We may earn an affiliate commission when you visit our partners.
ng-conf

In this quick Enterprise NG conference session, Yvonne Allen talks about the fun parts of Nx.

In this quick Enterprise NG conference session, Yvonne Allen talks about the fun parts of Nx.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Nx, the Fun Bits

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Delves into Nx, a prevalent tool in the industry for organizing and scaling Angular applications
Taught by Yvonne Allen, a recognized expert in Angular development
Examines the enjoyable aspects of Nx, which can make the learning process more engaging

Save this course

Save Hands-On Security with AWS Security Hub to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Hands-On Security with AWS Security Hub with these activities:
Follow Nx Tutorials
Deepen your understanding of Nx by following guided tutorials.
Show steps
  • Find Nx tutorials online or in the Nx documentation
  • Follow the steps in the tutorial
  • Complete the exercises
Nx Code Challenges
Test your understanding of Nx concepts by solving code challenges.
Show steps
  • Find Nx code challenges online
  • Attempt to solve the challenges
  • Review your solutions
  • Seek help if needed
Join an Nx Study Group
Connect with other Nx learners and discuss the fun parts of Nx.
Show steps
  • Find an Nx study group online or in your local area
  • Attend study group meetings
  • Participate in discussions
  • Share your knowledge
Four other activities
Expand to see all activities and additional details
Show all seven activities
Build a Small Nx Project
Apply your Nx skills by building a small project.
Show steps
  • Plan your project
  • Set up your Nx workspace
  • Implement your project
  • Test and debug your project
  • Deploy your project
Participate in Nx Hackathons or Contests
Challenge yourself and test your Nx skills by participating in hackathons or contests.
Show steps
  • Find an Nx hackathon or contest
  • Form a team (optional)
  • Develop your project
  • Submit your project
Write an Nx Blog Post or Article
Share your Nx knowledge with others by creating a blog post or article.
Show steps
  • Choose a topic
  • Research your topic
  • Write your content
  • Edit and proofread your content
  • Publish your content
Contribute to Nx Open Source Projects
Give back to the Nx community by contributing to open source projects.
Show steps
  • Find an Nx open source project
  • Identify an issue or feature to work on
  • Fork the project
  • Implement your changes
  • Submit a pull request

Career center

Learners who complete Hands-On Security with AWS Security Hub will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer
The Chief Information Security Officer, or CISO, is a senior-level executive responsible for the development and implementation of an organization's information security strategy. As the head of security, CISOs play a vital role in protecting corporate data, systems, and networks. Their duties include managing risk, ensuring compliance, and overseeing security operations.
Security Architect
Security Architects design, implement, and maintain security systems. They analyze and assess risks, develop security policies and procedures, and implement security technologies. Security Architects use their deep understanding of system architecture to secure enterprise networks and data.
Security Consultant
Security Consultants work with organizations to help them identify and manage security risks. They assess an organization's security posture, develop security plans and policies, and provide guidance on security best practices.
Penetration Tester
Penetration Testers simulate attacks on computer systems to identify vulnerabilities that could be exploited by malicious actors. Using their knowledge of security tools and techniques, Penetration Testers help organizations improve their security posture.
Security Analyst
Security Analysts are responsible for monitoring security systems, investigating security incidents, and developing security countermeasures. In this role, professionals analyze security data, identify and mitigate threats, and implement security measures to protect an organization's networks and data.
Security Engineer
Security Engineers design, implement, and manage security solutions. They work with system administrators to ensure that security measures are integrated into the organization's IT infrastructure. Security Engineers also monitor security systems and investigate security incidents.
Information Security Manager
Information Security Managers are responsible for developing and implementing an organization's information security program. They oversee security operations, manage security risks, and ensure compliance with security regulations.
Cybersecurity Analyst
Cybersecurity Analysts protect computer networks, systems, and data from cyberattacks. They monitor security systems, analyze security data, and respond to security incidents. Cybersecurity Analysts also develop and implement security measures to safeguard against cyber threats.
Security Researcher
Security Researchers identify and exploit security vulnerabilities in computer systems and networks. They use their knowledge of security tools and techniques to develop new security measures and countermeasures. Security Researchers play a vital role in helping organizations stay ahead of emerging security threats.
Forensic Analyst
Forensic Analysts investigate and analyze computer systems, data, and networks to identify evidence of security breaches. They use their knowledge of digital forensics tools and techniques to assist law enforcement and legal teams in investigating cybercrimes.
Digital Forensics Analyst
Digital Forensics Analysts investigate and analyze digital evidence, including computer systems, data, and networks, to identify and preserve evidence of crimes. They use their knowledge of digital forensics tools and techniques to assist law enforcement and legal teams in investigating cybercrimes.
Cloud Security Engineer
Cloud Security Engineers design and implement security solutions for cloud computing environments. They assess cloud security risks, develop cloud security policies, and implement cloud security technologies. Cloud Security Engineers ensure that cloud-based applications and data are protected from security breaches.
Data Security Analyst
Data Security Analysts protect data from unauthorized access, use, or disclosure. They develop and implement data security policies and procedures, conduct security audits, and monitor security systems.
Data Privacy Analyst
Data Privacy Analysts help organizations comply with data privacy laws and regulations. They develop and implement data privacy policies, conduct privacy audits, and advise on data privacy best practices.
Compliance Analyst
Compliance Analysts help organizations comply with laws and regulations. They review policies and procedures, audit operations, and report on compliance. Compliance Analysts ensure that organizations are operating in accordance with all applicable laws and regulations.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Hands-On Security with AWS Security Hub.
This comprehensive textbook provides a holistic view of security engineering principles and practices. It covers topics such as risk assessment, threat modeling, and security controls, which complement the course's focus on AWS-specific security tools and techniques.
Provides a structured approach to incident response planning, preparation, and execution. It covers topics such as incident detection, containment, analysis, and remediation, enhancing the course's focus on security incident handling in AWS environments.
This thought-provoking book explores the ethical implications of data collection and surveillance in the digital age. It offers insights into the privacy risks associated with cloud computing and emphasizes the importance of protecting personal data.
This comprehensive textbook provides a thorough foundation in cloud computing concepts, technologies, and architectures. It offers insights into cloud deployment models, service models, and the benefits and challenges of cloud adoption, providing context for the course's focus on AWS Security Hub.
Provides insights into the human element of security and the techniques used by attackers to exploit vulnerabilities. It emphasizes the importance of understanding social engineering tactics and implementing effective security awareness programs.
Provides a comprehensive overview of software security, covering topics such as threat modeling, secure coding practices, and security testing. It valuable resource for anyone looking to understand the principles of secure software development.
This document provides a comprehensive overview of cloud security, covering topics such as cloud security architecture, security controls, and threat mitigation. It valuable resource for anyone looking to understand the security challenges of cloud computing.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Hands-On Security with AWS Security Hub.
The IT Ops Sessions: 5G Enablement for the Enterprise
Most relevant
The IT Ops Sessions: Enhancing SASE with SD-WAN Security
Angular Monorepos with Nx
Building a Hybrid Multicloud Practice
The IT Ops Sessions: Sustainability in Data Centers
The IT Ops Sessions: Reducing IT Energy Consumption
The IT Ops Sessions: Performance Troubleshooting with...
The IT Ops Sessions: Why Some Companies Are Moving OUT of...
The IT Ops Sessions: How Today's Big Tech Trends Impact...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser