All Access IT Training – 1 Year
The Annual All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our Annual All-Access program.
Included In This Course
Closed Captions
Certificate of Completion
Our One Year All Access Library Includes
- Over 225+ courses
- Over 2,500 hours of video content
- Hands On Practice Activities
- Flashcards
- Games
- Practice Exam Questions/Test
- 24/7/365 On Demand Access For 1 Year
- Industry Leading Certified Instructors
- Certificate of Completion For Each Course You Finish
Access our extensive library of over 225 courses and 2,500 hours of instructional videos, taught by our instructors who are industry certified and have over 10+ years of experience in the related field. Content can be accessed anytime to match your busy schedule.
As a 1 Year Unlimited Library All Access subscriber, you will have access to all your training material 24 hours a day, 7 days a week. You can learn at your own pace, and go back to review topics as many times as you need. Plus, our 1 Year All Access Pass includes full access to our entire course library, so you can explore new courses and topics as you continue to grow and develop your skills.
The course material is continuously updated to reflect the latest industry changes. You will have access to all new courses and updates for as long as you remain a subscriber.
Your success is our top priority and we take our responsibility as a partner in your success very seriously. Our students have a 98% first time pass rate on major certification exams.
As technology changes, ITU is focused on delivering new and updated content so as technology changes, you always have access to up-skilling your knowledge through our online training. Looking for the same great training for a team? Be sure to look at our Team Training Packages that offer even greater value for multi-user licenses.
No matter your position in the IT industry, we have something for you. Covering all the best and most widely accepted major disciplines. It adds up to thousands of hours of high-quality online-focused IT training. You can trust ITU to give you an edge in the industry.
ITU is also focused on staying up-to-date. We have a team of instructional designers that are always working on new courses and updates to existing ones. As technology changes, we want to make sure our students are getting the most relevant and useful information possible.
The bottom line: an annual subscription to ITU Online Training is one of the best investments you can make in your professional development. And, since it’s a subscription, you always have access to the latest courses and future course releases at no extra charge. So, why wait? Get started today!
Join the thousands of students who have already benefited from our All Access Library Program!
P.S. – If you’re not sure which course is right for you, our team can help! Just reach out to us at support@ituonline.com.When you sign up for our 1 Year Unlimited Online Access, you’ll get access to our exclusive IT certification training videos that will help you prep for your exams. Plus, you’ll get access to all of our current courses and future course releases during your 1 Year access period at no extra charge. We want you to succeed and we are here for you! You’ll also get downloadable assets from your courses, so you can keep them forever and reference them anytime you need them.
Sign up today and get unlimited access to everything ITU has to offer!
The Ultimate in IT Training For Leading Technologies
No matter your position in the IT industry, we have something for you. From cloud and data center operations to networking and cybersecurity, we provide training that will help you further your career.
Our comprehensive library of courses covers the most important topics in IT. Whether you’re looking to improve your skills or learn new technologies, we have the resources you need.
Why Buy A Training Library?
Purchasing a library is the most cost-effective IT training you’ll ever buy. Just a few of the best reasons are:
- Always Be Up-to-date In The IT Field – Technology changes rapidly. As it changes, you have a great resource to learn new technologies. When we update courses and add new courses, you have full access to it all without addition payment. An exclusive to ITU Online training offered by no other IT training provider.
- Train On Your Time – There are no deadlines. Train whenever and wherever you want at your own pace.
- Expand Your IT Knowledge – Even if you only focus on a single technology now, always be open to learning new technologies. If you’re proficient in Microsoft Technologies, there’s no better time to become proficient in all things Cisco. The more you know, the more marketable you and the higher salaries you can command in your field of choice.
- Quite Simply, Learning Is Fun!
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Responsible Automated Intelligence (AI) Ethics Fundamentals Course Content
Introduction - Responsible Automated Intelligence Ethics
- Course Welcome
- Instructor Introduction
Module 1: Introduction to AI Ethics
- 1.1 Introduction to AI Ethics
- 1.2 Understanding AI Ethics
- 1.3 Ethical Frameworks and Principles in AI
- 1.4 Ethical Challenges
- 1.5 Whiteboard - Key Principles of Responsible AI
Module 2: Responsible AI Development
- 2.1 Responsible AI Development - Introduction
- 2.2 Responsible AI Development - Continued
- 2.3 Bias and Fairness in AI
- 2.4 Transparency in AI
- 2.5 Demonstration - Microsoft Responsible AI
- 2.6 Accountability and Governance in AI
Module 3: Privacy and Security with AI
- 3.1 Privacy and Security in AI
- 3.2 Data Collection and Usage
- 3.3 Risks and Mitigation Strategies
- 3.4 Ethical Data Management in AI
- 3.5 Demonstration - Examples of Privacy EUL
Module 4: Social and Ethical Impacts of AI
- 4.1 Social and Ethical Impacts of AI
- 4.2 Automation and Job Displacement
- 4.3 AI and Social Good
- 4.4 Demonstration - ChatGPT
- 4.5 Demonstration - Bard
Module 5: Policy Development
- 5.1 Policy Development
- 5.2 Ethical AI Leadership Culture
- 5.3 Ethical AI Policy Elements
- 5.4 Ethical AI in a Changing Landscape
- 5.5 Course Review
- 5.6 Course Closeout
Apache Kafka Fundamentals Course Content
Apache Kafka - Introduction
- Course Introduction
- Instructor Introduction
Module 1: Overview of Apache Kafka and Common Use Cases
- 1.1 Overview and Common Use Cases
- 1.2 What is Kafka
- 1.3 Kafka History
- 1.4 Kafka Use Cases
- 1.5 Kafka APIs
- 1.6 Kafka Pub Sub Patterns
- 1.7 Whiteboard Discussion- Use Case
Module 2: Kafka Core Concepts
- 2.1 Kafka Core Concepts
- 2.2 The Importance of Event Data Streams
- 2.3 Kafka Messaging, Topics, Partitions and Segments
- 2.4 Whiteboard - Kafka Components
- 2.5 Whiteboard - Brokers and Clusters
- 2.6 Kafka Streams and Patterns
- 2.7 Whiteboard - Zookeeper and Kraft
- 2.8 Demonstration - Kafka Connect
- 2.9 Whiteboard- - Architecture Deep Dive
- 2.10 Whiteboard - Kafka Design Patterns
Module 3: Installing and Deploying Kafka
- 3.1 Installing and Deploying Kafka
- 3.2 Demonstration - Kafka Resources and Licensing
- 3.3 Demonstration - Kafka Installation Options, Considerations and Requirements
- 3.4 Demonstration - Deployment and Environment
- 3.5 Demonstration - Starting Kafka
- 3.6 Demonstration - Terminating Kafka Environment
- 3.7 Whiteboard - Connections and Processing Events
- 3.8 Additional Resources
- 3.9 Putting it all together - Course Review
Leadership for Administrative Professionals Course Content
Module 1: Core Concepts of Leadership
- 1.1 - Understanding Leadership vs. Management
- 1.2 The Importance of Leadership in Administrative Roles
- 1.3 The Role of Influence Without Authority
Module 2: Developing Personal Leadership Skills
- 2.1 Self-Assessment with SWOT
- 2.2 Identifying and Leveraging Personal Strengths
- 2.3 Recognizing Weaknesses and Overcoming Threats
- 2.4 Enhancing Emotional Intelligence
Module 3 - Communication and Building Trust
- 3.1 Essential Communication Skills for Leaders
- 3.2 Building Credibility and Trust
- 3.3 Course Closeout
CompTIA Linux+ (XK0-005) Course Content
Module 1: Performing Basic Linux Tasks
- 1.1 Introduction to Linux XK0-005
- 1.2 Instructor Introduction
- 1.3 Course Introduction
- 1.4 Identify the Linux Design Philosophy
- 1.5 Enter Shell Commands
- 1.6 Shell Commands Activity
- 1.7 Get Help with Linux
Module 2: Managing Users and Groups
- 2.1 Assume Superuser Privileges
- 2.2 Create, Modify, and Delete Users
- 2.3 Create, Modify, and Delete Groups
- 2.4 Query Users and Groups
- 2.5 Configure Account Profiles
Module 3: Managing Permissions and Ownership
- 3.1 Modify File and Directory Permissions
- 3.2 Modify File and Directory Ownership
- 3.3 Configure Special Permissions and Attributes
- 3.4 Troubleshoot Permissions Issues
Module 4: Managing Storage
- 4.1 Create Partitions
- 4.2 Manage Logical Volumes
- 4.3 Mount File Systems
- 4.4 Manage File Systems
- 4.5 Navigate the Linux Directory Structure
- 4.6 Troubleshoot Storage Issues
- 4.7 Container Storage Management
- 4.8 Advanced Data Management and Security for Containers
Module 5: Managing Files and Directories
- 5.1 Create and Edit Text Files
- 5.2 Search for Files
- 5.3 Perform Operations on Files and Directories
- 5.4 Process Text Files
- 5.5 Manipulate File Output
Module 6: Managing Kernel Modules
- 6.1 Explore the Linux Kernel
- 6.2 Install and Configure Kernel Modules
- 6.3 Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- 7.1 Configure Linux Boot Components
- 7.2 Configure GRUB
Module 8: Managing System Components
- 8.1 Configure Localization Options
- 8.2 Configure GUIs
- 8.3 Manage Services
- 8.4 Troubleshoot Process Issues
- 8.5 Troubleshoot CPU and Memory Issues
- 8.6 - Troubleshooting With systemd
Module 9: Managing Devices
- 9.1 Identify the Types of Linux Devices
- 9.2 Configure Devices
- 9.3 Monitor Devices
- 9.4 Troubleshoot Hardware Issues
Module 10: Managing Networking
- 10.1 Identify TCP-IP Fundamentals
- 10.2 Identify Linux Server Roles
- 10.3 Connect to a Network
- 10.4 Configure DHCP and DNS Client Services
- 10.5 Configure Cloud and Virtualization Technologies
- 10.6 Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- 11.1 Identify Package Managers
- 11.2 Manage RPM Packages with YUM
- 11.3 Manage Debian Packages with APT
- 11.4 Configure Repositories
- 11.5 Acquire Software
- 11.6 Build Software from Source Code
- 11.7 Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- 12.1 Implement Cybersecurity Best Practices
- 12.2 Implement Identity and Access Management Methods
- 12.3 Configure SELinux or AppArmor
- 12.4 Configure Firewalls
- 12.5 Implement Logging Services
- 12.6 Back Up, Restore, and Verify Data
- 12.7 NFTables - Setting Up Advanced Firewalls
Module 13: Working with Bash Scripts
- 13.1 Customize the Bash Shell Environment
- 13.2 Identify Scripting and Programming Fundamentals
- 13.3 Write and Execute a Simple Bash Script
- 13.4 Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- 14.1 Schedule Jobs
- 14.2 Implement Version Control Using Git
- 14.3 Identify Orchestration Concepts
Module 15: Installing Linux
- 15.1 Prepare for Linux Installation
- 15.2 Perform the Installation
Module 16 - Working With Modern IT Infrastruture
- 16.1 - Infrastruture As Code (IAC)
- 16.2 - Containers, Cloud, and Orchestration Concepts
- 16.3 - Container Management
- 16.4 - Container and Cloud Networking Basics
FinOps Fundamentals Course Content
Module 1 - Key Elements of The FinOps Framework
- 1.1 - Introduction to FinOps
- 1.2 - Overview of the FinOps Framework
- 1.3 - The FinOps Lifecycle Phases
- 1.4 - The FinOps Principles
- 1.5 - Collaboration and Accountability in FinOps
- 1.6 - FinOps Persona and Allied Personas
- 1.7 - FinOps Domains Overview
Module 2 - FinOps Domain: Cloud Usage & Cost
- 2.1 - Understand Cloud Usage & Cost Introduction
- 2.2 - Data Ingestion
- 2.3 - Cost Allocation
- 2.4 - Reporting & Analytics
- 2.5 - Anomaly Management
Module 3 - FinOps Domain: Quantify Business Value
- 3.1 - Introduction to the Quantify Business Value
- 3.2 - Planning & Estimating
- 3.3 - Forecasting
- 3.4 - Budgeting
- 3.5 - Benchmarking
Module 4 - FinOps Domain: Optimize Cloud Usage & Cost
- 4.1 - Optimizing Cloud Usage and Costs Introduction
- 4.2 - Architecting for the Cloud
- 4.3 - Rate Optimization
- 4.4 - Workload Optimization
- 4.5 - Cloud Sustainability
- 4.6 - Licensing and SaaS
Module 5 - FinOps Domain: Manage the FinOps Practice
- 5.1 - Manage the FinOps Practice Overview
- 5.2 - FinOps Practice Operations
- 5.3 - Cloud Policy & Governance
- 5.4 - FinOps Assessment
- 5.5 - FinOps Tools & Services
- 5.6 - FinOps Education and Enablement
- 5.7 - Invoicing and Chargeback
- 5.8 - Onboarding Workloads
- 5.9 - Intersecting Disciplines
Module 6 - FinOps FOCUS
- 6.1 - Introduction to FinOps FOCUS
- 6.2 - Implementing FinOps FOCUS for AWS, Google Cloud, and Micro
Module 7 - FinOps Certifications and Course Closeout
- 7.1 - Exploring the FinOps Certifications
- 7.2 - Course Closeout and Next Steps
CyberArk Fundamentals Course Content
Module 1 - Overview of Privileged Access Management (PAM)
- 1.1 - Your Complete PAM Solution
- 1.2 - Overview of CyberArk
Module 2 - CyberArk Architecture and Componets
- 2.1 - CyberArk Architecture Overview
- 2.2 - CyberArk Deployment Models
Module 3 - Working With The CyberArk Vault
- 3.1 - The CyberArk Digital Vault
- 3.2 Managing Users and Permissions
Module 4 - Privileged Account Management
- 4.1 Add and Managing PAM Accounts
- 4.2 - Password Rotation and Policy Management
Module 5 - Monitoring and Session Management
- 5.1 - Using the Privileged Session Manager (PSM)
- 5.2 - Session Monitoring and Reporting
Module 6 - Security Best Practices
- 6.1 - CyberArk Hardening and Best Practices
- 6.2 - Incident Reponse With CyberArk
Module 7 - Use Cases, Certification & Closeout
- 7.1 - Real World Use Cases of CyberArk
- 7.2 - CyberArk Certification Paths
- 7.3 - CyberArk Fundamentals Course Closeout
AI Fundamentals For Business Professionals Course Content
Introduction To AI For Business Professionals
- 01 Course Welcome
- 02 Instructor Introduction
- 03 Download Course Resources
Module 1 - Introduction to AI in Business
- 1.1 Introduction to AI in Business
- 1.2 Understanding the Basics of AI
- 1.3 Exploring the Role of AI in Business
- 1.4 Identifying the Benefits of AI in Business
- 1.5 Whiteboard - How Does AI Actually Work?
- 1.6 Demonstration - Google Bard AI
Module 2 - Implementing AI in Business
- 2.1 Implementing AI in Business
- 2.2 Preparing Your Business for AI Integration
- 2.3 Whiteboard AI Strategy
- 2.4 Identifying the Best AI Tools for Your Business
Module 3 - AI for Marketing and Sales
- 3.1 Demonstration - Hacksocial AI
- 3.2 How AI Can Help Your Marketing and Sales Efforts
- 3.3 Exploring AI-Driven Customer Insights and Targeting
- 3.4 Examples AI Sales Tools in 2023
- 3.5 Optimizing Your Marketing and Sales Strategies with AI
- 3.6 Demonstration - RegieAI Sales Workflows
Module 4 - AI Applications in Human Resources
- 4.1 AI Applications in Human Resources
- 4.2 Using AI for Talent Acquisition and Recruitment
- 4.3 Optimizing Performance Management with AI
- 4.4 Enhancing Employee Engagement with AI
- 4.5 Whiteboard - Resume Filtering with AI
Module 5 - AI for Operations and Supply Chain Managemen
- 5.1 AI for Operations and Supply Chain Management
- 5.2 How AI Can Improve Your Operations and Supply Chain Management
- 5.3 Exploring AI-Driven Predictive Maintenance and Quality Control
- 5.4 Optimizing Your Operations and Supply Chain Strategies with AI
Module 6 - AI for Finance and Accounting
- 6.1 AI for Finance and Accounting
- 6.2 How AI Can Streamline Your Finance and Accounting Processes
- 6.3 Exploring AI-Driven Fraud Detection and Risk Management
- 6.4 Personal Finance AI Applications
- 6.5 Optimizing Your Finance and Accounting Strategies with AI
- 6.6 Demonstration - Using Bing AI Chatbot for Personal Finance
Module 7 - The Future of AI in Business
- 7.1 The Future of AI in Business
- 7.2 Latest Developments in AI Technology
- 7.3 Implications of AI for Business and Society
- 7.4 Discussion - Developing an AI Strategy
Module 8 - Course Closeout
- 8.1 Course Closeout
- 8.2 Course Review
- 8.3 Course Closeout
CompTIA Data+ (DAO-001) Course Content
Introduction To CompTIA Data+
- Course Welcome
- Module Overview
- Instructor Introduction
- What is the CompTIA Data Plus Exam
- Roles that should consider the exam
- Exam Objectives
- Discussion - The Importance of Data
- US DOD Member Data Directives and 8570
Module 1 - Data Concepts and Environments
- 1.1 Module Overview
- 1.2 Understanding Data Schemes
- 1.3 Databases
- 1.4 Demonstration - Google Cloud SQL
- 1.5 Data Warehouses and Data Lakes
- 1.7 Comparing OLTP and OLAP Processing
- 1.8 Demonstration - AWS Redshift
- 1.9 Demonstration - Deploy SQL DemoBench
- 1.10 What is Column Database
- 1.11 Data Structures, Files and Types
- 1.12 Module Summary Review
- 1.13 Module Review Questions
Module 2 - Data Mining
- 2.1 Module 2 Overview
- 2.2 Data Acquisition and Integration
- 2.3 Demonstration - Data Integration Techniques
- 2.4 API Fundamentals
- 2.5 Demonstration - Google Vision API
- 2.6 Data Profiling and Cleansing
- 2.7 Data Collection Method Options
- 2.8 Data Outliers
- 2.9 Understanding ETL and ELT
- 2.10 Query Optimization
- 2.11 Understanding Data Manipulation Techniques
- 2.12 Module Summary Review
- 2.13 Module Review Questions
Module 3 - Data Analysis
- 3.1 Module Overview
- 3.2 Descriptive Statistical Methods
- 3.3 Measures of Tendency and Dispersion
- 3.4 Understanding Percentages
- 3.5 Inferential Statistical Methods
- 3.6 Hypothesis Testing with Excel
- 3.7 Whiteboard - Linear Regression and Correlation
- 3.8 Whiteboard - Analysis Testing
- 3.9 Module Summary Review
- 3.10 Module Review Questions
Module 4 - Data Visualization
- 4.10 Module Review Questions
- 4.1 Module Overview
- 4.2 Translate Business Requirements to Reports
- 4.3 Whiteboard - Translate Business Requirements
- 4.4 Dashboard Fundamentals
- 4.5 Demonstration - Dashboard Components
- 4.6 Data Sources and Attributes
- 4.7 Understanding Chart and Graphs
- 4.8 Reports Type and Elements
- 4.9 Module Summary Review
Module 5 - Data Governance, Quality and Controls
- 5.1 Module Overview
- 5.2 Introduction to Data Governance
- 5.3 The Data Lifecycle
- 5.4 Determining Data Classification
- 5.5 Data Ownership
- 5.6 Data Storage Access
- 5.7 Data Privacy and Frameworks
- 5.8 Information Rights Management (IRM) and Data Loss Prevention (DLP)
- 5.9 Setting Data Quality Control
- 5.10 Methods to Validate Quality
- 5.11 Data Transformation Tools
- 5.12 Data Security Fundamentals
- 5.13 Master Data Management (MDM)
- 5.14 Module Summary Review
- 5.15 Module Review Questions
Module 6 - Exam Preparation and Practice Exams
- 6.1 Module Overview
- 6.2 Course Summary Review
- 6.3 Data Plus Exam Experience
- 6.4 Certification CEU Requirements
- 6.5 Practice Exams-Additional Resources
- 6.6 Course Closeout
ISC(2) CC(sm) - Certified In Cybersecurity Course Content
Module 1 - Introduction and Security Concepts
- Certification Overview
- Exam Objectives
- Instructor Introduction
- ISC CiC Course Intro
- 1.0 Module 1 Overview
- 1.1.5 Password Security
- 1.1.6 Whiteboard - Multifactor Authentication (MFA)
- 1.2 Understand the risk management process
- 1.2.1 Risk Management
- 1.2.2 Risk Identification assessment and treatment
- 1.3 Understand security controls
- 1.3.1 Technical Controls
- 1.3.2 Administrative Controls
- 1.3.3 Physical Controls
- 1.3.4 Whiteboard Discussion - Controls-
- 1.3.5 Demonstration - AWS Access Controls
- 1.4 - Understand ISC2 Code of Ethics
- 1.4.1 Professional Code of Ethics
- 1.5 Understand Governance processes
- 1.5.1 Standards, Regulations, etc
- 1.5.2 Security Policies
- 1.5.3 Module Summary Review
- 1.5.4 Module Review Questions
Module 2 - Incident Response, Business Continuity and Disaster Recovery Concepts
- 2.0 Module 2 Overview
- 2.1 Understand Business Continuity
- 2.1.1 Business Continuity
- 2.1.2 Components of a Business Continuity Plan
- 2.2.1 Disaster Recovery
- 2.2.2 RTO-RPO
- 2.3 Understand Business Response
- 2.3.1 Incident Response
- 2.3.2 Post Incident Review
- 2.3.3 Module Summary Review
- 2.3.4 Module Review Questions
Module 3 - Access Control Concepts
- 3.0 Module 3 Overview
- 3.1 Understand physical access controls
- 3.1.1 Defense In Depth
- 3.1.2 Compare Physical Control Types
- 3.1.3 Monitoring Controls
- 3.2 Describe logical access controls
- 3.2.1 Logical Access controls
- 3.2.2 Principle of least privilege
- 3.2.3 Segregation of duties
- 3.2.4 Whiteboard - Access Control
- 3.2.5 Demonstration - Cloud IAM Sequence 32
- 3.2.6 Module Summary Review
- 3.2.7 Module Review Questions
Module 4- Network Security
- 4.0 Module 4 Overview
- 4.1 Understanding computer networking
- 4.1.1 Network Security Design
- 4.1.2 Whiteboard - Networking Concepts
- 4.1.3 Networking protocols and ports
- 4.1.4 Demonstration - AWS VPC
- 4.2 Understand Network Threats
- 4.2.1 Types of network (cyber) threats and attacks
- 4.2.2 Threat Actors
- 4.2.3 Tools used to identify and prevent threats
- 4.2.4 Whiteboard Discussion - DDoS attacks
- 4.3 Network Security Infrastructure
- 4.3.1 On Premises Architecture
- 4.3.2 Data Center Design Discussion
- 4.3.3 Cloud Architecture Service and Deployment Models
- 4.3.4 Managed Service Providers
- 4.3.5 Service Level Agreements (SLA)
- 4.3.6 Shared Security Model
- 4.3.7 Zero Trust
- 4.3.8 Module Summary Review
- 4.3.9 Module Review Questions
Module 5 - Security Operations
- 5.0 Module 5 Overview
- 5.1 Understand Data Security
- 5.1.1 Data Security Fundamentals
- 5.1.2 Data Handling Best Practices
- 5.1.3 Encryption
- 5.1.4 Data Security Compliance
- 5.2 Understand System Hardening
- 5.2.1 System Hardening
- 5.2.2 Configuration Management
- 5.3 Understanding Best Practice Security Policies
- 5.3.1 Common Security Policies
- 5.3.2 Demonstration - AUP
- 5.3.3 Demonstration - Privacy Policy
- 5.4 Security Awareness Training
- 5.4.1 Importance of Security Awareness Training
- 5.4.2 Social Engineering
- 5.4.3 Module Summary Review
- 5.4.4 Module Review Questions
- 5.4.5 Next Steps and Course Closeout
Windows Server 2022 - Installation and Deployments Course Content
Module 1 - Introduction To Windows Server 2022
- 1.1 - Windows Server 2022 Overview
- 1.2 - Preparing for Installation
Module 2 - Installation of Windows Server 2022
- 2.1 - Installation Methods for Windows Server 2022
- 2.2 - Performing A Clean Install
- 2.3 - Post-Installation Configurations
Module 3 - Server Roles and Features
- 3.1 - Server Roles and Features
- 3.2 - Installing Active Directory
- 3.3 - Verify and Update DNS Settings
- 3.4 - Installing DHCP
- 3.5 - Installing IIS
- 3.6 - Power of Hyper-V on Windows Server 2022
- 3.7 - Other Common Server Roles & Services
Module 4 - Deployment Tools
- 4.1 - Deployment Techniques
- 4.2 - Deploying Windows Server 2022 Using Windows Deployment Services (WDS)
- 4.3 - Using Microsoft Deployment Toolkit (MDT)
- 4.4 - SCCM Deployment
Module 5: Security and Maintenance
- 5.1 - Securing Windows Server 2022
- 5.2 - Managing Updates and Patches
- 5.3 - Monitoring and Performance Tuning
- 5.4 - Backup and Recovery
- 5.5 - Regular Maintenance Task
Module 6: Integrating Windows Server 2022 with Azure
- 6.1 - Integrating Windows Server 2022 with Azure
- 6.2 - Course Closeout
Cybersecurity Essentials: Protecting Yourself in the Digital Age Course Content
Module 1 - Understanding Cyber Threats
- 1.1 - Welcome to Essential Cybersecurity 101
- 1.2 - 5 Cyber Threats and How to Stay Safe
Module 2 - Defending Against Cyber Attacks
- 2.1 - Defending Against Ransomware
- 2.2 - Phishing Attack Awareness
Module 3 - Securing Your Digital Environment
- 3.1 - Securing Your Home Network
- 3.2 - Best Practices for Securing Work-from-Home Devices and Data
Module 4 - The Human Element of Cybersecurity
- 4.1 - Understanding Social Engineering
- 4.2 - Protecting Your Digital Identity
Module 5 - The Role of AI in Cybersecurity
- 5.1 - AI Powered Threat Detection and Prevention
- 5.2 - AI in Cybersecurity Incident Response and Fraud Detection
CompTIA Tech+ (FC0-U71) Certification Preparation Course Content
Module 1 - IT Concepts and Terminology
- 1.1 - Introduction to Tech+
- 1.2 - Understanding Notational Systems
- 1.3 - The Basics of Computing
- 1.4 - Comparing Units of Measure
- 1.5 - Troubleshooting Methodology, Cases and Tips
Module 2 - Infrastructure
- 2.1 - Introduction to Infrastructure
- 2.2 - Types of Computing Devices
- 2.3 - Internal Components of A Computer
- 2.4 - Types of Storage
- 2.5 - Peripheral Devices and Installation
- 2.6 - Virtualization and Cloud Technologies
- 2.7 - Common Internet Service Types
Module 3 - Networking Fundaments
- 3.1 - Introduction to Networking
- 3.2 - Core Principles of Computer Networking
- 3.3 - Network Ports
- 3.4 - Network Addresses and Identifiers
- 3.5 - Network Models and Types
- 3.6 - Networking Devices and Connectors
- 3.7 - Small Wireless Networks
Module 4 - Operating Systems
- 4.1 Introduction to Operating Systems (OS)
- 4.2 - What is an Operating System_
- 4.3 - Drivers, Applications, Tasks and System Services
- 4.4 - File and Disk Management
- 4.5 - Backup and Recovery
Module 5 - Software and Applications
- 5.1 - Common Software Applications
- 5.2 - Productivity Software
- 5.3 - Business and Enterprise Software
- 5.4 - Manging Software
- 5.5 - Trusted Software Sources
Module 6 - Web Browsing, Configuration & Security
- 6.1 - Introduction To Web Browsing
- 6.2 - Browser Settings, Configuration and Maintenance
- 6.3 - Secure Web Browsing
- 6.4 - Protecting Your Privacy
Module 7 - Software Development Concepts
- 7.1 - Introduction to Programming
- 7.2 - Programming Tools
- 7.3 - Programming Organization and Logic Flows
- 7.4 - Understanding Programming Language Categories
- 7.5 - Code Maintenance, Version Control Systems and Branching
- 7.6 - Fundamental Data Types and Their Characteristics
Module 8 - Data and Database Fundamentals
- 8.1 - Introduction to Databases and the Value of Data
- 8.2 - Database Concepts and Structures
- 8.3 - Working with Relational Databases
- 8.4 - Database Operations and Access
- 8.5 - Database Backup and Recovery
Module 9 - Security: Keeping Things Safe
- 9.1 - Basic Security Concepts and Strategies
- 9.2 - Identifying Common Security Threats
- 9.3 - Securing Devices and Networks
- 9.4 - Security Tools and Software
- 9.5 - Encryption and Data Protection
Module 10 - AI Uses and Impact
- 10.1 - The Impact and Use of AI
- 10.2 - Course Closeout
Cisco 200-301 v1.1 CCNA Course Content
Module 1: CCNA 200-301 v1.1 Network Fundamentals
- 1.1 Intro to Networking
- 1.2 OSI Model
- 1.3 TCP-IP
- 1.4 Network Components
- 1.5 Network Topology
- 1.6 Copper Cable Types
- 1.7 Fiber Optic Cable Types
Module 2: CCNA 200-301 v1.1 Network Device Management
- 2.1 Connecting to a Cisco Device
- 2.1.1 ACTIVITY - Intro to Packet Tracer
- 2.2 Basic Cisco Commands
- 2.2.1 ACTIVITY - Navigating the CLI
- 2.3 Configuring for Connectivity
- 2.3.1 ACTIVITY - Configuring a Router Interface
- 2.3.2 ACTIVITY - Making a Remote Telnet Connection
- 2.3.3 ACT - Making a Remote SSH Connection
- 2.4 Neighbor Discovery
- 2.4.1 ACT - Discovering Neighbors
- 2.5 Basic Troubleshooting
- 2.6 Review
Module 3: CCNA 200-301 v1.1 Switching
- 3.1 Ethernet Basics
- 3.2 Switching Overview
- 3.2.1 ACTIVITY - Setting Up a Simple Switched Network
- 3.3 Spanning-Tree Protocol
- 3.4 Rapid PVST+
- 3.5 VLANs
- 3.6 VLAN Trunking Protocol
- 3.6.1 ACTIVITY - Creating Trunk Links
- 3.7 VLAN Trunking Protocol (VTP)
- 3.8 VLAN Routing
- 3.8.1 ACTIVITY - Configuring the VLAN 1 Interface on a Switch
- 3.8.2 ACTIVITY - Routing Between VLANs
- 3.9 Switchport Configuration
- 3.9.1 ACTIVITY - Configuring Voice and Data VLANs
- 3.10 EtherChannel
- 3.10.1 ACTIVITY - Bundling Links into an EtherChannel
- 3.11 Review
Module 4: CCNA 200-301 v1.1 Internet Protocol (IP)
- 4.1 IPv4 Basics
- 4.2 IP Packet and Interface Types
- 4.3 Binary Numbering System
- 4.4 Classful and Classless Addressing
- 4.5 IPv4 Subnetting
- 4.5.1 ACTIVITY - Moving the Subnet Mask
- 4.6 Subnetting in Other Octets
- 4.6.1 ACTIVITY - Subnetting
- 4.6.2 ACTIVITY - Subnetting by Host Requirements
- 4.6.3 ACTIVITY - Grouping Hosts into Subnets
- 4.7 Supernetting
- 4.7.1 ACTIVITY - Supernetting
- 4.8 IPv6
- 4.9 Review
Module 5: CCNA 200-301 v1.1 Routing
- 5.1 Introducing the Route
- 5.2 Routing Basics
- 5.3 Packet Delivery on the Same Network
- 5.4 IP Routing Across a Single Router
- 5.4.1 ACTIVITY - Configuring Basic Routing
- 5.5 IP Routing Across Multiple Routers
- 5.5.1 ACTIVITY - Configuring IPv4 Static Routes
- 5.5.2 ACTIVITY - Adding Special Static Routes
- 5.6 Routing Protocols Overview
- 5.7 Route Selection
- 5.8 Open Shortest Path First (OSPF)
- 5.8.1 ACTIVITY - Deploying Single Area OSPF
- 5.9 First Hop Redundancy Protocol (FHRP)
- 5.10 Network Address Translation (NAT)
- 5.10.1 ACTIVITY - Implementing Static NAT
- 5.10.2 ACTIVITY - Using a NAT Pool
- 5.10.3 ACTIVITY - Configuring PAT
- 5.11 Review
Module 6: CCNA 200-301 v1.1 IP Services
- 6.1 Remote Control
- 6.2 File Transfer
- 6.3 Monitoring
- 6.4 Infrastructure
- 6.4.1 ACTIVITY - Implementing a DHCP Relay
- 6.5 Quality of Service
- 6.6 Review
Module 7: CCNA 200-301 v1.1 Wireless
- 7.1 Wi-Fi Principles
- 7.2 Cisco Wireless Architectures
- 7.3 WLC Configuration
- 7.3.1 ACT - Configuring a WLAN
- 7.4 Review
Module 8: CCNA 200-301 v1.1 Security Fundamentals
- 8.1 Intro to Security
- 8.2 Local Device Access Control
- 8.3 Protecting Privileged EXEC Mode
- 8.4 Password Management
- 8.5 Local User
- 8.6 Password Recovery
- 8.6.1 ACTIVITY - Password Recovery
- 8.7 Remote Access
- 8.8 Access Control List (ACL)
- 8.8.1 ACTIVITY - Deploying a Standard ACL
- 8.8.2 ACTIVITY - Deploying an Extended ACL
- 8.9 DHCP Snooping
- 8.10 Dynamic ARP Inspection (DAI)
- 8.11 Layer 2 Port Security
- 8.11.1 ACTIVITY - Securing Layer 2 Ports
- 8.12 Authentication, Authorization and Accounting (AAA)
- 8.13 Wireless Security
- 8.14 Review
Module 9: CCNA 200-301 v1.1 Automation and Programmability
- 9.1 Network Automation Overview
- 9.2 Software Defined Networks
- 9.3 JSON
- 9.4 REST APIs
- 9.5 Management Mechanisms
- 9.6 AI in Network Operations
- 9.7 Review
Project Management Professional PMP PMI V7 Course Content
Module 1: Preparing for and Taking the PMI PMP v7 Exam
- 1.1 Preparing to Take the PMP v7 Exam From PMI
- 1.2 PMI PMP v7 Exam Characteristics
Module 2: Process Domain - PMI - PMP v7
- 2.1 What’s New in PMBOK 7
- 2.1.1 Performance Domains
- 2.2 Process Domain and Framework defined
- 2.3 Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- 2.4 Framework Definitions
- 2.5 Project Manager Skills
- 2.6 Framework Key Points to Remember
- 2.6.1 Framework Key Points to Remember -Incorporating Agile
- 2.7 Framework Example Questions Review
- 2.8 Project Integration Management Knowledge Area Defined
- 2.9 Develop Project Charter and Develop Project Management Plan
- 2.10 Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- 2.11 Perform Integrated Change Control
- 2.12 Close Project or Phase
- 2.13 Integration Key Points to Remember
- 2.13.1 Integration Key Points to Remember - Incorporating Agile
- 2.14 Integration Example Questions Review
- 2.15 Project Scope Management Knowledge Area Defined
- 2.16 Plan Scope Management and Collect Requirements
- 2.17 Define Scope and Create WBS
- 2.18 Breakdown Structures used in WBS Dictionary
- 2.19 Validate Scope and Control Scope
- 2.20 Defining Requirements in Agile
- 2.21 Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- 2.22 Scope Key Points to Remember
- 2.22.1 Scope Key Points to Remember - Incorporating Agile
- 2.23 Scope Example Questions Review
- 2.24 Project Schedule Management Knowledge Area Defined
- 2.25 Plan Schedule Management, Define Activities, and Sequence Activities
- 2.26 Dependencies, Predecessors, Leads, and Lags
- 2.27 Estimate Activity Durations
- 2.28 Develop Schedule
- 2.29 Critical Path Method
- 2.30 Schedule Compression
- 2.31 Resource Leveling, Schedule Format, and Control Schedule
- 2.32 Agile Estimating
- 2.33 Agile Schedule Planning and Reporting
- 2.34 Schedule Key Points to Remember and Example Question review
- 2.35 Project Cost Management Knowledge Area Defined
- 2.36 Plan Cost Management and Estimate Cost
- 2.37 Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- 2.38 Life Cycle Costing, Status Reporting, and Determine Budget
- 2.39 Control Costs, and Earned Value Management
- 2.40 Earned Schedule, and Agile Cost Control
- 2.41 Cost Key Points to Remember
- 2.41.1 Cost Key Points to Remember - Incorporating Agile
- 2.42 Cost Example Questions Review
- 2.43 Project Quality Management Knowledge Area Defined
- 2.44 Plan Quality Management
- 2.45 Manage Quality
- 2.46 Control Quality
- 2.47 Continuous Improvement in Agile-Adaptive Life Cycles - Kaizen and Process Analysis
- 2.48 Continuous Improvement in Agile-Adaptive Life Cycles - Retrospectives
- 2.49 Quality Key Points to Remember
- 2.49.1 Quality Key Points to Remember - Incorporating Agile
- 2.50 Quality Example Questions Review
- 2.51 Project Risk Management Knowledge Area Defined
- 2.52 Risk Management Plan and Identify Risks
- 2.53 Risk Register and Issues Vs Risk
- 2.54 Perform Qualitative and Quantitative Risk Analysis
- 2.55 Plan Risk Responses
- 2.56 Implement Risk Responses and Monitor Risks
- 2.57 Agile Risk Tools and Risk Key Points to Remember
- 2.57.1 Agile Risk Tools and Risk Key Points to Remember - Incorporating Agile
- 2.58 Risk Example Questions Review
- 2.59 Project Procurement Management Knowledge Area Defined
- 2.60 Plan Procurement Management and Conduct Procurements
- 2.61 Contracts
- 2.62 Share and Point of Total Assumption
- 2.63 Procurement Documents
- 2.64 Non-Competitive Awards and Control Procurements
- 2.65 Agile Contracts
- 2.66 Procurement Key Points to Remember and Example Questions Review
- 2.66.1 Procurement Key Points to Remember - Incorporating Agile
Module 3: People Domain - PMI - PMP v7
- 3.1 People Domain and Project Communications Management Knowledge Area Defined
- 3.2 Plan Communications Management
- 3.3 Manage and Monitor Communications
- 3.4 Agile Communications
- 3.5 Communications Key Points to Remember
- 3.6 Communications Example Question Review
- 3.7 Project Stakeholder Management Knowledge Area Defined
- 3.8 Stakeholder Position Descriptions
- 3.9 Identify Stakeholders
- 3.9.1 Identify Stakeholders - Incorporating Agile
- 3.10 Plan Stakeholder Engagement and Manage Stakeholder Engagement
- 3.11 Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- 3.12 Stakeholder Management Key Points to Remember
- 3.12.1 Stakeholder Management Key Points to Remember - Incorporating Agile
- 3.13 Stakeholder Management Example Question Review
- 3.14 Resource Management Knowledge Area Defined
- 3.15 Plan Resource Management and Estimate Activity Resources
- 3.16 Acquire Resources and Develop Team
- 3.17 Manage Team
- 3.17.1 Manage Team - Focus on Servant Leadership
- 3.18 Control Resources and Agile Teaming Concepts
- 3.19 Other Agile Teaming Concepts
- 3.20 Agile team roles and challenges
- 3.21 Resources Key Points to Remember
- 3.22 Resources Example Question Review
Module 4: Business Environment Domain - PMI - PMP v7
- 4.1 Business Environment Domain Defined
- 4.1.1 Business Environment Domain Defined - Focus on Organization Chnge Management
- 4.2 Project Selection Tools
- 4.3 PMO, Organizational Structure, and Reports
- 4.3.1 PMO, Organizational Structure and Reports - Matching PMO's to PMBOK Terms
- 4.4 Agile in the Business Environment
- 4.5 Business Environment Key Points to Remember and Example Question Review
- 4.6 Test Taking Tips and Techniques for PMI PMP v7
- 4.6.1 Question Formats for PMI PMP v7
- 4.6.2 Post Certification Requirements for PMI PMP
- 4.7 Course Closing
Fundamentals of the Software Development Lifecycle (SDLC) Course Content
Module 1 - Introduction to SDLC
- 1.1 - Definition and Purpose of SDLC
- 1.2 - Overview of the SDLC Process
Module 2 - Phases of the SDLC
- 2.1 - Requirement Gathering and Analysis
- 2.2 - Planning Phase
- 2.3 - Design Phase
- 2.4 - Development Phase
- 2.5 - Testing Phase
- 2.6 - Deployment Phase
- 2.7 - Maintenance Phase
Module 3 - SDLC Methodologies
- 3.1 - Waterfall Methodology
- 3.2 - Agile Methodology
- 3.3 - Lean Methodology
- 3.4 DevOps Methodology
- 3.5 - DevOps vs. Agile
- 3.6 - Which Methodology To Use
Module 4 - Role of QA in SDLC
- 4.1 - Importance of QA in the Software Development Process
- 4.2 - QA Methodologies and Tools
Module 5 - Best Practices for Effective SDLC Management
- 5.1 - Project Management and Communications
- 5.2 - Risk Management In the SDLC
- 5.3 - Continuous Improvement and Feedback Loops
- 5.4 - Course Closeout
The Future of Work with AI Course Content
Module 1 - AI and the Workforce Transformation
- 1.1 - The Future of Work with AI Intro
- 1.2 - The Evolution of Work
- 1.3 - AI's Impact on Job Roles
- 1.4 - Emerging Job Roles in the Age of AI
Module 2 - Skills for the AI-Driven Economy
- 2.1 - The Importance of Adaptability and Lifelong Learnin
- 2.2 - Technical Skills and AI Literacy
- 2.3 - Critical Soft Skills in the AI Era
- 2.4 - The Role of Data in AI-Driven Decision Making
Module 3 - Preparing for AI-Driven Changes in the Workplace
- 3.1 - Organizational Strategies for AI Integration
- 3.2 - Workforce Reskilling and Upskilling
- 3.3 - The Role of Leadership in AI Transition
- 3.4 - Ethical Considerations and Workforce Well-being
Module 4 - Case Studies and Course Wrap-Up
- 4.1 - Practical AI Case Studies
- 4.2 - Developing a Personal or Organizational AI-Readines
- 4.3 - In Closing, Embrace, Not Fear AI
Navigating Change Management in IT Teams Course Content
Module 1 - Introduction to Change Management in IT
- 1.1 - Change Management Course Introduction
- 1.2 - Defining Change Management
- 1.3 - Types of Change
Module 2 - Strategies for Managing Resistance to Change
- 2.1 - Understanding Resistance to Change
- 2.2 - Proactive Strategies for Overcoming Resistance
- 2.3 - Building Resilience in IT Teams
Module 3 - Developing Communication Plans for Change Initiatives
- 3.1 - Role of Communication in Successful
- 3.2 - Crafting Clear and Consistent Messages
- 3.3 - Utilizing Various Communication Channels
Module 4 - Tools and Technologies for Supporting Change in IT Teams
- 4.1 - Digital Tools for Change Management
- 4.2 - Automation and Workflow Management
- 4.3 - Key Metrics for Tracking Change Management Success
Module 5 - Case Studies of Effective Change Management in IT
- 5.1 - Case Study 1: Changing To Agile
- 5.2 - Case Study 2: Cloud Migration
- 5.3 - Course Closeout
OWASP Top 10: Essential Web Application Security Risks Course Content
Module 1 - What Is OSWASP
- Module 1.1 - Introduction to OSWASP Top 10
Module 2 - Top 10 Web Application Security Risks
- Module 2.1 - Overview of Risks We Will Explore
- Module 2.2 - Injection
- Module 2.3 - Broken Authentication
- Module 2.4 - Sensitive Data Exposure
- Module 2.5 - XML External Entities (XXE)
- Module 2.6 - Broken Access Control
- Module 2.7 - Security Misconfiguration
- Module 2.8 - Cross-Site Scripting XSS
- Module 2.9 - Insecure Deserialization
- Module 2.10 - Using Vulnerable Components
- Module 2.11 - Insufficient Logging and Monitoring
- Module 2.12 - Course Conclusion
Microsoft SC-900: Security, Compliance & Identity Fundamentals Course Content
Module 1 - Security, Compliance, and Identity
- Module 1.1 - Course Introduction
- Module 1.2 - Core Concepts and Strategies
- Module 1.3 - Identity Concepts
Module 2 - Microsoft Entra ID Capabilities
- Module 2.1 - Microsoft Entra ID
- Module 2.2 - Entra ID Authentication
- Module 2.3 - Access Management Capabilities
- Module 2.4 - Entra ID Governance
- Module 2.5 - Entra ID Protection
Module 3 - Microsoft Security Solutions
- Module 3.1 - Exploring Core Infrastructure Services
- Module 3.2 - Security Management Capabilities
- Module 3.3 - Microsoft Sentinal
- Module 3.4 Microsoft Defender XDR
Module 4 - Microsoft Compliance Solutions
- Module 4.1 - Service Trust Portal and Privacy
- Module 4.2 - Microsoft Purview for Compliance
- Module 4.3 - Information Protection, Data Lifecycle Management, and Data Governance
- Module 4.4 - Insider Risk Capabilities
- Module 4.5 - eDiscovery and Audit
Project Management Essentials Course Content
Module 1 - Course Introduction and Overview
- Module 1.1 - Welcome and Course Objectives
- Module 1.2 - Introduction to PMBOK 7 Principles
- Module 1.3 - Defining Project Managment & Your Role
Module 2 - Project Scope, Estimating and Planning
- Module 2.1 - Defining the Project Scope
- Module 2.2 - Project Estimating Techniques
- Module 2.3 - Project Planning - Techniques and Task Breakdown
- Module 2.4 - Scheduling and Resource Management
Module 3 -Effective Communication and Stakeholder Management
- Module 3.1 - Communication Planning
- Module 3.2 - Stakeholder Management
- Module 3.3 - Team Collaboration
Module 4 - Risk Management and Adaptability
- Module 4.1 - Introduction to Risk Management
- Module 4.2 - Risk Identification and Analysis
- Module 4.3 - Risk Response Planning
Module 5 - Project Execution and Control
- Module 5.1 - Project Execution and Control
- Module 5.2 - Monitoring and Controlling the Project
Module 6 - Project Tools and Techniques
- Module 6.1 - Using Project Management Tools
- Module 6.2 - Tools for Different Methodologies
Module 7 - Closing the Project
- Module 7.1 - Project Closure
- Module 7.2 - Post Project Evaluations
Microsoft 365 Fundamentals - MS-900 Course Content
Module 1: Introduction to Cloud Concepts
- Module 1.1 - Course Introduction
- Module 1.2 - Introduction to Cloud Computing
- Module 1.3 - Microsoft SaaS, PaaS, IaaS Offerings
- Module 1.4 - Cloud, Hybrid, On-Premises Models - Benefits and Considerations
- Module 1.5 - Exploring Public, Private and Hybrid Cloud Models
- Module 1.6 - Cost Benefit of Cloud Solutions
- Module 1.7 - The Hybrid Work and Flexible Work Concept
- Module 1.8 - Introducing Microsoft Co-Pilot
- Module 1.9 - Microsoft 365 Tenant
Module 2: Microsoft 365 Apps and Services
- Module 2.1 - Core Productivity Solutions
- Module 2.2 - Work Management in Microsoft 365
- Module 2.3 - Collaboration Solutions
- Module 2.4 - Microsoft Teams and Teams Phone Deep Dive
- Module 2.5 - Extending Teams with Collaborative Apps
- Module 2.6 - Endpoint Management with Microsoft Intune
- Module 2.7 - Windows 365 vs. Azure Virtual Desktop
- Module 2.8 - Deployment and Update Channels for Microsoft 365
- Module 2.9 - Analytics in Microsoft 365
Module 3: Security, Compliance, Privacy, and Trust in Microsoft 365
- Module 3.1 - Identity and Access Management with Microsoft Entra
- Module 3.2 - Threat Protection - Defender Suite Overview
- Module 3.3 - Zero Trust Model and Compliance Solutions
- Module 3.4 - Information Protection and Data Residency
Module 4: Microsoft 365 Pricing, Licensing, and Support
- Module 4.1 - Understanding Microsoft 365 Pricing and Billing
- Module 4.2 - Licensing Options and Management
- Module 4.3 - Microsoft 365 Support, SLAs and Monitoring Service
- Module 4.4 - Microsoft 365 Fundamentals Course Closeout
AI Fundamentals - Getting Started With Artificial Intelligence Course Content
Module 1 - Getting Started With AI
- Module 1.1 Introduction To AI
- Module 1.2 Understanding The Types of AI
Module 2 - Programming Lanaguages, Tools and Platforms For AI Solutions
- Module 2.1 AI and Programming Languages
- Module 2.2 AI, Machine Learning and Deep Learning
- Module 2.3 AI Models
- Module 2.4 AI Services in the Cloud
Module 3 - Data Science Fundamentals for AI
- Module 3.1 Introduction to Data Science
- Module 3.2 Data Preparation Techniques
- Module 3.3 Exploratory Data Analysis (EDA)
Module 4 - AI In the Modern Workplace
- Module 4.1 AI In The Workplace
- Module 4.2 Data Analysis and Business Intelligence AI Tools
- Module 4.3 Automation and Workflow Management Tools
- Module 4.4 Natural Language Processing (NLP) Tools
- Module 4.5 Virtual Assistants and Chatbots
Module 5 - Ethical AI and Future Trends
- Module 5.1 Understanding Bias, Fairness, Privacy, and Security
- Module 5.2 Impact of AI on Jobs and Society
- Module 5.3 Emerging Trends in AI
- Module 5.4 AI Governance and Regulation
Module 6 - Monumental Leaps Forward With AI
- Module 6.1 AI for Social Good
- Module 6.2 AI in Creative Industries
- Module 6.3 AI in Cybersecurity
- Module 6.4 AI in Smart Cities and Infrastructure
Module 7 - AI Project Lifecycle Management
- Module 7.1 AI Project Lifecycle Management
- Module 7.2 Development and Implementation
- Module 7.3 Maintenance, Evaluation, and Scaling
Module 8 - AI Fundamentals Course Closeout
- Module 8.1 Course Closeout
CompTIA Security+ SY0-701 Course Content
Module 1 - SY0-701 General Security Concepts
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY - Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY - Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY - Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY - Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigations
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY - O.MG Cable Baiting
- 2.2.2 O.MG-No Cable
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY - Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY - Abusing Unsanitized Input
- 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY - Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY - Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY - Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY - Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
Module 3 - SY0-701 Security Architecture
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY - Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY - Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY - Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications - Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
Module 4 - SY0-701 Security Operations
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY - Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY - Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY - Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY - Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY - Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY - Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
Module 5 - SY0-701 Security Program Management and Oversight
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY - Conducting OSINT
- 5.5.2 ACTIVITY - Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
Data Security : Mastering PII Protection in Cybersecurity Course Content
Module 1 - Data Threats & ID Theft
- Module 1.1 - Introduction
- Module 1.2 - Data Threats & Costs
Module 2 - Device Security
- Module 2.1 - Device Access
- Module 2.2 - Device Management
Module 3 - Preventing Inadvertant Disclosure
- Module 3.1 - Inadvertant Disclosure
- Module 3.2 - Removing PII
- Module 3.3 - Social Engineering
Module 4 - Physical & Technical Safeguards
- Module 4.1 - Physical Security
- Module 4.2 - Issues With Public Networds
- Module 4.3 - Data Encryption and Destruction
- Module 4.4 - Incident Reporting
- Module 4.5 - Course Conclusion
CompTIA Cybersecurity Analyst CySA+ (CS0-003) Course Content
Module 1 - CompTIA CySA+ CS0-003 Basics
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certfication
Module 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations
- 2.1 Domain 1 - Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion - Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration - IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
Module 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management
- 3.1 Domain 2 - Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
Module 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response and Management
- 4.1 Domain 3 - Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Reponse
- 4.6 Detection and Analysis
- 4.7 Post Incident Activities
- 4.8 Containment, Eradication and Recovery
- 4.9 Module 4 Review
Module 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication
- 5.1 Domain 4 - Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPI's
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
Module 6 - CompTIA CySA+ CS0-003 - Course Closeout
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
Moving On-Site Infrastructure To The Cloud Course Content
Module 1 - Welcome and Course Introduction
- Module 1.0 - Introduction To Transitioning To The Cloud
- Module 1.1 - Who Is This Course For
- Module 1.2 - The Importance and Benefits Of Moving To The Cloud
- Module 1.3 - Module Recap
Module 2 - Understanding On-Site Infrastructure
- Module 2.1 - Defining On-Site Infrastructure
- Module 2.2 - Pros and Cons of On-Site Infrastructure
Module 3 - Types of Cloud Services
- Module 3.1 - What is Cloud Computing?
- Module 3.2 - Categories of Cloud Computing
- Module 3.3 - Key Advantages
- Module 3.4 - Key Considerations
- Module 3.5 - Recap
Module 4 - Why Transition To The Cloud?
- Module 4.1 - Cost-Efficiency
- Module 4.2 - Scalability
- Module 4.3 - Flexibility and Mobility
- Module 4.4 - Recap
Module 5 - Planning The Transition
- Module 5.1 - Assessing Current Infrastructure
- Module 5.2 - Choosing A Cloud Provider
- Module 5.3 - Budget and Timeline
- Module 5.4 - Recap
Module 6 - Key Steps in the Transition
- Module 6.1 - Data Migration
- Module 6.2 - Application Porting
- Module 6.3 - Employee Training
- Module 6.4 - Recap
Module 7 - Post-Transition Management
- Module 7.1 - Monitoring and Analytics
- Module 7.2 - Security Measures
- Module 7.3 - On-going Costs
- Module 7.4 - Recap
Combating Cyber Threats Mini Training Series Course Content
Combating Cyber Threats
- Chrys Thorsen - Webinar - Road To Zero
Microsoft Azure Administrator (AZ-104) Course Content
Module 1 - Azure Overview
- 1.0 Introduction to AZ-104
- 1.1 Cloud Computing
- 1.2 Cloud Services Benefits
- 1.3 Cloud Service Types
- 1.4 Azure Core Architectural Components
- 1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
- 1.5 Azure Compute Services
- 1.6 Azure Application Hosting Options
- 1.7 Azure Networking Services
- 1.8 Azure Storage Services
- 1.9 Azure Identity, Access, and Security
- 1.10 Azure Cost Management
- 1.10.1 ACTIVITY- Checking Your Azure Balance
- 1.11 Azure Governance and Compliance Tools
- 1.11.1 ACTIVITY- Assign an Azure Policy
Module 2 - Azure Tools
- 2.1 Azure Portal
- 2.1.1 ACTIVITY- Exploring the Azure Portal
- 2.2 Azure Monitoring Tools
- 2.3 Azure PowerShell
- 2.3.1 ACTIVITY- Using Azure PowerShell
- 2.4 Azure CLI
- 2.4.1 ACTIVITY- Using the Azure CLI
- 2.5 Azure Cloud Shell
- 2.6 ARM Templates
- 2.6.1 ACTIVITY- Using Templates to Deploy Resources
- 2.7 Azure Resource Manager
- 2.8 Hybrid Tools
Module 3 - Azure Identities and Governance
- 3.1 Azure AD Overview
- 3.1.1 ACTIVITY- Exploring Azure Active Directory
- 3.1.2 ACTIVITY- Adding a Custom Domain
- 3.2 Subscriptions
- 3.3 Users and Groups
- 3.3.1 ACTIVITY- Adding Azure Active Directory User
- 3.3.2 ACTIVITY- Bulk Inviting New Users
- 3.3.3 ACTIVITY- Creating Azure AD Groups
- 3.4 Authentication
- 3.5 SSPR
- 3.5.1 ACTIVITY- Implementing SSPR
- 3.6 Devices
- 3.7 Azure Roles
- 3.7.1 ACTIVITY- Assigning Azure Roles
- 3.8 Azure AD Roles
- 3.8.1 ACTIVITY- Assigning Azure AD Roles
- 3.9 Conditional Access
- 3.10 Authorization
- 3.10.1 ACTIVITY- Managing Licenses
- 3.11 Azure Policy
Module 4 - Azure Storage
- 4.1 Storage Accounts
- 4.1.1 ACTIVITY- Creating a Storage Account
- 4.2 Storage Types
- 4.2.1 ACTIVITY- Creating Storage Types
- 4.3 Azure Storage Tools
- 4.3.1 ACTIVITY- Azure Storage Explorer
- 4.4 Azure Files and File Sync
- 4.4.1 ACTIVITY- Deploying an Azure Files Share
- 4.5 Azure Storage Security
Module 5 - Azure Compute Resources
- 5.1 Virtual Machines
- 5.1.1 ACTIVITY- Create Virtual Machines
- 5.1.2 ACTIVITY- Delete a Virtual Machine
- 5.2 VM Availability
- 5.2.1 ACTIVITY- Increasing VM Availability
- 5.3 VM Extensions
- 5.4 Azure App Service
- 5.5 Azure Container Instances
- 5.6 Kubernetes
Module 6 - Azure Virtual Networks
- 6.1 Virtual Networks
- 6.1.1 ACTIVITY- Create a VNet
- 6.2 Network Security Groups-Part 1
- 6.2.1 Network Security Groups-Part 2
- 6.3 Azure Firewall
- 6.3.1 ACTIVITY- Deploying a Firewall
- 6.4 Azure DNS-Part 1
- 6.4.1 Azure DNS-Part 2
- 6.4.2 ACTIVITY- Implementing Azure DNS Zone6
- 6.5 Virtual Network Peering
- 6.5.1 ACTIVITY- VNet Peering
- 6.6 Azure VPN Gateway
- 6.7 ExpressRoute and Virtual WANs
- 6.8 Azure Load Balancer
- 6.9 Azure Application Gateway
- 6.10 Azure Routes
Module 7 - Azure Monitoring and Backup
- 7.1 Network Watcher
- 7.2 Azure Monitor
- 7.3 Azure Backup-Part 1
- 7.4 Azure Backup-Part 2
- 7.5 Azure Backup-Part 3
- 7.6 Conclusion to AZ-104
ChatGPT and AI Business Fundamentals Course Content
Module 1 - ChatGPT Fundamentals
- 1.1 Course Welcome
- 1.2 Instructor Introduction
- 1.3 Download Course Resources
- 1.4 ChatGPT Fundamentals
- 1.5 What is ChatGPT
- 1.6 Use Cases for ChatGPT
- 1.7 Role of ChatGPT
- 1.8 Future of ChatGPT
- 1.9 ChatGPT Statistics, Facts & Trends
- 1.10 Limitations
- 1.11 What is a Chatbot
- 1.12 Understanding AI-ML
- 1.13 Demonstration - Tools to Use with ChatGPT
- 1.14 Business Benefits
- 1.15 Whiteboard - How it all works
- 1.16 Demonstration - How to Get Started with ChatGPT
- 1.17 Demonstration - Example Prompts
- 1.18 Discussion - ChatGPT Performance Issues
- 1.19 Module Summary
Module 2 - ChatGPT Prompt Demonstrations
- 2.1 ChatGPT Prompt Demonstrations
- 2.2 What is a Prompt
- 2.3 Best Practices For Writing Prompts
- 2.4 Prompt Demonstration - Asking Questions
- 2.5 Prompt Demonstration - Top Ten Lists
- 2.6 Prompt Demonstration - Long Form Docs
- 2.7 Prompt Demonstration - Complex Form and Code
- 2.8 Prompt Demonstration - Feedback
- 2.9 Prompt Demonstration - Content Modification
- 2.10 Prompt Demonstration - Instruction Generation
- 2.11 Prompt Demonstration - Information Extraction
- 2.12 Prompt Demonstration - Writing Computer Code
- 2.13 Prompt Demonstration - Solving Math Problems
- 2.14 Prompt Demonstration - Create YT Video Outline
- 2.15 Prompt Demonstration - Write a Blog Article
- 2.16 Prompt Demonstration - SEO Keywords
- 2.17 Comparing Google Bard vs ChatGPT
- 2.18 Module Summary
- 2.19 Course Closeout
Certified Ethical Hacker (CEH) v12 Course Content
Module 1 - Introduction To Ethical Hacking
- 1.0 Introduction to CEH v12
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 Activity - Researching the MITRE ATTACK Framework
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Introduction to Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 Activity - Conduct OSINT with OSR Framework
- 2.2.2 Activity - OSINT with theHarvester
- 2.2.3 Activity - Add API Keys to theHarvester
- 2.2.4 Activity - Extract Document Metadata with FOCA
- 2.2.5 Activity - Extract Document Metadata with FOCA
- 2.3 Advanced Google Search
- 2.3.1 Activity - Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 Activity - Conducting Whois Research
- 2.5 DNS Footprinting
- 2.5.1 Activity - Query DNS with NSLOOKUP
- 2.6 Website Footprinting
- 2.6.1 Activity - Fingerprint a Webserver with ID Serve
- 2.6.2 Activity - Extract Data from Websites
- 2.6.3 Activity - Mirror a Website with HTTrack
- 2.7 Email Footprinting
- 2.7.1 Activity - Trace a Suspicious Email
- 2.8 Network Footprinting
- 2.9 Social Network Footprinting
- 2.10 Footprinting and Reconnaissance Countermeasures
- 2.11 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.2.1 Activity - ICMP ECHO and ARP Pings
- 3.2.2 Activity - Host Discovery with Angry IP Scanner
- 3.3 Port Scans
- 3.3.1 Activity - Port Scan with Angry IP Scanner
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.5.1 Activity - Hping3 Packet Crafting
- 3.5.2 Activity - Fingerprinting with Zenmap
- 3.6 NMAP
- 3.6.1 Activity - Nmap Basic Scans
- 3.6.2 Activity - Host Discovery with Nmap
- 3.6.3 - Activity - Nmap Version Detection
- 3.6.4 Activity - Nmap Idle (Zombie) Scan
- 3.6.5 Activity - Nmap FTP Bounce Scan
- 3.6.6 - Activity - NMAP Scripts
- 3.7 Firewall and IDS Evasion
- 3.7.1 Activity - Nmap Advanced Scans
- 3.8 Proxies
- 3.9 Scanning Countermeasures
- 3.10 Scanning Networks Review
Module 4: Enumeration
- 4.1 Enumeration Overview
- 4.2 SMB_NetBIOS_Enumeration
- 4.2.1 Activity - Enumerate NetBIOS Information with Hyena
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.4.1 - Activity - Enumerating WMI with Hyena
- 4.5 SNMP Enumeration
- 4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 Activity - Enumerate Email Users with SMTP
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 Activity - Enumerate a Website with DirBuster
- 4.11 Other Enumeration Types
- 4.12 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 Vulnerability Scanning with OpenVAS
- 5.2 Vulnerability Assessment
- 5.3 Vulnerability Analysis Review
Module 6: System Hacking
- 6.1 System Hacking Concepts
- 6.2 Common OS Exploits
- 6.3 Buffer Overflows
- 6.3.1 Activity - Performing a Buffer Overflow
- 6.4 System Hacking Tools and Frameworks
- 6.4.1 Activity - Hack a Linux Target from Start to Finish
- 6.5 Metasploit
- 6.5.1 Activity - Get Started with Metasploit
- 6.6 Meterpreter
- 6.7 Keylogging and Spyware
- 6.7.1 Activity - Keylogging with Meterpreter
- 6.8 Netcat
- 6.8.1 Activity - Using Netcat
- 6.9 Hacking Windows
- 6.9.1 Activity - Hacking Windows with Eternal Blue
- 6.10 Hacking Linux
- 6.11 Password Attacks
- 6.11.1 Activity - Pass the Hash
- 6.11.2 Activity - Password Spraying
- 6.12 Password Cracking Tools
- 6.13 Windows Password Cracking
- 6.13.1 Activity - Cracking Windows Passwords
- 6.13.2 Activity - Cracking Password Hashes with Hashcat
- 6.14 Linux Password Cracking
- 6.15 Other Methods for Obtaining Passwords
- 6.16 Network Service Attacks
- 6.16.1 Activity - Brute Forcing a Network Service with Medusa
- 6.17 Post Exploitation
- 6.18 Pivoting
- 6.18.1 & 6.18.2 Activity - Pivoting Setup and Attack
- 6.19 Maintaining Access
- 6.19.1 Activity - Persistence
- 6.20 Hiding Data
- 6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography
- 6.21 Covering Tracks
- 6.21.1 Activity - Clearing Tracks in Windows
- 6.21.2 Activity - View and Clear Audit Policies with Auditpol
- 6.22 System Hacking Countermeasures
- 6.23 System Hacking Review
Module 7: Malware Threats
- 7.1 Malware Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.3.1 Activity - Deploying a RAT
- 7.4 Rootkits
- 7.5 Other Malware
- 7.6 Advanced Persistent Threat
- 7.7 Malware Makers
- 7.7.1 Activity - Creating a Malware Dropper and Handler
- 7.8 Malware Detection
- 7.9 Malware Analysis
- 7.9.1 Activity - Performing a Static Code Review
- 7.9.2 Activity - Analyzing the SolarWinds Orion Hack
- 7.10 Malware Countermeasures
- 7.11 Malware Threats Review
Module 8: Sniffing
- 8.1 Network Sniffing
- 8.2 Sniffing Tools
- 8.2.1 Activity- Sniffing HTTP with Wireshark
- 8.2.2 Activity - Capturing Files from SMB
- 8.3 ARP and MAC Attacks
- 8.3.1 Activity - Performing an MITM Attack with Ettercap
- 8.4 Name Resolution Attacks
- 8.4.1 Activity - Spoofing Responses with Responder
- 8.5 Other Layer 2 Attacks
- 8.6 Sniffing Countermeasures
- 8.7 Sniffing Review
Module 9: Social Engineering
- 9.1 Social Engineering Concepts
- 9.2 Social Engineering Techniques
- 9.2.1 Activity - Deploying a Baited USB Stick
- 9.2.2 Activity - Using an O.MG Lightning Cable
- 9.3 Social Engineering Tools
- 9.3.1 Activity - Phishing for Credentials
- 9.4 Social Media, Identity Theft, Insider Threats
- 9.5 Social Engineering Countermeasures
- 9.6 Social Engineering Review
Module 10: Denial-of-Service
- 10.1 DoS-DDoS Concepts
- 10.2 Volumetric Attacks
- 10.3 Fragmentation Attacks
- 10.4 State Exhaustion Attacks
- 10.5 Application Layer Attacks
- 10.5.1 Activity - Performing a LOIC Attack
- 10.5.2 Activity - Performing a HOIC Attack
- 10.5.3 Activity - Conducting a Slowloris Attack
- 10.6 Other Attacks
- 10.7 DoS Tools
- 10.8 DoS Countermeasures
- 10.9 DoS Review
Module 11: Session Hijacking
- 11.1 Session Hijacking
- 11.2 Compromising a Session Token
- 11.3 XSS
- 11.4 CSRF
- 11.5 Other Web Hijacking Attacks
- 11.6 Network-Level Session Hijacking
- 11.6.1 Activity - Hijack a Telnet Session
- 11.7 Session Hijacking Tools
- 11.8 Session Hijacking Countermeasures
- 11.9 Session Hijacking Review
Module 12: Evading IDS, Firewalls, and Honeypots
- 12.1 Types of IDS
- 12.2 Snort
- 12.3 System Logs
- 12.4 IDS Considerations
- 12.5 IDS Evasion
- 12.5.1 Activity - Fly Below IDS Radar
- 12.6 Firewalls
- 12.7 Packet Filtering Rules
- 12.8 Firewall Deployments
- 12.9 Split DNS
- 12.10 Firewall Product Types
- 12.11 Firewall Evasion
- 12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall
- 12.11.2 Activity - Busting the DOM for WAF Evasion
- 12.12 Honeypots
- 12.13 Honeypot Detection and Evasion
- 12.13.1 Activity - Test and Analyze a Honey Pot
- 12.14 Evading IDS, Firewalls, and Honeypots Review
Module 13: Hacking Web Servers
- 13.1 Web Server Operations
- 13.2 Hacking Web Servers
- 13.3 Common Web Server Attacks
- 13.3.1 Activity - Defacing a Website
- 13.4 Web Server Attack Tools
- 13.5 Hacking Web Servers Countermeasures
- 13.6 Hacking Web Servers Review
Module 14: Hacking Web Applications
- 14.1 Web Application Concepts
- 14.2 Attacking Web Apps
- 14.3 A01 Broken Access Control
- 14.4 A02 Cryptographic Failures
- 14.5 A03 Injection
- 14.5.1 Activity - Command Injection
- 14.6 A04 Insecure Design
- 14.7 A05 Security Misconfiguration
- 14.8 A06 Vulnerable and Outdated Components
- 14.9 A07 Identification and Authentication Failures
- 14.10 A08 Software and Data integrity Failures
- 14.11 A09 Security Logging and Monitoring Failures
- 14.12 A10 Server-Side Request Forgery
- 14.13 XSS Attacks
- 14.13.1 Activity - XSS Walkthrough
- 14.13.2 Activity - Inject a Malicious iFrame with XXS
- 14.14 CSRF
- 14.15 Parameter Tampering
- 14.15.1 Activity - Parameter Tampering with Burp
- 14.16 Clickjacking
- 14.17 SQL Injection
- 14.18 Insecure Deserialization Attacks
- 14.19 IDOR
- 14.19.1 Activity - Hacking with IDOR
- 14.20 Directory Traversal
- 14.21 Session Management Attacks
- 14.22 Response Splitting
- 14.23 Overflow Attacks
- 14.24 XXE Attacks
- 14.25 Web App DoS
- 14.26 Soap Attacks
- 14.27 AJAX Attacks
- 14.28 Web API Hacking
- 14.29 Webhooks and Web Shells
- 14.30 Web App Hacking Tools
- 14.31 Hacking Web Applications Countermeasures
- 14.32 Hacking Web Applications Review
Module 15: SQL Injection
- 15.1 SQL Injection Overview
- 15.2 Basic SQL Injection
- 15.3 Finding Vulnerable Websites
- 15.4 Error-based SQL Injection
- 15.5 Union SQL Injection
- 15.5.1 Activity - Testing SQLi on a Live Website - Part 1
- 15.5.2 Activity - Testing SQLi on a Live Website - Part 2
- 15.6 Blind SQL Injection
- 15.7 SQL Injection Tools
- 15.7.1 Activity - SQL Injection Using SQLmap
- 15.8 Evading Detection
- 15.9 Analyzing SQL Injection
- 15.10 SQL Injection Countermeasures
- 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
- 16.1 Wireless Concepts
- 16.2 Wireless Security Standards
- 16.3 WI-FI Discovery Tools
- 16.4 Common Wi-Fi Attacks
- 16.5 Wi-Fi Password Cracking
- 16.6 WEP Cracking
- 16.6.1 Activity - Cracking WEP
- 16.7 WPA,WPA2,WPA3 Cracking
- 16.7.1 Activity - WPA KRACK Attack
- 16.8 WPS Cracking
- 16.9 Bluetooth Hacking
- 16.10 Other Wireless Hacking
- 16.10.1 Activity - Cloning an RFID badge
- 16.10.2 Activity - Hacking with a Flipper Zero
- 16.11 Wireless Security Tools
- 16.12 Wireless Hacking Countermeasures
- 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
- 17.1 Mobile Device Overview
- 17.2 Mobile Device Attacks
- 17.3 Android Vulnerabilities
- 17.4 Rooting Android
- 17.5 Android Exploits
- 17.5.1 Activity - Hacking Android
- 17.5.2 Activity - Using a Mobile Device in a DDoS Campaign
- 17.6 Android-based Hacking Tools
- 17.7 Reverse Engineering an Android App
- 17.8 Securing Android
- 17.9 iOS Overview
- 17.10 Jailbreaking iOS
- 17.11 iOS Exploits
- 17.12 iOS-based Hacking Tools
- 17.13 Reverse Engineering an iOS App
- 17.14 Securing iOS
- 17.15 Mobile Device Management
- 17.16 Hacking Mobile Platforms Countermeasures
- 17.17 Hacking Mobile Platforms Review
Module 18: IoT AND OT Hacking
- 18.1 IoT Overview
- 18.2 IoT Infrastructure
- 18.3 IoT Vulnerabilities and Threats
- 18.3.1 Activity - Searching for Vulnerable IoT Devices
- 18.4 IoT Hacking Methodology and Tools
- 18.5 IoT Hacking Countermeasures
- 18.6 OT Concepts
- 18.7 IT-OT Convergence
- 18.8 OT Components
- 18.9 OT Vulnerabilities
- 18.10 OT Attack Methodology and Tools
- 18.11 OT Hacking Countermeasures
- 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
- 19.1 Cloud Computing Concepts
- 19.2 Cloud Types
- 19.3 Cloud Benefits and Considerations
- 19.4 Cloud Risks and Vulnerabilities
- 19.5 Cloud Threats and Countermeasures
- 19.5.1 Activity - Hacking S3 Buckets
- 19.6 Cloud Security Tools And Best Practices
- 19.7 Cloud Computing Review
Module 20: Cryptography
- 20.1 Cryptography Concepts
- 20.2 Symmetric Encryption
- 20.2.1 Activity - Symmetric Encryption
- 20.3 Asymmetric Encryption
- 20.3.1 Activity - Asymmetric Encryption
- 20.4 Public Key Exchange
- 20.5 PKI
- 20.5.1 Activity - Generating and Using an Asymmetric Key Pair
- 20.6 Digital Signatures
- 20.7 Hashing
- 20.7.1 Activity - Calculating Hashes
- 20.8 Common Cryptography Use Cases
- 20.9 Cryptography Tools
- 20.10 Cryptography Attacks
- 20.11 Cryptography Review
- 20.12 Course Conclusion
CompTIA Cloud+ (CV0-003) Course Content
Module 1 - CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud + Exam
- 1.3 Cloud + Domain Obectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
Module 2 - General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration - AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration - Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration - AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration -AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
Module 3 - Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDSIPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration - Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion - CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
Module 4 - Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration - Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard - Design a Resilent AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration - Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration - AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to The Cloud
- 4.20 Network Protocols
- 4.21 VPNS, VPC and Connectivity
- 4.22 Whiteboard - AWS VPC Connectivity
- 4.23 Demonstration - AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
Module 5 - Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration - SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration or Automation
- 5.13 DevOps, IaC and CICD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
Module 6 - Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLS
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion Site Connectivity Issues
- 6.9 Discussion - Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration - GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
Module 7 - Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
Google Cloud Digital Leader Course Content
Module 1 - Google Cloud Digital Leader Course Overview
- 1.0 About Google Cloud Digital Leader
- 1.1 Course and Instructor Intro
- 1.2 Course PreReqs
- 1.3 GCP Certification Overview
- 1.4 GCP Digital Leader Exam Objectives
Module 2 - General Cloud Knowledge
- 2.0 General Cloud Knowledge
- 2.1 Domain Objectives
- 2.2 Intro to Cloud Computing
- 2.3 Essential Characteristics of Cloud Computing
- 2.4 Service Models
- 2.5 Deployment Models
- 2.6 Multitenancy
- 2.7 Resilency
- 2.8 Replication
- 2.9 Automation and Orchestration
- 2.10 Chargeback
- 2.11 Vendor Lockin
- 2.12 Cloud Standards
- 2.13 OpEx, CapEx
- 2.14 TCO-ROI
- 2.15 Business Enablers
- 2.16 Section Summary
- 2.17 Review Questions
Module 3 - General Google Cloud Knowledge
- 3.0 General GCP Knowledge
- 3.1 Domain Objectives
- 3.2 GCP Overview
- 3.3 Cloud Infrastructure
- 3.4 Cloud Hierarchy
- 3.5 Project Demo
- 3.6 Whiteboard Hierarchy and Projects
- 3.7 Service Options
- 3.8 Demo - Services Overview
- 3.9 Pricing Calculator
- 3.10 Demo - Pricing Calculator
- 3.11 Billing models and Discounts
- 3.12 Demo Billing
- 3.13 Compliance Resources
- 3.14 Demo - Compliance Reports Manager
- 3.15 Support Options
- 3.16 Service Level Agreement (SLA)
- 3.17 Google Cloud Framework and Maturity Model
- 3.18 Demo - Maturity Assessment
- 3.19 Access to GCP
- 3.20 Demo - GCP ACCESS
- 3.21 Section Summary
- 3.22 Review Questions
Module 4 - Google Cloud Products and Services
- 4.0 Google Cloud Products and Services
- 4.1 Domain Objectives
- 4.2 Core Services
- 4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal
- 4.4 Compute Storage and Disk Options
- 4.5 App Engine, Google Cloud Functions, and Cloud Run
- 4.6 Google Kubernetes Engine
- 4.7 Demo Compute Services
- 4.8 Container registry
- 4.9 Cost and Performance Tradeoffs of Scale To Zero
- 4.10 Database Options - Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
- 4.11 Demo - Database Offerings
- 4.12 Vision API, AI Platform, TPUs
- 4.13 Pre Trained Models
- 4.14 Data Pipeline Offerings
- 4.15 Data Ingestion Options
- 4.16 Software Development Life Cycle (SDLC)
- 4.17 Visibility and Alerting Offerings
- 4.18 Identify Data Migration Options
- 4.19 Compute VM Migration
- 4.20 Whiteboard - Migrations
- 4.21 Application Modernization
- 4.22 Define Software-Defined WAN (SD-WAN)
- 4.23 Connectivity Options
- 4.24 Whiteboard - Connectivity
- 4.25 IAM and Security
- 4.26 Whiteboard Cloud Architecture
- 4.27 Section Summary
- 4.28 Review Questions
Module 5 - Google Cloud Digital Leader Course Closeout
- 5.0 Google Cloud Digital Leader Course Closeout
- 5.1 Course Review
- 5.2 Resources
- 5.3 Exam Overview
- 5.4 Course Closeout
Google Analytics 4 Course Content
Module 1 - Google Analytics 4 - Course Overview
- 1.0 About Google Analytics 4
- 1.1 Course Intro Welcome
- 1.2 Instructor Intro
Module 2 - Fundamentals of Google Analytics
- 2.1 What is a Digital Product
- 2.2 Google Market Platform
- 2.3 Google Analytics Overview
- 2.4 Google Analytics 4 Overview
- 2.5 Whiteboad Discussion-How Does GA Work
- 2.6 Comparing GA3 to GA4
- 2.7 Whiteboard Compare Data Models
- 2.8 Demo- GA Console Walkthru
- 2.9 Admin Panel
- 2.10 Demo Admin Panel
- 2.11 Tag Manager
- 2.12 Demo Tag Manager
- 2.13 Segment Review
- 2.14 Segment Review Questions
Module 3 - Advanced Topics with Google Analytics
- 3.1 Upgrading and Running Parallel
- 3.2 Whiteboard Discussion - Parallel
- 3.3 Demo Console Parallel
- 3.4 Hands on Demo - Install GA4 on a Live Site
- 3.5 Understand Reporting Options, Lifecycle Collections
- 3.6 Hands on Demo - Exploring reports
- 3.7 Hands on Demo - Set up GA4 Custom Eventsmp4
- 3.8 Hands on Demo - Conversions, Audiences, DebugView
- 3.9 Hands on Demo - Advertising
- 3.10 Hands on Demo - Explorations:Insights
- 3.11 Hands on Demo - Lifecycle and Users
- 3.12 Google Big Query Connections
- 3.13 Demo - BigQuery Data Integrations
- 3.14 Google Ads
- 3.15 Demo - Google Ads
- 3.16 Google Signals
- 3.17 Demo - Google Signals
- 3.18 Certification Options
- 3.19 Segment Summary
- 3.20 Review Questions
- 3.21 Resources
- 3.22 Course Closeout
CompTIA A+ 220-1101 (Core 1) Course Content
Module 1 - Devices, Setups, and Installs
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Appropriate Safety Procedures
- 1.3 PC Components
- 1.4 Guidlines for PC Disassembly
- 1.5 Motherboards
- 1.6 CPU Sockets
- 1.7 PCI Bus
- 1.8 Storage Bus (SATA and IDE)
- 1.9 Discussing PC Components
- 1.10 Common Connection Interfaces
- 1.11 Wired and Wireless Connection Standards
- 1.12 Install Peripheral Devices
- 1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 - Displays and Multimedia Devices
- 2.1 Displays and Multimedia
- 2.2 Display Device Connections and Cables
- 2.3 Discussing Display Device Installation and Configuration
- 2.4 Troubleshoot Display Devices
- 2.5 Guidelines for Troubleshooting Display Devices
- 2.6 Discussing Display Device Troubleshooting
- 2.7 Install and Configure Multimedia Devices
- 2.8 Discussing Multimedia Device Installation and Configuration
Module 3 - Supporting Multiple Drive Types
- 3.1 Supporting Multiple Drive Types and Memory
- 3.2 Memory Types
- 3.3 RAM Types
- 3.4 Memory Modules
- 3.5 DIMM and SO-DIMM Technologies
- 3.6 Parity and ECC RAM
- 3.7 Memory Compatibility Issues
- 3.8 Discussing System Memory Installation
- 3.9 Install and Configure Mass Storage Devices
- 3.10 Storage Adapters and Cables
- 3.11 Solid State Drives
- 3.12 Guidlines for Installing Mass Storage Devices
- 3.13 Discussing Mass Storage Device Installation and Configuration
- 3.14 Install and Configure Removable Storage
- 3.15 Discussing Removable Storage Device Istallation and Configuration
- 3.16 Configure RAID
- 3.17 RAID Configuration Options
- 3.18 Discussing RAID Configuration
- 3.19 Troubleshoot Storage Devices
- 3.20 Boot Failures
- 3.21 Discussing Storage Device Troubleshooting
Module 4 - Accounting for CPUs and Internal Components
- 4.1 Install Upgrade CPUs
- 4.2 Multiprocessing and Multicore Processors
- 4.3 Discussing CPU Upgrades
- 4.4 Configure and Update BIOS UEFI
- 4.5 Discussing BOIS-UEFI Configuration and Updates
- 4.6 Install Power Supplies
- 4.7 Discussing Power Supply Installation
- 4.8 Troubleshoot Internal System Components
- 4.9 POST and Boot Problems
- 4.10 Boot Troubleshooting and Log Entries
- 4.11 Motherboard Component Problems
- 4.12 Discussing System Component Troubleshooting
Module 5 - All About Network Theories
- 5.1 Wired Networks
- 5.2 Common Ethernet Network Implementations
- 5.3 Taps and Mirrors
- 5.4 Discussing Wired Networks
- 5.5 Network Hardware Devices
- 5.6 Switches
- 5.7 Power Over Ethernet
- 5.8 Discussing Network Hardware Devices
- 5.9 Wireless Networks
- 5.10 Access Points and Wireless Network Modes
- 5.11 Discussing Wireless Networks
- 5.12 Internet Connection Types
- 5.13 Wireless Internet Service Providers WISP
- 5.14 Discussing Internet Connection Types
- 5.15 Network Configuration Concepts
- 5.16 The TCIP-IP Protocol Suite
- 5.17 Internet Protocol and IP Addressing
- 5.18 Public and Private IP Addresses
- 5.19 IPv6
- 5.20 Discussing Network Configuration Concepts
- 5.21 Network Services
- 5.22 DNS
- 5.23 Dynamic and Static IP Configurations
- 5.24 DNS Records MX and A
- 5.25 Web Servers and HTTP-HTTPS
- 5.26 Discussing Network Services
Module 6 - Network Operations and Diagnostics
- 6.1 Configuring and Troubleshooting Networks
- 6.2 Network Connections in Windows
- 6.3 Install and Configure SOHO Networks
- 6.4 Configure SOHO Network Security
- 6.5 Firewalls
- 6.6 Port Fowarding and Port Triggering
- 6.7 Windows Firewall
- 6.8 Network Security and Embedded Appliances
- 6.9 Configure Remote Access
- 6.10 Discussing Remote Access Configuration
- 6.11 Troubleshoot Network Connections
- 6.12 IP Configuration Issues
- 6.13 Routing Issues
- 6.14 Discussing Network Connection Troubleshooting
Module 7 - Cloud and Virtualization Computing
- 7.1 Configure Client-Side Virtulaization
- 7.2 Hypervisors
- 7.3 Processor Support and Resource Requirements
- 7.4 Virtual Networks
- 7.5 Client-Side Virtualization
- 7.6 Cloud Computing Concepts
- 7.7 Internal and External Shared Resources
- 7.8 Cloud Service Options
- 7.9 Virtual Desktops
- 7.10 Software-Defined Networking (SDN)
- 7.11 Discussing Cloud Computing Concepts
Module 8 - Laptop Features and Troubleshooting
- 8.1 Use Laptop Features
- 8.2 Expansion Options
- 8.3 Discussing Laptop Features
- 8.4 Install and Configure Laptop Hardware
- 8.5 Discussing Laptop Hardware Installation and Configuration
- 8.6 Troubleshoot Common Laptop Issues
- 8.7 Discussing Troubleshooting Common laptop Issues
Module 9 - Syncing and Setup of Mobile Devices
- 9.1 Syncing and Setup of Mobile Devices
- 9.2 Connect and Configure Mobile Devices
- 9.3 Configure Mobile Device Network Connectivity
- 9.4 Mobile VPN Configuration
- 9.5 Email Configuration Options
- 9.6 Discussing Mobile Device Network Connectivity Configuration
- 9.7 Support Mobile Apps
- 9.8 Discussing Mobile App Support
Module 10 - All Things Printing
- 10.1 All Things Printing
- 10.2 Discussing Laser Printer Maintenance
- 10.3 Maintain Inkjet Printers
- 10.4 Discussing Inkjet Printer Maintenance
- 10.5 Maintain Impact, Thermal, and 3D Printers
- 10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
- 10.7 Install and Configure Printers
- 10.8 Discussing Printer Installation and Configuration
- 10.9 Troubleshoot Print Device Issues
- 10.10 Install and Configure Imaging Devices
- 10.11 Discussing Device Installation and Configuration
Module 11 - Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
CompTIA A+ 220-1102 (Core 2) Course Content
Module 1 - Operating System Management
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Identify Common Operating Systems
- 1.3 Microsoft Windows
- 1.4 Work and Education Features
- 1.5 Windows System Limits
- 1.6 Apple Operating Systems
- 1.7 Linux Disk and File Management
- 1.8 Discussing OS Types
- 1.9 Use Windows Features and Tools
- 1.10 Administrative Tools
- 1.11 Manage Files in Windows
- 1.12 System Hierarchies
- 1.13 File Attributes
- 1.14 Discussing Windows Features and Tools
- 1.15 Manage Disks in Windows
- 1.16 Discussing File Management in Windows
- 1.17 The Windows Disk Management Console
- 1.18 Discussing Windows Disk Management
- 1.19 Manage Devices in Windows
- 1.20 Device Manager
- 1.21 Discussing Windows Device Manager
Module 2 - Configuring and installing the OS
- 2.1 Configuring and Installing the OS
- 2.2 Installation Boot Methods
- 2.3 Disk Formatting and Partitioning
- 2.4 Networking Considerations
- 2.5 Post Installation Tasks
- 2.6 OS Installation Types
- 2.7 Unattended Installations
- 2.8 Maintain OSs
- 2.9 OS Updates
- 2.10 Anti-Malware Updates
- 2.11 Scheduled Backups
- 2.12 Task Schedulers part 1
- 2.13 Task Schedulers part 2
- 2.14 Install Windows 10 Demonstration
- 2.15 Discussing OS Maintenance
Module 3 - Tools to Troubleshoot and Maintain the OS
- 3.1 Install and Manage Windows Applications
- 3.2 Windows OS Tools
- 3.3 Application and Print Services
- 3.4 Task Manager
- 3.5 Manage Windows Performance
- 3.6 Windows Performance Management Tools
- 3.7 Troubleshoot Windows
- 3.8 Event Viewer
- 3.9 The System Configuration Utility
- 3.10 Troubleshooting Tips Boot Process
- 3.11 Troubleshooting Tips for Windows System Issues
- 3.12 Blue Screens and Spontaneous Shutdowns
- 3.13 Troubleshooting Tips for File and Memory Corruption
- 3.14 Safe Boot
- 3.15 System Repair Disc
- 3.16 System Restore
- 3.17 Guidelines for Troubleshooting Windows Issues
Module 4 - Network Management Tools
- 4.1 Network Management Tools
- 4.2 Network Connectivity
- 4.3 IP Addressing and Connection Types
- 4.4 Proxy Settings
- 4.5 Windows Client Configuration
- 4.6 Location Services
- 4.7 Firewalls
- 4.8 Network Troubleshooting
- 4.9 Remote Desktop Tools
- 4.10 Desktop Management and Remote Monitoring Tools
- 4.11 Disscussion Topics
Module 5 - Sharing Resources and Wrights Management
- 5.1 Sharing Resources and Wrights Management
- 5.2 User Group Accounts
- 5.3 Local Secutity Policy
- 5.4 SSO and Credential Manager
- 5.5 Workgroups and Homegroups
- 5.6 Network and Sharing Center
- 5.7 Network Share Configuration
- 5.8 NTSF File and Folder Permissions
- 5.9 Configure Active Directory Accounts and Policies
- 5.10 Domain Membership and Group Policy Objects
- 5.11 Basic AD Functions
- 5.12 Account Locks and Password Resets
Module 6 - Threats and Security Measures
- 6.1 Threats and Security Measures
- 6.2 Logical Security Concepts
- 6.3 Encryption
- 6.4 PKI and Certificates
- 6.5 Execution Control
- 6.6 NAC
- 6.7 Discussing Logical Decurity Concepts
- 6.8 Threats and Vulnerablilities
- 6.9 Types of Password Attacks
- 6.10 Discussing Threats and Vulnerabilities
- 6.11 Physical Security Controls
- 6.12 Discussing Physical Security Measures
Module 7 - Policies to Protect Data
- 7.1 Policies to Protect Data
- 7.2 Implement Security Best Practices
- 7.3 Guidlines for Implementing Security Best Practices
- 7.4 Discussing Security Best Practices Implementation
- 7.5 Implement Data Protection Policies
- 7.6 ACLs and Directory Permissions
- 7.7 Full Disk Encryption
- 7.8 Guildlines for Implementing Data Protection Policies
- 7.9 Discussing Data Protection Policies
- 7.10 Protect Data During Incident Response
- 7.11 Discussing Data Protection During Incident Response
Module 8 - Prevent Malware and Security Threats
- 8.1 Prevent Malware and Security Threats
- 8.2 Detect, Remove, and Prevent Malware
- 8.3 Trojan Horses and Spyware
- 8.4 Sources of Malware Infection
- 8.5 Best Practices for Malware Removal
- 8.6 Discussing Detecting, Removing, and Preventing Malware Infections
- 8.7 Troubleshoot Common Workstation Security Issues
- 8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 - Supporting and Troubleshooting Mobile Devices
- 9.1 Supporting and Troubleshooting Mobile Devices
- 9.2 Secure Mobile Devices
- 9.3 IOT Internet of Things
- 9.4 Discussing Mobile Device Security
- 9.5 Troubleshoot Mobile Device Issues
- 9.6 Mobile Device Security Troubleshooting
- 9.7 Discussing Troubleshooting Mobile Devices
Module 10 - Implementing Operational Procedures
- 10.1 Implementing Operational Procedures
- 10.2 Environmental Impacts and Controls
- 10.3 Discussing Environmental Impact and Controls
- 10.4 Create and Maintain Documentation
- 10.5 Discussing Documentation Creation and Maintenance
- 10.6 Use Basic Change Management Best Practices
- 10.7 Discussing Change Management Best Practices
- 10.8 Implement Disaster Prevention and Recovery Methods
- 10.9 Discussing Implement Disaster Prevention and Recovery Methods
- 10.10 Basic Scripting Concepts
- 10.11 Discussing Scripting
- 10.12 Professionalism and Communication
- 10.13 Discussing Professionalism and Communication Skills
Module 11 - Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Content
Module 61 - CEH v11 Advanced Ethical Hacker Course Intro
- 61.1 About This Course: Advanced Ethical Hacker
- 61.2 About the Instructor
Module 62 - CEH v11 Session Hjacking
- 62.1 Session Hijacking Concepts
- 62.2 Token-based Authentication
- 62.3 Compromising a Session Token
- 62.4 XSS
- 62.5 CSRF
- 62.6 Other Attacks
Module 63 - CEH v11 Defending Against Hijacking
- 63.1 Network Level Hijacking
- 63.2 Session Hijacking Tools
- 63.3 Session Hijacking Countermeasures
- 63.4 Session Penetration Hijacking
- 63.5 Review
Module 64 - CEH v11 Implementing Intrusion Detection
- 64.1 IDS-IPS
- 64.2 Snort
- 64.3 Snort Rules
- 64.4 Syslog
Module 65 - CEH v11 Testing Intrusion Detection
- 65.1 WIPS
- 65.2 IDS Considerations
- 65.3 IDS Tools
- 65.4 IDS Evasion
- 65.5 IDS-Firewall Evasion Tools
- 65.6 IDS Scenerios
Module 66 - CEH v11 Implementing Firewalls
- 66.1 Firewalls
- 66.2 Packet Filtering Rules
- 66.3 Firewall Deployments
- 66.4 Traffic Flow through Firewalls
- 66.5 Split DNS
Module 67 - CEH v11 Testing Firewallls
- 67.1 Firewall Tools
- 67.2 Firewall Evasion
- 67.3 Firewall Scenarios
Module 68 - CEH v11 Implementing Honeypots
- 68.1 Honeypots
- 68.2 Honeypot Detection
- 68.3 IDS-Firewall Evasion Countermeasures
- 68.4 IDS-Firewall Honeypot Penetration Testing
- 68.5 Review
Module 69 - CEH v11 Attacker Webserver
- 69.1 Webserver Security Overview
- 69.2 Common Webservers
- 69.3 Webserver Attacks
- 69.4 Misconfiguration Attack Examples
Module 70 - CEH v11 Webserver Defense
- 70.1 Webserver Attack Tools
- 70.2 Attack Countermeasures
- 70.3 Webserver Penetration Testing
- 70.4 Review
Module 71 - CEH v11 Intro To Web Apps
- 71.1 Web Application Concepts
- 71.2 Attacking Web Apps
Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities
- 72.1 A01 - Broken Access Control
- 72.2 A02 - Cryptographic Failures
- 72.3 A03 - Injection
- 72.4 A04 - Insecure Design
- 72.5 A05 - Security Misconfiguration
Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities
- 73.1 A06 - Vulnerable and Outdated Components
- 73.2 A07 - Identification and Authentication Failures
- 73.3 A08 - Software and Data Integrity Failures
- 73.4 A09 - Security Logging and Monitoring
- 73.5 A10 - Server Side Request Forgery
Module 74 - CEH v11 Common Web App Attacks
- 74.1 XSS Attacks
- 74.2 CSRF
- 74.3 Parameter Tampering
- 74.4 Clickjacking
- 74.5 SQL Injection
Module 75 - CEH v11 Unauthorized Access Through Web Apps
- 75.1 Insecure Deserialization Attacks
- 75.2 IDOR
- 75.3 Directory Traversal
- 75.4 Session Management Attacks
- 75.5 Response Splitting
Module 76 - CEH v11 Web App Overflow Attacks
- 76.1 Denial of Service
- 76.2 Overflow Attacks
- 76.3 XXE Attacks
- 76.4 Soap Attacks
- 76.5 Ajax Attacks
Module 77 - CEH v11 Defending Web Apps
- 77.1 Web App Hacking Tools
- 77.2 Web Hacking Countermeasures
- 77.3 Web Application Penetration Testing
- 77.4 Review
Module 78 - CEH v11 Intro To SQL Injection
- 78.1 SQL Overview
- 78.2 SQL Injection Concepts
- 78.3 Basic SQL Injection
Module 79 - CEH v11 Performing SQL Injection
- 79.1 Finding Vulnerable Websites
- 79.2 Error-based SQL Injection
- 79.3 Union SQL Injection
- 79.4 Blind SQL Injection
- 79.5 SQL Injection Scenarios
- 79.6 Evading Detection
Module 80 - CEH v11 Defending Against SQL Injection
- 80.1 SQL Injection Tools
- 80.2 SQL Injection Countermeasures
- 80.3 Safe Coding Examples
- 80.4 SQL Wildcards
- 80.5 SQL Injection Penetration Testing
- 80.6 Review
Module 81 - CEH v11 Wireless Networking Overview
- 81.1 Wireless Concepts
- 81.2 Wireless Signal Encoding
- 81.3 Wi-Fi Standards
- 81.4 Wi-Fi Antennas
- 81.5 Wireless Authentication
Module 82 - CEH v11 Wi-Fi Security
- 82.1 Wi-Fi Security Standards
- 82.2 Wireless Network Troubleshooting Tools
- 82.3 Wi-Fi Discovery Tools
- 82.4 Sniffing Wi-Fi
Module 83 - CEH v11 Hacking Wi-Fi
- 83.1 Wi-Fi Attack Types
- 83.2 Wi-Fi Rogue Access Point Attacks
- 83.3 Wi-Fi Denial of Service Attacks
- 83.4 Wi-Fi Password Cracking Attacks
- 83.5 WEP Cracking
Module 84 - CEH v11 Advanced Wireless Attacks
- 84.1 WPA-WPA2 Cracking
- 84.2 WPA3 Attacks
- 84.3 WPS Cracking
- 84.4 Wi-Fi Attack Tools for Mobile Devices
- 84.5 Bluetooth Hacking
- 84.6 Other Wireless Hacking
Module 85 - CEH v11 Defending Wireless Networks
- 85.1 Wireless Hacking Countermeasures
- 85.2 Wireless Security Tools
- 85.3 Wireless Penetration Testing
- 85.4 Review
Module 86 - CEH v11 Mobile Platform Overview
- 86.1 Mobile Platform Overview
- 86.2 Mobile Device Vulnerabilities
- 86.3 Mobile Device Attacks
Module 87 - CEH v11 Hacking Android
- 87.1 Android
- 87.2 Android Vulnerabilities
- 87.3 Rooting Android
- 87.4 Android Exploits
- 87.5 Android Hacking Tools
- 87.6 Reverse Engineering an Android App
- 87.7 Securing Android
Module 88 - CEH v11 Hacking iOS
- 88.1 iOS
- 88.2 iOS Vulnerabilities
- 88.3 Jailbreaking iOS
- 88.4 iOS Exploits
- 88.5 iOS Hacking Tools
- 88.6 Securing iOS
Module 89 - CEH v11 Mobile Platform Defense
- 89.1 Mobile Device Management
- 89.2 BYOD
- 89.3 Mobile Security Guidelines and Tools
- 89.4 Mobile Device Penetration Testing
- 89.5 Review
Module 90 - CEH v11 IoT Hacking
- 90.1 loT Concepts
- 90.2 loT Infrastructure
- 90.3 Fog Computing
- 90.4 loT Vulnerabilities
- 90.5 loT Threats
Module 91 - CEH v11 IoT Defense
- 91.1 IoT Hacking Methodologies and Tools
- 91.2 IoT Hacking Methodolgies and Tools Part 2
- 91.3 Hacking Countermeasures
- 91.4 IoT Penetration Testing
- 91.5 OT Concepts
- 91.6 Industrial IoT
Module 92 - CEH v11 Operational Technology Overview
- 92.1 IT-OT Convergence
- 92.2 ICS
- 92.3 SCADA
- 92.4 DCS
- 92.5 RTU
- 92.6 PLC
- 92.7 Addition OT Components
Module 93 - CEH v11 Hacking OT
- 93.1 OT Variables
- 93.2 Well-known OT attacks
- 93.3 OT Attack Methodology and Basic Tools
- 93.4 OT Reconnaissance
- 93.5 OT Penetration and Control
Module 94 - CEH v11 Defending OT
- 94.1 OT Attack Tools
- 94.2 OT Hacking Countermeasures
- 94.3 OT Penetration Testing
- 94.4 Review
Module 95 - CEH v11 Attacking The Cloud
- 95.1 Cloud Computing Concepts
- 95.2 Virtualization
- 95.3 Cloud Types
- 95.4 Cloud Benefits and Considerations
- 95.5 Cloud Risks and Vulnerablilities
Module 96 - CEH v11 Cloud Defense
- 96.1 Cloud Threats and Countermeasures
- 96.2 Cloud Security Tools
- 96.3 Cloud Security Best Practices
- 96.4 Cloud Penetration Testing
- 96.5 Review
Module 97 - CEH v11 Cryptography Overview
- 97.1 Cryptography Concepts
- 97.2 Symetric Encryption
- 97.3 Asymmetric Encryption
- 97.4 Public Key Exchange
- 97.5 PKI
Module 98 - CEH v11 Protecting Data With Crytography
- 98.1 Digital Certificates
- 98.2 Digital Signatures
- 98.3 Hashing
- 98.4 Email Encryption
- 98.5 Network Communication Encryption
Module 99 - CEH v11 Protecting Data at Home and in Transit
- 99.1 Disk Encryption
- 99.2 VPN Encryption
- 99.3 Cryptography Tools
Module 100 - CEH v11 Pentesting Cryptography
- 100.1 Cryptography Attacks
- 100.2 Cryptography Penetration Testing
- 100.3 Review
- 100.4 Conclusion
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Content
Module 21 - CEH v11 Ethical Hacker Course Intro
- 21.1 About this course - Ethical Hacker
- 21.2 About the Instructor
Module 22 - CEH v11 Intro to Footprinting
- 22.1 Footprinting Concepts
- 22.2 Footprinting Methodology
- 22.3 OSINT Tools
- 22.4 Advanced Google Search
- 22.5 Whois Footprinting
- 22.6 Activity - Performing a Whois Lookup
Module 23 - CEH v11 Footprinting Network Services
- 23.1 DNS Footprinting
- 23.2 Website Footprinting
- 23.3 Email Footprinting
- 23.4 Network Footprinting
- 23.5 Footprinting through Social Networking Sites
Module 24 - CEH v11 Defend Against Footprinting
- 24.1 Competitive Intelligence Gathering
- 24.2 Footprinting Countermeasures
- 24.3 Footprinting Penetration Testing
- 24.4 Review
Module 25 - CEH v11 Intro to Scanning
- 25.1 Scanning Concepts
- 25.2 ICMP Discovery Scans
- 25.3 Other Discovery Scans
Module 26 - CEH v11 Port Scanning
- 26.1 Ports
- 26.2 TCP Flags and Handshakes
- 26.3 TCP Scan Types
- 26.4 Other Scanning Techniques
Module 27 - CEH v11 Vulnerability Scanning
- 27.1 Banner Grabbing
- 27.2 Vulnerability Scanning
- 27.3 SSDP Scanning
Module 28 - CEH v11 NMAP
- 28.1 Nmap
- 28.2 Common Nmap Scans
- 28.3 Nmap Options
- 28.4 Nmap Stealth Scans
- 28.5 Hping and Other Scanners
Module 29 - CEH v11 Firewalls and Intrusion Detection
- 29.1 Firewall Types
- 29.2 Firewall Features
- 29.3 Firewall Features Part 2
- 29.4 Firewall Configurations
- 29.5 Intrusion Detection and Prevention
Module 30 - CEH v11 Evading Detection
- 30.1 Firewall and IDS Evasion
- 30.2 Firewall and IDS Evasion Part 2
- 30.3 Firewalking
- 30.4 Probing a Firewall
- 30.5 Probing a Firewall Part 2
Module 31 - CEH v11 Proxies and VPNs
- 31.1 Proxies
- 31.2 VPNs
- 31.3 Tor
- 31.4 Scanning Countermeasures
- 31.5 Scanning Penetration Testing
- 31.6 Review
Module 32 - CEH v11 Accessing Vulnerability
- 32.1 Vulnerability Assessment Overview
- 32.2 Vulnerability Scoring Systems
- 32.3 Vulnerability Assessment Tools
Module 33 - CEH v11 Vulnerability Research
- 33.1 Scanner Output and Reports
- 33.2 Vulnerability Research
- 33.3 Review
Module 34 - CEH v11 Intro to Enumeration
- 34.1 Enumeration Concepts
- 34.2 Enumeration Techniques and Tools
- 34.3 Service and Application Enumeration
- 34.4 SMB and NetBIOS Enumeration
Module 35 - CEH v11 Service Enumeration
- 35.1 SNMP Enumeration
- 35.2 LDAP Enumeration
- 35.3 DNS Enumeration
- 35.4 SMTP Enumeration
- 35.5 NTP Enumeration
Module 36 - CEH v11 Advanced Enumeration
- 36.1 Remote Connection Enumeration
- 36.2 File Transfer Enumeration
- 36.3 VoIP Enumeration
- 36.4 IPSEC Enumeration
- 36.5 IPv6 Enumeration
- 36.6 BGP Enumeration
Module 37 - CEH v11 Command Line Enumeration
- 37.1 Windows Command Line Enumeration
- 37.2 Linux Command Line Enumeration
- 37.3 Linux Command Line Enumeration Part 2
Module 38 - CEH v11 Defending Against Enumeration
- 38.1 Enumeration Countermeasures
- 38.2 Enumeration Countermeasures Part 2
- 38.3 Enumeration Penetration Testing
- 38.4 Review
Module 39 - CEH v11 Intro to System Hacking
- 39.1 System Hacking Concepts
- 39.2 System Hacking Tools and Frameworks
- 39.3 Searchsploit
- 39.4 Compiling and Running Exploits
Module 40 - CEH v11 System Hacking with Metasploit
- 40.1 Metasploit
- 40.2 Metasploit Search
- 40.3 Metasploit Exploits and Payloads
- 40.4 Metasploit Meterpreter
- 40.5 Metasploit Connectivity
- 40.6 Metasploit Impersonation and Migration
Module 41 - CEH v11 Further Attacking a Compromised System
- 41.1 Netcat
- 41.2 Pivoting
- 41.3 Netcat Relays
- 41.4 Metasploit Post Exploitation Modules
- 41.5 Common Operating System Exploits
Module 42 - CEH v11 Hacking an Operating System
- 42.1 Hacking Windows
- 42.2 Hacking Linux
- 42.3 Network Service Exploits
- 42.4 Password Attacks
Module 43 - CEH v11 Password Cracking Overview
- 43.1 Dictionary Attack
- 43.2 Brute Force Attack
- 43.3 Password Spraying
- 43.4 Rainbow Tables
Module 44 - CEH v11 Performing Password Attacks
- 44.1 Network Service Password Attacks
- 44.2 Password Cracking Tools
- 44.3 Online Password Cracking Sites
- 44.4 Windows Password Cracking
- 44.5 Linux Password Cracking
- 44.6 Other Methods for Obtaining Passwords
Module 45 - CEH v11 Using Exploits
- 45.1 Keylogging
- 45.2 Spyware
- 45.3 Rootkits
- 45.4 Buffer Overflows
- 45.5 Privilege Escalation
- 45.6 Hiding Files
Module 46 - CEH v11 Hiding Information
- 46.1 Alternate Data Streams
- 46.2 Steganography
- 46.3 Creating and Maintaining Remote Access
- 46.4 Hiding Evidence
Module 47 - CEH v11 Covering Tracks
- 47.1 Covering Tracks in Windows
- 47.2 Covering Tracks in Linux
- 47.3 System Hacking Counter-Measures
- 47.4 System Hacking Penetration Testing
- 47.5 Review
Module 48 - CEH v11 Malware Overview
- 48.1 Intro to Malware
- 48.2 Virus Overview
- 48.3 Virus Types
- 48.4 Self-Hiding Viruses
- 48.5 Worms
- 48.6 Trojans
- 48.7 Trojan Types
- 48.8 RATS
Module 49 - CEH v11 Hacking With Malware
- 49.1 Ransomware
- 49.2 Botnets
- 49.3 Covert Channel Trojans
- 49.4 Banking Trojans
- 49.5 Rootkits
Module 50 - CEH v11 Creating Malware
- 50.1 Other Malware
- 50.2 Malware Makers
- 50.3 Dropper and Stage Creation
- 50.4 Exploit Kits
Module 51 - CEH v11 Detecting Malware
- 51.1 Malware Detection
- 51.2 Malware Detection Part 2
- 51.3 Malware Analysis
Module 52 - CEH v11 Defending Against Malware
- 52.1 Malware Reverse Engineering
- 52.2 Malware Countermeasures
- 52.3 Malware Penetration Testing
- 52.4 Review
Module 53 - CEH v11 Sniffing
- 53.1 Sniffing Concepts
- 53.2 Types of Sniffing
- 53.3 Sniffing Protocols
- 53.4 Sniffing Tools
Module 54 - CEH v11 Spoofing and MITM
- 54.1 ARP
- 54.2 ARP Spoofing
- 54.3 MITM
- 54.4 MAC Attacks
- 54.5 MAC Spoofing
- 54.6 DHCP Attacks
Module 55 - CEH v11 Defending Against Poisoning and Sniffing
- 55.1 Name Resolution Poisoning
- 55.2 VLAN Hopping
- 55.3 Sniffing Counter Measures
- 55.4 Sniffing Penetration Testing
- 55.5 Review
Module 56 - CEH v11 Social Engineering
- 56.1 Social Engineering Concepts
- 56.2 Social Engineering Techniques
- 56.3 Social Engineering Examples
- 56.4 Social Engineering Tools
Module 57 - CEH v11 Defending Against Social Engineering
- 57.1 Social Media
- 57.2 Identity Theft
- 57.3 Insider Threats
- 57.4 Social Engineering Countermeasures
- 57.5 Social Engineering Penetration Testing
- 57.6 Review
Module 58 - CEH v11 Denial-of-Service
- 58.1 DoS-DDoS Concepts
- 58.2 Volumetric Attacks
- 58.3 Fragmentation Attacks
- 58.4 State Exhaustion Attacks
- 58.5 Application Layer Attacks
Module 59 - CEH v11 Advanced DoS Attacks
- 59.1 Protocol Attacks
- 59.2 Other Attacks
- 59.3 Botnets
Module 60 - CEH v11 Defending Against Denial-of-Service
- 60.1 DoS-DDoS Attack Tools
- 60.2 DoS-DDoS Countermeasures
- 60.3 Dos Penetration Testing
- 60.4 Review
HTML5 & CSS3 Web Design Fundamentals with JavaScript Course Content
Module 1 - HTML5-CSS3 Introduction
- 1.1 Introduction to the Course
Module 2 - The Internet and World Wide Web
- 2.1 The Internet and World Wide Web
Module 3 - HTML Fundamentals
- 3.1 Web Development Tools
- 3.2 HTML Skeletons
- 3.3 Paragraph Elements
- 3.4 Phrase Elements
- 3.5 HTML Comments
- 3.6 HTML Entities
Module 4 - CSS Fundamentals
- 4.1 CSS Fundamentals
- 4.2 Inline Styles
- 4.3 Embedded Style Sheets
- 4.4 External Style Sheets
- 4.5. Selector Types
- 4.6 Decendent Selectors
- 4.7 CSS Colors
- 4.8 ID Versus Class
- 4.9 CSS Text Properties
- 4.10 CSS Box Model
Module 5 - Images and Links
- 5.1 Images and Links
- 5.2 Image Elements
- 5.3 Images with Hyperlinks
- 5.4 Open Links in New Tab
- 5.5 Telephone and Email Links
- 5.6 Validate and Debug
Module 6 - Responsive Design
- 6.1 Responsive Design
- 6.2 Fixed Layouts
- 6.3 Viewport Meta Element
- 6.4 Usefull CSS Styles
Module 7 - Media Queries
- 7.1 More About Responsive Design
- 7.2 Global Changes
- 7.3 Mobile Devices
- 7.4 Manipulate Logo
Module 8 - Layouts
- 8.1 Layouts
- 8.2 Tablets Part 1
- 8.3 Tablets Part 2
- 8.4 Styling Part 1
- 8.5 Styling Part 2
- 8.6 Styling Part 3
- 8.7 Styling Part 4
- 8.8 Styling Part 5
- 8.9 Styling Part 6
Module 9 - Tables
- 9.1 Tables Part 1
- 9.2 Tables Part 2
Module 10 - Multimedia
- 10.1 Multimedia
- 10.2 Multimedia Part 2
- 10.3 Multimedia Part 3
Module 11 - Forms and JavaScript
- 11.1 Forms and JavaScript
- 11.2 jQuery
- 11.3 Styling Tables
Module 12 - The Web Server
- 12.1 The Web Server
Module 13 - Programming and JavaScript
- 13.1 Data Types
- 13.2 Global Methods
- 13.3 Variables
- 13.4 Conditional Statements
- 13.5 Loops
- 13.6 Operators
Module 14 - The Calculator
- 14.1 Calculator Part 1
- 14.2 Calculator Part 2
- 14.3 Calculator Part 3
- 14.4 Calculator Part 4
- 14.5 Calculator Part 5
- 14.6 Calculator Part 6
- 14.7 Calculator Part 7
CompTIA Security+ SY0-601 (2022) Course Content
Module 1 - Introduction to Security
- 1.1 Introduction to Security
Module 2 - Malware and Social Engineering Attacks
- 2.1 Malware and Social Engineering Attacks
Module 3 - Basic Cryptography
- 3.1 Basic Cryptography
Module 4 - Advanced Cryptography and PKI
- 4.1 Advanced Cryptography and PKI
Module 5 - Networking and Server Attacks
- 5.1 Networking and Server Attacks
Module 6 - Network Security Devices, Designs and Technology
- 6.1 Network Security Devices, Designs and Technology
Module 7 - Administering a Secure Network
- 7.1 Administering a Secure Network
Module 8 - Wireless Network Security
- 8.1 Wireless Network Security
Module 9 - Client and Application Security
- 9.1 Client and Application Security
Module 10 - Mobile and Embedded Device Security
- 10.1 Mobile and Embedded Device Security
Module 11 - Authentication and Account Management
- 11.1 Authentication and Account Management
Module 12 - Access Management
- 12.1 Access Management
Module 13 - Vulnerability Assessment and Data Security
- 13.1 Vulnerability Assessment and Data Security
Module 14 - Business Continuity
- 14.1 Business Continuity
Module 15 - Risk Mitigation
- 15.1 Risk Mitigation
Module 16 - Security Plus Summary and Review
- 16.1 - Security Plus Summary and Review
Module 17 - Hands-On Training
- 17.1 Hands-On Scanning Part 1
- 17.2 Hands-On Scanning Part 2
- 17.3 Hands-On Advanced Scanning
- 17.4 Hands-On MetaSploit
- 17.5 Hands-On BurpSuite
- 17.6 Hands-On Exploitation Tools Part 1
- 17.7 Hands-On Exploitation Tools Part 2
- 17.8 Hands-On Invisibility Tools
- 17.9 Hands-On Connect to Tor
Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content
Module 1 - CEH v11 Foundations Course Introduction
- 1.1 About this course: CEH Foundations
- 1.2 About the Instructor
Module 2 - CEH v11 Introduction To Networking
- 2.1 Networking Overview
- 2.2 Network Scope
- 2.3 Network Addressing
- 2.4 Activity - Examining Network Addressing
Module 3 - CEH v11 Lan Components
- 3.1 Protocols, Ports, Sockets
- 3.2 Network Topologies
- 3.3 LAN Devices
- 3.4 LAN Devices Part 2
- 3.5 VLANs
- 3.6 Activity - Examining Ports and Sockets
- 3.7 Activity - Examining Switches and VLANs
Module 4 - CEH v11 Routing and Network Access
- 4.1 Routers
- 4.2 Layer 3 Switches
- 4.3 Modems and Remote Access
- 4.4 Firewalls and Proxies
- 4.5 Activity - Examining Routing
- 4.6 Activity - Examining VLAN Routing
- 4.7 Activity - Examining Firewall Rules
Module 5 - CEH v11 Intrusion Detection and Network Layers
- 5.1 IDS and IPS
- 5.2 OSI Model
- 5.3 TCP-IP
- 5.4 Activity - Examining Network Layers
Module 6 - CEH v11 Networking Protocols and Addressing
- 6.1 Layer 4 Protocols
- 6.2 Layer 3 Protocols
- 6.3 Layer 2 Protocols
- 6.4 IP Addressing
- 6.5 Subnetting
- 6.6 DHCP
- 6.7 Activity - Examining TCP
- 6.8 Activity - Examining UDP
- 6.9 Activity - Examining IP
- 6.10 Activity - Examining ICMP
- 6.11 Activity - Examining ARP
Module 7 - CEH v11 Network Services
- 7.1 DNS
- 7.2 DNS Records
- 7.3 NTP
- 7.4 Authentication
- 7.5 Biometrics
- 7.6 Activity - Examining DNS
- 7.7 Activity - Examining DNS Records
Module 8 - CEH v11 Access Control
- 8.1 Local Authentication
- 8.2 Directory Service Authentication
- 8.3 Extending Authentication
- 8.4 Authorization
- 8.5 Activity - Testing Access Control
Module 9 - CEH v11 Intro to Linux
- 9.1 Linux Overview
- 9.2 Linux File System
- 9.3 Linux Core Commands
- 9.4 Linux Search and Read Commands
- 9.5 Activity - Exploring Linux
- 9.6 Activity - Using Linux Core Commands
- 9.7 Activity - Using Linux Search Commands
- 9.8 Activity - Using Linux Read Commands
Module 10 - CEH v11 Configuring Linux
- 10.1 Linux File Permissions
- 10.2 Linux Special Permissions
- 10.3 Linux Configuration
- 10.4 Linux Packages
- 10.5 Linux User Management
Module 11 - CEH v11 Practicing Linux Configuration
- 11.1 Activity - Setting Linux Permissions
- 11.2 Activity - Setting Linux Special Permissions
- 11.3 Activity - Managing Packages in Kali Linux
- 11.4 Activity - Managing Users and Groups in Linux
Module 12 - CEH v11 Managing Linux
- 12.1 Linux Job Scheduling
- 12.2 Linux File, Directory, and Download Commands
- 12.3 Linux System Commands
- 12.4 Linux Network Management
- 12.5 Linux Firewall
Module 13 - CEH v11 Practicing Linux Management
- 13.1 Activity - Scheduling Tasks in Linux
- 13.2 Activity - Using Linux File, Directory, and Download Commands
- 13.3 Activity - Using Linux Edit and Archive Commands
- 13.4 Activity - Compiling Malicious Code
- 13.5 Activity - Using Linux Process and System Commands
- 13.6 Activity - Using Linux Disk, Hardware, and Network Commands
Module 14 - CEH v11 Intro to Windows
- 14.1 Windows Overview
- 14.2 Windows Registry
- 14.3 Windows Security
Module 15 - CEH v11 Windows Commands
- 15.1 Windows Commands
- 15.2 Windows Admin Commands
- 15.3 Windows Network Commands
- 15.4 Windows Run Line Commands
- 15.5 Windows PowerShell
Module 16 - CEH v11 Practicing Windows Commands
- 16.1 Activity - Using Windows Built-in Commands
- 16.2 Activity - Using Windows Task Commands
- 16.3 Activity - Using Windows Admin Commands
- 16.4 Activity - Using Windows Network Commands
- 16.5 Activity - Using Windows PowerShell
- 16.6 Networking and OS Penetration Testing
- 16.7 Review
Module 17 - CEH v11 Intro to Hacking
- 17.1 Information Security Overview
- 17.2 Hacking Concepts
- 17.3 Ethical Hacking Concepts
- 17.4 Penetration Testing
- 17.5 Penetration Testing Part 2
- 17.6 Activity - Performing a Static Code Review
Module 18 - CEH v11 Information Security
- 18.1 Cyber Kill Chain Concepts
- 18.2 Activity - Performing Weaponization
- 18.3 Information Security
- 18.4 Security Policies
- 18.5 Security Controls
- 18.6 Access Control
Module 19 - CEH v11 Protecting Data
- 19.1 Data Protection
- 19.2 Backup Sites
- 19.3 Vulnerability Management
- 19.4 SIEM
- 19.5 Risks
Module 20 - CEH v11 Managing Risk
- 20.1 Risk Management
- 20.2 Incident Handling
- 20.3 Information Security Laws and Standards
- 20.4 Activity - Assessing Risk
- 20.5 Ethical Hacking Penetration Testing
- 20.6 Review
- 20.7 Conclusion
Cisco 300-410 ENARSI - Implementing Cisco Enterprise Advanced Routing and Services Course Content
Module 1 - Welcome to ENARSI
- 1.1 Welcome to ENARSI
- 1.2 A Few Things Before We Start
Module 2 - EIGRP (Enhanced Interior Gateway Protocol)
- 2.1 EIGRP Features
- 2.2 EIGRP Operations
- 2.3 EIGRP Exchange of Routing Information
- 2.4 EIGRP Metrics
- 2.5 EIGRP Queries
- 2.6 EIGRP Obtaining a Default Route
- 2.7 EIGRP Load Balancing
- 2.8 EIGRP Authentication
- 2.9 Troubleshooting EIGRP Part 1
- 2.10 Troubleshooting EIGRP Part 2
- 2.11 Troubleshooting EIGRP Part 3
- 2.12 Troubleshooting EIGRP Part 4
Module 3 - OSPF (Open Shortest Path First)
- 3.1 Implementing OSPF Part 1
- 3.2 Implementing OSPF Part 2
- 3.3 Implementing OSPF Part 3 DR BDR Election
- 3.4 Implementing OSPF Part 4 LSA Types
- 3.5 Implementing OSPF Part 5 OSPF States
- 3.6 Optimizing OSPF Summarization
- 3.7 Optimizing OSPF Default Routing
- 3.8 Optimizing OSPF Authentication
- 3.9 Optimizing OSPF Virtual Links
Module 4 - Route Redistribution
- 4.1 Route Redistribution Introduction
- 4.2 Route Redistribution Implementation
- 4.3 Route Redistribution OSPF E1 or E2
- 4.4 Route Redistribution Types
- 4.5 Route Redistribution Manipulation & Filtering
- 4.6 Route Redistribution Prefix-Lists
- 4.7 Route Redistribution Route-Maps
Module 5 - Implementing Path Control
- 5.1 Implementing Path Control
- 5.2 Implementing Path Control Implementation
Module 6 - BGP (Border Gateway Protocol)
- 6.1 BGP Fundamentals
- 6.2 BGP Attributes
- 6.3 BGP Path Selection Criteria
- 6.4 BGP Transit AS
- 6.5 BGP Split Horizon
- 6.6 BGP Weight Attribute
- 6.7 BGP Local Preference Attribute
- 6.8 BGP MED Attribute
- 6.9 BGP Route Filtering
- 6.10 BGP Peer Groups
- 6.11 BGP Route Reflectors
- 6.12 BGP Authentication
- 6.13 BGP Troubleshooting Part 1
- 6.14 BGP Troubleshooting Part 2
Module 7 - Implementing VRF (Virtual Routing and Forwarding)
- 7.1 Implementing VRF-Lite
Module 8 - Implementing DHCP
- 8.1 Implementing DHCP
- 8.2 Implementing DHCP Relay Manual Binding and Options
- 8.3 Implementing DHCP SLAAC and DHCPv6
- 8.4 Troubleshooting DHCP
Module 9 - Securing Cisco Routers (Control Plane)
- 9.1 Securing Cisco Routers Control Plane Security CoPP
- 9.2 Securing Cisco Routers Control Plane Security CoPP Implementation
Module 10 - Infrastructure Services
- 10.1 Infrasctucture Services AAA
- 10.2 Infrastructure Services SNMP
- 10.3 Infrastructure Services SYSLOG
- 10.4 Infrastructure Services SSH
- 10.5 Infrastructure Services HTTP FTP SCP
- 10.6 Infrastructure Services NetFlow
Adobe XD 2022 Course Content
Module 1 - Welcome to Adobe XD 2022
- 1.1 Welcome to Adobe XD 2022
- 1.2 What is Adobe XD 2022
Module 2 - Adobe XD 2022 Overview
- 2.1 Adobe XD 2022 Overview
Module 3 - Designing in a Project with Adobe XD 2022
- 3.1 Adobe XD 2022 Project Overview
- 3.2 Designing Your First Screen in Adobe XD 2022
Module 4 - Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022
- 4.1 Assets and Reusable Styles in Adobe XD 2022
- 4.2 Responsive Resize in Adobe XD 2022
Module 5 - Images and Visual Effects in Adobe XD 2022
- 5.1 Imports, Images, and Masks in Adobe XD 2022
- 5.2 Special Visual Effects in Adobe XD 2022
Module 6 - Making Interactive Buttons in Adobe XD 2022
- 6.1 Plugins in Adobe XD 2022
- 6.2 Stacks in Adobe XD 2022
- 6.3 Components in Adobe XD 2022
- 6.4 Repeat Grid in Adobe XD 2022
Module 7 - Grouped Imports and Scroll Groups in Adobe XD 2022
- 7.1 Grouped imports in Adobe XD 2022
- 7.2 Scroll Groups in Adobe XD 2022
Module 8 - Prototyping and Animations in Adobe XD 2022
- 8.1 Prototyping with Adobe XD 2022
- 8.2 Animations in Adobe XD 2022
Module 9 - Exporting and Sharing with Adobe XD 2022
- 9.1 Exports in Adobe XD 2022
- 9.2 Adobe XD 2022 Conclusion
Adobe InDesign Course Content
Module 1 - Introduction To Adobe Indesign
- 1.1 Intro-InDesign
- 1.2 What is InDesign
Module 2 - Getting Started With Adobe InDesign
- 2.1 Creating a New Document
- 2.2 Importing Images and Understanding Links
- 2.3 Embedding
- 2.4 Navigating the Interface
- 2.5 Manipulating Graphics
- 2.6 Creating simple shapes
- 2.7 Basic Tools
- 2.8 Properties Panel
- 2.9 Working with Layers
- 2.10 Elements of Design
Module 3 - Understanding and Applying Colors
- 3.1 Color Theory
- 3.2 Color Swatches RGB vs Lab vs CMYK
- 3.3 Understanding and Applying Gradients
Module 4 - Pages
- 4.1 Pages Panel
- 4.2 Parent Pages
Module 5 - Typography
- 5.1 Typography
- 5.2 Creating Text
- 5.3 Character and Paragraph Formatting
- 5.4 Character and Paragraph Styles
- 5.5 Chaining Text Boxes Together
- 5.6 OpenType
- 5.7 Creating Outlines
- 5.8 Working with Tables
Module 6 - Packaging and Exporting for Web and Print
- 6.1 Preflight
- 6.2 Packaging Your Document
- 6.3 Exporting a PDF
- 6.4 Exporting an Image Sequence
Module 7 - Principles of Design
- 7.1 Principles of Design
Module 8 - Designing for Your Output
- 8.1 Letterheads
- 8.2 Business Cards
- 8.3 Resume
- 8.4 Brochures
- 8.5 Types of Binding
- 8.6 Impose
Module 9 - Advanced Techniques in InDesign
- 9.1 Clipping Mask
- 9.2 Step and Repeat
- 9.3 GREP
- 9.4 Layer Effects
- 9.5 Page Tool
- 9.6 Scripts
Module 10 - Interactivity in InDesign
- 10.1 Interactivity
- 10.2 Importing Media
- 10.3 Using Multiple Pages in Interactivity
- 10.4 Crating an Interactive Project
- 10.5 Animation
- 10.6 InDesign Conclusion
Adobe Illustrator Course Content
Module 1 - Introduction to Adobe Illustrator 2022
- 1.1 Instructor Bio
- 1.2 Course Introduction
Module 2 - Getting Started with Adobe Illustrator 2022
- 2.1 What are Vectors
- 2.2 Creating a New Document
- 2.3 Navigating the Interface
Module 3 - Drawing
- 3.1 Drawing and Manipulating Primitive Shapes
- 3.2 Drawing Custom Shapes
- 3.3 Importing Images
- 3.4 Understanding Layers and Sublayers
- 3.5 Additional Drawing and Manipulation Tools
Module 4 - Colors and Gradients
- 4.1 Color Theory
- 4.2 In-depth dive into Color Palette-
- 4.3 Creating Color Swatches
- 4.3.2 Gradient Mesh
Module 5 - Intermediate Illustration
- 5.1 Appearance Palette
- 5.2 Pathfinder Palette
- 5.3.1 Recreating an Existing Logo
- 5.3.2 Creating an icon from a Sketch
- 5.3.3 Creating a vector illustration from a sketch
- 5.3.4 Blending Modes
Module 6 - Typography
- 6.1 Introduction to Typography
- 6.2 Type Tools in Illustrator
- 6.3 Envelope Warp and Mesh
- 6.4 Breaking Text into Outlines
- 6.5 Caligramme Demo
Module 7 - Live Trace, Paintbrush and Blob Brush
- 7.1 Live Trace
- 7.2 Paint Brush
Module 8 - Advanced Illustration
- 8.1 Illustrating a face from a photo
- 8.2 Illustrating the body
- 8.3 Hair and emulating texture
- 8.4 Adding a background
- 8.5 Shadows and highlights
Module 9 - Exporting
- 9.1 Differences Between File Formats
- Conclusion
CompTIA Network+ N10-008 Course Content
Module 0 - Course introduction
- 0.1 Instructor Intro
- 0.2 Course Overview
Module 1 - Networking Fundamentals
- 1.1 Intro to Networking
- 1.1.1 Activity: Creating a Network
- 1.2 Common Terminology
- 1.2.1 Activity: Examining Ports and Sockets
- 1.3 OSI Model
- 1.4 DoD Model
- 1.4.1 Activity: Examining Network Layers
- 1.5 TCP, UDP, IP
- 1.5.1 Activity: Examining TCP
- 1.5.2 Activity: Examining UDP
- 1.5.3 Activity: Examining IP
- 1.6 ICMP, IGMP, ARP
- 1.6.1 Activity: Examining ICMP
- 1.6.2 Activity: Examining ARP
- 1.6.3 Activity: Examining IGMP
- 1.7 Network Topologies
- 1.8 Network Types
- 1.9 Part 1: Network Characteristics
- 1.9 Part 2: Network Characteristics
- 1.10 Module 1 outro
Module 2 - Cables and Connectors
- 2.1 Ethernet Standards
- 2.2 Copper Cable Types
- 2.3 Fiber Optic Cable Types
- 2.4 Connector Types
- 2.4.1 Activity: Selecting the Right Cable
- 2.5 Media Converters and Transceivers
- 2.6 Cable Management
- 2.7 Module 2 Outro
Module 3 - Internet Protocol (IP)
- 3.1 IPv4 Basics
- 3.2 IP Packet and Interface Types
- 3.2.1 Activity: Configuring Client IP Settings
- 3.3 Binary Numbering System
- 3.4 Classful and Classless Addressing
- 3.5 Understanding CIDR Notation
- 3.6 IPv4 Subnetting Method
- 3.7 Verifying with Binary
- 3.8 Finding Subnet IDs
- 3.8.1 Activity: Subnetting a Class C Network
- 3.9 The Delta in Action
- 3.9.1 Activity: Subnetting With the Delta
- 3.10 Subnetting Based on Hosts
- 3.11 Subnetting in Other Octets
- 3.12 Supernetting
- 3.12.1 Activity: Supernetting
- 3.13 IPv6
- 3.14 IPv4 - IPv6 Transition Mechanisms
- 3.15 Module 3 Outro
Module 4 - Layer 7 Protocols
- 4.1 Remote Control Protocols
- 4.2 File Sharing Protocols
- 4.3 Web Protcols
- 4.4 Email Protocols
- 4.5 Database Protocols
- 4.6 Voice Protocols
- 4.7 Security Protocols
- 4.8 Management Protocols
- 4.9 Module 4 Outro
Module 5 - Network Services
- 5.1 DHCP
- 5.1.1 Activity: Configuring DHCP
- 5.1.2 Activity: Configuring a DHCP Relay Agent
- 5.2 DNS
- 5.2.1 Activity: Configuring DNS - Part 1
- 5.2.2 Activity: Configuring DNS - Part 2
- 5.3 NTP
- 5.4 Corporate and Datacenter Network Architecture
- 5.5 Cloud Concepts and Connectivity Options
- 5.6 Module 5 Outro
Module 6 - Networking Devices
- 6.1 Introductory Concepts
- 6.2 Repeaters and Hubs
- 6.2.1 Activity: Connecting Devices with a Hub
- 6.3 Bridges and Switches
- 6.3.1 Activity: Connecting Devices with a Switch
- 6.4 Routers and Multilayer Switches
- 6.5 Security Devices
- 6.6 Modems
- 6.7 Module 6 Outro
Module 7 - Networked Devices
- 7.1 IP Devices
- 7.2 IoT
- 7.2.1 Activity - Programming IoT Devices
- 7.3 ICS/SCADA
- 7.4 Module 7 Outro
Module 8 - Routing and Bandwidth Management
- 8.1 Routing Basics
- 8.1.1 Activity: Configuring Static Routes
- 8.2 Packet Delivery on the Same Network
- 8.3 IP Routing Across a Single Router
- 8.4 IP Routing Across Multiple Hops
- 8.4.1 Activity: Static Routes - CHALLENGE
- 8.5 Route Selection
- 8.6 RIP
- 8.6.1 Activity: Configuring RIP - CHALLENGE
- 8.7 OSPF
- 8.8 EIGRP
- 8.9 BGP
- 8.10 NAT/PAT
- 8.11 Bandwidth Management (with Module 8 Outro)
Module 9 - Ethernet Switching
- 9.1 Ethernet Basics
- 9.2 Switching Overview
- 9.2.1 Activity: Examining a MAC Table
- 9.3 VLANs
- 9.3.1 Activity: Creating VLANs
- 9.4 VLAN Trunking
- 9.4.1 Activity: Configuring VLAN Trunking
- 9.5 VLAN Routing
- 9.5.1 Activity: Configuring VLAN Routing
- 9.6 Contention Management
- 9.7 Switchport Configuration (with Module 9 Outro)
Module 10 - Wireless Technologies
- 10.1 Wireless Overview
- 10.2 Radio Basics
- 10.3 Modulation
- 10.4 Wi-Fi Standards
- 10.5 Antennas
- 10.6 Wi-Fi Service Sets
- 10.7 Wi-Fi Security
- 10.8 Cellular
Module 11 Network Performance
- 11.1 Monitoring Performance
- 11.2 Common Metrics
- 11.2.1 Activity: Examining Interface Statistics
- 11.3 SNMP
- 11.4 Netflow
- 11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
- 12.1 HA and DR Concepts
- 12.2 High Availability Mechanisms
- 12.3 Disaster Recovery Mechanisms
- 12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
- 13.1 Plans and Procedures
- 13.2 Security Policies
- 13.3 Loss Prevention
- 13.4 Common Agreements
- 13.5 Common Documentation
- 13.6 Structured Cabling - MDF and IDF
- 13.7 Horizontal and Vertical Cabling
- 13.7.1 Activity - Implementing Cable Management
- 13.8 Labeling
- 13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
- 14.1 Common Security Concepts
- 14.2 Common Attack Types
- 14.3 Spoofing-based Attacks
- 14.4 Hijacking and MITM
- 14.5 Social Engineering
- 14.6 Network Segmentation
- 14.7 Private VLANs
- 14.8 Single Organization Authentication
- 14.9 Extending Authentication
- 14.10 Authorization
- 14.11 Network Device Hardening
- 14.12 Wireless Security
- 14.13 Remote Access Security
- 14.14 IoT Security
- 14.15 Physical Security (with Module 14 Outro)