All Access IT Training - 1 Year - ITU Online
ON SALE 54% OFF

All Access IT Training – 1 Year

The Annual All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our Annual All-Access program.

Included In This Course

Included In This Course

Total Hours
2,627 Training Hours
All Access IT Training – 1 Year
13,409 On-demand Videos
Closed Caption

Closed Captions

Course Topics
2,049  Topics
Prep Questions
20,451 Prep Questions
All Access IT Training – 1 Year

Certificate of Completion

Course Description

Our One Year All Access Library Includes

  • Over 225+ courses
  • Over 2,500 hours of video content
  • Hands On Practice Activities
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • 24/7/365 On Demand Access For 1 Year
  • Industry Leading Certified Instructors
  • Certificate of Completion For Each Course You Finish

Access our extensive library of over 225 courses and 2,500 hours of instructional videos, taught by our instructors who are industry certified and have over 10+ years of experience in the related field. Content can be accessed anytime to match your busy schedule.

As a 1 Year Unlimited Library All Access subscriber, you will have access to all your training material 24 hours a day, 7 days a week. You can learn at your own pace, and go back to review topics as many times as you need. Plus, our 1 Year All Access Pass includes full access to our entire course library, so you can explore new courses and topics as you continue to grow and develop your skills.

The course material is continuously updated to reflect the latest industry changes. You will have access to all new courses and updates for as long as you remain a subscriber.

Your success is our top priority and we take our responsibility as a partner in your success very seriously. Our students have a 98% first time pass rate on major certification exams.

As technology changes, ITU is focused on delivering new and updated content so as technology changes, you always have access to up-skilling your knowledge through our online training. Looking for the same great training for a team? Be sure to look at our Team Training Packages that offer even greater value for multi-user licenses.

No matter your position in the IT industry, we have something for you. Covering all the best and most widely accepted major disciplines. It adds up to thousands of hours of high-quality online-focused IT training. You can trust ITU to give you an edge in the industry.

ITU is also focused on staying up-to-date. We have a team of instructional designers that are always working on new courses and updates to existing ones. As technology changes, we want to make sure our students are getting the most relevant and useful information possible.

The bottom line: an annual subscription to ITU Online Training is one of the best investments you can make in your professional development. And, since it’s a subscription, you always have access to the latest courses and future course releases at no extra charge. So, why wait? Get started today!

Join the thousands of students who have already benefited from our All Access Library Program!

P.S. – If you’re not sure which course is right for you, our team can help! Just reach out to us at support@ituonline.com.When you sign up for our 1 Year Unlimited Online Access, you’ll get access to our exclusive IT certification training videos that will help you prep for your exams. Plus, you’ll get access to all of our current courses and future course releases during your 1 Year access period at no extra charge. We want you to succeed and we are here for you! You’ll also get downloadable assets from your courses, so you can keep them forever and reference them anytime you need them.

Sign up today and get unlimited access to everything ITU has to offer!

The Ultimate in IT Training For Leading Technologies

No matter your position in the IT industry, we have something for you. From cloud and data center operations to networking and cybersecurity, we provide training that will help you further your career.

Our comprehensive library of courses covers the most important topics in IT. Whether you’re looking to improve your skills or learn new technologies, we have the resources you need.

Why Buy A Training Library?

Purchasing a library is the most cost-effective IT training you’ll ever buy. Just a few of the best reasons are:

  • Always Be Up-to-date In The IT Field – Technology changes rapidly. As it changes, you have a great resource to learn new technologies. When we update courses and add new courses, you have full access to it all without addition payment. An exclusive to ITU Online training offered by no other IT training provider.
  • Train On Your Time – There are no deadlines. Train whenever and wherever you want at your own pace.
  • Expand Your IT Knowledge – Even if you only focus on a single technology now, always be open to learning new technologies. If you’re proficient in Microsoft Technologies, there’s no better time to become proficient in all things Cisco. The more you know, the more marketable you and the higher salaries you can command in your field of choice.
  • Quite Simply, Learning Is Fun!

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Course Outline

AI Fundamentals - Getting Started With Artificial Intelligence Course Content

Module 1 - Getting Started With AI

  •    Module 1.1 Introduction To AI

  •    Module 1.2 Understanding The Types of AI

Module 2 - Programming Lanaguages, Tools and Platforms For AI Solutions

  •    Module 2.1 AI and Programming Languages

  •    Module 2.2 AI, Machine Learning and Deep Learning

  •    Module 2.3 AI Models

  •    Module 2.4 AI Services in the Cloud

Module 3 - Data Science Fundamentals for AI

  •    Module 3.1 Introduction to Data Science

  •    Module 3.2 Data Preparation Techniques

  •    Module 3.3 Exploratory Data Analysis (EDA)

Module 4 - AI In the Modern Workplace

  •    Module 4.1 AI In The Workplace

  •    Module 4.2 Data Analysis and Business Intelligence AI Tools

  •    Module 4.3 Automation and Workflow Management Tools

  •    Module 4.4 Natural Language Processing (NLP) Tools

  •    Module 4.5 Virtual Assistants and Chatbots

Module 5 - Ethical AI and Future Trends

  •    Module 5.1 Understanding Bias, Fairness, Privacy, and Security

  •    Module 5.2 Impact of AI on Jobs and Society

  •    Module 5.3 Emerging Trends in AI

  •    Module 5.4 AI Governance and Regulation

Module 6 - Monumental Leaps Forward With AI

  •    Module 6.1 AI for Social Good

  •    Module 6.2 AI in Creative Industries

  •    Module 6.3 AI in Cybersecurity

  •    Module 6.4 AI in Smart Cities and Infrastructure

Module 7 - AI Project Lifecycle Management

  •    Module 7.1 AI Project Lifecycle Management

  •    Module 7.2 Development and Implementation

  •    Module 7.3 Maintenance, Evaluation, and Scaling

Module 8 - AI Fundamentals Course Closeout

  •    Module 8.1 Course Closeout

CompTIA Security+ SY0-701 Course Content

Module 1 - SY0-701 General Security Concepts

  •    1.0 Introduction to the Course

  •    1.1 Fundamental Security Concepts

  •    1.2 Zero Trust

  •    1.3 Deception and Disruption

  •    1.3.1 ACTIVITY - Testing a Honeypot

  •    1.4 Security Controls

  •    1.5 Change Management and Security

  •    1.6 Cryptography Basics

  •    1.6.1 ACTIVITY - Examining Symmetric Encryption

  •    1.7 Asymmetric Encryption

  •    1.7.1 ACTIVITY - Exploring Asymmetric Encryption

  •    1.8 Hashing

  •    1.8.1 ACTIVITY - Verifying Integrity with Hashing

  •    1.9 Digital Certificates

  •    1.10 Public Key Infrastructure

  •    1.11 Data and Keys

  •    1.12 Crypto Implementations

  •    1.13 Blockchain

  •    1.14 Non-Cryptographic Data Protection

Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigations

  •    2.1 Threat Actors and Motivations

  •    2.2 Threat Vectors

  •    2.2.1 ACTIVITY - O.MG Cable Baiting

  •    2.2.2 O.MG-No Cable

  •    2.3 Social Engineering

  •    2.4 Operating System Vulnerabilities and Attacks

  •    2.5 Application Vulnerabilities and Attacks

  •    2.5.1 ACTIVITY - Performing a Buffer Overflow

  •    2.6 Web-based Vulnerabilities and Attacks

  •    2.6.1 ACTIVITY - Abusing Unsanitized Input

  •    2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection

  •    2.6.3 ACTIVITY - Swiping a Token with XSS

  •    2.7 Other Vulnerabilities

  •    2.8 Common Malicious Activity Indicators

  •    2.9 Insider Threat Indicators

  •    2.10 Social Engineering Indicators

  •    2.10.1 ACTIVITY - Capturing Credentials through Social Engineering

  •    2.11 Malware Activity Indicators

  •    2.12 Operating System Attack Indicators

  •    2.13 Application Attack Indicators

  •    2.13.1 ACTIVITY - Recognizing Directory Traversal

  •    2.14 Physical Attack Indicators

  •    2.14.1 ACTIVITY - Quickly Cloning an RFID Badge

  •    2.15 Network Attack Indicators

  •    2.15.1 ACTIVITY - Crashing a Target with DoS

  •    2.16 Cryptographic Attack Indicators

  •    2.17 Password Attack Indicators

  •    2.17.1 ACTIVITY - Password Cracking

  •    2.18 Network Segmentation

  •    2.19 Access Control

  •    2.20 Enterprise Device Hardening

Module 3 - SY0-701 Security Architecture

  •    3.1 Network Segmentation

  •    3.1.1 ACTIVITY - Segementing a Network

  •    3.2 High Availability

  •    3.3 Virtualization

  •    3.3.1 ACTIVITY - Deploying Docker Containers

  •    3.4 Cloud

  •    3.5 Serverless Computing

  •    3.6 IoT

  •    3.7 ICS SCADA

  •    3.7.1 ACTIVITY - Operating a SCADA System

  •    3.8 RTOS and Embedded Systems

  •    3.9 Reducing the Attack Surface

  •    3.10 Firewalls

  •    3.11 IDS IPS.mp4

  •    3.12 Secure Communications - Access

  •    3.13 Port Security

  •    3.14 SD-WAN and SASE

  •    3.15 Data Classifications

  •    3.16 Protecting Data Types

  •    3.17 Data Considerations

  •    3.18 Redundancy

  •    3.19 Alternate Sites

  •    3.20 Multiple Platforms

  •    3.21 Business Continuity

Module 4 - SY0-701 Security Operations

  •    4.1 Secure Baselines

  •    4.2 Attack Surface Reduction

  •    4.3 Wireless Installation

  •    4.4 Wireless Security Settings

  •    4.5 Mobile Solutions

  •    4.5.1 ACTIVITY - Pwning a Mobile Device

  •    4.6 Application Security Management

  •    4.7 Asset Management

  •    4.8 Vulnerability Management

  •    4.9 Monitoring Activities

  •    4.10 Monitoring Tools

  •    4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities

  •    4.11 Firewall Configuration

  •    4.11.1 ACTIVITY - Configuring Firewall Rules

  •    4.12 Intrusion Detection Configuration

  •    4.13 Web Traffic Filtering

  •    4.14 Operating System Policy

  •    4.14.1 ACTIVITY - Examining Windows Group Policy

  •    4.15 Network Service Security

  •    4.16 Data Loss Protection

  •    4.16.1 ACTIVITY - Checking File Integrity

  •    4.17 Network Access Control

  •    4.17.1 ACTIVITY - Require Multifactor Authentication

  •    4.18 Identity Management

  •    4.19 Access Management

  •    4.19.1 ACTIVITY - Implementing Access Control

  •    4.20 Security Automation

  •    4.21 Incident Response

  •    4.22 Digital Forensics

Module 5 - SY0-701 Security Program Management and Oversight

  •    5.1 Elements of Effective Security Governance

  •    5.2 Elements of the Risk Management Process

  •    5.3 Third Party Risk Assessment and Management

  •    5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure

  •    5.4 Effective Security Compliance

  •    5.5 Audits and Assessments

  •    5.5.1 ACTIVITY - Conducting OSINT

  •    5.5.2 ACTIVITY - Performing Active Reconnaissance

  •    5.6 Security Awareness Practices

  •    5.7 Course Outro

CompTIA Cybersecurity Analyst CySA+ (CS0-003) Course Content

Module 1 - CompTIA CySA+ CS0-003 Basics

  •    1.1 Course Introduction

  •    1.2 Instructor Introduction

  •    1.3 What is CySA

  •    1.4 Exam Objectives

  •    1.5 Cybersecurity Pathway

  •    1.6 DoD Baseline Certfication

Module 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations

  •    2.1 Domain 1 - Security Operations Overview

  •    2.2 System and Network Architecture Concepts in Security Operations

  •    2.3 Log Files

  •    2.4 Operating Systems

  •    2.5 Infrastructure Concepts

  •    2.6 Network Architecture

  •    2.7 Software Defined Networking

  •    2.8 Whiteboard Discussion - Network Architectures

  •    2.9 Identity and Access Management IAM Basics

  •    2.10 Demonstration - IAM

  •    2.11 Encryption

  •    2.12 Sensitive Data

  •    2.13 1.2 Analyze Indicators of Potentially Malicious Activity

  •    2.14 Network Attack

  •    2.15 Host Attacks

  •    2.16 Application Related Attacks

  •    2.17 Social Attacks

  •    2.18 Tools or Techniques to Determine Malicious Activity Overview

  •    2.19 Tools and Toolsets For Identifying Malicious Activity

  •    2.20 Common Techniques

  •    2.21 Programming Concerns

  •    2.22 Threat-Intelligence and Threat-Hunting Concepts Overview

  •    2.23 Threat Actors

  •    2.24 Tactics, Techniques and Procedures

  •    2.25 Confidence Levels IOC

  •    2.26 Collection Sources

  •    2.27 Threat Intelligence

  •    2.28 Cyber Response Teams

  •    2.29 Security Operations

  •    2.30 Standardized Processes and Operations

  •    2.31 Security Operations Tools and Toolsets

  •    2.32 Module 2 Review

Module 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management

  •    3.1 Domain 2 - Vulnerability Management Overview

  •    3.2 Vulnerability Discovery and Scanning

  •    3.3 Asset Discovery and Scanning

  •    3.4 Industry Frameworks

  •    3.5 Mitigating Attacks

  •    3.6 CVSS and CVE

  •    3.7 Common Vulnerability Scoring System (CVSS) interpretation

  •    3.8 CVE Databases

  •    3.9 Cross Site Scripting (XSS)

  •    3.10 Vulnerability Response, Handling, and Management

  •    3.11 Control Types (Defense in Depth, Zero Trust)

  •    3.12 Patching and Configurations

  •    3.13 Attack Surface Management

  •    3.14 Risk Management Principles

  •    3.15 Threat Modeling

  •    3.16 Threat Models

  •    3.17 Secure Coding and Development (SDLC)

  •    3.18 Module 3 Review

Module 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response and Management

  •    4.1 Domain 3 - Incident Response and Management Overview

  •    4.2 Attack Methodology Frameworks

  •    4.3 Cyber Kill Chain

  •    4.4 Frameworks to Know

  •    4.5 Incident Response and Post Reponse

  •    4.6 Detection and Analysis

  •    4.7 Post Incident Activities

  •    4.8 Containment, Eradication and Recovery

  •    4.9 Module 4 Review

Module 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication

  •    5.1 Domain 4 - Reporting and Communication Overview

  •    5.2 Reporting Vulnerabilities Overview

  •    5.2.1 Vulnerability Reporting

  •    5.3 Compliance Reports

  •    5.4 Inhibitors to Remediation

  •    5.5 Metrics and KPI's

  •    5.6 Incident Response Reporting and Communications Overview

  •    5.7 Incident Declaration

  •    5.8 Communication with Stakeholders

  •    5.9 Root Cause Analysis

  •    5.10 Lessons Learned and Incident Closure

  •    5.11 Module 5 Review

Module 6 - CompTIA CySA+ CS0-003 - Course Closeout

  •    6.1 Course Closeout Overview

  •    6.2 Practice Questions

  •    6.3 Exam Process

  •    6.4 Continuing Education

  •    6.5 Course Closeout

Microsoft Azure Administrator (AZ-104) Course Content

Module 1 - Azure Overview

  •    1.0 Introduction to AZ-104

  •    1.1 Cloud Computing

  •    1.2 Cloud Services Benefits

  •    1.3 Cloud Service Types

  •    1.4 Azure Core Architectural Components

  •    1.4.1 ACTIVITY-Creating Management Groups and Subscriptions

  •    1.5 Azure Compute Services

  •    1.6 Azure Application Hosting Options

  •    1.7 Azure Networking Services

  •    1.8 Azure Storage Services

  •    1.9 Azure Identity, Access, and Security

  •    1.10 Azure Cost Management

  •    1.10.1 ACTIVITY- Checking Your Azure Balance

  •    1.11 Azure Governance and Compliance Tools

  •    1.11.1 ACTIVITY- Assign an Azure Policy

Module 2 - Azure Tools

  •    2.1 Azure Portal

  •    2.1.1 ACTIVITY- Exploring the Azure Portal

  •    2.2 Azure Monitoring Tools

  •    2.3 Azure PowerShell

  •    2.3.1 ACTIVITY- Using Azure PowerShell

  •    2.4 Azure CLI

  •    2.4.1 ACTIVITY- Using the Azure CLI

  •    2.5 Azure Cloud Shell

  •    2.6 ARM Templates

  •    2.6.1 ACTIVITY- Using Templates to Deploy Resources

  •    2.7 Azure Resource Manager

  •    2.8 Hybrid Tools

Module 3 - Azure Identities and Governance

  •    3.1 Azure AD Overview

  •    3.1.1 ACTIVITY- Exploring Azure Active Directory

  •    3.1.2 ACTIVITY- Adding a Custom Domain

  •    3.2 Subscriptions

  •    3.3 Users and Groups

  •    3.3.1 ACTIVITY- Adding Azure Active Directory User

  •    3.3.2 ACTIVITY- Bulk Inviting New Users

  •    3.3.3 ACTIVITY- Creating Azure AD Groups

  •    3.4 Authentication

  •    3.5 SSPR

  •    3.5.1 ACTIVITY- Implementing SSPR

  •    3.6 Devices

  •    3.7 Azure Roles

  •    3.7.1 ACTIVITY- Assigning Azure Roles

  •    3.8 Azure AD Roles

  •    3.8.1 ACTIVITY- Assigning Azure AD Roles

  •    3.9 Conditional Access

  •    3.10 Authorization

  •    3.10.1 ACTIVITY- Managing Licenses

  •    3.11 Azure Policy

Module 4 - Azure Storage

  •    4.1 Storage Accounts

  •    4.1.1 ACTIVITY- Creating a Storage Account

  •    4.2 Storage Types

  •    4.2.1 ACTIVITY- Creating Storage Types

  •    4.3 Azure Storage Tools

  •    4.3.1 ACTIVITY- Azure Storage Explorer

  •    4.4 Azure Files and File Sync

  •    4.4.1 ACTIVITY- Deploying an Azure Files Share

  •    4.5 Azure Storage Security

Module 5 - Azure Compute Resources

  •    5.1 Virtual Machines

  •    5.1.1 ACTIVITY- Create Virtual Machines

  •    5.1.2 ACTIVITY- Delete a Virtual Machine

  •    5.2 VM Availability

  •    5.2.1 ACTIVITY- Increasing VM Availability

  •    5.3 VM Extensions

  •    5.4 Azure App Service

  •    5.5 Azure Container Instances

  •    5.6 Kubernetes

Module 6 - Azure Virtual Networks

  •    6.1 Virtual Networks

  •    6.1.1 ACTIVITY- Create a VNet

  •    6.2 Network Security Groups-Part 1

  •    6.2.1 Network Security Groups-Part 2

  •    6.3 Azure Firewall

  •    6.3.1 ACTIVITY- Deploying a Firewall

  •    6.4 Azure DNS-Part 1

  •    6.4.1 Azure DNS-Part 2

  •    6.4.2 ACTIVITY- Implementing Azure DNS Zone6

  •    6.5 Virtual Network Peering

  •    6.5.1 ACTIVITY- VNet Peering

  •    6.6 Azure VPN Gateway

  •    6.7 ExpressRoute and Virtual WANs

  •    6.8 Azure Load Balancer

  •    6.9 Azure Application Gateway

  •    6.10 Azure Routes

Module 7 - Azure Monitoring and Backup

  •    7.1 Network Watcher

  •    7.2 Azure Monitor

  •    7.3 Azure Backup-Part 1

  •    7.4 Azure Backup-Part 2

  •    7.5 Azure Backup-Part 3

  •    7.6 Conclusion to AZ-104

ChatGPT and AI Business Fundamentals Course Content

Module 1 - ChatGPT Fundamentals

  •    1.1 Course Welcome

  •    1.2 Instructor Introduction

  •    1.3 Download Course Resources

  •    1.4 ChatGPT Fundamentals

  •    1.5 What is ChatGPT

  •    1.6 Use Cases for ChatGPT

  •    1.7 Role of ChatGPT

  •    1.8 Future of ChatGPT

  •    1.9 ChatGPT Statistics, Facts & Trends

  •    1.10 Limitations

  •    1.11 What is a Chatbot

  •    1.12 Understanding AI-ML

  •    1.13 Demonstration - Tools to Use with ChatGPT

  •    1.14 Business Benefits

  •    1.15 Whiteboard - How it all works

  •    1.16 Demonstration - How to Get Started with ChatGPT

  •    1.17 Demonstration - Example Prompts

  •    1.18 Discussion - ChatGPT Performance Issues

  •    1.19 Module Summary

Module 2 - ChatGPT Prompt Demonstrations

  •    2.1 ChatGPT Prompt Demonstrations

  •    2.2 What is a Prompt

  •    2.3 Best Practices For Writing Prompts

  •    2.4 Prompt Demonstration - Asking Questions

  •    2.5 Prompt Demonstration - Top Ten Lists

  •    2.6 Prompt Demonstration - Long Form Docs

  •    2.7 Prompt Demonstration - Complex Form and Code

  •    2.8 Prompt Demonstration - Feedback

  •    2.9 Prompt Demonstration - Content Modification

  •    2.10 Prompt Demonstration - Instruction Generation

  •    2.11 Prompt Demonstration - Information Extraction

  •    2.12 Prompt Demonstration - Writing Computer Code

  •    2.13 Prompt Demonstration - Solving Math Problems

  •    2.14 Prompt Demonstration - Create YT Video Outline

  •    2.15 Prompt Demonstration - Write a Blog Article

  •    2.16 Prompt Demonstration - SEO Keywords

  •    2.17 Comparing Google Bard vs ChatGPT

  •    2.18 Module Summary

  •    2.19 Course Closeout

Certified Ethical Hacker (CEH) v12 Course Content

Module 1 - Introduction To Ethical Hacking

  •    1.0 Introduction to CEH v12

  •    1.1 Elements of Security

  •    1.2 Cyber Kill Chain

  •    1.3 MITRE ATT&CK Framework

  •    1.3.1 Activity - Researching the MITRE ATTACK Framework

  •    1.4 Hacking

  •    1.5 Ethical Hacking

  •    1.6 Information Assurance

  •    1.7 Risk Management

  •    1.8 Incident Management

  •    1.9 Information Security Laws and Standards

  •    1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  •    2.1 Footprinting Concepts

  •    2.2 OSINT Tools

  •    2.2.1 Activity - Conduct OSINT with OSR Framework

  •    2.2.2 Activity - OSINT with theHarvester

  •    2.2.3 Activity - Add API Keys to theHarvester

  •    2.2.4 Activity - Extract Document Metadata with FOCA

  •    2.2.5 Activity - Extract Document Metadata with FOCA

  •    2.3 Advanced Google Search

  •    2.3.1 Activity - Google Hacking

  •    2.4 Whois Footprinting

  •    2.4.1 Activity - Conducting Whois Research

  •    2.5 DNS Footprinting

  •    2.5.1 Activity - Query DNS with NSLOOKUP

  •    2.6 Website Footprinting

  •    2.6.1 Activity - Fingerprint a Webserver with ID Serve

  •    2.6.2 Activity - Extract Data from Websites

  •    2.6.3 Activity - Mirror a Website with HTTrack

  •    2.7 Email Footprinting

  •    2.7.1 Activity - Trace a Suspicious Email

  •    2.8 Network Footprinting

  •    2.9 Social Network Footprinting

  •    2.10 Footprinting and Reconnaissance Countermeasures

  •    2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  •    3.1 Scanning Concepts

  •    3.2 Discovery Scans

  •    3.2.1 Activity - ICMP ECHO and ARP Pings

  •    3.2.2 Activity - Host Discovery with Angry IP Scanner

  •    3.3 Port Scans

  •    3.3.1 Activity - Port Scan with Angry IP Scanner

  •    3.4 Other Scan Types

  •    3.5 Scanning Tools

  •    3.5.1 Activity - Hping3 Packet Crafting

  •    3.5.2 Activity - Fingerprinting with Zenmap

  •    3.6 NMAP

  •    3.6.1 Activity - Nmap Basic Scans

  •    3.6.2 Activity - Host Discovery with Nmap

  •    3.6.3 - Activity - Nmap Version Detection

  •    3.6.4 Activity - Nmap Idle (Zombie) Scan

  •    3.6.5 Activity - Nmap FTP Bounce Scan

  •    3.6.6 - Activity - NMAP Scripts

  •    3.7 Firewall and IDS Evasion

  •    3.7.1 Activity - Nmap Advanced Scans

  •    3.8 Proxies

  •    3.9 Scanning Countermeasures

  •    3.10 Scanning Networks Review

Module 4: Enumeration

  •    4.1 Enumeration Overview

  •    4.2 SMB_NetBIOS_Enumeration

  •    4.2.1 Activity - Enumerate NetBIOS Information with Hyena

  •    4.3 File Transfer Enumeration

  •    4.4 WMI Enumeration

  •    4.4.1 - Activity - Enumerating WMI with Hyena

  •    4.5 SNMP Enumeration

  •    4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect

  •    4.6 LDAP Enumeration

  •    4.7 DNS Enumeration

  •    4.8 SMTP Enumeration

  •    4.8.1 Activity - Enumerate Email Users with SMTP

  •    4.9 Remote Connection Enumeration

  •    4.10 Website Enumeration

  •    4.10.1 Activity - Enumerate a Website with DirBuster

  •    4.11 Other Enumeration Types

  •    4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  •    5.1 Vulnerability Scanning

  •    5.1.1 Vulnerability Scanning with OpenVAS

  •    5.2 Vulnerability Assessment

  •    5.3 Vulnerability Analysis Review

Module 6: System Hacking

  •    6.1 System Hacking Concepts

  •    6.2 Common OS Exploits

  •    6.3 Buffer Overflows

  •    6.3.1 Activity - Performing a Buffer Overflow

  •    6.4 System Hacking Tools and Frameworks

  •    6.4.1 Activity - Hack a Linux Target from Start to Finish

  •    6.5 Metasploit

  •    6.5.1 Activity - Get Started with Metasploit

  •    6.6 Meterpreter

  •    6.7 Keylogging and Spyware

  •    6.7.1 Activity - Keylogging with Meterpreter

  •    6.8 Netcat

  •    6.8.1 Activity - Using Netcat

  •    6.9 Hacking Windows

  •    6.9.1 Activity - Hacking Windows with Eternal Blue

  •    6.10 Hacking Linux

  •    6.11 Password Attacks

  •    6.11.1 Activity - Pass the Hash

  •    6.11.2 Activity - Password Spraying

  •    6.12 Password Cracking Tools

  •    6.13 Windows Password Cracking

  •    6.13.1 Activity - Cracking Windows Passwords

  •    6.13.2 Activity - Cracking Password Hashes with Hashcat

  •    6.14 Linux Password Cracking

  •    6.15 Other Methods for Obtaining Passwords

  •    6.16 Network Service Attacks

  •    6.16.1 Activity - Brute Forcing a Network Service with Medusa

  •    6.17 Post Exploitation

  •    6.18 Pivoting

  •    6.18.1 & 6.18.2 Activity - Pivoting Setup and Attack

  •    6.19 Maintaining Access

  •    6.19.1 Activity - Persistence

  •    6.20 Hiding Data

  •    6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography

  •    6.21 Covering Tracks

  •    6.21.1 Activity - Clearing Tracks in Windows

  •    6.21.2 Activity - View and Clear Audit Policies with Auditpol

  •    6.22 System Hacking Countermeasures

  •    6.23 System Hacking Review

Module 7: Malware Threats

  •    7.1 Malware Overview

  •    7.2 Viruses

  •    7.3 Trojans

  •    7.3.1 Activity - Deploying a RAT

  •    7.4 Rootkits

  •    7.5 Other Malware

  •    7.6 Advanced Persistent Threat

  •    7.7 Malware Makers

  •    7.7.1 Activity - Creating a Malware Dropper and Handler

  •    7.8 Malware Detection

  •    7.9 Malware Analysis

  •    7.9.1 Activity - Performing a Static Code Review

  •    7.9.2 Activity - Analyzing the SolarWinds Orion Hack

  •    7.10 Malware Countermeasures

  •    7.11 Malware Threats Review

Module 8: Sniffing

  •    8.1 Network Sniffing

  •    8.2 Sniffing Tools

  •    8.2.1 Activity- Sniffing HTTP with Wireshark

  •    8.2.2 Activity - Capturing Files from SMB

  •    8.3 ARP and MAC Attacks

  •    8.3.1 Activity - Performing an MITM Attack with Ettercap

  •    8.4 Name Resolution Attacks

  •    8.4.1 Activity - Spoofing Responses with Responder

  •    8.5 Other Layer 2 Attacks

  •    8.6 Sniffing Countermeasures

  •    8.7 Sniffing Review

Module 9: Social Engineering

  •    9.1 Social Engineering Concepts

  •    9.2 Social Engineering Techniques

  •    9.2.1 Activity - Deploying a Baited USB Stick

  •    9.2.2 Activity - Using an O.MG Lightning Cable

  •    9.3 Social Engineering Tools

  •    9.3.1 Activity - Phishing for Credentials

  •    9.4 Social Media, Identity Theft, Insider Threats

  •    9.5 Social Engineering Countermeasures

  •    9.6 Social Engineering Review

Module 10: Denial-of-Service

  •    10.1 DoS-DDoS Concepts

  •    10.2 Volumetric Attacks

  •    10.3 Fragmentation Attacks

  •    10.4 State Exhaustion Attacks

  •    10.5 Application Layer Attacks

  •    10.5.1 Activity - Performing a LOIC Attack

  •    10.5.2 Activity - Performing a HOIC Attack

  •    10.5.3 Activity - Conducting a Slowloris Attack

  •    10.6 Other Attacks

  •    10.7 DoS Tools

  •    10.8 DoS Countermeasures

  •    10.9 DoS Review

Module 11: Session Hijacking

  •    11.1 Session Hijacking

  •    11.2 Compromising a Session Token

  •    11.3 XSS

  •    11.4 CSRF

  •    11.5 Other Web Hijacking Attacks

  •    11.6 Network-Level Session Hijacking

  •    11.6.1 Activity - Hijack a Telnet Session

  •    11.7 Session Hijacking Tools

  •    11.8 Session Hijacking Countermeasures

  •    11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  •    12.1 Types of IDS

  •    12.2 Snort

  •    12.3 System Logs

  •    12.4 IDS Considerations

  •    12.5 IDS Evasion

  •    12.5.1 Activity - Fly Below IDS Radar

  •    12.6 Firewalls

  •    12.7 Packet Filtering Rules

  •    12.8 Firewall Deployments

  •    12.9 Split DNS

  •    12.10 Firewall Product Types

  •    12.11 Firewall Evasion

  •    12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall

  •    12.11.2 Activity - Busting the DOM for WAF Evasion

  •    12.12 Honeypots

  •    12.13 Honeypot Detection and Evasion

  •    12.13.1 Activity - Test and Analyze a Honey Pot

  •    12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  •    13.1 Web Server Operations

  •    13.2 Hacking Web Servers

  •    13.3 Common Web Server Attacks

  •    13.3.1 Activity - Defacing a Website

  •    13.4 Web Server Attack Tools

  •    13.5 Hacking Web Servers Countermeasures

  •    13.6 Hacking Web Servers Review

Module 14: Hacking Web Applications

  •    14.1 Web Application Concepts

  •    14.2 Attacking Web Apps

  •    14.3 A01 Broken Access Control

  •    14.4 A02 Cryptographic Failures

  •    14.5 A03 Injection

  •    14.5.1 Activity - Command Injection

  •    14.6 A04 Insecure Design

  •    14.7 A05 Security Misconfiguration

  •    14.8 A06 Vulnerable and Outdated Components

  •    14.9 A07 Identification and Authentication Failures

  •    14.10 A08 Software and Data integrity Failures

  •    14.11 A09 Security Logging and Monitoring Failures

  •    14.12 A10 Server-Side Request Forgery

  •    14.13 XSS Attacks

  •    14.13.1 Activity - XSS Walkthrough

  •    14.13.2 Activity - Inject a Malicious iFrame with XXS

  •    14.14 CSRF

  •    14.15 Parameter Tampering

  •    14.15.1 Activity - Parameter Tampering with Burp

  •    14.16 Clickjacking

  •    14.17 SQL Injection

  •    14.18 Insecure Deserialization Attacks

  •    14.19 IDOR

  •    14.19.1 Activity - Hacking with IDOR

  •    14.20 Directory Traversal

  •    14.21 Session Management Attacks

  •    14.22 Response Splitting

  •    14.23 Overflow Attacks

  •    14.24 XXE Attacks

  •    14.25 Web App DoS

  •    14.26 Soap Attacks

  •    14.27 AJAX Attacks

  •    14.28 Web API Hacking

  •    14.29 Webhooks and Web Shells

  •    14.30 Web App Hacking Tools

  •    14.31 Hacking Web Applications Countermeasures

  •    14.32 Hacking Web Applications Review

Module 15: SQL Injection

  •    15.1 SQL Injection Overview

  •    15.2 Basic SQL Injection

  •    15.3 Finding Vulnerable Websites

  •    15.4 Error-based SQL Injection

  •    15.5 Union SQL Injection

  •    15.5.1 Activity - Testing SQLi on a Live Website - Part 1

  •    15.5.2 Activity - Testing SQLi on a Live Website - Part 2

  •    15.6 Blind SQL Injection

  •    15.7 SQL Injection Tools

  •    15.7.1 Activity - SQL Injection Using SQLmap

  •    15.8 Evading Detection

  •    15.9 Analyzing SQL Injection

  •    15.10 SQL Injection Countermeasures

  •    15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  •    16.1 Wireless Concepts

  •    16.2 Wireless Security Standards

  •    16.3 WI-FI Discovery Tools

  •    16.4 Common Wi-Fi Attacks

  •    16.5 Wi-Fi Password Cracking

  •    16.6 WEP Cracking

  •    16.6.1 Activity - Cracking WEP

  •    16.7 WPA,WPA2,WPA3 Cracking

  •    16.7.1 Activity - WPA KRACK Attack

  •    16.8 WPS Cracking

  •    16.9 Bluetooth Hacking

  •    16.10 Other Wireless Hacking

  •    16.10.1 Activity - Cloning an RFID badge

  •    16.10.2 Activity - Hacking with a Flipper Zero

  •    16.11 Wireless Security Tools

  •    16.12 Wireless Hacking Countermeasures

  •    16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  •    17.1 Mobile Device Overview

  •    17.2 Mobile Device Attacks

  •    17.3 Android Vulnerabilities

  •    17.4 Rooting Android

  •    17.5 Android Exploits

  •    17.5.1 Activity - Hacking Android

  •    17.5.2 Activity - Using a Mobile Device in a DDoS Campaign

  •    17.6 Android-based Hacking Tools

  •    17.7 Reverse Engineering an Android App

  •    17.8 Securing Android

  •    17.9 iOS Overview

  •    17.10 Jailbreaking iOS

  •    17.11 iOS Exploits

  •    17.12 iOS-based Hacking Tools

  •    17.13 Reverse Engineering an iOS App

  •    17.14 Securing iOS

  •    17.15 Mobile Device Management

  •    17.16 Hacking Mobile Platforms Countermeasures

  •    17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  •    18.1 IoT Overview

  •    18.2 IoT Infrastructure

  •    18.3 IoT Vulnerabilities and Threats

  •    18.3.1 Activity - Searching for Vulnerable IoT Devices

  •    18.4 IoT Hacking Methodology and Tools

  •    18.5 IoT Hacking Countermeasures

  •    18.6 OT Concepts

  •    18.7 IT-OT Convergence

  •    18.8 OT Components

  •    18.9 OT Vulnerabilities

  •    18.10 OT Attack Methodology and Tools

  •    18.11 OT Hacking Countermeasures

  •    18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  •    19.1 Cloud Computing Concepts

  •    19.2 Cloud Types

  •    19.3 Cloud Benefits and Considerations

  •    19.4 Cloud Risks and Vulnerabilities

  •    19.5 Cloud Threats and Countermeasures

  •    19.5.1 Activity - Hacking S3 Buckets

  •    19.6 Cloud Security Tools And Best Practices

  •    19.7 Cloud Computing Review

Module 20: Cryptography

  •    20.1 Cryptography Concepts

  •    20.2 Symmetric Encryption

  •    20.2.1 Activity - Symmetric Encryption

  •    20.3 Asymmetric Encryption

  •    20.3.1 Activity - Asymmetric Encryption

  •    20.4 Public Key Exchange

  •    20.5 PKI

  •    20.5.1 Activity - Generating and Using an Asymmetric Key Pair

  •    20.6 Digital Signatures

  •    20.7 Hashing

  •    20.7.1 Activity - Calculating Hashes

  •    20.8 Common Cryptography Use Cases

  •    20.9 Cryptography Tools

  •    20.10 Cryptography Attacks

  •    20.11 Cryptography Review

  •    20.12 Course Conclusion

CompTIA Cloud+ (CV0-003) Course Content

Module 1 - CompTIA Cloud+ CV0-003 Course Overview

  •    1.0 Course Trailer

  •    1.1 Course Overview

  •    1.2 What is the Cloud + Exam

  •    1.3 Cloud + Domain Obectives Overview

  •    1.4 CompTIA Certification Pathways

  •    1.5 DoD and ISO Requirements

Module 2 - General Cloud Knowledge

  •    2.1 Domain Overview

  •    2.2 Compare and Contrast Cloud Models

  •    2.3 Cloud Computing Defined

  •    2.4 Deployment Models

  •    2.5 Service Models

  •    2.6 Cloud Characteristics

  •    2.7 Cloud Roles

  •    2.8 Evaluate Cloud Providers and Services

  •    2.9 Regions and Zones

  •    2.10 Shared Responsibility Model

  •    2.11 Demonstration - AWS Shared Security Model

  •    2.12 Comparing Cloud to Virtualization

  •    2.13 Comparing Cloud to On Premises

  •    2.14 What is a Virtual Machine

  •    2.15 Demonstration - Deploy a Cloud VM (AWS EC2)

  •    2.16 What is an API

  •    2.17 Capacity Planning Factors

  •    2.18 Licensing, Factors, Requirements and Planning

  •    2.19 Capacity Planning

  •    2.20 Demonstration - AWS Trusted Advisor

  •    2.21 HA and Scaling

  •    2.22 High Availability and Disaster Recovery

  •    2.23 Virtual, System and Communication Protection

  •    2.24 Hypervisor Affinity

  •    2.25 Analyze the solution design

  •    2.26 Business Requirements

  •    2.27 Business Enablers

  •    2.28 Demonstration -AWS Well Architected Tool

  •    2.29 Testing Techniques

  •    2.30 Testing Success Factors

  •    2.31 Module Review Questions

  •    2.32 Module Summary Review

Module 3 - Cloud Security

  •    3.1 Domain Overview

  •    3.2 Configure Identity and Access Management

  •    3.3 Identification and Authorization Management (IAM)

  •    3.4 SDLC

  •    3.5 Directory Services

  •    3.6 Security and Access Controls

  •    3.7 Federation

  •    3.8 SSO and MFA

  •    3.9 Certificates and Key Management

  •    3.10 Secure a Network in a Cloud Environment

  •    3.11 Networking Devices and Segmentation

  •    3.12 Firewalls and Proxies

  •    3.13 NAT and PAT

  •    3.14 Secure Network Configurations (Tunnelling and Encryption)

  •    3.15 Demo Hardening and Configuration Changes

  •    3.16 OS Application Controls and Security Credentials

  •    3.17 Policies and Permissions

  •    3.18 Host and Network Protections (HIDSIPS)

  •    3.19 Virtualization Security

  •    3.20 Monitoring

  •    3.21 Data Security and Compliance Controls in Cloud Environments

  •    3.22 Structured, Unstructured and Semi Structured Data

  •    3.23 Data Classification and Labeling

  •    3.24 Data Loss Prevention

  •    3.25 Demonstration - Google Cloud DLP

  •    3.26 Chain of Custody and Non-Repudiation

  •    3.27 Discussion - CASB

  •    3.28 Module Summary Review

  •    3.29 Module Review Questions

Module 4 - Cloud Deployment

  •    4.1 Domain Overview

  •    4.2 Integrate Components into Cloud Solutions

  •    4.3 Subscription Services

  •    4.4 Demonstration - Provision VM

  •    4.5 Cloud Infrastructure Components

  •    4.6 Whiteboard - Design a Resilent AWS Cloud Architecture

  •    4.7 Containers

  •    4.8 Microservices

  •    4.9 Demonstration - Deploy Containers

  •    4.10 Scaling

  •    4.11 Provision Storage

  •    4.12 Cloud Storage Protocols

  •    4.13 Storage Features

  •    4.14 Storage Cost Considerations

  •    4.15 Storage Performance

  •    4.16 RAID and Tiering

  •    4.17 Demonstration - AWS S3

  •    4.18 Deploy Cloud Networking Solutions

  •    4.19 Connecting to The Cloud

  •    4.20 Network Protocols

  •    4.21 VPNS, VPC and Connectivity

  •    4.22 Whiteboard - AWS VPC Connectivity

  •    4.23 Demonstration - AWS VPC

  •    4.24 Software Defined Networking (SDN)

  •    4.25 Compute Sizing

  •    4.26 Virtualization Considerations

  •    4.27 Resource Rightsizing (CPU, Memory, etc)

  •    4.28 Module Summary Review

  •    4.29 Module Review Questions

Module 5 - Operations and Support

  •    5.1 Domain Overview

  •    5.2 Logging Monitoring and Alerting

  •    5.3 Logging, Storage and Analysis of Data Events

  •    5.4 Monitoring Cloud Resources

  •    5.5 Service Level Agreements

  •    5.6 Demonstration - SLAs in AWS

  •    5.7 Maintain Efficient Operations of a Cloud Environment

  •    5.8 Lifecycle Management

  •    5.9 Change and Asset Management

  •    5.10 SOP, Patching and Upgrades

  •    5.11 Orchestration and Automation

  •    5.12 Orchestration or Automation

  •    5.13 DevOps, IaC and CICD Pipelines

  •    5.14 Playbooks and Templates

  •    5.15 Backup and Restore Operations

  •    5.16 Backup Types, Objects, Targets

  •    5.17 Restore and Recovery

  •    5.18 Module Summary Review

  •    5.19 Module Review Questions

Module 6 - Troubleshooting

  •    6.1 Domain Overview

  •    6.2 Troubleshooting Methodology Intro

  •    6.3 Troubleshooting Methodology

  •    6.4 Troubleshoot Security Issues

  •    6.5 Cloud Attacks

  •    6.6 Security Groups and NACLS

  •    6.7 Troubleshoot Deployment Issues

  •    6.8 Discussion Site Connectivity Issues

  •    6.9 Discussion - Capacity Issues

  •    6.10 Connectivity Issues

  •    6.11 Connectivity Troubleshooting Tools

  •    6.12 Demonstration - GCP AWS Azure Latency Test

  •    6.13 Module Summary Review

  •    6.14 Module Review Questions

Module 7 - Course Closeout

  •    7.1 Exam Preparation

  •    7.2 Course Closeout

Google Cloud Digital Leader Course Content

Module 1 - Google Cloud Digital Leader Course Overview

  •    1.0 About Google Cloud Digital Leader

  •    1.1 Course and Instructor Intro

  •    1.2 Course PreReqs

  •    1.3 GCP Certification Overview

  •    1.4 GCP Digital Leader Exam Objectives

Module 2 - General Cloud Knowledge

  •    2.0 General Cloud Knowledge

  •    2.1 Domain Objectives

  •    2.2 Intro to Cloud Computing

  •    2.3 Essential Characteristics of Cloud Computing

  •    2.4 Service Models

  •    2.5 Deployment Models

  •    2.6 Multitenancy

  •    2.7 Resilency

  •    2.8 Replication

  •    2.9 Automation and Orchestration

  •    2.10 Chargeback

  •    2.11 Vendor Lockin

  •    2.12 Cloud Standards

  •    2.13 OpEx, CapEx

  •    2.14 TCO-ROI

  •    2.15 Business Enablers

  •    2.16 Section Summary

  •    2.17 Review Questions

Module 3 - General Google Cloud Knowledge

  •    3.0 General GCP Knowledge

  •    3.1 Domain Objectives

  •    3.2 GCP Overview

  •    3.3 Cloud Infrastructure

  •    3.4 Cloud Hierarchy

  •    3.5 Project Demo

  •    3.6 Whiteboard Hierarchy and Projects

  •    3.7 Service Options

  •    3.8 Demo - Services Overview

  •    3.9 Pricing Calculator

  •    3.10 Demo - Pricing Calculator

  •    3.11 Billing models and Discounts

  •    3.12 Demo Billing

  •    3.13 Compliance Resources

  •    3.14 Demo - Compliance Reports Manager

  •    3.15 Support Options

  •    3.16 Service Level Agreement (SLA)

  •    3.17 Google Cloud Framework and Maturity Model

  •    3.18 Demo - Maturity Assessment

  •    3.19 Access to GCP

  •    3.20 Demo - GCP ACCESS

  •    3.21 Section Summary

  •    3.22 Review Questions

Module 4 - Google Cloud Products and Services

  •    4.0 Google Cloud Products and Services

  •    4.1 Domain Objectives

  •    4.2 Core Services

  •    4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal

  •    4.4 Compute Storage and Disk Options

  •    4.5 App Engine, Google Cloud Functions, and Cloud Run

  •    4.6 Google Kubernetes Engine

  •    4.7 Demo Compute Services

  •    4.8 Container registry

  •    4.9 Cost and Performance Tradeoffs of Scale To Zero

  •    4.10 Database Options - Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery

  •    4.11 Demo - Database Offerings

  •    4.12 Vision API, AI Platform, TPUs

  •    4.13 Pre Trained Models

  •    4.14 Data Pipeline Offerings

  •    4.15 Data Ingestion Options

  •    4.16 Software Development Life Cycle (SDLC)

  •    4.17 Visibility and Alerting Offerings

  •    4.18 Identify Data Migration Options

  •    4.19 Compute VM Migration

  •    4.20 Whiteboard - Migrations

  •    4.21 Application Modernization

  •    4.22 Define Software-Defined WAN (SD-WAN)

  •    4.23 Connectivity Options

  •    4.24 Whiteboard - Connectivity

  •    4.25 IAM and Security

  •    4.26 Whiteboard Cloud Architecture

  •    4.27 Section Summary

  •    4.28 Review Questions

Module 5 - Google Cloud Digital Leader Course Closeout

  •    5.0 Google Cloud Digital Leader Course Closeout

  •    5.1 Course Review

  •    5.2 Resources

  •    5.3 Exam Overview

  •    5.4 Course Closeout

Google Analytics 4 Course Content

Module 1 - Google Analytics 4 - Course Overview

  •    1.0 About Google Analytics 4

  •    1.1 Course Intro Welcome

  •    1.2 Instructor Intro

Module 2 - Fundamentals of Google Analytics

  •    2.1 What is a Digital Product

  •    2.2 Google Market Platform

  •    2.3 Google Analytics Overview

  •    2.4 Google Analytics 4 Overview

  •    2.5 Whiteboad Discussion-How Does GA Work

  •    2.6 Comparing GA3 to GA4

  •    2.7 Whiteboard Compare Data Models

  •    2.8 Demo- GA Console Walkthru

  •    2.9 Admin Panel

  •    2.10 Demo Admin Panel

  •    2.11 Tag Manager

  •    2.12 Demo Tag Manager

  •    2.13 Segment Review

  •    2.14 Segment Review Questions

Module 3 - Advanced Topics with Google Analytics

  •    3.1 Upgrading and Running Parallel

  •    3.2 Whiteboard Discussion - Parallel

  •    3.3 Demo Console Parallel

  •    3.4 Hands on Demo - Install GA4 on a Live Site

  •    3.5 Understand Reporting Options, Lifecycle Collections

  •    3.6 Hands on Demo - Exploring reports

  •    3.7 Hands on Demo - Set up GA4 Custom Eventsmp4

  •    3.8 Hands on Demo - Conversions, Audiences, DebugView

  •    3.9 Hands on Demo - Advertising

  •    3.10 Hands on Demo - Explorations:Insights

  •    3.11 Hands on Demo - Lifecycle and Users

  •    3.12 Google Big Query Connections

  •    3.13 Demo - BigQuery Data Integrations

  •    3.14 Google Ads

  •    3.15 Demo - Google Ads

  •    3.16 Google Signals

  •    3.17 Demo - Google Signals

  •    3.18 Certification Options

  •    3.19 Segment Summary

  •    3.20 Review Questions

  •    3.21 Resources

  •    3.22 Course Closeout

CompTIA A+ 220-1101 (Core 1) Course Content

Module 1 - Devices, Setups, and Installs

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Appropriate Safety Procedures

  •    1.3 PC Components

  •    1.4 Guidlines for PC Disassembly

  •    1.5 Motherboards

  •    1.6 CPU Sockets

  •    1.7 PCI Bus

  •    1.8 Storage Bus (SATA and IDE)

  •    1.9 Discussing PC Components

  •    1.10 Common Connection Interfaces

  •    1.11 Wired and Wireless Connection Standards

  •    1.12 Install Peripheral Devices

  •    1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices

  •    2.1 Displays and Multimedia

  •    2.2 Display Device Connections and Cables

  •    2.3 Discussing Display Device Installation and Configuration

  •    2.4 Troubleshoot Display Devices

  •    2.5 Guidelines for Troubleshooting Display Devices

  •    2.6 Discussing Display Device Troubleshooting

  •    2.7 Install and Configure Multimedia Devices

  •    2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types

  •    3.1 Supporting Multiple Drive Types and Memory

  •    3.2 Memory Types

  •    3.3 RAM Types

  •    3.4 Memory Modules

  •    3.5 DIMM and SO-DIMM Technologies

  •    3.6 Parity and ECC RAM

  •    3.7 Memory Compatibility Issues

  •    3.8 Discussing System Memory Installation

  •    3.9 Install and Configure Mass Storage Devices

  •    3.10 Storage Adapters and Cables

  •    3.11 Solid State Drives

  •    3.12 Guidlines for Installing Mass Storage Devices

  •    3.13 Discussing Mass Storage Device Installation and Configuration

  •    3.14 Install and Configure Removable Storage

  •    3.15 Discussing Removable Storage Device Istallation and Configuration

  •    3.16 Configure RAID

  •    3.17 RAID Configuration Options

  •    3.18 Discussing RAID Configuration

  •    3.19 Troubleshoot Storage Devices

  •    3.20 Boot Failures

  •    3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components

  •    4.1 Install Upgrade CPUs

  •    4.2 Multiprocessing and Multicore Processors

  •    4.3 Discussing CPU Upgrades

  •    4.4 Configure and Update BIOS UEFI

  •    4.5 Discussing BOIS-UEFI Configuration and Updates

  •    4.6 Install Power Supplies

  •    4.7 Discussing Power Supply Installation

  •    4.8 Troubleshoot Internal System Components

  •    4.9 POST and Boot Problems

  •    4.10 Boot Troubleshooting and Log Entries

  •    4.11 Motherboard Component Problems

  •    4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories

  •    5.1 Wired Networks

  •    5.2 Common Ethernet Network Implementations

  •    5.3 Taps and Mirrors

  •    5.4 Discussing Wired Networks

  •    5.5 Network Hardware Devices

  •    5.6 Switches

  •    5.7 Power Over Ethernet

  •    5.8 Discussing Network Hardware Devices

  •    5.9 Wireless Networks

  •    5.10 Access Points and Wireless Network Modes

  •    5.11 Discussing Wireless Networks

  •    5.12 Internet Connection Types

  •    5.13 Wireless Internet Service Providers WISP

  •    5.14 Discussing Internet Connection Types

  •    5.15 Network Configuration Concepts

  •    5.16 The TCIP-IP Protocol Suite

  •    5.17 Internet Protocol and IP Addressing

  •    5.18 Public and Private IP Addresses

  •    5.19 IPv6

  •    5.20 Discussing Network Configuration Concepts

  •    5.21 Network Services

  •    5.22 DNS

  •    5.23 Dynamic and Static IP Configurations

  •    5.24 DNS Records MX and A

  •    5.25 Web Servers and HTTP-HTTPS

  •    5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics

  •    6.1 Configuring and Troubleshooting Networks

  •    6.2 Network Connections in Windows

  •    6.3 Install and Configure SOHO Networks

  •    6.4 Configure SOHO Network Security

  •    6.5 Firewalls

  •    6.6 Port Fowarding and Port Triggering

  •    6.7 Windows Firewall

  •    6.8 Network Security and Embedded Appliances

  •    6.9 Configure Remote Access

  •    6.10 Discussing Remote Access Configuration

  •    6.11 Troubleshoot Network Connections

  •    6.12 IP Configuration Issues

  •    6.13 Routing Issues

  •    6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing

  •    7.1 Configure Client-Side Virtulaization

  •    7.2 Hypervisors

  •    7.3 Processor Support and Resource Requirements

  •    7.4 Virtual Networks

  •    7.5 Client-Side Virtualization

  •    7.6 Cloud Computing Concepts

  •    7.7 Internal and External Shared Resources

  •    7.8 Cloud Service Options

  •    7.9 Virtual Desktops

  •    7.10 Software-Defined Networking (SDN)

  •    7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting

  •    8.1 Use Laptop Features

  •    8.2 Expansion Options

  •    8.3 Discussing Laptop Features

  •    8.4 Install and Configure Laptop Hardware

  •    8.5 Discussing Laptop Hardware Installation and Configuration

  •    8.6 Troubleshoot Common Laptop Issues

  •    8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices

  •    9.1 Syncing and Setup of Mobile Devices

  •    9.2 Connect and Configure Mobile Devices

  •    9.3 Configure Mobile Device Network Connectivity

  •    9.4 Mobile VPN Configuration

  •    9.5 Email Configuration Options

  •    9.6 Discussing Mobile Device Network Connectivity Configuration

  •    9.7 Support Mobile Apps

  •    9.8 Discussing Mobile App Support

Module 10 - All Things Printing

  •    10.1 All Things Printing

  •    10.2 Discussing Laser Printer Maintenance

  •    10.3 Maintain Inkjet Printers

  •    10.4 Discussing Inkjet Printer Maintenance

  •    10.5 Maintain Impact, Thermal, and 3D Printers

  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance

  •    10.7 Install and Configure Printers

  •    10.8 Discussing Printer Installation and Configuration

  •    10.9 Troubleshoot Print Device Issues

  •    10.10 Install and Configure Imaging Devices

  •    10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

CompTIA A+ 220-1102 (Core 2) Course Content

Module 1 - Operating System Management

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Identify Common Operating Systems

  •    1.3 Microsoft Windows

  •    1.4 Work and Education Features

  •    1.5 Windows System Limits

  •    1.6 Apple Operating Systems

  •    1.7 Linux Disk and File Management

  •    1.8 Discussing OS Types

  •    1.9 Use Windows Features and Tools

  •    1.10 Administrative Tools

  •    1.11 Manage Files in Windows

  •    1.12 System Hierarchies

  •    1.13 File Attributes

  •    1.14 Discussing Windows Features and Tools

  •    1.15 Manage Disks in Windows

  •    1.16 Discussing File Management in Windows

  •    1.17 The Windows Disk Management Console

  •    1.18 Discussing Windows Disk Management

  •    1.19 Manage Devices in Windows

  •    1.20 Device Manager

  •    1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS

  •    2.1 Configuring and Installing the OS

  •    2.2 Installation Boot Methods

  •    2.3 Disk Formatting and Partitioning

  •    2.4 Networking Considerations

  •    2.5 Post Installation Tasks

  •    2.6 OS Installation Types

  •    2.7 Unattended Installations

  •    2.8 Maintain OSs

  •    2.9 OS Updates

  •    2.10 Anti-Malware Updates

  •    2.11 Scheduled Backups

  •    2.12 Task Schedulers part 1

  •    2.13 Task Schedulers part 2

  •    2.14 Install Windows 10 Demonstration

  •    2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS

  •    3.1 Install and Manage Windows Applications

  •    3.2 Windows OS Tools

  •    3.3 Application and Print Services

  •    3.4 Task Manager

  •    3.5 Manage Windows Performance

  •    3.6 Windows Performance Management Tools

  •    3.7 Troubleshoot Windows

  •    3.8 Event Viewer

  •    3.9 The System Configuration Utility

  •    3.10 Troubleshooting Tips Boot Process

  •    3.11 Troubleshooting Tips for Windows System Issues

  •    3.12 Blue Screens and Spontaneous Shutdowns

  •    3.13 Troubleshooting Tips for File and Memory Corruption

  •    3.14 Safe Boot

  •    3.15 System Repair Disc

  •    3.16 System Restore

  •    3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools

  •    4.1 Network Management Tools

  •    4.2 Network Connectivity

  •    4.3 IP Addressing and Connection Types

  •    4.4 Proxy Settings

  •    4.5 Windows Client Configuration

  •    4.6 Location Services

  •    4.7 Firewalls

  •    4.8 Network Troubleshooting

  •    4.9 Remote Desktop Tools

  •    4.10 Desktop Management and Remote Monitoring Tools

  •    4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management

  •    5.1 Sharing Resources and Wrights Management

  •    5.2 User Group Accounts

  •    5.3 Local Secutity Policy

  •    5.4 SSO and Credential Manager

  •    5.5 Workgroups and Homegroups

  •    5.6 Network and Sharing Center

  •    5.7 Network Share Configuration

  •    5.8 NTSF File and Folder Permissions

  •    5.9 Configure Active Directory Accounts and Policies

  •    5.10 Domain Membership and Group Policy Objects

  •    5.11 Basic AD Functions

  •    5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures

  •    6.1 Threats and Security Measures

  •    6.2 Logical Security Concepts

  •    6.3 Encryption

  •    6.4 PKI and Certificates

  •    6.5 Execution Control

  •    6.6 NAC

  •    6.7 Discussing Logical Decurity Concepts

  •    6.8 Threats and Vulnerablilities

  •    6.9 Types of Password Attacks

  •    6.10 Discussing Threats and Vulnerabilities

  •    6.11 Physical Security Controls

  •    6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data

  •    7.1 Policies to Protect Data

  •    7.2 Implement Security Best Practices

  •    7.3 Guidlines for Implementing Security Best Practices

  •    7.4 Discussing Security Best Practices Implementation

  •    7.5 Implement Data Protection Policies

  •    7.6 ACLs and Directory Permissions

  •    7.7 Full Disk Encryption

  •    7.8 Guildlines for Implementing Data Protection Policies

  •    7.9 Discussing Data Protection Policies

  •    7.10 Protect Data During Incident Response

  •    7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats

  •    8.1 Prevent Malware and Security Threats

  •    8.2 Detect, Remove, and Prevent Malware

  •    8.3 Trojan Horses and Spyware

  •    8.4 Sources of Malware Infection

  •    8.5 Best Practices for Malware Removal

  •    8.6 Discussing Detecting, Removing, and Preventing Malware Infections

  •    8.7 Troubleshoot Common Workstation Security Issues

  •    8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices

  •    9.1 Supporting and Troubleshooting Mobile Devices

  •    9.2 Secure Mobile Devices

  •    9.3 IOT Internet of Things

  •    9.4 Discussing Mobile Device Security

  •    9.5 Troubleshoot Mobile Device Issues

  •    9.6 Mobile Device Security Troubleshooting

  •    9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures

  •    10.1 Implementing Operational Procedures

  •    10.2 Environmental Impacts and Controls

  •    10.3 Discussing Environmental Impact and Controls

  •    10.4 Create and Maintain Documentation

  •    10.5 Discussing Documentation Creation and Maintenance

  •    10.6 Use Basic Change Management Best Practices

  •    10.7 Discussing Change Management Best Practices

  •    10.8 Implement Disaster Prevention and Recovery Methods

  •    10.9 Discussing Implement Disaster Prevention and Recovery Methods

  •    10.10 Basic Scripting Concepts

  •    10.11 Discussing Scripting

  •    10.12 Professionalism and Communication

  •    10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Content

Module 61 - CEH v11 Advanced Ethical Hacker Course Intro

  •    61.1 About This Course: Advanced Ethical Hacker

  •    61.2 About the Instructor

Module 62 - CEH v11 Session Hjacking

  •    62.1 Session Hijacking Concepts

  •    62.2 Token-based Authentication

  •    62.3 Compromising a Session Token

  •    62.4 XSS

  •    62.5 CSRF

  •    62.6 Other Attacks

Module 63 - CEH v11 Defending Against Hijacking

  •    63.1 Network Level Hijacking

  •    63.2 Session Hijacking Tools

  •    63.3 Session Hijacking Countermeasures

  •    63.4 Session Penetration Hijacking

  •    63.5 Review

Module 64 - CEH v11 Implementing Intrusion Detection

  •    64.1 IDS-IPS

  •    64.2 Snort

  •    64.3 Snort Rules

  •    64.4 Syslog

Module 65 - CEH v11 Testing Intrusion Detection

  •    65.1 WIPS

  •    65.2 IDS Considerations

  •    65.3 IDS Tools

  •    65.4 IDS Evasion

  •    65.5 IDS-Firewall Evasion Tools

  •    65.6 IDS Scenerios

Module 66 - CEH v11 Implementing Firewalls

  •    66.1 Firewalls

  •    66.2 Packet Filtering Rules

  •    66.3 Firewall Deployments

  •    66.4 Traffic Flow through Firewalls

  •    66.5 Split DNS

Module 67 - CEH v11 Testing Firewallls

  •    67.1 Firewall Tools

  •    67.2 Firewall Evasion

  •    67.3 Firewall Scenarios

Module 68 - CEH v11 Implementing Honeypots

  •    68.1 Honeypots

  •    68.2 Honeypot Detection

  •    68.3 IDS-Firewall Evasion Countermeasures

  •    68.4 IDS-Firewall Honeypot Penetration Testing

  •    68.5 Review

Module 69 - CEH v11 Attacker Webserver

  •    69.1 Webserver Security Overview

  •    69.2 Common Webservers

  •    69.3 Webserver Attacks

  •    69.4 Misconfiguration Attack Examples

Module 70 - CEH v11 Webserver Defense

  •    70.1 Webserver Attack Tools

  •    70.2 Attack Countermeasures

  •    70.3 Webserver Penetration Testing

  •    70.4 Review

Module 71 - CEH v11 Intro To Web Apps

  •    71.1 Web Application Concepts

  •    71.2 Attacking Web Apps

Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities

  •    72.1 A01 - Broken Access Control

  •    72.2 A02 - Cryptographic Failures

  •    72.3 A03 - Injection

  •    72.4 A04 - Insecure Design

  •    72.5 A05 - Security Misconfiguration

Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities

  •    73.1 A06 - Vulnerable and Outdated Components

  •    73.2 A07 - Identification and Authentication Failures

  •    73.3 A08 - Software and Data Integrity Failures

  •    73.4 A09 - Security Logging and Monitoring

  •    73.5 A10 - Server Side Request Forgery

Module 74 - CEH v11 Common Web App Attacks

  •    74.1 XSS Attacks

  •    74.2 CSRF

  •    74.3 Parameter Tampering

  •    74.4 Clickjacking

  •    74.5 SQL Injection

Module 75 - CEH v11 Unauthorized Access Through Web Apps

  •    75.1 Insecure Deserialization Attacks

  •    75.2 IDOR

  •    75.3 Directory Traversal

  •    75.4 Session Management Attacks

  •    75.5 Response Splitting

Module 76 - CEH v11 Web App Overflow Attacks

  •    76.1 Denial of Service

  •    76.2 Overflow Attacks

  •    76.3 XXE Attacks

  •    76.4 Soap Attacks

  •    76.5 Ajax Attacks

Module 77 - CEH v11 Defending Web Apps

  •    77.1 Web App Hacking Tools

  •    77.2 Web Hacking Countermeasures

  •    77.3 Web Application Penetration Testing

  •    77.4 Review

Module 78 - CEH v11 Intro To SQL Injection

  •    78.1 SQL Overview

  •    78.2 SQL Injection Concepts

  •    78.3 Basic SQL Injection

Module 79 - CEH v11 Performing SQL Injection

  •    79.1 Finding Vulnerable Websites

  •    79.2 Error-based SQL Injection

  •    79.3 Union SQL Injection

  •    79.4 Blind SQL Injection

  •    79.5 SQL Injection Scenarios

  •    79.6 Evading Detection

Module 80 - CEH v11 Defending Against SQL Injection

  •    80.1 SQL Injection Tools

  •    80.2 SQL Injection Countermeasures

  •    80.3 Safe Coding Examples

  •    80.4 SQL Wildcards

  •    80.5 SQL Injection Penetration Testing

  •    80.6 Review

Module 81 - CEH v11 Wireless Networking Overview

  •    81.1 Wireless Concepts

  •    81.2 Wireless Signal Encoding

  •    81.3 Wi-Fi Standards

  •    81.4 Wi-Fi Antennas

  •    81.5 Wireless Authentication

Module 82 - CEH v11 Wi-Fi Security

  •    82.1 Wi-Fi Security Standards

  •    82.2 Wireless Network Troubleshooting Tools

  •    82.3 Wi-Fi Discovery Tools

  •    82.4 Sniffing Wi-Fi

Module 83 - CEH v11 Hacking Wi-Fi

  •    83.1 Wi-Fi Attack Types

  •    83.2 Wi-Fi Rogue Access Point Attacks

  •    83.3 Wi-Fi Denial of Service Attacks

  •    83.4 Wi-Fi Password Cracking Attacks

  •    83.5 WEP Cracking

Module 84 - CEH v11 Advanced Wireless Attacks

  •    84.1 WPA-WPA2 Cracking

  •    84.2 WPA3 Attacks

  •    84.3 WPS Cracking

  •    84.4 Wi-Fi Attack Tools for Mobile Devices

  •    84.5 Bluetooth Hacking

  •    84.6 Other Wireless Hacking

Module 85 - CEH v11 Defending Wireless Networks

  •    85.1 Wireless Hacking Countermeasures

  •    85.2 Wireless Security Tools

  •    85.3 Wireless Penetration Testing

  •    85.4 Review

Module 86 - CEH v11 Mobile Platform Overview

  •    86.1 Mobile Platform Overview

  •    86.2 Mobile Device Vulnerabilities

  •    86.3 Mobile Device Attacks

Module 87 - CEH v11 Hacking Android

  •    87.1 Android

  •    87.2 Android Vulnerabilities

  •    87.3 Rooting Android

  •    87.4 Android Exploits

  •    87.5 Android Hacking Tools

  •    87.6 Reverse Engineering an Android App

  •    87.7 Securing Android

Module 88 - CEH v11 Hacking iOS

  •    88.1 iOS

  •    88.2 iOS Vulnerabilities

  •    88.3 Jailbreaking iOS

  •    88.4 iOS Exploits

  •    88.5 iOS Hacking Tools

  •    88.6 Securing iOS

Module 89 - CEH v11 Mobile Platform Defense

  •    89.1 Mobile Device Management

  •    89.2 BYOD

  •    89.3 Mobile Security Guidelines and Tools

  •    89.4 Mobile Device Penetration Testing

  •    89.5 Review

Module 90 - CEH v11 IoT Hacking

  •    90.1 loT Concepts

  •    90.2 loT Infrastructure

  •    90.3 Fog Computing

  •    90.4 loT Vulnerabilities

  •    90.5 loT Threats

Module 91 - CEH v11 IoT Defense

  •    91.1 IoT Hacking Methodologies and Tools

  •    91.2 IoT Hacking Methodolgies and Tools Part 2

  •    91.3 Hacking Countermeasures

  •    91.4 IoT Penetration Testing

  •    91.5 OT Concepts

  •    91.6 Industrial IoT

Module 92 - CEH v11 Operational Technology Overview

  •    92.1 IT-OT Convergence

  •    92.2 ICS

  •    92.3 SCADA

  •    92.4 DCS

  •    92.5 RTU

  •    92.6 PLC

  •    92.7 Addition OT Components

Module 93 - CEH v11 Hacking OT

  •    93.1 OT Variables

  •    93.2 Well-known OT attacks

  •    93.3 OT Attack Methodology and Basic Tools

  •    93.4 OT Reconnaissance

  •    93.5 OT Penetration and Control

Module 94 - CEH v11 Defending OT

  •    94.1 OT Attack Tools

  •    94.2 OT Hacking Countermeasures

  •    94.3 OT Penetration Testing

  •    94.4 Review

Module 95 - CEH v11 Attacking The Cloud

  •    95.1 Cloud Computing Concepts

  •    95.2 Virtualization

  •    95.3 Cloud Types

  •    95.4 Cloud Benefits and Considerations

  •    95.5 Cloud Risks and Vulnerablilities

Module 96 - CEH v11 Cloud Defense

  •    96.1 Cloud Threats and Countermeasures

  •    96.2 Cloud Security Tools

  •    96.3 Cloud Security Best Practices

  •    96.4 Cloud Penetration Testing

  •    96.5 Review

Module 97 - CEH v11 Cryptography Overview

  •    97.1 Cryptography Concepts

  •    97.2 Symetric Encryption

  •    97.3 Asymmetric Encryption

  •    97.4 Public Key Exchange

  •    97.5 PKI

Module 98 - CEH v11 Protecting Data With Crytography

  •    98.1 Digital Certificates

  •    98.2 Digital Signatures

  •    98.3 Hashing

  •    98.4 Email Encryption

  •    98.5 Network Communication Encryption

Module 99 - CEH v11 Protecting Data at Home and in Transit

  •    99.1 Disk Encryption

  •    99.2 VPN Encryption

  •    99.3 Cryptography Tools

Module 100 - CEH v11 Pentesting Cryptography

  •    100.1 Cryptography Attacks

  •    100.2 Cryptography Penetration Testing

  •    100.3 Review

  •    100.4 Conclusion

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Content

Module 21 - CEH v11 Ethical Hacker Course Intro

  •    21.1 About this course - Ethical Hacker

  •    21.2 About the Instructor

Module 22 - CEH v11 Intro to Footprinting

  •    22.1 Footprinting Concepts

  •    22.2 Footprinting Methodology

  •    22.3 OSINT Tools

  •    22.4 Advanced Google Search

  •    22.5 Whois Footprinting

  •    22.6 Activity - Performing a Whois Lookup

Module 23 - CEH v11 Footprinting Network Services

  •    23.1 DNS Footprinting

  •    23.2 Website Footprinting

  •    23.3 Email Footprinting

  •    23.4 Network Footprinting

  •    23.5 Footprinting through Social Networking Sites

Module 24 - CEH v11 Defend Against Footprinting

  •    24.1 Competitive Intelligence Gathering

  •    24.2 Footprinting Countermeasures

  •    24.3 Footprinting Penetration Testing

  •    24.4 Review

Module 25 - CEH v11 Intro to Scanning

  •    25.1 Scanning Concepts

  •    25.2 ICMP Discovery Scans

  •    25.3 Other Discovery Scans

Module 26 - CEH v11 Port Scanning

  •    26.1 Ports

  •    26.2 TCP Flags and Handshakes

  •    26.3 TCP Scan Types

  •    26.4 Other Scanning Techniques

Module 27 - CEH v11 Vulnerability Scanning

  •    27.1 Banner Grabbing

  •    27.2 Vulnerability Scanning

  •    27.3 SSDP Scanning

Module 28 - CEH v11 NMAP

  •    28.1 Nmap

  •    28.2 Common Nmap Scans

  •    28.3 Nmap Options

  •    28.4 Nmap Stealth Scans

  •    28.5 Hping and Other Scanners

Module 29 - CEH v11 Firewalls and Intrusion Detection

  •    29.1 Firewall Types

  •    29.2 Firewall Features

  •    29.3 Firewall Features Part 2

  •    29.4 Firewall Configurations

  •    29.5 Intrusion Detection and Prevention

Module 30 - CEH v11 Evading Detection

  •    30.1 Firewall and IDS Evasion

  •    30.2 Firewall and IDS Evasion Part 2

  •    30.3 Firewalking

  •    30.4 Probing a Firewall

  •    30.5 Probing a Firewall Part 2

Module 31 - CEH v11 Proxies and VPNs

  •    31.1 Proxies

  •    31.2 VPNs

  •    31.3 Tor

  •    31.4 Scanning Countermeasures

  •    31.5 Scanning Penetration Testing

  •    31.6 Review

Module 32 - CEH v11 Accessing Vulnerability

  •    32.1 Vulnerability Assessment Overview

  •    32.2 Vulnerability Scoring Systems

  •    32.3 Vulnerability Assessment Tools

Module 33 - CEH v11 Vulnerability Research

  •    33.1 Scanner Output and Reports

  •    33.2 Vulnerability Research

  •    33.3 Review

Module 34 - CEH v11 Intro to Enumeration

  •    34.1 Enumeration Concepts

  •    34.2 Enumeration Techniques and Tools

  •    34.3 Service and Application Enumeration

  •    34.4 SMB and NetBIOS Enumeration

Module 35 - CEH v11 Service Enumeration

  •    35.1 SNMP Enumeration

  •    35.2 LDAP Enumeration

  •    35.3 DNS Enumeration

  •    35.4 SMTP Enumeration

  •    35.5 NTP Enumeration

Module 36 - CEH v11 Advanced Enumeration

  •    36.1 Remote Connection Enumeration

  •    36.2 File Transfer Enumeration

  •    36.3 VoIP Enumeration

  •    36.4 IPSEC Enumeration

  •    36.5 IPv6 Enumeration

  •    36.6 BGP Enumeration

Module 37 - CEH v11 Command Line Enumeration

  •    37.1 Windows Command Line Enumeration

  •    37.2 Linux Command Line Enumeration

  •    37.3 Linux Command Line Enumeration Part 2

Module 38 - CEH v11 Defending Against Enumeration

  •    38.1 Enumeration Countermeasures

  •    38.2 Enumeration Countermeasures Part 2

  •    38.3 Enumeration Penetration Testing

  •    38.4 Review

Module 39 - CEH v11 Intro to System Hacking

  •    39.1 System Hacking Concepts

  •    39.2 System Hacking Tools and Frameworks

  •    39.3 Searchsploit

  •    39.4 Compiling and Running Exploits

Module 40 - CEH v11 System Hacking with Metasploit

  •    40.1 Metasploit

  •    40.2 Metasploit Search

  •    40.3 Metasploit Exploits and Payloads

  •    40.4 Metasploit Meterpreter

  •    40.5 Metasploit Connectivity

  •    40.6 Metasploit Impersonation and Migration

Module 41 - CEH v11 Further Attacking a Compromised System

  •    41.1 Netcat

  •    41.2 Pivoting

  •    41.3 Netcat Relays

  •    41.4 Metasploit Post Exploitation Modules

  •    41.5 Common Operating System Exploits

Module 42 - CEH v11 Hacking an Operating System

  •    42.1 Hacking Windows

  •    42.2 Hacking Linux

  •    42.3 Network Service Exploits

  •    42.4 Password Attacks

Module 43 - CEH v11 Password Cracking Overview

  •    43.1 Dictionary Attack

  •    43.2 Brute Force Attack

  •    43.3 Password Spraying

  •    43.4 Rainbow Tables

Module 44 - CEH v11 Performing Password Attacks

  •    44.1 Network Service Password Attacks

  •    44.2 Password Cracking Tools

  •    44.3 Online Password Cracking Sites

  •    44.4 Windows Password Cracking

  •    44.5 Linux Password Cracking

  •    44.6 Other Methods for Obtaining Passwords

Module 45 - CEH v11 Using Exploits

  •    45.1 Keylogging

  •    45.2 Spyware

  •    45.3 Rootkits

  •    45.4 Buffer Overflows

  •    45.5 Privilege Escalation

  •    45.6 Hiding Files

Module 46 - CEH v11 Hiding Information

  •    46.1 Alternate Data Streams

  •    46.2 Steganography

  •    46.3 Creating and Maintaining Remote Access

  •    46.4 Hiding Evidence

Module 47 - CEH v11 Covering Tracks

  •    47.1 Covering Tracks in Windows

  •    47.2 Covering Tracks in Linux

  •    47.3 System Hacking Counter-Measures

  •    47.4 System Hacking Penetration Testing

  •    47.5 Review

Module 48 - CEH v11 Malware Overview

  •    48.1 Intro to Malware

  •    48.2 Virus Overview

  •    48.3 Virus Types

  •    48.4 Self-Hiding Viruses

  •    48.5 Worms

  •    48.6 Trojans

  •    48.7 Trojan Types

  •    48.8 RATS

Module 49 - CEH v11 Hacking With Malware

  •    49.1 Ransomware

  •    49.2 Botnets

  •    49.3 Covert Channel Trojans

  •    49.4 Banking Trojans

  •    49.5 Rootkits

Module 50 - CEH v11 Creating Malware

  •    50.1 Other Malware

  •    50.2 Malware Makers

  •    50.3 Dropper and Stage Creation

  •    50.4 Exploit Kits

Module 51 - CEH v11 Detecting Malware

  •    51.1 Malware Detection

  •    51.2 Malware Detection Part 2

  •    51.3 Malware Analysis

Module 52 - CEH v11 Defending Against Malware

  •    52.1 Malware Reverse Engineering

  •    52.2 Malware Countermeasures

  •    52.3 Malware Penetration Testing

  •    52.4 Review

Module 53 - CEH v11 Sniffing

  •    53.1 Sniffing Concepts

  •    53.2 Types of Sniffing

  •    53.3 Sniffing Protocols

  •    53.4 Sniffing Tools

Module 54 - CEH v11 Spoofing and MITM

  •    54.1 ARP

  •    54.2 ARP Spoofing

  •    54.3 MITM

  •    54.4 MAC Attacks

  •    54.5 MAC Spoofing

  •    54.6 DHCP Attacks

Module 55 - CEH v11 Defending Against Poisoning and Sniffing

  •    55.1 Name Resolution Poisoning

  •    55.2 VLAN Hopping

  •    55.3 Sniffing Counter Measures

  •    55.4 Sniffing Penetration Testing

  •    55.5 Review

Module 56 - CEH v11 Social Engineering

  •    56.1 Social Engineering Concepts

  •    56.2 Social Engineering Techniques

  •    56.3 Social Engineering Examples

  •    56.4 Social Engineering Tools

Module 57 - CEH v11 Defending Against Social Engineering

  •    57.1 Social Media

  •    57.2 Identity Theft

  •    57.3 Insider Threats

  •    57.4 Social Engineering Countermeasures

  •    57.5 Social Engineering Penetration Testing

  •    57.6 Review

Module 58 - CEH v11 Denial-of-Service

  •    58.1 DoS-DDoS Concepts

  •    58.2 Volumetric Attacks

  •    58.3 Fragmentation Attacks

  •    58.4 State Exhaustion Attacks

  •    58.5 Application Layer Attacks

Module 59 - CEH v11 Advanced DoS Attacks

  •    59.1 Protocol Attacks

  •    59.2 Other Attacks

  •    59.3 Botnets

Module 60 - CEH v11 Defending Against Denial-of-Service

  •    60.1 DoS-DDoS Attack Tools

  •    60.2 DoS-DDoS Countermeasures

  •    60.3 Dos Penetration Testing

  •    60.4 Review

HTML5 & CSS3 Web Design Fundamentals with JavaScript Course Content

Module 1 - HTML5-CSS3 Introduction

  •    1.1 Introduction to the Course

Module 2 - The Internet and World Wide Web

  •    2.1 The Internet and World Wide Web

Module 3 - HTML Fundamentals

  •    3.1 Web Development Tools

  •    3.2 HTML Skeletons

  •    3.3 Paragraph Elements

  •    3.4 Phrase Elements

  •    3.5 HTML Comments

  •    3.6 HTML Entities

Module 4 - CSS Fundamentals

  •    4.1 CSS Fundamentals

  •    4.2 Inline Styles

  •    4.3 Embedded Style Sheets

  •    4.4 External Style Sheets

  •    4.5. Selector Types

  •    4.6 Decendent Selectors

  •    4.7 CSS Colors

  •    4.8 ID Versus Class

  •    4.9 CSS Text Properties

  •    4.10 CSS Box Model

Module 5 - Images and Links

  •    5.1 Images and Links

  •    5.2 Image Elements

  •    5.3 Images with Hyperlinks

  •    5.4 Open Links in New Tab

  •    5.5 Telephone and Email Links

  •    5.6 Validate and Debug

Module 6 - Responsive Design

  •    6.1 Responsive Design

  •    6.2 Fixed Layouts

  •    6.3 Viewport Meta Element

  •    6.4 Usefull CSS Styles

Module 7 - Media Queries

  •    7.1 More About Responsive Design

  •    7.2 Global Changes

  •    7.3 Mobile Devices

  •    7.4 Manipulate Logo

Module 8 - Layouts

  •    8.1 Layouts

  •    8.2 Tablets Part 1

  •    8.3 Tablets Part 2

  •    8.4 Styling Part 1

  •    8.5 Styling Part 2

  •    8.6 Styling Part 3

  •    8.7 Styling Part 4

  •    8.8 Styling Part 5

  •    8.9 Styling Part 6

Module 9 - Tables

  •    9.1 Tables Part 1

  •    9.2 Tables Part 2

Module 10 - Multimedia

  •    10.1 Multimedia

  •    10.2 Multimedia Part 2

  •    10.3 Multimedia Part 3

Module 11 - Forms and JavaScript

  •    11.1 Forms and JavaScript

  •    11.2 jQuery

  •    11.3 Styling Tables

Module 12 - The Web Server

  •    12.1 The Web Server

Module 13 - Programming and JavaScript

  •    13.1 Data Types

  •    13.2 Global Methods

  •    13.3 Variables

  •    13.4 Conditional Statements

  •    13.5 Loops

  •    13.6 Operators

Module 14 - The Calculator

  •    14.1 Calculator Part 1

  •    14.2 Calculator Part 2

  •    14.3 Calculator Part 3

  •    14.4 Calculator Part 4

  •    14.5 Calculator Part 5

  •    14.6 Calculator Part 6

  •    14.7 Calculator Part 7

CompTIA Security+ SY0-601 (2022) Course Content

Module 1 - Introduction to Security

  •    1.1 Introduction to Security

Module 2 - Malware and Social Engineering Attacks

  •    2.1 Malware and Social Engineering Attacks

Module 3 - Basic Cryptography

  •    3.1 Basic Cryptography

Module 4 - Advanced Cryptography and PKI

  •    4.1 Advanced Cryptography and PKI

Module 5 - Networking and Server Attacks

  •    5.1 Networking and Server Attacks

Module 6 - Network Security Devices, Designs and Technology

  •    6.1 Network Security Devices, Designs and Technology

Module 7 - Administering a Secure Network

  •    7.1 Administering a Secure Network

Module 8 - Wireless Network Security

  •    8.1 Wireless Network Security

Module 9 - Client and Application Security

  •    9.1 Client and Application Security

Module 10 - Mobile and Embedded Device Security

  •    10.1 Mobile and Embedded Device Security

Module 11 - Authentication and Account Management

  •    11.1 Authentication and Account Management

Module 12 - Access Management

  •    12.1 Access Management

Module 13 - Vulnerability Assessment and Data Security

  •    13.1 Vulnerability Assessment and Data Security

Module 14 - Business Continuity

  •    14.1 Business Continuity

Module 15 - Risk Mitigation

  •    15.1 Risk Mitigation

Module 16 - Security Plus Summary and Review

  •    16.1 - Security Plus Summary and Review

Module 17 - Hands-On Training

  •    17.1 Hands-On Scanning Part 1

  •    17.2 Hands-On Scanning Part 2

  •    17.3 Hands-On Advanced Scanning

  •    17.4 Hands-On MetaSploit

  •    17.5 Hands-On BurpSuite

  •    17.6 Hands-On Exploitation Tools Part 1

  •    17.7 Hands-On Exploitation Tools Part 2

  •    17.8 Hands-On Invisibility Tools

  •    17.9 Hands-On Connect to Tor

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content

Module 1 - CEH v11 Foundations Course Introduction

  •    1.1 About this course: CEH Foundations

  •    1.2 About the Instructor

Module 2 - CEH v11 Introduction To Networking

  •    2.1 Networking Overview

  •    2.2 Network Scope

  •    2.3 Network Addressing

  •    2.4 Activity - Examining Network Addressing

Module 3 - CEH v11 Lan Components

  •    3.1 Protocols, Ports, Sockets

  •    3.2 Network Topologies

  •    3.3 LAN Devices

  •    3.4 LAN Devices Part 2

  •    3.5 VLANs

  •    3.6 Activity - Examining Ports and Sockets

  •    3.7 Activity - Examining Switches and VLANs

Module 4 - CEH v11 Routing and Network Access

  •    4.1 Routers

  •    4.2 Layer 3 Switches

  •    4.3 Modems and Remote Access

  •    4.4 Firewalls and Proxies

  •    4.5 Activity - Examining Routing

  •    4.6 Activity - Examining VLAN Routing

  •    4.7 Activity - Examining Firewall Rules

Module 5 - CEH v11 Intrusion Detection and Network Layers

  •    5.1 IDS and IPS

  •    5.2 OSI Model

  •    5.3 TCP-IP

  •    5.4 Activity - Examining Network Layers

Module 6 - CEH v11 Networking Protocols and Addressing

  •    6.1 Layer 4 Protocols

  •    6.2 Layer 3 Protocols

  •    6.3 Layer 2 Protocols

  •    6.4 IP Addressing

  •    6.5 Subnetting

  •    6.6 DHCP

  •    6.7 Activity - Examining TCP

  •    6.8 Activity - Examining UDP

  •    6.9 Activity - Examining IP

  •    6.10 Activity - Examining ICMP

  •    6.11 Activity - Examining ARP

Module 7 - CEH v11 Network Services

  •    7.1 DNS

  •    7.2 DNS Records

  •    7.3 NTP

  •    7.4 Authentication

  •    7.5 Biometrics

  •    7.6 Activity - Examining DNS

  •    7.7 Activity - Examining DNS Records

Module 8 - CEH v11 Access Control

  •    8.1 Local Authentication

  •    8.2 Directory Service Authentication

  •    8.3 Extending Authentication

  •    8.4 Authorization

  •    8.5 Activity - Testing Access Control

Module 9 - CEH v11 Intro to Linux

  •    9.1 Linux Overview

  •    9.2 Linux File System

  •    9.3 Linux Core Commands

  •    9.4 Linux Search and Read Commands

  •    9.5 Activity - Exploring Linux

  •    9.6 Activity - Using Linux Core Commands

  •    9.7 Activity - Using Linux Search Commands

  •    9.8 Activity - Using Linux Read Commands

Module 10 - CEH v11 Configuring Linux

  •    10.1 Linux File Permissions

  •    10.2 Linux Special Permissions

  •    10.3 Linux Configuration

  •    10.4 Linux Packages

  •    10.5 Linux User Management

Module 11 - CEH v11 Practicing Linux Configuration

  •    11.1 Activity - Setting Linux Permissions

  •    11.2 Activity - Setting Linux Special Permissions

  •    11.3 Activity - Managing Packages in Kali Linux

  •    11.4 Activity - Managing Users and Groups in Linux

Module 12 - CEH v11 Managing Linux

  •    12.1 Linux Job Scheduling

  •    12.2 Linux File, Directory, and Download Commands

  •    12.3 Linux System Commands

  •    12.4 Linux Network Management

  •    12.5 Linux Firewall

Module 13 - CEH v11 Practicing Linux Management

  •    13.1 Activity - Scheduling Tasks in Linux

  •    13.2 Activity - Using Linux File, Directory, and Download Commands

  •    13.3 Activity - Using Linux Edit and Archive Commands

  •    13.4 Activity - Compiling Malicious Code

  •    13.5 Activity - Using Linux Process and System Commands

  •    13.6 Activity - Using Linux Disk, Hardware, and Network Commands

Module 14 - CEH v11 Intro to Windows

  •    14.1 Windows Overview

  •    14.2 Windows Registry

  •    14.3 Windows Security

Module 15 - CEH v11 Windows Commands

  •    15.1 Windows Commands

  •    15.2 Windows Admin Commands

  •    15.3 Windows Network Commands

  •    15.4 Windows Run Line Commands

  •    15.5 Windows PowerShell

Module 16 - CEH v11 Practicing Windows Commands

  •    16.1 Activity - Using Windows Built-in Commands

  •    16.2 Activity - Using Windows Task Commands

  •    16.3 Activity - Using Windows Admin Commands

  •    16.4 Activity - Using Windows Network Commands

  •    16.5 Activity - Using Windows PowerShell

  •    16.6 Networking and OS Penetration Testing

  •    16.7 Review

Module 17 - CEH v11 Intro to Hacking

  •    17.1 Information Security Overview

  •    17.2 Hacking Concepts

  •    17.3 Ethical Hacking Concepts

  •    17.4 Penetration Testing

  •    17.5 Penetration Testing Part 2

  •    17.6 Activity - Performing a Static Code Review

Module 18 - CEH v11 Information Security

  •    18.1 Cyber Kill Chain Concepts

  •    18.2 Activity - Performing Weaponization

  •    18.3 Information Security

  •    18.4 Security Policies

  •    18.5 Security Controls

  •    18.6 Access Control

Module 19 - CEH v11 Protecting Data

  •    19.1 Data Protection

  •    19.2 Backup Sites

  •    19.3 Vulnerability Management

  •    19.4 SIEM

  •    19.5 Risks

Module 20 - CEH v11 Managing Risk

  •    20.1 Risk Management

  •    20.2 Incident Handling

  •    20.3 Information Security Laws and Standards

  •    20.4 Activity - Assessing Risk

  •    20.5 Ethical Hacking Penetration Testing

  •    20.6 Review

  •    20.7 Conclusion

Cisco 300-410 ENARSI - Implementing Cisco Enterprise Advanced Routing and Services Course Content

Module 1 - Welcome to ENARSI

  •    1.1 Welcome to ENARSI

  •    1.2 A Few Things Before We Start

Module 2 - EIGRP (Enhanced Interior Gateway Protocol)

  •    2.1 EIGRP Features

  •    2.2 EIGRP Operations

  •    2.3 EIGRP Exchange of Routing Information

  •    2.4 EIGRP Metrics

  •    2.5 EIGRP Queries

  •    2.6 EIGRP Obtaining a Default Route

  •    2.7 EIGRP Load Balancing

  •    2.8 EIGRP Authentication

  •    2.9 Troubleshooting EIGRP Part 1

  •    2.10 Troubleshooting EIGRP Part 2

  •    2.11 Troubleshooting EIGRP Part 3

  •    2.12 Troubleshooting EIGRP Part 4

Module 3 - OSPF (Open Shortest Path First)

  •    3.1 Implementing OSPF Part 1

  •    3.2 Implementing OSPF Part 2

  •    3.3 Implementing OSPF Part 3 DR BDR Election

  •    3.4 Implementing OSPF Part 4 LSA Types

  •    3.5 Implementing OSPF Part 5 OSPF States

  •    3.6 Optimizing OSPF Summarization

  •    3.7 Optimizing OSPF Default Routing

  •    3.8 Optimizing OSPF Authentication

  •    3.9 Optimizing OSPF Virtual Links

Module 4 - Route Redistribution

  •    4.1 Route Redistribution Introduction

  •    4.2 Route Redistribution Implementation

  •    4.3 Route Redistribution OSPF E1 or E2

  •    4.4 Route Redistribution Types

  •    4.5 Route Redistribution Manipulation & Filtering

  •    4.6 Route Redistribution Prefix-Lists

  •    4.7 Route Redistribution Route-Maps

Module 5 - Implementing Path Control

  •    5.1 Implementing Path Control

  •    5.2 Implementing Path Control Implementation

Module 6 - BGP (Border Gateway Protocol)

  •    6.1 BGP Fundamentals

  •    6.2 BGP Attributes

  •    6.3 BGP Path Selection Criteria

  •    6.4 BGP Transit AS

  •    6.5 BGP Split Horizon

  •    6.6 BGP Weight Attribute

  •    6.7 BGP Local Preference Attribute

  •    6.8 BGP MED Attribute

  •    6.9 BGP Route Filtering

  •    6.10 BGP Peer Groups

  •    6.11 BGP Route Reflectors

  •    6.12 BGP Authentication

  •    6.13 BGP Troubleshooting Part 1

  •    6.14 BGP Troubleshooting Part 2

Module 7 - Implementing VRF (Virtual Routing and Forwarding)

  •    7.1 Implementing VRF-Lite

Module 8 - Implementing DHCP

  •    8.1 Implementing DHCP

  •    8.2 Implementing DHCP Relay Manual Binding and Options

  •    8.3 Implementing DHCP SLAAC and DHCPv6

  •    8.4 Troubleshooting DHCP

Module 9 - Securing Cisco Routers (Control Plane)

  •    9.1 Securing Cisco Routers Control Plane Security CoPP

  •    9.2 Securing Cisco Routers Control Plane Security CoPP Implementation

Module 10 - Infrastructure Services

  •    10.1 Infrasctucture Services AAA

  •    10.2 Infrastructure Services SNMP

  •    10.3 Infrastructure Services SYSLOG

  •    10.4 Infrastructure Services SSH

  •    10.5 Infrastructure Services HTTP FTP SCP

  •    10.6 Infrastructure Services NetFlow

Adobe XD 2022 Course Content

Module 1 - Welcome to Adobe XD 2022

  •    1.1 Welcome to Adobe XD 2022

  •    1.2 What is Adobe XD 2022

Module 2 - Adobe XD 2022 Overview

  •    2.1 Adobe XD 2022 Overview

Module 3 - Designing in a Project with Adobe XD 2022

  •    3.1 Adobe XD 2022 Project Overview

  •    3.2 Designing Your First Screen in Adobe XD 2022

Module 4 - Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022

  •    4.1 Assets and Reusable Styles in Adobe XD 2022

  •    4.2 Responsive Resize in Adobe XD 2022

Module 5 - Images and Visual Effects in Adobe XD 2022

  •    5.1 Imports, Images, and Masks in Adobe XD 2022

  •    5.2 Special Visual Effects in Adobe XD 2022

Module 6 - Making Interactive Buttons in Adobe XD 2022

  •    6.1 Plugins in Adobe XD 2022

  •    6.2 Stacks in Adobe XD 2022

  •    6.3 Components in Adobe XD 2022

  •    6.4 Repeat Grid in Adobe XD 2022

Module 7 - Grouped Imports and Scroll Groups in Adobe XD 2022

  •    7.1 Grouped imports in Adobe XD 2022

  •    7.2 Scroll Groups in Adobe XD 2022

Module 8 - Prototyping and Animations in Adobe XD 2022

  •    8.1 Prototyping with Adobe XD 2022

  •    8.2 Animations in Adobe XD 2022

Module 9 - Exporting and Sharing with Adobe XD 2022

  •    9.1 Exports in Adobe XD 2022

  •    9.2 Adobe XD 2022 Conclusion

Adobe InDesign Course Content

Module 1 - Introduction To Adobe Indesign

  •    1.1 Intro-InDesign

  •    1.2 What is InDesign

Module 2 - Getting Started With Adobe InDesign

  •    2.1 Creating a New Document

  •    2.2 Importing Images and Understanding Links

  •    2.3 Embedding

  •    2.4 Navigating the Interface

  •    2.5 Manipulating Graphics

  •    2.6 Creating simple shapes

  •    2.7 Basic Tools

  •    2.8 Properties Panel

  •    2.9 Working with Layers

  •    2.10 Elements of Design

Module 3 - Understanding and Applying Colors

  •    3.1 Color Theory

  •    3.2 Color Swatches RGB vs Lab vs CMYK

  •    3.3 Understanding and Applying Gradients

Module 4 - Pages

  •    4.1 Pages Panel

  •    4.2 Parent Pages

Module 5 - Typography

  •    5.1 Typography

  •    5.2 Creating Text

  •    5.3 Character and Paragraph Formatting

  •    5.4 Character and Paragraph Styles

  •    5.5 Chaining Text Boxes Together

  •    5.6 OpenType

  •    5.7 Creating Outlines

  •    5.8 Working with Tables

Module 6 - Packaging and Exporting for Web and Print

  •    6.1 Preflight

  •    6.2 Packaging Your Document

  •    6.3 Exporting a PDF

  •    6.4 Exporting an Image Sequence

Module 7 - Principles of Design

  •    7.1 Principles of Design

Module 8 - Designing for Your Output

  •    8.1 Letterheads

  •    8.2 Business Cards

  •    8.3 Resume

  •    8.4 Brochures

  •    8.5 Types of Binding

  •    8.6 Impose

Module 9 - Advanced Techniques in InDesign

  •    9.1 Clipping Mask

  •    9.2 Step and Repeat

  •    9.3 GREP

  •    9.4 Layer Effects

  •    9.5 Page Tool

  •    9.6 Scripts

Module 10 - Interactivity in InDesign

  •    10.1 Interactivity

  •    10.2 Importing Media

  •    10.3 Using Multiple Pages in Interactivity

  •    10.4 Crating an Interactive Project

  •    10.5 Animation

  •    10.6 InDesign Conclusion

Adobe Illustrator Course Content

Module 1 - Introduction to Adobe Illustrator 2022

  •    1.1 Instructor Bio

  •    1.2 Course Introduction

Module 2 - Getting Started with Adobe Illustrator 2022

  •    2.1 What are Vectors

  •    2.2 Creating a New Document

  •    2.3 Navigating the Interface

Module 3 - Drawing

  •    3.1 Drawing and Manipulating Primitive Shapes

  •    3.2 Drawing Custom Shapes

  •    3.3 Importing Images

  •    3.4 Understanding Layers and Sublayers

  •    3.5 Additional Drawing and Manipulation Tools

Module 4 - Colors and Gradients

  •    4.1 Color Theory

  •    4.2 In-depth dive into Color Palette-

  •    4.3 Creating Color Swatches

  •    4.3.2 Gradient Mesh

Module 5 - Intermediate Illustration

  •    5.1 Appearance Palette

  •    5.2 Pathfinder Palette

  •    5.3.1 Recreating an Existing Logo

  •    5.3.2 Creating an icon from a Sketch

  •    5.3.3 Creating a vector illustration from a sketch

  •    5.3.4 Blending Modes

Module 6 - Typography

  •    6.1 Introduction to Typography

  •    6.2 Type Tools in Illustrator

  •    6.3 Envelope Warp and Mesh

  •    6.4 Breaking Text into Outlines

  •    6.5 Caligramme Demo

Module 7 - Live Trace, Paintbrush and Blob Brush

  •    7.1 Live Trace

  •    7.2 Paint Brush

Module 8 - Advanced Illustration

  •    8.1 Illustrating a face from a photo

  •    8.2 Illustrating the body

  •    8.3 Hair and emulating texture

  •    8.4 Adding a background

  •    8.5 Shadows and highlights

Module 9 - Exporting

  •    9.1 Differences Between File Formats

  •    Conclusion

CompTIA Network+ N10-008 Course Content