Who is this training for ?

For whom
System administrators, operators and integrators.
1396
Prerequisites

None

Training objectives

Implement a virtualized Exchange 2016 platform Set up message tracking and archiving Implement advanced storage options Secure Exchange 2016

1397

Training program

Migration vers Exchange Server 2016, virtualisation
  • Virtualize Exchange Server 2016.
  • Migration from different messaging systems and previous versions.
  • Practical work Setting up a platform Virtualized Exchange.
Advanced management of Exchange 2016 with EMC (Exchange Management Shell)
  • Reminder about PowerShell 5, 4 and 3.
  • Introduction to writing PowerShell script.
  • Using PowerShell to administer Exchange.
  • Practical work Creating administration scripts.
Design of administrative security and audit
  • Implement role-based access control, manage permissions.
  • Set up auditing.
  • Practical work Implement roles administrative.
Advanced administration and message transport security
  • Exchange Transport Advanced Options.
  • LAN and Internet Transports.
  • Enterprise Email Policy and Compliance.
  • Compliance transport.
  • Implement the integration of AD RMS with Exchange Server 2016.
  • Practical work Implementation of advanced transport options.
  • Creating a security policy.
1398
Advanced storage administration
  • Reminder on how storage works.
  • Advanced administration tasks on storage.
  • Practical work Setting up advanced options on the storage.
Setting up message archiving
  • Manage message records.
  • Implement message retention.
  • Practical work Creation of an archiving policy.
Implementing Site Resilience
  • Site resilience in Exchange Server 2016 for high availability.
  • Interest and implementation of resilience.
  • Practical work Creation of a high availability and site resilience.
Managing Exchange email coexistence with federation
  • Reminder about trust relationships.
  • Implement federation.
  • Managing the movement of mailboxes across different Active Directory forests.
  • Outsourcing: How to outsource? The case of Exchange Online.
1399

Exchange 2013, advanced administration

★★★★★

  • SII-339
  • 3 Days (21 Hours)

Description

This advanced training course will provide you with mastery of the administration of a messaging solution based on Exchange 2013. It details the migration of previous versions, supervision, automation via PowerShell as well as advanced management of transport of messages, storage and security.

Who is this training for ?

For whom

Systems engineers or network managers.

1400
Prerequisites

None

Training objectives

Implement a virtualized Exchange 2013 platform
Set up message tracking and archiving
Implement advanced storage options
Create a security policy

1401

Training program

Migration vers Exchange Server 2013, virtualisation
  • Reminder about Hyper-V 3.
  • 0, virtualize Exchange Server roles.
  • Migration from different messaging systems and previous versions.
  • Practical work Setting up a virtualized Exchange platform.
Managing Exchange 2013 with EMC (Exchange Management Shell)
  • Reminder about PowerShell 3.
  • 0.
  • Use PowerShell to administer Exchange.
  • Introduction to scripting.
  • Practical work Creating administration scripts.
Design of administrative security and audit
  • Implement role-based access control, manage permissions.
  • Set up auditing.
  • Practical work Implement roles administrative.
1402
Advanced administration and message transport security
  • Exchange Transport Advanced Options.
  • LAN and Internet Transports.
  • Enterprise Email Policy and Compliance.
  • Compliance transport.
  • AD RMS.
  • Practical work Implementation of advanced transport options.
  • Creation of a security policy .
Advanced storage administration
  • Reminder on how storage works.
  • Advanced administration tasks on storage.
  • Practical work Setting up advanced options on the storage.
Setting up message archiving
  • Manage message records.
  • Implement message retention.
  • Practical work Creation of an archiving policy.
Implementing Site Resilience
  • Site resilience in Exchange Server 2013 for high availability.
  • Interest and implementation of resilience.
  • Practical work Creation of a high availability and site resilience.
1403
Managing Exchange email coexistence with federation
  • Reminder about trust relationships.
  • Implement federation.
  • Managing the movement of mailboxes across different Active Directory forests.
  • Outsourcing: which roles to outsource? The case of Exchange Online.
1404

Solutions de base de Microsoft Exchange Server 2013 (70-341)

★★★★★

  • SII-294
  • 5 Days (35 Hours)

Description

This training will teach you how to install and deploy the Microsoft Exchange 2013 mail server. You will also see how to configure and manage mailboxes as well as monitor and troubleshoot the server. This course covers all the topics necessary to prepare for the Microsoft 70-341 exam.

Who is this training for ?

For whom

Systems engineers or administrators having to implement Microsoft Exchange 2013.

1405
Prerequisites

None

Training objectives

Install and deploy Exchange Server 2013 Configure and manage mailboxes Monitor and troubleshoot the mail server

1406

Training program

Deploy and configure Exchange Server 2013
  • Set prerequisites for deployment.
  • Perform deployment and manage the server.
  • Introduction to the Mailbox server role.
  • Practical work Install an Exchange 2013 server and configure the mailbox server.
Management of recipient objects
  • Setting up mailbox management.
  • How to manage other recipients in Exchange Server 2013? Mailbox public folders: planning and implementation.
  • Practical work Configure an address list and public folders.
Client Access Servers and Configuring Email Clients
  • Create a Client Access server deployment plan.
  • Client Access services.
  • Outlook Web App and mobile email.
  • Secure Internet access for Client Access server.
  • Hands-on Configure certificates for the Client Access server.
  • Configure Outlook Web App .
1407
High availability and disaster recovery
  • Introducing high availability in Exchange Server 2013.
  • High availability for mailboxes.
  • Secure Client Access servers with high availability .
  • Create a plan to reduce risks.
  • Backup and recovery.
  • Practical work Implement high availability.
  • Example of backup and restore.
Transporting messages
  • Presentation of message transport.
  • How to plan and configure message transport? Transport rules.
  • Practical work Configure the carrying messages.
Secure messaging
  • Set up an email security plan.
  • Antivirus and anti-spam solutions for Exchange Server 2013.
  • Configure RBAC permissions and audit recording.
  • Practical work Configure Anti-Spam options on the Exchange server.
  • Configure RBAC and Audit recording.
1408
Monitor and troubleshoot the mail server
  • Set up server monitoring.
  • Perform maintenance operations.
  • How to troubleshoot the server in the event of problems? Practical work Set up monitoring and example of server troubleshooting.
1409

Microsoft Exchange Server 2013 Advanced Solutions (70-342)

★★★★★

  • SII-293
  • 5 Days (35 Hours)

Description

This course will teach you how to implement the advanced features of Exchange Server 2013. You will see how to set up unified communication, ensure its security as well as the necessary steps for migration. This course covers all the topics necessary to prepare for the Microsoft 74-342 exam.

Who is this training for ?

For whom

System/network administrators and engineers.

1410
Prerequisites

None

Training objectives

Know how to implement the advanced features of Exchange Server 2013 Learn how to design and implement Exchange Server 2013 unified messaging Know how to implement and update Exchange Server

1411

Training program

Site resilience and virtualization
  • Concept of resiliency.
  • Site resiliency in Exchange Server 2013.
  • The Hyper-V 3 hypervisor.
  • 0.
  • Virtualize Exchange 2013 server roles.
  • Practical work Example of implementing site resilience.
Microsoft Exchange Server 2013 Unified Messaging
  • How telephony works.
  • The components of unified messaging.
  • The Lync server.
  • Practical work Identify Unified Messaging items.
  • Configure Lync Server 2013.
Message transport security
  • Email compliance policy and requirements.
  • Message transport compliance.
  • AD RMS rights management integration with Exchange Server 2013.
  • Practical work Implementing message transport security.
  • Integrate AD RMS with Exchange Server 2013.
1412
Message retention
  • Management of message records.
  • Archive messages.
  • Notion of message compliance.
  • Implement in-place blocking.
  • Practical work Set up message retention and archiving.
Administrative security and audit
  • Security management through role-based access control (RBAC).
  • Specific authorizations with split authorizations.
  • Access with audit recording.
  • Practical work Implementation of access control and audit recording.
Administer Exchange Server 2013 with PowerShell
  • Power Shell 3 overview.
  • 0.
  • The Exchange Management Shell command-line environment.
  • The tasks of administration.
  • Practical work Explore the Exchange Management Shell environment.
Integration with Exchange Online
  • Exchange Online overview.
  • Plan the migration to Exchange Online.
  • Making the two versions coexist.
1413
Messaging coexistence and migration
  • How to federate messaging? Make several Exchange organizations coexist.
  • Moving mailboxes between forests.
  • Process for migrating an Exchange server .
  • Hands-on Setting up multiple organizations.
  • Mailbox migration example.
  • Upgrading Exchange Server 2010 around 2013.
1414

Lotus Domino 8.5, administration

★★★★★

  • SII-204
  • 4 Days (28 Hours)

Description

At the end of this internship, you will be able to design, install, configure and administer an infrastructure of Domino version 8.5 servers and Notes clients on a daily basis. You will have learned to deploy, configure and secure messaging as well as configure server access.

Who is this training for ?

For whom
This course is for anyone responsible for administering one or more Domino 8.5 servers.
1415
Prerequisites

Have experience in network or messaging system administration

Have experience using the Lotus Notes 8.5 client

Training objectives

Know the basic components of the IBM Lotus Domino 8.5 environment
Know how to perform basic administration tasks
Understand how to install and configure a basic infrastructure with a single domain using an existing deployment plan
Know set up email replication and routing in a single domain environment
Be able to perform standard server maintenance and troubleshooting tasks
Be able to support Notes and non-Notes users

1416

Training program

Presentation, implementation
  • Domino Architecture/Notes.
  • Install and configure a main Domino server.
  • Install the administration client.
  • Settings.
  • Practical work Install and configure the server.
  • Getting started with the administration client.
Records
  • Registration process (server, certifier and user).
  • Certification tracking.
  • Public, private keys, encryption, signatures.
Security
  • Fundamentals.
  • Set up ID vaults for backing up and restoring IDs.
  • Authentication/anonymous access.
  • Base ACLs (access control list).
  • Execution control list on the client workstation (LCE).
  • Practical work Put security elements in place: authentication, access control list, execution control list.
1417
Messaging
  • Understand how messaging works.
  • Routing device (router, mailbox, etc.
  • ).
  • Supported routing protocols by Domino.
  • Mail transfer, connection documents.
  • Setting up SMTP messaging.
  • Restrict email circulation (number, volume .
  • ).
  • Use of quotas.
  • Mail management rules.
  • Message Tracking, logging, reports.
  • Practical work Set up SMTP messaging.
  • Configuring and securing messaging.
1418
Replication
  • Vocabulary (pull, push.
  • ).
  • Replication logic.
  • Using a server group for replication.
  • Practical work Set up replication.
Adding Domino Servers
  • Setting up additional servers.
  • Setting up inter-server replication.
  • Practical work Add servers and activate database replication.
Management of organizational policies
  • Setting up policies with policy documents.
  • Parameters.
  • Impose values ​​with office policies.
  • Define policies mail and security.
Implement compression techniques
  • New compression options.
  • Enable image compression.
  • Implement DAOS.
  • Practical work Testing different options.
1419

Lotus Domino Designer v8/v9, development

★★★★★

  • SII-338
  • 3 Days (21 Hours)

Description

A very practical course to learn how to design, develop and deploy a single-base IBM Lotus Domino 8 and 9 application.

Who is this training for ?

For whom

Anyone wishing to develop an application with IBM Lotus Domino Designer v8 and v9.

1420
Prerequisites

None

Training objectives

Create masks and views
Work with formula language
Create agents to modify data in a document
Create presentation pages and a navigation map.
Create a frame layout.

1421

Training program

Presentation
  • Domino application architecture.
  • Domino Designer application creation environment.
  • The WYSIWYG designer environment.
  • Overview style sheets.
Masque
  • Creation of masks, modification of mask properties.
  • Addition of fields in masks: text, rich text, .
  • Components: dialog list, radio button, checkbox, .
  • Creation of table for presentation.
  • Default value, conversion and validation of fields.
  • Creation of documents and presentation of Xpages.
  • Practical work Creation of configuration masks.
  • Creation of a HelpDesk mask.
1422
Formula language
  • Overview of programming in Domino applications.
  • Working with the formula language.
  • Formulas for accessing views (
  • dbColumn,
  • dblookup).
  • What's new (
  • businessDay,
  • do,
  • doWhile,
  • for .
  • ).
  • Creating actions with commands
  • command.
  • Presentation of the new formulas.
  • Practical work Automation of the HelpDesk mask.
  • Automatic feeding of drop-down zones with dbColumn, dblookup.
1423
Views and Agents
  • Creation of sorted and categorized views.
  • Creation of Agenda view with the date picker.
  • Creation of shared view.
  • Creation of agents to modify data in documents.
  • Practical work Creation of categorized, configuration and hidden views.
  • Creation of an agent to modify document data. 'a field.
Security
  • Setting security levels for application users.
  • Using conditional masking options.
  • Introducing masking layers and anchors.
  • Practical work Creation of "author" and "reader" fields and customization of the ACL.
1424
Frame layout, navigation plan
  • Using links to make application elements available to users.
  • Creating different types of links.
  • Creating pages.
  • Presentation of style sheets.
  • Creation of a navigation plan.
  • Creation of frame layouts.
  • Practical work Creation presentation pages and a navigation plan.
  • Creating a frame layout.
1425

Postfix, administer a mail server

★★★★★

  • SII-336
  • 2 Days (14 Hours)

Description

After a reminder of the overall functioning of corporate messaging, you will learn how to administer a Postfix server, configure its various components, secure its operation and integrate it with the application software in your environment.

Who is this training for ?

For whom

System engineer, or decision maker with technical skills, who must choose and implement an open source solution for mail distribution, archiving, and security.

1426
Prerequisites

Good knowledge of Linux administration and corporate networks.

Training objectives

Install a Postfix server
Configure the different components: pop3, imap, smtp
Implement antispam measures
Ensure operation: check logs, statistics

1427

Training program

Fundamental principles
  • ■ Mail transfer agents
  • Sendmail, the historic but complex solution.
  • Postfix or Qmail alternatives.
  • Xmail, a very complete mail server.
  • ■ Sending, routing and receiving mail
  • Format of an email address.
  • Basic settings 'a client station.
  • ■ The actors
  • Transport and relay of messages with an MTA.
  • Mail distribution agents.
  • Mail servers.
  • Mail management agents.
1428
Installation et configuration de Postfix
  • ■ Installation
  • A roundup of the latest versions.
  • ■ Configuration
  • Configuring DNS for email.
  • The main master parameters.
  • cf and main.
  • cf.
  • The minimum configuration.
  • Relaying (client, server).
  • ■ Lookup tables
  • Postfix lookup tables.
  • Example of using LDAP and MySQL with Postfix.
1429
Master the protocols
  • ■ SMTP (Simple Mail Transport Protocol)
  • SMTP is also a message format.
  • Tags (EHLO, MAIL FROM, RCPT TO, DATA .
  • ).
  • Error codes (unknown recipient, refusal.
  • ).
  • SMTP and security: concept of open relay /closed.
  • Tolerance by password or IP address.
  • Encryption.
  • ■ Mail routing
  • The cycle MUA/MTA/MTA/.
  • /MTA/MDA then .
  • MUA.
  • MX relays and incoming front-ends/
  • ■ POP and IMAP
  • POP3 tags (USER, PASS, STAT, DELE, TOP.
  • ).
  • Password encryption (MD5).
  • POP3 limits and IMAP contributions.
1430
Exploitation de Postfix
  • ■ On a daily basis
  • Postfix queues.
  • Postfix logs (syslog settings).
  • Have access to statistics (pflogsumm.
  • pl).
  • ■ To go further
  • Launch Postfix in "chroot" environment.
  • Reporting of incidents (notify_classes, spam).
  • » An environment to secure ■ Blocking unsolicited mail
  • The different forms of spam.
  • The risks incurred by a poorly configured system.
  • ■ Authentication
  • Limits of SMTP, contributions of SASL.
  • Choice of the authentication method .
  • ■ Encryption
  • Guarantee the confidentiality of mail.
  • TLS (Transport Layer Security) certificates.
1431

Palo Alto Networks Firewall 9.0 Training Essentials: Configuration and Management

★★★★★

  • SII-422
  • 5 Days (35 Hours)

Description

This official Palo Alto Networks "Firewalls 9.0 Essentials" training teaches you how to configure, manage and operate next-generation Palo Alto Networks firewalls, as well as configuration steps for security, networking, threat prevention, logging and report generation features. reporting in the Pan-OS environment. This training takes place on the Pan-OS 9.0 version. The training takes place in an official ATC training center of the publisher.

Who is this training for ?

For whom

This course is aimed at network and security engineers and administrators, security analysts, system administrators, as well as people in charge of technical support.

1432
Prerequisites

Training objectives

Configure and manage the essential functionalities of next-generation Palo Alto Networks firewalls • Configure and manage GlobalProtect to protect client workstations located outside the company network • Configure and manage the high availability of Palo Alto Networks firewalls • Monitor network traffic using interactive web interfaces and built-in reports

1433

Training program

1434

Microsoft SharePoint Server 2013 Fundamental Solutions (70-331)

★★★★★

  • SII-295
  • 5 Days (35 Hours)

Description

This course will teach you how to install, configure and administer Microsoft SharePoint 2013. You will see how to create web applications, manage users, permissions and also how to monitor the environment. This course covers all the topics necessary to prepare for the Microsoft 74-331 exam.

Who is this training for ?

For whom

Systems/network engineers and administrators.

1435
Prerequisites

None

Training objectives

Know how to install, configure and administer Microsoft SharePoint 2013 Learn how to configure user profiles Know how to monitor and maintain the SharePoint 2013 environment

1436

Training program

L'architecture de SharePoint 2013
  • The components of the SharePoint architecture.
  • Information architecture.
  • Business needs.
  • Physical architecture and logical architecture .
  • Physical components for deployments.
  • SharePoint farm topologies.
  • From logical to physical architecture.
  • Practical work Design a physical architecture and a logical architecture.
1437
Installation, applications Web et services d'application
  • Installation steps.
  • Settings for a SharePoint farm.
  • Using scripts.
  • Web applications.
  • Create and configure site collections.
  • Plan and configure application services.
  • Hands-on Installation of SharePoint 2013.
  • Using scripts.
  • Creating a web application and site collection.
  • Create and configure application services.
1438
Managing security with SharePoint 2013
  • Users, permissions and authorizations.
  • Access to content.
  • Federated and server-to-server authentication.
  • Securing SharePoint 2013.
  • Hands-on Create and manage SharePoint groups.
  • Create custom permission levels.
  • Configure authentication federated.
  • Configure security.
Taxonomy in SharePoint
  • What is taxonomy?rnContent types.
  • Using content types for standardization.
  • Practical work r nCreate content types.
User profiles
  • Presentation of the user profile service.
  • How to configure the User Profiles application service?rnProfile administration.
  • Practical work r nCreation of a User Profile Service application.
1439
Entreprise search
  • Presentation of the search service.
  • The key components of this service.
  • Optimize the search.
  • Practical work Configure and use the search service.
Monitoring the SharePoint 2013 environment
  • Monitor a server farm.
  • Customize and optimize the environment.
  • Set up caching.
  • Resolve issues errors and other types of problems.
  • Hands-on Configure SharePoint Diagnostic Logging.
  • Configure Performance Monitor.
1440

Microsoft SharePoint Server 2013 Advanced Solutions (70-332)

★★★★★

  • SII-290
  • 5 Days (35 Hours)

Description

This course will teach you how to plan and implement the advanced features of Microsoft SharePoint 2013. You will see how to ensure service continuity as well as data backup and restoration. This course covers all the topics necessary to prepare for the Microsoft 74-332 exam.

Who is this training for ?

For whom

Systems engineers and administrators.

1441
Prerequisites

None

Training objectives

Learn to plan and implement the advanced features of Microsoft SharePoint 2013
Design a plan to ensure service continuity
Know how to backup and restore data
Enter an educational objective here

1442

Training program

L'architecture de SharePoint Server 2013
  • New features.
  • The SharePoint Online Editions version.
  • Practical work Example of site creation.
High availability and service application
  • High availability and disaster recovery.
  • SharePoint and high availability.
  • Backup and recovery procedure.
  • Federate an application service.
  • Hands-on rnPlan for disaster recovery.
  • Back up and restore data.
  • Example configuration of 'an application service.'}
Le Business Connectivity Services (BCS)
  • BCS overview.
  • The secure information store "Secure Store".
  • BDC models.
  • Lab Configuring the Business Data Connectivity service application and the Secure Store service.
1443
Users and collaboration
  • User profiles.
  • Social interactions.
  • Creation and management of communities.
  • Productivity and collaboration.
  • Hands-on Configure profile synchronization.
  • Plan and configure collaboration features.
SharePoint et la Business Intelligence
  • SharePoint Business Intelligence solutions.
  • The Enterprise Search service.
  • Optimize the search for information.
  • Practical work rnConfigure external data access and PowerPivot for SharePoint.
  • Configure the search service.
Content management
  • The eDiscovery process.
  • Administering web content.
  • Navigation and catalog sites.
  • Design and personalization.
  • Mobile users.
  • Practical work Configuration of catalog sites.
1444
SharePoint Server 2013 solutions and governance
  • The architecture of SharePoint solutions.
  • Sandbox solutions.
  • Apps and App catalogs.
  • Develop a plan governance.
  • Practical work Configure solution management.
  • Create and configure an enterprise App catalog.
  • Implement governance in SharePoint 2013.
Migrate to SharePoint Server 2013
  • How to migrate to SharePoint 2013? The update process.
  • Updating site collections.
  • Hands-on Example SharePoint 2010 database import.
1445

Skype for Business, deployment and administration

★★★★★

  • SII-329
  • 4 Days (28 Hours)

Description

The Lync unified communications platform merged with Skype in 2015 to become Skype for Business. In this training, you will learn how to plan, deploy, configure and administer Skype for Business 2015. You will also understand the useful tools to operate your communication infrastructure.

Who is this training for ?

For whom

Systems/network administrators and engineers.

1446
Prerequisites

None

Training objectives

Plan and design a Skype for Business 2015 infrastructure Install, implement and administer a Skype for Business 2015 infrastructure Manage and implement Skype for Business users and clients Create and manage conferences Implement external access management Install and configure monitoring and archiving tools

1447

Training program

Design a Skype for Business infrastructure
  • Skype for Business overview.
  • Architecture and operation.
  • Hardware and software prerequisites.
  • Plan the infrastructure.
Installer Skype for Business
  • Server dependency and associated services.
  • The interaction of SfB with the AD.
  • The topology generator.
  • Install SfB servers.
  • Configure the parameters.
  • Practical work Generate a topology.
  • Install and configure the Front-End.
Manage Skype for Business
  • The control panel.
  • Management in PowerShell.
  • User management.
  • Configure access control based on roles.
  • Practical work User management.
1448
Configure users and clients
  • Authentication management.
  • Configure instant messaging.
  • Configure user and client policies.
  • Manage notebooks addresses.
  • Practical work Configure IM, user and client policies.
Set up conferences
  • The different conferencing modalities.
  • Configuring conferences.
  • Conference strategies.
  • Office Web integration Apps.
  • Virtual meeting room setup.
  • Hands-on Create and manage conferences.
  • Integrate Office Web Apps.
1449
Manage external access
  • Overview of external access.
  • Mobility design.
  • The federation under SfB.
  • Network configuration and certificates.
  • Install Edge Servers.
  • Practical work Implement Edge Servers.
Configure archiving and monitoring tools
  • Monitoring and archiving tools.
  • Archiving integration with Exchange.
  • Configure archiving.
  • Configuring monitoring tools.
  • Analyze reports.
  • Practical work Configure archiving.
  • Configure monitoring tools.
  • Report analysis.
1450
Maintenance and recovery
  • High availability for SFB.
  • Updating servers.
  • Principle of Front-End "pairing".
  • Backing up and restoring the infrastructure.
  • Practical work Updating the servers.
  • Configure a pairing.
  • Back up and restore the 'infrastructure.
1451

VMware 5 Administrator certification cycle

★★★★★

  • SII-396
  • 5 Days (35 Hours)

Description

This cycle will provide you with all the knowledge necessary to install and configure the components of a vSphere 5.5 virtual infrastructure. You will learn how to create, deploy and use virtual machines (VMs), troubleshoot ESX/ESXi servers and backup the infrastructure with the different tools.

Who is this training for ?

For whom

Systems administrators and engineers responsible for managing and administering a VMware vSphere 5.5 infrastructure.

1452
Prerequisites

None

Training objectives

Install and configure the components of a VMware vSphere 5.5 virtual infrastructure
Set up VM replication with vSphere Replication
Set up Distributed Switches and use their advanced features
Identify the main problems related to CPU performance, Memory, Network and Storage
Script the creation and administration tasks related to virtual machines with PowerCli

1453

Training program

Virtual Infrastructure Overview
  • Virtual infrastructure.
  • vSphere architecture and components.
  • Scalability: migrations.
Creation and administration of virtual machines
  • Installation of an OS inside a VM (virtual machine).
  • Thin Provisionning, VMDirectPath.
  • Snapshot, cloning, Template management .
  • Practical work Create and administer virtual machines.
  • Migrate VMs.
vSphere Management Assistant
  • Deploying vSphere Management Assistant (vMA).
  • Configuring and administering vSphere Management Assistant.
  • Commands that can be used with vMA.
  • Lab Using vSphere Management Assistant to configure, diagnose, and troubleshoot an ESX/ESXi server.
1454
Network diagnostics
  • Standard vSwitches vs Distributed Virtuals Switches.
  • VLANs and Private VLANs.
  • Advanced configuration of vNetwork components.
  • Administration and diagnostics network of an ESX.
  • Network administration and diagnostics of an ESXi with vSphere Management Assistant.
  • Analysis of network traffic.
  • Practical work r nConfigure the network elements.
  • Setting up diagnostic elements and interpreting results.
  • Network analysis.
Diagnosis of storage
  • vSphere Storage Architecture (PSA).
  • Detailed view of storage configuration.
  • Configuring and diagnosing iSCSI storage.
  • Practical work Analysis of the storage configuration.
  • Storage diagnosis and optimization.
1455
Implementing PowerCLI
  • Introducing vSphere PowerCLI.
  • Installing vSphere PowerCLI.
  • The main commands of vSphere PowerCLI.
  • Automate ESX network configuration /ESXi.
  • Automate storage configuration.
  • Automate the creation and deployment of virtual machines.
  • Collect information about ESX servers (configuration , configuration)..
  • Practical work Installation and getting started with PowerCLI.
  • Write and manage by scripts the creation and administration tasks related to virtual machines; vSphere infrastructure status.
1456

VMware, summary of technical solutions

★★★★★

  • SII-375
  • 2 Days (14 Hours)

Description

This seminar offers a technical summary of the different infrastructure virtualization solutions with VMware technologies. It will allow you to understand how to optimally manage and supervise a VMware virtual platform and how to implement a security policy as well as a Business Recovery Plan (DRP) in VMware environments. You will also discover private and public Cloud Computing through the VMware Cloud.

Who is this training for ?

For whom

IT, production, operations, user relations, Helpdesk directors, system or network administrators, application managers, project managers, etc.

1457
Prerequisites

None

Training objectives

Define the fundamental principles of virtualization: concepts, advantages, evolution Know the different infrastructure virtualization solutions with VMware technology Understand the supervision and optimal management of a VMware virtual platform Explain the different backup solutions a VMware virtual infrastructure

1458

Training program

Introduction to virtualization
  • Definition of virtualization.
  • The concepts of infrastructure virtualization (servers, networks, storage): what is possible to virtualize.
  • The advantages of virtual technology, its limits.
  • The main use cases of virtualization.
  • The evolution of the virtualization market.
  • The main players on the market.
  • The positioning of VMware compared to other publishers.
  • Know the different infrastructure virtualization solutions with VMware technology.
L'Operating System de la virtualisation VMware vSphere
  • Overview of the VMware vSphere architecture.
  • Overview of a hypervisor: features, the ESXi hypervisor.
  • Managing virtual machines and physical hosts with vCenter.
  • The vCenter Server administration server: usefulness, what you can do and what not to do.
  • Virtual machines: definition , functionalities and usefulness.
  • Virtual network management: standard switches and distributed switches.
  • Difference between a real physical network and a virtual network.
  • The storage management.
  • What you can and can't do.
1459
VMware vSphere: overview of advanced features
  • VMware vSphere 5 licenses.
  • Migrations of virtual machines without interruption of services (VMotion, Storage VMotion, etc.
  • ).
  • Presentation of VMotion: features, what it brings to virtualization.
  • Presentation of EVC ("Enhanced VMotion Compatibility").
  • Presentation of VMotion: features, what it brings to virtualization.
  • Optimization of resource management (DRS, Storage DRS, Resources Pools, vApp).
  • Presentation of DRS: features , what it brings to virtualization.
  • Presentation of Storage DRS: functionalities, what it brings to virtualization.
  • Presentation of Resource Pools: functionalities, what it it brings to virtualization.
  • Presentation of vApp: functionalities, what it brings to virtualization.
  • High availability (VMware HA, Fault Tolerance).
  • Why implement high availability with the VMware range? The scalability of VMware vSphere (Auto Deploy, Host Profile, Linked Mode).
1460
VMware Horizon Suite: Virtual apps and desktops
  • The issues related to the virtual desktop.
  • Horizon View or the virtual desktop solution.
  • Presentation of Horizon View: features, what it brings to virtualization.
  • Application virtualization with ThinApp.
  • Presentation of ThinApp: features, what it brings to virtualization.
  • This what virtualization brings to mobility.
  • Mobility and BYOD (bring your own devices): Horizon Workspace, access to applications and data.
VMware et le Cloud Computing
  • Discover private and public Cloud Computing through the VMware Cloud.
  • Deliver IT services through the VMware Cloud.
  • VMware Cloud solution, vCloud Director : features, what it brings to virtualization.
  • Presentation of vCloud Connector, the private Cloud and public Cloud interconnection: features.
Supervision and management of virtual infrastructures
  • Understand the optimal monitoring and management of a VMware virtual platform.
  • vCenter Operations Management Suite (monitoring and management of virtual infrastructures).
  • Monitoring, prevention and Capacity Planning with vCenter Operation Manager.
  • Application mapping of virtual machines with vCenter Infrastructure Navigator.
  • Measuring the cost of using virtual infrastructures with vCenter Chargeback Manager.
  • Automating virtual infrastructure operations with vCenter Orchestrator.
1461
Securing and PRA of virtual infrastructures
  • Understand the security and DRP (Disaster Recovery Plan) of a VMware virtual infrastructure.
  • Securing networks and data with vCloud Networking and Security and vShield Endpoint.
  • Backup of VMs (virtual machines).
  • What a PRA (Disaster Recovery Plan) is, what it contains, its objective.
  • Implementation of a PRA (Disaster Recovery Plan), with vCenter Site Recovery Manager.
  • Presentation of vCenter Site Recovery Manager: features, what it brings to virtualization.
1462

VMware vSphere 6, implement new features

★★★★★

  • SII-380
  • 2 Days (14 Hours)

Description

This training will allow you to discover the new features of the VMware vSphere 6.0 version. You will learn in particular how to implement the new network functionalities of Distributed Switches and the new high availability architecture as well as how to optimize the storage and deployment of servers.

Who is this training for ?

For whom

Administrators of a VMware vSphere 5.x/4.x infrastructure wishing to learn more about the new features of VMware vSphere 6.0.

1463
Prerequisites

None

Training objectives

Understand and configure the improvements made to virtual machines in vSphere 6.0 6
Understand the steps necessary for updating your virtual infrastructure 5.x to
Master the new version of the web client and its new orientation towards the Cloud
Deploy vSphere 6 in an existing vSphere environment

1464

Training program

The new vSphere architecture
  • Market status and trends in the virtualization industry.
  • Cloud and Big Data technological directions.
  • Actual improvements on ESXi, vCenter and Update components Manager.
  • VMware vSphere 6 licenses.
  • 0.
  • Updating vSphere 5 components.
  • x to vSphere 6 .
  • 0.
  • Practical work Updating a VMware vSphere 5 infrastructure.
  • x to VMware vSphere 6.
  • 0.
vCenter Server 6
  • Installation process for deploying vCenter Server.
  • Migration and thin client constraints.
  • The vCenter 6 Linux appliance.
  • New PSC (Platform Service Controller) architecture, vCenter Single Sign On capabilities.
  • Hands-on Update to vCenter v6, Linux appliance deployment.
1465
Storage and network management
  • What's new in storage.
  • Configuring virtual storage.
  • Storage strategies.
  • Virtual volumes.
  • New virtual network ports.
  • The functionalities of Network I/O Control.
  • Practical work Configure the network.
  • Installation and implementation works on virtual volumes.
Administration and management of virtual machines
  • New capabilities of virtual machines.
  • New features related to VMware vMotion.
  • Practical work Updating virtual machines and templates.
Data protection
  • Data protection under vSphere 6.
  • 0.
  • Backup with the new VDP (vSphere Data Protection).
  • Practical work Deployment and implementation of VDP 6.
1466
Management and monitoring of VMware virtual infrastructure
  • Hardware and alarms.
  • Update Manager 6.
  • Update Manager update, manual and scripted.
  • Post-migration actions.
  • Practical work Update Update Manager 6.
Scalability
  • VMware VMotion Advanced, vSphere DRS.
  • Setting up and configuring VMware Storage DRS.
High availability
  • Fault Tolerance enhancements.
  • New VMware HA architecture.
  • Configure cross-vCenter Server system migration.
1467

VMware vSphere 6, installation, configuration et administration

★★★★★

  • SII-292
  • 5 Days (35 Hours)

Description

You will learn how to install, configure and administer the components of a VMware vSphere 6 virtual infrastructure. You will study how to manage the virtual network, storage, resources and deployment of machines. You will also see how to secure and safeguard the infrastructure set up.

Who is this training for ?

For whom

This training is aimed at system administrators and architects wishing to quickly get started with the VMware vSphere 6 software suite (ESXi Server 6 and vCenter 6).

1468
Prerequisites

None

Training objectives

Install and configure the components of a VMware vSphere 6 virtual infrastructure: ESXi, vCenter
Configure and manage the virtual network under vSphere
Configure, manage and optimize storage under VMware vSphere
Improve and optimize resource allocation with VMware Distributed Resource Schedule
Implement VM replication with vSphere Replication
Implement virtual machine fault tolerance with Fault Tolerance
Secure access to VMware infrastructure

1469

Training program

vSphere 6, vCenter 6
  • Architecture, components, the PSC (Platform Services Controller).
  • Installation of vCenter Server 6 under Windows.
  • Practical work Install, configure a server ESXi, vCenter 6.
  • Deploy the vCenter 6 Appliance.
Network and storage management
  • Standard virtual switches.
  • Advanced network configuration: security, traffic/teaming management.
  • Fibre Channel SAN storage, iSCSI SAN and NFS.
  • Datastores: creation and management.
  • Practical work Configure and manage the virtual network, optimize storage.
Virtual machine (VM) administration
  • Cloning, snapshot and cold migration.
  • Virtual hardware management: Thin Provisioning, VMDirectPath.
  • Backup with VMware Data Protection.
  • Monitoring and managing resource usage.
  • Practical work Create VMs, templates.
  • Clone, backup and cold migration of VMs.
  • Monitoring and managing resource usage.
1470
Infrastructure access security
  • ESXi: the firewall, integrate it with the Active Directory.
  • Securing access: roles and permissions.
  • Update management ( VMware Update Manager).
  • Practical work Secure access to the VMware infrastructure.
  • Configure and administer the firewall in ESXi.
  • Install vCenter Update Manager.
  • Manage updates.
Resource monitoring and management
  • Optimization of CPU and memory usage.
  • Alarms.
  • Practical work Implementation of alarms, monitoring CPU consumption on a VM.
  • Create an alarm linked to an event.
High availability and continuity of service
  • Management of a VMware High Availability (HA) cluster.
  • Practical work Implement high availability and a VM backup policy.
  • Set up VM replication (vSphere Replication).
1471
Virtual Datacenter Scalability
  • VMware VMotion, VMware Storage VMotion, VMware Enhanced VMotion.
  • Managing a Distributed Resource Scheduler (DRS) Cluster.
  • Configuring Enhanced VMotion Compatibility (EVC) ).
  • Distributed Power Management (DPM) management.
  • Installation of VMware Converter Standalone: ​​installation, migration.
  • Practical work Improve, optimize resources (VMware Distributed Resource Schedule).
  • Manage virtual infrastructure updates.
1472

VMware vSphere 6, clustering and high availability

★★★★★

  • SII-423
  • 2 Days (14 Hours)

Description

This training course will give you the skills you need to build a highly available VMware vSphere 8 infrastructure. You'll discover how to deploy VMware VM clusters and guarantee continuous VM uptime with VMware Multiprocessor Fault Tolerance.

Who is this training for ?

For whom

For system administrators and architects with experience of VMware vSphere who want to deepen their knowledge.

1473
Prerequisites

Training objectives

  • Implement a high-availability VMware vSphere 8 infrastructure
  • Guarantee continuous availability of virtual machines with VMware Fault Tolerance
  • Optimize VM file distribution to avoid disk bottlenecks
  • Configure an advanced VMware DRS cluster
  • Reduce the energy consumption of your VMware infrastructure with Distributed Power Management
  • Deploy ESXi servers via PXE with VMware Auto Deploy

1474

Training program

Continuity of service
  • Network and storage redundancy.
  • High availability: maintenance of ESXi and storage, virtual machines and vCenter.
  • Disaster Recovery Plan .
Setting up clusters
  • Supported VM cluster architectures.
  • Configuration of a VMware cluster.
  • Practical work Configuration of VM clusters.
Clusters VMware High Availability
  • Architecture and operation of vSphere HA.
  • VMware HA cluster: configuration, monitoring.
  • Management and calculation of slot sizes.
  • Managing admission policies.
  • Practical work Using the HA function in a VM cluster.
  • Configuring VMware HA Admission Control Policies.
  • Monitoring VMware HA.
VMware Fault Tolerance
  • Presentation, implementation and configuration.
  • Best practices.
  • Practical work Implementation of Fault Tolerance technology for the protection of VMs .
1475
Storage resource management
  • How the different virtual hard disk formats work.
  • Dynamic management of VMFS volumes.
  • The vStorage API for Array Integration primitives.
  • Setting up storage profiles for VMs.
  • Presentation and creation of Datastore clusters.
  • Setting up and configuring VMware Storage DRS.
  • Practical work Implementation of VMware Storage DRS.
Clusters VMware DRS
  • Detailed operation of VMware DRS.
  • Setting up and configuring a DRS cluster.
  • Configuring VM affinity rules, DRS groups and DPM.
  • Practical work Optimization of load and energy consumption via vSphere DRS.
VMware Enhanced VMotion
  • VMotion between vCenter servers.
  • VMotion between virtual switches.
  • Long distance VMotion.
  • Practical work Using Enhanced VMotion .
1476
Deploying ESXi servers
  • VMware Host Profile: Maintaining ESXi Compliance.
  • Creating Custom ESXi Installation Packages with Image Builder.
  • VMware Auto Deploy: Automated Deployment of ESXi.
  • Practical work Deployment of ESX/ESXi servers with Host profiles and Auto Deploy.
1477

VMware vSphere 6, supervision et exploitation

★★★★★

  • SII-376
  • 3 Days (21 Hours)

Description

This course will provide you with all the elements necessary to operate VMware vSphere 6 effectively. You will see concretely how to manage virtual machines on a daily basis and back them up, how to monitor resource usage and how to update the infrastructure.

Who is this training for ?

For whom

Operators in charge of ESXi, ESX and/or vCenter Server servers.

1478
Prerequisites

None

Training objectives

Monitor and manage the resources of the VMware vSphere 6 virtual platform Create, configure and administer virtual machines Back up virtual machines Manage virtual infrastructure updates with Update Manager Know how to analyze available log files< /p>

1479

Training program

Virtualization
  • Presentation of virtualization.
  • The VMware offer.
VMware vSphere 6 Overview
  • The architecture and components of vSphere 6.
  • Storage: Datastore.
  • Network: Port Group Virtual Machine.
  • The vSphere inventory management.
  • Practical work Discovery and getting started with the VMware vSphere 6 virtual infrastructure.
1480
Deployment and administration of virtual machines (VMs)
  • Elements of a virtual machine.
  • Creation and duplication of a new VM.
  • Creation and management of models.
  • Management virtual hardware: Thin provisioning, VMDirectPath.
  • Snapshots of virtual machines.
  • Cold migration of a VM.
  • Moving a VM from one host ESX server to another with VMware VMotion.
  • Transferring disks with Storage VMotion.
  • Practical work Creating a simple virtual machine.
  • VM deployment with templates.
  • Migrating a VM with VMotion and Storage VMotion.
  • Using VM snapshots.
1481
Resource monitoring and utilization
  • Managing VM resources.
  • Optimizing CPU and memory usage.
  • Managing admission control.
  • Performance monitoring.
  • Infrastructure monitoring with alarms.
  • Using a Cluster Distributed Resource Scheduler.
  • Practical work r nSetting up alarms.
  • Monitoring VM parameters and modifying virtual platform resources.
Backup and replication of virtual machines
  • Types of backups, tools that can be used.
  • Replication of VMs with vSphere Replication.
  • Recovery of VMs (on schedule or in the event of a disaster).
  • Practical work Backing up VMs.
Updating virtual infrastructure
  • Update recovery methods.
  • Managing updates with VMware Update Manager.
  • Switching the infrastructure to maintenance mode.
  • Practical work Updating the infrastructure with the VMware Update Manager tool.
1482
Diagnostics
  • Identification of available log files.
  • Management of vCenter, ESX and ESXi logs.
  • Practical work Analysis of log files.
1483

VMware vSphere 5.5, optimization and advanced administration

★★★★★

  • SII-377
  • 5 Days (35 Hours)

Description

This training will provide you with the knowledge necessary to optimize and implement the advanced features of VMware vSphere 5.5. You will see, among other things, how to optimize the configuration of VMs, identify problems related to CPU, memory, network and storage performance.

Who is this training for ?

For whom

This training is aimed at administrators and system architects experienced in the VMware vSphere 5.5 software suite wishing to acquire advanced knowledge.

1484
Prerequisites

None

Training objectives

Optimize the configuration of VMs in a vSphere 5
5 environment Understand the allocation of CPU, memory, network and storage resources Identify the main problems related to CPU, memory, network and storage performance Set up Distributed Switches and use their functionalities advanced Improve the deployment and configuration of ESXi servers

1485

Training program

vSphere Management Assistant (vMA)
  • Deploy, configure, administer vMA.
  • Access ESXi using SHELL and SSH.
  • Log files (ESXi, vCenter server).
  • Centralize logs with vMA.
  • Practical work Example of using vMA.
Performance
  • Performance factors in a virtual environment.
  • Performance monitoring with vCenter, resxtop.
  • Practical work Performance visualization with vMA and resxtop, the client vSphere.
Les Distributed Virtual Switches (dvSwitch)
  • Creation, configuration and management.
  • Migration of standard virtual switches.
  • Understanding NetFlow, Port Mirroring, LACP.
  • Private VLAN.
  • QoS with Network I/O Control.
  • Practical work Network configuration using command lines.
1486
Network performance
  • Adapter features.
  • Set up a traffic analyzer.
  • Monitor performance metrics.
  • Hands-on r nTroubleshoot typical performance issues.
Storage access, performance and scalability
  • Storage performance factors (protocols, VMFS, Load Balancing).
  • Identify and troubleshoot key storage performance issues.
  • Configure Multipathing storage.
  • Understanding VAAI, VASA storage drivers.
  • Using storage profiles for VMs.
  • Datastore Clusters.
  • Practical work Configuration of Storage DRS, Storage IO Control.
Deployment, optimized server management
  • VMware Host Profile: maintaining compliance, deploying ESXi.
  • VMware vCenter Linked Mode: centralized management.
  • Image Builder: creating an installation image ESXi.
  • vSphere Auto Deploy: Deploy ESXi hosts.
1487
Processor and memory performance
  • CPU Scheduler features.
  • Monitor CPU resources and memory.
  • Memory management techniques on an ESXi.
  • Hands-on work Troubleshoot common CPU performance issues.
Performance of VMs and Clusters
  • Performance at DRS Clusters level, resource pools, resource allocation settings.
  • Troubleshoot virtual machine startup issues, DRS Clusters, HA.
1488

VMware vSphere 5.1, installation, configuration et administration

★★★★★

  • SII-379
  • 5 Days (35 Hours)

Description

This course will show you how to install and configure the components of a VMware vSphere 5.1 virtual infrastructure. You will learn how to manage the virtual network, storage and resources, create, deploy and use virtual machines, as well as administer, secure and backup the infrastructure.

Who is this training for ?

For whom

System administrators and architects wishing to quickly get started with the VMware vSphere 5.1 suite (ESXi Server 5.1 and vCenter 5.1).

1489
Prerequisites

None

Training objectives

Install and configure the components of a VMware vSphere 5
1 virtual infrastructure Configure and manage the virtual network under vSphere Configure, manage and optimize storage under VMware vSphere Improve and optimize resource allocation with VMware Distributed Resource Schedule Implement a Virtual Machine backup policy Implement fault tolerance for virtual machines with Fault Tolerance

1490

Training program

Virtual infrastructure
  • The main use cases of virtualization.
  • Presentation of VMware vSphere, licenses.
  • Architecture and components of vSphere 5.
  • 1 Practical work Install an ESXi server.
The VMware vCenter 5.1 server
  • Installing vCenter Server 5.
  • 1 on Windows.
  • Deploying the vCenter 5 Appliance.
  • 1 The SSO server.
  • The Inventory Service server.
  • Practical work Install and configure vCenter 5.
  • 1.
Gestion des vNetwork Standard Switch
  • Standard virtual switches.
  • Advanced network configuration (security, traffic management, teaming management).
  • Practical work Configure network elements .
1491
Storage management under vSphere: vStorage
  • Presentation of the different storage protocols.
  • Fiber Channel SAN storage, iSCSI SAN and NFS.
  • Creation and management of Datastores.
  • Practical work Configure storage.
Creation, deployment and administration of virtual machines (VMs)
  • Creation, deletion and management of VMs, Templates.
  • Cold migration of a VM.
  • Management of virtual hardware: Thin Provisionning, VMDirectPath.
  • Snapshots of virtual machines.
  • Backing up VMs with VMware Data Protection.
  • Monitoring and managing resource usage.
  • Practical work Create VMs and Templates.
  • Clone a virtual machine (VM).
1492
Infrastructure access security
  • Configure and administer the firewall in ESXi.
  • Use Lockdown Mode.
  • Integrate ESXi with Active Directory.
  • Securing access: roles and permissions.
  • Installing vCenter Update Manager.
  • Managing updates with VMware Update Manager.
High availability and continuity of service
  • Managing a VMware High Availability (HA) cluster.
  • Fault tolerance with VMware Fault Tolerance.
  • VMware vSphere Replication.
  • Practical work Implement high availability and a VM backup policy.
Virtual Datacenter Scalability
  • VMware Storage VMotionVMware Storage VMotion.
  • Gestion d'un Cluster Distributed Resource Scheduler.
  • Configuration du Enhanced VMotion Compatibility (EVC).
  • Gestion de Distributed Power Management (DPM).
1493

VMware vSphere 5.0, supervision et exploitation

★★★★★

  • SII-291
  • 3 Days (21 Hours)

Description

This training will provide you with all the elements necessary to operate VMware vSphere 5 in the most efficient conditions. You will see concretely how to manage virtual machines on a daily basis and back them up, how to monitor resource usage and update the infrastructure.

Who is this training for ?

For whom

Operators or operators responsible for operating ESXi, ESX and/or vCenter Server servers.

1494
Prerequisites

None

Training objectives

Monitor and manage VMware vSphere 5.0 virtual platform resources
Create, configure and administer virtual machines
Back up virtual machines
Manage virtual infrastructure updates with Update Manager
Know how to analyze files of available logs

1495

Training program

Virtualization
  • Presentation of virtualization.
  • The VMware offer.
VMware vSphere 5 Overview
  • Architecture of vSphere 5.
  • The components of vSphere 5 for operators.
  • Storage: Datastore.
  • Network: Port Group Virtual Machine VSphere inventory management.
  • Practical work Discovery and getting started with the VMware vSphere 5 virtual infrastructure.
1496
Deployment and administration of virtual machines (VMs)
  • Elements of a VM.
  • Virtual hardware management.
  • Creation and duplication of a new VM.
  • Creation and management templates.
  • Snapshots of virtual machines.
  • Cold migration of a VM.
  • Moving a VM from a host ESX server to a other with VMware VMotion.
  • Transferring disks with Storage VMotion.
  • Practical work Creating a simple virtual machine.
  • Deploying VMs with Templates.
  • Migrating a VM with VMotion and Storage VMotion.
  • Using VM snapshots.
1497
Resource monitoring and utilization
  • Managing VM resources.
  • Optimizing CPU and memory usage.
  • Managing admission control.
  • Performance monitoring.
  • Infrastructure monitoring with alarms.
  • Using a Cluster Distributed Resource Scheduler.
  • Practical work r nSetting up alarms.
  • Monitoring VM parameters and modifying virtual platform resources.
Backing up virtual machines
  • Types of backups.
  • Tools that can be used (VMware Data Recovery.
  • ).
  • Practical work Backing up VMs with VMware Data Recovery.
Updating virtual infrastructure
  • Update recovery methods.
  • Managing updates with VMware Update Manager.
  • Switching the infrastructure to maintenance mode.
  • Practical work Updating the infrastructure with the VMware Update Manager tool.
1498
Diagnostics
  • Identification of available log files.
  • Management of vCenter, ESX and ESXi logs.
  • Practical work Analysis of log files.
1499

VMware Horizon View 6, workstation management installation, configuration and administration

★★★★★

  • SII-378
  • 4 Days (28 Hours)

Description

This course will teach you how to deploy custom virtual desktops with VMware View. You will learn how to implement the components of this solution (VMware View Manager, View Composer, ThinApp) and how to administer a fleet of virtual machines without forgetting how to secure the environment.

Who is this training for ?

For whom

Administrators responsible for deploying virtual desktops within their organization.

1500
Prerequisites

None

Training objectives

Install and configure the various VMware View 6 components
Deploy virtualized desktops
Manage user profiles
Secure the VMware View environment
Use ThinApp to virtualize applications

1501

Training program

Setting up the VMware View infrastructure
  • Components related to a VMware View infrastructure.
  • VMware View product licenses.
  • Installation, configuration of ESXi and vCenter servers.
  • Network and storage architecture for VMware View.
  • VMware View: virtual machines, features.
  • Presentation of VMware VMotion, DRS and HA.
  • Practical work rnInstall, configure VMware View.
VMware View Connection Server
  • Prerequisites and installation of the connection broker.
  • Configuring View Connection Server.
  • Hands-on Configure View Connection Server.
VMware View virtual desktops
  • Configuration, optimization of virtual workstations.
  • The VMware View agent.
  • Display protocols (RDP, PCoIP and Blast).
  • Practical work Deploy virtualized workstations.
1502
VMware View client components
  • The VMware View client, Thin client.
  • VMware Blast: HTML access to workstations.
  • Unity Touch: access from mobile devices.
  • Virtual Printing.
  • Practical work Access virtual desktops.
VMware View Administrator
  • View Administrator configuration.
  • Session management and user access policy.
  • Administrative delegation.
  • Online administration commands, the vdmadmin utility.
  • Kiosk Mode Description.
  • Backing up and restoring VMware View.
  • Securing remote connections, View Security server, View Replica and Load Balancing server.
  • Practical work Administer and secure the fleet.
1503
VMware View desktop pools
  • Manual, automated desktop pools.
  • Application virtualization: ThinApp, management of ThinApp applications with View Administrator.
  • User profiles with View Persona Management.
  • Creation and management of RDS workstations.
  • Deploy and provide pools of RDS desktops and applications.
  • Practical work Management of user profiles.
  • Use ThinApp to virtualize applications.
Related clones
  • View Composer: features, installation.
  • Linked Clones: concepts.
  • Deployment of workstations in linked clones.
  • Management of linked clones: recompose, refresh, rebalance.
  • Managing persistent disks.
  • Practical work Using Linked Clones.
1504

VMware vSphere 6.7 Training: Install, Configure and Administer

★★★★★

  • SII-207
  • 5 Days (35 Hours)

Description

This intensive training focuses on the installation, configuration and management of VMware vSphere 6.7 which includes VMware ESXI 6.7 and VMware vCenter 6.7. The training equips participants with the skills and knowledge to administer a vSphere virtualization infrastructure for an organization of any size.

Who is this training for ?

For whom
Systems administrators and systems engineers Candidates for VCP-DCV certification 2019
1505
Prerequisites

None

Training objectives

Describe software-defined Data Center •
Introduce vSphere components and their functions in the infrastructure •
Deploy an ESXi host •
Deploy VMware vCenter Server Appliance •
Use a content library as a data store, to store it ISOs, templates and deploy virtual machines •
Describe the vCenter Server architecture •
Use vCenter Server to manage an ESXi host •
Configure and manage a vSphere infrastructure with VMware Host and VMware vSphere clients •
Describe virtual networks with standard vSwitches •
Configure standard vSwitch policies •
Use vCenter Server to manage different types of host storage: VMware vSphere VMFS, NFS, iSCSI and RDM •
Review the features and functions of Fiber Channel and vSAN •
Manage virtual machines, templates, clones, and snapshots •
Migrate virtual machines with VMware vSphere vMotion •
Configure vSphere high availability •
Introduce VMware vSphere high availability cluster architecture •
Manage high availability and vSphere fault tolerance •
Use vSphere replication and data protection to back up and replicate virtual machines •
Use Distributed Resource Scheduler (DRS) clusters to improve high availability and optimize performance •
Use VMware vSphere Update Manager to apply patches and improve troubleshooting of ESXi hosts, virtual machines, and vCenter Server operation •
Identify a troubleshooting methodology to diagnose errors and effectively improve troubleshooting

1506

Server Virtualization with Windows Server Hyper-V and System Center (74-409)

★★★★★

  • SII-208
  • 5 Days (35 Hours)

Description

This course will teach you how to implement and manage server virtualization with Hyper-V and System Center 2012 R2. You will also see how to monitor a network of VMs with SCOM and manage storage and networking with SC 2012 R2 VMM. This course covers all the topics necessary to prepare for the Microsoft 74-409 exam.

Who is this training for ?

For whom
Systems/network administrators and engineers.
1507
Prerequisites

None

Training objectives

Know how to set up and administer server virtualization with Hyper-V and Sys Center 201tem2 R2
Manage storage and network infrastructure with System Center 2012 R2 VMM
Protect and monitor virtualization infrastructure

1508

Training program

Microsoft virtualization products
  • The System Center 2012 R2 application.
  • Identify virtualization-compatible components.
  • Virtualization and the Cloud.
Virtualization with Hyper-V
  • Installation procedure and configuration of Hyper-V.
  • Disks and virtual machines (VMs).
  • The network of virtual machines.
  • Practical work Create and configure virtual disks, virtual machines.
  • Example of importing virtual machines.
  • Create a virtual network.
High Availability and Clustering with Hyper-V
  • High availability in a virtualized environment.
  • Moving virtual machines.
  • Replicating virtual machines.
  • Shared storage.
  • Practical work Moving virtual machines.
  • Creating a Cluster with Hyper-V.
1509
System Center 2012 R2 Virtual Machine Manager
  • System Center and server virtualization.
  • Getting started with the application.
  • Hosting servers and server groups.
  • Storage and network management with SC 2012 R2 VMM.
  • Practical work Install and configure System Center 2012 R2 VMM.
  • Example of storage infrastructure .
Managing VMs with System Center 2012 R2 VMM
  • VM administration.
  • Creation, cloning and conversion of VMs.
  • How to update VMs? Library, profiles and VM models.
  • Practical work Create a virtual machine and modify its properties.
  • Example of cloning a virtual machine.
  • Configure the VMM library.
1510
Cloud management with System Center 2012 R2 VMM
  • Cloud concepts.
  • User roles and administration delegation.
  • Service management with SC 2012 R2 VMM and App Controller.
  • Know how to use SC 2012 R2 App Controller.
  • Practical work Create a private Cloud and deploy VMs.
  • Create and deploy a service .
  • Configure App Controller.
Protection and monitoring of virtualization infrastructure
  • Back up and restore VMs.
  • Protect infrastructure with Data Protection Manager.
  • Monitoring and performance with System Center Operations Manager.
  • Practical work Implement component monitoring with Operation Manager.
1511

Citrix XenApp 7.9, administration

★★★★★

  • SII-361
  • 4 Days (28 Hours)

Description

This training will allow you to acquire the skills to install, configure, monitor and troubleshoot the components of a Citrix XenApp 7.9 virtual infrastructure in a mixed environment (OS Servers and Microsoft Windows workstations, physical or virtualized).< /p>

Who is this training for ?

For whom

System and network administrators.

1512
Prerequisites

None

Training objectives

Install and configure XenApp 7.9 base components
Manage published resources: desktop, applications, AppDisk and AppDNA
Manage access to virtual resources: Storefront and Receiver
Monitor XenApp sites and user sessions: Director
Manage and maintain XenApp server images using the MCS and PVS provisioning services
Configure and optimize printing in a XenApp 7.9 environment

1513

Training program

Architecture, installation et configuration
  • Concepts and components.
  • Integrate XenApp into a Cloud, a Microsoft Active Directory environment.
  • Practical work
Enabling access to resources
  • Deployment, installation, stores, Receiver Web sites, authentication, server group.
  • Configure and deploy Citrix Receiver.
  • Hands-on Install and configure Citrix Store Front, web interface, Receiver HTML5 client.
  • Customize the appearance of websites.
Virtualisation de Citrix XenApp
  • XenApp integration with the main hypervisors on the market (VMware vSphere, Citrix XenServer, Microsoft SCVMM).
  • Maintenance of XenApp images (MCS, VS provisioning services).
  • Practical work Install Citrix XenServer, integrate with XenApp.
  • Create a Master image (Server OS/Workstation, configuration).
Management of printing and published resources
  • Application management, published desktops.
  • Application compatibility (Citrix AppDNA).
  • Application streaming with Microsoft APP-V.
  • Lab Create and manage a delivery group.
  • Troubleshooting publishing.
1514
Administration tools and methods
  • Management and monitoring: Console Studio, Director, PowerShell, Scout.
  • Logging administrative tasks.
  • Practical work Creating logging reports.
  • Publication of administration tools.
  • Delegation of administration.
Monitoring, user session management
  • Management of session activity (reliability, ICA persistence, reconnection).
  • Configuration of personalized Proactive Alerts and Notifications.
  • User session troubleshooting methodology , remote assistance.
  • Practical work Session management with Citrix Director.
  • Implementation of the Help Desk for user support.
  • Optimization User sessions.
Managing user profiles and policies
  • Categories, rules, filters and priorities of strategies.
  • Management and optimization of user profiles.
  • Practical work Implementation of security by strategies.
  • Optimize user profiles (Citrix UPM).
1515

Citrix XenApp 7.9 and XenDesktop 7.9, migration from previous versions

★★★★★

  • SII-382
  • 5 Days (35 Hours)

Description

This training will allow you to explore the new Citrix XenApp 7.9 release, identify the new features of XenApp 7.9, the advantages/disadvantages related to migration and discover migration strategies adapted to different needs.

Who is this training for ?

For whom

System and network administrators.

1516
Prerequisites

None

Training objectives

Understand the differences (architecture and functionality) of different XenApp versions
Create a Citrix XenApp 7.9 infrastructure
Maintain Citrix /p>

1517

Training program

Migration, installation et provisioning
  • Integration with market hypervisors (VMware ESX, Citrix
  • 9.
  • Migrate a XenApp 6 farm.
  • 5 to XenApp 7.
  • 9.
Publishing desktops and applications
  • Publishing tools (Console Studio, PowerShell, AppDisk).
  • Secure Web Apps, SaaS (Secure Browser).
  • Application: provisioning (AppDisk), migration (AppDNA).
  • Application streaming (Microsoft APP-V).
  • Practical work Application publication/desktop (Delivery Group).
  • Optimize, troubleshoot the execution of published applications (Pre-launch/Linger).
Access to published resources
  • StoreFront 3.
  • 5: new features, export, import of configuration.
  • Redundancy, load balancing.
  • Practical work rnInstall and configure Citrix Store Front, Receiver client.
  • Customize the appearance of websites.
1518
Administration de XenApp
  • Creation, delegation of administrative tasks, delegated reports.
  • Configuration logging.
  • Practical work Create custom management tasks, delegation administration, logging reports.
  • Publishing administration consoles.
User experience strategies and personalization
  • Management of user profiles and session activity using strategies.
  • Print architecture.
  • Practical work Integration of XenApp 7 strategies .
  • 9 with Microsoft AD GPOs.
  • Optimization of user profiles with Citrix UPM.
Monitoring de l'infrastructure
  • Monitoring tools (Director, Studio, PowerShell).
  • Alerts, notifications (Citrix Director).
  • Recording, auditing user sessions.
  • Practical work Session management (Citrix Director).
  • Implementation of the Help Desk for user support.
  • Troubleshooting user session openings.
1519
Advanced infrastructure management
  • Service continuity management (Leasing).
  • Support for Linux virtual desktops.
  • Citrix Studio: restarting servers.
  • Hands-on Configure XenApp load balancing, redundancy.
1520

Citrix XenDesktop 7.9, deploy applications and desktops

★★★★★

  • SII-210
  • 5 Days (35 Hours)

Description

This training will teach you how to deploy a Citrix XenDesktop 7.9 VDI solution with all of its components. You will see how to efficiently centralize and manage Windows/Linux desktops in the data center and make them available as a service to end users wherever they are.

Who is this training for ?

For whom
Systems and network administrators.
1521
Prerequisites

None

Training objectives

Install and configure Citrix

1522

Training program

Architecture
  • Virtual desktop templates.
  • The license server.
  • XenDesktop 5 update.
  • 6/7.
  • x vers 7.
  • 9.
  • Practical work Design of an architecture, choice of the VDI model.
  • Install and configure a XenDesktop site.
Virtual Offices
  • Overview of virtualization technologies.
  • VMware vSphere, Microsoft SCVMM/HyperV and Citrix XenServer hypervisors.
  • Management of connections to network resources, storage .
  • Practical work Install, configure XenServer, a XenDesktop connection to XenServer.
Provisioning Service Management (PVS)
  • Maintenance, optimization of Windows reference images.
  • Management of vDisks, Boot procedure.
  • Practical work Install and configure Citrix PVS.
  • Create a vDISK, machine catalog with PVS.
1523
Managing access to VDI resources
  • Citrix Storefront: redundancy, load balancing.
  • Store Front: stores, authentication, server group.
  • Hands-on Install and configure Citrix Store Front, the web interface.
  • Customize the appearance of websites.
  • Deploy with multiple Storefront servers.
User experience
  • Description and customization of the Citrix Receiver client configuration.
  • Management and optimization of user profiles.
  • Policies, drivers, routing, universal print server, logging.
  • Hands-on Create a basic strategy.
Site monitoring and control
  • Director Dashboard: Real-time monitoring.
  • Control of machine status (power supply, hot fixes, performance).
  • Control and monitoring of user sessions .
  • Creation of alert policies.
  • Remote assistance, user troubleshooting.
  • Recording of user sessions.
  • Work practices Configure Citrix Director for multi-site support.
  • Implementing remote user assistance
1524
Administration of an infrastructure
  • Logging of administrative tasks.
  • Management of administration reports.
  • Site database: backup, restoration.
  • Practical work rnMaintaining the XenDesktop 7 infrastructure databases.
  • 9.
  • Create the logging report.
1525

Citrix XenApp 7.6, administration

★★★★★

  • SII-211
  • 5 Days (35 Hours)

Description

This training will teach you how to install, configure, administer Citrix XenApp 7.6 and all of its components. You will see in particular how to use the administration consoles as well as all the tools to configure resources and the various server parameters.

Who is this training for ?

For whom
Systems and network administrators.
1526
Prerequisites

None

Training objectives

Install and configure XenApp 7.6
Manage applications and desktops
Manage StoreFront and external access
Manage policies
Manage and administer vDisks and Provisioning Services

1527

Training program

Architectures, installation et configuration
  • Citrix XenApp 7 Components.
  • 6.
  • License Server.
  • Alert Monitoring.
  • Integration of XenApp in a Cloud.
  • FlexCast technology.
  • Practical work Installation and configuration of the license server, of XenApp.
  • Delegation of administrative tasks XenApp.
Enabling access to resources
  • Citrix Store Front: architecture, components, deployment planning and installation.
  • Store Front management (authentication, etc.
  • ).
  • Implementing access redundancy.
  • Practical work Install and configure Citrix Store Front, the web interface.
  • Manage the appearance of websites .
1528
Publishing apps and desktops
  • Managing published applications, published desktops.
  • Testing compatibility with Citrix AppDNA.
  • Streaming applications with Microsoft APP-V.
  • Lab Creating and managing an application delivery group.
  • Troubleshooting publishing.
Delegating the administration of a XenApp infrastructure
  • Management tools (STUDIO console, Director, Store Front, PowerShell).
  • Description of XenApp roles.
  • Delegation of tasks to a custom administrator.
  • Implementing administrative task logging.
  • Practical work Publishing administration tools.
  • Administrative troubleshooting.
1529
Monitoring and management of user sessions
  • Description of Citrix Director.
  • Real-time monitoring and historical trends.
  • Session activity management (reliability, ICA persistence, reconnection, etc.)
  • ).
  • Configuring remote assistance.
  • Hands-on Session management with Citrix Studio.
  • Optimization of user sessions.
Virtualisation de Citrix XenApp 7.6
  • Installation and configuration (VMWare ESX, Citrix XenServer, Microsoft SCVMM/HyperV).
  • Microsoft Active Directory integration with Citrix XenDesktop.
  • Provisioning services (MCS) Vs PVS).
  • Practical work Creation of a Master image (Server OS, workstation OS).
Citrix XenApp 7.6 Components
  • Redundancy of the site database.
  • Management of machine catalogs.
1530

Citrix XenDesktop 7.6, deploy applications and desktops

★★★★★

  • SII-310
  • 5 Days (35 Hours)

Description

In this training, you will learn how to deploy Citrix XenDesktop 7.6 and all its components, focusing on providing virtual desktops and Windows applications to users. You will also learn how to perform maintenance and image updates necessary to keep the system up to date.

Who is this training for ?

For whom

System and network administrators.

1531
Prerequisites
  • Good knowledge of Windows 2012 or 2008 system administration.

Training objectives

  • Install and configure Citrix XenDesktop 7
    6
  • Install the hypervisor
  • Configure XenDesktop 7 resources
  • Configure profiles and policies
  • Install and migrate Provisioning services

1532

Training program

Architectures, installation et configuration
  • Fundamental components, what's new in XenDesktop 7.
  • 6.
  • Virtual desktop models.
  • Flexcast Management Architecture (FMA).
  • XenDesktop communication ports and protocols.
  • Managing the Citrix licensing system.
  • Hardware and software prerequisites.
  • Creating a reference image, of a new site.
  • Practical work Installing XenDesktop.
  • Installation troubleshooting.
Delegation of the administration of a XenDesktop infrastructure
  • Management tools (STUDIO Console, Desktop Director, Store Front, PowerShell).
  • Delegation of tasks to a custom administrator.
  • Implementing logging administrative tasks.
  • Practical work Administration of an infrastructure.
1533
Managing resource access and policies
  • Citrix Receiver client description.
  • Store Front architecture.
  • How to access virtual desktops.
  • Management of Store Front stores.
  • Creation and configuration of policies.
  • Filters and priorities of Citrix and Microsoft AD policies.
  • Practical work Information management 'access to resources.
  • Implementing and troubleshooting Store Front.
  • Managing user profiles.
  • Troubleshooting policies.
Virtual Infrastructure Administration (VDI)
  • Reference images, machine catalogs (creation, addition/deletion of machines).
  • Management of distribution groups.
  • Maintenance of VDI components.
  • Moving VDA.
  • Practical work Creation and management of reference images (Server OS, workstation OS).
1534
Monitoring user sessions
  • Director Dashboard: real-time monitoring and XenDesktop site history.
  • Session management with Citrix Studio.
  • Practical work Performance analysis and troubleshooting.
Provisioning Service Management (PVS)
  • Architecture and components.
  • Comparison "Machine Creation Service" and "Provisioning Service".
  • Management of vDisks, Boot procedure.
  • Practical work PVS troubleshooting.
Administration des impressions
  • Printing: configuration, optimization, and troubleshooting.
  • Driver management.
1535

Citrix XenServer 6.5, installation, configuration et administration

★★★★★

  • SII-213
  • 3 Days (21 Hours)

Description

This course will teach you how to deploy and administer Windows and Linux virtual machines with Citrix XenServer, XenCenter and the "Provisioning" service. You will see how to install and configure these solutions, how to manage the network, storage, resources and guarantee the availability of services.

Who is this training for ?

For whom
Systems and network administrators, network architects.
1536
Prerequisites

None

Training objectives

Install and configure XenServer 6.5
Create and manage Windows and Linux virtual machines
Configure networking and storage
Configure resource usage
Implement high availability (HA) Citrix XenServer

1537

Training program

Architecture
  • What's new in XenServer 6.
  • 5.
  • Comparison VMware vSphere and Microsoft SCVMM/HyperV.
Planning and Installation
  • Installation: XenServer, XenCenter and XenServer Tools.
  • Deployment of updates, Additional packs.
  • Management tools (XSConsole, ).
  • Practical work Install, configure XenServer and XenCenter.
Creation and management of VMs
  • Architecture of Windows and Linux VMs.
  • VM: creation, import, export and creation of models.
  • Management of ISO, vApps, P2V and V2V libraries.
  • Practical work Create and manage Windows and Linux VMs.
Network and storage management
  • XenServer virtual network architecture and components (PIF, Virtual Switch, VIF, DvSwitch).
  • Load balancing, NIC aggregation (BOND), QOS management.
  • Network control and monitoring by Distributed vSwitch Controller.
  • Architecture, storage technologies (SAN, NAS, DAS), virtual storage components (SR, PBD, VBD, VDI, VHD).
  • Method for creating Repository Storage for VMs.
  • Practical work Configure the network and storage.
1538
Resource Pool Administration
  • Resource Pool Overview.
  • Changing the Pool Master.
  • Dynamic RAM Control (DMC).
  • Performance Monitoring .
  • User management and integration with Microsoft Active Directory.
  • Delegation of personalized administration tasks.
  • Practical work Configure the use of resources.
  • Manipulate control tools.
Performance and high availability
  • Disk prioritization.
  • Implementing Citrix XenServer high availability (HA).
  • XenMotion: live VM migration.
  • Disaster recovery.
  • Load distribution, energy consumption by WLB.
  • Practical work Elements of HA implementation.
1539
Provisioning service and vDisk management
  • Installation and configuration of the Provisioning service.
  • (PVS).
  • Creation and management of vDisks.
  • Practical work r nInstall and configure Provisioning.
  • Manipulate vDisks.
Maintenance
  • Resource Pool Metadata Backup.
  • XenServer: Maintenance mode, troubleshooting with logs.
  • Hotfixes, alert management.
  • Practical work Implementation of maintenance mode for XenServer servers.
  • Backup and restoration of metadata.
1540

SketchUp Pro, getting started

★★★★★

  • SII-216
  • 3 Days (21 Hours)

Description

The SketchUp animation, mapping and 3D modeling software is increasingly used in the professional field. This course will introduce you to its features and show you how to use it to develop 3D projects and create image and video renderings.

Who is this training for ?

For whom
Architects, engineers, technicians, draftsmen, designers in design offices involved in the creation and modification of 3D plans.
1541
Prerequisites

Training objectives

Navigate in three-dimensional space with SketchUp
Create and modify geometries in 3D
Create and apply textures
Present views of your model with scenes and export it

1542

Training program

Introduction
  • Presentation of SketchUp, LayOut, Style Builder.
  • Getting started with the 3D environment of SketchUp.
  • Navigation and the mouse.
  • Shortcuts.
  • Demonstration SketchUp features.
Drawing practice, basic manipulation
  • Selection types.
  • Creating a chair, step-by-step procedure.
  • Main drawing and editing tools.
  • How do I cause an axis or parallel inference? The Meter tool also allows you to resize a component or a group, or an entire model.
  • Dimensions.
  • Exercise: Creation of a box-type drawer using precise cutouts.
The components
  • Active components in the model.
  • Create an Open-Space library.
  • Linear and polar networks: move, rotate, push and pull in mode duplicated.
  • Exercise: Download lamp-type components, position them, modify them.
1543
Transformation tools
  • Scaling in three ways.
  • Symmetry and offset.
  • Revolution with the Follow Me tool.
  • Exercise: Creation of stair rails, stands, tubes, spheres, internal and external partitions, quarter-round door front.
Materials and textures
  • Create a texture to scale.
  • Place a texture on a curved surface.
  • Position a texture using the pin method.
  • Create a "frame".
  • Photographic texture (Google Street View).
  • Adapt the model into an existing photo.
  • Exercise: rnApply a photo of furniture to a volume, impression of realism.
  • Create a house and place it to scale in a photographic environment.
Section plan and solid cuts
  • Notion of sections and groups.
  • Enliven the discovery of your plan using sections.
  • Cuts, intersection, Boolean operations.
  • Exercise: Introduce the house created by the ground by making an animation of section plans.
1544
On-screen product promotion
  • Scenes.
  • Export image.
  • Export video.
  • Depth of field.
  • Soft edges .
  • Styles.
  • Example Create an animation of the virtual tour of our house and export it as a video.
1545

Cloud Infrastructure Manager certification cycle

★★★★★

  • SII-217
  • 7 Days (49 Hours)

Description

This cycle will provide you with the knowledge necessary to practice the profession of Cloud Computing Infrastructure Manager. It presents the uses, regulatory aspects and best practices for successfully moving to the Cloud. It deciphers the technical solutions to choose and deploy a Cloud solution.

Who is this training for ?

For whom
IT and functional managers. Any IT manager having to set up and/or manage a Cloud infrastructure.
1546
Prerequisites

Basic knowledge of technical architectures and IS management.


Training objectives

Evaluate the opportunities offered by Cloud Computing
Analyze the state of the art of Cloud Computing technical solutions
Understand the issues of a Cloud Computing architecture
Implement a Cloud Computing project

1547

Training program

Cloud Computing, usages et solutions
  • Definition and positioning.
  • Cloud Computing vs SaaS (Software as a Service).
  • Usage scenarios.
  • Security.
  • Collective reflection Collective discussion to differentiate the Cloud from SaaS.
Lead a Cloud Computing project
  • Go to the Cloud or not.
  • Possible objectives depending on the context.
  • Outsource non-critical and critical IT.
  • What are the criteria for making a decision? Carry out a Cloud Computing project.
  • The impacts.
  • Integration with the existing system.
  • Integration of the Cloud into companies.
  • Exchanges The impact of setting up a Cloud project.
1548
Cloud Computing, solutions techniques
  • Cloud architecture issues.
  • Multi-tenant architectures.
  • Scaling.
  • Data storage solutions in the Cloud and associated challenges.
  • Integration with the IS.
  • Creation of virtual machines.
  • PaaS Web vs PaaS Enterprise.
  • Main Cloud offerings.
  • Amazon AWS, Google AppEngine and AppEngine.
  • Microsoft Azure, Force.
  • com and VMForce.
  • Other private Cloud offers.
  • Exchanges Study of the main Cloud offers on the market.
1549
Solutions compatible with private and public Cloud offers
  • Spring/VMware Enterprise PaaS Platforms.
  • JBossRedhat Cloud PaaS Platforms.
  • Microsoft Azure Cloud Private Cloud.
  • Offers allowing you to build on top of Cloud platforms.
  • RightScale, CloudBees, etc.
  • Technical solutions for integrating Cloud bricks with SaaS offers.
  • Solutions enabling secure communication between Clouds.
  • Collective reflection Evaluation of technical solutions.
Cloud Computing, implementation of a Private Cloud solution
  • The private Cloud.
  • Definition.
  • Uses.
  • Market offers.
  • Securing a private Cloud deployment.
  • Solutions for creating a hybrid Cloud/Cloud management.
  • Case study Implementation of a Private Cloud solution.
1550
PaaS and private BigData solutions
  • VMware vFabric, AppScale, OpenShift solutions.
  • .
  • BigData and NoSQL solutions in private cloud.
  • Case studyr nImplement a BigData and NoSQL solution in a private Cloud.
1551

Cloud Computing, summary of uses and solutions

★★★★★

  • SII-310
  • 2 Days (14 Hours)

Description

The revolution brought about by Cloud Computing is now underway. From storage to data processing, including the use of “remote” applications, it is an entire dematerialized ecosystem in perpetual movement. This seminar will allow you to understand the fundamental principles of this solution as well as the impact on the company's existing IT infrastructures. You will also see the use scenarios and the different regulatory, human and technical aspects which will allow you to have a clear and complete vision of Cloud Computing.

Who is this training for ?

For whom

IT and functional management. Any IT manager.

1552
Prerequisites

None

Training objectives

Discover what Cloud Computing is
Identify the structural impacts and those linked to the security of the IT department
Evaluate the contributions of the Cloud for the company
Identify the main Cloud offers on the market
Integrate managerial and organizational issues and techniques in the IT department

1553

Training program

Introduction
  • Definition and origins of Cloud Computing.
  • Application Service Providers (ASP).
  • History leading from SaaS (Software as a Service) to Cloud Computing.
  • Positioning of SaaS, Cloud Computing.
  • Relationship between Virtualization and Cloud Computing.
  • Relationship between SOA architectures and Cloud Computing.
SaaS and Cloud Computing, the differences
  • The Software vs Cloud Computing model.
  • SaaS and Cloud Computing, what needs do they meet? Virtualization as a foundation.
  • Align its costs and needs.
  • What tomorrow's users will expect.
  • Advantages of Cloud Computing: resource outsourcing, dynamic allocation, logical isolation.
  • Disadvantages of Cloud Computing: security, legislation.
  • Consumption of Cloud Computing.
1554
State of the art of Cloud Computing solutions and use scenarios
  • SaaS offer.
  • Public, private, hybrid and community Cloud Computing.
  • The main Cloud providers.
  • Service solutions ( SalesForce and Cloud Service.
  • ).
  • Storage solutions (Dropbox, iCloud, etc.
  • ).
  • Collaborative solutions ( Office Web Apps, Google Apps.
  • ).
  • Other solutions.
  • Cloud Computing usage scenarios.
  • Impact of SaaS and Cloud Computing on Green IT.
  • Scenarios presented from a technical perspective (IaaS, PaaS).
  • Scenarios presented from a usage perspective (automation, mobility, Web integration.
  • ).
  • Eligibility of applications to be outsourced (business applications, collaborative applications, customer relationship management, etc.
  • ).
  • Social networks, Web SSO.
1555
Security
  • The levels at which security should be implemented.
  • Main questions and concerns.
  • Legal, practical and technical aspects of data protection.
  • Choice of supplier and contracting.
  • End-to-end security.
  • Password policy.
  • What backup strategy? rnAuthentication delegation?rnBackup management.
  • International standards and benchmarks on Cloud security.
1556
SaaS and Cloud
  • Possible objectives depending on the context.
  • For large accounts? SMEs? Startups? Outsource non-critical and critical IT.
  • Risks of outsourcing.
  • What criteria for making a decision? Measure and compare costs.
  • Reversibility, what strategy? How to overcome reluctance? Lead a SaaS and Cloud Computing project The impact on governance.
  • Organizational impacts.
  • The steps to follow.
  • Integration with the existing one.
  • The criteria for choosing the building blocks to outsource.
  • Personnel training.
  • Supporting change.
  • The position of IT departments vis-à-vis business management.
1557
Integration of SaaS and Cloud Computing in businesses
  • Legislative and regulatory aspects.
  • The main fears.
  • Objective reasons.
  • Perceived risks.
  • Technical aspects: communication between the IS and Cloud/SaaS solutions.
  • Single Sign On.
  • Management of internal, external accounts and access.
  • Choose the billing method.
Architecture integrating Cloud Computing
  • IS and SOA architecture.
  • IS diagram extended to include SaaS and Cloud.
  • Cloud application architecture patterns.
  • L integration between IS and SaaS solutions.
  • Integration issues between IS and Cloud.
  • Integration issues between Cloud bricks.
  • Migration of cloud bricks SI to the Cloud.
  • Manage network dependence.
1558
Private Cloud vs. Hybrid Cloud
  • The definition of private Cloud Computing.
  • Difference with Data Center and Compute Grid.
  • Basics and main virtualization technologies.
  • The Open Source tools.
  • Proprietary technologies.
  • The main families of private Clouds.
  • What challenges for the creation of a true private Cloud: IT infrastructures convergent solutions.
  • Why does the private Cloud only really take on its full meaning in hybrid mode?rnWhat are the challenges for implementing a hybrid solution?rnWhat solutions today for hybrid Clouds ? Cloud or VDC?rnTechnical solutions for the Cloud.
  • Databases for the Cloud.
  • Use.
  • Emergence of databases NoSQL and RDBMS data.
  • Fundamentals of RDBMS and NoSQL databases.
  • Possibilities and limitations of RDBMS.
  • Main NoSQL databases used for the Cloud (MongoDBn Cassandra, CouchDB, Hadoop).
  • IaaS market platforms (Amazon EC2 and S3).
  • PaaS market platforms (Amazon SQS, SimpleDB.
  • RunMyProcess.
  • com, Cordys, Facebook, Twitter.
1559

Cloud Computing, solutions techniques

★★★★★

  • SII-330
  • 2 Days (14 Hours)

Description

This seminar will allow you to decipher the issues inherent in the implementation of a Cloud architecture. You will also learn to identify the technical solutions and best practices necessary to choose and deploy the best solution for your projects.

Who is this training for ?

For whom

Architects, project managers and technical leaders.

1560
Prerequisites

None

Training objectives

1561

Training program

Introduction
  • The definition of private Cloud Computing.
  • Difference with Data Center and Compute Grid.
  • Basics and main virtualization technologies.
  • The Open Source tools.
  • Proprietary technologies.
  • The main families of private Clouds.
  • What challenges for the creation of a true private Cloud: IT infrastructures convergent solutions.
  • Why does the private Cloud only really take on its full meaning in hybrid mode?rnWhat are the challenges for implementing a hybrid solution?rnWhat solutions today for hybrid Clouds ? Cloud or VDC?rnTechnical solutions for the Cloud.
  • Databases for the Cloud.
  • Use.
  • Emergence of databases NoSQL and RDBMS data.
  • Fundamentals of RDBMS and NoSQL databases.
  • Possibilities and limitations of RDBMS.
  • Main NoSQL databases used for the Cloud (MongoDBn Cassandra, CouchDB, Hadoop).
  • IaaS market platforms (Amazon EC2 and S3).
  • PaaS market platforms (Amazon SQS, SimpleDB.
  • RunMyProcess.
  • com, Cordys, Facebook, Twitter.
1562
Description of Cloud architecture issues
  • Multi-tenant architectures.
  • Security.
  • Scaling.
  • Memory cache.
  • Message queue.
  • Data storage solutions in the Cloud and associated challenges.
  • Integration with the IS.
  • Creation of virtual machines .
  • Administration.
  • Difference between "PaaS Web" platforms and "PaaS Enterprise" platforms.
1563
Description of the main Cloud offers
  • Public Cloud offers.
  • Amazon AWS offer and its EC2, S3, SQS, SimpleDB, RDS, SNS, ELB, VPC services.
  • Google AppEngine offer and AppEngine for Business.
  • Microsoft offering with Windows Azure (Compute, Storage, AppFabric) and SQL Azure.
  • Force offering.
  • com and VMForce.
  • Other offers (Rackspace, Joyent, GoGrid.
  • ) and overview of offers under construction (IBM.
  • ).
  • Offers Private clouds.
  • Eucalyptus.
  • VMWare.
  • 3tera.
  • Globus Nimbus.
1564
Solutions compatible with private and public Cloud offers
  • Spring/VMWare "PaaS Enterprise" platforms.
  • Future public clouds (e.g. large telecom operators).
  • Clouds that do not have no "Enterprise friendly" PaaS platform yet.
  • JBossRedhat Cloud PaaS Platforms.
  • Microsoft Azure Cloud Private Cloud.
  • Offerings to build above Cloud platforms.
  • RightScale, CloudBees, etc.
  • Technical solutions for integrating Cloud bricks with SaaS offers.
  • Solutions enabling secure communication between clouds.
  • Integrated identification and authorization issues (SAML, OAuth.
  • ).
Management and monitoring solutions
  • Panorama of management and monitoring solutions.
  • HP Assure, CA (deploy/manage, assurance, security.
  • ), etc.
1565

Cloud Computing Foundation, certification

★★★★★

  • SII-308
  • 2 Days (14 Hours)

Description

This internship allows you to acquire the knowledge necessary to decide what to migrate and how to move to the Cloud. You will understand the cloud architecture, financial benefits and security risks and also take the official EXIN Cloud Computing Foundation certification exam.

Who is this training for ?

For whom

CIOs, IT architects, project managers in charge of Cloud migrations or anyone wishing to acquire the basics of Cloud Computing.

1566
Prerequisites

None

Training objectives

Know the concepts of Cloud Computing
Know the different types of Cloud and associated technologies: IaaS, PaaS, SaaS
Know the main players in the field
Understand the added value for businesses and IT, the risks of a migration to a Cloud approach for IS
Understand compliance and security needs
Better understand how to decide which Infrastructures/Applications/Data to migrate to the Cloud
Know the impacts on IS governance and how to better manage the transition

1567

Training program

The principles of Cloud Computing
  • Concepts: the 4 main deployment models, the 3 main types of solutions: SaaS, PaaS, IaaS.
  • The evolution of Cloud Computing: networks and servers, Internet and virtualization, services managed in the Cloud.
  • Cloud architectures:
  • The advantages and disadvantages limits of the Cloud.
Cloud implementation and management
  • Building a Cloud environment.
  • The main components.
  • The virtual private network.
  • Risks related to IT security.
  • Cloud Service Management.
  • Using IT Service Management principles in a Cloud environment Service level management in a Cloud Computing environment.
Use Cloud Computing
  • Access Cloud Computing.
  • Access to Web applications via a Web browser.
  • Architecture allowing access to the Cloud via the Web.
  • Using a Thin Client.
  • Access to the Cloud via mobile devices.
  • Cloud Computing and business processes: impact of the Cloud on an organization's processes.
  • The service provider and Cloud Computing.
1568
Security and Compliance
  • Security in Cloud Computing.
  • Security risks in the Cloud.
  • Measures to reduce security risks.
  • Privacy and identity management.
  • Privacy and compliance issues.
Evaluation du Cloud Computing
  • The commercial arguments for the Cloud.
  • The costs and savings that the Cloud can generate.
  • Main operational and human advantages of the Cloud.
  • Performance factors, management requirements as well as satisfaction factors.
  • Evaluation of service providers as well as the services provided 'they offer in terms of Cloud Computing.'}
Examen Cloud Computing Foundation
  • Tips for the exam.
  • Mock exam with commented correction.
  • Mock test under exam conditions.
  • Taking the Cloud Computing Foundation exam.
1569

Windows Azure, develop a Cloud application in .NET

★★★★★

  • SII-218
  • 3 Days (21 Hours)

Description

This training will introduce you to the Microsoft Cloud platform, Windows Azure, its contributions and how it works. You will learn how to use the tools and technologies available to develop applications and deploy them on this platform.

Who is this training for ?

For whom
.NET developers (C# or VB.NET). Architects.
1570
Prerequisites

None

Training objectives

1571

Training program

Introduction to Cloud Computing and the Microsoft Azure platform
  • Definitions and generalities on Cloud Computing.
  • Market players.
  • Fundamentals of Cloud Computing.
  • Update vertical scaling versus horizontal scaling.
  • Microsoft's answer: Windows Azure.
Microsoft Azure Compute
  • Infrastructure and operating principle.
  • IaaS vs PaaS, cloud or hybrid architecture? Cloud Services: Web Roles / Worker Roles.
  • Web Sites / Web Jobs.
  • Deployment locations: pre-production, test, production.
  • Principles of Git, TFS deployments.
  • Content Delivery Network.
  • Practical work Getting started with the Azure SDK in Visual Studio.
  • First website in Azure.
1572
Microsoft Azure Storage
  • Introduction and general information.
  • Locally Redundant Storage, Zone Redundant Storage, Geo Redundant Storage.
  • Different types of storage: Blobs, Tables, Queues, Files.
  • Security with Shared Access Signatures.
  • Valet Key pattern to offload servers.
  • API and uses.
  • Practical work rnHandling different types of Windows Azure storage.
SQL Azure Database
  • How Azure SQL Database works.
  • Azure SQL Database vs SQL Server.
  • Administering Azure SQL Database.
  • Configuration of Azure SQL Database.
  • APIs and tools.
  • Hands-on Create, administer, and consume data in Azure SQL Database.
1573
Azure Active Directory
  • Introduction to identity management in the Cloud.
  • Integration with the IS.
  • Securing applications and web APIs with Azure Active Directory .
  • Multi-Factor Authentication: SMS, telephone.
  • Azure Active Directory Graph API.
  • Practical work
Azure Service Bus
  • Introduction and general information.
  • The different scenarios for using the bus service.
  • Relay endpoints.
  • Brokered messages.
  • Push notifications.
  • Practical work Service Bus and Web Jobs.
Overviews of other Azure application services
  • Search service.
  • DocumentDB.
  • Media Services.
  • Demo Other Azure application services.
1574
Task automation
  • Batch processing.
  • Creating an action.
  • Creating a "droplet.
  • HDR fusion.
  • Photomerger.
  • Creating a panorama.
  • Correcting the lens.
  • Practical work rnApplying a logo to a series of images containing varying orientations.
1575

3D Studio Max, getting started

★★★★★

  • SII-219
  • 4 Days (28 Hours)

Description

This training will teach you to master the 3D Studio MAX interface. At the end, you will be able to design an object in 3D, give it a realistic rendering and create an animation from this object.

Who is this training for ?

For whom
Architects, builders, draftsmen, designers, engineers, design office managers.
1576
Prerequisites

None

Training objectives

1577

Training program

Interface 3DS Max
  • 3DS Max environment.
  • Viewports.
  • View layout.
  • Custom layout.
  • Mark of 3DS Max.
  • Navigation controls.
  • New scene.
  • Loading.
  • Saving.
  • Practical work Creating and saving a new view.
1578
Creation and modeling of objects
  • Creating objects.
  • Selecting and positioning objects.
  • Modifying objects.
  • Standard primitives.
  • Box primitive.
  • The Sphere.
  • Extended primitives.
  • Automatic grid.
  • Extended Polyhedron primitive.
  • Shapes.
  • Creating, using shapes.
  • Shape-based planar objects.
  • Extrude and Rotate modifiers.
  • Practical work Design new objects.
1579
Deformation of objects
  • Transformations, modifiers, and object data flows.
  • Bend, twist, extrude, FFD (freeform deformation) modifiers.
  • General principles of using the stack.
  • Practical work Modifying, transforming objects.
Modifications
  • Positioning controls.
  • Changing properties.
  • Properties box.
  • Control panel.
  • Symmetries.
  • Practical work Handling the modification command panel.
Material design and textures
  • Material design.
  • Material editor tools.
  • Materials: definition.
  • 2D and 3D textures.
  • UVW texture modifier.
  • Practical work Application of effects and textures on created objects.
1580
Lighting and camera management
  • Camera types and settings.
  • Light source types.
  • Shadows.
Rendering
  • The different anti-aliasing.
  • Resolution and image geometry.
  • The editing tray.
  • Practical work rnCreating an animation.
1581

Implement security with Cisco ASA firewalls

★★★★★

  • SII-400
  • 5 Days (35 Hours)

Description

This training allows participants to acquire the knowledge and tools necessary to implement and administer Cisco ASA (Adaptive Security Appliance) firewalls. Participants will be able to reduce security vulnerabilities in their IT infrastructure and data access by implementing Cisco ASA features. This training is based on the features of version 9.x

Who is this training for ?

For whom

This course is aimed at Security Engineers responsible for the installation and configuration of Cisco ASAs.

1582
Prerequisites

None

Training objectives

Describe the basic functionalities of an ASA 5500-X Next-generation series firewall • Integrate an ASA into an infrastructure and use the administration tools • Implement basic filtering rules (Policy) • Describe the components of a VPN • Describe and implement VPN solutions in clientless mode
Describe and implement full tunnel IPsec and SSL VPN solutions with Cisco ASA and Cisco AnyConnect

1583

Training program

The Cisco ASA Family of Products
  • Introduce Cisco ASA 5500-X Next-Generation Firewalls
  • Install the Cisco ASA 5500-X Series IPS Software Module
  • Introduce ASASM
  • Introduce Cisco ASA 1000V Cloud Firewall
Cisco ASA Identity Firewall
  • Describe the Cisco ASA Identity Firewall solution
  • Install Cisco CDA
  • Configure Cisco CDA
  • Configure Cisco ASA Identity Firewall
  • Check and troubleshoot Cisco Identity Firewall
1584
Cisco ASA CX (Services Next-Generation Firewall)
  • Introduce Cisco ASA CX (Next-Generation Firewall)
  • Describe the management architecture of Cisco ASA CX
  • Install Cisco PRSM Off-Box and Cisco ASA CX
  • Redirect traffic from Cisco ASA to ASA CX
  • Perform device discovery by Cisco PRSM and import their configurations
  • Configure Cisco ASA CX Policy objects
  • Configure Cisco ASA CX Access Policies
  • Configure Cisco ASA CX Identity Policies
  • Configure Cisco ASA CX Decryption Policies
  • Cisco ASA CX and Cisco PRSM License
  • Monitor Cisco ASA CX
  • Use Cisco PRSM for Administration
  • Troubleshoot Cisco ASA CX
Cisco ASA Cloud Web Security Integration
  • Introduce Cisco ASA with Cisco Cloud Web Security
  • License Cisco ASA with Cisco Cloud Web Security
  • Configure Cisco ASA with Cisco Cloud Web Security
  • Check Cisco ASA with Cisco Cloud Web Security
1585
IPV6 enhancements on Cisco ASAs
  • Describe Cisco ASA Unified IPv4 and IPv6 ACLs
  • Describe other Cisco ASA IPv6 support enhancements
Cisco ASA Security Group Firewall
  • Présenter Cisco Security Group tagging
  • Configurer Cisco ASA Security Group Firewall
Multi-context enhancements on Cisco ASAs
  • Describe Cisco ASA Multi-Context Mode
  • Describe Multi-Context Enhancements in Cisco ASA Software Release 9
Cluster Cisco ASA
  • Describe Cisco ASA cluster features
  • Describe Cisco ASA cluster terminology and data flow
  • Use the CLI to configure a Cisco ASA cluster
  • Use Cisco ASDM to configure a Cisco ASA cluster
  • Verify operation of the Cisco ASA cluster
  • Troubleshoot a Cisco ASA cluster
1586

Training Configure and deploy a Private Cloud with Microsoft System Center 2012

★★★★★

  • SII-220
  • 5 Days (35 Hours)

Description

This training is delivered under the conditions defined by Microsoft: in partnership with an approved Microsoft Learning training center, Microsoft certified trainer, official Microsoft lab, official Microsoft course support. This System Center 2012 training allows participants to acquire the knowledge to design, install and configure a private Cloud, configure and deploy the application infrastructure and key components of Microsoft System Center 2012 necessary for the delivery of services on a Cloud infrastructure private

Who is this training for ?

For whom
This training is primarily aimed at cloud administrators
1587
Prerequisites

None

Training objectives

-Plan for a hybrid cloud
Configure and deploy a private cloud with Microsoft System Center 2012 R2 Virtual Machine Manager
Extend and maintain a Cloud infrastructure
Configure application delivery for a cloud
Create blocks in a private cloud
Deploy and access to private clouds
Monitor Cloud infrastructure
Extend and customize Cloud infrastructure monitoring
Implement service management for the Cloud
Configure high availability, disaster recovery and protection for the Cloud
Automate and standardize the Cloud
Configure a multi-tenant cloud

1588

Training program

Emotions and their impacts
  • Cognitive theories of emotions.
  • External and internal stimuli.
  • The pleasant and harmful consequences of emotional states: on oneself and on others.
  • Stressors and emotions.
  • Sympathy, empathy and antipathy.
  • Emotions determine action or inaction.
  • Practical work Writing a personal inventory of one's emotional states and their impacts.
How to identify your emotions and their consequences?
  • The Event-Thought-Emotion-Behavior dynamic.
  • Our thoughts are at the source of all our emotions.
  • Energizing emotions: joy, pleasure, calm , serenity, satisfaction, motivation.
  • Unpleasant emotions: anxiety, fear, sadness, regret, hostility, guilt, depression, discouragement.
  • Adapted (useful) and maladaptive emotional stress (harmful).
  • The effects of emotions on our relationships and communications.
  • Constructive and harmful consequences.
  • Spontaneous thoughts.
  • Practical work Self-assessment test of emotions and assessment.
1589
How to manage your emotions?
  • Manage stress of emotional origin.
  • Channel your stress through the choice of your reactions.
  • Deal positively with pressure.
  • Be assertive rather than fleeing, being passive or aggressive.
  • Motivate ourselves positively by abandoning our negative and unrealistic thoughts.
  • Maintain a rational attitude and realistic perceptions.
  • Treat situations according to emotional levels.
  • Defuse our emotions and those of others.
  • Practical work Situations on assertiveness and defusing aggressive attitudes.
Practice controlling your emotions
  • Practical tools for controlling your emotions.
  • Confrontation of thoughts causing harmful emotions.
  • Specific confrontation questions.
  • The relaxation technique: positions and approach.
  • Practical work Exercise: confronting spontaneous thoughts and cognitive distortions.
  • Exercise: applying a relaxation technique.
Create a personalized action plan
  • Set and design objectives for cognitive and behavioral progress.
  • Practical work Drafting an individual action plan for managing emotions.
1590

Formation Veritas Backup Exec 20.1 : Administration

★★★★★

  • SII-221
  • 5 Days (35 Hours)

Description

This Backup Exec Administration training is intended for professionals responsible for backing up and restoring critical data. It teaches them to know and use Backup Exec features and to configure storage devices, manage media and maintain the Backup Exec database. Participants also learn how to configure and use Backup Exec agents to protect applications such as Microsoft Exchange, Microsoft SharePoint, and Microsoft SQL. Agents for virtual environments and the deduplication option are also discussed.

Who is this training for ?

For whom
This training is intended for system administrators and engineers, technical support personnel, backup administrators and operators, as well as consultants and other professionals responsible for installing, configuring and administering Backup Exec.
1591
Prerequisites

None

Training objectives

Understand the basic features of Backup Exec •
Manage devices and media used by Backup Exec •
Perform basic backups and restore backed up data •
Analyze backup and recovery enhancements •
Optimize device performance and maintain the Backup Exec database •
Use a Remote Agent to protect remote servers •
Install, configure, and work with the Deduplication option •
Use Backup Exec for database and software protection •
Install, configure, and work with Backup Exec Agents •
Agents for: Microsoft SQL Server, Microsoft Exchange, Microsoft SharePoint, VMware and Hyper-V, Active Directory •
Describe the different configurations supported for virtual conversion •
Create a Simplified Disaster Recovery SDR disk and use it for disaster recovery •
Install, configure and manage the Central Admin Server option

1592

Windows Server 2016 Certified System Administrator Course

★★★★★

  • SII-396
  • 5 Days (35 Hours)

Description

This Windows Server 2016 training prepares you to take the Microsoft "MCSA Windows Server 2016" certification exam. During these sessions, participants will first learn how to manage storage and virtualization with Windows Server 2016. They will have the elements to understand the scenarios, needs and storage available and applicable with Windows Server 2016. Secondly , they will learn the fundamentals of networking to deploy and support Windows Server 2016 in businesses, as well as IP fundamentals and remote access technologies. Finally, participants will learn how to deploy and configure Microsoft Active Directory (AD DS) service domains in a distributed environment, as well as implement group policies, improve backups and restores, and monitor and troubleshoot issues. Active Directory issues with Windows Server 2016.

Who is this training for ?

For whom

Any technical profile wishing to evolve into a role as Windows Server 2016 server administrator.

1593
Prerequisites

Basic knowledge of network management fundamentals

First practical experience in the administration and support of a Windows Server environment

Experience in supporting and configuring Windows client operating systems such as Windows 8 or Windows 10

Training objectives

Install, configure and configure a computer with Windows Server 2016.
Install and configure an Active Directory under Windows Server 2016.
Diagnose and resolve Active Directory 2016 structure problems.
Automate administration tasks under Windows with PowerShell.

1594

Training program

Architecture et installation
  • New features (Windows Defender, Windows Container, interface...).
  • CoreServer, NanoServer modes.
  • Deployment tools and methods (WDS, MDT 2013...).
Administrative tools and configuration
  • ADAC Manager, roles.
  • Windows PowerShell Web Access.
L'architecture de l'Active Directory
  • Active Directory roles and services.
  • What's new in AD domain services 2016.
  • AD services and cloud orientation.
L'installation de l'Active Directory
  • Directory deployment.
  • The DNS system and Active Directory.
  • Integrated and secure DNS zones.
  • AD-related DNS records.
Troubleshooting AD-related network issues
  • DNS records linked to AD.
  • DNS zone management and delegation.
  • Securing zones.
  • Cleaning AD-integrated DNS zones.
  • DNS troubleshooting utilities.
1595
Language basics
  • The link between PowerShell and .NET.
  • Principle, functionality, use of commands and cmdlets.
  • Pipelines: behavior of flows and their configuration. Simplification of the code, the pipelinevariable.
1596

Develop authentic and constructive communication (CAC) practice of non-violent communication

★★★★★

  • SII-361
  • 2 Days (14 Hours)

Description

This training will help you improve your relationship with yourself and others. It will allow you to deepen all facets of your relationships and will teach you to resolve conflicts and work in a group in an effective and constructive manner.

Who is this training for ?

For whom

This course is aimed at any manager who wishes to remain positive in all circumstances.

1597
Prerequisites

Be already aware of communication techniques.

Training objectives

  • Communicate in a non-violent manner with those around you
  • Communicate in a non-violent manner with those around you
  • Defuse conflicts by avoiding judgments and interpretations
  • Develop a cooperative mindset

1598

Training program

Reminder of the fundamental notions of communication
  • Saying is not communicating.
  • The key elements of effective communication.
  • The mechanisms of communication.
  • Better knowing yourself in order to communicate well.
  • Cognitive obstacles.
  • Exercise: Reflection in subgroups, sharing of experiences.
Authentic and constructive communication (CAC)
  • The concept and the main principles.
  • The panoply of feelings.
  • Develop mutual trust and respect.
  • Combine a language , a way of thinking, communication know-how and means of influence.
  • A valuable prevention tool.
  • The DARE process.
  • Scenario Various role plays and other scenarios based on concrete cases.
1599
The CAC’s ORVIEC approach
  • 1) Observe the situation.
  • Describe it in terms of a shareable observation.
  • 2) Rephrase the remarks or criticisms.
  • 3) Verbalize your feelings and attitudes.
  • Express them clearly.
  • 4) Identify and express your needs.
  • Clarify the different elements .
  • 5) Make a clear request.
  • Ensure that it is achievable, concrete, precise and positively formulated.
  • 6) Conclude in a manner positive and friendly.
  • Exercise: Individual exercises.
  • Role games.
1600
CAC support tools
  • Life positions.
  • The compass of language.
  • Mastery of facts, opinions, feelings: FOS.
  • Behavior "persecutor, victim, savior": Please.
  • Neuro-linguistic programming: NLP.
  • The "I" message.
  • L 'active listening.
  • Basic needs.
  • Porter's attitudes.
  • Scenario Individual and group exercises.
CAC applications
  • Formulate a criticism.
  • Anticipate, defuse, manage a conflict.
  • Manage a team.
  • Create a group dynamic.
  • Generate motivation, cohesion.
  • Exercise: Role playing.
  • Sharing experiences.
1601
Establish a personal action plan
  • Define your improvement objectives.
  • Define and formalize the actions to be implemented.
  • Set milestones in terms of time and commit to time limit.
1602

Optimize your brand's presence on the Internet

★★★★★

  • SII-299
  • 1 Days (7 Hours)

Description

This seminar will address the issues related to your brand's presence on the Internet and will provide you with the knowledge necessary to define a complete digital strategy that meets your company's objectives. You will learn how to manage your online image and measure its performance. The seminar will help you understand why it is important to have a digital strategy and how you can adapt it to improve the visibility of your brand on the Internet.

Who is this training for ?

For whom

Marketing manager, communications manager, product manager, marketing project manager and anyone in charge of brand communication.

1603
Prerequisites

Experience in corporate communications desirable

Training objectives

Understand the new avenues of communication on the internet
Implement a digital communication strategy for your brand
Optimize your presence on social networks
Manage your online brand strategy

1604

Training program

Understand the issues and different approaches to e-marketing
  • The change in modes of communication.
  • From Web 1.
  • 0 to collaborative uses.
  • The potential impacts of e - brand reputation.
  • Paid referencing (Search).
  • Natural referencing (SEO) and its developments.
  • Affiliation and retargeting .
Succeed in your brand presence strategy on social networks
  • Typologies and uses of the main social networks.
  • What benefits and for what business applications?
  • The benefits of the main levers: social networks, corporate blog , proprietary social networks.
  • An example of brand strategy: HR communication and employer brand.
  • The impacts on the organization and new roles.
  • Optimize your presence on LinkedIn and Viadeo: profiles, keywords, company page, feed, content.
  • Advertising on social networks: LinkedIn ads, Facebook ads, Facebook sponsored post, Facebook reach generator.
  • Specialized social networks and sharing and curation platforms (Slideshare, Scoopit, Pearltrees.
  • ).
1605
Effectively manage your brand on the Internet
  • Implement a multi-channel digital strategy.
  • Move from communication to conversation, know how to get involved.
  • The content and the form: storytelling and distribution content.
  • Respect the rules and practices: ethics, behavior charters, Facebook rules, moderation rules.
  • Prepare to manage a "crisis" situation.
  • Set up monitoring on the Internet: define your scope, choose and implement your monitoring methodology.
  • Equip yourself for monitoring: free tools and professional solutions.
Evaluate the performance of your digital strategy
  • Remuneration models: CPM, CPL, CPC.
  • Quantitative and qualitative indicators (KPIs).
  • ROI, ROA and RONI?
1606

Trainer: integrating digital into your practices

★★★★★

  • SII-301
  • 2 Days (14 Hours)

Description

This training will show you how to integrate new technologies into your job as a trainer. You will learn to use these new tools (tablets, smartphones and new user interfaces) in order to diversify your educational range and enrich the delivery of your training.

Who is this training for ?

For whom

Experienced trainers or anyone who occasionally leads training.

1607
Prerequisites

No special knowledge.

Training objectives

  • Collect trainees' expectations using a computer mind map
  • Integrate mobile learning technologies
  • Enrich your presentations with videos
  • Use participatory social tools
  • Complement face-to-face training with online modules

1608

Training program

Gather trainees’ expectations differently
  • Use heuristic maps or mental maps.
  • Apply the Photolanguage method.
  • Use screen sharing tools.
  • Exercise : Collective reflection on the different techniques for collecting trainee expectations.
  • Using a mind map with Freemind.
Integrate new technologies
  • Interact thanks to new user interfaces: Leap Motion, Kinect.
  • Involve people with a virtual whiteboard.
  • Use tablets.
  • Integrate mobile learning technologies.
  • Anticipate the integration of new technologies: Google Glasses, connected watches, 3D representations.
  • Demonstration Tablet demonstration and interactive user interfaces.
1609
Use new forms of presentation
  • Exploit the latest possibilities of PowerPoint.
  • Integrate texts, music and sounds into your presentations.
  • Rely on videos.
  • Record demonstrations.
  • Use the presentation possibilities of Prezi.
  • Practical work Presentation of videos and tablets in training.
  • Manipulation of the Prezi tool.
Use participatory tools
  • Get people to participate using the internet.
  • Use Twitter.
  • Get people to react using smartphones and SMS.
  • Use voting systems electronic.
  • Practical work Collective reflection around technological tools to facilitate participation.
  • Use of a voting system in training.
1610
Integrate face-to-face training and online training
  • Manage prerequisites through e-learning.
  • Rely on online training during training.
  • Complement traditional training with a virtual class.
  • Offer additional training: blended learning.
  • Manage a personalized action plan.
  • Explain the principle of Massive Open Online Courses (MOOC) .
  • Practical work Discussions on the contribution of e-learning and its conditions of use.
  • Development of a mini e-learning with Didapage.
1611

Training Design and deploy a Microsoft Exchange Server 2016/2019 environment

★★★★★

  • SII-226
  • 5 Days (35 Hours)

Description

The developments in Microsoft Exchange Server 2016/2019 aim to make the new features deployed over the months on Office 365 accessible on site. Exchange 2016 thus offers many new features in order to improve the user experience and interoperability with other tools. of Microsoft's unified communications offering (SharePoint, etc.) while offering more flexibility and strengthening message protection and security. This training provides you with the skills and knowledge necessary to administer a Microsoft Exchange messaging environment on a daily basis. It allows participants to learn best practices to optimize the deployment and operation of Exchange Server 2016/2019 infrastructure. Participants will learn how to plan, install and manage mailbox management, client access and message routing features.

Who is this training for ?

For whom
Network or system administrators responsible for administering Exchange Server MSCE Productivity 70-345 Certification Exam Candidate Design and Deployment of Microsoft Exchange Server 2016
1612
Prerequisites

None

Training objectives

Plan the deployment and management of Microsoft Exchange Server 2016/2019 •
Deploy and configure Exchange Server 2016/2019 mailbox servers •
Create and manage the different types of recipient objects in Exchange Server 2016/2019 •
Configure client access features • Plan and configure client connectivity to Exchange Server 2016/2019 servers •
Set up message routing management •
Plan and implement high availability and recovery mechanisms Exchange Server 2016/ 2019 • Understand and configure message security options •
Plan and configure security and administrative rights auditing •
Monitor and troubleshoot Exchange Server 2016.

1613

ISO 31000 Risk Management ''mastering the assessment and risk management''

★★★★★

  • SII-422
  • 3 Days (21 Hours)

Description

By completing the ISO 31000 Risk Manager training, you will be able to deepen your knowledge of the principles, framework and processes of risk management in accordance with the ISO 31000 standard.

This training aims to provide you with best practices in risk management and develop your skills to put them into practice in your business, in order to implement an effective risk management process.

Who is this training for ?

For whom
  • Managers or consultants responsible for effective risk management in an organization
  • Anyone wishing to acquire in-depth knowledge of risk management concepts, processes and principles
  • Advisors involved in risk management
1614
Risk manager, ISO 31000, management de risque, PECB iso 31000 Prerequisites

Fundamental knowledge of the ISO 31000 standard and in-depth knowledge of risk management.

Training objectives

At the end of this training, learners will be able to:

  • Describe the key principles of risk management as defined in the ISO 31000 standard
  • Establish, maintain and continuously improve a risk management framework in accordance with the guidelines of the ISO 31000 standard
  • Apply the risk management process in accordance with the guidelines of the ISO 31000 standard

1615

Training program

On day 1 of the training, you will discover the fundamental principles as well as the organizational framework of the ISO 31000 standard.
Day 2 will be devoted to the risk management process in compliance with the ISO 31000 standard.
Day 3 will cover the different risk assessment techniques in accordance with the IEC/ISO 31010 standard.
  • The training will conclude with passing the ISO 31000 Risk Manager certification exam.
1616

Dissemination of content on the Web: legal aspects securing your practices

★★★★★

  • SII-227
  • 1 Days (7 Hours)

Description

The distribution of content on the internet obeys precise rules and falls within a specific legal framework. This summary course will allow you to understand these regulations, secure your practices and manage possible litigation on this subject.

Who is this training for ?

For whom
Communication managers, community managers, webmasters, web project managers, lawyers and all people responsible for distributing content on the web.
1617
Prerequisites

None

Training objectives

Understand the essential foundations of internet law Master the rights and responsibilities related to online publication and distribution Identify the legal risks of personal data breaches Legally secure the distribution of online content Manage disputes related to content distributed on the web

1618

Training program

Understand the legal environment of the Internet
  • Internet law and the law applicable to the Internet: the myth of the legal void.
  • The main players in France and abroad: ICANN, AFNIC, CNIL, HADOPI.
  • The legal framework for contractual protection specific to the internet: the LCEN, the DADVSI and LOPPSI laws 2.
  • Legal constraints relating to consumer protection in distance contracts (B to C).
  • Exchanges Collective reflection on the overall legal framework of the Internet and its consequences on the companies and activities of the participants.
Identify potential personal data breaches
  • The various potential attacks on the privacy of customers or employees (particularly on social networks).
  • The crime of identity theft.
  • Defamation, insults and denigration.
  • Case study Study of examples of invasions of privacy linked to the dissemination of content on the internet and case law on the subject.
Take the necessary legal precautions when distributing content
  • The right to personal image.
  • Copyright and intellectual property on the internet.
  • Content moderation and filtering of comments .
  • Compliance with the rules for collecting personal data: conservation, archiving and confidentiality.
  • The right of access and rectification, the "right to digital oblivion
  • Practical work rnExamples of legal precautions, particularly contractual, to put in place to secure the distribution of content on the internet.
1619
Manage litigation related to the distribution of content on the internet
  • Legal liability relating to the distribution of content on the internet.
  • The different types of disputes.
  • The handling of disputes.
  • The particular case of international disputes.
  • Case study Study of examples relating to legal disputes relating to the distribution of online content.
1620

Develop a Web TV

★★★★★

  • SII-228
  • 2 Days (14 Hours)

Description

Video is a communication vector that is increasingly attractive to businesses. Professional Web TV makes it possible to reach a diverse, responsive and connected audience. This training will allow you to acquire the skills to develop this new digital marketing system.

Who is this training for ?

For whom
Business managers, marketing managers, communication managers, web project managers.
1621
Prerequisites

None

Training objectives

Know the main uses of online video, VOD and Web TV
Master technical solutions and tools
Design and implement your Web TV project
Build an economic model around your Web TV

1622

Training program

Measuring the challenges of Web TV
  • State of the Web TV market: figures, players, applications.
  • Main uses of Web TV: information, communication, marketing, recruitment, events.
  • Perspectives and trends: new media, emerging markets, digital convergence, digitalization of businesses.
  • Exchanges Collective reflection on the impact of video and Web TV on Internet users, customers and business partners.
Master web TV technologies
  • The different video formats adapted to the Web and encoding techniques.
  • Rich media technologies: interactive videos.
  • Live, streaming and Video On Demand (VOD).
  • Video hosting.
  • Video chaptering, styling and settings.
Master web TV technologies
  • The different video formats adapted to the Web and encoding techniques.
  • Rich media technologies: interactive videos.
  • Live, streaming and Video On Demand (VOD).
  • Video hosting.
  • Video chaptering, styling and settings.
1623
Set up a Web TV project
  • Identify technical resources: computer equipment, software, audiovisual equipment.
  • Mobilize human resources: internal, agencies, production companies.
  • Define your concept: objectives, targets (BtoB or BtoC).
  • Design an editorial line: charter, type of content, distribution frequency.
  • Define a graphic line.
  • Practical work Development of specifications for the launch of a Web TV.
Diffuser sa Web TV
  • The different means of distribution: types of distribution and hosting.
  • Build your system and your distribution schedule.
  • Manage content generated by Internet users.
  • Promote your Web TV: natural and paid referencing.
  • Practical work Preparation of a broadcast schedule.
Diffuser sa Web TV
  • The different means of distribution: types of distribution and hosting.
  • Build your system and your distribution schedule.
  • Manage content generated by Internet users.
  • Promote your Web TV: natural and paid referencing.
  • Practical work Preparation of a broadcast schedule.
1624
Monetize your Web TV
  • Panorama of different economic models.
  • Establish a budget and quantify your project: filming, distribution, promotion, returns on investments.
  • Making a profit with advertising and subscriptions.
  • Establish partnerships.
  • Resell content.
  • Collective reflection Development of a proposed economic model for a Web TV.
1625

Write effectively with WordPress

★★★★★

  • SII-298
  • 1 Days (7 Hours)

Description

WordPress is the most widely used content management system (CMS), but its possibilities in terms of content production are often unknown. This training will introduce you to the WordPress Wysiwyg editor and allow you to produce content optimized for SEO and on-screen reading.

Who is this training for ?

For whom

Web editors, communications managers and all collaborators likely to write with the WordPress tool.

1626
Prerequisites

Experience in writing for the Web.

Training objectives

Master the WordPress Wysiwyg editor

Highlight your content and plan to put it online

Produce content

Know and use extensions useful for content production

1627

Training program

Organize your content
  • Reminders about structuring and prioritizing content in WordPress.
  • Distinguish between pages and articles.
  • Use categories to structure content.
  • Build a silo structure.
  • Create and manage pages and menus.
  • Choose a good permalink format and insert key phrases into a page's URL or an article.
  • Using labels: controlling the risk of Duplicate Content.
  • Exercise: Constructing the structure of a site.
Improve your publications
  • Create an article in WordPress: use the Wysiwyg editor.
  • Assign categories to articles.
  • Use the quick edit tool.
  • Highlight and plan the posting of an article.
  • Embed an image, video or sound.
  • Know where to embed an image or video in an article.
  • Use the "more" tag and WordPress excerpts.
  • Configure the display of Wysiwyg editor fields.
  • Exercise: Creating and structuring an enriched article.
1628
Optimize your content for SEO
  • Know how to install an extension.
  • Increase the capabilities of the Wysiwyg editor.
  • Configure and use an extension to optimize your content for SEO.
  • Optimize images.
  • Define an optimal article format.
  • Use semantic tags in WordPress.
  • Write an article respecting the "SEO on page" criteria in WordPress.
  • Enter the value of the "alt" attribute.
  • Exercise: Optimization of the article created for SEO.
1629
Promote your publications
  • Understand the need to maintain your content.
  • Create a second level of navigation between articles.
  • Create pagination for articles.
  • Archive your articles.
  • Set up a breadcrumb trail.
  • Promote your articles on social networks.
  • Use the ping services of WordPress.
  • Use a redirect plugin.
  • Exercise: Using a plugin to promote the article on social media.
1630

E-commerce website, implement a winning strategy

★★★★★

  • SII-230
  • 2 Days (14 Hours)

Description

Defining and implementing an operational e-commerce strategy has become essential to establish yourself in your online sector of activity. This course will give you all the keys, all the advice to know how to sell via the Internet and master all the indicators to measure ROI in real time.

Who is this training for ?

For whom
Web/e-Commerce project manager, communications manager, e-Business manager, e-Commerce project team.
1631
Prerequisites

None

Training objectives

Understand the e-commerce market and its development prospects
Structure a merchant website project
Identify and implement the functionalities of your e-commerce site
Integrate social networks into your marketing strategy

1632

Training program

State of the art of e-commerce
  • The e-commerce market around the world.
  • French e-consumers.
  • Referring sites and major trends in e-commerce.
  • Practical work rnAuditing of referring sites: what works and what doesn't work.
  • Robot portrait of the 'e-buyer.'}
The key stages of an e-commerce project
  • Structuring the product/service catalog.
  • The case of the multi-catalogue and the specific catalog by type of customer.
  • Order placement and processes management.
  • Payment processing.
  • Customer relationship management.
  • After-sales service: returns management, Chatel law.
  • Traffic generation: natural referencing, advertising.
  • Practical work Robot portrait of the e-buyer: deciphering the e-buyer's journey on the Internet.
1633
Functional points to mark on an e-commerce project
  • Management of catalogs, content, administration of prices, promotions.
  • Implementation of multi-site solutions: multi-country, multi-brand, multi-catalogue.
  • The pitfalls to avoid.
  • the structuring of the purchasing funnel.
  • Customer registration, discount code, saving the basket, payment.
  • The order tracking process and after-sales management.
  • Choices in terms of HMI? What type of interface for which customer category? Practical work Design a dynamic home page: the art of the e-showcase.
The contribution of social functions
  • Building a positive digital reputation: management of comments, involvement of influencers.
  • Creation of a reassuring climate to trigger transactions.
  • Viral marketing: use of general public social networks, creation of your social network.
  • "Crowdsourcing": collaborative technique to stay in touch with user needs.
  • Traffic generation mechanisms and their effectiveness: SEO, viral marketing, Serious Game.
  • Practical work Web-marketing plan to generate qualified traffic on your e-Commerce site.
1634

Marketing performance, adapt your software design to new uses

★★★★★

  • SII-231
  • 1 Days (7 Hours)

Description

This seminar will provide you with the keys to designing applications in line with user needs. You will study best practices for designing and improving the user experience. You will see how to take advantage of new technologies to innovate, create buzz and measure their effects.

Who is this training for ?

For whom
MOA, marketers, ergonomists, project managers or anyone wishing to work on the marketing approach of a web or mobile application.
1635
Prerequisites

None

Training objectives

Functionally design a multi-channel interface
Identify the interactions between needs and performance
Innovate with new services to create a marketing breakthrough
Monitor and analyze usage statistics

1636

Training program

Position your mobile project
  • Mobile sites, Dedicated Apps or Responsive Design? Choose between WebApp or mobile application in a store.
  • Define the objectives: customer acquisition, loyalty, financial, brand.
  • Define the target: customer profile.
  • Choice of platform: mobile, tablet, store.
  • Context: coupling with a website, customer service.
  • Analyze the competition.
  • Identify your strengths and weaknesses using the SWOT technique.
Define the specifications
  • Functional specifications.
  • Optimize MOE/MOA collaboration.
  • Graphic charter specifications, technical constraints.
  • Opt for Responsive Design: the questions to ask yourself.
  • Performance and conceptual impact.
  • Surprise by taking into account technological innovations.
1637
Understand the specificities of tactile ergonomics
  • Ergonomics criteria for a touch interface and events.
  • Rule for evolving the ergonomics and functionalities of a website towards mobile.
  • Differences between mobile and tablet ergonomics.
  • Definition of content: home page, editorial, products, catalogs.
  • Navigation components.
Successfully transitioning to Responsive Design
  • Understand the mechanisms of Mobile First.
  • Know how to redefine functionalities depending on the terminal.
  • Graphical components: navigation, forms, tables, search, filters, input, progress indicators.
  • Know how to test a mobile environment.
Successfully transitioning to Responsive Design
  • Understand the mechanisms of Mobile First.
  • Know how to redefine functionalities depending on the terminal.
  • Graphical components: navigation, forms, tables, search, filters, input, progress indicators.
  • Know how to test a mobile environment.
Statistical monitoring and mobile performance
  • Traffic and download statistics.
  • Put usage metrics to improve navigation and better understand user expectations.
  • Measure the performance of your application.
  • Check the suitability of the design according to the constraints (networks, terminal).
1638
Know how to innovate and evolve your application
  • Take advantage of versioning to understand the innovations and specificities of mobiles and communicating objects.
  • Know how to reposition your offer according to mobile developments and validation constraints.
  • Innovate and create buzz by taking advantage of new technologies.
  • Better target the offer based on the customer's geolocation.
  • Disconnected mode, comfort or constraint? ot
1639

Drupal 7, editor/contributor bringing the content of your sites to life

★★★★★

  • SII-346
  • 1 Days (7 Hours)

Description

This training will provide you with the knowledge necessary to provide content to your websites designed with Drupal. You'll see the types of content ready for your contributions, learn how to design the ones you need, and organize your content to make it more useful.

Who is this training for ?

For whom

Anyone who has to create and manage the content of a Drupal site.

1640
Prerequisites

None

Training objectives

1641

Training program

Drupal overview
  • What is a Content Management site?rnHistory and particularities of Drupal.
  • The organization of Drupal: Core and extensions.
  • Presentation of the Site section: navigate and modify content.
  • Presentation of the Administrator menu bar.
Add content
  • The content types offered by Drupal: Article and Basic Page.
  • Text formats.
  • Install and configure the text editor.
  • Add an article.
  • Add images and media.
  • Set publishing options.
  • Edit or delete content.
  • Practical work Create two articles illustrated with an image.
  • Manage publishing options.
1642
Manage different types of content
  • Create a new content type.
  • Set publishing options for the new content type.
  • Add content matching the new content type.
  • Display new content in a page.
  • Display content in a Block.
  • Use the Blog module.
  • Practical work Create the Expense Report content type.
  • Add an expense report.
Index contents
  • Create a taxonomy.
  • Assign a taxonomy to a content type.
  • Create a term hierarchy.
  • Associate a term to content.
  • Practical work Propose a taxonomy and index new content using vocabulary terms.
Search for content
  • Search content from the Administration section.
  • Search content from the Site section.
  • Activate and configure advanced search.
  • Practical work Propose and implement a complete indexing strategy for the site's contents.
1643
Administer content
  • Define user rights on content.
  • Define Wysiwyg profiles.
  • Define publication dates for content.
  • Configure image styles.
  • Create and configure RSS feeds for content.
  • Create and activate multilingual content.
  • Associate a discussion forum to its content.
  • Enable tracking of recent content for users.
1644

Formation Implementing Cisco IP Telephony and Video

★★★★★

  • SII-314
  • 5 Days (35 Hours)

Description

This training provides the skills to implement Cisco Unified Communications Manager and CUBE solutions as well as Audio and Video conferencing in a single-site environment. This training focuses on Cisco Unified Communications Manager v10 which is the main component of the Collaboration solution.

Who is this training for ?

For whom

This training is aimed at network engineers and integrators of Cisco Collaboration solutions.

1645
Prerequisites
  • Have knowledge of basic networking concepts, LANs, WANs, switching and routing.
  • Be able to configure and operate Cisco routers and switches and make available VLANs and DHCP, VoIP, basic knowledge of converged voice and data networks. Be able to configure Cisco IOS gateways with traditional and VoIP calls.

Training objectives

  • Describe Cisco Unified Communications Manager, including features, architecture, deployments, and redundancy options
  • Install and update Cisco Unified Communications Manager
  • Perform initial configuration of Cisco Unified Communications Manager and manage users
  • Configure Cisco Unified Communications Manager to support intra-cluster calls
  • Implement PSTN access in Cisco Unified Communications Manager and create a dial plan in the single-site deployment
  • Implement Cisco Unified Communications Manager media resources
  • Implement Cisco Unified Communications Manager features and applications

1646

Training program

Introduction to Cisco Communications Manager
  • Describe the role of the Cisco Unified Communications Manager, its architecture, deployment and redundancy options
  • Perform the initial configuration of the Cisco Unified Communications Manager
  • Deploy the terminals and users
  • Deploy IP Phone services
Introduction to the dial plan and configuration of intra-cluster calls
  • Describe the components of the dial plan
  • Implement terminal addressing and call routing
  • Implement call discrimination
  • Implement call groups
Implement off-cluster calls in a single-site architecture
  • Analyze the needs for off-cluster calls
  • Implement RTC access via MGCP gateways
  • Describe H.323 gateways and SIP gateways
  • Implement PSTN access via H.323 gateways
  • Describe the components of the CUBE
  • Use the elements of the CUBE to access the PSTN via a SIP Trunk
  • Use CUBE elements for URI dialing
1647
Media Resources
  • Describe media resources in Cisco Unified Communications Manager
  • Implement Annunciators and MOH resources
  • Implement MTPs
Audio and Video Conferences
  • Describe conferencing devices and their functions
  • Implement conference bridges
  • Introduce the Cisco Telepresence MSE 8000
  • Implement implement the Cisco Telepresence Server
  • Implement the Cisco Telepresence Conductor
Quality of Service
  • Analyze Quality of Service needs
  • Describe the QoS components and their functions
  • Implement marking
  • Implement works on Policing and Shaping
1648

S.I.G (Initiation and awareness) and Implementation of a S.I.G project

★★★★★

  • SII-284
  • 2 Days (14 Hours)

Description

Basic notions, data, software. Discover the world of GIS The techniques for setting up a GIS project

Who is this training for ?

For whom

Professionals, students, job seekers who do not know S.I.G. for general information on the subject.

1649
Prerequisites

None.

Training objectives

  • Give the theoretical bases necessary for understanding the concepts of Geographic Information Systems
  • Give a practical approach to the possibilities of GIS through the use of software
  • Discover the variety: • GIS applications
    in different domains ; • Data used (cartographic, aerial, alphanumeric, etc
    ); • Software used to capture and manipulate geographic information

1650

Training program

1st day
  • The introduction to GIS
  • Concept of Geographic Information.
  • Birth and development of the concept of GIS.
  • Panorama of applications and organizations involved in the different areas of use of GIS: the environment, urban and rural management...
  • The functions of a GIS (demonstration on GIS software).
  • Restitution, Acquisition, Processing and management of data.
  • Laboratory work on GIS software (thematic analysis, queries, etc.).
  • Modes of data representation:. * #Definition of raster/vector mode, concept of layers.* #Illustration on software.
  • The structuring of graphic data:.* #Modeling of the 'geographic information (point, linear, polygon), spatial coherence, notion of topology.* #Images (raster), notions of georeferencing, RMS errors.
  • Implementation. practical on S.I.G. software: creation of a database, entry of graphic objects (digitalization, entry of attribute data). Thematic analyzes and layouts.
2nd day
  • The structuring of attribute data in GIS:.*rn# Attribute data.*rn# Joins.*rn# Database concepts.*r n# Links between GIS and databases.
  • Projection systems, geodetic systems:.*rn# Definitions.*rn# Projection management in software.* rn# Problems with changes in projections.
  • Spatial analysis: definition, tools available under S.I.G.
1651

Getting started with QGIS (v2)Learn to use the free GIS software QGIS

★★★★★

  • SII-363
  • 3 Days (21 Hours)

Description

Make the best use of the software's possibilities and be autonomous, Acquire, manage, use and restore spatial data with the GIS software. free QGIS.

Who is this training for ?

For whom

Job seekers, professionals, employees, students who use QGIS.

1652
Prerequisites

None.

Training objectives


Give beginners basic training on the software,


Allow “self-taught” users to consolidate their
knowledge and have answers to their various questions,


Learn good practices on the software.

1653

Training program

1st day
  • Discovery of a GIS tool: the free Quantum GIS software.*rn#Origin and context of the project.*rn#Presentation of the version 2 interface.*rn #Comparison with other
  • Operating principles of the QGIS software:.*rn#The notion of project:qgs.*rn# The main panels and interfaces: browser, views, layers, tables and composers.*rn# The data and formats used: vectors, rasters and attribute tables.*rn# The data visualization and navigation.
  • Adding and managing data in a view:.*rn# Layer management .*rn# Adding data: vector, raster, WMS stream / WFS, geolocalized data
2nd day
  • Cartographic restitution:.*rn# Thematic analyzes and reminders on graphic semiology.*rn# Layout functions of the composer: editing and printing of documentsr ncartographic .*rn# Map export: image, pdf, svg formats.*rn# Creation and use of map models.*rn# Atlas generation.
  • The different selection modes:.*rn# Interactive selections.*rn# Attribute queries.*rn# Spatial queries.*rn# Use of selections (new shape / query layer).
3rd DAY
  • Creating and modifying data:.* # Updating raster data: Georeferencing.* # Creating new shapes.* # Creation and update of graphic data.* # Creation and update of attribute data.* # Digitization and topological verification tools.
  • MINI-PROJECT: .* # All of the functionalities explored will be included in a mini-project on which each Beneficiary of this training will work, assisted by the trainer. This exercise will allow them to demonstrate their autonomy on the basic functionalities of QGIS.
  • Closing the training:.* # Summary of the training.* # Discussions and advice on good practices.
1654

Getting started with QGIS

★★★★★

  • SII-291
  • 2 Days (14 Hours)

Description

Geoprocessing, geocoding, spatial join, DEM processing, interpolation, raster calculator, link to GRASS

Who is this training for ?

For whom

-People who handle geographic data. -In order to adapt the training content to the expectations of the trainees, a downloadable questionnaire must be completed and returned at the time of registration.

1655
Prerequisites

None.

Training objectives

  • Acquire the theoretical and practical bases related to GIS (geographic information system)
  • Introduce yourself to the use of QGIS software to consult, analyze geographic data and represent it in the form of maps
  • Be able to formalize a problem in GIS language

1656

Training program

1st day
  • - Theoretical introduction to GIS and the types of data used in GIS software. Application on QGIS: display of vector and raster layers, exploration of layer properties and attribute tables.
  • Overview of coordinate systems and management of this information in QGIS (by layer, by project, on-the-fly projection).
  • Presentation of the QGIS extension system and example of use from “Openlayers plugin”.
  • Theoretical notions of graphic semiotics and application in QGIS: choice of vector and raster data representation, map layout.
2nd day
  • Continuation and end of map layout in QGIS.
  • Point on the notion of metadata.
  • Georeferencing scanned maps in QGIS.
  • Creation of point vector layers from a list of coordinates.
  • Creation of vector layers by digitizing the base map: presentation of the QGIS input tools.
  • Presentation of selection and join processing then application with QGIS.
  • Theoretical course on spatial analysis applied to vector and raster data then put into practice in QGIS through exercises.
1657

Improvement in ArcGIS Geo processing, spatial joins, advanced digitization and Model Builder.

★★★★★

  • SII-287
  • 1 Days (7 Hours)

Description

Advanced features of ArcGIS for Desktop: Cloud ArcGIS online, creation and configuration of geodatabases, geocoding and creation of cartographic atlases.

Who is this training for ?

For whom

GIS engineers and technicians. required to use the advanced functions of the ArcGIS for Desktop suite of software.

1658
Prerequisites

None.

Training objectives

Allow people using ArcGIS For Desktop (v10) to improve their knowledge and have answers to their various questions

1659

Training program

Spatial joins
  • Reminders about attribute joins and relationships.
  • Spatial joins (in “intersect” mode and with the ArcToolBox spatial join tool).
Geoprocessing
  • Buffer zones, Intersection, Cutting, Union.
  • Application to mesh analyses.
Advanced digitalization
  • Reminder about the Editor tool and definition of editable layers.
  • Use of advanced editing tools and “topological” editing.
  • Use of templates entity .
  • Using domains and subtypes to avoid entry errors.
Geoprocessing modeling
  • The ModelBuilder interface.
  • Adding tools, data and defining parameters.
  • Validating and using the model.
  • Displaying the model in the layout.
  • Exporting the model in Python.
Closing of the training day
  • Review and questions from participants.
1660

Switching from CAD software to GIS software

★★★★★

  • SII-298
  • 1 Days (7 Hours)

Description

Address the operation and characteristics of CAD software and in particular AutoCAD in order to understand the problems of transferring data from these software to GIS software

Who is this training for ?

For whom

S.I.G. users. required to integrate data from AutoCad (it is not necessary to know this software)

1661
Prerequisites

Use the Windows environment;

Know the use of GIS. and its different components;

Read technical English (recommended)

Training objectives

Understand the organization of CAD files to integrate them into GIS software

Allow S
I
G
users
to understand the structuring of AutoCad data in order to be able to integrate it as best as possible into their applications

1662

Training program

Training program
  • Structuring data in CAD software (Autocad/DrafSight)
  • Graphical objects (points, lines, circles, polylines, etc.)
  • Layers and colors
  • Blocks and block attributes
  • DXF and DWG
  • Importing CAD data into GIS software
  • Elements for establishing specifications for a D.A.O. service provider
  • Tool presentations (conversions and visualization of D.A.O. data)
1663

Openlayers and Internet Mapping in JavaScript

★★★★★

  • SII-233
  • 2 Days (14 Hours)

Description

Introduction to Javascript; setting up a cartographic web interface with openlayers

Who is this training for ?

For whom
1664
Prerequisites

None

Training objectives

use the Openlayers library of map functions to create a dynamic, cartographic website

1665

Learning GeoServer

★★★★★

  • SII-234
  • 2 Days (14 Hours)

Description

GeoServer is an Open Source cartographic engine developed in a JAVA environment and based on the GeoTools library. It implements numerous OGC Web Service specifications (WMS, WFS-T, WCS, SLD, etc.) and is, moreover, a reference application for the OGC to support the WFS standard. GeoServer allows you to quickly set up a Web Service to provide GIS data. GeoServer manages many output formats for data (PNG, SVG, KML, JPEG, PDF, GeoJSON, etc.). In addition, it is easy for an informed user to add their own personalized output module for vector data.

Who is this training for ?

For whom
Geomaticians and GIS developers Basic knowledge of geomatics, Knowledge of OGC Web Services is recommended
1666
Prerequisites

None

Training objectives

Know the functionalities, specificities and limits of GeoServer
Be autonomous in setting up Web Services with GeoServer
Understand the administration issues of GeoServer

1667

Training program

Installation
  • Using Jetty
  • Using Tomcat
  • Generic OWS Settings
Implementation of OGC services
  • Web Mapping Service (WMS)
  • Web Feature Service (WFS)
  • Web Coverage Service (WCS)
Data change
  • Vector
  • Raster
  • Spatial databases (PostGIS)
Symbology
  • OGC Styled Layer Description (SLD) concepts and syntax
  • Symbolology managed on the client side
Security Cache Implementation and Settings in GeoServer
  • Security concept
  • Concept of role, user, group and services
  • Access rights
On-the-fly reprojection Filtering logic
  • OGC Filter Coding (FE)
  • Common Query Language (CQL)
1668

Learning MapServer

★★★★★

  • SII-235
  • 2 Days (14 Hours)

Description

Presentation of the MapServer project and operation of a Web server (Apache) Mapfile configuration files: description, visualization and modification Managing vector data and raster images Thematic analyses, selections and creation of layout models (Templates) BROWSE and QUERY modes Using MapServer with GIS software: WebServices.

Who is this training for ?

For whom
Spatial database managers; Project managers; Geomatician responsible for developing a cartographic website
1669
Prerequisites

Be familiar with the Windows environment; Know GIS

Training objectives

Understand how the MapServer map server works
Address its implementation for the development of a dynamic map website
Set up a map server with various data (formats, projections, etc.)

1670

Training program

General features of MapServer
  • Introduction
  • Installation
  • How a Web server (Apache) works.
Operating mode
  • Architecture of a MapServer application
  • Viewing and modifying a configuration file (mapfile)
Editing a mapfile
  • Managing projections
  • Adding point layers, lines and PostGIS tables
Managing raster images
The selections
  • Filter data;
  • Select data to change its appearance
Using MapServer with GIS Software
  • WebServices;
  • MapServer and WMS feeds
  • Configure the display of attribute data
  • MapServer and WFS feeds
1671

Programming python scripts in Arcgis with ArcPy

★★★★★

  • SII-236
  • 5 Days (35 Hours)

Description

the basics of python using geoprocessing with ArcPy

Who is this training for ?

For whom
Employees (technicians, engineers, geomaticians), students, job seekers called upon to personalize ArcGIS for Desktop; Developer wishing to deepen the link between development language and GIS software.
1672
Prerequisites

Daily use of ArcGIS for Desktop

Training objectives

Optimize the use of ArcGIS for Desktop.
Automate and optimize processing chains and map production with ArcGIS.
Know how to install a Python plug-in in ArcMAP.

1673

Training program

Python basics
Use geoprocessing with ArcPy
ArcPy’s Describe and Listing Data functions
SQL and spatial selections on layers
The classes Cursors and Geometry of ArcPy
Create custom tools in the ArcToolBox
Le module Mapping d’ArcPy
1674

Practice of remote sensing with Open Source tools

★★★★★

  • SII-237
  • 1 Days (7 Hours)

Description

The main processes of pre-processing, processing and post-processing of satellite images,

Who is this training for ?

For whom
Anyone wishing to acquire a general knowledge of the use of satellite images, with a view to progressing towards advanced training, preparing for an internship or developing specifications using remote sensing.
1675
Prerequisites

Computer skills, basic knowledge of at least one of the open source software used: Qgis, Orfeo Tool Box, Monteverdi, SNAP. Possibility of preferentially handling one of the tools.

Training objectives

Understand the characteristics of optical satellite images and their potential; manipulate images and understand the purpose of the main preprocessing tools; understand the principle of supervised classification; manipulate the processing results and understand the objective of post-processing,

1676

Practical remote sensing with Spatial Analyst

★★★★★

  • SII-238
  • 1 Days (7 Hours)

Description

Reminders on the principles of GIS and raster images (MNT types), configuration of the geoprocessing environment, creation of a raster database, pre-processing, processing and post-processing processes for satellite images, to obtain a land use map

Who is this training for ?

For whom
1677
Prerequisites

None

Training objectives

Understand the characteristics of different images and the objective of preprocessing tools, understand the principle of classification and segmentation of optical remote sensing images, apply the steps of the supervised classification approach, manipulate the processing results and understand the objective of post-processing

1678

ISO 27001 Lead Auditor / Information security

★★★★★

  • SII-422
  • 5 Days (35 Hours)

Description

The "ISO/IEC 27001 Lead Auditor" training will allow you to develop the expertise required to conduct an information security management system (ISMS) audit using principles, procedures and techniques widely recognized in audit.

Through this training, you will be able to plan and carry out internal and external audits in accordance with the ISO 19011 and ISO/IEC 17021-1 certification processes, while acquiring the necessary knowledge and skills.

Who is this training for ?

For whom
  • Managers or consultants involved in information security management.
  • Specialized advisors wishing to master the implementation of an information security management system.
  • Any person responsible for maintaining compliance with ISMS requirements. Members of an SMSI team.
1679
ISO 27001, Lead Auditor, sécurité d'information, SMSI , management des systèmes d'information Prerequisites

Good knowledge of the ISO/IEC 27001 standard and in-depth knowledge of implementation principles.

Training objectives

  • Understanding the relationship between ISO/IEC 27001, ISO/IEC 27002, and other standards and regulatory frameworks
  • Mastery of the concepts, approaches, methods and the techniques necessary to set up and effectively manage an ISMS
  • Interpret the requirements of the ISO/IEC 27001 standard in a context specific to the organization
  • Support the organization in planning , implementation, management, monitoring and updating of the ISMS
  • Acquire the expertise necessary to advise an organization on the implementation of best practices in terms of IT management system
    information security

1680

Training program

Day 1: introduction to the information security management system (ISMS) and the ISO/IEC 27001 standard
  • Leverage training to acquire new knowledge and skills about information security and the information security management system (ISMS).
  • Get familiar with the standards and regulatory frameworks relevant to the field of information security by completing the training.
  • Understand the information security certification process through the training.
  • Learn the fundamental concepts and principles of information security by following the training.
  • Acquire knowledge on the implementation and management of an information security management system information (ISMS) through training.
Day 2: The foundations, planning and initiation of the audit
  • The fundamental concepts and principles of auditing are the foundations of the audit process, including integrity, objectivity, competence, confidentiality, planning and supervision.
  • The impact of trends and technology in auditing is growing, with the use of AI, blockchain and other tools improving audit efficiency and quality.
  • Evidence-based auditing involves collecting tangible, verifiable evidence to assess compliance with internal standards and procedures, as well as to identify non-conformities and opportunities for improvement.
  • Risk-based auditing involves assessing the risks associated with the company's activities and planning the audit accordingly, in order to cover the highest risk areas.
  • Initiating the audit process involves notifying relevant stakeholders of the audit, planning the audit activities and collecting the necessary information.
  • Audit Step 1 involves defining the audit objectives, selecting the audit team and identifying the areas to be audited. This is an important step to ensure the success of the audit.
Day 3: On-site audit activities
  • Preparing for the second stage of the audit involves planning the activities and gathering the information necessary to successfully complete this stage.
  • Stage 2 of the audit is the phase during which the collected information is evaluated and verified to confirm compliance with internal standards and procedures.
  • Communication during the audit is an important step to ensure transparency and collaboration between parties stakeholders involved in the audit.
  • Audit procedures are detailed instructions that guide the auditor through the audit process.
  • Creating test plans audit is a key step to ensure that all risk areas are covered during the audit and that the results are reliable.
1681
Day 4: Closure of the audit
  • Audit findings and non-compliance reports are drawn up at the end of the audit.
  • The audit documentation is examined as well as the quality review.
  • Audit closure is the final stage of the audit process during which results are presented and possible corrective actions are identified.
  • The evaluator verifies the the effectiveness of the action plans put in place following the audit.
  • After the initial audit, corrective measures are put in place to improve the processes.
  • Management An internal audit program is necessary to ensure compliance with standards and regulations.
  • The training close marks the end of the training session.
Day 5: Review to prepare candidates to take the certification exam
  • Review of concepts for certification and mock exam
  • A voucher allowing you to take the certification test is sent at the end of the session
1682

ISO 27002 Manager

★★★★★

  • SII-361
  • 3 Days (21 Hours)

Description

The ISO/IEC 27002 Manager training will allow you to acquire the expertise necessary to support an organization in the implementation and management of information security measures compliant with the ISO/IEC 27002 standard. During this training, you will also gain an in-depth understanding of best practices in information security measures. After understanding all the necessary concepts of information security measures, you can take the exam and apply for the title of “PECB Certified ISO/IEC 27002 Manager”. By holding a PECB certification, you will demonstrate that you have the practical knowledge and professional skills to implement and manage information security measures in an organization.

Who is this training for ?

For whom

Managers wishing to implement an information security system (ISMS) compliant with ISO/IEC 27001 and ISO/IEC 27002 standards Any individual responsible for information security in an organization Members of the security team Information Technology Advisors IT Professionals Privacy Officers Information Security Officers

1683
Prerequisites

Fundamental knowledge of the ISO/IEC 27002 standard and in-depth knowledge of information security.

Training objectives

Understand the correlation between ISO/IEC 27002 and ISO/IEC 27001
Understand the implementation of information security measures in compliance with ISO/IEC 27002
Develop expertise to support a organization in the implementation, management and maintenance of information security measures
Understand the formulation and implementation of information security requirements and objectives

1684

Training program

The program
  • Day 1: Introduction to information security measures according to ISO/IEC 27002
  • Day 2: Information security requirements and objectives according to ISO standard /IEC 27002
  • Day 3: Monitoring, measurement, analysis and evaluation of information security measures and certification exam
1685

ISO 31000 Lead Risk Manager “Risk management”

★★★★★

  • SII-361
  • 5 Days (35 Hours)

Description

The ISO 31000 Lead Risk Manager training will allow you to acquire the expertise to support and lead an organization and its team in identifying, understanding and effectively managing a risk management process compliant with the ISO 31000 standard. This training is designed to equip you with a mastery of best practices in implementing an organizational risk management framework that provides the foundation for design, implementation, monitoring, review and improvement continuous risk management processes in the organization. After having mastered all the concepts relating to risk management, you can take the exam and apply for the title of “PECB Certified ISO 31000 Lead Risk Manager”. By holding a PECB certification, you will demonstrate that you have acquired the professional skills and competencies to effectively manage a risk process in an organization.

Who is this training for ?

For whom

Managers or consultants wishing to master the skills to support an organization during the implementation of an organizational framework and a risk management process compliant with the ISO 31000 standard Professionals responsible for effective risk management in an organization Advisors specialists wishing to acquire in-depth knowledge related to the main concepts, processes and strategies of risk management Any person responsible for establishing the risk management policy Members of a team responsible for risk management

1686
Prerequisites

Good knowledge of the ISO 31000 standard and in-depth knowledge of risk management.

Training objectives

Understand the correlation between the ISO 31000 standard and the IEC/ISO 31010 standard, as well as other standards and regulatory frameworks
Master the concepts, approaches, methods and techniques for managing risk in an organization
Knowledge interpret the principles and guidelines of the ISO 31000 standard in a specific organization context
Know how to establish an effective risk communication plan
Acquire the expertise necessary to support an organization in the effective management and monitoring of risk according to best practices

1687

Training program

Jour 1
  • Introduction to the ISO 31000 standard, organizational framework and risk management process
Jour 2
  • Establishment of the risk management framework and initiation of the risk management process
Jour 3
  • Risk analysis, risk assessment and risk treatment according to ISO 31000
Jour 4
  • Recording and reporting, monitoring and review, and communication and consultation in accordance with ISO 31000
Jour 5
  • Preparing for and taking the certification exam
1688

IBM SPSS Statistics (v25) - Introduction

★★★★★

  • SII-303
  • 2 Days ( Hours)

Description

This training will familiarize participants with the use of IBM SPSS Statistics for the typical data analysis process. Participants will learn the basics of reading, defining, modifying and analyzing data, as well as presenting analysis results. Participants will also see how easy it is to integrate their data into IBM SPSS Statistics and then focus on analyzing the information. In addition to becoming familiar with the basic principles of the tool, participants will discover shortcuts that will allow them to save time. This course uses the basic functionality of IBM SPSS Statistics.

Who is this training for ?

For whom

Anyone with little or no experience using IBM SPSS Statistics Anyone who is using a statistical package for data analysis for the first time Anyone considering purchasing the IBM SPSS Statistics tool

/p>

1689
Prerequisites

Knowledge of IBM SPSS Statistics is not necessary, but a basic understanding of the software's objectives and functions is a plus

Training objectives

Discover the features of IBM SPSS Statistics
Know how to read data and define metadata
Learn how to transform variables
Be able to use functions to calculate variables
Understand how to merge data files
Be able to select cases for analyses
Summarize individual variables
Be able to describe relationships between variables
Learn to create presentation-ready tables with custom tables
Know how to customize pivot tables
Be able to create and customize charts

1690

Training program

INTRODUCTION À IBM SPSS STATISTICS
  • Review basic concepts in IBM SPSS Statistics
  • Identify steps in the research process
  • Review basic analyses
  • Use help
READ DATA AND DEFINE METADATA
  • Data sources overview
  • Read data from databases
  • Read data from Microsoft Excel
  • Set properties variables
TRANSFORM VARIABLES
  • Calculate new variables
  • Recode nominal, ordinal and scale variable values
  • Create a numeric variable from a string variable
  • Explore advanced variable transformations
1691
USE FUNCTIONS TO CALCULATE VARIABLES
  • Use statistical functions
  • Use logical functions
  • Use missing value functions
  • Use conversion functions
  • Use system variables
  • Use the Data and Time Wizard
DEFINE THE UNIT OF ANALYSIS
  • Remove duplicate cases
  • Create aggregated datasets
  • Restructure datasets
MERGE DATA FILES
  • Add cases from one dataset to another
  • Add variables from one dataset to another
  • Enrich a dataset with aggregated information
SELECT CASES FOR ANALYZES
  • Select a case for analysis
  • Run analyzes for subgroups
SUMMARY INDIVIDUAL VARIABLES
  • Set measurement levels
  • Summarize categorical variables with frequencies
  • Summarize scale variables with frequencies and descriptors
1692
DESCRIBE THE RELATIONSHIP BETWEEN THE VARIABLES
  • Select the appropriate procedure to summarize the relationship between two variables
  • Summarize the relationship between categorical variables with crosstabs
  • Summarize the relationship between a scale and a categorical variable with means
CREATE PRESENTATION-READY TABLES WITH TABLES
  • Identify table layouts
  • Create tables for variables with categorical categories
  • Create tables for variables representing a multiple answer question
CUSTOMIZE DYNAMIC CROSSTABLES
  • Perform automated output editing
  • Customize pivot tables in the Pivot Table Editor
  • Use table templates
  • Export pivot tables to other applications
CREATE AND CUSTOMIZE GRAPHICS
  • Use the chart builder to create different types of charts
  • Customize charts in the chart editor
  • Use chart templates
  • Export pivot tables to other applications
1693
WORKING WITH SYNTAX
  • Use syntax to automate analyses
  • Use the syntax editor environment
  • Create and edit syntax
  • Run the syntax
ENVIRONMENTAL CONTROL IBM SPSS STATISTICS
  • Describe the features of the Options dialog box
  • Reset variable display
  • Set default working data folders
1694

Create your first website - level 1

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This training is aimed at beginners in website creation. It aims to familiarize you, step by step, with the main players involved in the creation of a website, in order to allow you to create your own site and/or discuss with specialists in the field using the appropriate vocabulary. .

Who is this training for ?

For whom

This course is for anyone wishing to create a website with current technologies or wishing to have a concrete "Web culture".

1695
Prerequisites

No specific knowledge is required. Windows culture (window, menu, click, double-click) is recommended.

Training objectives

At the end of this training, you will have the knowledge and skills necessary to:

  • Create a website to get you up and running to create your own site
  • Have the vocabulary necessary to debate with specialists in the field

1696

Training program

The fundamentals
  • What is a WEB site?
  • Different types (Forum, Online purchasing, Collaborative space, Communication...)
  • Content of a website (why did you choose HTML?)
  • Types of images, videos
  • Flash animations
  • Examples of basic HTML pages
  • Exchanges between browser and website
  • The role of the browser (Internet Explorer, Firefox, etc.)
  • The role of the Web server
  • How to understand each other between the two (IP address, DNS and HTTP protocol)?
1697
The technical environment of a website
  • Hosting and the Domain Name
  • Shared Hosting vs. Dedicated
  • Purchasing the Domain Name (Extensions, Whois, Nic and Afnic)
  • Installation of the Domain Name (DNS hosting vs. Redirection)
  • Develop at home, set up for others
  • Why such price differences in formulas?
  • Can you host your own website?
  • Quality of service
  • Responsibility for the content distributed
  • The site update
  • Transfer files with FTP
  • Use integrated transfer in development environments
  • Using CMS (content management system)
  • Operation and statistics
  • How to know the number of visitors, the most visited pages, the keywords... (with Google Analytics)
  • Engines Search and Directories: SEO.
  • Create an archive of your website
  • Know how to restore it
1698
Creation of the site
  • Design and ergonomics
  • Preparing for the creation of a site (concepts of ergonomics)
  • Writing for the Web
  • Design of the site tree
  • Examples of
  • The standards in force (W3C) and the fads (WEB 2.0 and now Web 3.0)
  • Graphic and multimedia elements
  • Creation of image elements for the site
  • Optimization of bitmap and vector images
  • Videos (recovery principles from a camcorder, cutting, adding sound)
  • Producing animations: presentation of the tools
  • Writing a web page with HTML
  • Principle of tags and attributes HTML
  • Formatting text, paragraphs
  • Navigate to another site (links, targets, frames)
  • Images, tables, forms
  • The contribution of HTML5
  • Additive programs (plugins)
1699
Make the site evolve more easily
  • Style sheets
  • Define styles to minimize changes (CSS3)
  • Manage styles
  • Pseudo-classes
  • Boxes
  • Online or in a box: display
CMS: Introduction to Wordpress
  • Make web development easier using CMS
  • Fundamentals of Wordpress
  • Themes and plugins
  • Easily optimize your site.
1700

CISCO Routing and Switching

★★★★★

  • SII-242
  • 5 Days ( Hours)

Description

This Cisco CCNA Routing Switching Certification training offers all the fundamental and practical knowledge, from networking theory to interconnection hardware like routers and switches. From the start of the training, participants get to grips with Cisco hardware, discover the different configuration modes for routers and switches, and develop school infrastructures equivalent to corporate networks. A first introduction to security, VoIP and Wi-Fi wireless networks is also presented during the training. This course gives primary importance to practical work on operational Cisco hardware and environments identical to those that the Cisco CCNA Routing & Switching certified network administrator may encounter in business. Our Cisco CCNA course prepares each participant in the best conditions for certification. The content of our Cisco CCNA Routing & Switching training has been developed jointly by Cisco certified technical experts and experienced educators to ensure knowledge assimilation over a relatively short period of time.

Who is this training for ?

For whom
This Cisco CCNA Routing Switching Certification is aimed at IT managers, network administrators and technicians.
1701
Prerequisites

Have basic skills on PCs, navigating the operating system, using the Internet and managing IP addresses. We recommend that you follow the training: Network basics - preparation for Microsoft and Cisco network courses or have equivalent knowledge in order to take full advantage of your CCNA ROUTING AND SWITCHING training

Training objectives

Creating a simple network
Establishing internet connectivity
Implementing and configuring a mid-sized network
Maintaining network device security
IPv6 fundamentals
Implementing 'an EIGRP architecture
Implementation of a multi-area OSPF architecture
WAN networks
Management of network devices

1702

Training program

Creating a simple network
  • Explore networking features
  • Host-to-host communications model
  • Introduction to LANs
  • How Cisco IOS works
  • Start a switch
  • How Ethernet and switches work
  • Troubleshoot media-related switching issues
Establishing Internet connectivity
  • TCP/IP Internet Layer
  • IP Addressing and Subnets
  • TCP/IP Transport Layer
  • Explore Routing Features
  • Configure a Cisco router
  • Explore the packet delivery process
  • Configure static routing
  • Manage traffic with access- lists
  • Configure Internet access
1703
Creation of a medium-sized network
  • Implement VLANs and Trunks
  • Use a Cisco network device as a DHCP server
  • Implement RIPv2
  • Overview WAN Technologies
  • Dynamic Routing Protocols Overview
Managing network device security
  • Secure administrative access
  • Implement device hardening
  • Configure system message logging
  • Manage Cisco devices
  • Licenses
Introduction to IPv6
  • Introduction to the basics of IPv6
  • Understand how IPv6 works
  • Configure IPv6 static routes
Implementing Scalability for Mid-Size Networks
  • Troubleshoot VLAN connectivity
  • Create redundant switched topologies
  • Enhance redundant switched topologies with EtherChannels
  • Level 3 redundancy
1704
Implementing Scalability for Mid-Size Networks
  • Troubleshoot Ipv4 Network Connectivity
  • Troubleshoot Ipv6 Network Connectivity
Implementing an EIGRP architecture
  • Implement EIGRP
  • Troubleshoot EIGRP
  • Implement EIGRP for IPv6
Implementation of a multi-area OSPF architecture
  • OSPF Architecture Overview
  • Implement OSPF IPv4
  • Troubleshooting a Multi-Area OSPF Architecture
  • OSPFv3
WAN Networks
  • WAN Technologies
  • Configure Point-to-Point Protocols
  • Configure GRE Tunnels
  • Configure Single-Homed EBGP
Network device management
  • Implement management and security of basic network devices
  • Evolution of smart networks
  • Introduction to QoS
1705

F5 : Administration BIG-IP

★★★★★

  • SII-298
  • 2 Days (14 Hours)

Description

Currently, BIG-IP is an Application Delivery Controller (ADC) that improves performance by optimizing data flows in Application Delivery Networks (ADN). This training allows participants to gain a functional understanding of the BIG-IP v14 system, as it is commonly deployed in networks.

Who is this training for ?

For whom

Network administrators, operators and engineers responsible for managing the normal day-to-day operations and administration of a BIG-IP application delivery network

1706
Prerequisites
  • It is recommended to have completed the following free online training courses "Getting Started with BIG-IP" and "Getting Started with Web BIG-IP Local Traffic Manager (LTM)" for participants with limited experience BIG-IP administration and configuration

Training objectives

Knowledge of BIG-IP system configuration, startup, restart, shutdown and immediate launch

Be able to create a basic network configuration on the BIG-IP system, including VLANs and standalone IP addresses

Learn how to use the installer and TMSH to manage BIG-IP resources

Learn how to create, restore, and maintain BIG-IP archives

Ability to view resource status, availability and statistical data

Know how to perform basic troubleshooting and troubleshooting activities using the iHealth diagnostic tool

Understanding and managing roles and results

Learn how to install and manage a sync failover

1707

Training program

BIG-IP SYSTEM CONFIGURATION
  • BIG-IP system overview
  • Initial configuration of the BIG-IP system
  • Management interface configuration
  • Activate the license Software
  • Provisioning Modules and Resources
  • Import a Device Certificate
  • Specifying BIG-IP Platform Properties
  • Network configuration
  • Configuring Network Time Protocol (NTP) servers
  • Configuring Domain Name System (DNS) settings
  • Configuring high availability options
  • Archiving the BIG-IP configuration
  • Leveraging F5 resources and support tools
1708
BASIC ELEMENTS OF TRAFFIC PROCESSING
  • Identifying BIG-IP traffic processing objects
  • Configuring virtual servers and pools
  • Traffic load balancing
  • View module statistics and logs
  • Using the Traffic Management Shell (TMSH)
  • Understanding the TMSH hierarchical structure
  • Navigating the TMSH hierarchy
  • Managing BIG-IP status and configuration files
  • BIG-IP system configuration status
  • Loading and saving system configuration
  • Shutdown and restart the BIG-IP system
  • Backup and replication of configuration data (UCS and SCF)
USING NAT AND SNAT
  • Address translation on the BIG-IP system
  • Mapping IP addresses with NATs
  • Troubleshooting routing problems with SNATs
  • Configuring SNAT Auto Map on a virtual server
  • Port monitoring and mitigation
1709
MONITORING APPLICATION INTEGRITY STATUS
  • Monitor Overview
  • Monitor Types
  • Monitoring Interval and Delay Settings
  • Monitor Configuration
  • Assigning monitors to resources
  • Managing the status of pools, pool elements, and nodes
  • Using the network map
MODIFYING TRAFFIC BEHAVIOR USING PROFILES
  • Profile overview
  • Understanding profile types and dependencies
  • Configure and assign profiles
  • SSL Offload and SSL Re overview -Encryption
  • Object state management
MODIFYING TRAFFIC BEHAVIOR USING THE PERSISTENCE FUNCTION
  • Understanding the need for persistence
  • Introduction to source affinity persistence
  • Managing object state
1710
BIG-IP SYSTEM ADMINISTRATION
  • Logging Setup
  • Legacy Remote Logging
  • High Speed ​​Logging (HSL) Overview
  • Logging Filters High Speed
  • HSL Configuration Objects
  • Configuring High Speed ​​Logging
  • Using TCPDUMP on BIG-IP System
  • Leveraging the BIG-IP iHealth system
  • Viewing BIG-IP system statistics
  • Setting user roles and administrative partitioning Leveraging vCMP
1711
HIGH AVAILABILITY CONFIGURATION
  • Device Service Clustering (DSC) overview
  • Preparing to deploy a DSC configuration
  • Configuring DSC communication parameters
  • Establishing device trust
  • Establishing a failover and sync device group
  • Synchronize configuration data
  • Exploring group behavior
  • Understand failover handlers and triggers Successfully perform mirrored state failover
1712

Service-Oriented Architecture (SOA)

★★★★★

  • SII-298
  • 5 Days (35 Hours)

Description

This Training is designed to provide an understanding of the mechanisms of service-oriented architecture. This includes the technical design of SOA-based architectures and service-oriented solutions to business problems. This training provides an overview of the techniques associated with IS Architecture and Urbanization. It is based on concrete examples. and allows the identification of risks and understanding how to avoid them

Who is this training for ?

For whom

IT Project Manager, IS Urban Planner, IS Architect, IT Manager, Developer

1713
Prerequisites

None.

Training objectives

Master the main rules of the urbanization of an information system.
Identify the issues and objectives linked to this approach.
Understand the different architectures.

1714

Training program

Understand basic concepts
  • The urbanization of the information system
  • Definition and vocabulary.
  • The urbanization plan serving the master plan
  • Understand the challenges for the IS and the company.
Lead an urbanization process
  • Panorama of typical approaches: Club-Urba, TOGAFF, Zakman.
  • Define the main phases of an urbanization approach
  • Identify the success factors
  • Limit risks
  • Define roles and responsibilities.
Corporate repositories
  • Reference data and enterprise repositories.
  • Data management: MDM and ETL.
  • Business intelligence: Datawharehouse and datalake.
Business architectures
  • Identify business processes.
  • Automate business processes.
Functional urban planning
  • The division into zones, districts, blocks.
  • Main town planning rules.
  • Modeling of exchanges.
1715
Application Technologies and Architectures
  • Types of architecture: SOA, EDA and CEP
  • Integration of business applications: EAI and ESB.
  • SaaS applications, private clouds and IT 'business.
1716

Microsoft 365 Administrator Certificate Course

★★★★★

  • SII-245
  • 10 Days (60 Hours)

Description

This training is delivered under the conditions defined by Microsoft, this Microsoft 365 Administration training is intended for IT managers and administrators responsible for migrating from on-site Microsoft solutions to the subscription-based cloud solution. It prepares for the exams allowing you to obtain the “Microsoft 365 Enterprise Administrator Expert” certification. It replaces the “Activate and Administer Office 365” training (M20347). The training takes place in two distinct periods. First (5 days), you learn identity and service management in Microsoft 365 (migrating your organization to a hybrid universe, managing users, security groups and licenses, organizing synchronization with Azure AD Connect) . Then you learn mobility and security management (5 days), focusing on security and compliance aspects (implementation of security metrics, Azure AD Identity Protection, retention and data loss prevention solutions, implementation of data governance), mobile device management features using Microsoft 365 (via Intune for example), as well as monitoring of these devices and user control on devices enrolled in using conditional access policies.

Who is this training for ?

For whom
This training is aimed at anyone wishing to deploy and administer Microsoft 365 services on a daily basis, and more particularly to administrators wishing to evaluate, plan, migrate, deploy and manage Microsoft 365 services.
1717
Prerequisites

None

Training objectives

Know the key components of Office 365
Understand how to plan the deployment of Office 365 and Office 365 ProPlus
Know how to manage Exchange OnLine and configure anti-malware and anti-spam components
Be able to migrate mailboxes to Office 365 in a hybrid environment
Understand how to plan identity and authentication solutions
Know how to implement domain services and configure a tenant
Be able to manage licenses, users and security groups
Be able to configure hybrid environments, implement Azure AD Connect, and manage synchronized identities
Understand how to manage application proxy
Understand how to manage security metrics, implement security solutions in Microsoft 365, and configure Azure AD identity protection
Understand data governance in Microsoft 365, including: archiving, retention, information rights management, secure S/MIME (Multipurpose Internet Mail) extension, Office 365 message encryption, data loss prevention
Protect against data loss data loss by creating DLP policies
Plan co-management and prepare Windows 10 devices for co-management
Know how to configure Microsoft Store for business
Plan mobile app management and Windows 10 deployment strategy
Know how to manage devices with Mobile Device Management
Be able to enroll devices in mobile device management and manage compliance

1718

Training program

Office 365 management
  • Move your organization to Office 365
  • Setting up your Microsoft 365 subscription
  • Setting up Office 365
  • Managing Office deployments 365 ProPlus
  • Practical Work
Managing Microsoft 365 subscriptions and services
  • Design of your Microsoft 365 tenant
  • Configuration of your Microsoft 365 tenant
  • Management of the Microsoft 365 tenant
  • Practical work
Microsoft 365 identity management
  • Managing users, security groups and licenses
  • Practical Work
  • Plan and implement identity synchronization
  • Practical Work
  • Planning and implementing federated identities
  • Implementing applications and external access
1719
Managing Microsoft 365 Security
  • Designing your Microsoft Office 365 client
  • Configuring your Microsoft 365 client
  • Managing your Microsoft 365 client
  • Practical work
Compliance management under Microsoft 365
  • Introduction to Data Governance in Microsoft 365
  • Archiving and Retention in Microsoft 365
  • Implementing Data Governance in Microsoft 365
  • Managing data governance in Microsoft 365
  • Managing search and surveys
  • Practical Work
Device management under Microsoft 365
  • Planning device management
  • Planning your Windows 10 deployment strategy
  • Implementing mobile device management
  • Hands-on
1720

Microsoft Azure - Administration

★★★★★

  • SII-427
  • 5 Days (35 Hours)

Description

With this training, you will learn how to manage your Azure subscriptions, secure identities, administer the infrastructure, configure virtual networks, and connect Azure to an on-premises site. You will also be able to manage network traffic, implement storage solutions, create and size virtual machines, deploy web applications and containers, back up and share data, and monitor your environment.

Who is this training for ?

For whom
  •  administrators and managers of traditional systems who want to switch to Azure as well as any IT professional who wants to learn more about Microsoft Azure.
1721
Prerequisites

None

Training objectives

  • Understand how to manage Azure subscriptions.
  • Being able to design and scale virtual machines.
  • Having the ability to implement storage solutions.
  • Being able to set up virtue networks.
  • Understand the process of making backups and sharing data.
  • have the skills required to link Azure to a "On-Premise" site.
  • Being able to implement Azure AD
    Determine the Azure data protection mechanisms.
     

1722

Training program

ADMINISTRATION D’AZURE
  • Azure Portal and Shell in the Cloud
  • Azure PowerShell and CLI
  • Resource Manager
  • ARM templates
MACHINES VIRTUAL AZURE
  • Scheduling virtual machines
  • Creating virtual machines
  • Availability of virtual machines
  • Extending virtual machines
STORAGE IN AZURE
  • Storage accounts
  • Azure Blobs
  • Azure Files
  • Storage security
VIRTUAL NETWORK
  • IP addressing and endpoints
  • Azure DNS
  • Network security groups
1723
INTER-SITE CONNECTIVITY
  • Virtual Network Peering
  • VNet-to-VNet Connections
  • ExpressRoute Connections
SURVEILLANCE
  • Azure Monitor
  • Alerts
  • Log analysis
  • Network monitoring
DATA PROTECTION
  • Data replication
  • Backup of files and directories
  • Backup of virtual machines
NETWORK TRAFFIC MANAGEMENT
  • Azure Active Directory
  • Azure AD Connect
  • Azure AD Join
SECURITY
  • Multi-Factor Authentication
  • Azure AD Identity Protection
  • Password Reset Service
1724
GOVERNANCE AND COMPLIANCE
  • Accounts and subscriptions
  • Role-based access control (RBAC)
  • Users and groups
  • Azure security policy
DATA SERVICE
  • Content Delivery Network
  • File Synchronization
  • Data Import and Export Service
  • Data Box
1725

Updating Skills to MCSA Windows Server 2016

★★★★★

  • SII-247
  • 5 Days (35 Hours)

Description

Intended for experienced Windows system administrators and engineers, this training covers the fundamentals of Windows Server by adding the new features of the 2016 version, particularly with regard to networking and virtualization. There is also a technology newly introduced in Windows Server and which has received a lot of attention: containers, isolated systems which promote the provision of applications and which can be hosted either directly under Windows Server, or in isolation under Hyper-V

Who is this training for ?

For whom
Windows Server 2008 or 2012 administrators
1726
Prerequisites

None

Training objectives

Learn how to install and configure Windows Server 2016
Know how to implement Hyper-V, directory services and AD FS
Be able to manage and optimize Windows Server 2016 storage
Be able to implement network services and access to distance
Know how to implement clustering and Hyper-V on a cluster
Learn how to implement Failover Clustering with Hyper-V
Know how to implement and administer containers under Windows Server 2016

1727

Training program

INSTALLATION ET CONFIGURATION DE WINDOWS SERVER 2016
  • Introduction
  • Installing Windows Server 2016
  • Setting up Windows Server 2016
  • Preparing to update or migrate
  • Migrating servers and work items
  • Windows Server activation terms
STORAGE MANAGEMENT UNDER WINDOWS SERVER 2016
  • Presentation
  • Implementing deduplication
  • iSCSI Storage
  • Storage Spaces
IMPLEMENTATION OF DIRECTORY SERVICES
  • Deploying domain controllers
  • Creating service accounts
  • Azure Active Directory
1728
IMPLEMENTATION OF ACTIVE DIRECTORY FEDERATION SERVICES (AD FS)
  • Overview
  • Deployment
  • Setup for a single organization
  • Web Application Proxy
  • Azure AD FS
NETWORK SERVICES
  • What's new in Windows Server 2016
  • Implementing IPAM
  • Managing IP addresses with IPAM
IMPLEMENTING HYPER-V
  • Configuring the Hyper-V server role
  • Configuring storage
  • Configuring virtual machines
ADVANCED NETWORK FEATURES
  • High-performance networking
  • Hyper-V advanced networking features
SOFTWARE DEFINED NETWORKING
  • Introduction
  • Network virtualization
  • Network Controller
1729
REMOTE ACCESS
  • Introduction
  • DirectAccess
  • VPN
CONTAINER DEPLOYMENT AND ADMINISTRATION
  • Containers under Windows Server 2016
  • Deployment of Windows Server and Hyper-V containers
  • Installation, configuration and administration of containers with Docker
CLUSTERING
  • Introduction
  • Implementing a failover cluster
  • Hosting applications and services in high availability
  • Maintaining clusters
  • Implementation of geoclusters
CLUSTERING WITH HYPER-V
  • Integrating Hyper-V Server 2016 into a cluster
  • Implementing virtual machines in a cluster
  • Moving virtual machines
  • Implementing Hyper-V Replica
1730

Microsoft 365 training - The fundamentals

★★★★★

  • SII-248
  • 1 Days (7 Hours)

Description

Discover Microsoft 365

Who is this training for ?

For whom
IT professionals looking to deploy and manage cloud computing services in their business or simply looking to gain basic knowledge of cloud fundamentals
1731
Prerequisites

None

Training objectives

Know how to differentiate between different Cloud
service models Understand how to identify the main differences between Microsoft 365 and Office 365
Know how to plan the migration to Microsoft 365
services Be able to identify the main differences between on-premises Microsoft services and Microsoft 365
Cloud services Define enterprise mobility in Microsoft 365
Be able to describe identities, including cloud, on-premises, and hybrid identity
Be able to describe device management and protection in the Cloud, including the use of 'Intune
Know how to describe data protection, including the use of Azure Information Protection
Understand compliance in general and compliance features in Microsoft 365
Manage Microsoft 365 subscriptions, licensing, billing, and support

1732

Training program

CONCEPTS CLOUD
  • Principles of Cloud Computing
  • Microsoft Cloud Services
  • Migrating to Cloud Services
SERVICES DE BASE MICROSOFT 365
  • Microsoft 365 Core Services
  • Microsoft On-Premises Services and Cloud Services in Microsoft 365
  • Unified Endpoint Management in Microsoft 365
  • Teamwork in Microsoft 365
SECURITY, COMPLIANCE, PRIVACY, AND TRUST IN MICROSOFT 365
  • Organizational security fundamentals
  • Security features in Microsoft 365
  • Identity and access management
  • Protecting devices and data in Microsoft 365
  • Compliance in Microsoft 365
MICROSOFT 365 PRICING AND SUPPORT
  • Microsoft 365 subscriptions, licensing, and billing
  • Support in Microsoft 365
1733

Microsoft 365 - Security and mobility management

★★★★★

  • SII-249
  • 5 Days (35 Hours)

Description

There was a time (still quite recent) when in the minds of professionals, cloud and security did not necessarily go well together. And the doubt increased further when the use of applications or mobile equipment was mentioned. Aware of this reluctance, major market players have developed numerous tools aimed at implementing effective security at all levels. Microsoft has thus integrated into its 365 offering a complete range of particularly effective tools to protect each element of the IS (directory, authentication, client/server dialogue, mobile applications, etc.). The purpose of this training is precisely to present in detail all of these tools and to allow professionals concerned with the subject of security to learn how to implement them.

Who is this training for ?

For whom
Anyone wishing to deploy and administer Microsoft 365 services
1734
Prerequisites

None

Training objectives

Know how to manage security metrics, implement security solutions in Microsoft 365, and configure Azure AD identity protection
Be able to implement advanced threat protection with Microsoft Secure Score and Exchange Online Protection
Be up to date comfortable with data governance in Microsoft 365, particularly with regard to archiving, information rights management, encryption of Office 365 messages, data loss prevention...
Know how to create DLP strategies to protect against data loss
Be able to manage the transition from Configuration Manager to Intune
Know how to plan mobile application management and Windows 10 deployment strategy
Be able to manage devices with Mobile Device Management

1735

Training program

PART 1: MANAGING MICROSOFT 365 SECURITY
DESIGNING YOUR MICROSOFT 365 CLIENT
  • Planning an on-premises Microsoft 365 infrastructure
  • Planning your identity and authentication solution
CONFIGURING YOUR MICROSOFT 365 CLIENT
  • Planning your Microsoft 365 experience
  • Setting up your Microsoft 365 experience
  • Leveraging FastTrack and partner services
  • Implementing your Microsoft 365 services domain
MANAGING YOUR MICROSOFT 365 CUSTOMER
  • Configuring tenant roles
  • Managing tenant health and services
PRACTICAL WORKSHOP
  • Microsoft 365 Security Management
PART 2: MANAGING MICROSOFT 365 COMPLIANCE
INTRODUCTION TO DATA GOVERNANCE IN MICROSOFT 365
  • Introduction to Archiving in Microsoft 365
  • Introduction to Retention in Microsoft 365
  • Introduction to Information Rights Management
  • Introduction to the Secure Multipurpose Internet Email Extension
  • Introduction to Office 365 Message Encryption
  • Introduction to Data Loss Prevention
1736
ARCHIVING AND RETENTION IN MICROSOFT 365
  • estimating records on-premises in SharePoint
  • Archiving and retention in Exchange
  • Retention policies in the CCN
  • Implementing your recording services domain
IMPLEMENTING DATA GOVERNANCE IN MICROSOFT 365
  • Planning your security and compliance needs
  • Building ethical walls in Exchange Online
  • Creating a simple DLP strategy from a built-in template
  • Creating a custom DLP policy
  • Creating a DLP policy to protect documents
  • Working with policy guidance
MANAGING DATA GOVERNANCE IN MICROSOFT 365
  • Managing Email Retention
  • Troubleshooting Data Governance
  • Implementing Information Protection
  • Implementing Advanced Information Protection
  • Introduction to Windows Information Protection
1737
MANAGEMENT OF RESEARCH AND INVESTIGATIONS
  • Search content in the Security and Compliance Center
  • Search the audit log
  • Advanced eDiscovery Management
PRACTICAL WORKSHOPS
  • Setting up your TP environment
  • Archiving and retention in Microsoft 365
  • Implementing data governance
  • Checking your policies data governance
PART 3: MANAGING MICROSOFT 365 DEVICES
PLANNING DEVICE MANAGEMENT
  • Introduction to co-management
  • Prepare your Windows 10 devices for co-management
  • Transitioning from Configuration Manager to Intune
  • Introduction to Microsoft Store for Business
  • Mobile Application Management Planning
PLANNING YOUR WINDOWS 10 DEPLOYMENT STRATEGY
  • Windows 10 deployment scenarios
  • Planning your Windows 10 subscription activation strategy
  • Resolving Windows 10 upgrade errors
  • Introduction to Windows Analytics
1738
IMPLEMENTING MOBILE DEVICE MANAGEMENT
  • Planning for mobile device management
  • Deploying mobile device management
  • Enrolling devices into MDM
  • Managing compliance peripherals
PRACTICAL WORKSHOPS
  • Working with Microsoft Store for Business
  • Managing devices using Intune
1739

Microsoft 365 - Hybrid deployment of SharePoint servers

★★★★★

  • SII-250
  • 5 Days (35 Hours)

Description

There are two main reasons for choosing a SharePoint deployment in hybrid mode: if SharePoint is already deployed on-premises and a gradual migration to the cloud is being considered, or if for reasons specific to it, the he company wants to have some data on-premises and some in the cloud. In both cases, administrators must ensure that this distribution of data and tools does not impact the fluidity and simplicity of the user experience: research must be able to be carried out on both infrastructures, interfaces and access. will have to merge, etc... It is precisely with this perspective of coexistence that this training was designed which presents in detail all the implementation tasks (server on site and server in the cloud) guaranteeing efficient operation optimized for this hybrid mode. Migration to the full cloud is also covered by the program.

Who is this training for ?

For whom
Administrateur Teamwork Microsoft 365
1740
Prerequisites

None

Training objectives

Understand how to install and configure SharePoint 2019 and implement high availability
Understand the authentication framework in SharePoint 2019 and the concepts of federated identity
Know how to create site collections and plan for authorization in SharePoint 2019
Understand how to configure websites and user profile service application
Be able to plan SharePoint Active Directory import and synchronization
Know how to implement hybrid SharePoint scenarios and configure on-premises data gateway
Plan the migration process of content

1741

Training program

PART 1: IMPLEMENTING SHAREPOINT 2019 INFRASTRUCTURE
INFRASTRUCTURE SHAREPOINT
  • Plan a SharePoint farm
  • SharePoint 2019
  • Install and manage the SharePoint farm
SHAREPOINT AUTHENTICATION AND SECURITY
  • Schedule authentication
  • Configure federated authentication
SHAREPOINT CONTENT MANAGEMENT
  • SharePoint content structure overview
  • Manage content access
  • Manage site collections
PRACTICAL WORKSHOP
  • Creating and configuring web applications
PART 2: IMPLEMENTING SHAREPOINT 2019 SERVICE APPLICATIONS
APPLICATIONS DE SERVICE SHAREPOINT
  • SharePoint service applications and workflow
  • Plan and configure Business Connectivity Services (BCS) and Secure Store
  • Plan and configure user profiles
PLAN AND CONFIGURE MANAGED METADATA
  • Manage content types
  • Managed metadata
  • Configure the managed metadata service
1742
PLAN AND CONFIGURE THE SEARCH
  • Schedule enterprise search
  • Configure enterprise search
  • Manage enterprise search
PRACTICAL WORKSHOP
  • Setting up enterprise search
PART 3: IMPLEMENTING SHAREPOINT HYBRID SCENARIOS
PRESENTATION OF SHAREPOINT HYBRID SCENARIOS
  • SharePoint hybrid scenarios overview
  • Plan SharePoint Server hybrid
IMPLEMENTING SHAREPOINT HYBRID SCENARIOS
  • Implement hybrid SharePoint scenarios
  • Configure on-premises data gateway
IMPLEMENTING SHAREPOINT HYBRID SEARCH
  • SharePoint Hybrid Search Overview
  • Configure SharePoint Hybrid Search
PRACTICAL WORKSHOP
  • Configuration de SharePoint hybride
PART 4: MIGRATION TO SHAREPOINT ONLINE
INTRODUCTION TO MIGRATION
  • Migration Overview
  • Leveraging FastTrack and Partner Services
MIGRATION VERS SHAREPOINT ONLINE
  • Prepare for migration
  • Migrate content to the Cloud
  • Manage and monitor the migration process
PRACTICAL WORKSHOP
  • File migration to SharePoint Online
1743

The key principles of artificial intelligence

★★★★★

  • SII-411
  • 3 Days (21 Hours)

Description

Artificial intelligence is a booming technology today. Threats or opportunities, companies today must master technologies and anticipate the uses that may arise from these technologies in order to find growth drivers or resist the arrival of new entrants. The Information Systems Department, which is at the heart of the implementation of this technology, must ensure both a monitoring and advisory role for businesses and potential users of the technologies. It must also ensure the feasibility of implementing applications at a reasonable cost consistent with the IT architecture defined by the company. This training is intended to give all DSI stakeholders the keys to understanding the challenges, technologies, technical constraints of artificial intelligence and give the keys to DSI stakeholders to support innovation projects calling on this technology.

Who is this training for ?

For whom

All IT department players able to support projects integrating artificial intelligence (AI).

1744
Prerequisites

None.

Training objectives

Understand the uses and actors of AI

AI technologies and tools: deep-learning and machine-learning

Integrate AI into information systems

Lead an artificial intelligence project

1745

Training program

Concepts of Artificial Intelligence (AI)
  • The different categories of AI.
  • First applications.
  • Scenario: Demonstration of Chatbots, Watson, videos.
AI algorithms and data
  • Distinguish the main AI algorithms and their use: focus on Machine Learning algorithms and Deep Learning.
  • The different types of data for AI, their use: focus on Machine Learning data.
  • Scenario: Application with participant data.
Uses of artificial intelligence
  • Know the state of the art in the performance of AI systems in vision, language and robotics.
  • Understand the role of AI in vision and customer experience. Analysis use cases.
  • Scenarios: demonstration of the 360 ​​Clikfox system, generating ideas for AI applications in participants' environments.
Identify the risks associated with AI
  • Ethics
  • Safety
Understand and anticipate the impacts of the use of AI on infrastructures and processes
  • The architecture of an AI application.
  • AI Databases.
  • Impact on the IT system.
The AI ​​market
  • The actors of AI
  • The role of GAFA.
  • The Villani report.
1746
Mener and project IA
  • The approach, methods and tools specific to Artificial Intelligence projects.
1747

AUTODESK AUTOCAD CIVIL 3D

★★★★★

  • SII-252
  • 5 Days (35 Hours)

Description

This training aims to take into account the tools for designing infrastructure projects. Accelerate your design operations, optimize the performance of your projects.

Who is this training for ?

For whom
Civil engineering professionals, public works engineers, designers and planners in land use planning.
1748
Prerequisites

None

Training objectives

Realization of practical cases, allowing all of the points discussed to be applied

1749

Training program

The work environment
  • Interfacing latest version
  • Prospector and settings
  • Visualization of objects in 3D
Infrastructure design
  • 3D project design (improved)
  • Pressure pipeline networks (improved)
  • Under gravity pipeline networks (improved)
  • Talus
  • Plot design
  • Bridge modeling (Autodesk Bridge Module)
  • Geotechnical modeling
  • Representation of railway tracks
  • Modeling a 3D road project
  • Creation and modification of assemblies for a simple 3D project.
  • Creation of surfaces on a 3D project.
  • Sections and materials
  • Creation and modification of cross sections, section views.
  • Calculation of material volumes per section.
1750
Drawing and documentation in the field of civil engineering
  • Execution plans (improved)
  • Map production
  • Reports and tables
GPS topography and data collection
  • Area modeling
  • Creating basemaps
  • Capturing real-world information (improved)
Visualization and analysis
  • Geospatial analysis
  • Visual analysis
  • Rivers and flood analysis
  • AutoCAD Civil 3D and 3ds Max
1751
Collaboration
  • AutoCAD Civil 3D with InfraWorks 360 new
  • IFC Export NEW
  • Import and export AutoCAD solids in IFC file format.
  • AutoCAD Civil 3D with Vault Professional
  • AutoCAD Civil 3D and Navisworks
  • AutoCAD Civil 3D with Revit Structure
  • Backward Compatibility
  • Collaboration cloud-based
  • Data shortcuts and references (improved)
1752

AutoCAD – Plant 3D

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

This training is aimed at installation designers, draftsmen in design offices as well as project managers who have a solid knowledge of Windows and the notions of CAD software.

Who is this training for ?

For whom

Draughtsmen and designers proficient in AutoCAD 2D and 3D wishing to train in the use of AutoCAD Plant 3D software.

1753
Prerequisites

Have a good knowledge of Windows and the notions of CAD software. Knowledge of AutoCAD 3D is desired.

Training objectives

This training aims to improve productivity and coordination in the design and implementation of industrial installations using AutoCAD Plant 3D software
Participants will learn how to create a template in AutoCAD Plant 3D, generate isometric and orthographic plans, create material reports and design P&IDs (Process and Instrumentation Diagram)

Participants will also learn how to model in 3D while benefiting from controls between P&IDs and the 3D environment, model piping based on specifications, integrate components semi-automatically or manually and customize the library of standard equipment

The training also includes learning how to create external references, generate structural elements with parameters, use technology based on ANSI/ASME (B16) and DIN/ specifications and catalogs
ISO, as well as the modeling of a global industrial installation by integrating ISO standards

1754

Training program

AutoCAD Plant 3D : introduction
  • User interface
  • Project browser
  • Workspace
Create a project
  • Create a project
  • Add folders
  • Create drawings
  • Manage your project
Navigation tool
  • The view cube
  • Using the mouse
  • Navigation bar
  • Visibility options
  • Visual styles
1755
AutoCAD Plant 3D Quick View
  • Add lines to a P&ID
  • Add steel components
  • Place equipment
  • Draw piping
  • Add a valve
  • Create an isometric
  • Generate an orthographic view
Create a steel structure
  • Introduction
  • Create a grid
  • Add a beam
  • Preferences and visibility
  • Stairs, ladder, railing body and foundation
Model equipment
  • Create equipment
  • Structural equipment
  • Tank and expansion tank
  • Pumps, exchangers
  • Conversion AutoCAD object
1756
3D piping
  • Start 3D piping
  • External reference
  • How to draw a route
  • Use the compass
  • Routing options
  • Create a branch
  • Inserting components
  • Using AutoCAD lines
  • Slope
  • Support
1757
Drawing modification
  • Selection method
  • Hide and isolate objects
  • Lock and unlock
  • Change size and specification
  • Isolation
  • Copy and stretch
  • Edit structural element
  • Modify a equipment
  • Change and modify a nozzle
  • Save equipment as a template
  • Modify a support
1758
Orthographic view
  • Introduction
  • Create a view
  • Update a view
  • Create a section
  • Save your views view preferences
  • Add annotation and dimension
  • Updating annotations
1759

COVADIS – HIGHWAY

★★★★★

  • SII-299
  • 4 Days (28 Hours)

Description

Practical training through project-based learning involves learning by doing. It allows learners to solve real-world problems using their theoretical knowledge and develop practical skills more quickly.

Who is this training for ?

For whom

VRD design offices and construction companies, project managers, project engineers, construction professionals, topographic surveyors. Anyone required to manage a project and wishing to acquire the tools allowing them to carry out their mission successfully

1760
Prerequisites

None

Training objectives

Process a road infrastructure study from its initial phase (import of field data) to its final phase (integration of the project in 3D, execution plans, quantities, measurements and VRD slips)

1761

Training program

Basic data
  • Loading Point Seeding.
  • Calculates M.N.T (triangulation).
  • Level curves.
Conception plane
  • Simple and interactive modification of the axis in plan.
  • Choice of the tabulation implementation method
  • Management of secondary tabulations
Longitudinal design
  • Assembly of TN long profile.
  • Assembly of a Project line with the different connections.
  • Representation of ditches and pipes on the longitudinal profile .
  • Long Profile Guitar Layout.
Cross-sectional design
  • Typical profiles by points
  • Typical profiles by layers.
  • Complete your library of standard profiles.
  • Automatically manage your library of materials.
1762
Sloping and stripping
  • Assignment of different stripping thicknesses.
  • Automatic calculation of slopes according to standards.
  • Variable slopes with dynamic preview.
  • Modification by abscissa.
Project listings
  • Plan surfaces.
  • Optimization of cubatures.
  • Automated printing of profiles
1763

Formation Robot Millennium

★★★★★

  • SII-411
  • 3 Days ( Hours)

Description

Robot Millennium is a structural design and analysis software used primarily in the field of civil engineering and construction

Who is this training for ?

For whom
  • Civil and structural engineers, as well as construction professionals involved in the design and analysis of structures.
  • Civil engineering and architecture students interested in learning structural design and analysis tools used in industry.
  • Anyone working in the construction field and wishing to acquire skills in the use of specialist software for the design and analysis of structures.
1764
Prerequisites
  • Basic knowledge of civil engineering, including structural design and analysis concepts.
  • Familiarity with structural modeling and analysis software is a plus, but not necessarily required.
  • Understanding of the fundamental principles of materials engineering and loads applied to structures.

Training objectives

  • Allow participants to master the use of the software to design and model
  • Analyze and effectively size civil engineering structures
  • Apply engineering principles and appropriate safety standards while using the software to solve complex engineering problems

1765

Training program

Introduction to the software
  • Overview of the basic functionality of Robot Millennium, including user interface, structure modeling, loads and load combinations.
Structural modeling
  • Learning modeling techniques to represent different shapes of structures, such as buildings, bridges, steel structures, concrete
Application des charges
  • Understand how to correctly apply gravity loads, wind loads, seismic loads, and other relevant loads to modeled structures.
Structural analysis
  • Using Robot Millennium's analysis tools to evaluate the stability, strength and performance of structures under various load and stress conditions.
Optimization and sizing
  • Techniques for optimizing the design of structures by adjusting design parameters and evaluating the performance of structural elements.
Reports and presentations
  • Generation of reports and visualizations to communicate analysis results clearly and effectively to project stakeholders.
1766

REVIT ARCHITECTURE

★★★★★

  • SII-413
  • 4 Days (28 Hours)

Description

This training covers three different areas. During concrete projects, learners will carry out tasks including importing elements and manipulating the software. By completing the challenge in a real "workshop", participants will have had in-depth guided practice of the skills necessary to pass the Autodesk Revit ACU exam and thus obtain official certification.

Who is this training for ?

For whom

Architects, project managers, operation managers, construction economists, surveyors, technicians, engineers and design office managers, developers, operators, BIM managers.

1767
Prerequisites

Good knowledge of a graphical operating system.

Training objectives

Understand what BIM is
Discover the graphical interface, workspace and help of Revit Architecture
Model a building
Manage a project while respecting the BIM charter and conventions

1768

Training program

Overview of Revit
  • Work environment
Project preparation
  • Library
  • Preparing the project file
Project template
  • Single template or several templates?
  • Creating a template
  • Managing and updating a template
  • Using a template
Location and topography
  • Location of the project in relation to a surveyor's plan
  • Location of the project in relation to a cadastral plan
  • Definition of the geographical location
  • Project environment
1769
Modeling of the architectural project
  • Create roofs
  • Create stairs and landings
  • Create and modify floors
  • Add rooms
  • Move /copy / align / synthesize elements
  • Create an element network (parametric family initiation)
  • Insertion of objects from a typical cloud: BIM&CO
Design Verification
  • Verification of regulatory constraints
  • First model rendering
  • Sunlight study
  • Technical lots: structure and fluids
  • Landscaping project and exterior arrangements
Verifications and annotations, nomenclature
  • Annotation elements
  • Nomenclature
  • Result study
1770
Use of modeling for partners
  • Sheet Reviews and Reviews
  • Quantitative
  • Sample Sheets
  • Drawing Update in Revit
Preparing views
  • Change the view scale
  • Change the level of detail
  • Identify the cutting plane of a view
  • Use levels
  • Create view plans
  • Create sections and elevation views
  • Create 3D views
  • Create floor views drawing
Layouts and printing
  • Sheets and views
  • Cartridge
  • Print settings
  • Sheet organization
1771

Formation Introduction au CMMI

★★★★★

  • SII-300
  • 3 Days (21 Hours)

Description

The CMMI model is a model of industrialization of software production that has proven itself by increasing product quality while reducing costs and deadlines. This “Introduction to CMMI” training will allow you to master this model in detail and participate in a SCAMPI evaluation as a team member.

Who is this training for ?

For whom

This CMMI training is aimed at anyone involved in software development or maintenance.

1772
Prerequisites

None

Training objectives

  • Master the CMMI model in detail
  • Identify the benefits of improvement processes

1773

Training program

INTRODUCTION
  • Training process
  • Training objectives
  • Training content
CONCEPTS OF PROCESS IMPROVEMENT AND CMMI
  • Process improvement concepts
  • The CMMI product suite
  • The benefits of CMMI
ROUTE OF THE COMPONENTS OF THE CMMI MODEL
  • The contents of the CMMI model
  • The components of a process domain
  • The glossary
REPRESENTATIONS OF THE MODEL AND INSTITUTIONALIZATION
  • Representations of the CMMI model
  • Understanding the levels
  • Institutionalization of processes
  • Apply generic practices
PRODUCT DEVELOPMENT (FIRST PART)
  • Managing needs and requirements
PROJECT MANAGEMENT
  • Project planning and monitoring
  • Risk management
  • Supplier management
1774
PROJECT AND ORGANIZATIONAL SUPPORT
  • Configuration management
  • Process and product quality assurance
  • Measurement and analysis
  • Decision making
  • Analysis of causes and their resolutions
PRODUCT DEVELOPMENT (SECOND PART)
  • Technical solutions
  • Product integration
  • Verification
  • Validation
IMPROVEMENT INFRASTRUCTURE
  • Focus on organizational processes
  • Defining organizational processes
  • Integrated project management
  • Organizational innovation and its deployment
  • Training at the organizational level.
QUANTITATIVE MANAGEMENT
  • The performance of organizational processes
  • Quantitative project management
1775
SUPPORT FOR COMPLEX ENVIRONMENTS
  • The concepts of integrated product and process development
  • The definition of organizational processes and integrated development
  • Integrated project management and integrated development
THE OVERALL VISION
  • Relationships between process domains
  • Relationships between process domains and generic practices
  • Using both representations
  • The notion of equivalence between representations
1776

Formation G Suite : Google Drive

★★★★★

  • SII-361
  • 1 Days (7 Hours)

Description

Google Drive is an online file storage and sharing service launched by Google. It brings together different tools such as Google Docs, Sheets, Slides and Drawings, offering a complete office suite for creating and modifying documents, spreadsheets, presentations, drawings, forms, etc. Google Drive replaces Google Docs and any documents already created on Google Docs are automatically transferred to Google Drive. This service allows you to synchronize, share and modify data between several users and/or computers.

Who is this training for ?

For whom

This training targets any employee wishing to use the Gmail Calendar Contact and Drive applications of the Google G Suite collaborative platform (formerly Google Apps) as office tools.

1777
Prerequisites

Taking this Google Drive course requires knowing how to use a computer and the Chrome browser. Overall knowledge of G Suite (Ex Google Apps) is desired, but not essential.

Training objectives

Master all the basic features of the Drive

1778

Training program

Presentation of the G Suite collaborative platform (formerly Google Apps)
  • Collaborative tools
  • Communication tools
G Suite and your business
  • The benefits of the solution
  • The planning
Overview of the Drive environment
  • Presentation of the interface
  • Drive and Office environment comparison
  • The search engine, advanced search
  • The different menus The settings of the interface
Using the interface
  • Creating folders, configuring and sharing
  • Creating subfolders
  • Handling documents
  • Classification
  • Naming plan
Sharing rules
  • The different sharing
  • The different sharing levels
1779
The different documents of the drive
  • Creation of text documents
  • Creation of table
  • Creation of presentation
  • Creation of forms
  • Creation of drawings
Import and/or conversion of office documents
  • Import with conversion
  • Import without conversion
  • principles
  • revision management
1780

ISO 37001 Lead Implementer ''Anti-corruption management systems''

★★★★★

  • SII-425
  • 5 Days (30 Hours)

Description

The ISO 37001 Lead Implementer training will allow you to acquire the expertise necessary to support an organization during the establishment, implementation, management and maintenance of an anti-corruption management system ( SMAC) compliant with the ISO 37001 standard. This training is designed to provide you with a mastery of best practices in anti-corruption management systems and to develop your skills to help an organization prevent, detect and deal with corruption. corruption effectively before it negatively impacts its reputation and profits.

Who is this training for ?

For whom

Managers or consultants involved in anti-corruption management; Specialized advisors wishing to master the implementation of an anti-corruption management system; Any person responsible for maintaining compliance with SMAC requirements; Members of a SMAC team

1781
Prerequisites

Training objectives

  • Understand the correlation between the ISO 37001 standard and other standards and regulatory frameworks
  • Master the concepts, approaches, methods and techniques necessary to effectively implement and manage a SMAC
  • Know how to interpret the requirements of the ISO 37001 standard in a specific context of the organization
  • Know how to support an organization in the planning, implementation, management, monitoring and updating of SMAC
  • Acquire the necessary expertise to advise an organization on the implementation of best practices relating to the Anti-Corruption Management System

1782

Training program

Day 1: Introduction to the ISO 37001 standard and initialization of a SMAC
Day 2: Planning for the implementation of a SMAC
Day 3: Implementation of a SMAC
Day 4: Monitoring, measurement, continuous improvement and preparation for the SMAC certification audit
Day 5: Certification exam
1783

ISO 37001 Lead Auditor ''Anti-corruption management systems''

★★★★★

  • SII-422
  • 5 Days (30 Hours)

Description

By following the ISO 37001 Lead Auditor training, you will be able to acquire the skills necessary to carry out Anti-Corruption Management Systems (SMAC) audits using widely recognized audit principles, procedures and techniques.

This training will also enable you to plan and carry out internal and external audits in accordance with the ISO 19011 standard and the ISO/IEC 17021-1 certification process, acquiring the appropriate knowledge and skills.

Who is this training for ?

For whom
  • Auditors wishing to carry out and lead certification audits of the Anti-Corruption Management System
  • Managers or consultants wishing to master the audit process of the Anti-Corruption Management System
  • Any person responsible for maintaining compliance with SMAC requirements
  • Technical experts wishing to prepare an audit of the Anti-Corruption Management System
  • Advisors specializing in anti-corruption management.
1784
ISO  37001 Lead Auditor,    certification iso, PECB, Systèmes de management anti-corruption Prerequisites

Good knowledge of the ISO 37001 standard and in-depth knowledge of audit principles.

Training objectives

  • Understand the operation of an Anti-Corruption Management System (SMAC) compliant with the ISO 37001 standard
  • Explain the relationship between ISO 37001 and other standards and regulatory frameworks
  • Understand the role of the auditor: plan, direct and follow up on a management system audit in accordance with ISO 19011
  • Know how to lead an audit and an audit team
  • Know how to interpret the requirements of ISO 37001 in the context of a SMAC audit
  • Acquire the skills of an auditor to plan an audit, lead an audit, write reports and follow up on an audit, in accordance with the ISO 19011 standard

1785

Training program

Day 1: Presentation of the Anti-Corruption Management System and the ISO 37001 standard
Day 2: Anti-corruption audit fundamentals, audit preparation and planning
Day 3: Carrying out on-site audit activities in accordance with ISO 19011
Day 4: Closure of the audit and audit report
Day 5: Passing the anti-corruption audit certification exam in accordance with the ISO 37001 standard.
1786

ISO/CEI 38500 IT Corporate Governance Manager

★★★★★

  • SII-293
  • 3 Days (21 Hours)

Description

The ISO/IEC 38500 IT Governance Manager training will allow you to acquire an in-depth understanding of the fundamental principles for good governance of information technologies in compliance with the ISO/IEC 38500 standard. During this training, you will also acquire the knowledge needed to help an organization apply and manage the Assess-Lead-Monitor model of ISO/IEC 38500.

Who is this training for ?

For whom

Managers or consultants responsible for ensuring good governance of information technologies within an organization; Individuals wishing to acquire in-depth knowledge of the fundamental principles of information technology governance; Members of an information technology governance team; Specialized advisors involved in information technology governance;

1787
Prerequisites

None

Training objectives

Understand the fundamental principles of ISO/IEC 38500 and learn how to interpret them
Know the ISO/IEC 38500 model Assess – Direct – Monitor
Acquire the knowledge necessary to evaluate, direct and monitor the use of information technology 'information in an organization
Understanding COBIT 5 and CGEIT

1788

Training program

Day 1: Introduction to IT governance and ISO/IEC 38500
Day 2: Principles for using information technology effectively, efficiently and acceptably
Day 3: Results, Performance Measurement Techniques and Certification Exam Exam
1789

ISO/CEI 38500 Lead IT Corporate Governance Manager

★★★★★

  • SII-301
  • 5 Days (35 Hours)

Description

The ISO/IEC 38500 Lead IT Governance Manager training will equip you with the expertise to support and lead the organization in effectively assessing, directing and monitoring an ISO-compliant information technology governance model /IEC 38500. This training is designed to equip you with a mastery of best practices and fundamental principles of IT governance and to develop your skills in applying them effectively in an organization to ensure good technology governance information.

Who is this training for ?

For whom

Managers or consultants responsible for ensuring good IT governance within an organization and effective management of its risks; Specialized advisors wishing to acquire in-depth knowledge of the main concepts and principles of IT governance; Technical experts wishing to formalize, modify and/or extend an organization's information technology-related objectives; Members of resource monitoring groups within an organization; Members of the information technology and/or information security governance team.

1790
Prerequisites

A fundamental understanding of ISO/IEC 38500 and in-depth knowledge of IT governance.

Training objectives

Master the fundamental principles of ISO/IEC 38500, their advantages as well as their application in an organization
Understand the ISO/IEC 38500 Assess-Direct-Monitor model and learn how to integrate it within an organization
Understand COBIT 5 and CGEIT and how they complement ISO/IEC 38500
Know how to effectively apply, manage and monitor IT governance within the organization
Acquire the expertise to advise an organization on IT Governance best practices in compliance with ISO/IEC 38500, COBIT 5 and CGEIT to ensure good governance of information technologies

1791

Training program

Day 1: Introduction to IT governance and ISO/IEC 38500
Day 2: Information technology strategy and acquisition
Day 3: Performance and risk management
Day 4: Resource management, compliance and human behavior
Day 5: Certification exam
1792

ISO/IEC 27701 Lead Implementer ''Privacy management system''

★★★★★

  • SII-423
  • 5 Days (35 Hours)

Description

ISO/IEC 27701 Lead Implementer training allows you to develop the expertise necessary to help an organization establish, implement, maintain and continually improve a privacy management system based on ISO/IEC 27701 by improving an existing information security management system (ISMS) based on ISO/IEC 27001 and ISO/IEC 27002 guidelines.

Who is this training for ?

For whom

Supervisors and consultants involved in privacy and data management Consultants seeking to master the implementation of a privacy management system; Responsible for personally identifiable information (PII) within organizations; Responsible for compliance with the requirements of data protection laws; PIMS team members.

1793
Prerequisites

None

Training objectives

  • Master the concepts, approaches, methods and techniques used for the effective implementation and management of a PIMS
  • Learn more about the correlation between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
  • Understand the operation of an ISO/IEC 27701-based PIMS and its core processes
  • Learn to interpret the requirements of ISO/IEC 27701 in the specific context of an organization
  • Expand the expertise needed to help an organization effectively plan, implement, manage, monitor and manage a PIMS

1794

Training program

Day 1: Introduction to the ISO/IEC 27701 standard and introduction to PIMS
Day 2: Plan the implementation of a PIMS
Day 3: Implementation of a PIMS
Day 4: Monitoring, measuring, continuous improvement and preparing the PIMS for a certification audit
Day 5: Certification exam
1795

ISO/IEC 27701 Lead Auditor ''Privacy management system''

★★★★★

  • SII-422
  • 5 Days (35 Hours)

Description

During this training, you will acquire the knowledge and skills necessary to plan and carry out audits in accordance with the ISO 19011 and ISO/IEC 17021-1 certification processes.

Who is this training for ?

For whom

Auditors seeking to conduct and lead Privacy Management System (PIMS) certification audits; Managers or consultants wishing to master a PIMS audit process; Individuals responsible for maintaining compliance with PIMS requirements; Technical experts wishing to prepare for a PIMS audit; Personally Identifiable Information Protection (PII) Advisors

1796
Prerequisites

Training objectives

Understand a privacy management system (PIMS) and its processes based on ISO/IEC 27701
Identify the relationship between ISO/IEC 27701, ISO/IEC 27001, ISO/IEC 27002 and other standards and regulatory frameworks
Understand the role of the auditor in planning, leading and monitoring a management system audit according to ISO 19011
Learn to interpret the requirements of ISO/IEC 27701 in the context of a PIMS audit

1797

Training program

Day 1: Introduction to the Privacy Management System (PIMS) and the ISO/IEC 27701 standard
Day 2: Audit principles, preparation and initiation of an audit
Day 3: On-site audit activities
Day 4: Closure of the audit
Day 5: Certification exam
1798

ISO/IEC 29100 Lead Implementer ''Private framework''

★★★★★

  • SII-301
  • 5 Days (35 Hours)

Description

The Lead Privacy Implementer training will allow you to acquire the expertise necessary to support an organization during the design, implementation, operation and maintenance of information technology and data systems. (ICT) that process and protect personally identifiable information (PII). During this training, you will gain the knowledge necessary to support an organization in improving privacy programs through the use of best practices and drive innovative solutions that enable the protection of PII in ICT systems.

Who is this training for ?

For whom

Managers or consultants involved and concerned with privacy security; Private security managers responsible for defining requirements for privacy protection in the ICT environment; Members responsible for an Information and Communication Technology (ICT) System; Data protection and personal information protection officers

1799
Prerequisites

Good knowledge of the ISO/IEC 29100 standard and in-depth knowledge of ICT systems.

Training objectives

Understand the principles relating to the ISO/IEC 29100 standard
Understand the correlation between the concepts of the ISO/IEC 29100 standard and the ISO/IEC 27000 standard
Master the terminology, concepts and approaches used to design, implement implement, operate and maintain ICT systems that manage and protect PII
Know how to interpret the high-level PII protection framework with ICT systems in a specific context of an organization as defined by the ISO standard/ IEC 29100
Know how to effectively advise organizations in defining their privacy requirements related to PII

1800

Training program

Day 1: Introduction to the ISO/IEC 29100 standard and initialization of a private framework
Day 2: Planning to implement a private framework
Day 3: Implementation of a private framework
Day 4: Monitoring, measurement, continuous improvement and evaluation (verification) of the private framework
Day 5: Certification exam
1801

ISO 27001 Lead Implementer / Information Security

★★★★★

  • SII-423
  • 5 Days (35 Hours)

Description

ISO/IEC 27001 Lead Implementer training provides participants with the knowledge necessary to help an organization effectively plan, implement, manage, monitor and maintain an information security management system (ISMS). ).

Who is this training for ?

For whom
  • Project managers and consultants involved and concerned by the implementation of an ISMS.
  • Expert advisors seeking to master the implementation of an ISMS.
  • Individuals responsible for ensuring compliance with information security requirements within an organization.
  • Members of an ISMS implementation team.
1802
Prerequisites

None

Training objectives

  • Acquire a comprehensive understanding of the concepts, approaches, methods and techniques used for the effective implementation and management of an ISMS
  • Understand the correlation between ISO/IEC 27001, ISO/IEC 27002 as well as other other standards and regulatory frameworks
  • Understand the operation of an information security management system and its processes based on ISO/IEC 27001
  • Learn to interpret and implement the requirements of the ISO 27001 standard in the specific context of an organization
  • Acquire the knowledge necessary to support an organization in the effective planning, implementation, management, monitoring and maintenance of an ISMS

1803

Training program

Day 1: Introduction to ISO/IEC 27001 and initiation of an ISMS
Day 2: Planning for Implementation of an ISMS
Day 3: Setting up an ISMS
Day 4: Monitoring, continuous improvement and preparation for the ISMS certification audit
Day 5: certification exam (Optional)
1804

ISO/CEI 20000:2018 Transition

★★★★★

  • SII-267
  • 2 Days (12 Hours)

Description

During this training, you will be able to gain the knowledge and expertise necessary to help an organization plan and implement the process of transitioning an SMS from ISO/IEC 20000-1:2011 to ISO /IEC 20000-1:2018 on time.

Who is this training for ?

For whom
To executives, trainers and/or consultants involved in a migration to an ISO/IEC 20000-1:2018 SMS. To those responsible for the migration process from ISO/IEC 20000-1:2011 to ISO/IEC 20000-1:2018. To auditors seeking to carry out certification of the ISO/IEC 20000-1:2018 transition.
1805
Prerequisites

A fundamental understanding of ISO/IEC 20000-1 and in-depth knowledge of transition processes.

Training objectives

Learn the main differences between ISO/IEC 20000-1:2011 and ISO/IEC 20000-1:2018
Master the new concepts and requirements of ISO/IEC 20000-1:2018
Learn how to effectively implement ISO/IEC changes 20000-1:2018 to an existing service management system (SMS).
Understand the new high-level structure of ISO/IEC 20000-1:2018 and learn how to apply it to an existing SMS.

1806

ISO 22316 Organizational resilience

★★★★★

  • SII-361
  • 2 Days (14 Hours)

Description

During this training course, you will be able to understand different resilience concepts that help an organization cope with today's dynamic business environment.

Who is this training for ?

For whom

People involved in organizational resilience. People involved in business continuity management. Individuals interested in pursuing a career in organizational resilience.

1807
Prerequisites

None

Training objectives

Understand the importance of achieving a heightened state of resilience
Understand the principles that contribute to the resilience of an organization
Understand the concepts, approaches, standards, methods and techniques that enable effective management of organizational resilience strategy

1808

★★★★★

  • SII-361
  • 5 Days (35 Hours)

Description

Who is this training for ?

For whom
1809
Prerequisites

Training objectives

1810

Training program

Introduction
  • The different phases: sources, compilation, binary
  • Interpreter and compiler
  • Do not rewrite everything (libraries, link editing and executables)
Algorithm
  • The "atoms" to express yourself
  • Learn to formulate a treatment
  • Using a pseudo language
  • Examples of 'algorithm well designed, "poorly" designed, and ... wrong!
  • Representation with flowchart
A first program
  • Overview of the development environment
  • A first simple program in Java
  • Compilation and execution
Variables and data types
  • Why type variables?
  • Examples of types (integer, real, characters...)
  • Examples of problems related to types
  • Available operators (+, /, */% ...)
  • The comfort of tables and structures
  • Static and dynamic typing
1811
The “grammar” of a language
  • Program blocks (start...end)
  • Testing an expression (if...then...else...)
  • The loop (while...)
Structuring your program
  • The need to use procedures or functions
  • Conceptual and syntactic differences between the two
  • Passing arguments to a function (prototype, return code)
  • Libraries
  • Do not rewrite what already exists (libraries)
  • Write your own libraries
  • How to use them in others programs
The importance of documentation
  • Good habits to anticipate errors (naming convention)
  • Useful comments
1812
The object approach
  • Object concepts
  • The objectives of the object world
  • Classes and objects
  • Attributes
  • The methods
  • Encapsulation
  • Instantiation
  • Inheritance
  • Translation of object concepts into language
  • Packages and namespaces
  • Classes, methods and their visibility
  • Attributes and their visibility
  • Instantiation, calling methods and reference to variables
Build a solution
  • Analysis and design
  • Understand the customer's needs
  • Know how to imagine a suitable software architecture
  • Imagine the actors of the application
1813
UML
  • Specification
  • When to use UML
  • Use case diagrams
  • Class diagrams
  • Diagrams sequence
  • Using UML in the real world
1814

★★★★★

  • SII-320
  • 5 Days (35 Hours)

Description

Who is this training for ?

For whom
1815
Prerequisites

Training objectives

1816

Training program

PRESENTATION
  • HTML: the language of the Web
  • Historical context
ENVIRONMENT AND STRUCTURE
  • Concept and use of tags
  • The proper use of tags
  • Particularities and pitfalls of HTML
  • The minimum HTML document
FORMATTING THE DOCUMENT
  • Simple text
  • The objects of a document
  • The header of an HTML document
FORMATTING THE TEXT
  • Titles and paragraphs of text
  • Line break control
  • Text formatting, alignment
  • Size, color and font
  • Special characters
  • Comments
  • Other text tags
1817
THE LISTS
  • Numbered, bulleted, nested
  • Definition lists
THE TABLES
  • Table cells and merging cells
  • Managing table size
  • Header and legend
  • Borders
  • Groups of columns and rows
HYPERTEXTS
  • The link tag
  • The different types of links: to another page, within a page, to a website, download...
  • The Target
  • The title attribute
  • The color of the links
  • Links and style sheets
1818
INSERTIONS D'IMAGES
  • Inserting an image
  • The space around an image
  • Aligning an image
  • Background color and image
  • Inserting a link on an image
  • Responsive images
THE FORMS
  • The form declaration
  • Single-line text box
  • Drop-down menu
  • Buttons: radio, checkbox, submit, d 'cancellation, order
  • Forms: hidden, file transfer, password
  • Organizing the elements of a form
META INFORMATION
  • Doctype or DTD
STYLE SHEETS
  • Properties: color, font, margin,...
  • Classes
  • Dynamize a site with CSS
  • Manage positioning
1819
INTRODUCTION TO JAVASCRIPT
  • JavaScript for what?
  • The web client environment
  • The browser, the tools
JAVASCRIPT: THE HEART OF LANGUAGE
  • Syntax
  • Variables, global functions, operators, control structures
  • Functions: definition, arguments, literal functions, functions in the form of data
  • Custom objects and global objects
  • Manipulate tables, dates, character strings
BROWSER OBJECTS
  • The hierarchy of objects
  • The main objects: window, document, location, screen, navigator, form...
  • Manipulating windows
  • Manage timers
INTRODUCTION TO HTML5
  • Context: functioning of a website
  • History and standardization of HTML
  • The new HTML5 vision
  • HTML5 Roadmap
1820
HOW TO USE HTML5 TODAY
  • Know when to choose HTML5
  • Using HTML5 with browsers that don't support it
HTML5 MARKUP
  • Structure of a page
  • Doctype
  • New and obsolete elements
  • HTML5 and CSS3
THE FORMS
  • The form tag
  • Create and use HTML5 forms
AUDIO AND VIDEO
  • Audio and video elements
  • Containers, codecs
  • Compromise for a site with a large audience
API OVERVIEW
  • HTML5 APIs
  • Audio and video
  • Offline website
  • Drag and Drop
DRAW IN HTML
  • Canvas vs SVG
  • Context and accessibility
1821
LA COMMUNICATION EN HTML5
  • Events
  • Sending messages between documents
  • Sending messages by channels
  • Push and WebSockets for more performance
GEOLOCATION
  • Overview
  • User privacy
STORAGE
  • Local storage
  • Session storage
  • SQL Web databases
CSS: STANDARDIZING PROPERTIES
  • Do without images, avoid tricks
  • Rounded corners, drop shadows, transparency, animations
  • Other new features
1822
CSS: LAYOUT AND POSITIONING
  • Overview: clarify the code, avoid multiplication of nested divs
  • Presentation level
  • Layout by pattern
  • Multi-column layout
  • Layout by horizontal or vertical boxes
  • Positioning by grid
  • Other new features
  • CSS for mobiles and tablets
1823

Formation MySQL - Administration

★★★★★

  • SII-300
  • 3 Days (21 Hours)

Description

To become proficient in administering a MySQL database server, hands-on training is recommended. This training will cover aspects of server installation, configuration, InnoDB settings, access rights management, data backup and restoration, as well as production management. Through this hands-on training, you will gain practical expertise in MySQL database administration, and you will be better equipped to effectively handle administration tasks for this type of server. Online resources such as specialized courses and books can also help you improve your knowledge in this area.

Who is this training for ?

For whom

System administrators and database administrators.

1824
Prerequisites

Required knowledge of the SQL language or knowledge equivalent to that provided by the "SQL for MySQL and PostgreSQL" course (Ref. MYP).

Training objectives

  • Breaking down the MySQL database architecture
  • Install the MySQL DBMS
  • Determine the main functionalities of administering a MySQL database
  • Create and manage a database
  • Manage user access
  • Manage database security

1825

Training program

Introduction et installation
  • Versions and license types.
  • Tools mysql, mysqlshow, myphpadmin.
  • Server settings (my.cnf, sql_mode, strict mode...).
  • Startup/stop.
  • Installations (binary, from sources...).
  • Mysqladmin.
  • Installation of MySQL Workbench.
  • Version changes, migration.
Objects of a MySQL database
  • Table types (MyISAM, MEMORY, MERGE...).
  • Modifying the definition of a table.
  • Index.
  • View management.
  • Base information_schema.
1826
Connections, access rights, security
  • User authentication.
  • Structure of MySQL database tables.
  • Management of users and their privileges.
  • Rights on stored views and processing.
  • Using SSL.
Storage engines and plug-ins
  • MyISAM, InnoDB storage engines.
  • InnoDB architecture and configuration.
  • Transactional operation of the InnoDB engine.
  • Table locking.
  • Plug-ins: configuration and startup.
Maintaining a MySQL server
  • Session state (variables,
  • Loading: LOAD DATA, myimport, SELECT INTO OUTFILE, mysqldump.
  • Backup strategies.
  • InnoDB Hot Backup, mysqlbinlog.
  • Backup and recovery incremental.
  • Planning.
1827

PHP 7 training - Web application development

★★★★★

  • SII-299
  • 4 Days (28 Hours)

Description

PHP is a cross-platform programming language that has become a standard on the market. This technology is popular for its ability to facilitate the creation of dynamic websites and e-commerce sites. PHP also makes it possible to better adapt pages to the different versions and browsers available on the market. Additionally, PHP simplifies access to databases, particularly MySQL, which is a free database commonly used in the Open Source world. During this 4-day training, participants will learn how to develop applications with this programming language.

Who is this training for ?

For whom
  • Web developers
  • Webmasters
  • Project managers
1828
Prerequisites

  • Have working knowledge of HTML and at least one programming language

Training objectives

  • Master PHP syntax to develop dynamic websites
  • Learn to create dynamic applications with PHP and MySQL
  • Understand PHP programming best practices
  • Process web forms
  • Manage user sessions
  • Access data from a MySQL database
  • Dynamically create images and graphics

1829

Training program

INTRODUCTION TO PROGRAMMING WITH PHP
  • The possibilities of PHP
  • Search and identify PHP resources
  • Architecture and operation of the PHP platform
  • Strengths and weaknesses of PHP
  • Perspectives of PHP and LAMP in a universe in constant movement
INSTALLATION DE PHP ET MYSQL
  • Installing a Web server
  • The different installation modes
THE BASICS OF PHP
  • Using PHP in HTML files
  • Variables and operators
  • Control structures (if, while, ...)
  • PHP functions
  • User functions
  • File management
FORMS AND USER INTERACTION
  • Creating forms in HTML
  • Retrieving data with PHP
  • Setting up a file upload
  • Setting up a 'a security policy for forms'}
1830
AUTHENTICATION, SESSIONS AND COOKIES
  • Use a cookie variable
  • Use a session variable
  • Use and session security
DATABASES (MYSQL)
  • Architecture and presentation of a Database Management System (DBMS)
  • Reminder of the main SQL commands
  • The characteristics of MySQL
COMMUNICATION ENTRE PHP ET MYSQL
  • Access MySQL with PHP
  • MySQL Error Handling
ADVANCED TECHNIQUES
  • Generation and manipulation of images
  • Creation of graphics (bars, diagrams, pie charts, etc.)
  • Generation of PDF files
  • Security concepts
1831

ISO/CEI 20000 Lead Implementer

★★★★★

  • SII-301
  • 5 Days (35 Hours)

Description

This training is designed to equip you with a mastery of best practices in IT service management systems and to develop your skills in improving IT processes and/or services, efficiency and the overall performance of the organization.

Who is this training for ?

For whom

Managers or consultants involved in IT service management. Specialized advisors wishing to master the implementation of an IT Service Management System. Any person responsible for maintaining compliance with ITMS requirements. Members of an SMSTI team.

1832
Prerequisites

Good knowledge of the ISO/IEC 20000 standard and in-depth knowledge of the principles of its implementation.

Training objectives

Understand the correlation between ISO/IEC 20000-1 and ISO/IEC 20000-2, as well as other standards and regulatory frameworks
Master the concepts, approaches, methods and techniques necessary to implement effectively implement and manage an SMSTI
Know how to interpret the requirements of the ISO/IEC 20000-1 standard in a specific context of the organization
Know how to support an organization in planning, implementation, management, monitoring and maintenance update an SMSTI
Acquire the expertise necessary to advise an organization on the implementation of best practices relating to the IT Service Management System

1833

Training program

Introduction to the ISO/IEC 20000 standard and initialization of an SMSTI
Planning for Implementation of an SMSTI
Implementation of an SMSTI
Monitoring, measurement, continuous improvement and preparation for the SMSTI certification audit
Certification exam
1834

CISA (Certified Information Security Auditor)

★★★★★

  • SII-411
  • 5 Days (35 Hours)

Description

The CISA certification, defined by ISACA®, is widely recognized worldwide as an accreditation in Information Systems Auditing. It demonstrates competence in governance, management and monitoring of IT risks.

Who is this training for ?

For whom

Listener. IT consultants. IT managers. Security managers. IS Directors.

1835
CISA Certified Information Security Auditor,formation maroc Prerequisites
  • General knowledge of IT, security and auditing
  • Basic knowledge in the operation of information systems

Training objectives

Master the analysis of the different areas covered by the exam.
Understand the specific vocabulary and key concepts of the exam.
Practice under the conditions of the test and develop response strategies for the questionnaire.
Prepare adequately to pass the CISA certification exam.

1836

Training program

AREA 1: AUDIT OF INFORMATION SYSTEMS
  • Audit standards for IS
  • Audit risk analysis and internal control
  • Self-assessment of controls for IS
  • Auditing practice for IS
DOMAIN 2: GOVERNANCE AND MANAGEMENT OF INFORMATION SYSTEMS
  • IS governance
  • IS governance strategy
  • Procedures and risk management
  • IS governance practice
  • Audit of governance structure
  • Continuity and contingency planning practices
  • Audit of continuity and contingency systems
AREA 3: ACQUISITION, DESIGN AND IMPLEMENTATION OF IS
  • Systems and infrastructure life cycle management
  • Project management: practices and audit
  • IS development practices
  • Application and system maintenance audit
  • Application controls
1837
DOMAIN 4: OPERATION, MAINTENANCE AND SUPPORT OF INFORMATION SYSTEMS
  • Audit of IS operations
  • Audit of material aspects of IS
  • Audit of IS architectures and networks
AREA 5: PROTECTION OF INFORMATION ASSETS
  • Security management: policy and governance
  • Audit of logical and physical security
  • Audit of network security
  • Audit of nomadic devices
EXAM PREPARATION
  • Preparation for the IT audit certification exam
1838

Become a VMware Specialist (Preparation for VCP-DCV professional certification)

★★★★★

  • SII-275
  • 5 Days (35 Hours)

Description

This intensive training focuses on the installation, configuration and management of VMware vSphere 7 which includes VMware ESXI and VMware vCenter. The training equips participants with the skills and knowledge to administer a vSphere virtualization infrastructure for an organization of any size.

Who is this training for ?

For whom
This training is aimed at system administrators and engineers working in the VMware virtualization environment. It may also be suitable for professionals who have completed equivalent training on an old version of the product (up to version 6).
1839
Prerequisites

Having experience on Microsoft Windows or Linux systems

Training objectives

Describe software-defined Data Center
Introduce vSphere components and their functions in the infrastructure
Add an ESXi host
Manage VMware vCenter Server Appliance
Use a content library as a data store, to store ISOs, models and deploy virtual machines (VMs)
Describe the vCenter Server architecture
Use vCenter Server to manage an ESXi host
Configure and manage a vSphere infrastructure with VMware Host and VMware vSphere clients
Describe virtual networks with standard vSwitches
Configure standard vSwitch policies
Use vCenter Server to manage different host storage types: VMware vSphere VMFS, NFS, iSCSI and RDM
Review Fiber Channel and vSAN features and functions
Manage VMs, templates, clones and snapshots
Manage VMs, templates, clones and snapshots
Migrate VMs with VMware vSphere vMotion
Monitor resource utilization and manage resource pools
Introduce and configure vSphere high availability cluster architecture
Manage vSphere high availability and fault tolerance
Use vSphere replication and data protection to back up and replicate virtual machines
Use Distributed Resource Scheduler (DRS) clusters to improve high availability and optimize performance
Use VMware vSphere Update Manager to apply patches and improve troubleshooting of ESXi hosts, VMs and vCenter Server operation
Identify a methodology to diagnose errors and improve troubleshooting efficiently

1840

Training program

Introduction à vSphere et Software-Defined Data Center
  •  Describe how vSphere integrates with software-defined data center and cloud infrastructure
  •  Explain how vSphere interacts with CPU memory, networking, and storage
  •  Use the vSphere Client to access and manage your vCenter Server system and ESXi hosts
  •  Compare version 14 virtual machine hardware to previous versions
  •  Identify virtual network adapters and describe enhanced VMXNET3
  •  Compare the types of virtual disks provided
  •  Identify the benefits of ESXi Quick Start
Creation of virtual machines (VMs)
  •  Create and delete a virtual machine
  •  Explain the importance of VMware tools
  •  Describe how to import an OVF virtual application template
  •  Manage Vmware tools
  •  Explain OS installation troubleshooting and VMware tools
1841
vCenter Server
  •  Introduce the architecture of vCenter Server
  •  Discuss how to communicate ESXi hosts with vCenter Server
  •  Identify vCenter services, components and modules
  •  Configure the vCenter Server appliance
  •  Use the vSphere client to manage vCenter Server inventory
  •  Describe rules for applying permissions
  •  Create a custom role in vCenter Server
  •  Create a backup schedule
  •  Restore the appliance vCenter Server from backup
  •  Monitor vCenter Server appliance
1842
Configuring and managing virtual networks
  •  Introduce the architecture of vCenter Server
  •  Discuss how to communicate ESXi hosts with vCenter Server
  •  Identify vCenter services, components and modules
  •  Configure the vCenter Server appliance
  •  Use the vSphere client to manage vCenter Server inventory
  •  Describe rules for applying permissions
  •  Create a custom role in vCenter Server
  •  Create a backup schedule
  •  Restore the appliance vCenter Server from backup
  •  Monitor vCenter Server appliance
Configuring and managing virtual storage
  •  Introduce storage protocols and types of storage architectures
  •  Introduce ESXi hosts via iSCSI, NFS, and Fiber Channel storage
  •  Create and manage VMFS and NFS datastores
  •  Describe the new features of VMFS 6.5
  •  Advantages of virtual SAN
  •  Describe the encryption of VM files
1843
Virtual machine management
  •  Use templates and cloning to deploy new VMs
  •  Modify and manage virtual machines
  •  Clone a virtual machine
  •  Update a VM's hardware to version 14
  •  Delete VMs from the vCenter Server inventory and datastore
  •  Customize a new VM via customization of specification files
  •  Improve vSphere vMotion and vSphere Storage vMotion migrations
  •  Create and manage VM snapshots
  •  Create, clone, and export vApps
  •  Create, clone, and export vApps
  •  Introduce the types of content libraries, how to deploy and use them
vSphère DRS
  •  Describe the features and benefits of the vSphere DRS cluster
  •  Create a vSphere DRS cluster
  •  View DRS cluster information
  •  Configure host VM Affinity VMs, DRS groups, and Affinity rules
  •  Remove a host from a DRS cluster
1844
vSphere Update Manager
  •  New vSphere Update Manager architecture, architecture, components and capabilities
  •  Use vSphere Update Manager to manage ESXi, virtual machines and VMware Appliances
  •  Install vSphere Update Manager and the vSphere Update Manager plugin
  •  Create baselines
  •  Use host profiles to manage compliance host configuration
  •  Review the features and functions of the vSphere Update Manager EAM integration
  •  Integrate vSphere Update Manager with vSphere DRS
  •  Scan and fix hosts
1845
vSphere HA and fault tolerance
  •  Explain the vSphere HA architecture
  •  Configure and manage a vSphere HA cluster
  •  Use vSphere HA advanced settings
  •  Reinforce infrastructure or intra-app dependencies during cutover
  •  Describe the “Network Heartbeat” and “Datastore Heartbeat”
  •  Introduce the vSphere fault tolerance features and functions
  •  Make fault tolerance available on virtual machines
  •  Support fault tolerance interoperability with SANs virtual machines
  •  Examine virtual machine fault tolerance enhancements
  •  Introduce the features and functions of vSphere replication
1846

Kafka : Confluent Administration

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

In this three-day training, you will learn how to deploy, operate, and monitor a Kafka cluster using industry best practices, which have been developed by leading Apache Kafka experts.

/p>

Who is this training for ?

For whom

This course is designed for developers and operational teams who are required to deploy, administer and configure a Kafka cluster.

1847
Prerequisites

Participants must have a good knowledge of Linux/Unix, and have basic knowledge of TCP/IP networks.

Knowledge of the Java Virtual Machine (JVM) is useful.

No prior knowledge of Kafka is necessary

Training objectives

  • You will learn how Kafka and the Confluent platform work and their main subsystems
  • You will discover their functionalities and how they interact
  • You will also learn how to set up, administer and configure your cluster

1848

Training program

The Motivations of Apache Kafka
  • The complexity of systems
  • The advent of real-time processing
  • Kafka: "Stream Data Platform"
Kafka Concepts and Fundamentals
  • Kafka Overview
  • Producers
  • Brokers
  • Consumers
  • Using Zookeeper
  • Comparison with traditional message broker systems
Consistency and guarantee of non-loss of data
  • Replication concepts
  • Message publication consistency
  • Shutdown and breakdown of a broker
  • Role of the Broker Controller
  • Kafka (data) log files
  • Offset Management
1849
High Availability (HA)
  • The Kafka reference architecture
  • Brokers
  • ZooKeeper
  • Kafka Connect
  • SchemaRegistry
  • RESTProxy
  • Multi-Data-centers
Manage a Kafka cluster
  • Installation and operation of Kafka
  • Monitoring and supervision of a cluster
  • Basic operations of a cluster
  • Retention and compaction of logs
  • Elasticity of a cluster
1850
Optimize Kafka performance
  • Producer Performance
  • Broker Performance
  • Broker Failure and Recovery Time
  • Consumer Load Distribution
  • Consumer Performance
  • Performance Tests
Secure a Kafka/Zookeeper cluster
  • Network encryption and Authentication via SSL
  • Authentication via SASL
  • Data encryption on disk
  • Securing ZooKeeper, SchemaRegistry and RESTProxy
  • Migrating to a secure cluster
1851
Kafka Connect: Integrate systems with Kafka
  • Motivations for Kafka Connect
  • Types of connectors
  • Implementation of Kafka Connect
  • Deployment modes (standalone/distributed )
  • Connector configuration
  • Deployment considerations
  • Comparison with other systems
1852

Ergonomics of UX/UI Design interfaces

★★★★★

  • SII-299
  • 10 Days (70 Hours)

Description

The UX/UI Design and Interface Ergonomics training is designed to develop the skills of professionals involved in interface design, such as project managers, developers, web designers, marketing managers and UI designers. This certification will allow you to acquire methodological tools for digital ergonomics and user-centered design. Thanks to these skills, you will be able to effectively manage the development or redesign of interfaces, whether software, Web, mobile or tactile.

Who is this training for ?

For whom

The training is intended for teams involved in interface design: designers, web designers, webmasters, developers, project managers, marketing managers, etc.

1853
Prerequisites

Knowledge of IT tools and internet uses, touch and mobile terminals

Training objectives

  • Master user-centered design (UX) and its tools – UX Design training
  • Know the ergonomic principles of the mobile and tactile context – Mobile and Tactile UX Training
  • Acquire the right reflexes to graphically design an interface – Graphical interface design training

1854

Training program

Day 1: Acquire the theoretical foundations of user-centered design (UX).
  • This day is devoted to the key notions of UX, UI, cognitive ergonomics and human-machine interactions. You will discover how to implement a UX methodology and justify its ROI. In the continuity, you understand how the brain functions when it interacts with a graphical interface.
  • SETUP AN ERGONOMIC AUDIT
  • The ergonomic reference criteria are presented, as well as the different heuristics and how to present them effectively. Your personal projects can be audited and shared with other participants to identify areas for improvement.
  • Practical exercise: carry out an ergonomic audit using the heuristics of Bastien and Scapin.
Day 2: Know the different collection and interview methodologies.
  • In this part of the internship, you will learn the different collection methodologies and how to carry them out while avoiding cognitive biases. The analysis of the results and the modeling of the activity, the creation of personas and maps are presented.
  • Practical exercise: create a protocol and conduct an interview.
Day 3: Implement an information architecture methodology.
  • From “Content Strategy” to information architecture, this module explores the organization of the content of a site or an application. You will discover card sorting techniques as well as evaluation of the performance of the tree structure.
  • Know and know how to define interaction models adapted to the user journey.
  • Learn the main principles of design and layout then discover the rules of interaction design to better support the user in their exploration of the interface You will also learn about the concepts of graphics, typography, interface language, color management and the best way to use it. arrange your interfaces (zoning, navigation system, etc.).
  • Practical exercise: design a use case and carry out a “Journey” workshop to define interaction models adapted to task.
Day 4: Develop paper models and dynamic models on the Figma design tool.
  • You create your paper models of your interfaces during practical work, then you animate them using the Figma modeling tool Practical exercise: design paper models then a dynamic model with Figma.
Day 5: Set up a user test to evaluate the usability of your interface
  • You understand the different user testing techniques, good animation practices and analysis of your results. You finalize your models and then have them tested by the other participants as a moderator to identify the areas for improvement: design a test protocol and carry out a user test
Day 6: Know the context of mobile (market and uses).
  • After a state of the art of the market and the uses of the mobile and tactile context, the trainer reviews, based on various examples, the components of a site or a mobile application (functionality, design, technique, originality, etc.). Implement a user-centered design method. In this part of the internship, you will learn the different collection methodologies and more particularly the activity collection, then you will learn how to. define your mobile design strategy.
Day 7: Know the ergonomic criteria and adapt them to mobile
  • Very operational design tools, the ergonomic criteria of Bastien and Scapin are presented and adapted to the mobile context. You will then learn how to design and/or validate the interface design through these criteria, ...
  • Know the constraints, advantages of mobile and the iOS and Android guidelines Learn the advantages, constraints and best practices of mobile and touch design
Day 8: Define an information architecture for your touch project.
  • You will become familiar with information architecture methods for mobile. The different navigation systems are reviewed. The different types of screens and the related best practices are analyzed You will reuse these recommendations in your design project.
  • Design a touch screen interface: zoning and mock-up of navigation, components In this part of the course, the construction of touch screens is discussed: zoning. , types of screens, patterns, ... And many examples of the tablet's advantages and constraints will be presented.
1855
Day 9: Understanding the issue of graphic design
  • In this part, you will be made aware of the importance of design. You will understand how this step fits into an overall interface design approach. You will also discover the two key elements of a graphic design. quality:
  • - The creation of an intuitive interface by developing a visual journey.
  • - The definition of a communication strategy by constructing a brief graphics.
  • Build your graphic track
  • In order to gradually assimilate the theoretical bases, the day is punctuated by practical workshops. During these workshops, your graphic tracks will take shape. By working directly on your personal projects, you will apply these new skills in a real graphic design situation. You will get to grips with professional graphic design tools.
  • The key concepts of graphic design
  • In this part of the course, the layout grid and typography are covered. These two elements constitute the essential basis of graphic design. Many examples of good and bad practices will be presented and you will immerse yourself in the lexical field of designers.
Day 10: Colors and icons
  • Continuing on, you will learn how to manage color palettes. From emotional language to the application of colors on an interface, you will know how to create a harmonious range using proven methods. Icon design is then discussed : symbolism, formalism, etc. These basic elements will allow you to work on the visual hierarchy of your interface.
  • Finalizing the interface
  • Based on your graphic brief and your new knowledge in design, you will use your creativity to finalize the interface. To do this, you will use a professional graphic creation tool. This real-life scenario will allow you to understand the concrete problems that designers encounter during the course. a project.
  • Evaluate an interface
  • You will be asked to give your opinion on the projects of each participant. This last part, generally very appreciated, because it is constructive, will allow you to express yourself. on the projects of others on the one hand, and to take into consideration their comments on the other hand. At the end of this collective evaluation, you will have the necessary perspective to improve your interface. You will benefit from a wealth of experience that will help you better approach GUI projects.
1856

ISTQB Foundation

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

During this training, the learner will acquire the skills to design and manage software testing using effective methods and understanding the different types of testing throughout the software life cycle. At the end of the training, the learner will also be ready to take the ISTQB “Foundation” certification exam.

Who is this training for ?

For whom

Professionals in the software testing activity (project management, project management, services and operations, end users) wishing to rely on a standard and standardized framework.

1857
Prerequisites

Basic knowledge of the software life cycle (information systems, embedded, real time).

Training objectives

  • Acquire the vocabulary of norms and standards relating to Testing activity (ISO and IEEE)
  • Control all the activities of a testing process
  • Know the different levels and types of tests
  • Understand testing techniques and methods
  • Have an overview of the testing profession
  • Prepare for and take the “ISTQB Foundation” certification exam

1858

Training program

Testing Fundamentals
    • What is testing?
    • Why is testing necessary?
    • The 7 general principles of testing
    • Fundamental testing processes
    • The psychology of testing
Testing during the software lifecycle
    • Software development models
    • Testing levels and approaches
    • Types of testing
    • Maintenance testing
Static techniques
    • Static Testing Basics
    • Review Process
Testing techniques
    • Categories of testing techniques
    • Black box testing techniques
    • White box testing techniques
    • Experience-based testing techniques
Test management
    • Organization of tests
    • Estimation and planning of tests
    • Management and control of the progress of tests
    • Configuration management
    • Test and risks
    • Defect management
Test support tools
    • Introduction to testing tools
    • Effective use of tools: potential benefits and risks
Passing the ISTQB Foundation certification exam
  • Advice and revision for the exam
  • Mock exam with commented correction
  • Taking the
1859

ISTQB - Advanced level - Test automation

★★★★★

  • SII-361
  • 3 Days (21 Hours)

Description

The test automation engineer is one who has a broad knowledge of testing in general and a deep understanding of test automation. That is, having sufficient knowledge of the theory and practice of test automation to be able to influence the direction an organization and/or project takes during design, development and maintaining functional test automation solutions

Who is this training for ?

For whom

This training is aimed at software test automation engineers, technical test analysts wishing to build on the knowledge and skills acquired at the foundation level and develop their expertise in the field of test automation.

1860
Prerequisites

Have ISTQB Foundation certification.

Training objectives

Contribute to the development of a plan to integrate automation into the testing process
Evaluate the automation tools and technology best suited to each project and organization
Define an approach and methodology for the creating a test automation architecture (AVA)
Design and develop test automation solutions (new or modified) that meet business needs
Enable the transition from manual testing to an automated approach
Create automated test reports and collect metrics
Manage and optimize testing resources to facilitate maintainability and scalability of test systems.

1861

Training program

Introduction and Objectives of Test Automation
  • Test Automation Objectives
  • Success Factors in Test Automation
Preparing for test automation
  • Test automation requirements for SUT (System Under Test) and its context
  • Evaluation of tools and selection processes
  • Design for testability and automation
The generic architecture of test automation
  • Introduction to the generic test automation architecture
  • Designing the test automation architecture
  • Developing the test automation solution
Deployment risks and contingencies
  • Test Automation Approach Selection and Deployment and Launch Planning
  • Test Automation Implementation
  • Technical Risk Assessment and Strategies discount
  • Test Automation Maintenance
Reporting and test automation metrics
  • Selecting metrics for a test automation solution
  • Implementing metrics
  • Registering the test automation solution and SUT
  • Test Automation Reporting
1862
Transitioning from manual testing to an automated environment
  • Criteria for automation
  • Identify the steps needed to implement automation within a regression test
  • Factors to consider when implementing automation
Check the test automation solution
  • Check the components of an automated test environment
  • Check the automated test suite
Continuous improvement
  • Test Automation Enhancement Options
  • Plan Test Automation Enhancement Implementation
Preparing for and taking the ISTQB Advanced Test Manager exam
  • Advice and revisions for the exam with commented corrections
  • Passing the certification exam
  • Duration: 90 minutes in the form of a 40-question MCQ
  • A score of 65% is required to obtain certification
1863

Installation, Storage and Compute with Windows Server 2016

★★★★★

  • SII-280
  • 5 Days (35 Hours)

Description

During this training, you will learn how to install, migrate and update Windows Server 1016. The objective is focused on planning, configuring and operating a storage solution optimized on Windows Server 2016 .

Who is this training for ?

For whom
This training is aimed at IT professionals who want to acquire the knowledge necessary to plan, implement and operate a Windows Server 2016 storage environment. Then, learn more about the different scenarios and their associated needs in the field of storage technologies. calculation with Windows Server 2016.
1864
Prerequisites

  • Have basic hands-on experience in administering and supporting a Windows Server environment.
  • Have experience in supporting and configuring a Windows Server environment. a Windows client operating system such as Windows 8 or Windows 10.
  • Have the following skills: basic understanding of networking fundamentals, knowledge of AD DS concepts and basic knowledge of hardware of a server.

Training objectives

Prepare and install Nano Server, a Server Core installation, and plan a server upgrade and migration strategy
Describe different storage options, including table partition formats, basic and dynamic disks, systems files, virtual hard drives, and hardware, and explain how to manage disks and volumes
Describe enterprise storage solutions, and choose the appropriate solution for a given situation
Implement and manage storage spaces and data deduplication.
Install and configure Microsoft Hyper-V
Deploy, configure, and manage Windows and Hyper-V containers
Describe Windows Server 2016 high availability and disaster recovery technologies
Plan, create, and manage a failover cluster
Implement failover clustering for Hyper-V virtual machines
Configure and implement Network Load Balancing (NLB) Cluster
Create and manage deployment images
Manage, monitor and maintain virtual machine installations

1865

Training program

Installing, upgrading, and migrating servers and workloads
  • Introducing Windows Server 2016
  • Preparing and installing Nano Server and Server Core
  • Preparing for upgrades and migrations
  • Migrating server roles and workloads
  • Windows Server activation models
Configuring local storage
  • Managing disks in Windows Server 2016
  • Managing volumes in Windows Server 2016
Implementing enterprise storage solutions
  • Overview of direct-attached storage, network-attached storage, and storage area networks
  • Comparing Fibre Channel, iSCSI, and FCoE
  • Understanding iSNS, data centre bridging, and MPIO
  • Configuring sharing in Windows Server 2016
Implementing Storage Spaces and Data Deduplication
  • Implementing Storage Spaces
  • Managing Storage Spaces
  • Implementing Data Deduplication
1866
Installing and configuring Hyper-V and virtual machines
  • Overview of Hyper-V
  • Installing Hyper-V
  • Configuring storage on Hyper-V host servers
  • Configuring networking on Hyper-V host servers
  • Configuring Hyper-V virtual machines
  • Managing Hyper-V virtual machines
Deploying and managing Windows Server and Hyper-V containers
  • Overview of containers in Windows Server 2016
  • Deploying Windows Server and Hyper-V containers
  • Installing, configuring, and managing containers
Overview of high availability and disaster recovery
  • Defining levels of availability
  • Planning high availability and disaster recovery solutions with Hyper-V virtual machines
  • Backing up and restoring the Windows Server 2016 operating system and data by using Windows Server B
  • High availability with failover clustering in Windows Server 2016
1867
Implementing and managing failover clustering
  • Planning a failover cluster
  • Creating and configuring a new failover cluster
  • Maintaining a failover cluster
  • Troubleshooting a failover cluster
  • Implementing site high availability with stretch clustering
Implementing failover clustering for Hyper-V virtual machines
  • Overview of integrating Hyper-V in Windows Server 2016 with failover clustering
  • Implementing and maintaining Hyper-V virtual machines on failover clusters
  • Key features for virtual machines in a clustered environment
Implementing Network Load Balancing
  • Overview of NLB clusters
  • Configuring an NLB cluster
  • Planning an NLB implementation
Creating and managing deployment images
  • Introduction to deployment images
  • Creating and managing deployment images by using MDT
  • Virtual machine environments for different workloads
1868
Managing, monitoring, and maintaining virtual machine installations
  • WSUS overview and deployment options
  • Update management process with WSUS
  • Overview of PowerShell DSC
  • Overview of Windows Server 2016 monitoring tools
  • Using Performance Monitor
  • Monitoring Event Logs
1869

Networks: Fundamentals and Scenarios

★★★★★

  • SII-300
  • 5 Days (35 Hours)

Description

The "Networks: Fundamentals and Simulations" training aims to provide an in-depth understanding of computer networks and how they work.

Who is this training for ?

For whom

Computer maintenance technician, Junior network administrators, System administrators needing to review network fundamentals

1870
Prerequisites

Computer knowledge

Training objectives

Know the main types of networks and the protocols involved

1871

Training program

Discover the fundamentals of networks
  • Presentation of networks
  • The different elements and their roles
  • Users and their needs
  • Architecture and topology aspects
  • Network scopes: PAN, LAN, MAN and WAN
Understanding the OSI Model Structure
  • Organization
  • Encapsulation principle
  • Presentation of the 7 layers
Discover the communication supports
  • Limited and non-limited supports
  • Twisted pairs
  • Optical fibers
  • Wireless links
Identify the different network equipment
  • Repeaters and Hubs
  • Bridges and Switches
  • The Spanning Tree (principle and mode of operation)
  • Routers: roles and interest
  • Discovery of active elements: LLDP and CDP protocols
1872
How wireless networks work
  • WLAN concept
  • SSID
  • Communication methods 802.11, 802.11a;b;g;n
  • Security: WEP, WPA, WPA2, EAP, 802.1x, RADIUS
Discover the Link layer
  • Media access methods: concept of collision
  • Collision management: CSMA/CD and CSMA/CA
  • Concept of MAC address: role and format
  • Unicast, Broadcast and Multicast MAC address
  • Format of an Ethernet frame
  • Port aggregation: 802.3ad standard, LACP and PAGP protocols
Understanding the IP protocol
  • Addresses and address classes
  • Classless addresses: CIDR
  • Unicast, Broadcast and Multicast
  • IP/MAC resolution: protocol ARP
  • The IP protocol
  • Format of an IP packet
1873
Manage subnets
  • Subnet concepts and CIDR notation
  • Subnet aggregation: VLSM
Know the ICMP protocol
  • Principle
  • Structure of an ICMP datagram
  • Usage examples: ping and traceroute
IP Routing
  • Routing overview
  • Routing table
  • Static routing
  • Dynamic routing
  • - Principles
  • - Dynamic routing types
  • - Main protocols (OSPF, EIGRP,ISIS, BGP)
  • MPLS overview
Understanding VLANs
  • Principle of VLANs
  • Types of VLANS
1874
IPv6 Overview
  • IPv4 address space issues
  • Introduction to IPv6
Understanding UDP and TCP protocols
  • Transport layer protocols: concept of port and socket
  • UDP - communication in non-connected mode
  • Structure of a UDP datagram
  • TCP: communication in connected mode
  • Principle of establishing a TCP connection
  • Structure of a TCP segment
  • Sequence numbers, windows and acknowledgments
  • The states of a TCP connection
Understanding the DHCP service
  • DHCP: Dynamic IP configuration
  • Structure of a DHCP negotiation
  • DHCP relay
  • Other services provided by DHCP
1875
Discover the DNS service
  • Name resolution
  • Role and interest of DNS
  • DNS architecture and the different types of DNS servers
  • Iterative and recursive queries
  • The DNS Name Server
  • - Primary Server
  • - Secondary Server
  • - Zone Transfer
  • DNS Records
  • Zone delegation
  • DNS query: nslookup and dig utilities
  • Coupling with DHCP: dynamic updates
Understanding VPNs
  • Principles of a VPN
  • Typology of VPNs
  • Main protocols: GRE, PPTP, L2TP, IPSec, SSL/TSL
1876
Become aware of network security
  • Security issues
  • Filtering router
  • Address/port translator
  • Proxy
  • Firewall
  • DMZ
Set up a simple network of virtual machines
  • Reminder of the basics with simple routing solution
  • Adding static route(s)
  • Attempting to access the Internet: problem, analysis and resolution
Set up a virtual machine network with NAT/PAT
  • Using Private Address Ranges
  • Implementing NAT
  • Installing a Web Server on the LAN
  • Implementing work of PAT
1877
Detection/diagnosis of network operating anomalies
  • Malfunction detection
  • Analysis of the approach
  • Proposal of corrections
  • Implementation of corrections
1878

Azure Data Factory

★★★★★

  • SII-298
  • 4 Days (28 Hours)

Description

Ronald Coase, a British economist and author, once said that you can make data say anything if you torture it enough. This quote takes on its full meaning in today's world where data control has become essential. This is why data engineering, a full-fledged data science discipline, is increasingly mentioned. Its objective is to select, sort, store, organize, test and secure data in order to guarantee their quality, availability and relevance for the teams who use them. This 4-day training allows participants to master data engineering based on Azure platform technologies. It also prepares for the Microsoft Certified Azure Data Engineer Associate certification.

Who is this training for ?

For whom

This training is aimed at data professionals, such as data architects and BI professionals, who want to deepen their knowledge of data engineering and creating analytical solutions using the technologies of the data platform. data available on Microsoft Azure. It is also suitable for data analysts and data scientists who work with analytical solutions based on Microsoft Azure.

1879
Prerequisites

Have followed the training "Microsoft Azure - Fundamental notions" (MSAZ900)< /a> and "Microsoft Azure - Data Fundamentals " (MSDP900)or knowledge of cloud computing and basic data concepts and have hands-on experience with data solutions

Training objectives

  • Explore compute and storage options for data engineering workloads in Azure
  • Master interactive query execution using serverless SQL pools
  • Perform data exploration and transformation in Azure Databricks
  • Understand how to explore, transform, and load data into the data warehouse using Apache Spark
  • Integrate and load data into the data warehouse
  • Transform data with Azure Data Factory or Azure Synapse Pipelines
  • Integrate notebook data with Azure Data Factory or Azure Synapse Pipelines
  • Support hybrid transactional analytical processing (HTAP) with Azure Synapse Link
  • Ensure end-to-end security with Azure Synapse Analytics
  • Perform real-time stream processing with Stream Analytics
  • Create a stream processing solution with Event Hubs and Azure Databricks

1880

Training program

Explore compute and storage options for data engineering workloads
  • Introduction to Azure Synapse Analytics
  • Describe Azure Databricks
  • Introduction to Azure Data Lake storage
  • Describe Delta Lake architecture
  • Working with data streams using Azure Stream Analytics
Run interactive queries using Azure Synapse Analytics serverless SQL pools
  • Explore the capabilities of Azure Synapse Serverless SQL Pools
  • Query data in the lake using Azure Synapse Serverless SQL Pools
  • Create objects metadata in Azure Synapse serverless SQL pools
  • Secure data and manage users in Azure Synapse serverless SQL pools
Data exploration and transformation in Azure Databricks
  • Describe Azure Databricks
  • Read and write data in Azure Databricks
  • Use DataFrames in Azure Databricks
  • Use advanced DataFrames methods in Azure Databricks
Explore, transform, and load data into the data warehouse using Apache Spark
  • Understand big data engineering with Apache Spark in Azure Synapse Analytics
  • Integrate data with Apache Spark notebooks in Azure Synapse Analytics
  • Transform data with DataFrames in Apache Spark pools in Azure Synapse Analytics
  • Integrate SQL and Apache Spark pools in Azure Synapse Analytics
1881
Integrate and load data into the data warehouse
  • Use best practices for loading data into Azure Synapse Analytics
  • Petabyte-scale ingestion with Azure Data Factory
Transform data with Azure Data Factory or Azure Synapse Pipelines
  • Data integration with Azure Data Factory or Azure Synapse Pipelines
  • Code-free transformation at scale with Azure Data Factory or Azure Synapse Pipelines
Transform data with Azure Data Factory or Azure Synapse Pipelines
  • Data integration with Azure Data Factory or Azure Synapse Pipelines
  • Code-free transformation at scale with Azure Data Factory or Azure Synapse Pipelines
Orchestrate data movement and transformation in Azure Synapse Pipelines
  • Orchestrate data movement and transformation in Azure Data Factory
End-to-end security with Azure Synapse Analytics
  • Secure a data warehouse in Azure Synapse Analytics
  • Configure and manage secrets in Azure Key Vault
  • Implement compliance controls for sensitive data
Support for hybrid transactional analytical processing (HTAP) with Azure Synapse Link
  • Design hybrid transactional and analytical processing using Azure Synapse Analytics
  • Configure Azure Synapse Link with Azure Cosmos DB
  • Query Azure Cosmos DB with Apache Spark pools
  • Query Azure Cosmos DB with serverless SQL pools
Real-time stream processing with Stream Analytics
  • Enable reliable messaging for big data applications using Azure Event Hubs
  • Use data streams using Azure Stream Analytics
  • Ingest data streams with Azure Stream Analytics
1882
Build a stream processing solution with Event Hubs and Azure Databricks
  • Process streaming data with Azure Databricks structured streaming
1883

Microsoft Office 365 - User

★★★★★

  • SII-283
  • 2 Days (14 Hours)

Description

The deployment of Office 365 should bring productivity gains to everyone in the company and offer them new facilities with collaborative work tools. But this observation of improvements in functioning in the different services is unfortunately not systematic. Various feedback shows that, if we want the product to be adopted by users, we cannot rely exclusively on the ergonomics and ease of use that it offers. Designed to encourage adoption by participants, this 2-day training will allow them to see the ease of use of Office 365 which will allow them, back in their companies, to better communicate, exchange, share, design... and collaborate.

Who is this training for ?

For whom
Any user or future user of Office 365
1884
Prerequisites
Basic knowledge of Office tools

Training objectives

Take advantage of the “in the Cloud” / “local” complementarity of Office 365
Benefit from the new features of Office 2019
Know how to use the new communication tools
Adopt the new file sharing approach
Know how to collaborate effectively around 'a shared file

1885

Training program

INTRODUCTION TO OFFICE 365
  • The scope of services offered to users
  • Online applications increasingly similar to PC versions
  • Beyond use on the computer (complementary web applications)
  • A unique user experience for ease of use
THE OFFICE 365 PORTAL
  • Access the portal
  • Browse applications
  • Personalize your Online environment
NEW OFFICE 2019
  • New features in Word 2019
  • New features in Excel 2019
  • New features in Outlook 2019
  • New features in PowerPoint 2019
  • New One Note features
  • The mobile version of Office 2019
SKYPE FOR BUSINESS
  • Manage your local contacts
  • Know how to move from an instant conversation to a web conference
  • The mobile version of Skype for Business
1886
TEAMS
  • Introduction
  • Manage your local contacts
  • Exchange as a team
  • Start a conversation
  • Find and use your exchange history
  • The mobile version of Teams
INTERESTING SKYPE INTO OUTLOOK
  • Reply to an email with an instant message
  • Organize a Skype meeting
SHARE AND COLLABORATE EFFECTIVELY
  • One Drive: Introduction
  • Initiate synchronization
  • Manage folders to synchronize
  • Share = invite to come and use
  • Co-editing: work simultaneously on the same document
  • Manage version histories The Mobile version of One Drive
  • Save a copy of the workbook to the hard drive
1887

Microsoft Office 365, administrator

★★★★★

  • SII-284
  • 2 Days (14 Hours)

Description

The Microsoft 365 platform administration center allows you to manage users and licenses, create/administer Exchange Online mailboxes, configure/manage SharePoint sites, and manage Teams/OneDrive teams. This training will give you mastery of the administration center.

Who is this training for ?

For whom
Systems administrators, systems engineers, operators and integrators.
1888
Prerequisites
Basic knowledge of Windows administration. Experience with Microsoft 365 components as a user, including Exchange and SharePoint.

Training objectives

Know the administration possibilities of a Microsoft 365 platform
Manage accounts, synchronize an Active Directory
Manage mailboxes via Exchange Online
Administer SharePoint Online sites
Configure the essential functions of Skype for Business Online
Administer collaborative work under Teams and OneDrive

1889

Training program

Introduction to Microsoft 365
  • Introduction to Microsoft 365. Possible hybridization scenarios.
  • Cloud-side, client-side architecture.
  • Microsoft 365 free trial.
  • Introduction to PowerShell Administer remotely: Azure AD PowerShell.
  • Practical work
Manage users, groups and licenses
  • Manipulate users and groups.
  • Notion of roles. Role assignment.
  • Authentication. Passwords. Licenses.
  • Practical work
Synchronisation AD
  • Tools: IDFix, AD Connect.
  • AD synchronization with Azure AD.
  • Azure Rights Management. Synchronize with ADFS.
  • Practical work
1890
Administration de base Exchange
  • Exchange Online overview.
  • Mail user. Email contacts.
  • Shared mailbox.
  • Messaging mailbox. resources.
  • Anti-spam.
  • Practical work
Administration de base SharePoint
  • SharePoint Online overview.
  • Site collections. Manage users. Manage rights.
  • Access to company data. External access.
  • Manage the term store. Manage the search.
  • Practical work
1891
Basic administration of Skype for Business / Teams and OneDrive
  • Introduction to Skype for Enterprise Online.
  • Set up users. Domain federation.
  • Conference calls.
  • Introduction to Teams and OneDrive .
  • Teams. Adding users.
  • Channel concept, meeting.
  • Share files. Search.
  • Administrative settings.
  • Practical work
Security and tracking
  • Understanding the tracking environment.
  • Retention strategies.
  • Preventing data loss. Content search.
  • Threats . Audit.
  • Practical work
1892

Power BI - Initiation

★★★★★

  • SII-425
  • 2 Days (14 Hours)

Description

The storage of data, whatever their sources and formats (XML, RDBMS, Big Data, Excel, Text File, Web Services, etc.), in a local or external context (Cloud) can only grow. Also, it is natural that increasingly powerful and sophisticated decision support tools are popping up everywhere, including Power BI, the Business Intelligence solution developed by Microsoft, which is becoming more and more essential. In this Power BI Initiation training you will learn to use the product in a complete way according to a progressive educational scenario which will teach you to aggregate data from multiple sources, to transform them if necessary, to carry out more or less complex calculations in particular with the library of DAX (Data Analysis Expressions) functions and operators, to visualize your results with the rich possibilities offered by Microfoft Power BI, to share them securely and finally to analyze the data thanks to the powerful interactive dashboards that you will have built.

Who is this training for ?

For whom
  • This Power BI Initiation training is for any user who needs to use data in a database and create interactive dashboards that can be distributed.
1893
Prerequisites

Training objectives

  • Know how to obtain, model and render data
  • Create interactive dashboards
  • Publish and securely share these dashboards in Microsoft OneDrive and SharePoint workspaces
  • Use Power BI best practices

1894

Training program

Get hold of Power BI Desktop and the Power BI Service
  • General presentation of Power BI
  • Power BI modules
Get the data
  • Connecting to data
  • Data cleaning and transformation
  • Processing data with irregular formatting
Modeling in Power BI
  • Data model and relationships
  • Creation of calculated columns
  • Creation of measures
  • Case of temporal data
  • Time Intelligence functions
  • Creating calculated tables
1895
Creation of restitutions with Power BI
  • Creating a simple rendering
  • Combined graphs
  • Using segments
  • Using maps
  • Tables and matrices
  • Scatterplots
  • Advanced graphics
  • Gauges
  • Color management
  • Improve formatting
  • Creating Interactions between visualizations
  • Manage missing data
  • Manage hierarchies and drill-down
Discover the data
  • Explore data
  • Create and configure a dashboard
  • Ask questions in natural language
  • Create personalized Q&A
1896
Publish and share from Power BI Desktop
  • Publish reports from Power BI Desktop to the Power BI service
  • Print and export dashboards
  • Publish and refresh data
  • Introduction to Power BI Mobile
  • Creating user groups and security
  • Workspaces and applications
  • Using gateways
  • Power BI and OneDrive, Power BI and SharePoint
Licensing
  • Licence gratuite
  • Power Bi Pro
  • Power BI Premium
Introduction to DAX (Data Analysis Expressions)
  • Types of calculations
  • DAX functions
  • Variables in DAX
  • Table relationships and DAX
  • DAX tables and filtering
1897
Our best practices for using Power BI effectively and relevantly
  • Data model optimization
  • Build a readable and attractive report
  • DAX code management
  • Metadata management
  • Temporal data
  • Geolocation
1898

Data Scraping and Manipulation with Python

★★★★★

  • SII-301
  • 4 Days (28 Hours)

Description

Python is known for its ability to retrieve data from varied and heterogeneous sources, making it the ideal choice for accumulating a knowledge base using the scraping technique. This technique consists of extracting targeted information from a series of resources, such as websites or REST APIs.

The Scraping Python training offers to discover how to set up such a program, starting from the creation of a manual crawler and then moving towards more advanced technologies and complete automation of the process.

Who is this training for ?

For whom

This training is aimed at programmers who are already comfortable with Python, already have medium-sized projects under their belt, and wish to implement their own tools to expand the stock of data from which they can draw.< /p>

1899
Prerequisites

To take this Scraping Python course, you must be comfortable with the Python language in its latest version. The participant must be able to create complex scripts independently as well as know how to use the language ecosystem (pip, virtualenv, etc.).

Training objectives

  • Master web data manipulation with Python
  • Understand the technical and ethnic issues of scraping
  • Know the different methods used to retrieve, process and store data
  • Master existing technologies to choose the solution adapted to your acquisition needs

1900

Training program

The basis of batch processing (scraping)
  • Browse the file system
  • Handle encoding properly
  • Read and write files
  • Parse JSON
  • CSV and XML generators
Data browsing on the web
  • Reminder about the HTTP protocol
  • Simple queries with Request
  • Storing data with SQLAlchemy
  • Parsing HTML with Beautiful Soup
Performance issues
  • Threads and GIL
  • Using multiple cores with multiprocessing
  • Asynchronous I/O programming
  • Performance and ethics
  • Using a form of cache: disk, RAM and redis
  • Introduce a random delay
  • The robot.txt file
1901
Professional APIs
  • Authentications and token
  • Anatomy of a REST API
  • Clean retry
  • Manage rate limiting Error management Application logging Example with a handmade Twitter client
  • Manage rate limiting
  • Error management
  • Application logging
  • Example with a handmade twitter client
Industrialize crawling
  • Introduction to the basic mechanics of the framework
  • Using Selenium by hand
  • Using Scrappy and Selenium together
1902

Excel vba programming for finance i

★★★★★

  • SII-287
  • 2 Days (14 Hours)

Description

Who is this training for ?

For whom
1903
Prerequisites

None

Training objectives

Acquire the fundamentals of programming
Know how to develop and maintain personalized solutions independently

1904

Training program

Reminders in Excel
  • Main functions of Excel
  • Absolute and relative references
Discovery of the programming environment
  • Introducing and customizing the Visual Basic editor
  • Record a macro
VBA programming
  • Excel Object Model
  • Variables, Data Types, and Constants
  • Conditional Statements
  • Loops
  • Dialog boxes
  • Error handling
Programming techniques
  • External data import
  • Data tables
  • Statistical analysis/solver
  • Graph generation
  • Good programming practices
1905

Learn Microsoft TEAMS

★★★★★

  • SII-288
  • 2 Days (14 Hours)

Description

Microsoft Teams is a collaborative application that makes it easy to plan, create, share and discuss as a team from a computer, tablet or mobile phone, in a single environment. On a common and customizable platform, it is possible to combine group discussions, videoconference meetings, notes and attachments.

Who is this training for ?

For whom
Project manager, department manager, assistant, anyone with access to Microsoft 365® and wishing to create a Teams team to gain collective efficiency.
1906
Prerequisites
None

Training objectives

Identify the uses and potential of Teams.
Create a Teams team dedicated to a project, a service.
Use communication and sharing tools.
Adapt the collaborative space to the needs of the team.

1907

Training program

1. Why use Teams?
2. How to get started with Teams?
3. How to create a team?
4. How to send a message to the whole team?
5. How to manage a team?
6. How do I start a meeting in a team channel?
7. How to use private chat?
8. How to track conversations and notifications?
9. How do I schedule or participate in private meetings?
10. How to share files?
11. How to create homework (assignments)?
12. How do I review (correct) an assignment?
13. How to integrate applications?
Conclusion
1908

Administration Windows Server 2019

★★★★★

  • SII-370
  • 5 Days (35 Hours)

Description

This five-day training course is aimed at IT professionals who have experience with Windows Server. It is designed to enable them to manage identity, networking, storage, and compute using Windows Server 2019. This training teaches IT professionals the fundamental administration skills needed to deploy and support Windows Server 2019 in most organizations.

Who is this training for ?

For whom
  • System and network administrators wishing to deepen their knowledge and master the Windows Server 2019 environment
  • Knowledge upgrade for administrators to Windows Server 2019
  • Administrators and support technicians on Windows Server 2019
1909
Prerequisites
  • Experience with Active Directory Domain Services concepts and technologies in Windows Server 2012 or Windows Server 2016.
  • Experience and understanding of basic networking technologies, such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP).
  • Experience and understanding of Microsoft Hyper-V and core server virtualization concepts.
  • Knowledge of security best practices.
  • Experience and knowledge of Windows client operating systems, such as Windows 8, Windows 8.1 or Windows 10.
  • Basic knowledge of Windows PowerShell.

Training objectives

Use administrative techniques and tools in Windows Server 2019.
Implement identity services.
Manage network infrastructure services.
Configure file servers and storage.
Manage virtual machines to using Hyper-V virtualization and containers.
Implement high availability and disaster recovery solutions.
Apply security features to protect critical resources.
Configure remote desktop services .
Configure virtual machine-based desktop infrastructure deployment.
Implement remote access and web services.
Implement service monitoring, performance monitoring, and apply problem resolution.
Perform AD and storage related upgrades and migration.

1910

Training program

Architecture et installation
  • Introduction to Windows Server 2019.
  • Overview of new features.
  • What's new in the Windows Server 2019 interface.
  • Modes 'installation of Windows Server 2019.
  • Installation of Windows Server 2019.
  • Practical work
Administrative tools and configuration
  • Administer your environment with Server Manager.
  • Deploying and using Windows Admin Center (WAC).
  • Overview and using Windows System Insights modules.
  • Azure adhesions and interconnections.
  • What's new in RDS.
  • Practical work
1911
Active Directory
  • Authentication silos and strategies.
  • Object management in PowerShell.
  • Installation prerequisites.
  • L 'installation of the Active Directory.
  • The new object management interfaces.
  • The Active Directory Administration Management Center (ADAC).
  • Managed service accounts.
  • Privileged access management (PAM).
  • Practical work
Disks and file systems
  • Storage Migration Services.
  • Resilient File System (ReFS).
  • Configure Storage Spaces in Windows Server 2019.
  • Windows Defender Malware Protection.
  • File and folder security.
  • Practical work
1912
Optimization, performance and troubleshooting
  • Windows Defender Advanced Threat Protection.
  • Performance monitors.
  • Recovery tools.
  • System backups and restores.
1913

Spring training: Developing with the Spring framework

★★★★★

  • SII-298
  • 3 Days (21 Hours)

Description

Spring is currently the most widely used Java framework for developing business applications. It has always offered an alternative to the complexity of Java EE. Its advantages: increase developer productivity, facilitate testing, improve performance, facilitate technology integration.

Spring is built primarily around three key design patterns: inversion of control or dependency injection, aspect-oriented programming and abstraction layers identifying all the needs of an enterprise application (Persistence, Messaging, Security, Tracing, etc.).

This Spring training starts with an in-depth review of the basic concepts of the Spring framework. This essential chapter allows you to demystify the magical aspect of Spring and to understand the underlying mechanisms used in the following chapters. Then, each chapter is devoted to the different software layers of applications currently developed in companies, data persistence, the web layer, security and testing. The auto-configuration mechanisms provided by SpringBoot, the Spring project accelerator, are detailed in each chapter.

Who is this training for ?

For whom

This course is aimed at Java developers wishing to use the Spring framework to facilitate the development and testing of their applications. Also concerned are Java SE / Java EE architects who have to think about the infrastructure of enterprise Java applications.

1914
Prerequisites

Participants must have a good knowledge of Java demonstrated in one or more professional projects. To fully benefit from all the chapters, they must be aware of web issues, data access (persistence) and application testing.

Training objectives

  • Understand the contributions of the Spring framework (IoC, AOP)
  • Know how to set up a productive IDE and good development practices
  • Know how to manage the configuration of an application's properties and components
  • Be able to implement all layers of a business web application (Web/Rest, Service, Data Access, etc
    )
  • Know how to implement security within your Spring development
  • Know how to implement tests with Spring

1915

Training program

Introduction au framework Spring
  • The genesis of the project, its positioning with respect to Java EE
  • The Pivotal Software offer, the use cases of the framework, the 10 commandments of a Spring project
  • IoC and dependency injection: The design pattern at the heart of the framework
  • The types of injections supported by Spring
  • Spring: as a Factory to Bean, lightweight container
  • How to configure the framework: XML, annotations, auto-configuration with Spring Boot
Spring: A lightweight container
  • Browsing the BeanDefinition, BeanFactory and ApplicationContext APIs
  • The life cycle of beans
  • The Environment interface: configuration properties and profiles
  • Other core features: SpEl, Messages, Resource loading
Spring and annotations
  • Configuration via annotations.
  • Component and its different stereotypes
  • Inject dependencies via annotations: Autowired, Resource, Inject
  • The implicit injection by constructor
  • Annotations for profiles, their use case, activation modes
1916
Spring AOP
  • The concepts of AOP, the problems solved by AOP
  • The terminology used: aspect, joinpoint, advice, shortcut, weaving
  • The different types of “advice”: around, before, throws, after
  • What is the support for AOP in Spring?
  • XML configuration, benefits/disadvantages
  • Integration with the AspectJ framework, AOP via annotations
Spring Boot
  • The principle of auto-configuration, application to Java
  • How to get started? Spring Initializ and the available starters
  • A single file: Management of configuration properties
  • Spring Tools Suite IDE Support
1917
Spring Data and data access (JDBC / Hibernate / JPA / NoSQL)
  • The objective of Spring Data, the Repository and CrudRepository abstractions
  • Alternatives for querying domain objects
  • Application to JPA: Spring Data JPA
  • The support classes provided: JdbcTemplate, HibernateTemplate
  • How to manage transactions, the @Transactional annotation
  • The benefits of SpringBoot auto-configuration to configure the DataSource
  • Application to NoSQL: Spring Data MongoDB
  • Query and support class
  • The contributions of SpringBoot auto-configuration, An embedded MongoDB
Spring MVC for web applications
  • Reminders of the MVC architectural pattern, implementation in Spring
  • SpringBoot auto-configuration and its customization with WebMvcConfigurer
  • How to write a Spring controller?
  • Resolution of views, the example of Thymeleaf,
  • Management of locales and themes, handling of exceptions, Error page
1918
Spring MVC pour les APIs RESTFul
  • The specificities of REST controllers
  • Typical configuration: CORS
  • Do not neglect JSON serialization: Customization via annotations from the Jackson library
  • Automatically document your API with SpringDoc and OpenAPI
  • Query a Restful API with the RestTemplate support classes
Spring Security
  • The contributions of SpringSecurity and basic concepts
  • The auto-configuration of SpringBoot, the protection filters
  • The different alternatives for authentication, SecurityContext object
  • Web security via the SpringSecurityFilterChain bean, understand its configuration, know how to debug security
  • GrantedAuthoriry vs Role
  • Implementation: Stateful security or security Stateless?
  • The oAuth2 protocol and the JWT standard
  • Support for oAuth2 in Spring5
  • Protection of the business layer, mechanism and implementation
1919
Spring and testing
  • The contributions of Spring-test, The SpringBoot context
  • The @SpringBootTest annotation, what is the configuration detection mechanism, the resulting use cases
  • Layer-based integration tests with self-configured tests
  • Testing an API secured by SpringSecurity
Deploying Spring applications
  • For Ops: the starter actuator
  • Preparing for production, the build-info objective of the Maven plugin
  • The different packaging formats, support of the Maven or Gradle plugin
  • The SISE as a SpringBoot application service
  • Creating a docker image, typical kubernetes manifest document
1920

Google Kubernetes Engine – Architecting-Cloud

★★★★★

  • SII-299
  • 3 Days (21 Hours)

Description

With this training, you will learn how to deploy and manage containerized applications on Google Kubernetes Engine (GKE). You'll also learn how to use other tools on Google Cloud that interact with GKE deployments. Through extensive hands-on work, you will deploy solution elements: infrastructure components such as pods, containers, deployments and services, as well as networks and application services, and also security management and access, resource management and resource monitoring.

Who is this training for ?

For whom

Cloud Architects, Cloud Administrators and/or SysOps/DevOps professionals or anyone who uses Google Cloud to create new solutions or to integrate systems, application environments, and infrastructure with Google Cloud.

1921
Prerequisites

Have completed the "Google Cloud Platform - Core infrastructure - Fundamentals" course or have equivalent knowledge.

Training objectives

  • Recognize how software containers work
  • Identify the architecture of Kubernetes and Google Cloud
  • Describe how pod networking works in Google Kubernetes Engine
  • Create and manage Kubernetes Engine clusters using Google Cloud Console and gcloud/kubectl commands
  • Launch, restore, and expose jobs in Kubernetes
  • Manage access controls using Kubernetes RBAC and IAM
  • Manage pod security and network policies
  • Use Secrets and ConfigMaps to isolate security credentials and configuration artifacts
  • Describe Google Cloud’s choices for managed storage services
  • Monitor applications running in Google Kubernetes Engine

1922

Training program

Introduction to GCP (Google Cloud Platform)
  • Use the Google Cloud Console
  • Use Cloud Shell
  • Define Cloud Computing
  • Identify Google Cloud Compute Services
  • Understanding regions and zones
  • Understand the hierarchy of Cloud resources
  • Administer Google Cloud resources
Containers and Kubernetes in GCP
  • Create a container using Cloud Build
  • Store a container in Container Registry
  • Understand the relationship between Kubernetes and GKE (Google Kubernetes Engine)
  • Understand how to choose among Google Cloud Compute platforms
Architecture de Kubernetes
  • Understand Kubernetes architecture: pods, namespaces
  • Know the components of the Kubernetes control plane
  • Create container images using from Cloud Build
  • Store container images in Container Registry
  • Create a Kubernetes Engine cluster
1923
Kubernetes Operations
  • Work with the kubectl command
  • Inspect the cluster and pods
  • View console output from a pod
  • Connect to a pod interactively
1924
Deployments, jobs and scaling
  • Deployments
  • Ways to create deployments
  • Services and scalability
  • Updating deployments
  • Updates progressive day
  • Deployments
  • Deployment management
  • Jobs and CronJobs
  • Parallel Jobs
  • CronJobs
  • Cluster scaling
  • Scaling down
  • Node pools
  • Pod placement control
  • Affinity and anti-affinity
  • Example of pod placement
  • Taints and tolerances
  • Implementing software in your cluster
1925
GKE Network
  • Introduction
  • Pod Network
  • Service
  • Searching for Services
  • Service Types and Load Balancers
  • How load balancers work
  • Resource Ingress
  • Container native load balancing
  • Network security
Persistent data and storage
  • Volumes
  • Volume types
  • Persistent volume abstraction
  • Learn more about persistent volumes
  • StatefulSets
  • ConfigMaps
  • Secrets
1926
Access control and security in Kubernetes and Kubernetes Engine
  • Understand Kubernetes authentication and authorization
  • Define RBAC roles and Kubernetes role bindings to access resources in namespaces
  • Determine the Kubernetes RBAC cluster roles and ClusterRole bindings to access resources cluster-wide
  • Define Kubernetes pod security policies
  • Understand the IAM framework
  • Define IAM roles and policies for Kubernetes Engine cluster administration
Logging and Monitoring
  • Use Cloud Monitoring to monitor and manage availability and performance
  • Locate and inspect Kubernetes logs
  • Create probes for wellness checks on applications in production
Using GCP-managed storage services from Kubernetes applications
  • Understand the pros and cons of using a managed storage service versus self-managed containerized storage
  • Allow applications running in GKE to access storage services GCP storage
  • Understand the use cases of Cloud Storage, Cloud SQL, Cloud Spanner, Cloud BigTable, Cloud Firestore and BigQuery, from a Kubernetes application
Logging and Monitoring (continued)
  • CI/CD concepts
  • CI/CD for Google Kubernetes Engine
  • CI/CD examples
  • Manage code application in a source repository that can trigger code changes in a continuous delivery pipeline
1927

Adobe® After Effects, prise en main

★★★★★

  • SII-340
  • 4 Days (28 Hours)

Description

You will learn how to use After Effects software to create, from different digital sources, compositions, graphic animations, special effects, video montages for a website or DVD-type media , CD...You will see how to optimally export your project.

Who is this training for ?

For whom

Computer graphic designers, model makers and anyone wishing to know the basics of video editing and special effects.

1928
Prerequisites

Good knowledge of infographic software. Experience desired.

Training objectives

  • Master the software interface and settings
  • Create keyframe animations
  • Use and combine effects and masks
  • Create titles and text animations
  • Make exports

1929

Training program

L'interface
  • Preferences settings.
  • Project settings.
  • Color workspace.
  • Composition settings.
  • Workspace management.
Composition
  • Importing and interpreting sources.
  • Manipulating layers.
  • Add animations and effects.
  • Previews and Rendering.
Animations
  • Principle of animation by keyframes.
  • Linear interpolations or Béziers.
  • Speed ​​smoothing.
  • Maintaining keyframes.
Masks and covers
  • Create vector masks.
  • Shape interpolation.
  • Caches by approach
1930
Text
  • Text formatting.
  • Character animation.
Effects
  • Effect categories.
  • Effect layer.
  • Effect in one area.
  • Effect using paths.
  • Use a control layer
Projects and Exports
  • Consolidate, Delete, Reduce and Collect.
  • Rendering Media Encoder and After Effects.
1931

Adobe Premiere Pro, video editing and compression

★★★★★

  • SII-422
  • 3 Days (21 Hours)

Description

You will have the knowledge to use Adobe Premiere Pro to create professional-quality video clips. You will have an overview of the video production workflow, from video acquisition to exporting the clip for distribution on different media (web, computer, DVD, tape, etc.).

Who is this training for ?

For whom

Multimedia project managers, Webmasters, journalists, video technicians, all people involved in handling video files.

1932
Prerequisites
  • Basic knowledge of digital creation (digital photo or video editing for the general public).
  • Experience with a consumer photo editing or video editing application desirable.

Training objectives

  • Assimilate the fundamentals of video editing
  • Master video acquisition and source import
  • Compose montages with audio sources and titling module
  • Produce an assembly with joins and clip cuts
  • Export edits to the most popular video formats

1933

Training program

Introducing a Premiere Pro project
  • General workflow.
  • Overview of the hardware required for the video.
  • Customizing the workflow.
  • User preferences and project saves.
Video acquisition, rush import, media organization
  • Notions of video acquisition and source import.
  • Acquisition window. Creation of bins (folders).
  • Media display modes . Storyboard mode.
Logging of sources
  • Presentation of working techniques for reviewing your sources.
  • Source and program windows.
  • Tools for navigating the clips viewed
Editing techniques and tools
  • 2, 3 and 4 point editing.
  • Joints and clip cutting
  • Clip, sequence marks, markers.
Audio and video transitions
  • Application of audio and video transitions.
  • Effects option window.
  • Transitions and default duration.
  • Work area and audio/video renderings.
1934
Audio sources and titling module
  • Audio level adjustment, volume.
  • Track type (mono, stereo, 5.1).
  • Adobe titling window
Freeze frame and clip speed
  • Freeze frame function.
  • Speed ​​of a clip.
  • Time remapping
Voice-over and video export
  • Editing and improving a voice-over.
  • Export and broadcast formats.
1935

Certified EBIOS Risk Manager

★★★★★

  • SII-423
  • 3 Days (21 Hours)

Description

The EBIOS training will allow you to acquire the knowledge and develop the skills necessary to master the concepts and elements of risk management related to all assets relevant to information security using the EBIOS method. Through practical exercises and case studies, you will acquire the knowledge and skills necessary to achieve an optimal assessment of information security risks and to manage risks on time through knowledge of their life cycle. This training fits perfectly into the process of implementing the ISO/IEC 27001 standard.

Who is this training for ?

For whom

People wishing to learn the fundamental concepts of risk management, personnel participating in risk assessment activities according to the EBIOS method, managers wishing to understand risk assessment techniques based on the EBIOS method and managers wishing to master risk assessment techniques analysis and communication of risk assessment results according to the EBIOS method.

1936
Prerequisites

None

Training objectives

  • Understand the concepts and fundamental principles relating to risk management according to the EBIOS method
  • Understand the steps of the EBIOS method in order to continue the completion of studies (pilot, control, reframe) as a project manager
  • Understand and explain the results of an EBIOS study and its key objectives
  • Acquire the skills necessary to conduct an EBIOS study
  • Acquire the skills necessary to manage the security risks of information systems belonging to an organization
  • Develop the skills needed to analyze and communicate the results of an EBIOS study

1937

Training program

Jour 1
  • Objectives and structure of the course
  • Introduction to the EBIOS method
  • Workshop 1
  • Workshop 2
Jour 2
  • Workshop 3 “Strategic scenarios”
  • Workshop 4 “Operational scenarios”
  • Workshop 5 “Risk treatment”
  • Certification and closing of the training
Jour 3
  • Preparation and final exam
1938

Master SharePoint: Advanced configuration and administration

★★★★★

  • SII-364
  • 2 Days ( Hours)

Description

Personalize your SharePoint sites with new display techniques for lists and columns. Optimize administration and guarantee the consistency of spaces by exploiting the power of scripts.

Who is this training for ?

For whom

Editorial managers, MOA project managers, contributors in charge of running and developing a SharePoint Online portal, SharePoint Online site managers on a company intranet.

1939
Prerequisites

Good knowledge of using SharePoint Online sites.

Training objectives

Understand the main administration functions of SharePoint.
Personalize and organize modern SharePoint spaces.
Design personalized displays for modern displays.
Master security best practices.
Use the links between Teams and SharePoint.< /p>

1940

Training program

Administration du site SharePoint
  • Hub sites and organization of collaborative spaces.
  • Organization of SharePoint spaces.
  • The Microsoft 365 group and the impacts.
  • Work practice.
Customizing the Microsoft 365 tenant and SharePoint spaces
  • Organization settings.
  • Customizing login screens.
  • Designing themes for SharePoint.
  • Hands-on work.
Management of spaces, pages and news
  • The organization of hub sites.
  • Mechanisms for linking a site to a hub.
  • Practical work.
Advanced customization of lists and columns
  • Formatting lists and customizing the display.
  • Formatting columns according to rules.
  • Design scenarios.
  • Practical work.
1941
Implementation of script and site design
  • How site designs work.
  • The possibilities for using site designs.
  • Script designs and choosing scope.
  • Practical work.
Access security management
  • Microsoft 365 group-based security.
  • Security for modern SharePoint sites.
  • Scenario for creating security levels.
  • Practical work.
Deploying SharePoint applications
  • Establishment of an application catalog.
  • Application deployment mechanisms.
  • Types of applications and uses.
  • Practical work.
SharePoint links with Teams
  • Presentation and uses of Teams.
  • Links between SharePoint and Teams.
  • Adding applications for Teams.
  • Practical work.
1942

Advanced symfony framework

★★★★★

  • SII-369
  • 3 Days (21 Hours)

Description

Symfony is an open-source PHP MVC framework favoring component reuse, convention over configuration, and supported by an active community to simplify web development. During this training, you will learn how to enrich your Symfony applications using its advanced features from dependency injection to asynchronous management, including translation, deployment and monitoring of applications.

Who is this training for ?

For whom

This advanced training is aimed at developers already using Symfony regularly, wishing to explore the in-depth features of this framework

1943
Prerequisites
  • Web development experience with Symfony
  • An environment capable of using Docker (Linux, OSX or Windows with WSL2)

Training objectives

  • use ORM tools
  • carry out asynchronous processing
  • instrument your application to monitor its status and performance
  • package an application to deploy it
  • know the additional libraries to extend an application
  • decouple the code from the framework

1944

Training program

Symfony, what's new?
  • Application overview
Dependency injection
  • Customize dependency injection based on environment
  • Inject dependencies into your Symfony services using setters and parameters
Make your application modular
  • Revisit the notion of interface
  • Create easily replaceable services
Doctrine
  • Discover `Doctrine Query Language` (DQL) to interact with the database and beyond SQL
  • Understand the life cycle of entities and events in order to react to changes in entities
  • Going beyond auto-increments in ID generation
  • Cleaning up database migrations in Symfony
Cache with Symfony
  • Use `reverse proxy` to improve performance
  • Manage cache to optimize response times
Advanced Branch
  • Reminders about Twig, Symfony's templating engine
  • Discover how to use Twig functions and filters to manipulate data in your templates
  • Create custom extensions to extend the functionality of Twig
1945
Design CLI commands
  • Design commands with options and arguments
  • Interaction with the console
  • Format the display
  • Use routing and templates outside the HTTP context
Design an API with APIPlatform: introduction
  • Generate an API
  • Go further in customization with APIPlatform extension points
  • Don't forget CORS (Cross-Origin Resource Sharing)
Asynchronous management
  • Optimize asynchronous tasks using `messenger` and `queues`
  • Configure transports to administer asynchronous messages • Send notifications
Translate your application
  • Explore the basics of translation to make an application multilingual
  • Extract and manage translated text strings
  • Use external providers to delegate translations
Deploy a Symfony application
  • Deploy a Symfony application to an online service (Platform.sh, CleverCloud)
  • Deploy a Symfony application as a Docker image
Monitor its application
  • Configure the logs of your Symfony application
  • Monitor performance with Blackfire
  • Go further in log management with Sentry, log aggregators
1946

CMMS: OPERATING A MAINTENANCE MANAGEMENT TOOL

★★★★★

  • SII-367
  • 1 Days (7 Hours)

Description

In this training module, the trainee becomes familiar with the CMMS environment by using it step by step through a case study.

Who is this training for ?

For whom
  • Maintenance technician
  • Methods technician
1947
Prerequisites

Knowledge of the functions of an industrial company.

Training objectives

Master the structure of a CMMS.
Take control of a CMMS.
Analyze the need to set up a CMMS.

1948

Training program

Identify the main functions of a CMMS
  • The environment of a CMMS
  • The tree structure
  • Human and material resources
Set up a relevant and personalized dashboard
  • The choice and relevance of indicators
  • The presentation and formatting of indicators
Manage maintenance activity with the CMMS tool
  • Updating the maintenance plan
  • Intervention history
  • resource tracking
Identify the benefits and limits of a CMMS
1949

Fortinet Network Security Associate (NSE4)

★★★★★

  • SII-429
  • 5 Days (35 Hours)

Description

During this training, you will learn how to master the core UTM features of FortiGate devices. You will work directly on equipment available through our dedicated training environment.

Through hands-on exercises, you will configure firewall policies, set up IPsec VPN tunnels and SSL VPN access. You will also implement malware protection, create URL filtering profiles, and manage user authentication through a captive portal.

Who is this training for ?

For whom
  • Network engineers/administrators and technicians.
1950
Prerequisites

Training objectives

  • Prepare effectively for the Fortinet NSE4 certification exam (FortiGate I and II)
  • Understand and describe the core UTM features of FortiGate devices
  • Implement user authentication through firewall policies
  • Deploy an IPsec VPN tunnel between two FortiGate appliances
  • Analyze logs and generate meaningful reports

1951

Training program

Fortigate UTM
  • Equipment administration, account and authentication.
  • Fortigate as DHCP server, DNS server.
  • Configuration file and firmware upgrade.
  • Antivirus: antiviral filter of web flows (HTTP, HTTPS, FTP) and messaging (SMTP, SMTPS, IMAP, IMAPS, POP3, POP3S).
  • Web filtering.
  • Applicative IPS. Application control.
  • DoS protection (Denial of Service).
Le firewall
  • Security rules.
  • Workstation control.
  • Log and analysis.
  • NAT, IP address translation .
  • Traffic inspection.
  • Security rules diagnosis.
1952
The proxy
  • Proxy authentication and authentication methods.
  • Two-factor authentication.
  • Authentication types and rules.
  • Users and groups .
  • User supervision.
VPN SSL et IPSec
  • VPN topologies, understanding Fortigate SSL VPN.
  • SSL VPN options and security.
  • Configuring SSL VPN, IPSec VPN.
  • IPSec VPN Monitoring.
  • VPN Dialup, redundant.
Logging and Monitoring
  • Understanding the structure of Logs.
  • Navigation in Logs.
  • Email Alerts and Logs settings.
  • Monitoring and storing Logs .
Certificates and cryptography
  • Digital certificates.
  • SSL content inspection.
1953
High Availability (HA)
  • Synchronization between devices.
  • Clustering options.
Diagnostic tools
  • Le diagnostic du HA.
  • Diagnotics et Troubleshooting.
1954

Fortinet Advanced Network Security Training (NSE7)

★★★★★

  • SII-369
  • 3 Days (21 Hours)

Description

During this training Advanced Fortinet Network Security (NSE7) , you will learn how to implement, diagnose, and centrally manage an infrastructure composed of multiple FortiGates . This official Fortinet training also prepares you for 3 days for NSE7 certification - Fortinet Enterprise Firewall.

Who is this training for ?

For whom

This course is aimed at computer network security professionals involved in the design, administration, and maintenance of a corporate infrastructure protected via FortiGates. It also targets those who have in-depth knowledge of network security, and experience operating FortiGates, FortiAnalyzer, and FortiManager.

1955
Prerequisites
  • To follow this course in good conditions, you are required to have certain knowledge of network protocols and network security concepts.
  • It is mandatory to have followed the fortigate NSE4 training

Training objectives

  • Integrate FortiManager, FortiAnalyzer, and multiple FortiGates as part of the Fortinet Security Fabric
  • Centralize the management and analysis of network security events
  • Optimize the use of FortiGates resources
  • Diagnose and monitor user traffic via FortiGate debug tools
  • Diagnose issues with Keep mode, high CPU usage, firewall rules, session helpers, IPsec, FortiGuard, content inspection, routing, and high availability
  • Strengthen the company’s services
  • Simultaneously deploy IPsec tunnels on multiple sites, via the FortiManager VPN console
  • Configure ADVPN to enable on-demand tunnels between different sites
  • Combining OSPF and BGP to route enterprise traffic

1956

Training program

La Security Fabric
L'architecture FortiOS
System diagnostics
Tracking sessions and network traffic
Routing
FortiGuard
Centralized management
OSPF
Web filtering
IPS
BGP
IPSEC
ADVPN
1957

ASP.NET training, web development

★★★★★

  • SII-391
  • 10 Days (50 Hours)

Description

This course will teach you how to use techniques and best practices for building Internet/Intranet applications with ASP.NET Web Forms in the .NET environment with Visual Studio using C# or VBNet. You will also learn how to connect your applications to different types of databases.

Who is this training for ?

For whom

IT professionals wishing to develop Internet/Intranet applications using .NET technologies with the Visual Studio environment.

1958
Prerequisites

Good knowledge of C# or VB, NET programming. Basic knowledge of client-side web technologies (HTML, JavaScript).

Training objectives

Understand how ASP.NET pages work
Acquire Web development skills with ASP.NET
Master the syntax of Web development with the C# language (or VBNet)
Use the Visual Studio integrated development environment
Know how to define basic security management of web applications

1959

Training program

Introduction and reminders
  • Reminders of concepts related to the Internet/Intranet and .NET technologies.
  • The architecture of an Internet/Intranet application, reminder of HTTP methods.
  • .NET Technologies. Web application in .NET.
  • The tools integrated into Visual Studio.
  • Practical work: Using Visual Studio to create a site, creating a data entry form.
How ASP.NET pages work
  • Principle of ASP.NET pages, life cycle.
  • Using WebForms server controls. Integration into ASPX pages with Visual Studio.
  • Persistence of the state of server controls with ViewState.
  • Management of application data persistence: Session, Cache, Application, Cookies.
  • Characteristic members of the Page, HttpRequest, HttpResponse and HttpServerUtility classes.
  • Usage and limitations of QueryString.
  • Implementation of CrossPagePostBack.
  • Handling events in ASP.NET pages and lifecycle: Load, UnLoad , PreRender...
  • Application event management: global.asax file, important events, usage.
  • Structuring a Web application with VS (data separation/ code/presentation, special folders, resources, etc.)
  • Practical work: Writing the first ASP.NET pages based on standard server controls (lists, buttons, etc.) and handling events. implementation of the mechanisms necessary for professional applications (session, cookie, etc.).
1960
Server Controls
  • Use of server controls for creating active pages on the client and server side.
  • Integration of HTML server controls (HtmlInputText, HtmlTable...) with JavaScript/jQuery client scripts.
  • Container controls: Panel, MultiView, Wizard...
  • Rich controls: Calendar, AdRotator, FileUpload...
  • Validation controls, validation groups and unobtrusive validation of ASP.NET.
  • Practical work: Use of server controls to make a page dynamic, on the client side and on the server side Implementation of validation controls on the client side and server side. with Wizard controls. Example of the FileUpload control... Implementing Ajax with UpdatePanel.
Designing the structure of a website
  • User controls for structuring pages.
  • Layout a site using MasterPages.
  • Roles of special folders (App_Code, App_Data , App_Themes, etc.).
  • Using CSS style sheets and themes.
  • The NuGet package manager.
  • Setting up a navigation system with SiteMap and SiteMapPath, TreeView and Menu.
  • Practical work: Example of creating an e-commerce application, carrying out user control and using master pages.
1961
Data access
  • Tour of the different means of accessing data with ASP.Net WebForms: Entity Framework, ADO.NET and TableAdapters.
  • Mechanisms for accessing a database: connection, SQL statement, stored procedure, reading.
  • DataBinding mechanism.
  • Using controls linked to a data source: XmlDataSource, GridView (sorting and pagination).
  • Show a Master/Detail view between a GridView/ListView control and the DetailsView, FormView controls.
  • Templates Principles.
  • ASP.NET Model binding.
  • Practical work: Using DataSource controls (SqlDataSource, EntityDataSource, ...), GridView, ListView and DetailsView to present data.
Security management
  • Types of attacks (SQL injection, spoofing, repudiation, etc.).
  • Means to prevent attacks.
  • Application control of access and rights.
  • Security management by the system.
  • Security management by the application.
  • Practical work: Implementation of security restrictions access to a site.
1962
Configuration and deployment
  • Exception handling.
  • Role and format of the Web.config file.
  • Saving application settings.
  • Configuring session management.
  • Release mode.
  • Publishing the application.
  • Practical work: Publication of an application.
Using web services
  • The principles of Web services.
  • Architecture, XML/SOAP/JSON communication, WSDL metadata.
  • Calling a Web service from of an HTTP request and a proxy.
  • Practical work: Demonstration of a simple Web Service (search in a database) and querying via ASP.NET and a proxy.
1963

Formation JavaScript

★★★★★

  • SII-392
  • 5 Days (25 Hours)

Description

This training allows you to acquire all the fundamentals of modern JavaScript to be independent.

Who is this training for ?

For whom

This JavaScript training is aimed at developers who already know another language (PHP, Java, C#, etc.) or at least the basics of programming (via jQuery for example).

It can be accessible to integrators, graphic designers and programming beginners as long as you prepare for algorithms before the training.

1964
Prerequisites

knowledge of web language

Training objectives

Master modern JavaScript: ES6+, the new standard
Follow best practices (compatibility, quality, performance)
Master object programming in JavaScript.
Know how to use and create reusable components (which replace jQuery plugins)
Understand today’s needs to know how to choose the right tools and frameworks

1965

Training program

JavaScript best practices
  • After having put the roles of JavaScript in context, we take in hand the right tools to work efficiently, and we immediately put in place good practices.
  • Compatibility: the point on the standard and current browsers
  • Package management: npm
  • Console and debugger
  • Coding conventions (eslint…)
What's new in ECMAScript 6 (ES6+)
  • We then take a look at the new features of the latest JavaScript standard.
  • Constants and local scope to a block
  • New strings: template literals
  • Objects: new syntax
  • Set and Map: new collections
  • Default default values ​​for parameters, rest
  • Spread operator
  • Arrow functions
  • Optional chaining and nullish coalescing operators
  • Destructuring
1966
DOM and events
  • We then move on to the main role of JavaScript: manipulating and animating the page following an action by the user. You will be surprised to discover that today jQuery is no longer necessary, JavaScript native has improved and simplified.
  • Html/CSS handling: querySelectorAll, classList…
  • Interaction management: addEventListener…
  • Transitions for animations
  • DOM4: new features
AJAX and asynchrony
  • Managing asynchronous processing, notably AJAX, is one of the great difficulties of JavaScript, which makes it more complicated than a language like PHP. New APIs are available to simplify this.
  • Promise ES6
  • API fetch & JSON
  • Asynchronous functions
TypeScript
  • In an application, the slightest error can mean a crash. JavaScript being too permissive by default, we must move towards static typing. We explain why TypeScript in a dedicated article, and we guarantee that not only will you love it, but you won't be able to do without it.
  • JSDoc: standardized documentation
  • TypeScript: static typing
  • Support and typings
1967
Object Oriented Programming in ES6
  • ES6 makes it easy to get started with object-oriented programming, with the same syntax as in other languages ​​(PHP, Java, C#, etc.).
  • Classes and inheritance
  • Context management
  • Getters / setters
  • Static methods
  • Private / public
  • Abstract
  • Interfaces
  • Modules
Production implementation: compatibility and performance
  • There are now a lot of things to manage when going into production, so that your scripts load quickly. Fortunately, the tools have become simpler and more unified.
  • Compatibility : polyfills + transpilation (babel and TypeScript)
  • Bundle and compression: webpack
  • Npm scripts to automate
  • HTTP/2
1968
Web Components
  • This is the extension of object-oriented programming applied to a web page. You can now create real web modules. All current frameworks (Angular, React, etc.) work around this component principle, and this is also possible in native JavaScript.
  • Custom elements
  • Shadow DOM