All Access IT Training - 1 Year - ITU Online
ON SALE 54% OFF

All Access IT Training – 1 Year

The Annual All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our Annual All-Access program.

Included In This Course

Included In This Course

Total Hours
2,627 Training Hours
All Access IT Training – 1 Year
13,409 On-demand Videos
Closed Caption

Closed Captions

Course Topics
2,049  Topics
Prep Questions
20,451 Prep Questions
All Access IT Training – 1 Year

Certificate of Completion

Course Description

Our One Year All Access Library Includes

  • Over 225+ courses
  • Over 2,500 hours of video content
  • Hands On Practice Activities
  • Flashcards
  • Games
  • Practice Exam Questions/Test
  • 24/7/365 On Demand Access For 1 Year
  • Industry Leading Certified Instructors
  • Certificate of Completion For Each Course You Finish

Access our extensive library of over 225 courses and 2,500 hours of instructional videos, taught by our instructors who are industry certified and have over 10+ years of experience in the related field. Content can be accessed anytime to match your busy schedule.

As a 1 Year Unlimited Library All Access subscriber, you will have access to all your training material 24 hours a day, 7 days a week. You can learn at your own pace, and go back to review topics as many times as you need. Plus, our 1 Year All Access Pass includes full access to our entire course library, so you can explore new courses and topics as you continue to grow and develop your skills.

The course material is continuously updated to reflect the latest industry changes. You will have access to all new courses and updates for as long as you remain a subscriber.

Your success is our top priority and we take our responsibility as a partner in your success very seriously. Our students have a 98% first time pass rate on major certification exams.

As technology changes, ITU is focused on delivering new and updated content so as technology changes, you always have access to up-skilling your knowledge through our online training. Looking for the same great training for a team? Be sure to look at our Team Training Packages that offer even greater value for multi-user licenses.

No matter your position in the IT industry, we have something for you. Covering all the best and most widely accepted major disciplines. It adds up to thousands of hours of high-quality online-focused IT training. You can trust ITU to give you an edge in the industry.

ITU is also focused on staying up-to-date. We have a team of instructional designers that are always working on new courses and updates to existing ones. As technology changes, we want to make sure our students are getting the most relevant and useful information possible.

The bottom line: an annual subscription to ITU Online Training is one of the best investments you can make in your professional development. And, since it’s a subscription, you always have access to the latest courses and future course releases at no extra charge. So, why wait? Get started today!

Join the thousands of students who have already benefited from our All Access Library Program!

P.S. – If you’re not sure which course is right for you, our team can help! Just reach out to us at support@ituonline.com.When you sign up for our 1 Year Unlimited Online Access, you’ll get access to our exclusive IT certification training videos that will help you prep for your exams. Plus, you’ll get access to all of our current courses and future course releases during your 1 Year access period at no extra charge. We want you to succeed and we are here for you! You’ll also get downloadable assets from your courses, so you can keep them forever and reference them anytime you need them.

Sign up today and get unlimited access to everything ITU has to offer!

The Ultimate in IT Training For Leading Technologies

No matter your position in the IT industry, we have something for you. From cloud and data center operations to networking and cybersecurity, we provide training that will help you further your career.

Our comprehensive library of courses covers the most important topics in IT. Whether you’re looking to improve your skills or learn new technologies, we have the resources you need.

Why Buy A Training Library?

Purchasing a library is the most cost-effective IT training you’ll ever buy. Just a few of the best reasons are:

  • Always Be Up-to-date In The IT Field – Technology changes rapidly. As it changes, you have a great resource to learn new technologies. When we update courses and add new courses, you have full access to it all without addition payment. An exclusive to ITU Online training offered by no other IT training provider.
  • Train On Your Time – There are no deadlines. Train whenever and wherever you want at your own pace.
  • Expand Your IT Knowledge – Even if you only focus on a single technology now, always be open to learning new technologies. If you’re proficient in Microsoft Technologies, there’s no better time to become proficient in all things Cisco. The more you know, the more marketable you and the higher salaries you can command in your field of choice.
  • Quite Simply, Learning Is Fun!

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Course Outline

AI Fundamentals - Getting Started With Artificial Intelligence Course Content

Module 1 - Getting Started With AI

  •    Module 1.1 Introduction To AI

  •    Module 1.2 Understanding The Types of AI

Module 2 - Programming Lanaguages, Tools and Platforms For AI Solutions

  •    Module 2.1 AI and Programming Languages

  •    Module 2.2 AI, Machine Learning and Deep Learning

  •    Module 2.3 AI Models

  •    Module 2.4 AI Services in the Cloud

Module 3 - Data Science Fundamentals for AI

  •    Module 3.1 Introduction to Data Science

  •    Module 3.2 Data Preparation Techniques

  •    Module 3.3 Exploratory Data Analysis (EDA)

Module 4 - AI In the Modern Workplace

  •    Module 4.1 AI In The Workplace

  •    Module 4.2 Data Analysis and Business Intelligence AI Tools

  •    Module 4.3 Automation and Workflow Management Tools

  •    Module 4.4 Natural Language Processing (NLP) Tools

  •    Module 4.5 Virtual Assistants and Chatbots

Module 5 - Ethical AI and Future Trends

  •    Module 5.1 Understanding Bias, Fairness, Privacy, and Security

  •    Module 5.2 Impact of AI on Jobs and Society

  •    Module 5.3 Emerging Trends in AI

  •    Module 5.4 AI Governance and Regulation

Module 6 - Monumental Leaps Forward With AI

  •    Module 6.1 AI for Social Good

  •    Module 6.2 AI in Creative Industries

  •    Module 6.3 AI in Cybersecurity

  •    Module 6.4 AI in Smart Cities and Infrastructure

Module 7 - AI Project Lifecycle Management

  •    Module 7.1 AI Project Lifecycle Management

  •    Module 7.2 Development and Implementation

  •    Module 7.3 Maintenance, Evaluation, and Scaling

Module 8 - AI Fundamentals Course Closeout

  •    Module 8.1 Course Closeout

CompTIA Security+ SY0-701 Course Content

Module 1 - SY0-701 General Security Concepts

  •    1.0 Introduction to the Course

  •    1.1 Fundamental Security Concepts

  •    1.2 Zero Trust

  •    1.3 Deception and Disruption

  •    1.3.1 ACTIVITY - Testing a Honeypot

  •    1.4 Security Controls

  •    1.5 Change Management and Security

  •    1.6 Cryptography Basics

  •    1.6.1 ACTIVITY - Examining Symmetric Encryption

  •    1.7 Asymmetric Encryption

  •    1.7.1 ACTIVITY - Exploring Asymmetric Encryption

  •    1.8 Hashing

  •    1.8.1 ACTIVITY - Verifying Integrity with Hashing

  •    1.9 Digital Certificates

  •    1.10 Public Key Infrastructure

  •    1.11 Data and Keys

  •    1.12 Crypto Implementations

  •    1.13 Blockchain

  •    1.14 Non-Cryptographic Data Protection

Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigations

  •    2.1 Threat Actors and Motivations

  •    2.2 Threat Vectors

  •    2.2.1 ACTIVITY - O.MG Cable Baiting

  •    2.2.2 O.MG-No Cable

  •    2.3 Social Engineering

  •    2.4 Operating System Vulnerabilities and Attacks

  •    2.5 Application Vulnerabilities and Attacks

  •    2.5.1 ACTIVITY - Performing a Buffer Overflow

  •    2.6 Web-based Vulnerabilities and Attacks

  •    2.6.1 ACTIVITY - Abusing Unsanitized Input

  •    2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection

  •    2.6.3 ACTIVITY - Swiping a Token with XSS

  •    2.7 Other Vulnerabilities

  •    2.8 Common Malicious Activity Indicators

  •    2.9 Insider Threat Indicators

  •    2.10 Social Engineering Indicators

  •    2.10.1 ACTIVITY - Capturing Credentials through Social Engineering

  •    2.11 Malware Activity Indicators

  •    2.12 Operating System Attack Indicators

  •    2.13 Application Attack Indicators

  •    2.13.1 ACTIVITY - Recognizing Directory Traversal

  •    2.14 Physical Attack Indicators

  •    2.14.1 ACTIVITY - Quickly Cloning an RFID Badge

  •    2.15 Network Attack Indicators

  •    2.15.1 ACTIVITY - Crashing a Target with DoS

  •    2.16 Cryptographic Attack Indicators

  •    2.17 Password Attack Indicators

  •    2.17.1 ACTIVITY - Password Cracking

  •    2.18 Network Segmentation

  •    2.19 Access Control

  •    2.20 Enterprise Device Hardening

Module 3 - SY0-701 Security Architecture

  •    3.1 Network Segmentation

  •    3.1.1 ACTIVITY - Segementing a Network

  •    3.2 High Availability

  •    3.3 Virtualization

  •    3.3.1 ACTIVITY - Deploying Docker Containers

  •    3.4 Cloud

  •    3.5 Serverless Computing

  •    3.6 IoT

  •    3.7 ICS SCADA

  •    3.7.1 ACTIVITY - Operating a SCADA System

  •    3.8 RTOS and Embedded Systems

  •    3.9 Reducing the Attack Surface

  •    3.10 Firewalls

  •    3.11 IDS IPS.mp4

  •    3.12 Secure Communications - Access

  •    3.13 Port Security

  •    3.14 SD-WAN and SASE

  •    3.15 Data Classifications

  •    3.16 Protecting Data Types

  •    3.17 Data Considerations

  •    3.18 Redundancy

  •    3.19 Alternate Sites

  •    3.20 Multiple Platforms

  •    3.21 Business Continuity

Module 4 - SY0-701 Security Operations

  •    4.1 Secure Baselines

  •    4.2 Attack Surface Reduction

  •    4.3 Wireless Installation

  •    4.4 Wireless Security Settings

  •    4.5 Mobile Solutions

  •    4.5.1 ACTIVITY - Pwning a Mobile Device

  •    4.6 Application Security Management

  •    4.7 Asset Management

  •    4.8 Vulnerability Management

  •    4.9 Monitoring Activities

  •    4.10 Monitoring Tools

  •    4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities

  •    4.11 Firewall Configuration

  •    4.11.1 ACTIVITY - Configuring Firewall Rules

  •    4.12 Intrusion Detection Configuration

  •    4.13 Web Traffic Filtering

  •    4.14 Operating System Policy

  •    4.14.1 ACTIVITY - Examining Windows Group Policy

  •    4.15 Network Service Security

  •    4.16 Data Loss Protection

  •    4.16.1 ACTIVITY - Checking File Integrity

  •    4.17 Network Access Control

  •    4.17.1 ACTIVITY - Require Multifactor Authentication

  •    4.18 Identity Management

  •    4.19 Access Management

  •    4.19.1 ACTIVITY - Implementing Access Control

  •    4.20 Security Automation

  •    4.21 Incident Response

  •    4.22 Digital Forensics

Module 5 - SY0-701 Security Program Management and Oversight

  •    5.1 Elements of Effective Security Governance

  •    5.2 Elements of the Risk Management Process

  •    5.3 Third Party Risk Assessment and Management

  •    5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure

  •    5.4 Effective Security Compliance

  •    5.5 Audits and Assessments

  •    5.5.1 ACTIVITY - Conducting OSINT

  •    5.5.2 ACTIVITY - Performing Active Reconnaissance

  •    5.6 Security Awareness Practices

  •    5.7 Course Outro

CompTIA Cybersecurity Analyst CySA+ (CS0-003) Course Content

Module 1 - CompTIA CySA+ CS0-003 Basics

  •    1.1 Course Introduction

  •    1.2 Instructor Introduction

  •    1.3 What is CySA

  •    1.4 Exam Objectives

  •    1.5 Cybersecurity Pathway

  •    1.6 DoD Baseline Certfication

Module 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations

  •    2.1 Domain 1 - Security Operations Overview

  •    2.2 System and Network Architecture Concepts in Security Operations

  •    2.3 Log Files

  •    2.4 Operating Systems

  •    2.5 Infrastructure Concepts

  •    2.6 Network Architecture

  •    2.7 Software Defined Networking

  •    2.8 Whiteboard Discussion - Network Architectures

  •    2.9 Identity and Access Management IAM Basics

  •    2.10 Demonstration - IAM

  •    2.11 Encryption

  •    2.12 Sensitive Data

  •    2.13 1.2 Analyze Indicators of Potentially Malicious Activity

  •    2.14 Network Attack

  •    2.15 Host Attacks

  •    2.16 Application Related Attacks

  •    2.17 Social Attacks

  •    2.18 Tools or Techniques to Determine Malicious Activity Overview

  •    2.19 Tools and Toolsets For Identifying Malicious Activity

  •    2.20 Common Techniques

  •    2.21 Programming Concerns

  •    2.22 Threat-Intelligence and Threat-Hunting Concepts Overview

  •    2.23 Threat Actors

  •    2.24 Tactics, Techniques and Procedures

  •    2.25 Confidence Levels IOC

  •    2.26 Collection Sources

  •    2.27 Threat Intelligence

  •    2.28 Cyber Response Teams

  •    2.29 Security Operations

  •    2.30 Standardized Processes and Operations

  •    2.31 Security Operations Tools and Toolsets

  •    2.32 Module 2 Review

Module 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management

  •    3.1 Domain 2 - Vulnerability Management Overview

  •    3.2 Vulnerability Discovery and Scanning

  •    3.3 Asset Discovery and Scanning

  •    3.4 Industry Frameworks

  •    3.5 Mitigating Attacks

  •    3.6 CVSS and CVE

  •    3.7 Common Vulnerability Scoring System (CVSS) interpretation

  •    3.8 CVE Databases

  •    3.9 Cross Site Scripting (XSS)

  •    3.10 Vulnerability Response, Handling, and Management

  •    3.11 Control Types (Defense in Depth, Zero Trust)

  •    3.12 Patching and Configurations

  •    3.13 Attack Surface Management

  •    3.14 Risk Management Principles

  •    3.15 Threat Modeling

  •    3.16 Threat Models

  •    3.17 Secure Coding and Development (SDLC)

  •    3.18 Module 3 Review

Module 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response and Management

  •    4.1 Domain 3 - Incident Response and Management Overview

  •    4.2 Attack Methodology Frameworks

  •    4.3 Cyber Kill Chain

  •    4.4 Frameworks to Know

  •    4.5 Incident Response and Post Reponse

  •    4.6 Detection and Analysis

  •    4.7 Post Incident Activities

  •    4.8 Containment, Eradication and Recovery

  •    4.9 Module 4 Review

Module 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication

  •    5.1 Domain 4 - Reporting and Communication Overview

  •    5.2 Reporting Vulnerabilities Overview

  •    5.2.1 Vulnerability Reporting

  •    5.3 Compliance Reports

  •    5.4 Inhibitors to Remediation

  •    5.5 Metrics and KPI's

  •    5.6 Incident Response Reporting and Communications Overview

  •    5.7 Incident Declaration

  •    5.8 Communication with Stakeholders

  •    5.9 Root Cause Analysis

  •    5.10 Lessons Learned and Incident Closure

  •    5.11 Module 5 Review

Module 6 - CompTIA CySA+ CS0-003 - Course Closeout

  •    6.1 Course Closeout Overview

  •    6.2 Practice Questions

  •    6.3 Exam Process

  •    6.4 Continuing Education

  •    6.5 Course Closeout

Microsoft Azure Administrator (AZ-104) Course Content

Module 1 - Azure Overview

  •    1.0 Introduction to AZ-104

  •    1.1 Cloud Computing

  •    1.2 Cloud Services Benefits

  •    1.3 Cloud Service Types

  •    1.4 Azure Core Architectural Components

  •    1.4.1 ACTIVITY-Creating Management Groups and Subscriptions

  •    1.5 Azure Compute Services

  •    1.6 Azure Application Hosting Options

  •    1.7 Azure Networking Services

  •    1.8 Azure Storage Services

  •    1.9 Azure Identity, Access, and Security

  •    1.10 Azure Cost Management

  •    1.10.1 ACTIVITY- Checking Your Azure Balance

  •    1.11 Azure Governance and Compliance Tools

  •    1.11.1 ACTIVITY- Assign an Azure Policy

Module 2 - Azure Tools

  •    2.1 Azure Portal

  •    2.1.1 ACTIVITY- Exploring the Azure Portal

  •    2.2 Azure Monitoring Tools

  •    2.3 Azure PowerShell

  •    2.3.1 ACTIVITY- Using Azure PowerShell

  •    2.4 Azure CLI

  •    2.4.1 ACTIVITY- Using the Azure CLI

  •    2.5 Azure Cloud Shell

  •    2.6 ARM Templates

  •    2.6.1 ACTIVITY- Using Templates to Deploy Resources

  •    2.7 Azure Resource Manager

  •    2.8 Hybrid Tools

Module 3 - Azure Identities and Governance

  •    3.1 Azure AD Overview

  •    3.1.1 ACTIVITY- Exploring Azure Active Directory

  •    3.1.2 ACTIVITY- Adding a Custom Domain

  •    3.2 Subscriptions

  •    3.3 Users and Groups

  •    3.3.1 ACTIVITY- Adding Azure Active Directory User

  •    3.3.2 ACTIVITY- Bulk Inviting New Users

  •    3.3.3 ACTIVITY- Creating Azure AD Groups

  •    3.4 Authentication

  •    3.5 SSPR

  •    3.5.1 ACTIVITY- Implementing SSPR

  •    3.6 Devices

  •    3.7 Azure Roles

  •    3.7.1 ACTIVITY- Assigning Azure Roles

  •    3.8 Azure AD Roles

  •    3.8.1 ACTIVITY- Assigning Azure AD Roles

  •    3.9 Conditional Access

  •    3.10 Authorization

  •    3.10.1 ACTIVITY- Managing Licenses

  •    3.11 Azure Policy

Module 4 - Azure Storage

  •    4.1 Storage Accounts

  •    4.1.1 ACTIVITY- Creating a Storage Account

  •    4.2 Storage Types

  •    4.2.1 ACTIVITY- Creating Storage Types

  •    4.3 Azure Storage Tools

  •    4.3.1 ACTIVITY- Azure Storage Explorer

  •    4.4 Azure Files and File Sync

  •    4.4.1 ACTIVITY- Deploying an Azure Files Share

  •    4.5 Azure Storage Security

Module 5 - Azure Compute Resources

  •    5.1 Virtual Machines

  •    5.1.1 ACTIVITY- Create Virtual Machines

  •    5.1.2 ACTIVITY- Delete a Virtual Machine

  •    5.2 VM Availability

  •    5.2.1 ACTIVITY- Increasing VM Availability

  •    5.3 VM Extensions

  •    5.4 Azure App Service

  •    5.5 Azure Container Instances

  •    5.6 Kubernetes

Module 6 - Azure Virtual Networks

  •    6.1 Virtual Networks

  •    6.1.1 ACTIVITY- Create a VNet

  •    6.2 Network Security Groups-Part 1

  •    6.2.1 Network Security Groups-Part 2

  •    6.3 Azure Firewall

  •    6.3.1 ACTIVITY- Deploying a Firewall

  •    6.4 Azure DNS-Part 1

  •    6.4.1 Azure DNS-Part 2

  •    6.4.2 ACTIVITY- Implementing Azure DNS Zone6

  •    6.5 Virtual Network Peering

  •    6.5.1 ACTIVITY- VNet Peering

  •    6.6 Azure VPN Gateway

  •    6.7 ExpressRoute and Virtual WANs

  •    6.8 Azure Load Balancer

  •    6.9 Azure Application Gateway

  •    6.10 Azure Routes

Module 7 - Azure Monitoring and Backup

  •    7.1 Network Watcher

  •    7.2 Azure Monitor

  •    7.3 Azure Backup-Part 1

  •    7.4 Azure Backup-Part 2

  •    7.5 Azure Backup-Part 3

  •    7.6 Conclusion to AZ-104

ChatGPT and AI Business Fundamentals Course Content

Module 1 - ChatGPT Fundamentals

  •    1.1 Course Welcome

  •    1.2 Instructor Introduction

  •    1.3 Download Course Resources

  •    1.4 ChatGPT Fundamentals

  •    1.5 What is ChatGPT

  •    1.6 Use Cases for ChatGPT

  •    1.7 Role of ChatGPT

  •    1.8 Future of ChatGPT

  •    1.9 ChatGPT Statistics, Facts & Trends

  •    1.10 Limitations

  •    1.11 What is a Chatbot

  •    1.12 Understanding AI-ML

  •    1.13 Demonstration - Tools to Use with ChatGPT

  •    1.14 Business Benefits

  •    1.15 Whiteboard - How it all works

  •    1.16 Demonstration - How to Get Started with ChatGPT

  •    1.17 Demonstration - Example Prompts

  •    1.18 Discussion - ChatGPT Performance Issues

  •    1.19 Module Summary

Module 2 - ChatGPT Prompt Demonstrations

  •    2.1 ChatGPT Prompt Demonstrations

  •    2.2 What is a Prompt

  •    2.3 Best Practices For Writing Prompts

  •    2.4 Prompt Demonstration - Asking Questions

  •    2.5 Prompt Demonstration - Top Ten Lists

  •    2.6 Prompt Demonstration - Long Form Docs

  •    2.7 Prompt Demonstration - Complex Form and Code

  •    2.8 Prompt Demonstration - Feedback

  •    2.9 Prompt Demonstration - Content Modification

  •    2.10 Prompt Demonstration - Instruction Generation

  •    2.11 Prompt Demonstration - Information Extraction

  •    2.12 Prompt Demonstration - Writing Computer Code

  •    2.13 Prompt Demonstration - Solving Math Problems

  •    2.14 Prompt Demonstration - Create YT Video Outline

  •    2.15 Prompt Demonstration - Write a Blog Article

  •    2.16 Prompt Demonstration - SEO Keywords

  •    2.17 Comparing Google Bard vs ChatGPT

  •    2.18 Module Summary

  •    2.19 Course Closeout

Certified Ethical Hacker (CEH) v12 Course Content

Module 1 - Introduction To Ethical Hacking

  •    1.0 Introduction to CEH v12

  •    1.1 Elements of Security

  •    1.2 Cyber Kill Chain

  •    1.3 MITRE ATT&CK Framework

  •    1.3.1 Activity - Researching the MITRE ATTACK Framework

  •    1.4 Hacking

  •    1.5 Ethical Hacking

  •    1.6 Information Assurance

  •    1.7 Risk Management

  •    1.8 Incident Management

  •    1.9 Information Security Laws and Standards

  •    1.10 Introduction to Ethical Hacking Review

Module 2: Footprinting and Reconnaissance

  •    2.1 Footprinting Concepts

  •    2.2 OSINT Tools

  •    2.2.1 Activity - Conduct OSINT with OSR Framework

  •    2.2.2 Activity - OSINT with theHarvester

  •    2.2.3 Activity - Add API Keys to theHarvester

  •    2.2.4 Activity - Extract Document Metadata with FOCA

  •    2.2.5 Activity - Extract Document Metadata with FOCA

  •    2.3 Advanced Google Search

  •    2.3.1 Activity - Google Hacking

  •    2.4 Whois Footprinting

  •    2.4.1 Activity - Conducting Whois Research

  •    2.5 DNS Footprinting

  •    2.5.1 Activity - Query DNS with NSLOOKUP

  •    2.6 Website Footprinting

  •    2.6.1 Activity - Fingerprint a Webserver with ID Serve

  •    2.6.2 Activity - Extract Data from Websites

  •    2.6.3 Activity - Mirror a Website with HTTrack

  •    2.7 Email Footprinting

  •    2.7.1 Activity - Trace a Suspicious Email

  •    2.8 Network Footprinting

  •    2.9 Social Network Footprinting

  •    2.10 Footprinting and Reconnaissance Countermeasures

  •    2.11 Footprinting and Reconnaissance Review

Module 3: Scanning Networks

  •    3.1 Scanning Concepts

  •    3.2 Discovery Scans

  •    3.2.1 Activity - ICMP ECHO and ARP Pings

  •    3.2.2 Activity - Host Discovery with Angry IP Scanner

  •    3.3 Port Scans

  •    3.3.1 Activity - Port Scan with Angry IP Scanner

  •    3.4 Other Scan Types

  •    3.5 Scanning Tools

  •    3.5.1 Activity - Hping3 Packet Crafting

  •    3.5.2 Activity - Fingerprinting with Zenmap

  •    3.6 NMAP

  •    3.6.1 Activity - Nmap Basic Scans

  •    3.6.2 Activity - Host Discovery with Nmap

  •    3.6.3 - Activity - Nmap Version Detection

  •    3.6.4 Activity - Nmap Idle (Zombie) Scan

  •    3.6.5 Activity - Nmap FTP Bounce Scan

  •    3.6.6 - Activity - NMAP Scripts

  •    3.7 Firewall and IDS Evasion

  •    3.7.1 Activity - Nmap Advanced Scans

  •    3.8 Proxies

  •    3.9 Scanning Countermeasures

  •    3.10 Scanning Networks Review

Module 4: Enumeration

  •    4.1 Enumeration Overview

  •    4.2 SMB_NetBIOS_Enumeration

  •    4.2.1 Activity - Enumerate NetBIOS Information with Hyena

  •    4.3 File Transfer Enumeration

  •    4.4 WMI Enumeration

  •    4.4.1 - Activity - Enumerating WMI with Hyena

  •    4.5 SNMP Enumeration

  •    4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect

  •    4.6 LDAP Enumeration

  •    4.7 DNS Enumeration

  •    4.8 SMTP Enumeration

  •    4.8.1 Activity - Enumerate Email Users with SMTP

  •    4.9 Remote Connection Enumeration

  •    4.10 Website Enumeration

  •    4.10.1 Activity - Enumerate a Website with DirBuster

  •    4.11 Other Enumeration Types

  •    4.12 Enumeration Countermeasures and Review

Module 5: Vulnerability Analysis

  •    5.1 Vulnerability Scanning

  •    5.1.1 Vulnerability Scanning with OpenVAS

  •    5.2 Vulnerability Assessment

  •    5.3 Vulnerability Analysis Review

Module 6: System Hacking

  •    6.1 System Hacking Concepts

  •    6.2 Common OS Exploits

  •    6.3 Buffer Overflows

  •    6.3.1 Activity - Performing a Buffer Overflow

  •    6.4 System Hacking Tools and Frameworks

  •    6.4.1 Activity - Hack a Linux Target from Start to Finish

  •    6.5 Metasploit

  •    6.5.1 Activity - Get Started with Metasploit

  •    6.6 Meterpreter

  •    6.7 Keylogging and Spyware

  •    6.7.1 Activity - Keylogging with Meterpreter

  •    6.8 Netcat

  •    6.8.1 Activity - Using Netcat

  •    6.9 Hacking Windows

  •    6.9.1 Activity - Hacking Windows with Eternal Blue

  •    6.10 Hacking Linux

  •    6.11 Password Attacks

  •    6.11.1 Activity - Pass the Hash

  •    6.11.2 Activity - Password Spraying

  •    6.12 Password Cracking Tools

  •    6.13 Windows Password Cracking

  •    6.13.1 Activity - Cracking Windows Passwords

  •    6.13.2 Activity - Cracking Password Hashes with Hashcat

  •    6.14 Linux Password Cracking

  •    6.15 Other Methods for Obtaining Passwords

  •    6.16 Network Service Attacks

  •    6.16.1 Activity - Brute Forcing a Network Service with Medusa

  •    6.17 Post Exploitation

  •    6.18 Pivoting

  •    6.18.1 & 6.18.2 Activity - Pivoting Setup and Attack

  •    6.19 Maintaining Access

  •    6.19.1 Activity - Persistence

  •    6.20 Hiding Data

  •    6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography

  •    6.21 Covering Tracks

  •    6.21.1 Activity - Clearing Tracks in Windows

  •    6.21.2 Activity - View and Clear Audit Policies with Auditpol

  •    6.22 System Hacking Countermeasures

  •    6.23 System Hacking Review

Module 7: Malware Threats

  •    7.1 Malware Overview

  •    7.2 Viruses

  •    7.3 Trojans

  •    7.3.1 Activity - Deploying a RAT

  •    7.4 Rootkits

  •    7.5 Other Malware

  •    7.6 Advanced Persistent Threat

  •    7.7 Malware Makers

  •    7.7.1 Activity - Creating a Malware Dropper and Handler

  •    7.8 Malware Detection

  •    7.9 Malware Analysis

  •    7.9.1 Activity - Performing a Static Code Review

  •    7.9.2 Activity - Analyzing the SolarWinds Orion Hack

  •    7.10 Malware Countermeasures

  •    7.11 Malware Threats Review

Module 8: Sniffing

  •    8.1 Network Sniffing

  •    8.2 Sniffing Tools

  •    8.2.1 Activity- Sniffing HTTP with Wireshark

  •    8.2.2 Activity - Capturing Files from SMB

  •    8.3 ARP and MAC Attacks

  •    8.3.1 Activity - Performing an MITM Attack with Ettercap

  •    8.4 Name Resolution Attacks

  •    8.4.1 Activity - Spoofing Responses with Responder

  •    8.5 Other Layer 2 Attacks

  •    8.6 Sniffing Countermeasures

  •    8.7 Sniffing Review

Module 9: Social Engineering

  •    9.1 Social Engineering Concepts

  •    9.2 Social Engineering Techniques

  •    9.2.1 Activity - Deploying a Baited USB Stick

  •    9.2.2 Activity - Using an O.MG Lightning Cable

  •    9.3 Social Engineering Tools

  •    9.3.1 Activity - Phishing for Credentials

  •    9.4 Social Media, Identity Theft, Insider Threats

  •    9.5 Social Engineering Countermeasures

  •    9.6 Social Engineering Review

Module 10: Denial-of-Service

  •    10.1 DoS-DDoS Concepts

  •    10.2 Volumetric Attacks

  •    10.3 Fragmentation Attacks

  •    10.4 State Exhaustion Attacks

  •    10.5 Application Layer Attacks

  •    10.5.1 Activity - Performing a LOIC Attack

  •    10.5.2 Activity - Performing a HOIC Attack

  •    10.5.3 Activity - Conducting a Slowloris Attack

  •    10.6 Other Attacks

  •    10.7 DoS Tools

  •    10.8 DoS Countermeasures

  •    10.9 DoS Review

Module 11: Session Hijacking

  •    11.1 Session Hijacking

  •    11.2 Compromising a Session Token

  •    11.3 XSS

  •    11.4 CSRF

  •    11.5 Other Web Hijacking Attacks

  •    11.6 Network-Level Session Hijacking

  •    11.6.1 Activity - Hijack a Telnet Session

  •    11.7 Session Hijacking Tools

  •    11.8 Session Hijacking Countermeasures

  •    11.9 Session Hijacking Review

Module 12: Evading IDS, Firewalls, and Honeypots

  •    12.1 Types of IDS

  •    12.2 Snort

  •    12.3 System Logs

  •    12.4 IDS Considerations

  •    12.5 IDS Evasion

  •    12.5.1 Activity - Fly Below IDS Radar

  •    12.6 Firewalls

  •    12.7 Packet Filtering Rules

  •    12.8 Firewall Deployments

  •    12.9 Split DNS

  •    12.10 Firewall Product Types

  •    12.11 Firewall Evasion

  •    12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall

  •    12.11.2 Activity - Busting the DOM for WAF Evasion

  •    12.12 Honeypots

  •    12.13 Honeypot Detection and Evasion

  •    12.13.1 Activity - Test and Analyze a Honey Pot

  •    12.14 Evading IDS, Firewalls, and Honeypots Review

Module 13: Hacking Web Servers

  •    13.1 Web Server Operations

  •    13.2 Hacking Web Servers

  •    13.3 Common Web Server Attacks

  •    13.3.1 Activity - Defacing a Website

  •    13.4 Web Server Attack Tools

  •    13.5 Hacking Web Servers Countermeasures

  •    13.6 Hacking Web Servers Review

Module 14: Hacking Web Applications

  •    14.1 Web Application Concepts

  •    14.2 Attacking Web Apps

  •    14.3 A01 Broken Access Control

  •    14.4 A02 Cryptographic Failures

  •    14.5 A03 Injection

  •    14.5.1 Activity - Command Injection

  •    14.6 A04 Insecure Design

  •    14.7 A05 Security Misconfiguration

  •    14.8 A06 Vulnerable and Outdated Components

  •    14.9 A07 Identification and Authentication Failures

  •    14.10 A08 Software and Data integrity Failures

  •    14.11 A09 Security Logging and Monitoring Failures

  •    14.12 A10 Server-Side Request Forgery

  •    14.13 XSS Attacks

  •    14.13.1 Activity - XSS Walkthrough

  •    14.13.2 Activity - Inject a Malicious iFrame with XXS

  •    14.14 CSRF

  •    14.15 Parameter Tampering

  •    14.15.1 Activity - Parameter Tampering with Burp

  •    14.16 Clickjacking

  •    14.17 SQL Injection

  •    14.18 Insecure Deserialization Attacks

  •    14.19 IDOR

  •    14.19.1 Activity - Hacking with IDOR

  •    14.20 Directory Traversal

  •    14.21 Session Management Attacks

  •    14.22 Response Splitting

  •    14.23 Overflow Attacks

  •    14.24 XXE Attacks

  •    14.25 Web App DoS

  •    14.26 Soap Attacks

  •    14.27 AJAX Attacks

  •    14.28 Web API Hacking

  •    14.29 Webhooks and Web Shells

  •    14.30 Web App Hacking Tools

  •    14.31 Hacking Web Applications Countermeasures

  •    14.32 Hacking Web Applications Review

Module 15: SQL Injection

  •    15.1 SQL Injection Overview

  •    15.2 Basic SQL Injection

  •    15.3 Finding Vulnerable Websites

  •    15.4 Error-based SQL Injection

  •    15.5 Union SQL Injection

  •    15.5.1 Activity - Testing SQLi on a Live Website - Part 1

  •    15.5.2 Activity - Testing SQLi on a Live Website - Part 2

  •    15.6 Blind SQL Injection

  •    15.7 SQL Injection Tools

  •    15.7.1 Activity - SQL Injection Using SQLmap

  •    15.8 Evading Detection

  •    15.9 Analyzing SQL Injection

  •    15.10 SQL Injection Countermeasures

  •    15.11 SQL Injection Review

Module 16: Hacking Wireless Networks

  •    16.1 Wireless Concepts

  •    16.2 Wireless Security Standards

  •    16.3 WI-FI Discovery Tools

  •    16.4 Common Wi-Fi Attacks

  •    16.5 Wi-Fi Password Cracking

  •    16.6 WEP Cracking

  •    16.6.1 Activity - Cracking WEP

  •    16.7 WPA,WPA2,WPA3 Cracking

  •    16.7.1 Activity - WPA KRACK Attack

  •    16.8 WPS Cracking

  •    16.9 Bluetooth Hacking

  •    16.10 Other Wireless Hacking

  •    16.10.1 Activity - Cloning an RFID badge

  •    16.10.2 Activity - Hacking with a Flipper Zero

  •    16.11 Wireless Security Tools

  •    16.12 Wireless Hacking Countermeasures

  •    16.13 Hacking Wireless Networks Review

Module 17: Hacking Mobile Platforms

  •    17.1 Mobile Device Overview

  •    17.2 Mobile Device Attacks

  •    17.3 Android Vulnerabilities

  •    17.4 Rooting Android

  •    17.5 Android Exploits

  •    17.5.1 Activity - Hacking Android

  •    17.5.2 Activity - Using a Mobile Device in a DDoS Campaign

  •    17.6 Android-based Hacking Tools

  •    17.7 Reverse Engineering an Android App

  •    17.8 Securing Android

  •    17.9 iOS Overview

  •    17.10 Jailbreaking iOS

  •    17.11 iOS Exploits

  •    17.12 iOS-based Hacking Tools

  •    17.13 Reverse Engineering an iOS App

  •    17.14 Securing iOS

  •    17.15 Mobile Device Management

  •    17.16 Hacking Mobile Platforms Countermeasures

  •    17.17 Hacking Mobile Platforms Review

Module 18: IoT AND OT Hacking

  •    18.1 IoT Overview

  •    18.2 IoT Infrastructure

  •    18.3 IoT Vulnerabilities and Threats

  •    18.3.1 Activity - Searching for Vulnerable IoT Devices

  •    18.4 IoT Hacking Methodology and Tools

  •    18.5 IoT Hacking Countermeasures

  •    18.6 OT Concepts

  •    18.7 IT-OT Convergence

  •    18.8 OT Components

  •    18.9 OT Vulnerabilities

  •    18.10 OT Attack Methodology and Tools

  •    18.11 OT Hacking Countermeasures

  •    18.12 IoT and OT Hacking Review

Module 19: Cloud Computing

  •    19.1 Cloud Computing Concepts

  •    19.2 Cloud Types

  •    19.3 Cloud Benefits and Considerations

  •    19.4 Cloud Risks and Vulnerabilities

  •    19.5 Cloud Threats and Countermeasures

  •    19.5.1 Activity - Hacking S3 Buckets

  •    19.6 Cloud Security Tools And Best Practices

  •    19.7 Cloud Computing Review

Module 20: Cryptography

  •    20.1 Cryptography Concepts

  •    20.2 Symmetric Encryption

  •    20.2.1 Activity - Symmetric Encryption

  •    20.3 Asymmetric Encryption

  •    20.3.1 Activity - Asymmetric Encryption

  •    20.4 Public Key Exchange

  •    20.5 PKI

  •    20.5.1 Activity - Generating and Using an Asymmetric Key Pair

  •    20.6 Digital Signatures

  •    20.7 Hashing

  •    20.7.1 Activity - Calculating Hashes

  •    20.8 Common Cryptography Use Cases

  •    20.9 Cryptography Tools

  •    20.10 Cryptography Attacks

  •    20.11 Cryptography Review

  •    20.12 Course Conclusion

CompTIA Cloud+ (CV0-003) Course Content

Module 1 - CompTIA Cloud+ CV0-003 Course Overview

  •    1.0 Course Trailer

  •    1.1 Course Overview

  •    1.2 What is the Cloud + Exam

  •    1.3 Cloud + Domain Obectives Overview

  •    1.4 CompTIA Certification Pathways

  •    1.5 DoD and ISO Requirements

Module 2 - General Cloud Knowledge

  •    2.1 Domain Overview

  •    2.2 Compare and Contrast Cloud Models

  •    2.3 Cloud Computing Defined

  •    2.4 Deployment Models

  •    2.5 Service Models

  •    2.6 Cloud Characteristics

  •    2.7 Cloud Roles

  •    2.8 Evaluate Cloud Providers and Services

  •    2.9 Regions and Zones

  •    2.10 Shared Responsibility Model

  •    2.11 Demonstration - AWS Shared Security Model

  •    2.12 Comparing Cloud to Virtualization

  •    2.13 Comparing Cloud to On Premises

  •    2.14 What is a Virtual Machine

  •    2.15 Demonstration - Deploy a Cloud VM (AWS EC2)

  •    2.16 What is an API

  •    2.17 Capacity Planning Factors

  •    2.18 Licensing, Factors, Requirements and Planning

  •    2.19 Capacity Planning

  •    2.20 Demonstration - AWS Trusted Advisor

  •    2.21 HA and Scaling

  •    2.22 High Availability and Disaster Recovery

  •    2.23 Virtual, System and Communication Protection

  •    2.24 Hypervisor Affinity

  •    2.25 Analyze the solution design

  •    2.26 Business Requirements

  •    2.27 Business Enablers

  •    2.28 Demonstration -AWS Well Architected Tool

  •    2.29 Testing Techniques

  •    2.30 Testing Success Factors

  •    2.31 Module Review Questions

  •    2.32 Module Summary Review

Module 3 - Cloud Security

  •    3.1 Domain Overview

  •    3.2 Configure Identity and Access Management

  •    3.3 Identification and Authorization Management (IAM)

  •    3.4 SDLC

  •    3.5 Directory Services

  •    3.6 Security and Access Controls

  •    3.7 Federation

  •    3.8 SSO and MFA

  •    3.9 Certificates and Key Management

  •    3.10 Secure a Network in a Cloud Environment

  •    3.11 Networking Devices and Segmentation

  •    3.12 Firewalls and Proxies

  •    3.13 NAT and PAT

  •    3.14 Secure Network Configurations (Tunnelling and Encryption)

  •    3.15 Demo Hardening and Configuration Changes

  •    3.16 OS Application Controls and Security Credentials

  •    3.17 Policies and Permissions

  •    3.18 Host and Network Protections (HIDSIPS)

  •    3.19 Virtualization Security

  •    3.20 Monitoring

  •    3.21 Data Security and Compliance Controls in Cloud Environments

  •    3.22 Structured, Unstructured and Semi Structured Data

  •    3.23 Data Classification and Labeling

  •    3.24 Data Loss Prevention

  •    3.25 Demonstration - Google Cloud DLP

  •    3.26 Chain of Custody and Non-Repudiation

  •    3.27 Discussion - CASB

  •    3.28 Module Summary Review

  •    3.29 Module Review Questions

Module 4 - Cloud Deployment

  •    4.1 Domain Overview

  •    4.2 Integrate Components into Cloud Solutions

  •    4.3 Subscription Services

  •    4.4 Demonstration - Provision VM

  •    4.5 Cloud Infrastructure Components

  •    4.6 Whiteboard - Design a Resilent AWS Cloud Architecture

  •    4.7 Containers

  •    4.8 Microservices

  •    4.9 Demonstration - Deploy Containers

  •    4.10 Scaling

  •    4.11 Provision Storage

  •    4.12 Cloud Storage Protocols

  •    4.13 Storage Features

  •    4.14 Storage Cost Considerations

  •    4.15 Storage Performance

  •    4.16 RAID and Tiering

  •    4.17 Demonstration - AWS S3

  •    4.18 Deploy Cloud Networking Solutions

  •    4.19 Connecting to The Cloud

  •    4.20 Network Protocols

  •    4.21 VPNS, VPC and Connectivity

  •    4.22 Whiteboard - AWS VPC Connectivity

  •    4.23 Demonstration - AWS VPC

  •    4.24 Software Defined Networking (SDN)

  •    4.25 Compute Sizing

  •    4.26 Virtualization Considerations

  •    4.27 Resource Rightsizing (CPU, Memory, etc)

  •    4.28 Module Summary Review

  •    4.29 Module Review Questions

Module 5 - Operations and Support

  •    5.1 Domain Overview

  •    5.2 Logging Monitoring and Alerting

  •    5.3 Logging, Storage and Analysis of Data Events

  •    5.4 Monitoring Cloud Resources

  •    5.5 Service Level Agreements

  •    5.6 Demonstration - SLAs in AWS

  •    5.7 Maintain Efficient Operations of a Cloud Environment

  •    5.8 Lifecycle Management

  •    5.9 Change and Asset Management

  •    5.10 SOP, Patching and Upgrades

  •    5.11 Orchestration and Automation

  •    5.12 Orchestration or Automation

  •    5.13 DevOps, IaC and CICD Pipelines

  •    5.14 Playbooks and Templates

  •    5.15 Backup and Restore Operations

  •    5.16 Backup Types, Objects, Targets

  •    5.17 Restore and Recovery

  •    5.18 Module Summary Review

  •    5.19 Module Review Questions

Module 6 - Troubleshooting

  •    6.1 Domain Overview

  •    6.2 Troubleshooting Methodology Intro

  •    6.3 Troubleshooting Methodology

  •    6.4 Troubleshoot Security Issues

  •    6.5 Cloud Attacks

  •    6.6 Security Groups and NACLS

  •    6.7 Troubleshoot Deployment Issues

  •    6.8 Discussion Site Connectivity Issues

  •    6.9 Discussion - Capacity Issues

  •    6.10 Connectivity Issues

  •    6.11 Connectivity Troubleshooting Tools

  •    6.12 Demonstration - GCP AWS Azure Latency Test

  •    6.13 Module Summary Review

  •    6.14 Module Review Questions

Module 7 - Course Closeout

  •    7.1 Exam Preparation

  •    7.2 Course Closeout

Google Cloud Digital Leader Course Content

Module 1 - Google Cloud Digital Leader Course Overview

  •    1.0 About Google Cloud Digital Leader

  •    1.1 Course and Instructor Intro

  •    1.2 Course PreReqs

  •    1.3 GCP Certification Overview

  •    1.4 GCP Digital Leader Exam Objectives

Module 2 - General Cloud Knowledge

  •    2.0 General Cloud Knowledge

  •    2.1 Domain Objectives

  •    2.2 Intro to Cloud Computing

  •    2.3 Essential Characteristics of Cloud Computing

  •    2.4 Service Models

  •    2.5 Deployment Models

  •    2.6 Multitenancy

  •    2.7 Resilency

  •    2.8 Replication

  •    2.9 Automation and Orchestration

  •    2.10 Chargeback

  •    2.11 Vendor Lockin

  •    2.12 Cloud Standards

  •    2.13 OpEx, CapEx

  •    2.14 TCO-ROI

  •    2.15 Business Enablers

  •    2.16 Section Summary

  •    2.17 Review Questions

Module 3 - General Google Cloud Knowledge

  •    3.0 General GCP Knowledge

  •    3.1 Domain Objectives

  •    3.2 GCP Overview

  •    3.3 Cloud Infrastructure

  •    3.4 Cloud Hierarchy

  •    3.5 Project Demo

  •    3.6 Whiteboard Hierarchy and Projects

  •    3.7 Service Options

  •    3.8 Demo - Services Overview

  •    3.9 Pricing Calculator

  •    3.10 Demo - Pricing Calculator

  •    3.11 Billing models and Discounts

  •    3.12 Demo Billing

  •    3.13 Compliance Resources

  •    3.14 Demo - Compliance Reports Manager

  •    3.15 Support Options

  •    3.16 Service Level Agreement (SLA)

  •    3.17 Google Cloud Framework and Maturity Model

  •    3.18 Demo - Maturity Assessment

  •    3.19 Access to GCP

  •    3.20 Demo - GCP ACCESS

  •    3.21 Section Summary

  •    3.22 Review Questions

Module 4 - Google Cloud Products and Services

  •    4.0 Google Cloud Products and Services

  •    4.1 Domain Objectives

  •    4.2 Core Services

  •    4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal

  •    4.4 Compute Storage and Disk Options

  •    4.5 App Engine, Google Cloud Functions, and Cloud Run

  •    4.6 Google Kubernetes Engine

  •    4.7 Demo Compute Services

  •    4.8 Container registry

  •    4.9 Cost and Performance Tradeoffs of Scale To Zero

  •    4.10 Database Options - Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery

  •    4.11 Demo - Database Offerings

  •    4.12 Vision API, AI Platform, TPUs

  •    4.13 Pre Trained Models

  •    4.14 Data Pipeline Offerings

  •    4.15 Data Ingestion Options

  •    4.16 Software Development Life Cycle (SDLC)

  •    4.17 Visibility and Alerting Offerings

  •    4.18 Identify Data Migration Options

  •    4.19 Compute VM Migration

  •    4.20 Whiteboard - Migrations

  •    4.21 Application Modernization

  •    4.22 Define Software-Defined WAN (SD-WAN)

  •    4.23 Connectivity Options

  •    4.24 Whiteboard - Connectivity

  •    4.25 IAM and Security

  •    4.26 Whiteboard Cloud Architecture

  •    4.27 Section Summary

  •    4.28 Review Questions

Module 5 - Google Cloud Digital Leader Course Closeout

  •    5.0 Google Cloud Digital Leader Course Closeout

  •    5.1 Course Review

  •    5.2 Resources

  •    5.3 Exam Overview

  •    5.4 Course Closeout

Google Analytics 4 Course Content

Module 1 - Google Analytics 4 - Course Overview

  •    1.0 About Google Analytics 4

  •    1.1 Course Intro Welcome

  •    1.2 Instructor Intro

Module 2 - Fundamentals of Google Analytics

  •    2.1 What is a Digital Product

  •    2.2 Google Market Platform

  •    2.3 Google Analytics Overview

  •    2.4 Google Analytics 4 Overview

  •    2.5 Whiteboad Discussion-How Does GA Work

  •    2.6 Comparing GA3 to GA4

  •    2.7 Whiteboard Compare Data Models

  •    2.8 Demo- GA Console Walkthru

  •    2.9 Admin Panel

  •    2.10 Demo Admin Panel

  •    2.11 Tag Manager

  •    2.12 Demo Tag Manager

  •    2.13 Segment Review

  •    2.14 Segment Review Questions

Module 3 - Advanced Topics with Google Analytics

  •    3.1 Upgrading and Running Parallel

  •    3.2 Whiteboard Discussion - Parallel

  •    3.3 Demo Console Parallel

  •    3.4 Hands on Demo - Install GA4 on a Live Site

  •    3.5 Understand Reporting Options, Lifecycle Collections

  •    3.6 Hands on Demo - Exploring reports

  •    3.7 Hands on Demo - Set up GA4 Custom Eventsmp4

  •    3.8 Hands on Demo - Conversions, Audiences, DebugView

  •    3.9 Hands on Demo - Advertising

  •    3.10 Hands on Demo - Explorations:Insights

  •    3.11 Hands on Demo - Lifecycle and Users

  •    3.12 Google Big Query Connections

  •    3.13 Demo - BigQuery Data Integrations

  •    3.14 Google Ads

  •    3.15 Demo - Google Ads

  •    3.16 Google Signals

  •    3.17 Demo - Google Signals

  •    3.18 Certification Options

  •    3.19 Segment Summary

  •    3.20 Review Questions

  •    3.21 Resources

  •    3.22 Course Closeout

CompTIA A+ 220-1101 (Core 1) Course Content

Module 1 - Devices, Setups, and Installs

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Appropriate Safety Procedures

  •    1.3 PC Components

  •    1.4 Guidlines for PC Disassembly

  •    1.5 Motherboards

  •    1.6 CPU Sockets

  •    1.7 PCI Bus

  •    1.8 Storage Bus (SATA and IDE)

  •    1.9 Discussing PC Components

  •    1.10 Common Connection Interfaces

  •    1.11 Wired and Wireless Connection Standards

  •    1.12 Install Peripheral Devices

  •    1.13 Guidlines and Discussion for Installing Peripheral Devices

Module 2 - Displays and Multimedia Devices

  •    2.1 Displays and Multimedia

  •    2.2 Display Device Connections and Cables

  •    2.3 Discussing Display Device Installation and Configuration

  •    2.4 Troubleshoot Display Devices

  •    2.5 Guidelines for Troubleshooting Display Devices

  •    2.6 Discussing Display Device Troubleshooting

  •    2.7 Install and Configure Multimedia Devices

  •    2.8 Discussing Multimedia Device Installation and Configuration

Module 3 - Supporting Multiple Drive Types

  •    3.1 Supporting Multiple Drive Types and Memory

  •    3.2 Memory Types

  •    3.3 RAM Types

  •    3.4 Memory Modules

  •    3.5 DIMM and SO-DIMM Technologies

  •    3.6 Parity and ECC RAM

  •    3.7 Memory Compatibility Issues

  •    3.8 Discussing System Memory Installation

  •    3.9 Install and Configure Mass Storage Devices

  •    3.10 Storage Adapters and Cables

  •    3.11 Solid State Drives

  •    3.12 Guidlines for Installing Mass Storage Devices

  •    3.13 Discussing Mass Storage Device Installation and Configuration

  •    3.14 Install and Configure Removable Storage

  •    3.15 Discussing Removable Storage Device Istallation and Configuration

  •    3.16 Configure RAID

  •    3.17 RAID Configuration Options

  •    3.18 Discussing RAID Configuration

  •    3.19 Troubleshoot Storage Devices

  •    3.20 Boot Failures

  •    3.21 Discussing Storage Device Troubleshooting

Module 4 - Accounting for CPUs and Internal Components

  •    4.1 Install Upgrade CPUs

  •    4.2 Multiprocessing and Multicore Processors

  •    4.3 Discussing CPU Upgrades

  •    4.4 Configure and Update BIOS UEFI

  •    4.5 Discussing BOIS-UEFI Configuration and Updates

  •    4.6 Install Power Supplies

  •    4.7 Discussing Power Supply Installation

  •    4.8 Troubleshoot Internal System Components

  •    4.9 POST and Boot Problems

  •    4.10 Boot Troubleshooting and Log Entries

  •    4.11 Motherboard Component Problems

  •    4.12 Discussing System Component Troubleshooting

Module 5 - All About Network Theories

  •    5.1 Wired Networks

  •    5.2 Common Ethernet Network Implementations

  •    5.3 Taps and Mirrors

  •    5.4 Discussing Wired Networks

  •    5.5 Network Hardware Devices

  •    5.6 Switches

  •    5.7 Power Over Ethernet

  •    5.8 Discussing Network Hardware Devices

  •    5.9 Wireless Networks

  •    5.10 Access Points and Wireless Network Modes

  •    5.11 Discussing Wireless Networks

  •    5.12 Internet Connection Types

  •    5.13 Wireless Internet Service Providers WISP

  •    5.14 Discussing Internet Connection Types

  •    5.15 Network Configuration Concepts

  •    5.16 The TCIP-IP Protocol Suite

  •    5.17 Internet Protocol and IP Addressing

  •    5.18 Public and Private IP Addresses

  •    5.19 IPv6

  •    5.20 Discussing Network Configuration Concepts

  •    5.21 Network Services

  •    5.22 DNS

  •    5.23 Dynamic and Static IP Configurations

  •    5.24 DNS Records MX and A

  •    5.25 Web Servers and HTTP-HTTPS

  •    5.26 Discussing Network Services

Module 6 - Network Operations and Diagnostics

  •    6.1 Configuring and Troubleshooting Networks

  •    6.2 Network Connections in Windows

  •    6.3 Install and Configure SOHO Networks

  •    6.4 Configure SOHO Network Security

  •    6.5 Firewalls

  •    6.6 Port Fowarding and Port Triggering

  •    6.7 Windows Firewall

  •    6.8 Network Security and Embedded Appliances

  •    6.9 Configure Remote Access

  •    6.10 Discussing Remote Access Configuration

  •    6.11 Troubleshoot Network Connections

  •    6.12 IP Configuration Issues

  •    6.13 Routing Issues

  •    6.14 Discussing Network Connection Troubleshooting

Module 7 - Cloud and Virtualization Computing

  •    7.1 Configure Client-Side Virtulaization

  •    7.2 Hypervisors

  •    7.3 Processor Support and Resource Requirements

  •    7.4 Virtual Networks

  •    7.5 Client-Side Virtualization

  •    7.6 Cloud Computing Concepts

  •    7.7 Internal and External Shared Resources

  •    7.8 Cloud Service Options

  •    7.9 Virtual Desktops

  •    7.10 Software-Defined Networking (SDN)

  •    7.11 Discussing Cloud Computing Concepts

Module 8 - Laptop Features and Troubleshooting

  •    8.1 Use Laptop Features

  •    8.2 Expansion Options

  •    8.3 Discussing Laptop Features

  •    8.4 Install and Configure Laptop Hardware

  •    8.5 Discussing Laptop Hardware Installation and Configuration

  •    8.6 Troubleshoot Common Laptop Issues

  •    8.7 Discussing Troubleshooting Common laptop Issues

Module 9 - Syncing and Setup of Mobile Devices

  •    9.1 Syncing and Setup of Mobile Devices

  •    9.2 Connect and Configure Mobile Devices

  •    9.3 Configure Mobile Device Network Connectivity

  •    9.4 Mobile VPN Configuration

  •    9.5 Email Configuration Options

  •    9.6 Discussing Mobile Device Network Connectivity Configuration

  •    9.7 Support Mobile Apps

  •    9.8 Discussing Mobile App Support

Module 10 - All Things Printing

  •    10.1 All Things Printing

  •    10.2 Discussing Laser Printer Maintenance

  •    10.3 Maintain Inkjet Printers

  •    10.4 Discussing Inkjet Printer Maintenance

  •    10.5 Maintain Impact, Thermal, and 3D Printers

  •    10.6 Discussing Impact, Thermal, and 3D Printer Maintenance

  •    10.7 Install and Configure Printers

  •    10.8 Discussing Printer Installation and Configuration

  •    10.9 Troubleshoot Print Device Issues

  •    10.10 Install and Configure Imaging Devices

  •    10.11 Discussing Device Installation and Configuration

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

CompTIA A+ 220-1102 (Core 2) Course Content

Module 1 - Operating System Management

  •    1.1 Introduction to the Course, Meet the Instructor

  •    1.2 Identify Common Operating Systems

  •    1.3 Microsoft Windows

  •    1.4 Work and Education Features

  •    1.5 Windows System Limits

  •    1.6 Apple Operating Systems

  •    1.7 Linux Disk and File Management

  •    1.8 Discussing OS Types

  •    1.9 Use Windows Features and Tools

  •    1.10 Administrative Tools

  •    1.11 Manage Files in Windows

  •    1.12 System Hierarchies

  •    1.13 File Attributes

  •    1.14 Discussing Windows Features and Tools

  •    1.15 Manage Disks in Windows

  •    1.16 Discussing File Management in Windows

  •    1.17 The Windows Disk Management Console

  •    1.18 Discussing Windows Disk Management

  •    1.19 Manage Devices in Windows

  •    1.20 Device Manager

  •    1.21 Discussing Windows Device Manager

Module 2 - Configuring and installing the OS

  •    2.1 Configuring and Installing the OS

  •    2.2 Installation Boot Methods

  •    2.3 Disk Formatting and Partitioning

  •    2.4 Networking Considerations

  •    2.5 Post Installation Tasks

  •    2.6 OS Installation Types

  •    2.7 Unattended Installations

  •    2.8 Maintain OSs

  •    2.9 OS Updates

  •    2.10 Anti-Malware Updates

  •    2.11 Scheduled Backups

  •    2.12 Task Schedulers part 1

  •    2.13 Task Schedulers part 2

  •    2.14 Install Windows 10 Demonstration

  •    2.15 Discussing OS Maintenance

Module 3 - Tools to Troubleshoot and Maintain the OS

  •    3.1 Install and Manage Windows Applications

  •    3.2 Windows OS Tools

  •    3.3 Application and Print Services

  •    3.4 Task Manager

  •    3.5 Manage Windows Performance

  •    3.6 Windows Performance Management Tools

  •    3.7 Troubleshoot Windows

  •    3.8 Event Viewer

  •    3.9 The System Configuration Utility

  •    3.10 Troubleshooting Tips Boot Process

  •    3.11 Troubleshooting Tips for Windows System Issues

  •    3.12 Blue Screens and Spontaneous Shutdowns

  •    3.13 Troubleshooting Tips for File and Memory Corruption

  •    3.14 Safe Boot

  •    3.15 System Repair Disc

  •    3.16 System Restore

  •    3.17 Guidelines for Troubleshooting Windows Issues

Module 4 - Network Management Tools

  •    4.1 Network Management Tools

  •    4.2 Network Connectivity

  •    4.3 IP Addressing and Connection Types

  •    4.4 Proxy Settings

  •    4.5 Windows Client Configuration

  •    4.6 Location Services

  •    4.7 Firewalls

  •    4.8 Network Troubleshooting

  •    4.9 Remote Desktop Tools

  •    4.10 Desktop Management and Remote Monitoring Tools

  •    4.11 Disscussion Topics

Module 5 - Sharing Resources and Wrights Management

  •    5.1 Sharing Resources and Wrights Management

  •    5.2 User Group Accounts

  •    5.3 Local Secutity Policy

  •    5.4 SSO and Credential Manager

  •    5.5 Workgroups and Homegroups

  •    5.6 Network and Sharing Center

  •    5.7 Network Share Configuration

  •    5.8 NTSF File and Folder Permissions

  •    5.9 Configure Active Directory Accounts and Policies

  •    5.10 Domain Membership and Group Policy Objects

  •    5.11 Basic AD Functions

  •    5.12 Account Locks and Password Resets

Module 6 - Threats and Security Measures

  •    6.1 Threats and Security Measures

  •    6.2 Logical Security Concepts

  •    6.3 Encryption

  •    6.4 PKI and Certificates

  •    6.5 Execution Control

  •    6.6 NAC

  •    6.7 Discussing Logical Decurity Concepts

  •    6.8 Threats and Vulnerablilities

  •    6.9 Types of Password Attacks

  •    6.10 Discussing Threats and Vulnerabilities

  •    6.11 Physical Security Controls

  •    6.12 Discussing Physical Security Measures

Module 7 - Policies to Protect Data

  •    7.1 Policies to Protect Data

  •    7.2 Implement Security Best Practices

  •    7.3 Guidlines for Implementing Security Best Practices

  •    7.4 Discussing Security Best Practices Implementation

  •    7.5 Implement Data Protection Policies

  •    7.6 ACLs and Directory Permissions

  •    7.7 Full Disk Encryption

  •    7.8 Guildlines for Implementing Data Protection Policies

  •    7.9 Discussing Data Protection Policies

  •    7.10 Protect Data During Incident Response

  •    7.11 Discussing Data Protection During Incident Response

Module 8 - Prevent Malware and Security Threats

  •    8.1 Prevent Malware and Security Threats

  •    8.2 Detect, Remove, and Prevent Malware

  •    8.3 Trojan Horses and Spyware

  •    8.4 Sources of Malware Infection

  •    8.5 Best Practices for Malware Removal

  •    8.6 Discussing Detecting, Removing, and Preventing Malware Infections

  •    8.7 Troubleshoot Common Workstation Security Issues

  •    8.8 Discussing Troubleshoot Common Workstation Security Issues

Module 9 - Supporting and Troubleshooting Mobile Devices

  •    9.1 Supporting and Troubleshooting Mobile Devices

  •    9.2 Secure Mobile Devices

  •    9.3 IOT Internet of Things

  •    9.4 Discussing Mobile Device Security

  •    9.5 Troubleshoot Mobile Device Issues

  •    9.6 Mobile Device Security Troubleshooting

  •    9.7 Discussing Troubleshooting Mobile Devices

Module 10 - Implementing Operational Procedures

  •    10.1 Implementing Operational Procedures

  •    10.2 Environmental Impacts and Controls

  •    10.3 Discussing Environmental Impact and Controls

  •    10.4 Create and Maintain Documentation

  •    10.5 Discussing Documentation Creation and Maintenance

  •    10.6 Use Basic Change Management Best Practices

  •    10.7 Discussing Change Management Best Practices

  •    10.8 Implement Disaster Prevention and Recovery Methods

  •    10.9 Discussing Implement Disaster Prevention and Recovery Methods

  •    10.10 Basic Scripting Concepts

  •    10.11 Discussing Scripting

  •    10.12 Professionalism and Communication

  •    10.13 Discussing Professionalism and Communication Skills

Module 11 - Resources and Testing

  •    11.1 Introduction to Resources and Testing

  •    11.2 Resources and Testing

  •    11.3 Joining a Domain with Windows 10

  •    11.4 Boot Order and BIOS

  •    11.5 Virtual Machine Install & Configure

  •    11.6 PC Teardown

  •    11.7 Exploring the Laptop

  •    11.8 Install Windows 10 Demonstration

Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Content

Module 61 - CEH v11 Advanced Ethical Hacker Course Intro

  •    61.1 About This Course: Advanced Ethical Hacker

  •    61.2 About the Instructor

Module 62 - CEH v11 Session Hjacking

  •    62.1 Session Hijacking Concepts

  •    62.2 Token-based Authentication

  •    62.3 Compromising a Session Token

  •    62.4 XSS

  •    62.5 CSRF

  •    62.6 Other Attacks

Module 63 - CEH v11 Defending Against Hijacking

  •    63.1 Network Level Hijacking

  •    63.2 Session Hijacking Tools

  •    63.3 Session Hijacking Countermeasures

  •    63.4 Session Penetration Hijacking

  •    63.5 Review

Module 64 - CEH v11 Implementing Intrusion Detection

  •    64.1 IDS-IPS

  •    64.2 Snort

  •    64.3 Snort Rules

  •    64.4 Syslog

Module 65 - CEH v11 Testing Intrusion Detection

  •    65.1 WIPS

  •    65.2 IDS Considerations

  •    65.3 IDS Tools

  •    65.4 IDS Evasion

  •    65.5 IDS-Firewall Evasion Tools

  •    65.6 IDS Scenerios

Module 66 - CEH v11 Implementing Firewalls

  •    66.1 Firewalls

  •    66.2 Packet Filtering Rules

  •    66.3 Firewall Deployments

  •    66.4 Traffic Flow through Firewalls

  •    66.5 Split DNS

Module 67 - CEH v11 Testing Firewallls

  •    67.1 Firewall Tools

  •    67.2 Firewall Evasion

  •    67.3 Firewall Scenarios

Module 68 - CEH v11 Implementing Honeypots

  •    68.1 Honeypots

  •    68.2 Honeypot Detection

  •    68.3 IDS-Firewall Evasion Countermeasures

  •    68.4 IDS-Firewall Honeypot Penetration Testing

  •    68.5 Review

Module 69 - CEH v11 Attacker Webserver

  •    69.1 Webserver Security Overview

  •    69.2 Common Webservers

  •    69.3 Webserver Attacks

  •    69.4 Misconfiguration Attack Examples

Module 70 - CEH v11 Webserver Defense

  •    70.1 Webserver Attack Tools

  •    70.2 Attack Countermeasures

  •    70.3 Webserver Penetration Testing

  •    70.4 Review

Module 71 - CEH v11 Intro To Web Apps

  •    71.1 Web Application Concepts

  •    71.2 Attacking Web Apps

Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities

  •    72.1 A01 - Broken Access Control

  •    72.2 A02 - Cryptographic Failures

  •    72.3 A03 - Injection

  •    72.4 A04 - Insecure Design

  •    72.5 A05 - Security Misconfiguration

Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities

  •    73.1 A06 - Vulnerable and Outdated Components

  •    73.2 A07 - Identification and Authentication Failures

  •    73.3 A08 - Software and Data Integrity Failures

  •    73.4 A09 - Security Logging and Monitoring

  •    73.5 A10 - Server Side Request Forgery

Module 74 - CEH v11 Common Web App Attacks

  •    74.1 XSS Attacks

  •    74.2 CSRF

  •    74.3 Parameter Tampering

  •    74.4 Clickjacking

  •    74.5 SQL Injection

Module 75 - CEH v11 Unauthorized Access Through Web Apps

  •    75.1 Insecure Deserialization Attacks

  •    75.2 IDOR

  •    75.3 Directory Traversal

  •    75.4 Session Management Attacks

  •    75.5 Response Splitting

Module 76 - CEH v11 Web App Overflow Attacks

  •    76.1 Denial of Service

  •    76.2 Overflow Attacks

  •    76.3 XXE Attacks

  •    76.4 Soap Attacks

  •    76.5 Ajax Attacks

Module 77 - CEH v11 Defending Web Apps

  •    77.1 Web App Hacking Tools

  •    77.2 Web Hacking Countermeasures

  •    77.3 Web Application Penetration Testing

  •    77.4 Review

Module 78 - CEH v11 Intro To SQL Injection

  •    78.1 SQL Overview

  •    78.2 SQL Injection Concepts

  •    78.3 Basic SQL Injection

Module 79 - CEH v11 Performing SQL Injection

  •    79.1 Finding Vulnerable Websites

  •    79.2 Error-based SQL Injection

  •    79.3 Union SQL Injection

  •    79.4 Blind SQL Injection

  •    79.5 SQL Injection Scenarios

  •    79.6 Evading Detection

Module 80 - CEH v11 Defending Against SQL Injection

  •    80.1 SQL Injection Tools

  •    80.2 SQL Injection Countermeasures

  •    80.3 Safe Coding Examples

  •    80.4 SQL Wildcards

  •    80.5 SQL Injection Penetration Testing

  •    80.6 Review

Module 81 - CEH v11 Wireless Networking Overview

  •    81.1 Wireless Concepts

  •    81.2 Wireless Signal Encoding

  •    81.3 Wi-Fi Standards

  •    81.4 Wi-Fi Antennas

  •    81.5 Wireless Authentication

Module 82 - CEH v11 Wi-Fi Security

  •    82.1 Wi-Fi Security Standards

  •    82.2 Wireless Network Troubleshooting Tools

  •    82.3 Wi-Fi Discovery Tools

  •    82.4 Sniffing Wi-Fi

Module 83 - CEH v11 Hacking Wi-Fi

  •    83.1 Wi-Fi Attack Types

  •    83.2 Wi-Fi Rogue Access Point Attacks

  •    83.3 Wi-Fi Denial of Service Attacks

  •    83.4 Wi-Fi Password Cracking Attacks

  •    83.5 WEP Cracking

Module 84 - CEH v11 Advanced Wireless Attacks

  •    84.1 WPA-WPA2 Cracking

  •    84.2 WPA3 Attacks

  •    84.3 WPS Cracking

  •    84.4 Wi-Fi Attack Tools for Mobile Devices

  •    84.5 Bluetooth Hacking

  •    84.6 Other Wireless Hacking

Module 85 - CEH v11 Defending Wireless Networks

  •    85.1 Wireless Hacking Countermeasures

  •    85.2 Wireless Security Tools

  •    85.3 Wireless Penetration Testing

  •    85.4 Review

Module 86 - CEH v11 Mobile Platform Overview

  •    86.1 Mobile Platform Overview

  •    86.2 Mobile Device Vulnerabilities

  •    86.3 Mobile Device Attacks

Module 87 - CEH v11 Hacking Android

  •    87.1 Android

  •    87.2 Android Vulnerabilities

  •    87.3 Rooting Android

  •    87.4 Android Exploits

  •    87.5 Android Hacking Tools

  •    87.6 Reverse Engineering an Android App

  •    87.7 Securing Android

Module 88 - CEH v11 Hacking iOS

  •    88.1 iOS

  •    88.2 iOS Vulnerabilities

  •    88.3 Jailbreaking iOS

  •    88.4 iOS Exploits

  •    88.5 iOS Hacking Tools

  •    88.6 Securing iOS

Module 89 - CEH v11 Mobile Platform Defense

  •    89.1 Mobile Device Management

  •    89.2 BYOD

  •    89.3 Mobile Security Guidelines and Tools

  •    89.4 Mobile Device Penetration Testing

  •    89.5 Review

Module 90 - CEH v11 IoT Hacking

  •    90.1 loT Concepts

  •    90.2 loT Infrastructure

  •    90.3 Fog Computing

  •    90.4 loT Vulnerabilities

  •    90.5 loT Threats

Module 91 - CEH v11 IoT Defense

  •    91.1 IoT Hacking Methodologies and Tools

  •    91.2 IoT Hacking Methodolgies and Tools Part 2

  •    91.3 Hacking Countermeasures

  •    91.4 IoT Penetration Testing

  •    91.5 OT Concepts

  •    91.6 Industrial IoT

Module 92 - CEH v11 Operational Technology Overview

  •    92.1 IT-OT Convergence

  •    92.2 ICS

  •    92.3 SCADA

  •    92.4 DCS

  •    92.5 RTU

  •    92.6 PLC

  •    92.7 Addition OT Components

Module 93 - CEH v11 Hacking OT

  •    93.1 OT Variables

  •    93.2 Well-known OT attacks

  •    93.3 OT Attack Methodology and Basic Tools

  •    93.4 OT Reconnaissance

  •    93.5 OT Penetration and Control

Module 94 - CEH v11 Defending OT

  •    94.1 OT Attack Tools

  •    94.2 OT Hacking Countermeasures

  •    94.3 OT Penetration Testing

  •    94.4 Review

Module 95 - CEH v11 Attacking The Cloud

  •    95.1 Cloud Computing Concepts

  •    95.2 Virtualization

  •    95.3 Cloud Types

  •    95.4 Cloud Benefits and Considerations

  •    95.5 Cloud Risks and Vulnerablilities

Module 96 - CEH v11 Cloud Defense

  •    96.1 Cloud Threats and Countermeasures

  •    96.2 Cloud Security Tools

  •    96.3 Cloud Security Best Practices

  •    96.4 Cloud Penetration Testing

  •    96.5 Review

Module 97 - CEH v11 Cryptography Overview

  •    97.1 Cryptography Concepts

  •    97.2 Symetric Encryption

  •    97.3 Asymmetric Encryption

  •    97.4 Public Key Exchange

  •    97.5 PKI

Module 98 - CEH v11 Protecting Data With Crytography

  •    98.1 Digital Certificates

  •    98.2 Digital Signatures

  •    98.3 Hashing

  •    98.4 Email Encryption

  •    98.5 Network Communication Encryption

Module 99 - CEH v11 Protecting Data at Home and in Transit

  •    99.1 Disk Encryption

  •    99.2 VPN Encryption

  •    99.3 Cryptography Tools

Module 100 - CEH v11 Pentesting Cryptography

  •    100.1 Cryptography Attacks

  •    100.2 Cryptography Penetration Testing

  •    100.3 Review

  •    100.4 Conclusion

Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Content

Module 21 - CEH v11 Ethical Hacker Course Intro

  •    21.1 About this course - Ethical Hacker

  •    21.2 About the Instructor

Module 22 - CEH v11 Intro to Footprinting

  •    22.1 Footprinting Concepts

  •    22.2 Footprinting Methodology

  •    22.3 OSINT Tools

  •    22.4 Advanced Google Search

  •    22.5 Whois Footprinting

  •    22.6 Activity - Performing a Whois Lookup

Module 23 - CEH v11 Footprinting Network Services

  •    23.1 DNS Footprinting

  •    23.2 Website Footprinting

  •    23.3 Email Footprinting

  •    23.4 Network Footprinting

  •    23.5 Footprinting through Social Networking Sites

Module 24 - CEH v11 Defend Against Footprinting

  •    24.1 Competitive Intelligence Gathering

  •    24.2 Footprinting Countermeasures

  •    24.3 Footprinting Penetration Testing

  •    24.4 Review

Module 25 - CEH v11 Intro to Scanning

  •    25.1 Scanning Concepts

  •    25.2 ICMP Discovery Scans

  •    25.3 Other Discovery Scans

Module 26 - CEH v11 Port Scanning

  •    26.1 Ports

  •    26.2 TCP Flags and Handshakes

  •    26.3 TCP Scan Types

  •    26.4 Other Scanning Techniques

Module 27 - CEH v11 Vulnerability Scanning

  •    27.1 Banner Grabbing

  •    27.2 Vulnerability Scanning

  •    27.3 SSDP Scanning

Module 28 - CEH v11 NMAP

  •    28.1 Nmap

  •    28.2 Common Nmap Scans

  •    28.3 Nmap Options

  •    28.4 Nmap Stealth Scans

  •    28.5 Hping and Other Scanners

Module 29 - CEH v11 Firewalls and Intrusion Detection

  •    29.1 Firewall Types

  •    29.2 Firewall Features

  •    29.3 Firewall Features Part 2

  •    29.4 Firewall Configurations

  •    29.5 Intrusion Detection and Prevention

Module 30 - CEH v11 Evading Detection

  •    30.1 Firewall and IDS Evasion

  •    30.2 Firewall and IDS Evasion Part 2

  •    30.3 Firewalking

  •    30.4 Probing a Firewall

  •    30.5 Probing a Firewall Part 2

Module 31 - CEH v11 Proxies and VPNs

  •    31.1 Proxies

  •    31.2 VPNs

  •    31.3 Tor

  •    31.4 Scanning Countermeasures

  •    31.5 Scanning Penetration Testing

  •    31.6 Review

Module 32 - CEH v11 Accessing Vulnerability

  •    32.1 Vulnerability Assessment Overview

  •    32.2 Vulnerability Scoring Systems

  •    32.3 Vulnerability Assessment Tools

Module 33 - CEH v11 Vulnerability Research

  •    33.1 Scanner Output and Reports

  •    33.2 Vulnerability Research

  •    33.3 Review

Module 34 - CEH v11 Intro to Enumeration

  •    34.1 Enumeration Concepts

  •    34.2 Enumeration Techniques and Tools

  •    34.3 Service and Application Enumeration

  •    34.4 SMB and NetBIOS Enumeration

Module 35 - CEH v11 Service Enumeration

  •    35.1 SNMP Enumeration

  •    35.2 LDAP Enumeration

  •    35.3 DNS Enumeration

  •    35.4 SMTP Enumeration

  •    35.5 NTP Enumeration

Module 36 - CEH v11 Advanced Enumeration

  •    36.1 Remote Connection Enumeration

  •    36.2 File Transfer Enumeration

  •    36.3 VoIP Enumeration

  •    36.4 IPSEC Enumeration

  •    36.5 IPv6 Enumeration

  •    36.6 BGP Enumeration

Module 37 - CEH v11 Command Line Enumeration

  •    37.1 Windows Command Line Enumeration

  •    37.2 Linux Command Line Enumeration

  •    37.3 Linux Command Line Enumeration Part 2

Module 38 - CEH v11 Defending Against Enumeration

  •    38.1 Enumeration Countermeasures

  •    38.2 Enumeration Countermeasures Part 2

  •    38.3 Enumeration Penetration Testing

  •    38.4 Review

Module 39 - CEH v11 Intro to System Hacking

  •    39.1 System Hacking Concepts

  •    39.2 System Hacking Tools and Frameworks

  •    39.3 Searchsploit

  •    39.4 Compiling and Running Exploits

Module 40 - CEH v11 System Hacking with Metasploit

  •    40.1 Metasploit

  •    40.2 Metasploit Search

  •    40.3 Metasploit Exploits and Payloads

  •    40.4 Metasploit Meterpreter

  •    40.5 Metasploit Connectivity

  •    40.6 Metasploit Impersonation and Migration

Module 41 - CEH v11 Further Attacking a Compromised System

  •    41.1 Netcat

  •    41.2 Pivoting

  •    41.3 Netcat Relays

  •    41.4 Metasploit Post Exploitation Modules

  •    41.5 Common Operating System Exploits

Module 42 - CEH v11 Hacking an Operating System

  •    42.1 Hacking Windows

  •    42.2 Hacking Linux

  •    42.3 Network Service Exploits

  •    42.4 Password Attacks

Module 43 - CEH v11 Password Cracking Overview

  •    43.1 Dictionary Attack

  •    43.2 Brute Force Attack

  •    43.3 Password Spraying

  •    43.4 Rainbow Tables

Module 44 - CEH v11 Performing Password Attacks

  •    44.1 Network Service Password Attacks

  •    44.2 Password Cracking Tools

  •    44.3 Online Password Cracking Sites

  •    44.4 Windows Password Cracking

  •    44.5 Linux Password Cracking

  •    44.6 Other Methods for Obtaining Passwords

Module 45 - CEH v11 Using Exploits

  •    45.1 Keylogging

  •    45.2 Spyware

  •    45.3 Rootkits

  •    45.4 Buffer Overflows

  •    45.5 Privilege Escalation

  •    45.6 Hiding Files

Module 46 - CEH v11 Hiding Information

  •    46.1 Alternate Data Streams

  •    46.2 Steganography

  •    46.3 Creating and Maintaining Remote Access

  •    46.4 Hiding Evidence

Module 47 - CEH v11 Covering Tracks

  •    47.1 Covering Tracks in Windows

  •    47.2 Covering Tracks in Linux

  •    47.3 System Hacking Counter-Measures

  •    47.4 System Hacking Penetration Testing

  •    47.5 Review

Module 48 - CEH v11 Malware Overview

  •    48.1 Intro to Malware

  •    48.2 Virus Overview

  •    48.3 Virus Types

  •    48.4 Self-Hiding Viruses

  •    48.5 Worms

  •    48.6 Trojans

  •    48.7 Trojan Types

  •    48.8 RATS

Module 49 - CEH v11 Hacking With Malware

  •    49.1 Ransomware

  •    49.2 Botnets

  •    49.3 Covert Channel Trojans

  •    49.4 Banking Trojans

  •    49.5 Rootkits

Module 50 - CEH v11 Creating Malware

  •    50.1 Other Malware

  •    50.2 Malware Makers

  •    50.3 Dropper and Stage Creation

  •    50.4 Exploit Kits

Module 51 - CEH v11 Detecting Malware

  •    51.1 Malware Detection

  •    51.2 Malware Detection Part 2

  •    51.3 Malware Analysis

Module 52 - CEH v11 Defending Against Malware

  •    52.1 Malware Reverse Engineering

  •    52.2 Malware Countermeasures

  •    52.3 Malware Penetration Testing

  •    52.4 Review

Module 53 - CEH v11 Sniffing

  •    53.1 Sniffing Concepts

  •    53.2 Types of Sniffing

  •    53.3 Sniffing Protocols

  •    53.4 Sniffing Tools

Module 54 - CEH v11 Spoofing and MITM

  •    54.1 ARP

  •    54.2 ARP Spoofing

  •    54.3 MITM

  •    54.4 MAC Attacks

  •    54.5 MAC Spoofing

  •    54.6 DHCP Attacks

Module 55 - CEH v11 Defending Against Poisoning and Sniffing

  •    55.1 Name Resolution Poisoning

  •    55.2 VLAN Hopping

  •    55.3 Sniffing Counter Measures

  •    55.4 Sniffing Penetration Testing

  •    55.5 Review

Module 56 - CEH v11 Social Engineering

  •    56.1 Social Engineering Concepts

  •    56.2 Social Engineering Techniques

  •    56.3 Social Engineering Examples

  •    56.4 Social Engineering Tools

Module 57 - CEH v11 Defending Against Social Engineering

  •    57.1 Social Media

  •    57.2 Identity Theft

  •    57.3 Insider Threats

  •    57.4 Social Engineering Countermeasures

  •    57.5 Social Engineering Penetration Testing

  •    57.6 Review

Module 58 - CEH v11 Denial-of-Service

  •    58.1 DoS-DDoS Concepts

  •    58.2 Volumetric Attacks

  •    58.3 Fragmentation Attacks

  •    58.4 State Exhaustion Attacks

  •    58.5 Application Layer Attacks

Module 59 - CEH v11 Advanced DoS Attacks

  •    59.1 Protocol Attacks

  •    59.2 Other Attacks

  •    59.3 Botnets

Module 60 - CEH v11 Defending Against Denial-of-Service

  •    60.1 DoS-DDoS Attack Tools

  •    60.2 DoS-DDoS Countermeasures

  •    60.3 Dos Penetration Testing

  •    60.4 Review

HTML5 & CSS3 Web Design Fundamentals with JavaScript Course Content

Module 1 - HTML5-CSS3 Introduction

  •    1.1 Introduction to the Course

Module 2 - The Internet and World Wide Web

  •    2.1 The Internet and World Wide Web

Module 3 - HTML Fundamentals

  •    3.1 Web Development Tools

  •    3.2 HTML Skeletons

  •    3.3 Paragraph Elements

  •    3.4 Phrase Elements

  •    3.5 HTML Comments

  •    3.6 HTML Entities

Module 4 - CSS Fundamentals

  •    4.1 CSS Fundamentals

  •    4.2 Inline Styles

  •    4.3 Embedded Style Sheets

  •    4.4 External Style Sheets

  •    4.5. Selector Types

  •    4.6 Decendent Selectors

  •    4.7 CSS Colors

  •    4.8 ID Versus Class

  •    4.9 CSS Text Properties

  •    4.10 CSS Box Model

Module 5 - Images and Links

  •    5.1 Images and Links

  •    5.2 Image Elements

  •    5.3 Images with Hyperlinks

  •    5.4 Open Links in New Tab

  •    5.5 Telephone and Email Links

  •    5.6 Validate and Debug

Module 6 - Responsive Design

  •    6.1 Responsive Design

  •    6.2 Fixed Layouts

  •    6.3 Viewport Meta Element

  •    6.4 Usefull CSS Styles

Module 7 - Media Queries

  •    7.1 More About Responsive Design

  •    7.2 Global Changes

  •    7.3 Mobile Devices

  •    7.4 Manipulate Logo

Module 8 - Layouts

  •    8.1 Layouts

  •    8.2 Tablets Part 1

  •    8.3 Tablets Part 2

  •    8.4 Styling Part 1

  •    8.5 Styling Part 2

  •    8.6 Styling Part 3

  •    8.7 Styling Part 4

  •    8.8 Styling Part 5

  •    8.9 Styling Part 6

Module 9 - Tables

  •    9.1 Tables Part 1

  •    9.2 Tables Part 2

Module 10 - Multimedia

  •    10.1 Multimedia

  •    10.2 Multimedia Part 2

  •    10.3 Multimedia Part 3

Module 11 - Forms and JavaScript

  •    11.1 Forms and JavaScript

  •    11.2 jQuery

  •    11.3 Styling Tables

Module 12 - The Web Server

  •    12.1 The Web Server

Module 13 - Programming and JavaScript

  •    13.1 Data Types

  •    13.2 Global Methods

  •    13.3 Variables

  •    13.4 Conditional Statements

  •    13.5 Loops

  •    13.6 Operators

Module 14 - The Calculator

  •    14.1 Calculator Part 1

  •    14.2 Calculator Part 2

  •    14.3 Calculator Part 3

  •    14.4 Calculator Part 4

  •    14.5 Calculator Part 5

  •    14.6 Calculator Part 6

  •    14.7 Calculator Part 7

CompTIA Security+ SY0-601 (2022) Course Content

Module 1 - Introduction to Security

  •    1.1 Introduction to Security

Module 2 - Malware and Social Engineering Attacks

  •    2.1 Malware and Social Engineering Attacks

Module 3 - Basic Cryptography

  •    3.1 Basic Cryptography

Module 4 - Advanced Cryptography and PKI

  •    4.1 Advanced Cryptography and PKI

Module 5 - Networking and Server Attacks

  •    5.1 Networking and Server Attacks

Module 6 - Network Security Devices, Designs and Technology

  •    6.1 Network Security Devices, Designs and Technology

Module 7 - Administering a Secure Network

  •    7.1 Administering a Secure Network

Module 8 - Wireless Network Security

  •    8.1 Wireless Network Security

Module 9 - Client and Application Security

  •    9.1 Client and Application Security

Module 10 - Mobile and Embedded Device Security

  •    10.1 Mobile and Embedded Device Security

Module 11 - Authentication and Account Management

  •    11.1 Authentication and Account Management

Module 12 - Access Management

  •    12.1 Access Management

Module 13 - Vulnerability Assessment and Data Security

  •    13.1 Vulnerability Assessment and Data Security

Module 14 - Business Continuity

  •    14.1 Business Continuity

Module 15 - Risk Mitigation

  •    15.1 Risk Mitigation

Module 16 - Security Plus Summary and Review

  •    16.1 - Security Plus Summary and Review

Module 17 - Hands-On Training

  •    17.1 Hands-On Scanning Part 1

  •    17.2 Hands-On Scanning Part 2

  •    17.3 Hands-On Advanced Scanning

  •    17.4 Hands-On MetaSploit

  •    17.5 Hands-On BurpSuite

  •    17.6 Hands-On Exploitation Tools Part 1

  •    17.7 Hands-On Exploitation Tools Part 2

  •    17.8 Hands-On Invisibility Tools

  •    17.9 Hands-On Connect to Tor

Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content

Module 1 - CEH v11 Foundations Course Introduction

  •    1.1 About this course: CEH Foundations

  •    1.2 About the Instructor

Module 2 - CEH v11 Introduction To Networking

  •    2.1 Networking Overview

  •    2.2 Network Scope

  •    2.3 Network Addressing

  •    2.4 Activity - Examining Network Addressing

Module 3 - CEH v11 Lan Components

  •    3.1 Protocols, Ports, Sockets

  •    3.2 Network Topologies

  •    3.3 LAN Devices

  •    3.4 LAN Devices Part 2

  •    3.5 VLANs

  •    3.6 Activity - Examining Ports and Sockets

  •    3.7 Activity - Examining Switches and VLANs

Module 4 - CEH v11 Routing and Network Access

  •    4.1 Routers

  •    4.2 Layer 3 Switches

  •    4.3 Modems and Remote Access

  •    4.4 Firewalls and Proxies

  •    4.5 Activity - Examining Routing

  •    4.6 Activity - Examining VLAN Routing

  •    4.7 Activity - Examining Firewall Rules

Module 5 - CEH v11 Intrusion Detection and Network Layers

  •    5.1 IDS and IPS

  •    5.2 OSI Model

  •    5.3 TCP-IP

  •    5.4 Activity - Examining Network Layers

Module 6 - CEH v11 Networking Protocols and Addressing

  •    6.1 Layer 4 Protocols

  •    6.2 Layer 3 Protocols

  •    6.3 Layer 2 Protocols

  •    6.4 IP Addressing

  •    6.5 Subnetting

  •    6.6 DHCP

  •    6.7 Activity - Examining TCP

  •    6.8 Activity - Examining UDP

  •    6.9 Activity - Examining IP

  •    6.10 Activity - Examining ICMP

  •    6.11 Activity - Examining ARP

Module 7 - CEH v11 Network Services

  •    7.1 DNS

  •    7.2 DNS Records

  •    7.3 NTP

  •    7.4 Authentication

  •    7.5 Biometrics

  •    7.6 Activity - Examining DNS

  •    7.7 Activity - Examining DNS Records

Module 8 - CEH v11 Access Control

  •    8.1 Local Authentication

  •    8.2 Directory Service Authentication

  •    8.3 Extending Authentication

  •    8.4 Authorization

  •    8.5 Activity - Testing Access Control

Module 9 - CEH v11 Intro to Linux

  •    9.1 Linux Overview

  •    9.2 Linux File System

  •    9.3 Linux Core Commands

  •    9.4 Linux Search and Read Commands

  •    9.5 Activity - Exploring Linux

  •    9.6 Activity - Using Linux Core Commands

  •    9.7 Activity - Using Linux Search Commands

  •    9.8 Activity - Using Linux Read Commands

Module 10 - CEH v11 Configuring Linux

  •    10.1 Linux File Permissions

  •    10.2 Linux Special Permissions

  •    10.3 Linux Configuration

  •    10.4 Linux Packages

  •    10.5 Linux User Management

Module 11 - CEH v11 Practicing Linux Configuration

  •    11.1 Activity - Setting Linux Permissions

  •    11.2 Activity - Setting Linux Special Permissions

  •    11.3 Activity - Managing Packages in Kali Linux

  •    11.4 Activity - Managing Users and Groups in Linux

Module 12 - CEH v11 Managing Linux

  •    12.1 Linux Job Scheduling

  •    12.2 Linux File, Directory, and Download Commands

  •    12.3 Linux System Commands

  •    12.4 Linux Network Management

  •    12.5 Linux Firewall

Module 13 - CEH v11 Practicing Linux Management

  •    13.1 Activity - Scheduling Tasks in Linux

  •    13.2 Activity - Using Linux File, Directory, and Download Commands

  •    13.3 Activity - Using Linux Edit and Archive Commands

  •    13.4 Activity - Compiling Malicious Code

  •    13.5 Activity - Using Linux Process and System Commands

  •    13.6 Activity - Using Linux Disk, Hardware, and Network Commands

Module 14 - CEH v11 Intro to Windows

  •    14.1 Windows Overview

  •    14.2 Windows Registry

  •    14.3 Windows Security

Module 15 - CEH v11 Windows Commands

  •    15.1 Windows Commands

  •    15.2 Windows Admin Commands

  •    15.3 Windows Network Commands

  •    15.4 Windows Run Line Commands

  •    15.5 Windows PowerShell

Module 16 - CEH v11 Practicing Windows Commands

  •    16.1 Activity - Using Windows Built-in Commands

  •    16.2 Activity - Using Windows Task Commands

  •    16.3 Activity - Using Windows Admin Commands

  •    16.4 Activity - Using Windows Network Commands

  •    16.5 Activity - Using Windows PowerShell

  •    16.6 Networking and OS Penetration Testing

  •    16.7 Review

Module 17 - CEH v11 Intro to Hacking

  •    17.1 Information Security Overview

  •    17.2 Hacking Concepts

  •    17.3 Ethical Hacking Concepts

  •    17.4 Penetration Testing

  •    17.5 Penetration Testing Part 2

  •    17.6 Activity - Performing a Static Code Review

Module 18 - CEH v11 Information Security

  •    18.1 Cyber Kill Chain Concepts

  •    18.2 Activity - Performing Weaponization

  •    18.3 Information Security

  •    18.4 Security Policies

  •    18.5 Security Controls

  •    18.6 Access Control

Module 19 - CEH v11 Protecting Data

  •    19.1 Data Protection

  •    19.2 Backup Sites

  •    19.3 Vulnerability Management

  •    19.4 SIEM

  •    19.5 Risks

Module 20 - CEH v11 Managing Risk

  •    20.1 Risk Management

  •    20.2 Incident Handling

  •    20.3 Information Security Laws and Standards

  •    20.4 Activity - Assessing Risk

  •    20.5 Ethical Hacking Penetration Testing

  •    20.6 Review

  •    20.7 Conclusion

Cisco 300-410 ENARSI - Implementing Cisco Enterprise Advanced Routing and Services Course Content

Module 1 - Welcome to ENARSI

  •    1.1 Welcome to ENARSI

  •    1.2 A Few Things Before We Start

Module 2 - EIGRP (Enhanced Interior Gateway Protocol)

  •    2.1 EIGRP Features

  •    2.2 EIGRP Operations

  •    2.3 EIGRP Exchange of Routing Information

  •    2.4 EIGRP Metrics

  •    2.5 EIGRP Queries

  •    2.6 EIGRP Obtaining a Default Route

  •    2.7 EIGRP Load Balancing

  •    2.8 EIGRP Authentication

  •    2.9 Troubleshooting EIGRP Part 1

  •    2.10 Troubleshooting EIGRP Part 2

  •    2.11 Troubleshooting EIGRP Part 3

  •    2.12 Troubleshooting EIGRP Part 4

Module 3 - OSPF (Open Shortest Path First)

  •    3.1 Implementing OSPF Part 1

  •    3.2 Implementing OSPF Part 2

  •    3.3 Implementing OSPF Part 3 DR BDR Election

  •    3.4 Implementing OSPF Part 4 LSA Types

  •    3.5 Implementing OSPF Part 5 OSPF States

  •    3.6 Optimizing OSPF Summarization

  •    3.7 Optimizing OSPF Default Routing

  •    3.8 Optimizing OSPF Authentication

  •    3.9 Optimizing OSPF Virtual Links

Module 4 - Route Redistribution

  •    4.1 Route Redistribution Introduction

  •    4.2 Route Redistribution Implementation

  •    4.3 Route Redistribution OSPF E1 or E2

  •    4.4 Route Redistribution Types

  •    4.5 Route Redistribution Manipulation & Filtering

  •    4.6 Route Redistribution Prefix-Lists

  •    4.7 Route Redistribution Route-Maps

Module 5 - Implementing Path Control

  •    5.1 Implementing Path Control

  •    5.2 Implementing Path Control Implementation

Module 6 - BGP (Border Gateway Protocol)

  •    6.1 BGP Fundamentals

  •    6.2 BGP Attributes

  •    6.3 BGP Path Selection Criteria

  •    6.4 BGP Transit AS

  •    6.5 BGP Split Horizon

  •    6.6 BGP Weight Attribute

  •    6.7 BGP Local Preference Attribute

  •    6.8 BGP MED Attribute

  •    6.9 BGP Route Filtering

  •    6.10 BGP Peer Groups

  •    6.11 BGP Route Reflectors

  •    6.12 BGP Authentication

  •    6.13 BGP Troubleshooting Part 1

  •    6.14 BGP Troubleshooting Part 2

Module 7 - Implementing VRF (Virtual Routing and Forwarding)

  •    7.1 Implementing VRF-Lite

Module 8 - Implementing DHCP

  •    8.1 Implementing DHCP

  •    8.2 Implementing DHCP Relay Manual Binding and Options

  •    8.3 Implementing DHCP SLAAC and DHCPv6

  •    8.4 Troubleshooting DHCP

Module 9 - Securing Cisco Routers (Control Plane)

  •    9.1 Securing Cisco Routers Control Plane Security CoPP

  •    9.2 Securing Cisco Routers Control Plane Security CoPP Implementation

Module 10 - Infrastructure Services

  •    10.1 Infrasctucture Services AAA

  •    10.2 Infrastructure Services SNMP

  •    10.3 Infrastructure Services SYSLOG

  •    10.4 Infrastructure Services SSH

  •    10.5 Infrastructure Services HTTP FTP SCP

  •    10.6 Infrastructure Services NetFlow

Adobe XD 2022 Course Content

Module 1 - Welcome to Adobe XD 2022

  •    1.1 Welcome to Adobe XD 2022

  •    1.2 What is Adobe XD 2022

Module 2 - Adobe XD 2022 Overview

  •    2.1 Adobe XD 2022 Overview

Module 3 - Designing in a Project with Adobe XD 2022

  •    3.1 Adobe XD 2022 Project Overview

  •    3.2 Designing Your First Screen in Adobe XD 2022

Module 4 - Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022

  •    4.1 Assets and Reusable Styles in Adobe XD 2022

  •    4.2 Responsive Resize in Adobe XD 2022

Module 5 - Images and Visual Effects in Adobe XD 2022

  •    5.1 Imports, Images, and Masks in Adobe XD 2022

  •    5.2 Special Visual Effects in Adobe XD 2022

Module 6 - Making Interactive Buttons in Adobe XD 2022

  •    6.1 Plugins in Adobe XD 2022

  •    6.2 Stacks in Adobe XD 2022

  •    6.3 Components in Adobe XD 2022

  •    6.4 Repeat Grid in Adobe XD 2022

Module 7 - Grouped Imports and Scroll Groups in Adobe XD 2022

  •    7.1 Grouped imports in Adobe XD 2022

  •    7.2 Scroll Groups in Adobe XD 2022

Module 8 - Prototyping and Animations in Adobe XD 2022

  •    8.1 Prototyping with Adobe XD 2022

  •    8.2 Animations in Adobe XD 2022

Module 9 - Exporting and Sharing with Adobe XD 2022

  •    9.1 Exports in Adobe XD 2022

  •    9.2 Adobe XD 2022 Conclusion

Adobe InDesign Course Content

Module 1 - Introduction To Adobe Indesign

  •    1.1 Intro-InDesign

  •    1.2 What is InDesign

Module 2 - Getting Started With Adobe InDesign

  •    2.1 Creating a New Document

  •    2.2 Importing Images and Understanding Links

  •    2.3 Embedding

  •    2.4 Navigating the Interface

  •    2.5 Manipulating Graphics

  •    2.6 Creating simple shapes

  •    2.7 Basic Tools

  •    2.8 Properties Panel

  •    2.9 Working with Layers

  •    2.10 Elements of Design

Module 3 - Understanding and Applying Colors

  •    3.1 Color Theory

  •    3.2 Color Swatches RGB vs Lab vs CMYK

  •    3.3 Understanding and Applying Gradients

Module 4 - Pages

  •    4.1 Pages Panel

  •    4.2 Parent Pages

Module 5 - Typography

  •    5.1 Typography

  •    5.2 Creating Text

  •    5.3 Character and Paragraph Formatting

  •    5.4 Character and Paragraph Styles

  •    5.5 Chaining Text Boxes Together

  •    5.6 OpenType

  •    5.7 Creating Outlines

  •    5.8 Working with Tables

Module 6 - Packaging and Exporting for Web and Print

  •    6.1 Preflight

  •    6.2 Packaging Your Document

  •    6.3 Exporting a PDF

  •    6.4 Exporting an Image Sequence

Module 7 - Principles of Design

  •    7.1 Principles of Design

Module 8 - Designing for Your Output

  •    8.1 Letterheads

  •    8.2 Business Cards

  •    8.3 Resume

  •    8.4 Brochures

  •    8.5 Types of Binding

  •    8.6 Impose

Module 9 - Advanced Techniques in InDesign

  •    9.1 Clipping Mask

  •    9.2 Step and Repeat

  •    9.3 GREP

  •    9.4 Layer Effects

  •    9.5 Page Tool

  •    9.6 Scripts

Module 10 - Interactivity in InDesign

  •    10.1 Interactivity

  •    10.2 Importing Media

  •    10.3 Using Multiple Pages in Interactivity

  •    10.4 Crating an Interactive Project

  •    10.5 Animation

  •    10.6 InDesign Conclusion

Adobe Illustrator Course Content

Module 1 - Introduction to Adobe Illustrator 2022

  •    1.1 Instructor Bio

  •    1.2 Course Introduction

Module 2 - Getting Started with Adobe Illustrator 2022

  •    2.1 What are Vectors

  •    2.2 Creating a New Document

  •    2.3 Navigating the Interface

Module 3 - Drawing

  •    3.1 Drawing and Manipulating Primitive Shapes

  •    3.2 Drawing Custom Shapes

  •    3.3 Importing Images

  •    3.4 Understanding Layers and Sublayers

  •    3.5 Additional Drawing and Manipulation Tools

Module 4 - Colors and Gradients

  •    4.1 Color Theory

  •    4.2 In-depth dive into Color Palette-

  •    4.3 Creating Color Swatches

  •    4.3.2 Gradient Mesh

Module 5 - Intermediate Illustration

  •    5.1 Appearance Palette

  •    5.2 Pathfinder Palette

  •    5.3.1 Recreating an Existing Logo

  •    5.3.2 Creating an icon from a Sketch

  •    5.3.3 Creating a vector illustration from a sketch

  •    5.3.4 Blending Modes

Module 6 - Typography

  •    6.1 Introduction to Typography

  •    6.2 Type Tools in Illustrator

  •    6.3 Envelope Warp and Mesh

  •    6.4 Breaking Text into Outlines

  •    6.5 Caligramme Demo

Module 7 - Live Trace, Paintbrush and Blob Brush

  •    7.1 Live Trace

  •    7.2 Paint Brush

Module 8 - Advanced Illustration

  •    8.1 Illustrating a face from a photo

  •    8.2 Illustrating the body

  •    8.3 Hair and emulating texture

  •    8.4 Adding a background

  •    8.5 Shadows and highlights

Module 9 - Exporting

  •    9.1 Differences Between File Formats

  •    Conclusion

CompTIA Network+ N10-008 Course Content

Module 0 - Course introduction

  •    0.1 Instructor Intro

  •    0.2 Course Overview

Module 1 - Networking Fundamentals

  •    1.1 Intro to Networking

  •    1.1.1 Activity: Creating a Network

  •    1.2 Common Terminology

  •    1.2.1 Activity: Examining Ports and Sockets

  •    1.3 OSI Model

  •    1.4 DoD Model

  •    1.4.1 Activity: Examining Network Layers

  •    1.5 TCP, UDP, IP

  •    1.5.1 Activity: Examining TCP

  •    1.5.2 Activity: Examining UDP

  •    1.5.3 Activity: Examining IP

  •    1.6 ICMP, IGMP, ARP

  •    1.6.1 Activity: Examining ICMP

  •    1.6.2 Activity: Examining ARP

  •    1.6.3 Activity: Examining IGMP

  •    1.7 Network Topologies

  •    1.8 Network Types

  •    1.9 Part 1: Network Characteristics

  •    1.9 Part 2: Network Characteristics

  •    1.10 Module 1 outro

Module 2 - Cables and Connectors

  •    2.1 Ethernet Standards

  •    2.2 Copper Cable Types

  •    2.3 Fiber Optic Cable Types

  •    2.4 Connector Types

  •    2.4.1 Activity: Selecting the Right Cable

  •    2.5 Media Converters and Transceivers

  •    2.6 Cable Management

  •    2.7 Module 2 Outro

Module 3 - Internet Protocol (IP)

  •    3.1 IPv4 Basics

  •    3.2 IP Packet and Interface Types

  •    3.2.1 Activity: Configuring Client IP Settings

  •    3.3 Binary Numbering System

  •    3.4 Classful and Classless Addressing

  •    3.5 Understanding CIDR Notation

  •    3.6 IPv4 Subnetting Method

  •    3.7 Verifying with Binary

  •    3.8 Finding Subnet IDs

  •    3.8.1 Activity: Subnetting a Class C Network

  •    3.9 The Delta in Action

  •    3.9.1 Activity: Subnetting With the Delta

  •    3.10 Subnetting Based on Hosts

  •    3.11 Subnetting in Other Octets

  •    3.12 Supernetting

  •    3.12.1 Activity: Supernetting

  •    3.13 IPv6

  •    3.14 IPv4 - IPv6 Transition Mechanisms

  •    3.15 Module 3 Outro

Module 4 - Layer 7 Protocols

  •    4.1 Remote Control Protocols

  •    4.2 File Sharing Protocols

  •    4.3 Web Protcols

  •    4.4 Email Protocols

  •    4.5 Database Protocols

  •    4.6 Voice Protocols

  •    4.7 Security Protocols

  •    4.8 Management Protocols

  •    4.9 Module 4 Outro

Module 5 - Network Services

  •    5.1 DHCP

  •    5.1.1 Activity: Configuring DHCP

  •    5.1.2 Activity: Configuring a DHCP Relay Agent

  •    5.2 DNS

  •    5.2.1 Activity: Configuring DNS - Part 1

  •    5.2.2 Activity: Configuring DNS - Part 2

  •    5.3 NTP

  •    5.4 Corporate and Datacenter Network Architecture

  •    5.5 Cloud Concepts and Connectivity Options

  •    5.6 Module 5 Outro

Module 6 - Networking Devices

  •    6.1 Introductory Concepts

  •    6.2 Repeaters and Hubs

  •    6.2.1 Activity: Connecting Devices with a Hub

  •    6.3 Bridges and Switches

  •    6.3.1 Activity: Connecting Devices with a Switch

  •    6.4 Routers and Multilayer Switches

  •    6.5 Security Devices

  •    6.6 Modems

  •    6.7 Module 6 Outro

Module 7 - Networked Devices

  •    7.1 IP Devices

  •    7.2 IoT

  •    7.2.1 Activity - Programming IoT Devices

  •    7.3 ICS/SCADA

  •    7.4 Module 7 Outro

Module 8 - Routing and Bandwidth Management

  •    8.1 Routing Basics

  •    8.1.1 Activity: Configuring Static Routes

  •    8.2 Packet Delivery on the Same Network

  •    8.3 IP Routing Across a Single Router

  •    8.4 IP Routing Across Multiple Hops

  •    8.4.1 Activity: Static Routes - CHALLENGE

  •    8.5 Route Selection

  •    8.6 RIP

  •    8.6.1 Activity: Configuring RIP - CHALLENGE

  •    8.7 OSPF

  •    8.8 EIGRP

  •    8.9 BGP

  •    8.10 NAT/PAT

  •    8.11 Bandwidth Management (with Module 8 Outro)

Module 9 - Ethernet Switching

  •    9.1 Ethernet Basics

  •    9.2 Switching Overview

  •    9.2.1 Activity: Examining a MAC Table

  •    9.3 VLANs

  •    9.3.1 Activity: Creating VLANs

  •    9.4 VLAN Trunking

  •    9.4.1 Activity: Configuring VLAN Trunking

  •    9.5 VLAN Routing

  •    9.5.1 Activity: Configuring VLAN Routing

  •    9.6 Contention Management

  •    9.7 Switchport Configuration (with Module 9 Outro)

Module 10 - Wireless Technologies

  •    10.1 Wireless Overview

  •    10.2 Radio Basics

  •    10.3 Modulation

  •    10.4 Wi-Fi Standards

  •    10.5 Antennas

  •    10.6 Wi-Fi Service Sets

  •    10.7 Wi-Fi Security

  •    10.8 Cellular

Module 11 Network Performance

  •    11.1 Monitoring Performance

  •    11.2 Common Metrics

  •    11.2.1 Activity: Examining Interface Statistics

  •    11.3 SNMP

  •    11.4 Netflow

  •    11.5 Network Security Monitoring (with Module 11 Outro)

Module 12 High Availability and Disaster Recovery

  •    12.1 HA and DR Concepts

  •    12.2 High Availability Mechanisms

  •    12.3 Disaster Recovery Mechanisms

  •    12.4 Facility and Infrastructure Support (with Module 12 Outro)

Module 13 Organizational Documents

  •    13.1 Plans and Procedures

  •    13.2 Security Policies

  •    13.3 Loss Prevention

  •    13.4 Common Agreements

  •    13.5 Common Documentation

  •    13.6 Structured Cabling - MDF and IDF

  •    13.7 Horizontal and Vertical Cabling

  •    13.7.1 Activity - Implementing Cable Management

  •    13.8 Labeling

  •    13.9 Surveys and Assessments (with Module 13 Outro)

Module 14 Network Security

  •    14.1 Common Security Concepts

  •    14.2 Common Attack Types

  •    14.3 Spoofing-based Attacks

  •    14.4 Hijacking and MITM

  •    14.5 Social Engineering

  •    14.6 Network Segmentation

  •    14.7 Private VLANs

  •    14.8 Single Organization Authentication

  •    14.9 Extending Authentication

  •    14.10 Authorization

  •    14.11 Network Device Hardening

  •    14.12 Wireless Security

  •    14.13 Remote Access Security

  •    14.14 IoT Security

  •    14.15 Physical Security (with Module 14 Outro)

Module 15 Network Troubleshooting

  •    15.1 Troubleshooting Methodology

  •    15.2 Physical Connectivity Issues

  •    15.3 Hardware Testing Tools

  •    15.3.1 Activity - Testing an Ethernet Cable

  •    15.3.2 Activity - Crimping on an RJ-45 Connector

  •    15.3.3 Activity - Punching Down Twisted Pair

  •    15.3.4 Activity - Using a Telephone Toner

  •    15.4 Understanding Electricity

  •    15.4.1 Activity - Checking Cable Continuity

  •    15.4.2 Activity - Testing DC Voltage

  •    15.4.3 Activity - Testing AC Voltage

  •    15.5 Twisted Pair Pinout Problems

  •    15.6 Twisted Pair Termination Problems

  •    15.7 Repairing Damaged Twisted Pair Cable

  •    15.8 Fiber Optic Connectivity Issues

  •    15.8.1 Activity - Testing a Fiber Optic Cable

  •    15.9 Common Port Problems

  •    15.9.1 Working with Ports and Their Devices

  •    15.10 Common Software Testing Tools

  •    15.10.1 Activity - Scanning for Open Ports

  •    15.11 Common Command Line Utilities

  •    15.12 Troubleshooting Basic IP Networking Issues

  •    15.13 Common Switching Issues

  •    15.14 Switching Test Tools and Techniques

  •    15.15 Common IP Routing Issues

  •    15.16 Wi-Fi Access Point Issues

  •    15.17 Wirelss Interference

  •    15.17.1 Activity - Using a Spectrum Analyzer

  •    15.18 Wireless Antenna Issues

  •    15.18.1 Activity - Configuring a Wi-Fi Router

  •    15.19 WAP Placement Strategies

  •    15.20 Infrastructure Service Issues (DHCP)

  •    15.21 Infrastructure Service Issues (DNS)

  •    15.22 Infrastructure Service Issues (NTP)

  •    15.23 Fireall / ACL Issues

  •    15.24 VPN Issues

  •    15.25 Additional Network Security Troubleshooting and Tips

  •    15.26 Advanced Networking Issues

  •    15.27 Troubleshooting Server Services (with Module 15 Outro)

  •    CompTIA Network+ N10-008 Course Outro

Adobe After Effects Course Content

Module 1: Getting Started

  •    1.1 Course Introduction

  •    1.2 Keyboard Shortcuts

  •    1.3 Keyboard Tips

  •    1.4 Things to Do Before Starting

Module 2: Getting to Know the Workflow

  •    2.1 General Interface and Starting a Project

  •    2.2 Basic Title Animation Using Keyframes

  •    2.3 Keyframe Interpolation and Keyframe Assistan

  •    2.4 Renaming a Composition

  •    2.5 Soloing a Layer for Individual Edits

  •    2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces

  •    2.7 Render and Export

Module 3: Creating a Basic Animation Using Effects and Presets

  •    3.1 Importing Files from Bridge and Creating a New Composition

  •    3.2 Horizontal Type Tool and Guides

  •    3.3 Controls, Effects and Presets for Titles and Logos

Module 4: Animating Text

  •    4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels

  •    4.2 Preview and Apply Text Animation Presets and Use Keyframes

  •    4.3 Animate Layers Using Parenting

  •    4.4 Editing and Animating Imported Photoshop Text

  •    4.5 Install Fonts Using Adobe Fonts

Module 5: Working With Shape Layers

  •    5.1 Create and Customize a Shape with Shape Tool

  •    5.2 Self Animating Shape with a Wiggle Path (green marker)

  •    5.3 Create and Customize a Shape with Pen Tool

  •    5.4 Snap Layers

  •    5.5 Animating Shape Layers with Path Operations

  •    5.6 Creating Nulls from Paths

Module 6: Animating a Multimedia Presentation

  •    6.1 Animate Multiple Layers Using Parenting

  •    6.2 Precomposing Layers

  •    6.3 Keyframing a Motion Path

  •    6.4 Animating a Character to Create Movement

  •    6.5 Animating Precomposed Layers with Effects

Module 7: Animating Photoshop Layers

  •    7.1 Animating Change in Light

  •    7.2 Animating Birds Flying with a Track Mat

  •    7.3 Animating Shadows and Using Corner Pin

  •    7.4 Adding a Lens Flare Effect

  •    7.5 Render Composition and Retime

  •    7.6 Use the Graph Editor to Remap Time

Module 8: Working With Masks

  •    8.1 Setup a Basic Mask

  •    8.2 Refine and Apply Mask

  •    8.3 Creating a Reflection with a Mask and Blending Modes

  •    8.4 Create a Vignette

Module 9: Distorting Objects with the Puppet Tools

  •    9.1 Puppet Position Pen Tool

  •    9.2 Starch Pins

  •    9.3 Manually Animate with Puppet Tool

  •    9.4 Automate Animation Using Puppet Sketch Tool

Module 10: Using the Roto Brush Tool

  •    10.1 Extract Foreground Object from Background and Create a Mat

  •    10.2 Touch Up a Mat with the Refine Edge Tool

  •    10.3 Edit or Replace the Separated Background

Module 11: Performing Color Correction

  •    11.1 Set up Composition and Use Levels to Start Balancing the Color

  •    11.2 Basic Color Grading with Lumetri Color Effects

  •    11.3 Use Basic Masking, Tracking and Keying to Replace the Background

  •    11.4 Use an Adjustment Layer to Create a Global Color Effect

  •    11.5 Gaussian Blur Effect

Module 12: Creating Motion Graphics Templates

  •    12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects

  •    12.2 Using Adjustment Layers to Apply a Specific Effect

  •    12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template

  •    12.4 Create Checkboxes to Toggle Visibility of a Background Image

  •    12.5 Protect Portions of a Project from Time Stretching and Export Template

CISSP : Certified Information Systems Security Professional Course Content

Module 1: Security and Risk Management

  •    Intro

  •    Security and Risk Management pt.1

  •    Security and Risk Management pt.2

  •    Security and Risk Management pt.3

  •    Security and Risk Management Summary

  •    Security and Risk Management Test Prep pt.1

  •    Security and Risk Management Test Prep pt.2

  •    Security and Risk Management Test Prep pt.3

  •    Security and Risk Management Test Prep pt.4

Module 2: Asset Security

  •    Asset Secutity pt.1

  •    Asset Security pt.2

  •    Asset Security Summary

  •    Asset Security Test Prep

Module 3: Security Architecture and Engineering

  •    Security Architecture and Engineering pt.1

  •    Security Architecture and Engineering pt.2

  •    Security Architecture and Engineering pt.3

  •    Security Architecture and Engineering Summary

  •    Security Architecture and Engineering Test Prep pt.1

  •    Security Architecture and Engineering Test Prep pt.2

  •    Security Architecture and Engineering Test Prep pt.3

Module 4: Communication and Network Security

  •    Communication and Network Security pt.1

  •    Communication and Network Security pt.2

  •    Communication and Network Security Summary

  •    Communication and Network Security Test Prep

Module 5: Identity and Access Management (IAM)

  •    Identity and Access Management (IAM)

  •    Identity and Access Management (IAM) Summary

  •    Identity and Access Management (IAM) Test Prep pt.1

  •    Identity and Access Management (IAM) Test Prep pt.2

  •    Identity and Access Management (IAM) Test Prep pt.3

  •    Identity and Access Management (IAM) Test Prep pt.4

Module 6: Security Assessment and Testing

  •    Security Assessment and Testing

  •    Security Assessment and Testing Summary

  •    Security Assessment and Testing Test Prep

Module 7: Security Operations

  •    Security Operations pt.1

  •    Security Operations pt.2

  •    Security Operations pt.3

  •    Security Operations pt.4

  •    Security Operations Summary

  •    Security Operations Test Prep

Module 8: Software Development Security

  •    Software Development Security pt.1

  •    Software Development Security pt.2

  •    Software Development Security pt.3

  •    Software Development Security pt.4

  •    Software Development Security pt.5

  •    Software Development Security Summary

  •    Software Development Security Test Prep

  •    Outro

Microsoft MD-101: Managing Modern Desktops Course Content

Module 1: Deploy and Update Operating Systems

  •    1.1 Instructor and Course Introduction

  •    1.2 Exam Information

  •    1.3 Deploy and Update Operating Systems Introduction

  •    1.4 Plan and Implement Windows 10 by Using Dynamic Deployment

  •    1.5 Plan and Implement Windows 10 by Using Windows Autopilot

  •    1.6 Upgrade Devices to Windows 10

  •    1.7 Manage Updates

  •    1.8 Manage Device Authentication

  •    1.9 Install VMware Workstation 15 in Windows 10 Demo

  •    1.10 Performing a Clean Install of Windows 10 Demo

  •    1.11 Upgrading Windows 8.1 to Windows 10 Demo

  •    1.12 Configuring Locales Demo

  •    1.13 Troubleshooting Failed Installation with Setup Logs Demo

  •    1.14 Installing Windows 16 Server Demo

  •    1.15 Installing Microsoft Deployment Toolkits (MDT) Part 1 Demo

  •    1.16 Installing Microsoft Deployment Toolkits (MDT) Part 2 Demo

  •    1.17 Setting Up an On-Site Domain Controller Demo

  •    1.18 Joining Windows 10 Client Machine to an On-Site Domain Controller Demo

  •    1.19 Getting Started with Free Azure Subscription Demo

  •    1.20 Getting Familiarized with Azure Portal Options Demo

  •    1.21 Create a Virtual Machine Demo

Module 2: Manage Policies and Profiles

  •    2.1 Managing Policies and Profiles Introduction

  •    2.2 Plan and Implement Co-Management

  •    2.3 Implement Conditional Access and Compliance Policies

  •    2.4 Configure Device Profiles

  •    2.5 Manage User Profiles

  •    2.6 Deploy Azure Container Instances Demo

  •    2.7 Manage Access with RBAC Demo

  •    2.8 Secure Network Traffic Demo

  •    2.9 Installing OneDrive Demo

Module 3: Manage and Protect Devices

  •    3.1 Manage and Protect Devices Introduction

  •    3.2 Manage Windows Defender

  •    3.3 Manage Intune Device Enrollment and Inventory

  •    3.4 Monitor Devices

  •    3.5 Windows Defender Security Center Overview Demo

  •    3.6 Installing Windows Defender Application Guard Demo

  •    3.7 Creating a New Inbound Rule Demo

Module 4: Manage Apps and Data

  •    4.1 Manage Apps and Data Introduction

  •    4.2 Deploy and Update Applications

  •    4.3 Implement Mobile Application Management

  •    4.4 Setting up a Microsoft Intune Account Demo

  •    4.5 Create a New Group Demo

  •    4.6 Confirm the Version of Windows Demo

Microsoft SQL Server 2019 - Introduction to Data Analysis Course Content

Module 1 - Query Tools

  •    1.1 Course Introduction

  •    1.2 Intro to Management Studio

  •    1.3 Intro to command-line query tools

Module 2 - Introduction to T-SQL Querying

  •    2.1 Introducing T-SQL

  •    2.2 Understanding Sets

  •    2.3 Understanding the Logical Order of Operations in SELECT statements

Module 3 - Basic SELECT Queries

  •    3.1 Writing Simple SELECT Statements

  •    3.2 Eliminate Duplicates with DISTINCT

  •    3.3 Using Column and Table Aliases

  •    3.4 Write Simple CASE Expressions

Module 4 - Querying Multiple Tables

  •    4.1 Understanding Joins

  •    4.2 Querying with Inner Joins

  •    4.3 Querying with Outer Joins

  •    4.4 Querying with Cross Joins and Self Joins

Module 5 - Sorting and Filtering Data

  •    5.1 Sorting Data

  •    5.2 Filtering Data with Predicates

  •    5.3 Filtering with the TOP and OFFSET-FETCH

  •    5.4 Working with Unknown Values

Module 6 - Introduction to Business Intelligence and Data Modeling

  •    6.1 Introduction to Business Intelligence

  •    6.2 The Microsoft Business Intelligence Platform

  •    6.3 Exploring a Data Warehouse

  •    6.4 Exploring a Data Model

Module 7 - Prepare Data

  •    7.1 Introduction to Power BI

  •    7.2 Get data from various data sources

  •    7.3 Preview source data

Module 8 - Clean, Transform, and Load Data

  •    8.1 Data Transformation Intro

  •    8.2 Transformation Example 1

  •    8.3 Transformation Example 2

  •    8.4 Transformation Example 3

  •    8.5 Transformation Example 4

  •    8.6 Transformation Example 5

  •    8.7 Transformation Example 6

Module 9 - Design a Data Model

  •    9.1 Introduction to Data Modeling

  •    9.2 Model Relationships

  •    9.3 Table Configuration

  •    9.4 Model interface

  •    9.5 Quick Measures

  •    9.6 Many-to-many relationships

  •    9.7 Row-level security

Module 10 - Create Model Calculations using DAX

  •    10.1 DAX context

  •    10.2 Calculated Tables

  •    10.3 Calculated Columns

  •    10.4 Managing Date Tables

  •    10.5 Measures

  •    10.6 Filter Manipulation

  •    10.7 Time Intelligence

Module 11 - Create Reports

  •    11.1 Basic Report Creation

  •    11.2 Example Page 1

  •    11.3 Example Page 2

  •    11.4 Example Page 3

  •    11.5 Report Publishing

  •    11.6 Enhancing Reports

  •    11.7 Drill-Through Pages

  •    11.8 Conditional Formatting

  •    11.9 Buttons and Bookmarks

Module 12 - Create Dashboards

  •    12.1 Dashboard Basics

  •    12.2 Real Time Dashboards

  •    12.3 Enhanced Dashboards

Module 13 - Create Paginated Reports

  •    13.1 Introduction to Power BI Report Builder

  •    13.2 Report Layouts

  •    13.3 Report Data

  •    13.4 Report Tables

Module 14 - Perform Advanced Analytics

  •    14.1 Introduction to Advanced Analytics

  •    14.2 Scatter Chart

  •    14.3 Forecast

  •    14.4 Decomposition Tree

  •    14.5 Key Influencers

Module 15 - Create and Manage Workspaces

  •    15.1 Introduction to Workspaces

  •    15.2 Working with Workspaces and the Portal

Module 16 - Create Power App Visuals

  •    16.1 Introduction to Power Apps Visual

  •    16.2 Creating the App

  •    16.3 Basic Power Apps Concepts

  •    16.4 Refreshing the Report

Module 17 - Analysis Services and Power BI

  •    17.1 Introduction to Analysis Services

  •    17.2 Connecting with Multidimensional Models

  •    17.3 Premium Workspaces and Analysis Services

  •    17.4 Course Wrap Up

Microsoft SQL Server 2019 - Querying SQL Server Course Content

Module 1 - Query Tools

  •    1.1 Course Introduction

  •    1.2 Module 1 Introduction

  •    1.3 Intro to Management Studio

  •    1.4 Intro to command-line query tools

Module 2 - Introduction to T-SQL Querying

  •    2.1 Module 2 Introduction

  •    2.2 Introducing T-SQL

  •    2.3 Understanding Sets

  •    2.4 Understanding the Logical Order of Operations in SELECT statements

Module 3 - Basic SELECT Queries

  •    3.1 Module 3 Introduction

  •    3.2 Writing Simple SELECT Statements

  •    3.3 Eliminate Duplicates with DISTINCT

  •    3.4 Using Column and Table Aliases

  •    3.5 Write Simple CASE Expressions

Module 4 - Querying Multiple Tables

  •    4.1 Module 4 Introduction

  •    4.2 Understanding Joins

  •    4.3 Querying with Inner Joins

  •    4.4 Querying with Outer Joins

  •    4.5 Querying with Cross Joins and Self Joins

Module 5 - Sorting and Filtering Data

  •    5.1 Module 5 Introduction

  •    5.2 Sorting Data

  •    5.3 Filtering Data with Predicates

  •    5.4 Filtering with the TOP and OFFSET-FETCH

  •    5.5 Working with Unknown Values

Module 6 - Working with SQL Server Data Types

  •    6.1 Module 6 Introduction

  •    6.2 Writing Queries that return Date and Time Data

  •    6.3 Writing Queries that use Date and Time Functions

  •    6.4 Writing Queries that return Character Data

  •    6.5 Writing Queries that use Character Functions

Module 7 - Using DML to Modify Data

  •    7.1 Module 7 Introduction

  •    7.2 Inserting Records with DML

  •    7.3 Updating Records Using DML

  •    7.4 Deleting Records Using DML

Module 8 - Using Built-In Functions

  •    8.1 Module 8 Introduction

  •    8.2 Writing Queries with Built-In Functions

  •    8.3 Using Conversion Functions

  •    8.4 Using Logical Functions

  •    8.5 Using Functions to Work with NULL

Module 9 - Grouping and Aggregating Data

  •    9.1 Module 9 Introduction

  •    9.2 Using Aggregate Functions

  •    9.3 Using the GROUP BY Clause

  •    9.4 Filtering Groups with HAVING

Module 10 - Using Subqueries

  •    10.1 Module 10 Introduction

  •    10.2 Writing Self-Contained Subqueries

  •    10.3 Writing Correlated Subqueries

  •    10.4 Using the EXISTS Predicate with Subqueries

Module 11 - Using Table Expressions

  •    11.1 Module 11 Introduction

  •    11.2 Using Views

  •    11.3 Using Inline Table-Valued Functions

  •    11.4 Using Derived Tables

  •    11.5 Using Common Table Expressions

Module 12 - Using Set Operators

  •    12.1 Module 12 Introduction

  •    12.2 Writing Queries with the UNION operator

  •    12.3 Using EXCEPT and INTERSECT

  •    12.4 Using APPLY

Module 13 - Using Window Ranking, Offset, and Aggregate Functions

  •    13.1 Module 13 Introduction

  •    13.2 Creating Windows with OVER

  •    13.3 Exploring Window Functions

Module 14 - Pivoting and Grouping Sets

  •    14.1 Module 14 Introduction

  •    14.2 Writing Queries with PIVOT and UNPIVOT

  •    14.3 Working with Grouping Sets

Module 15 - Implementing Error Handling

  •    15.1 Module Introduction

  •    15.2 Implementing T-SQL error handling

  •    15.3 Implementing structured exception handling

Module 16 - Managing Transactions

  •    16.1 Module 16 Introduction

  •    16.2 Transactions and the Database Engine

  •    16.3 Controlling Transactions

  •    16.4 Course Wrap Up

SQL Server 2019 Database Design Course Content

Module 1 - Designing and Building Tables

  •    1.1 Course Introduction

  •    1.2 Module 1 Introduction

  •    1.3 Introduction to Database Design

  •    1.4 Creating Tables

  •    1.5 Data Types

  •    1.6 Schemas

  •    1.7 Altering Tables

Module 2 - Enforcing Data Integrity

  •    2.1 Module 2 Introduction

  •    2.2 Introduction to Data Integrity

  •    2.3 Data Domain Integrity

  •    2.4 Implementing Data Domain Integrity

  •    2.5 Implementing Entity and Referential Integrity

Module 3 - Indexing

  •    3.1 Module 3 Introduction

  •    3.2 Core Indexing Concepts

  •    3.3 Heaps, Clustered, and Nonclustered Indexes

  •    3.4 Data Types and Indexes

  •    3.5 Single Column and Composite Indexes

Module 4 - Stored Procedures, Functions, and Triggers

  •    4.1 Module 4 Introduction

  •    4.2 Introduction to Database Programming

  •    4.3 Creating Stored Procedures

  •    4.4 Creating User-Defined Functions

  •    4.5 Creating Triggers

Module 5 - Blob and Filestream Data

  •    5.1 Module 5 Introduction

  •    5.2 Introduction to Binary Data

  •    5.3 Considerations for BLOB data

  •    5.4 FILESTREAM Example

  •    5.5 File Table Example

Module 6 - Full-Text Search

  •    6.1 Module 6 Introduction

  •    6.2 Introduction to Full-Text Search

  •    6.3 Full-Text Catalogs

  •    6.4 Full-Text Indexes

  •    6.5 Full-Text Queries

Module 7 - Azure vs On-Prem

  •    7.1 Module 7 Introduction

  •    7.2 SQL Server on Azure VM

  •    7.3 Azure Managed SQL Instance

  •    7.4 Azure SQL Database

  •    7.5 Course Wrap Up

Certified Blockchain Developer Hyperledger (CBDH) Course Content

Module 1: Certified Blockchain Developer Hyperledger Overview

  •    1.1 Course Introduction

  •    1.2 Module 1 Introduction

  •    1.3 Audience for the Certification

  •    1.4 What is a CBDH

  •    1.5 Exam Objectives

  •    1.6 Exam Overview

Module 2: Hyperledger Framework

  •    2.1 Module 2 Introduction

  •    2.2 Hyperledger Project Overview

  •    2.3 Hyperledger Frameworks

  •    2.4 Hyperledger Fabric

  •    2.5 Hyperledger Fabric Use Cases

Module 3: Hyperledger Fabric Blockchain

  •    3.1 Module 3 Introduction

  •    3.2 Hyperledger Fabric Design Overview

  •    3.3 Hyperledger Fabric Whiteboard 

  •    3.4 Hyperledger Fabric Consensus

  •    3.5 Hyperledger Fabric Transactions

  •    3.6 Transactions Whiteboard

  •    3.7 Hyperledger Fabric Ledger

  •    3.8 Ledger Whiteboard

  •    3.9 Hyperledger Fabric Versions

  •    3.10 Hyperledger Fabric Membership Services

  •    3.11 Node Types and Roles

  •    3.12 Nodes and Peers Whiteboard

  •    3.13 Channels

  •    3.14 Channels Whiteboard

Module 4: Access Controls and Secure Chaincode

  •    4.1 Module 4 Introduction

  •    4.2 Access Controls Lists (.acl)

  •    4.3 Certificates and Certificate Authority

  •    4.4 Organizations and Participants

  •    4.5 Endorsement Policies

  •    4.6 Rest APIs

Module 5: Plan and Prepare Apps for Deployment

  •    5.1 Module 5 Introduction

  •    5.2 Development Whiteboard

  •    5.3 Installation Considerations

  •    5.4 Composer

  •    5.5 Composer Demo

Module 6: Hyperledger Fabric Explorer

  •    6.1 Module 6 Introduction

  •    6.2 Hyperledger Fabric Explorer Basics

  •    6.3 Installation Requirements of Hyperledger Explorer

Module 7: Chaincode and Development

  •    7.1 Module 7 Introduction

  •    7.2 What is Chaincode

  •    7.3 Writing Chaincode Considerations

  •    7.4 Development Language

  •    7.5 Client App Considerations

  •    7.6 BNA Files

  •    7.7 Service Discovery

Module 8: Course Wrap Up

  •    8.1 Module 8 Introduction

  •    8.2 Course Review

  •    8.3 Top 10 Things to know for the exam

  •    8.4 Taking the Exam

  •    8.5 Course Closeout

Certified Blockchain Solutions Architect (CBSA) Course Content

Module 1: Certified Blockchain Solutions Architect Overview

  •    1.1 Module 1 Introduction

  •    1.2 What is a CBSA

  •    1.3 Exam Questions

  •    1.4 Exam Objectives

Module 2: Blockchain 101 Terminology and Components

  •    2.1 Module 2 Introduction

  •    2.2 What is a Blockchain

  •    2.3 Blockchain Terminology

  •    2.4 Blockchain Key Components

Module 3: Exam Objectives

  •    3.1 Module 3 Introduction

  •    3.2 Proof of Work, Proof of Stake, Other Proof Systems

  •    3.3 Why Cryptocurrency is Needed

  •    3.4 Public, Private, and Permissioned Blockchains

  •    3.5 How Blocks are Written to a Blockchain

  •    3.6 Block Activity Demo

  •    3.7 Transactions Whiteboard

  •    3.8 Cryptography

  •    3.9 LTC Wallet Demo

  •    3.10 Database or Blockchain

  •    3.11 Public Blockchain Common Uses

  •    3.12 Private & Permissioned Blockchain Common Uses

  •    3.13 Launching Your Own Blockchain

  •    3.14 Segwits and Forks

  •    3.15 Mining

  •    3.16 Byzantine Fault Tolerance

  •    3.17 Consensus Among Blockchains

  •    3.18 Hasing

  •    3.19 Anders Hashing Demo

  •    3.20 Security in Blockchain

  •    3.21 Smart Contracts and dApps

  •    3.22 History of Blockchain

  •    3.23 Blockchain Programming Languages

  •    3.24 Common Testing and Deployment Practices

  •    3.25 Metamask Demo

  •    3.26 Value Creation

  •    3.27 Blockchain Architecture

  •    3.28 Corda Blockchain Architecture Whiteboard

  •    3.29 Enterprise Blockchains

  •    3.30 Bitcoin Improvement Protocols

Module 4: Hyperledger

  •    4.1 Module 4 Introduction

  •    4.2 Hyperledger Project

  •    4.3 Hyperledger Fabric

  •    4.4 Hyperledger Chaincode

  •    4.5 Hyperledger Fabric Whiteboard

  •    4.6 Hyperledger Fabric on AWS Demo

Module 5: Ethereum

  •    5.1 Module 5 Introduction

  •    5.2 Ethereum Overview

  •    5.3 Ethereum EVM

  •    5.4 Ethereum Browsers

  •    5.5 Ethereum Development

  •    5.6 Etherscan Demo

Module 6: Course Closeout

  •    6.1 Module 6 Introduction

  •    6.2 Summary Review

  •    6.3 Taking the CBSA Exam

  •    6.4 Practice Question

Enterprise Blockchain Bootcamp for Solutions Engineers Course Content

Module 1: Course Overview

  •    1.1 Course Introduction

  •    1.2 Course Target Audience

  •    1.3 Course Pre-Requirements

Module 2: Pre-Sales Activities

  •    2.1 Module 2 Introduction

  •    2.2 Request for Proposals

  •    2.3 Request for Proposals Fintech

  •    2.4 Proof of Concepts

  •    2.5 Return on Investment

  •    2.6 Value Creation

  •    2.7 Cost Modeling

  •    2.8 Cost Considerations

  •    2.9 Enterprise Integration

  •    2.10 TPS

  •    2.11 Whiteboard Discussion

Module 3: Blockchain Fundamentals

  •    3.1 Module 3 Introduction

  •    3.2 What is a Blockchain

  •    3.3 Blockchain Components

  •    3.4 Blockchain Terminology

  •    3.5 Enterprise Blockchains

  •    3.6 Consensus and Mining

  •    3.7 Ledgers

  •    3.8 Permissioned vs Permissionless Blockchains

  •    3.9 Trust and Blockchain

  •    3.10 Advantages of Transparency

  •    3.11 Development Expertise

  •    3.12 Dapps

  •    3.13 BaaS

  •    3.14 AWS BaaS Whiteboard Discussion

  •    3.15 Understanding Blockchain Architecture

Module 4: Enterprise Blockchains

  •    4.1 Module 4 Introduction

  •    4.2 Hyperledger

  •    4.3 Ethereum

  •    4.4 Quorum

  •    4.5 R3 Corda

  •    4.6 Corda Demobench Demo

  •    4.7 Ripple

  •    4.8 IBM BaaS

  •    4.9 AWS BaaS Demo

Module 5: Use Cases

  •    5.1 Module 5 Introduction

  •    5.2 Ripple Use Cases

  •    5.3 Dubai Use Cases

Module 6: Course Closeout

  •    6.1 Module 6 Introduction

  •    6.2 Course Review

  •    6.3 Blockchain Roles

Microsoft SQL Server 2019 Analysis Services (SSAS) Course Content

Module 1 - Introduction to Business Intelligence and Data Modeling

  •    1.1 Course Introduction

  •    1.2 Module 1 Introduction

  •    1.3 Introduction to Business Intelligence

  •    1.4 The Microsoft Business Intelligence Platform

  •    1.5 Exploring a Data Warehouse

  •    1.6 Exploring a Data Model

Module 2 - Multidimensional Databases

  •    2.1 Module 2 Introduction

  •    2.2 Introduction to Multidimensional Analysis

  •    2.3 Overview of Cube Security

  •    2.4 Creating and Configuring a Cube

  •    2.5 Data Sources

  •    2.6 Data Source Views

  •    2.7 Adding a Dimension to a Cube

Module 3 - Cubes and Dimensions

  •    3.1 Module 3 Introduction

  •    3.2 Dimensions

  •    3.3 Attribute Hierarchies and Relationships

  •    3.4 Sorting and Grouping Attributes

  •    3.5 Slowly Changing Dimensions

Module 4 - Measures and Measure Groups

  •    4.1 Module 4 Introduction

  •    4.2 Measures

  •    4.3 Measure Groups and Relationships

  •    4.4 Measure Group Storage

Module 5 - Introduction to MDX

  •    5.1 Module 5 Introduction

  •    5.2 MDX Fundamentals

  •    5.3 Adding Calculations to a Cube

  •    5.4 Querying a cube using MDX

Module 6 - Customizing Cube Functionality

  •    6.1 Module 6 Introduction

  •    6.2 Key Performance Indicators

  •    6.3 Actions

  •    6.4 Perspectives

  •    6.5 Translations

Module 7 - Tabular Data Models

  •    7.1 Module 7 Introduction

  •    7.2 Introduction to Tabular Data Models

  •    7.3 Creating a Tabular Data Model

  •    7.4 Configure Relationships and Attributes

  •    7.5 Configuring Data Model for an Enterprise BI Solution

Module 8 - Data Analysis Expressions (DAX)

  •    8.1 Module 8 Introduction

  •    8.2 DAX Fundamentals

  •    8.3 Calculated Columns

  •    8.4 Relationships

  •    8.5 Measures

  •    8.6 Time Intelligence

  •    8.7 KPI

  •    8.8 Parent - Child Hierarchies

Module 9 - Data Mining

  •    9.1 Module 9 Introduction

  •    9.2 Overview of Data Mining

  •    9.3 Custom Data Mining Solutions

  •    9.4 Validating a Data Mining Model

  •    9.5 Consuming a Data Mining Model

  •    9.6 Course Wrap Up

Introduction to Microsoft Power BI Course Content

Module 1 - Prepare Data

  •    1.1 Course Introduction

  •    1.2 Module 1 Introduction

  •    1.3 Introduction to Power BI

  •    1.4 Get data from various data sources

  •    1.5 Preview source data

Module 2 - Clean, Transform, and Load Data

  •    2.1 Module 2 Introduction

  •    2.2 DimEmployee Example

  •    2.3 DimEmployeeSalesTerritory Example

  •    2.4 DimReseller Example

  •    2.5 FactResellersSales Example

  •    2.6 ResellerSalesTargets Example

  •    2.7 Color Formats Example

Module 3 - Design a Data Model

  •    3.1 Module 3 Introduction

  •    3.2 Introduction to Data Modeling

  •    3.3 Model Relationships

  •    3.4 Table Configuration

  •    3.5 Model interface

  •    3.6 Quick Measures

  •    3.7 Many-to-many relationships

  •    3.8 Row-level security

Module 4 - Create Model Calculations using DAX

  •    4.1 Module 4 Introduction

  •    4.2 DAX context

  •    4.3 Calculated Tables

  •    4.4 Calculated Columns

  •    4.5 Managing Date Tables

  •    4.6 Measures

  •    4.7 Filter Manipulation

  •    4.8 Time Intelligence

Module 5 - Create Reports

  •    5.1 Module 5 Introduction

  •    5.2 Basic Report Creation

  •    5.3 Example Page 1

  •    5.4 Example Page 2

  •    5.5 Example Page 3

  •    5.6 Report Publishing

  •    5.7 Enhancing Reports

  •    5.8 Drill-Through Pages

  •    5.9 Conditional Formatting

  •    5.10 Buttons and Bookmarks

Module 6 - Create Dashboards

  •    6.1 Module 6 Introduction

  •    6.2 Dashboard Basics

  •    6.3 Real Time Dashboards

  •    6.4 Enhanced Dashboards

Module 7 - Create Paginated Reports

  •    7.1 Module 7 Introduction

  •    7.2 Introduction to Power BI Report Builder

  •    7.3 Report Layouts

  •    7.4 Report Data

  •    7.5 Report Tables

Module 8 - Perform Advanced Analytics

  •    8.1 Module 8 Introduction

  •    8.2 Introduction to Advanced Analytics

  •    8.3 Scatter Chart

  •    8.4 Forecast

  •    8.5 Decomposition Tree

  •    8.6 Key Influencers

Module 9 - Create and Manage Workspaces

  •    9.1 Introduction to Workspaces

  •    9.2 Working with Workspaces and the Portal

Module 10 - Create Power App Visuals

  •    10.1 Module 10 Introduction

  •    10.2 Introduction to Power Apps Visual

  •    10.3 Creating the App

  •    10.4 Basic Power Apps Concepts

  •    10.5 Refreshing the Report

Module 11 - Analysis Services and Power BI

  •    11.1 Module 11 Introduction

  •    11.2 Introduction to Analysis Services

  •    11.3 Connecting with Multidimensional Models

  •    11.4 Premium Workspaces and Analysis Services

  •    11.5 Course Wrap Up

Certified Kubernetes Administrator (CKA) Course Content

Module 1: Course Overview

  •    1.1 Course Overview

  •    1.2 Course PreReqs

Module 2: Kubernetes and Container Fundamentals

  •    2.1 Core Concepts

  •    2.2 What is the CKA Exam

  •    2.3 Why Get Certified

  •    2.4 CKA Exam Domains

  •    2.5 What is Kubernetes

  •    2.6 What is a Container

  •    2.7 What is Docker

  •    2.8 Kubernetes Terminology

  •    2.9 Kubernetes Components

  •    2.10 Kubernetes Documentation

  •    2.11 Whiteboard - Kubernetes Overview

Module 3: Kubernetes Installation

  •    3.1 Kubernetes Installation

  •    3.2 Installation Options

  •    3.3 MiniKube

  •    3.4 Demo - Install Minikube

  •    3.5 Demo - Clusters

  •    3.6 Kubectl Basics

  •    3.7 Demo - Install Kubectl

Module 4: Working with Kubernetes Clusters and Nodes

  •    4.1 Working with Kubernetes Clusters and Nodes

  •    4.2 Understanding the Architecture

  •    4.3 Understanding the nodes

  •    4.4 Core Objects

  •    4.5 API

  •    4.6 Create a Cluster

  •    4.7 Demo - Create a Cluster

  •    4.8 Demo - YAML

  •    4.9 Demo - Nodes

  •    4.10 Demo - Kubectl Client Config

Module 5: API Access and Commands

  •    5.1 API Access and Commands

  •    5.2 About the API

  •    5.3 Accessing the APIs

  •    5.4 Demo - Exploring APIS

  •    5.5 Kubectl

  •    5.6 Using YAML for API Objects

  •    5.7 Using Curl

  •    5.8 Labels and Annotations

Module 6: Running Pods and Deployments

  •    6.1 Running Pods and Deployments

  •    6.2 Pods and Deployments

  •    6.3 What is a Namespace

  •    6.4 Scalability Options

  •    6.5 Rolling Updates

  •    6.6 Apply Changes to a Pod

  •    6.7 Stateful Sets

  •    6.8 Demo - Manage Deployments

Module 7: Configuring Storage

  •    7.1 Configuring Storage

  •    7.2 Storage options with Kubernetes

  •    7.3 Configure Pod Volumes

  •    7.4 Configure Persistent Volumes

  •    7.5 Storage Classes

  •    7.6 Whiteboard - Persistent Volumes

  •    7.7 Demo - Configure Storage

Module 8: Kubernetes Networking

  •    8.1 Kubernetes Networking

  •    8.2 Understanding Networking

  •    8.3 Services

  •    8.4 Network Plugins

  •    8.5 DNS

  •    8.6 Network Policies

  •    8.7 Namespaces

  •    8.8 Demo - Networking

  •    8.9 Manage High Availability

Module 9: Managing Security

  •    9.1 Managing Security

  •    9.2 Kubernetes Security

  •    9.3 Container and Pod Security

  •    9.4 Certificates

  •    9.5 API Security

  •    9.6 Configmaps and Secrets

  •    9.7 Secure Images

  •    9.8 Security Context

  •    9.9 RBAC

Module 10: Managing Kubernetes In the Enterprise

  •    10.1 Managing Kubernetes In the Enterprise

  •    10.2 Cluster Management and Maintenance

  •    10.3 Demo - Scale Deployment

  •    10.4 Demo - Restart Cluster

  •    10.5 Demo - Add or Remove Nodes

  •    10.6 Demo - Create a Pod in the Background

  •    10.7 Kubelet Restarts and Drains

  •    10.8 UI Dashboard

  •    10.9 Demo - Describe Resources

  •    10.10 Kube-scheduler

  •    10.11 Demo - Set-Up Alias

Module 11: Kubernetes Monitoring and Troubleshooting

  •    11.1 Kubernetes Monitoring and Troubleshooting

  •    11.2 Monitoring Resources

  •    11.3 Monitoring Pods

  •    11.4 Demo - Monitoring Pods

  •    11.5 Logging

  •    11.6 Demo - Logging

  •    11.7 Troubleshooting

  •    11.8 Affinity and Taints

Module 12: CKA Practice Exams

  •    12.1 CKA Practice Exams

  •    12.2 Exam Preparation Must Know

  •    12.3 Question 1 - Create a Cluster, Deploy Pods and a Deployment

  •    12.4 Question 2 - Create a Pod and Verify

  •    12.5 Question 3 - Create a Pod with a Secret

  •    12.6 Question 4 - Get Logs on a Pod and Send to File

  •    12.7 Question 5 - Liveness Probe

  •    12.8 Question 6 - Use Labels

  •    12.9 Additional Questions

Module 13: Course Closeout

  •    13.1 Course Closeout

  •    13.2 Course Review

  •    13.3 Kubernetes Certifications

  •    13.4 Additional Resources

  •    13.5 Exam Readiness

  •    13.6 Course Closeout

Certified Kubernetes Application Developer (CKAD) Course Content

Module 1: Course Overview

  •    1.1 Course Overview

  •    1.2 Course PreReqs

Module 2: Kubernetes and Container Fundamentals

  •    2.1 Core Concepts

  •    2.2 What is the CKAD Exam

  •    2.3 Why Get Certified

  •    2.4 CKAD Exam Domains

  •    2.5 APIs

  •    2.6 Demo - Explore APIS

  •    2.7 Pods

  •    2.8 Whiteboard - Pod Creation Workflow

  •    2.9 Create a Pod

  •    2.10 Lifecycle Status

  •    2.11 Inspecting Pods

  •    2.12 Demo - Create a Pod and Inspect

Module 3: Configuration

  •    3.1 Configuration

  •    3.2 Understand Configmaps

  •    3.3 Understand Security Contexts

  •    3.4 Demo - Create a Security Context

  •    3.5 Create and Consume Secrets

  •    3.6 Understand Service Accounts

  •    3.7 Demo - Create a Pod to Use a Secret

  •    3.8 Demo - Define a Service Account

Module 4: Multi Container Pods

  •    4.1 Multi Container Pods

  •    4.2 Multi Container Pods Design and Patterns

  •    4.3 Ambassador Containers

  •    4.4 Connecting to Pods

  •    4.5 Side Cars

  •    4.6 Demo - Create an Init Container

Module 5: Observability

  •    5.1 Observability

  •    5.2 Container Health

  •    5.3 Probes

  •    5.4 Logging

  •    5.5 Monitor Resources and Apps

  •    5.6 Monitoring Pods

  •    5.7 Demo - Monitoring and Logging

Module 6: Pod Design

  •    6.1 Pod Design

  •    6.2 Deployments

  •    6.3 Rolling Updates

  •    6.4 Pod Changes

  •    6.5 Jobs and Crons

  •    6.6 Labels and Annotations

  •    6.7 Demo - Define and Query Labels

  •    6.8 Scalability Options

Module 7: Services and Networking

  •    7.1 Services and Networking

  •    7.2 Understanding Networking, Routing and Services

  •    7.3 Network Policies

  •    7.4 Namespaces

  •    7.5 Demo - Networking

Module 8: State Persistence

  •    8.1 State Persistence

  •    8.2 Storage Options

  •    8.3 Volume Storage

  •    8.4 Configure Pod Volumes

  •    8.5 Configure Persistent Volumes

  •    8.6 Whiteboard - Persistent Volumes

Module 9: CKA Practice Exams

  •    9.1 CKAD Practice Preparation

  •    9.2 Exam Prep Need to Know

  •    9.3 Question 1 - Create a Pod and Inspect

  •    9.4 Question 2 - Define a Pods Readiness

  •    9.5 Question 3 - Create a Pod with a Secret

  •    9.6 Question 4 - View Pods logs in Real Time

  •    9.7 Question 5 - Define and query labels

  •    9.8 Additional Questions

Module 10: Course Closeout

  •    10.1 Course Closeout

  •    10.2 Course Summary Review

  •    10.3 Kubernetes Certifications

  •    10.4 Additional Resources

  •    10.5 Exam Review

  •    10.6 Course Closeout

Cisco 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) (CCNP) Course Content

Module 1: Architecture

  •    1.1 About Your Instructor

  •    1.2 Course Introduction

  •    1.3 Welcome to the Architecture Domain

  •    1.4 Classic 3 and 2 Tier Models

  •    1.5 2 Tier Spine Leaf

  •    1.6 Fabric Capacity Planning

  •    1.7 High Availability

  •    1.8 Designing a WLAN Deployment

  •    1.9 Cloud vs On-Prem

  •    1.10 The Cisco SD-WAN

  •    1.11 Cisco SD-Access

  •    1.12 QoS

  •    1.13 Hardware vs Software Switching

Module 2: Virtualization

  •    2.1 Welcome to the Virtualization Domain

  •    2.2 Device Virtualization Technologies

  •    2.3 Data Path Virtualization

  •    2.4 Network Virtualization Concepts

Module 3: Infrastructure

  •    3.1 Welcome to the Infrastructure Domain

  •    3.2 Trunking - VTP - EtherChannel

  •    3.3 RSTP and MST

  •    3.4 EIGRP vs OSPF

  •    3.4 OSPF

  •    3.5 eBGP

  •    3.6 eBGP Part 2

  •    3.7 WLANs

  •    3.8 NTP NAT PAT

  •    3.9 HSRP VRRP GLBP

  •    3.10 Multicast

Module 4: Network Assurance

  •    4.1 Welcome to the Network Assurance Module

  •    4.2 Diagnose Network Issues

  •    4.3 NetFlow

  •    4.4 SPAN

  •    4.5 IP SLA

  •    4.6 DNA Center

Module 5: Security

  •    5.1 Welcome to the Security Module

  •    5.2 Device Access Control

  •    5.3 ACLs and CoPP

  •    5.4 Wireless Security

  •    5.5 Components in Security Design

Module 6: Automation

  •    6.1 Welcome to the Automation Module

  •    6.2 Python

  •    6.3 JSON

  •    6.4 YANG

  •    6.5 NETCONF-RESTCONF

  •    6.6 APIs

  •    6.7 EEM

  •    6.8 Orchestration Tools

Microsoft SQL Server - Big Data Course Content

Module 1: What are Big Data Clusters?

  •    1.1 Introduction

  •    1.2 Linux, PolyBase, and Active Directory

  •    1.3 Scenarios

Module 2: Big Data Cluster Architecture

  •    2.1 Introduction

  •    2.2 Docker

  •    2.3 Kubernetes

  •    2.4 Hadoop and Spark

  •    2.5 Components

  •    2.6 Endpoints

Module 3: Deployment of Big Data Clusters

  •    3.1 Introduction

  •    3.2 Install Prerequisites

  •    3.3 Deploy Kubernetes

  •    3.4 Deploy BDC

  •    3.5 Monitor and Verify Deployment

Module 4: Loading and Querying Data in Big Data Clusters

  •    4.1 Introduction

  •    4.2 HDFS with Curl

  •    4.3 Loading Data with T-SQL

  •    4.4 Virtualizing Data

  •    4.5 Restoring a Database

Module 5: Working with Spark in Big Data Clusters

  •    5.1 Introduction

  •    5.2 What is Spark

  •    5.3 Submitting Spark Jobs

  •    5.4 Running Spark Jobs via Notebooks

  •    5.5 Transforming CSV

  •    5.6 Spark-SQL

  •    5.7 Spark to SQL ETL

Module 6: Machine Learning on Big Data Clusters

  •    6.1 Introduction

  •    6.2 Machine Learning Services

  •    6.3 Using MLeap

  •    6.4 Using Python

  •    6.5 Using R

Module 7: Create and Consume Big Data Cluster Apps

  •    7.1 Introduction

  •    7.2 Deploying, Running, Consuming, and Monitoring an App

  •    7.3 Python Example - Deploy with azdata and Monitoring

  •    7.4 R Example - Deploy with VS Code and Consume with Postman

  •    7.5 MLeap Example - Create a yaml file

  •    7.6 SSIS Example - Implement scheduled execution of a DB backup

Module 8: Maintenance of Big Data Clusters

  •    8.1 Introduction

  •    8.2 Monitoring

  •    8.3 Managing and Automation

  •    8.4 Course Wrap Up

Microsoft MD-100: Windows 10 Course Content

Module 1: Introduction and Deploy Windows

  •    1.1 Instructor and Course Introduction

  •    1.2 Exam Overview

  •    1.3 Deploy Windows Intro

  •    1.4 Deploy Windows 10

  •    1.5 Deploy Windows 10 Pt 2

  •    1.6 Preparing Virtual Lab Setup for the Client 1

  •    1.7 Installation of Windows 10 Enterprise

  •    1.8 Troubleshooting Failed Installations with Setup Logs

  •    1.9 Configuring Locales

  •    1.10 Perform Post-Installation Configuration

  •    1.11 Navigating Microsoft Edge

  •    1.12 Modifying Microsoft Edge Settings

  •    1.13 Customizing Your Computer Setting

Module 2: Manage Devices and Data

  •    2.1 Manage devices and data intro

  •    2.2 Manage local users, groups, and devices

  •    2.3 Configure data access and protection

  •    2.4 Adding and accessing local users and groups

  •    2.5 Managing NTFS permissions in Windows 10

  •    2.6 Configure devices by using local policies

  •    2.7 Configuring Audit Policies on Windows 10

  •    2.8 Manage Windows security

  •    2.9 How to change user account settings

Module 3: Configure Connectivity

  •    3.1 Configure connectivity intro

  •    3.2 Configure networking

  •    3.3 Configuring network adapter advanced properties

  •    3.4 Configuring a static TCP/IP address

  •    3.5 Viewing the networking connection details

  •    3.6 Setting up a VPN connection

  •    3.7 Configure remote connectivity

  •    3.8 Configure remote management

Module 4: Maintain Windows

  •    4.1 Maintain Windows intro

  •    4.2 Configure system and data recovery

  •    4.3 Backing up files in Windows 10

  •    4.4 Using the recycle bin

  •    4.5 Manage updates

  •    4.6 Check for updates in Windows 10

  •    4.7 Configuring hardware in Windows 10

  •    4.8 Monitor and manage Windows

  •    4.9 Configuring Windows 20 desktop options

  •    4.10 Installing new features

DevOps Fundamentals Course Content

Module 1: Course Overview

  •    Course Overview

  •    Course Pre Reqs

Module 2: The Basics

  •    The Basics

  •    What is DevOps

  •    DevOps Building Blocks

  •    DevOps Best Practices

  •    Why Containers

  •    What is a Pipeline

  •    Continuous Integration and Continous Delivery

  •    Continuous Deployment

  •    Pipelines - Whiteboard

Module 3: Development

  •    Development Basics

  •    CICD Strategy

  •    Source Control Management

  •    Demo - Build Management

Module 4: Infrastructure

  •    Release and Deployments

  •    Release Management

  •    Demo - Release Management

  •    Reliability Engineering

  •    DevOps Tools

  •    Infrastructure as Code

  •    Automation

  •    Demo - (IaaC) CloudFormation

  •    Demo - Jenkins

  •    Demo - GitHub

Module 5: Key Performance Indicators (KPIs)

  •    Key Performance Indicators (KPI)

  •    KPI Metrics

  •    KPI Tools

  •    Monitoring Applications

  •    Demo - AWS CloudWatch

Module 6: Course Closeout

  •    Course Closeout

  •    6.1 Module 6 Introduction

  •    Summary Review

  •    6.2 Course Review

  •    Additional Resources

  •    6.3 Blockchain Roles

  •    DevOps Job Outlook

  •    Course Closeout

Kubernetes - Containerizing Applications in the Cloud Course Content

Module 1: Course Overview

  •    Course Overview

  •    Course PreReqs

Module 2: Basics of Kubernetes

  •    Basics of Kubernetes

  •    What is Kubernetes

  •    Business Value of Kubernetes

  •    What is a Container

  •    What is Docker

  •    Kubernetes History

  •    Kuberntes Terminology

  •    Kubernetes Components

  •    Whiteboard - Kubernetes Overview

Module 3: Kubernetes Design and Architecture

  •    Kubernetes Design and Architecture

  •    Kubernetes Design Fundamentals

  •    Whiteboard - Kubernetes Architecture

  •    Deployment - Nodes, Pods, and Clusters

  •    Etcd

  •    Kubectl

  •    Demo - Install Kubectl

  •    Demo - Kubernetes Commands

  •    Demo - Kubernetes Commands

Module 4: Deployments

  •    Deployments

  •    Options for Deployment

  •    Deploying a Containerized Application

  •    What is Minikube

  •    Demo - Deploy MiniKube

  •    Demo - Deploy Cluster Deployment

  •    Demo - Deploy Services

  •    Demo - Manage Application

Module 5: Course Closeout

  •    Course Closeout

  •    Course Review

  •    Kubernetes Certifications

  •    Additional Resources

  •    Kubernetes Job Outlook

  •    Course Closeout

Google Cloud Platform (GCP) Certification Training Course Content

Module 1: Course Overview

  •    Course Overview

  •    Course PreReqs

Module 2: DevOps Basics

  •    DevOps Fundamentals

  •    What is DevOps

  •    What are Pipelines

  •    Continuous Integration and Delivery

  •    Continuous Deployment

  •    Whiteboard Build Services

  •    Demo - DevOps Services on GCP

Module 3: App Engine PaaS

  •    App Engine

  •    App Engine Basics

  •    App Engine Demo

  •    App Engine Security Scanner Demo

  •    App Engine or Kubenetes Engine

Module 4: Kubenetes Engine Overview

  •    Kubenetes Engine

  •    Kubernetes Basics

  •    What is Kubenetes Engine

  •    Demo - Kubenetes Engine Clusters Demo

  •    Kubenetes Engine Application Demo

  •    Kubenetes Engine Whiteboard

Module 5: DevOps Developer Tools

  •    DevOps Services & Tools

  •    Demo - Cloud SDK

  •    Demo - Cloud Shell

  •    Demo - Cloud Build

  •    Demo - Container Registry

  •    Demo - Cloud Source Repositories

  •    Demo - Private Catalog

  •    Demo - Artifact Registry

Module 6: Microservices

  •    Microservices

  •    Demo - Cloud Watch

  •    Cloud Functions-Cloud Run

  •    Demo - Cloud Functions

  •    Demo - Cloud Run

Module 7: Management of your DevOps Services

  •    Management and Monitoring

  •    Cloud Operations

  •    Demo - Cloud Operations

  •    Service Accounts

  •    Cloud Endpoints and Apigee

  •    Demo - Workflows and Cloud Tasks

  •    Demo - Recommendation Engine

  •    Infrastructure as Code (IaaC)

  •    Deployment Manager

  •    Demo - Deployment Manager

  •    Demo - Cloud Marketplace

Module 8: Resources and Closeout

  •    Resources and Closeout

  •    Course Summary

  •    DevOps Roles and Salary Demand

  •    Additional Resources

  •    Google Cloud Platform Certification

  •    Course Closeout

Microsoft SQL Server 2019 Administration Course Content

Module 1: Installation

  •    SQL Admin Intro

  •    Installation

Module 2: Data Storage

  •    Introduction to Data Storage with SQL Server

  •    Managing Storage for System Databases

  •    Managing Storage for User Databases

  •    Moving Database Files

Module 3: Data Recover

  •    Intro to Data Recovery

  •    Understanding SQL Server Recovery Models

  •    Planning a Backup Strategy

  •    Backing up Databases and Transaction Logs

  •    Using SSMS For Backup

  •    Understanding the Restore Process

  •    How to Restore a Database

  •    Using SSMS For Restore

  •    T-SQL Backup and Restore

  •    Advanced Restore Scenarios

  •    Introduction to Transferring Data

  •    Importing and Exporting Table Data

  •    Copying or Moving a Database

Module 4: Monitoring

  •    Introduction to Monitoring SQL Server

  •    Dynamic Management Views and Functions

  •    Server Reports

  •    System Performance Monitor

  •    Tracing SQL Server Workload Activity

  •    Extended Events

  •    Database Tuning Advisor

Module 5: Security

  •    Introduction to SQL Server Security

  •    Managing Server-Level Security

  •    Managing Database-Level Security

  •    Row Level Security (RLS) Using Policies

  •    Database Security Tools

  •    Contained Database

  •    Auditing Data Access in SQL Server

  •    Implementing Transparent Data Encryption

Module 6: Maintenance

  •    Introduction to Maintenance

  •    Ensuring Database Integrity

  •    Maintaining Indexes

  •    Automating Routine Database Maintenance

  •    Automating SQL Server Management

  •    Monitoring SQL Server Errors

  •    Configuring Database Mai

Certified Information Security Manager (CISM) Course Content

Module 1: Introduction

  •    Instructor Introduction

  •    Course Introduction

  •    Exam Overview

Module 2: Information Security Governance

  •    Module Overview

  •    InfoSec Strategic Context Part 1

  •    InfoSec Strategic Context Part 2

  •    GRC Strategy and Assurance

  •    Roles and Responsibilities

  •    GMA Tasks Knowledge and Metrics

  •    IS Strategy Overview

  •    Strategy Implemenation

  •    Strategy Development Support

  •    Architecture and Controls

  •    Considerations and Action Plan

  •    InfoSec Prog Objectives and Wrap-Up

Module 3: Information Security Risk Management

  •    Module Overview

  •    Risk Identification Task and Knowledge

  •    Risk Management Strategy

  •    Additional Considerations

  •    Risk Analysis and Treatment Tasks & Knowledge

  •    Leveraging Frameworks

  •    Assessment Tools and Analysis

  •    Risk Scenario Development

  •    Additional Risk Factors

  •    Asset Classification and Risk Management

  •    Risk Monitoring and Communication

  •    Information Risk Management Summary

Module 4: InfoSec Prog Development and Management

  •    Module Overview

  •    Alignment and Resource Management - Task and Knowledge

  •    Key Relationships

  •    Standards Awareness and Training - Tasks and Knowledge

  •    Awareness and Training

  •    Building Security into Process and Practices - Tasks and Knowledge

  •    Additional Technology Infrastructure Concerns

  •    Security monitoring and reporting Overview Tasks and Knowledge

  •    Metrics and Monitoring

  •    Summary

Module 5: Information Security Incident Management

  •    Module Overview

  •    Planning and Integration Overview Task and Knowledge

  •    Incident Response Concepts and Process

  •    Forensics and Recovery

  •    Readiness and Assessment - Overview Tasks and Knowledge

  •    Identification and Response Overview Tasks and Knowledge

  •    Incident Processes

Module 6: Exam Prep

  •    Case Study - Security On a Shoestring Budget

  •    Case Study - APT In Action

  •    Summary

  •    Exam Prep

Project Management Professional (PMP) 6th edition PMBOK Course Content

Module 1: Preparing for and Taking the Exam

  •    Preparing to Take the Exam and Instructor Introduction

  •    Getting Certified to take the Examination

  •    Examination Characteristics

  •    Test Taking Tips and Techniques

  •    Question Formats

  •    Post Certification Requirements

Module 2: Process Domain

  •    Process Domain and Framework defined

  •    Predictive, Iterative, Incremental and Adaptive Project Life Cycles

  •    Framework Definitions

  •    Project Manager Skills

  •    Framework Key Points to Remember

  •    Framework Example Questions Review

  •    Project Integration Management Knowledge Area Defined

  •    Knowledge Area Process Mapping and Definitions

  •    Develop Project Charter and Develop Project Management Plan

  •    Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work

  •    Perform Integrated Change Control

  •    Close Project or Phase

  •    Integration Key Points to Remember

  •    Integration Example Questions Review

  •    Project Scope Management Knowledge Area Defined

  •    Plan Scope Management and Collect Requirements

  •    Nominal Group Technique (Delphi-Opinion Technique)

  •    Define Scope and Create WBS

  •    Breakdown Structures used in WBS Dictionary

  •    Validate Scope and Control Scope

  •    Defining Requirements in Agile

  •    Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning

  •    Scope Key Points to Remember

  •    Scope Example Questions Review

  •    Project Schedule Management Knowledge Area Defined

  •    Plan Schedule Management, Define Activities, and Sequence Activities

  •    Dependencies, Predecessors, Leads, and Lags

  •    Estimate Activity Durations

  •    Develop Schedule

  •    Critical Path Method

  •    Schedule Compression

  •    Resource Leveling, Schedule Format, and Control Schedule

  •    Agile Estimating

  •    Agile Schedule Planning and Reporting

  •    Schedule Key Points to Remember and Example Question review

  •    Project Cost Management Knowledge Area Defined

  •    Plan Cost Management and Estimate Cost

  •    Types of Cost, Expected Present Value, Sunk Costs, and Depreciation

  •    Life Cycle Costing, Status Reporting, and Determine Budget

  •    Control Costs, and Earned Value Management

  •    Earned Schedule, and Agile Cost Control

  •    Cost Key Points to Remember

  •    Cost Example Questions Review

  •    Project Quality Management Knowledge Area Defined

  •    Plan Quality Management

  •    Manage Quality

  •    Control Quality

  •    Continuous Improvement in Agile-Adaptive Life Cycles - Kaizen and Process Analysis

  •    Continuous Improvement in Agile-Adaptive Life Cycles - Retrospectives

  •    Quality Key Points to Remember

  •    Quality Example Questions Review

  •    Project Risk Management Knowledge Area Defined

  •    Risk Management Plan and Identify Risks

  •    Risk Register and Issues Vs Risk

  •    Perform Qualitative and Quantitative Risk Analysis

  •    Plan Risk Responses

  •    Implement Risk Responses and Monitor Risks

  •    Agile Risk Tools and Risk Key Points to Remember

  •    Risk Example Questions Review

  •    Project Procurement Management Knowledge Area Defined

  •    Plan Procurement Management and Conduct Procurements

  •    Contracts

  •    Share and Point of Total Assumption

  •    Procurement Documents

  •    Non-Competitive Awards and Control Procurements

  •    Agile Contracts

  •    Procurement Key Points to Remember and Example Questions Review

Module 3: People Domain

  •    People Domain and Project Communications Management Knowledge Area Defined

  •    Plan Communications Management

  •    Manage and Monitor Communications

  •    Agile Communications

  •    Communications Key Points to Remember

  •    Communications Example Question Review

  •    Project Stakeholder Management Knowledge Area Defined

  •    Stakeholder Position Descriptions

  •    Identify Stakeholders

  •    Plan Stakeholder Engagement and Manage Stakeholder Engagement

  •    Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques

  •    Stakeholder Management Key Points to Remember

  •    Stakeholder Management Example Question Review

  •    Resource Management Knowledge Area Defined

  •    Plan Resource Management and Estimate Activity Resources

  •    Acquire Resources and Develop Team

  •    Manage Team

  •    Control Resources and Agile Teaming Concepts

  •    Other Agile Teaming Concepts

  •    Agile Team Roles and Troubleshooting Agile team issues

  •    Resources Key Points to Remember

  •    Resources Example Question Review

Module 4: Business Environment Domain

  •    Business Environment Domain Defined

  •    Project Selection Tools

  •    PMO, Organizational Structure, and Reports

  •    Agile in the Business Environment

  •    Business Environment Key Points to Remember and Example Question Review

  •    Course Closing

AWS Certified Cloud Practitioner Course Content

Module 1: Introduction to Cloud Computing

  •    Welcome

  •    Why Cloud Computing

  •    What is Cloud Computing

  •    Cloud Computing Deployment Models

  •    Cloud Computing Types

  •    AWS Cloud Overview

  •    AWS Management Console Walk-Through

  •    AWS Shared Responsibility

  •    Summary

Module 2: Identity and Access Management IAM

  •    IAM Overview

  •    IAM Users & Groups Hands-On

  •    IAM Policies Hands-On

  •    MFA Overview

  •    MFA Hands-On

  •    AWS CLI

  •    AWS CLI Installation Hands-On

  •    AWS CLI Hands-On

  •    IAM Roles

  •    IAM Roles Hands-On

  •    IAM Security Tools

  •    IAM Security Tools Hands-On

  •    IAM Best Practices

  •    Shared Responsibility Model for IAM

  •    IAM Summary

Module 3: Elastic Cloud Computing EC2

  •    Budget Setup

  •    EC2 Overview

  •    EC2 Instance Hands-On

  •    Security Groups

  •    Security Groups Hands-On

  •    SSH Overview

  •    SSH Using Putty-Windows

  •    SSH Using CMD-Windows

  •    EC2 Instance Connect

  •    EC2 Instance Roles

  •    EC2 Launch Types

  •    Shared Responsibility Model for EC2

  •    EC2 Summary

Module 4: EC2 Storage

  •    Intro to EC2 Instance Storage

  •    EBS Volume Overview

  •    EBS Volume Hands-On

  •    EBS Snapshots

  •    EBS Snapshots Hands-On

  •    AMI Overview

  •    AMI Hands-On

  •    EC2 Instance Store

  •    EC2 Instance Store Hands-On

  •    Elastic File System - EFS

  •    Shared responsibility Model for EC2 Storage

  •    Section Cleanup

  •    EC2 Instance Storage Summary

Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG

  •    Introduction to Scalability & High-Availability

  •    High Availability, Scalability and Elasticity

  •    ELB Overview

  •    ELB Hands-On

  •    ASG Overview

  •    ASG Hands-On

  •    Section Cleanup

  •    Summary

Module 6: Amazon S3

  •    S3 Introduction

  •    S3 Overview

  •    S3 Hands-On

  •    S3 Security

  •    S3 Bucket Policies Hands-On

  •    S3 Websites

  •    S3 Website Hands-On

  •    S3 Versioning

  •    S3 Versioning Hands-On

  •    S3 Access Logs

  •    S3 Access Logs Hands-On

  •    S3 Replication

  •    S3 Replication Hands-On

  •    S3 Storage Classes

  •    Snowball, Snowball Edge and SnowMobile

  •    S3 Summary

Module 7: Database and Analytics

  •    Database Introduction

  •    RDS & Aurora Overview

  •    RDS Database Hands-On

  •    ElastiCache Overview

  •    DynamoDB Overview

  •    DynamoDB Hands-On

  •    RedShift Overview

  •    Amazon EMR Overview

  •    Athena Overview

  •    AWS Glue

  •    DMS Overview

  •    Database & Analytics Summary

Module 8: Other Services

  •    Other Compute Introduction

  •    ECS-Fargate-ECR Overview

  •    What is Serverless

  •    AWS Lambda

  •    AWS Lambda Hands-On

  •    AWS Batch

  •    AWS LightSail

  •    AWS LightSail Hands-On

  •    Other Compute Summary

Module 9: Scaling Your Infrastructure

  •    CloudFormation Overview

  •    Cloud Formation Hands-On

  •    Elastic Beanstalk Overview

  •    Elastic Beanstalk Hands-On

  •    AWS CodeDeploy

  •    AWS SSM

  •    AWS OpsWorks

  •    Infrastructure at Scale Summary

Module 10: Global Applications

  •    Why Global Application

  •    Route 53

  •    Route 53 Hands-On

  •    CloudFront

  •    CloudFront Hands-On

  •    S3 Transfer Acceleration

  •    AWS Global Aceelerator

  •    Global Application Summary

Module 11: Cloud Integration

  •    Cloud Integration Introduction

  •    SQS Service

  •    SQS Service Hands-On

  •    SNS Service

  •    SNS Service Hands-On

  •    Cloud Integration Summary

Module 12: Cloud Monitoring

  •    CloudWatch Metrics and Alarms

  •    CloudWatch Metrics and Alarms Hands-On

  •    CloudWatch Logs

  •    CloudWatch Events and EventBridge

  •    CloudWatch Events and EventBridge Hands-On

  •    CloudTrail

  •    X-Ray

  •    Service Health Dashboard

  •    Personal Health Dashboard

  •    Monitoring Summary

Module 13: Virtual Private Network

  •    Settings the Expectations

  •    VPC and subnets, Internet Gateway and NAT Gateways

  •    VPC and subnets, Internet Gateway and NAT Gateways-Hands-On

  •    NACL and Security Groups

  •    NACL and Security Groups Hands-On

  •    VPC Flow Logs

  •    VPC Peering

  •    VPC Flow Logs and VPC Peering Hands-On

  •    VPC Endpoints

  •    VPC Endpoints Hands-On

  •    Site-to-Site VPNs and Direct Connect

  •    Transit Gateway

  •    VPC Summary

Module 14: Security and Compliance

  •    Introduction to Security and Compliance

  •    DDoS Mitigration

  •    Penetration Testing

  •    KMS and CloudHSM

  •    Secrets Manager

  •    AWS Artifact

  •    GuardDuty

  •    Inspector

  •    AWS Config

  •    AWS Macie

  •    Security and Compliance Summary

Module 15: Machine Learning

  •    Amazon Rekognition

  •    Amazon Transcribe

  •    Amazon Polly

  •    Amazon Translate

  •    Amazon Lex and Connect

  •    Amazon Comprehend

  •    Amazon SageMaker

  •    Machine Learning Summary

Module 16: Advanced Identity

  •    Amazon Cognito

  •    Directory Services

  •    Single Sign-On (SSO)

  •    Advanced Identity Summary

Module 17: Are You Well Architected?

  •    Are You Well Architected

  •    Operational Excellence

  •    Security

  •    Reliability

  •    Performance Efficiency

  •    Cost Optimization

  •    Trusted Advisor

Module 18: Congratulations & Exam Preparation

  •    Exam Tips & Congratulations

Microsoft AZ-900 Microsoft Azure Fundamentals Course Content

Module 1: Introduction

  •    Instructor Introduction

  •    Course Overview

  •    Expectations

Module 2: Cloud Fundamentals

  •    What is the Cloud

  •    Basic Terms

  •    Types of cloud computing

  •    Cloud Service Models

Module 3: Azure’s Architecture

  •    Regions and Availability

  •    Resource Groups and Management

  •    Azure Marketplace

  •    Demo- Azure Console Exploration

Module 4: Compute

  •    Virtual Machines

  •    Containers

  •    Demo - Containers

  •    Functions

  •    Demo - Functions

  •    Windows Virtual Desktop and App Services

Module 5: Networking and CDN

  •    Virtual Networks

  •    Load Balancers

  •    Gateways

  •    Content Delivery Network

  •    Network Security

  •    Demo - Connecting two VMs

Module 6: Storage

  •    Storage

  •    Big Data and Analytics

  •    Databases

  •    Demo - SQL Database

  •    Database Migration

Module 7: Azure Solutions

  •    IoT

  •    Demo - IoT Hub

  •    AI

  •    Serverless Computing

Module 8: Administration

  •    Security

  •    Identity and Access Management

  •    Demo - Adding Users and Groups

  •    Governance

  •    Demo - Resource Locks

  •    Privacy and Compliance

Module 9: Pricing and Service Level Agreements

  •    Managing Costs

  •    Demo - Pricing Calculator

  •    Service Level Agreements and Service Lifecycles

Module 10: Exam Preparation

  •    Exam Layout

  •    Best Practices and Study Tips

  •    Overview and Conclusion

Module 11: Review Questions

  •    Module 11 pt 1

  •    Module 11 pt 2

  •    Module 11 pt 3

  •    Module 11 pt 4

CompTIA Linux+ (XK0-004) Course Content

Module 1: Intro & Performing Basic Linux Tasks

  •    Instructor Introduction

  •    Course Introduction

  •    Identify The Linux Design Philosophy

  •    Enter Shell Commands

  •    Shell Commands Activity

  •    Get Help with Linux

Module 2: Managing Users and Groups

  •    Assume Superuser and Groups

  •    Create, Modify, and Delete Users

  •    Create, Modify, and Delete Groups

  •    Query Users and Groups

  •    Configure Account Profiles

Module 3: Managing Permissions and Ownership

  •    Modify File and Directory Permissions

  •    Modify File and Directory Ownership

  •    Configure Special Permissions and Attributes

  •    Troubleshoot Permissions Issues

Module 4: Managing Storage

  •    Create Partitions

  •    Manage Logical Volumes

  •    Mount File Systems

  •    Manage File Systems

  •    Navigate the Linux Directory Structure

  •    Troubleshoot Storage Issues

Module 5: Managing Files and Directories

  •    Create and Edit Text Files

  •    Search for Files

  •    Perform Operations on Files and Directories

  •    Process Text Files

  •    Manipulate File Output

Module 6: Managing Kernel Modules

  •    Explore the Linux Kernel

  •    Install and Configure Kernel Modules

  •    Monitor Kernel Modules

Module 7: Managing the Linux Boot Process

  •    Configure Linux Boot Components

  •    Configure GRUB

Module 8: Managing System Components

  •    Configure Localization Options

  •    Configure GUIs

  •    Manage Services

  •    Troubleshoot Process Issues

  •    Troubleshoot CPU and Memory Issues

Module 9: Managing Devices

  •    Identify the Types of Linux

  •    Configure Devices

  •    Monitor Devices

  •    Troubleshoot Hardware Issues

Module 10: Managing Networking

  •    Identify TCP/IP Fundamentals

  •    Identify Linux Server Roles

  •    Connect to a Network

  •    Configure DHCP and DNS Client Services

  •    Configure Cloud and Virtualization Technologies

  •    Troubleshoot Networking Issues

Module 11: Managing Packages and Software

  •    Identify Package Managers

  •    Manage RPM Packages with YUM

  •    Manage Debian Packages with APT

  •    Configure Repositories

  •    Acquire Software

  •    Build Software from Source Code

  •    Troubleshoot Software Dependency Issues

Module 12: Securing Linux Systems

  •    Implement Cybersecurity Best Practices

  •    Implement Identity and Access Management Methods

  •    Configure SELinux or AppArmor

  •    Configure Firewalls

  •    Implement Logging Services

  •    Back Up, Restore, and Verify Data

Module 13: Working with Bash Scripts

  •    Customize the Bash Shell Environment

  •    Identify Scripting and Programming Fundamentals

  •    Write and Execute a Simple Bash Script

  •    Incorporate Control Statements in Bash Scripts

Module 14: Automating Tasks

  •    Schedule Jobs

  •    Implement Version Control Using Git

  •    Identify Orchestration Concepts

Module 15: Installing Linux

  •    Prepare for Linux Installation

  •    Perform the Installation

CompTIA CySA+ (Cybersecurity Analyst+) CS0-002 Course Content

Module 1: Threat and Vulnerability Management

  •    Instructor Intro

  •    About the Exam

  •    Test Taking Tips and Techniques

  •    Explain the importance of threat data and intelligence

  •    Given a scenario, utilize threat intelligence to support organizational security

  •    Given a scenario, perform vulnerability management activities Pt 1

  •    Given a scenario, perform vulnerability management activities Pt 2

  •    Given a scenario, analyze the output from common vulnerability assessment tools

  •    Explain the threats and vulnerabilities associated with specialized technology

  •    Explain the threats and vulnerabilities associated with operating in the Cloud

  •    Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1

  •    Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2

Module 2: Software and Systems Security

  •    Given a scenario, apply security solutions for infrastructure management Pt 1

  •    Outline

  •    Given a scenario, apply security solutions for infrastructure management Pt 2

  •    Given a scenario, apply security solutions for infrastructure management Pt 3

  •    Flashcards

  •    Explain software assurance best practices

  •    Scatter

  •    Explain hardware assurance best practices

  •    Learn

  •    Speller

  •    Workbook

Module 3: Security Operations and Monitoring

  •    Given a scenario, analyze data as part of security monitoring activities Pt 1

  •    Given a scenario, analyze data as part of security monitoring activities Pt 2

  •    Given a scenario, analyze data as part of security monitoring activities Pt 3

  •    Given a scenario, implement configuration changes to existing controls to improve security Pt 1

  •    Given a scenario, implement configuration changes to existing controls to improve security Pt 2

  •    Explain the importance of proactive threat hunting

  •    Compare and contrast automation concepts and technologies

Module 4: Incident Response

  •    Explain the importance of the incident response process

  •    Given a scenario, apply the appropriate the incident response procedure

  •    Given an incident, analyze potential indicators of compromise

  •    Given a scenario, utilize basic digital forensic techniques

Module 5: Compliance and Assessment

  •    Understand the importance of data privacy and protection

  •    Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1

  •    Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2

  •    Explain the importance of frameworks, policies, procedures, and controls Pt 1

  •    Explain the importance of frameworks, policies, procedures, and controls Pt 2

Module 6: Afterword

  •    Recap

  •    Review Questions

  •    Before the Exam

OSHA Training Course Content

Module 1: The Basics

  •    The Basics

Module 2: Construction and Facility

  •    Construction and Facility

Module 3: MSDS Sheets

  •    MSDS Sheets

Module 4: OSHA in Healthcare

  •    OSHA in Healthcare

Module 5: Other Risk Areas

  •    Other Risk Areas

HIPAA, Fraud, and Abuse Course Content

Module 1: HIPAA and Privacy

  •    HIPAA and Privacy

  •    Security, Safeguards, and Controls

  •    Examples and Cases

Module 2: Fraud, Waste, and Abuse

  •    Fraud, Waste, and Abuse

  •    Case Examples and Law

Module 3: Compliance and Prevention

  •    Compliance and Prevention

Harassment in the Workplace Course Content

Module 1: Basic Protections

  •    Basic Protections

Module 2: Sexual Harassment

  •    Sexual Harassment

Module 3: Other Harassment

  •    Other Harassment

Module 4: Laws and Cases

  •    Laws

  •    Cases

Module 5: Recognize and Prevention

  •    Recognize and Prevention

CompTIA Cloud Essentials+ (CLO-002) Course Content

Module 1: Understanding Cloud Computing Concepts

  •    Course Intro

  •    Understand Basic Cloud Concepts and Terms Pt 1

  •    Understand Basic Cloud Concepts and Terms Pt 2

  •    Understand Basic Cloud Concepts and Terms Activity

  •    Identify Cloud Network and Cloud Storage Technologies

  •    Identify Cloud Network and Cloud Storage Technologies Activity

  •    Recognize Cloud Design Aspects

  •    Recognize Cloud Design Aspects Activity

Module 2: Applying Cloud Business Principles

  •    Relate Cloud Concepts to Business Principles

  •    Relate Cloud Concepts to Business Principles Activity

  •    Establish Cloud Vendor Relations

  •    Establish Cloud Vendor Relations Activity

  •    Distinguish the Financial Aspects of Engaging a Cloud Service Provider

  •    Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity

  •    Report Financial Expenditures

  •    Report Financial Expenditures Activity

Module 3: Advising a Cloud Design and Migration

  •    Relate Cloud Concepts to Cloud Design and Migration

  •    Relate Cloud Concepts to Cloud Design and Migration Activity

  •    Use Cloud Assessments

  •    Use Cloud Assessments Activity

  •    Manage Cloud Design

  •    Manage Cloud Design Activity

  •    Compare Cloud Migration Approaches

  •    Compare Cloud Migration Approaches Activity

  •    Identity Benefits and Solutions of Cloud Services

  •    Identity Benefits and Solutions of Cloud Services Activity

Module 4: Operating in the Cloud

  •    Relate Cloud Concepts to Technical Operations

  •    Relate Cloud Concepts to Technical Operations Activity

  •    Identify the Technical Aspects of Cloud Operations

  •    Identify the Technical Aspects of Cloud Operations Activity

  •    Understand DevOps in the Cloud

  •    Understand DevOps in the Cloud Activity

  •    Explain Cloud Security Concerns, Measures, and Concepts Part 1

  •    Explain Cloud Security Concerns, Measures, and Concepts Part 2

  •    Explain Cloud Security Concerns, Measures, and Concepts Activity

Module 5: Managing Cloud Governance

  •    Relate Cloud Concepts to Governance

  •    Relate Cloud Concepts to Governance Activity

  •    Apply Risk Management Concepts

  •    Apply Risk Management Concepts Activity

  •    Understand Compliance and the Cloud

  •    Understand Compliance and the Cloud Activity

  •    Manage Policies and Procedures for Cloud Services

  •    Manage Policies and Procedures for Cloud Services Activity

Module 6: Exam Information, Review and Summary

  •    Exam Information

  •    Exam Review Pt 1

  •    Exam Review Pt 2

  •    Exam Review Pt 3

  •    Exam Review Pt 4

Module 7: Activities

  •    Apply Risk Management Concepts Activity

  •    Compare Cloud Migration Approaches Activity

  •    Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity

  •    Establish Cloud Vendor Relations Activity

  •    Explain Cloud Security Concerns, Measures, and Concepts Activity

  •    Identify Cloud Network and Cloud Storage Technologies Activity

  •    Identify the Technical Aspects of Cloud Operations Activity

  •    Identity Benefits and Solutions of Cloud Services Activity

  •    Manage Cloud Design Activity

  •    Manage Policies and Procedures for Cloud Services Activity

  •    Recognize Cloud Design Aspects Activity

  •    Relate Cloud Concepts to Business Principles Activity

  •    Relate Cloud Concepts to Cloud Design and Migration Activity

  •    Relate Cloud Concepts to Governance Activity

  •    Relate Cloud Concepts to Technical Operations Activity

  •    Report Financial Expenditures Activity

  •    Understand Basic Cloud Concepts and Terms Activity

  •    Understand Compliance and the Cloud Activity

  •    Understand DevOps in the Cloud Activity

  •    Use Cloud Assessments Activity

Module 8: Tools and Resources

  •    AWS Tools and Resources

  •    Azure Tools and Resources

  •    GCP Tools and Resources

CompTIA Cloud+ (CVO-002) Course Content

Module 1: Preparing to Deploy Cloud Solutions

  •    Course Introduction

  •    Instructor Intro

  •    Describe Interaction of Cloud Components and Services

  •    Activity Scenario Introduction

  •    Describe Interaction of Cloud Components and Services Activity

  •    Describe Interaction of Non-cloud Components and Services

  •    Describe Interaction of Non-cloud Components and Services Activity

  •    Evaluate Existing Components and Services for Cloud Deployment

  •    Evaluate Existing Components and Services for Cloud Deployment Activity

  •    Evaluate Automation and Orchestration Options

  •    Evaluate Automation and Orchestration Options Activity

  •    Prepare for Cloud Deployment

  •    Prepare for Cloud Deployment Activity

Module 2: Deploying a Pilot Project

  •    Manage Change in a Pilot Project

  •    Manage Change in a Pilot Project Activity

  •    Execute Cloud Deployment Workflow

  •    Execute Cloud Deployment Workflow Activity

  •    Complete Post-Deployment Configuration

  •    Complete Post-Deployment Configuration Activity

Module 3: Testing Pilot Project Deployments

  •    Identify Cloud Service Components for Testing

  •    Identify Cloud Service Components for Testing Activity

  •    Test for High Availability and Accessibility

  •    Test for High Availability and Accessibility Activity

  •    Perform Deployment Load Testing

  •    Perform Deployment Load Testing Activity

  •    Analyze Test Results

  •    Analyze Test Results Activity

Module 4: Designing a Secure and Compliant Cloud Infrastructure

  •    Design Cloud Infrastructure for Security

  •    Design Cloud Infrastructure for Security Activity

  •    Determine Organizational Compliance Needs

  •    Determine Organizational Compliance Needs Activity

Module 5: Designing and Implementing a Secure Cloud Environment

  •    Design Virtual Network for Cloud Deployment

  •    Design Virtual Network for Cloud Deployment Activity

  •    Determine Network Access Requirements

  •    Determine Network Access Requirements Activity

  •    Secure Networks for Cloud Interaction

  •    Secure Networks for Cloud Interaction Activity

  •    Manage Cloud Component Security

  •    Implement Security Technologies

  •    Implement Security Technologies Activity

Module 6: Planning Identity and Access Management for Cloud Deployments

  •    Determine Identity Management and Authentication Technologies

  •    Determine Identity Management and Authentication Technologies Activity

  •    Plan Account Management Policies for the Network and Systems

  •    Plan Account Management Policies for the Network and Systems Activity

  •    Control Access to Cloud Objects

  •    Control Access to Cloud Objects Activity

  •    Provision Accounts

  •    Provision Accounts Activity

Module 7: Determing CPU and Memory Sizing for Cloud Deployments

  •    Determine CPU Size for Cloud Deployment

  •    Determine CPU Size for Cloud Deployment Activity

  •    Determine Memory Size for Cloud Deployment

Module 8: Determing Storage Requirements for Cloud Deployments

  •    Determine Storage Technology Requirements

  •    Determine Storage Technology Requirements Activity

  •    Select Storage Options for Deployment

  •    Select Storage Options for Deployment Activity

  •    Determine Storage Access and Provisioning Requirements

  •    Determine Storage Access and Provisioning Requirements Activity

  •    Determine Storage Security Options

  •    Determine Storage Security Options Activity

Module 9: Analyzing Workload Characteristics to Ensure Successful Migration

  •    Determine the Type of Cloud Deployment to Perform

  •    Determine the Type of Cloud Deployment to Perform Activity

  •    Manage Virtual Machine and Container Migration

  •    Manage Virtual Machine and Container Migration Activity

  •    Manage Network, Storage, and Data Migration

  •    Manage Network, Storage, and Data Migration Activity

Module 10: Maintaining Cloud Systems

  •    Patch Cloud Systems

  •    Patch Cloud Systems Activity

  •    Design and Implement Automation and Orchestration for Maintenance

  •    Design and Implement Automation and Orchestration for Maintenance Activity

Module 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures

  •    Back Up and Restore Cloud Data

  •    Back Up and Restore Cloud Data Activity

  •    Implement Disaster Recovery Plans

  •    Implement Disaster Recovery Plans Activity

  •    Implement Business Continuity Plans

  •    Implement Business Continuity Plans Activity

Module 12: Analyzing Cloud Systems for Performance

  •    Monitor Cloud Systems to Measure Performance

  •    Monitor Cloud Systems to Measure Performance Activity

  •    Optimize Cloud Systems to Meet Performance Criteria

  •    Optimize Cloud Systems to Meet Performance Criteria Activity

Module 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting

  •    Monitor for Anomalies and Resource Needs

  •    Monitor for Anomalies and Resource Needs Activity

  •    Plan for Capacity

  •    Plan for Capacity Activity

  •    Create Reports on Cloud System Metrics

  •    Create Reports on Cloud System Metrics Activity

Module 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues

  •    Troubleshoot Deployment Issues

  •    Troubleshoot Deployment Issues Activity

  •    Troubleshoot Capacity Issues

  •    Troubleshoot Capacity Issues Activity

  •    Troubleshoot Automation and Orchestration Issues

  •    Troubleshoot Automation and Orchestration Issues Activity

Module 15: Troubleshooting Connectivity Issues

  •    Identify Connectivity Issues

  •    Identify Connectivity Issues Activity

  •    Troubleshoot Connectivity Issues

  •    Troubleshoot Connectivity Issues Activity

Module 16: Troubleshooting Security Issues

  •    Troubleshoot Identity and Access Issues

  •    Troubleshoot Identity and Access Issues Activity

  •    Troubleshoot Attacks

  •    Troubleshoot Attacks Activity

  •    Troubleshoot Other Security Issues

  •    Troubleshoot Other Security Issues Activity

Module 17: Exam Information, Review, and Summary

  •    Exam Information

  •    Course Review

Module 18: Activities

  •    Activity Scenario Introduction

  •    Describe Interaction of Cloud Components and Services Activity

  •    Describe Interaction of Non-cloud Components and Services Activity

  •    Evaluate Existing Components and Services for Cloud Deployment Activity

  •    Evaluate Automation and Orchestration Options Activity

  •    Prepare for Cloud Deployment Activity

  •    Manage Change in a Pilot Project Activity

  •    Execute Cloud Deployment Workflow Activity

  •    Complete Post-Deployment Configuration Activity

  •    Identify Cloud Service Components for Testing Activity

  •    Test for High Availability and Accessibility Activity

  •    Perform Deployment Load Testing Activity

  •    Analyze Test Results Activity

  •    Design Cloud Infrastructure for Security Activity

  •    Determine Organizational Compliance Needs Activity

  •    Design Virtual Network for Cloud Deployment Activity

  •    Determine Network Access Requirements Activity

  •    Secure Networks for Cloud Interaction Activity

  •    Implement Security Technologies Activity

  •    Determine Identity Management and Authentication Technologies Activity

  •    Plan Account Management Policies for the Network and Systems Activity

  •    Control Access to Cloud Objects Activity

  •    Provision Accounts Activity

  •    Determine CPU Size for Cloud Deployment Activity

  •    Determine Storage Technology Requirements Activity

  •    Select Storage Options for Deployment Activity

  •    Determine Storage Access and Provisioning Requirements Activity

  •    Determine Storage Security Options Activity

  •    Determine the Type of Cloud Deployment to Perform Activity

  •    Manage Virtual Machine and Container Migration Activity

  •    Manage Network, Storage, and Data Migration Activity

  •    Patch Cloud Systems Activity

  •    Design and Implement Automation and Orchestration for Maintenance Activity

  •    Back Up and Restore Cloud Data Activity

  •    Implement Disaster Recovery Plans Activity

  •    Implement Business Continuity Plans Activity

  •    Monitor Cloud Systems to Measure Performance Activity

  •    Optimize Cloud Systems to Meet Performance Criteria Activity

  •    Monitor for Anomalies and Resource Needs Activity

  •    Plan for Capacity Activity

  •    Create Reports on Cloud System Metrics Activity

  •    Troubleshoot Deployment Issues Activity

  •    Troubleshoot Capacity Issues Activity

  •    Troubleshoot Automation and Orchestration Issues Activity

  •    Identify Connectivity Issues Activity

  •    Troubleshoot Connectivity Issues Activity

  •    Troubleshoot Identity and Access Issues Activity

  •    Troubleshoot Attacks Activity

  •    Troubleshoot Other Security Issues Activity

PMI Risk Management Professional (PMI-RMP) 6th Edition Course Content

Module 1: Risk Management Fundamentals

  •    Instructor Intro

  •    Course Intro

  •    Risk Management Fundamentals Pt 1

  •    Risk Management Fundamentals Pt 2

Module 2: Test Requirements

  •    Test Requirements

Module 3: Test Domains

  •    Test Domains Pt 1

  •    Test Domains Pt 2

Module 4: Risk Strategy and Planning

  •    Risk Strategy and Planning Pt 1

  •    Risk Strategy and Planning Pt 2

Module 5: Stakeholder Engagement

  •    Stakeholder Engagement Pt 1

  •    Stakeholder Engagement Pt 2

  •    Stakeholder Engagement Pt 3

  •    Stakeholder Engagement Pt 4

Module 6: Risk Process Facilitation

  •    Risk Process Facilitation Pt1

  •    Risk Process Facilitation Pt2

  •    Risk Process Facilitation Pt3

Module 7: Risk Monitoring and Reporting

  •    Risk Monitoring and Reporting Pt 1

  •    Risk Monitoring and Reporting Pt 2

  •    Risk Monitoring and Reporting Pt 3

Module 8: Specialized Risk Analyses

  •    Specialized Risk Analyses Pt 1

  •    Specialized Risk Analyses Pt 2

  •    Specialized Risk Analyses Pt 3

Module 9: RMP Recap

  •    RMP Recap

Module 10: RMP Review Questions

  •    RMP Review Questions Pt 1

  •    RMP Review Questions Pt 2

  •    RMP Review Questions Pt 3

  •    RMP Review Questions Pt 4

  •    RMP Review Questions Pt 5

HTML5 and CSS3 Fundamentals Course Content

Module 1: Course Orientation, Internet & Web

  •    Instructor Intro

  •    Course Intro

  •    Internet and the Web

Module 2: HTML Basics

  •    HTML Overview and Your First Webpage

  •    Create a Template

  •    Heading Element

  •    Paragraph Element

  •    Line Break Elemen

  •    Blockquote Element

  •    Phrase Elements

  •    Ordered List and Unordered Lists

  •    Description List

  •    Special Characters

  •    Structural Elements

  •    Anchor Elements

  •    HTML Validation

Module 3: Color & Text, CSS

  •    Overview of Cascading Style Sheets

  •    Using Color on Web Pages

  •    Inline CSS with the Style Attribute

  •    Embedded CSS with the Style Element

  •    Configuring Text with CSS

  •    CSS Class, ID, and Descendant Selectors

  •    Span Element

  •    Using External Style Sheets

  •    Center HTML Elements with CSS

  •    The Cascade

  •    CSS Validation

Module 4: Visual Elements & Graphics

  •    Visual Elements and Graphics

  •    Types of Graphics

  •    Image Element

  •    Image Hyperlinks

  •    HTML5 Visual Elements

  •    HTML5 Visual Elements Continued

  •    Meter and Progress Element

  •    Background Images

  •    More About Images

  •    Sources and Guidelines for Graphics

  •    CSS3 Visual Effects Pt 1

  •    CSS3 Visual Effects Pt 2

Module 5: Web Design

  •    Web Design

Module 6: Page Layout

  •    Page Layout Pt 1

  •    Page Layout Pt 2

  •    Hyperlinks in an Unordered List

  •    Practice with CSS Two-column Layout

  •    Header Text Image Replacement

  •    Practice with an Image Gallery

  •    Positioning with CSS

  •    CSS Debugging Techniques

  •    More HTML5 Structured Elements

Module 7: Links, Layout, & Mobile

  •    Links, Layout, & Mobile

  •    Fragment Identifiers

  •    The Target Attribute

  •    CSS Sprites

  •    Three-column CSS Page Layout Pt 1

  •    Three-column CSS Page Layout Pt 2

  •    Three-column CSS Page Layout Pt 3

  •    Three-column CSS Page Layout Pt 4

  •    Three-column CSS Page Layout Pt 5

  •    Three-column CSS Page Layout Pt 6

  •    CSS Styling for Print

  •    Designing for the Mobile Web

  •    Viewport Meta Tag & CSS Media Queries

  •    Responsive Images

  •    Testing Mobile Display

  •    Flexible Box Layout

  •    CSS Grid Layout

Module 8: Tables

  •    Tables Pt 1

  •    Tables Pt 2

Module 9: Forms

  •    Overview of Forms

  •    Input Element Form Controls Pt 1

  •    Input Element Form Controls Pt 2

  •    HTML5 Form Controls

Module 10: Web Development

  •    Web Development Pt 1

  •    Web Development Pt 2

Module 11: Web Multimedia and Interactvity

  •    Web Multimedia and Interactivity

  •    Getting Started with Audio and Video

  •    HTML5 Audio and Video Elements

  •    CSS3 and Interactivity Pt 1

  •    CSS3 and Interactivity Pt 2

  •    CSS3 Transform Property and Transition Property Pt 1

  •    CSS3 Transform Property and Transition Property Pt 2

  •    CSS3 Transform Property and Transition Property Pt 3

  •    HTML5 Details and Summary Elements

  •    Java, JavaScript, Ajax, and jQuery Programming Languages

  •    HTML5 APIs

Module 12: JavaScript and jQuery

  •    JavaScript and jQuery

  •    Debugging

  •    Document Object Model

  •    Events and Event Handlers

  •    Variables

  •    Programming Concepts

  •    Form Handling

  •    jQuery

  •    jQuery Selectors and jQuery Methods

  •    jQuery Image Gallery Pt 1

  •    jQuery Image Gallery Pt 2

  •    jQuery Plugins Pt 1

  •    jQuery Plugins Pt 2

Module 13: Course Summary

  •    Course Summary

Certified Cloud Security Professional - CCSP Course Content

Cloud Concepts, Architecture and Design

  •    Course Intro

  •    Cloud Concepts, Architecture and Design - Part 1

  •    Cloud Concepts, Architecture and Design - Part 2

  •    Cloud Concepts, Architecture and Design - Part 3

  •    Cloud Concepts, Architecture and Design - Part 4

  •    Cloud Concepts, Architecture and Design - Part 5

  •    Cloud Concepts, Architecture and Design - Part 6

  •    Cloud Concepts, Architecture and Design - Part 7

  •    Cloud Concepts, Architecture and Design - Part 8

  •    Cloud Concepts, Architecture and Design - Part 9

Legal, Risk and Compliance

  •    Legal, Risk and Compliance Part 1

  •    Legal, Risk and Compliance Part 2

  •    Legal, Risk and Compliance Part 3

  •    Legal, Risk and Compliance Part 4

  •    Legal, Risk and Compliance Part 5

  •    Legal, Risk and Compliance Part 6

  •    Legal, Risk and Compliance Part 7

Cloud Data Security

  •    Cloud Data Security - Part 1

  •    Cloud Data Security - Part 2

  •    Cloud Data Security - Part 3

  •    Cloud Data Security - Part 4

  •    Cloud Data Security - Part 5

  •    Cloud Data Security - Part 6

  •    Cloud Data Security - Part 7

Cloud Platform and Infrastructure Security

  •    Cloud Platform and Infrastructure Security - Part 1

  •    Cloud Platform and Infrastructure Security - Part 2

  •    Cloud Platform and Infrastructure Security - Part 3

  •    Cloud Platform and Infrastructure Security - Part 4

  •    Cloud Platform and Infrastructure Security - Part 5

  •    Cloud Platform and Infrastructure Security - Part 6

  •    Cloud Platform and Infrastructure Security - Part 7

  •    Cloud Platform and Infrastructure Security - Part 8

Cloud Application Security

  •    Cloud Application Security - Part 1

  •    Cloud Application Security - Part 2

  •    Cloud Application Security - Part 3

  •    Cloud Application Security - Part 4

  •    Cloud Application Security - Part 5

  •    Cloud Application Security - Part 6

  •    Cloud Application Security - Part 7

  •    Cloud Application Security - Part 8

  •    Cloud Application Security - Part 9

Cloud Security Operations

  •    Cloud Security Operations - Part 1

  •    Cloud Security Operations - Part 2

  •    Cloud Security Operations - Part 3

  •    Cloud Security Operations - Part 4

  •    Cloud Security Operations - Part 5

  •    Cloud Security Operations - Part 6

  •    Cloud Security Operations - Part 7

  •    Cloud Security Operations - Part 8

  •    Cloud Security Operations - Part 9

  •    Cloud Security Operations - Part 10

  •    Cloud Security Operations - Part 11

  •    Course Outro

Cisco 200-301: Cisco Certified Network Associate (CCNA) Course Content

Module 1: Exploring the Functions of Networking

  •    Course Introduction

  •    Instructor Introduction

  •    Exploring the Functions of Networking Pt 1

  •    Exploring the Functions of Networking Pt 2

Module 2: Introducing the Host-To-Host Communications Model

  •    Introducing the Host-To-Host Communications Model Pt 1

  •    Introducing the Host-To-Host Communications Model Pt 2

Module 3: Introducing LANs

  •    Introducing LANs

  •    Get Started with CLI Demo Pt 1

  •    Get Started with CLI Pt Demo 2

  •    Adding Descriptions to Interfaces Demo

  •    Configure Gateway on a Switch Demo

  •    Visualize Interfaces and Statistics Demo

  •    Show Version Command Demo

  •    CDP Demo

Module 4: Exploring the TCP/IP Link Layer

  •    Exploring the TCP-IP Link Layer Pt 1

  •    Exploring the TCP-IP Link Layer Pt 2

Module 5: Subnetting

  •    Subnetting Pt 1

  •    Subnetting Pt 2

  •    Subnetting Pt 3

  •    Subnetting Pt 4

  •    Subnetting Pt 5

  •    Subnetting Pt 6

Module 6: Explaining the TCP/IP Transport Layer and Application Layer

  •    Explaining the TCP-IP Transport Layer and Application Layer Pt 1

  •    Explaining the TCP-IP Transport Layer and Application Layer Pt 2

  •    Explaining the TCP-IP Transport Layer and Application Layer Pt 3

Module 7: Exploring the Functions of Routing

  •    Exploring the Functions of Routing Pt 1

  •    Exploring the Functions of Routing Pt 2

  •    Exploring the Functions of Routing Pt 3

  •    Configuring RIP Demo

  •    EIGRP Demo Pt 1

  •    EIGRP Demo Pt 2

Module 8: Exploring the Packet Delivery Process

  •    Exploring the Packet Delivery Process

Module 9: Troubleshooting a Simple Network

  •    Troubleshooting a Simple Network

Module 10: Introducing Basic IPv6

  •    Introducing Basic IPv6 Pt 1

  •    Introducing Basic IPv6 Pt 2

  •    Introducing Basic IPv6 Pt 3

  •    Introducing Basic IPv6 Pt 4

  •    Introducing Basic IPv6 Pt 5

  •    Introducing Basic IPv6 Pt 6

  •    Introducing Basic IPv6 Pt 7

  •    Introducing Basic IPv6 Pt 8

  •    IPV6 Basic Configuration and SLAAC Demo Pt 1

  •    IPV6 Basic Configuration and SLAAC Demo Pt 2

  •    IPV6 Routing Demo Pt 1

  •    IPV6 Routing Demo Pt 2

  •    IPV6 Static Routes Demo

Module 11: Configuring Static Routing

  •    Configuring Static Routing

  •    Static Routes Demo

Module 12: Implementing VLANs and Trunks

  •    Implementing VLANs and Trunks Pt 1

  •    Implementing VLANs and Trunks Pt 2

  •    Implementing VLANs and Trunks Pt 3

  •    Implementing VLANs and Trunks Pt 4

  •    Spanning-tree Protocol Demo Pt 1

  •    Spanning-tree Protocol Demo Pt 2

  •    Spanning-tree Protocol Demo Pt 3

Module 13: Routing Between VLANs

  •    Routing Between VLANs

  •    Inter VLAN Routing Demo

Module 14: Introducing OSPF

  •    Introducing OSPF Pt 1

  •    Introducing OSPF Pt 2

  •    Introducing OSPF Pt 3

  •    Introducing OSPF Pt 4

  •    OSPF Single Area Demo Pt 1

  •    OSPF Single Area Demo Pt 2

  •    OSPF Multiple Area Demo Pt 1

  •    OSPF Multiple Area Demo Pt 2

Module 15: Building Redundant Switched Topologies

  •    Building Redundant Switched Topologies Pt 1

  •    Building Redundant Switched Topologies Pt 2

Module 16: Improving Redundant Switched Topologies with EtherChannel

  •    Improving Redundant Switched Topologies with Ether Channel Pt 1

  •    Improving Redundant Switched Topologies with Ether Channel Pt 2

  •    Configuring Ether Channel Demo

Module 17: Exploring Layer 3 Redundancy

  •    Exploring Layer 3 Redundancy

Module 18: Introducing WAN Technologies

  •    Introducing WAN Technologies Pt 1

  •    Introducing WAN Technologies Pt 2

  •    Introducing WAN Technologies Pt 3

  •    Introducing WAN Technologies Pt 4

  •    Introducing WAN Technologies Pt 5

  •    Introducing WAN Technologies Pt 6

Module 19: Explaining Basics of ACL

  •    Explaining Basics of ACL Pt 1

  •    Explaining Basics of ACL Pt 2

  •    Explaining Basics of ACL Pt 3

Module 20: Enabling Internet Connectivity

  •    Enabling Internet Connectivity

  •    DHCP Demo

  •    Static NAT Demo

  •    PAT Using Specific IP Demo

  •    PAT Using IP of Interface Demo

Module 21: Introducing QoS

  •    Introducing QoS Pt 1

  •    Introducing QoS Pt 2

  •    Introducing QoS Pt 3

  •    Introducing QoS Pt 4

  •    Introducing QoS Pt 5

Module 22: Introducing Architectures and Virtualization

  •    Introducing Architectures and Virtualization Pt 1

  •    Introducing Architectures and Virtualization Pt 2

  •    Introducing Architectures and Virtualization Pt 3

  •    Introducing Architectures and Virtualization Pt 4

Module 23: Introducing System Monitoring

  •    Introducing System Monitoring Pt 1

  •    Introducing System Monitoring Pt 2

  •    Introducing System Monitoring Pt 3

Module 24: Managing Cisco Devices

  •    Managing Cisco Devices Pt 1

  •    Managing Cisco Devices Pt 2

  •    NTP Demo

  •    Syslog Demo

Module 25: Examining the Security Threat Landscape

  •    Examining the Security Threat Landscape Pt 1

  •    Examining the Security Threat Landscape Pt 2

Module 26: Implementing Threat Defense Technologies

  •    Implementing Threat Defense Technologies Pt 1

  •    Implementing Threat Defense Technologies Pt 2

  •    Implementing Threat Defense Technologies Pt 3

  •    Implementing Threat Defense Technologies Pt 4

  •    Implementing Threat Defense Technologies Pt 5

  •    Authentication Protocols Demo Pt 1

  •    Authentication Protocols Demo Pt 2

  •    Device Hardening Demo Pt 1

  •    Device Hardening Demo Pt 2

  •    Device Hardening Demo Pt 3

  •    Port Security Demo

Module 27: Exam Preparation

  •    Exam Prep Tips

Module 28: Practice Demos

  •    Get Started with CLI Demo Pt 1

  •    Get Started with CLI Pt Demo 2

  •    Adding Descriptions to Interfaces Demo

  •    Configure Gateway on a Switch Demo

  •    Visualize Interfaces and Statistics Demo

  •    Show Version Command Demo

  •    CDP Demo

  •    Static Routes Demo

  •    DHCP Demo

  •    Static NAT Demo

  •    PAT Using Specific IP Demo

  •    PAT Using IP of Interface Demo

  •    Configuring RIP Demo

  •    Configuring Ether Channel Demo

  •    Inter VLAN Routing Demo

  •    Spanning-tree Protocol Demo Pt 1

  •    Spanning-tree Protocol Demo Pt 2

  •    Spanning-tree Protocol Demo Pt 3

  •    EIGRP Demo Pt 1

  •    EIGRP Demo Pt 2

  •    Authentication Protocols Demo Pt 1

  •    Authentication Protocols Demo Pt 2

  •    NTP Demo

  •    Syslog Demo

  •    Device Hardening Demo Pt 1

  •    Device Hardening Demo Pt 2

  •    Device Hardening Demo Pt 3

  •    Port Security Demo

  •    OSPF Single Area Demo Pt 1

  •    OSPF Single Area Demo Pt 2

  •    OSPF Multiple Area Demo Pt 1

  •    OSPF Multiple Area Demo Pt 2

  •    IPV6 Basic Configuration and SLAAC Demo Pt 1

  •    IPV6 Basic Configuration and SLAAC Demo Pt 2

  •    IPV6 Routing Demo Pt 1

  •    IPV6 Routing Demo Pt 2

  •    IPV6 Static Routes Demo

Quickbooks Online Course Content

Module 1: Setup and Maintenance

  •    Module 1 Notes

  •    Course Introduction

  •    Knowing Which Account is Right for You

  •    Getting Started

  •    User Setup

  •    Access Rights

  •    User Setup Completion

  •    Adding Employees to Payroll

  •    Inviting Your Accountant

  •    Dashboard and 3 Ways to Navigate QBO

  •    Commonly Used Forms

  •    Module 1 Summary

Module 2: List Management

  •    Module 2 Notes

  •    Defining Lists

  •    Importing Lists

  •    Employees vs 1099

  •    Adding and Removing Entries

  •    Updating Entries

  •    Editing and Managing List Elements Demo

  •    Merging Items (entries)

  •    Form Requirements

  •    Module 2 Summary

Module 3: Sales (Money-In)

  •    Module 3 Notes

  •    Product and Service Setup

  •    Customer Setup Demo

  •    Invoicing Workflows

  •    Recording Sales

  •    Customer Statements

  •    Tracking Audit History Demo

  •    Sales Reciept Workflow

  •    Undeposited Funds Account

  •    Accounts Receivable Impact

  •    Impact of Connecting Your Bank Account to QBO

  •    Billable Expense Invoicing

  •    Recording a Customer Credit

  •    Delayed Charges

  •    Estimates

  •    Module 3 Summary

Module 4: Purchased (Money-Out)

  •    Module 4 Notes

  •    Product and Service Setup on Purchase Forms

  •    Vendor Setup

  •    Purchase Order Transactions

  •    Entering and Paying Bills

  •    Recording Checks

  •    Recording Credit and Debit Card Transactions

  •    Recording EFTs, Online Payments, and Wire Transfers

  •    Recording Vendor Credits

  •    Voiding vs Deleting Checks

  •    Vendor Page and Report Insights

  •    Module 4 Summary

Module 5: Accounting

  •    Module 5 Notes

  •    Basic financial statements (Balance sheet, income statement, and statement of cash flows)

  •    Financial Statements Expanded

  •    Cash and Accrual Accounting Differences

  •    Difference Between Cash and Accrual Reporting

  •    Setting a Closing Date

  •    Balancing Your Books aka Reconciling Demo

  •    Journal Entries

  •    Audit Log Insights

  •    Project Profitability Demo

  •    Module 5 Summary

Module 6: Reports

  •    Module 6 Notes

  •    Customized Reports

  •    Commonly Used Reports Demo

  •    Setup Automatic Report Emails

  •    Collapse and Expand Report Function

  •    Exporting and Importing Reports

  •    Module 6 Summary

Module 7: Customizations and Time Savers

  •    Module 7 Notes

  •    Tracking Income and Expenses for Multiple Locations

  •    Organizing your Chart of Accounts

  •    Custom Fields on Invoices

  •    Recurring Transactions

  •    Customizing a Sales Form

  •    Keyboard Shortcuts

  •    QBO Mobile App Preview

  •    Connecting Third Party Apps to QBO

  •    Module 7 Summary

Module 8: Extra

  •    Module 8 Notes

  •    Common Mistakes QBO Users Make

  •    Final Note on Bookkeeping Best Practices

  •    Why QBO is Awesome

  •    Course Outro

  •    Defining Terms and Sample Quiz Questions

Social Media Marketing Course Content

Module 1: Social Media Marketing

  •    Course Intro

  •    How to Utilize Social Media

  •    Client Briefs

  •    Target Markets

  •    Personas Pt 1

  •    Personas Pt 2

  •    Personas Pt 3

  •    Competitive Analysis Pt 1

  •    Competitive Analysis Pt 2

  •    Competitive Analysis Pt 3

Module 2: Social Media Marketing

  •    What is the Right Content for You

  •    Images Pt 1

  •    Images Pt 2

  •    Images Pt 3

  •    Images Pt 4

  •    Images Pt 5

  •    Video Pt 1

  •    Video Pt 2

  •    Video Pt 3

  •    Video Pt 4

  •    Live Videos and Engagement Pt 1

  •    Live Videos and Engagement Pt 2

Module 3: Social Media Marketing

  •    What are Analytics and How to Use Them

  •    Free Analytic Tools Available

  •    Paid Services to Consider Pt 1

  •    Paid Services to Consider Pt 2

  •    Finding the Right Hashtags

  •    What is Automation

  •    How to Best Use Automation

  •    Course Outro

Implementing Online Learning Course Content

Module 1: Online Learning

  •    Module 1 Notes

  •    Course Introduction

  •    History of Online Learning

  •    What is Online Learning and Different Types

  •    Introduction to Synchronous and Asynchronous Learning

  •    Introduction to Bringing Your Class Online

  •    Synchronous and Asynchronous Formats

  •    Hybrid and Enhanced Formats

  •    Tips for Any Format Part 1

  •    Tips for Any Format Part 2

  •    Community of Inquiry Learning Model

  •    Popular Learning Management Systems

  •    LMS Discussion Forums

  •    LMS Announcements

  •    LMS Content Management and Uploading

  •    LMS Grading and Feedback

  •    LMS Integration with Outside Applications

  •    Moving to Online Teaching

  •    Segmentation within Online Courses

  •    Time Limitations in Traditional Teaching vs Online

  •    Discussions and Engagement In-person vs Online

  •    Changes and Variances in Online Teaching vs Traditional Teaching

  •    Attendance in Online Courses

  •    Deadlines in Online Courses

  •    Feedback Online

  •    Tips and Best Practices for Online Teaching

Module 2: Online Learning

  •    Module 2 Notes

  •    Creating Structure with Modules

  •    Example of Module Course Structure within Canvas

  •    Types of Resources

  •    Zoom

  •    Flipgrid

  •    Slack

  •    Ziteboard

  •    Screencastify

  •    Microsoft Teams

  •    Google Classroom

  •    Otter

  •    edpuzzle

  •    Best Tips and Practices for Lecturing Online Pt 1

  •    Best Tips and Practices for Lecturing Online Pt 2

  •    Best Tips and Practices for Grading Online Pt 1

  •    Best Tips and Practices for Grading Online Pt 2

  •    Best Tips and Practices for Online Office Hours and Feedback

  •    Best Tips and Practices for Online Testing and Study Guides Pt 1

  •    Best Tips and Practices for Online Testing and Study Guides Pt 2

  •    Course Outro

Adobe Audition Course Content

Module 1: Getting Started

  •    1.1 Instructor Introduction

  •    1.2 Course Introduction

Module 2: Getting to Know Adobe Audition

  •    2.1 Setting Up Your Workspace and Using Shortcuts

Module 3: The Interface

  •    3.1 Setting Up and Adjusting Your Workspace

  •    3.3 Navigating the Media Browser

  •    3.4 Create a Short Cut to Media and Basic Dive into the Editor Panel

Module 4: Waveform Editing

  •    4.1 Opening Audio and Video Files

  •    4.2 Making a Basic Adjustment in the HUD

  •    4.3 Skipping and Deleting Unwanted Portions of Audio

  •    4.4 Quickly Insert Silence into an Audio Track

  •    4.5 Using the Zero Crossing Tool to Remove Pops in Audio

  •    4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards

  •    4.7 Merge Sections of Audio with Mix Paste

  •    4.8 Create a Loop

  •    4.9 Add an Audio Fade

Module 5: Effects

  •    5.1 Working With Effects

  •    5.2 Gain Staging

  •    5.3 Applying the Effect

  •    5.4 Amplitude and Compression

  •    5.5 Delay and Echo Effects

  •    5.6 Filter and EQ Effects

  •    5.7 Modulation Effects

  •    5.8 Reverb Effects

  •    5.9 Special Effects

  •    5.10 Stereo Imagery Effects

  •    5.11 Time and Pitch Effects

  •    5.12 Audio Plugin Manager and Effects Menu vs Effects Rack

  •    5.13 Invert, Reverse, Silence and Generate Effects

  •    5.14 Match Loudness and Additional Effects

  •    5.15 Create Effect Presets and Favorites

Module 6: Audio Restoration

  •    6.1 Hiss Reduction

  •    6.2 Crackle, Pop and Click Reduction

  •    6.3 Broadband Noise Reduction

  •    6.4 Hum Reduction

  •    6.5 Removing Artifacts Manually

  •    6.6 Automated Sound Removal

Module 7: Mastering

  •    7.1 Parametric Equalizer and Equalization

  •    7.2 Multi Band Compressor and Dynamic Processing

  •    7.3 Reverb and Ambience

  •    7.4 Stereo Imaging

  •    7.5 Diagnostic Tools and Metering

Module 8: Sound Design

  •    8.1 Generate Noise and Tones

  •    8.2 Generate Speech Based on Text

  •    8.3 Use a Sound File to Create Various Sound Effects Pt 1

  •    8.4 Use a Sound File to Create Various Sound Effects Pt 2

  •    8.5 Extracting Frequency Bands with the Frequency Band Splitter

Module 9: Creating and Recording Files

  •    9.1 Create a Project and Record Into the Waveform Editor

  •    9.2 Recording Into the MultiTrack Editor

  •    9.3 Check Remaining Free Space for Recording on Hard Drive

  •    9.4 Dragging Files Into Audition Directly From a Computer

  •    9.5 Import Tracks from a CD

Module 10: Multitrack Sessions

  •    10.1 Create a Multitrack session and Template

  •    10.2 Multitrack and Waveform Editor Integration

  •    10.3 Change Track Colors and Tracks Panel

  •    10.4 Track Controls and Creating Busses

  •    10.5 Channel Mapping in the Multitrack Editor

  •    10.6 Multitrack Editor Effects Rack

Module 11: Multitrack Session Editing

  •    11.1 Create a Session, Add Clips and Adjust Timing

  •    11.2 Mix Down Session Into a New Audio Track

  •    11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time

  •    11.4 Clip Editing Techniques and Effects

Module 12: Additional Features and Summary

  •    12.1 Advanced Features to Consider and Conclusion

Adobe CC After Effects Course Content

Module 1: Getting Started

  •    1.1 Course Introduction

  •    1.2 Keyboard Shortcuts

  •    1.3 Keyboard Tips

  •    1.4 Things to Do Before Starting

Module 2: Getting to Know the Workflow

  •    Practice Files 1

  •    Practice Files 2

  •    2.1 General Interface and Starting a Project

  •    2.2 Basic Title Animation Using Keyframes

  •    2.3 Keyframe Interpolation and Keyframe Assistan

  •    2.4 Renaming a Composition

  •    2.5 Soloing a Layer for Individual Edits

  •    2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces

  •    2.7 Render and Export

Module 3: Creating a Basic Animation Using Effects and Presets

  •    Practice Files 3

  •    3.1 Importing Files from Bridge and Creating a New Composition

  •    3.2 Horizontal Type Tool and Guides

  •    3.3 Controls, Effects and Presets for Titles and Logos

Module 4: Animating Text

  •    Practice Files 4

  •    4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels

  •    4.2 Preview and Apply Text Animation Presets and Use Keyframes

  •    4.3 Animate Layers Using Parenting

  •    4.4 Editing and Animating Imported Photoshop Text

  •    4.5 Install Fonts Using Adobe Fonts

Module 5: Working With Shape Layers

  •    Practice Files 5

  •    5.1 Create and Customize a Shape with Shape Tool

  •    5.2 Self Animating Shape with a Wiggle Path (green marker)

  •    5.3 Create and Customize a Shape with Pen Tool

  •    5.4 Snap Layers

  •    5.5 Animating Shape Layers with Path Operations

  •    5.6 Creating Nulls from Paths

Module 6: Animating a Multimedia Presentation

  •    Practice Files 6

  •    6.1 Animate Multiple Layers Using Parenting

  •    6.2 Precomposing Layers

  •    6.3 Keyframing a Motion Path

  •    6.4 Animating a Character to Create Movement

  •    6.5 Animating Precomposed Layers with Effects

Module 7: Animating Photoshop Layers

  •    Practice Files 7

  •    7.1 Animating Change in Light

  •    7.2 Animating Birds Flying with a Track Mat

  •    7.3 Animating Shadows and Using Corner Pin

  •    7.4 Adding a Lens Flare Effect

  •    7.5 Render Composition and Retime

  •    7.6 Use the Graph Editor to Remap Time

Module 8: Working With Masks

  •    Practice Files 8

  •    8.1 Setup a Basic Mask

  •    8.2 Refine and Apply Mask

  •    8.3 Creating a Reflection with a Mask and Blending Modes

  •    8.4 Create a Vignette

Module 9: Distorting Objects with the Puppet Tools

  •    Practice Files 9

  •    9.1 Puppet Position Pen Tool

  •    9.2 Starch Pins

  •    9.3 Manually Animate with Puppet Tool

  •    9.4 Automate Animation Using Puppet Sketch Tool

Module 10: Using the Roto Brush Tool

  •    Practice Files 10

  •    10.1 Extract Foreground Object from Background and Create a Mat

  •    10.2 Touch Up a Mat with the Refine Edge Tool

  •    10.3 Edit or Replace the Separated Background

Module 11: Performing Color Correction

  •    Practice Files 11

  •    11.1 Set up Composition and Use Levels to Start Balancing the Color

  •    11.2 Basic Color Grading with Lumetri Color Effects

  •    11.3 Use Basic Masking, Tracking and Keying to Replace the Background

  •    11.4 Use an Adjustment Layer to Create a Global Color Effect

  •    11.5 Gaussian Blur Effect

Module 12: Creating Motion Graphics Templates

  •    Practice Files 12.1

  •    Practice Files 12.2

  •    Practice Files 12.3

  •    Practice Files 12.4

  •    12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects

  •    12.2 Using Adjustment Layers to Apply a Specific Effect

  •    12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template

  •    12.4 Create Checkboxes to Toggle Visibility of a Background Image

  •    12.5 Protect Portions of a Project from Time Stretching and Export Template

Adobe XD Course Content

Adobe XD: Module 1

  •    Instructor Into

  •    What is XD

  •    UI and UX Design

  •    Prototype Forms and Wireframes

  •    Starting a New Design in XD

  •    Assets and Character Styles

Adobe XD: Module 2

  •    Importing Content

  •    Responsive Resize and Changing Formats

  •    Adding Interactivity

  •    Animating Elements

  •    Sharing and Exporting

Adobe Spark Course Content

Adobe Spark: Module 1

  •    Instructor Intro

  •    Course Intro

  •    Web Based vs Mobile Device

  •    How to Access Spark

  •    Branding in Spark

Adobe Spark: Module 2

  •    Using Spark Post

  •    Uploading Content from Post for Exporting

  •    Using Spark Video

  •    Exporting Finished Videos

  •    Using Spark Page

  •    Putting Spark Pages on the Web

Adobe Premiere Rush Course Content

Adobe Premiere Rush: Module 1

  •    Instructor Intro

  •    Course Intro

  •    How Does Rush Differ

  •    Starting a New Project

  •    Video Resolution and Creating Content

  •    Finding and Importing Content

  •    Timeline Controls

  •    Importing Audio

Adobe Premiere Rush: Module 2

  •    Gernal Editing

  •    Advanced Editing

  •    Color Grading

  •    Adding Titles

  •    Principles of Typography in Video

  •    Fixing Audio

  •    Video and Audio Transitions

  •    Exporting Finished Projects

Adobe Dreamweaver Course Content

Adobe Dreamweaver: Module 1

  •    Instructor Intro

  •    Course Intro

  •    Getting Images Ready for the Web

  •    Setting Up Your Workspace

  •    Creating a New Site

Adobe Dreamweaver: Module 2

  •    Building Your First Web Pages pt.1

  •    Building Your First Web Pages pt.2

  •    Linking Your Web Pages

  •    Adding Colors and Style

  •    Creating a Page Visually in Photoshop

  •    Importing Into Dreamweaver

  •    Export Site to Web

Adobe Stock Course Content

Module 1 - Adobe Stock

  •    Instructor Info

  •    Course Info

  •    Interface and Features

  •    Images

  •    Videos and Licensing

  •    Templaes and Premium

  •    Contributing Content

  •    Best Practices when Contributing

Adobe Portfolio Course Content

Module 1 - Adobe Portfolio Website Editor

  •    Instructor Introduction

  •    Getting Started With Adobe Portfolio

  •    Creating A Website To Showcase Your Work

  •    Importing And Syncing From Adobe Lightroom

  •    Customizing Your Landing Page

Adobe Fonts Course Content

Module 1 - Adobe Fonts

  •    Instructor Intro

  •    Course Intro

  •    Navigating the Interface

  •    Activating and Deactivating Fonts

  •    Font Packs

  •    Type Kit Web Fonts

  •    Course Conclusion

Adobe Behance Course Content

Get Creative With Adobe Behance

  •    Instructor Introduction

  •    Adobe Behance Course Introduction

  •    Adobe Behance - A Creative, Collaborative Application

  •    Using The Profile page

  •    Creating A Project

  •    Exploring The Jobs Section

AWS - Introduction and Deep Dive Course Content

Module 1: Introduction to AWS Basics

  •    1.1 Instructor Intro

  •    1.2 AWS Basic Intro

  •    1.3 What Is AWS

  •    1.4 Advantages of cloud computing

  •    1.5 Types of cloud computing

Module 2: AWS Web Services and Cloud Platform Services

  •    2.1 Console

  •    2.2 CLI

  •    2.3 Compute/EC2

  •    2.4 Database-RDS

  •    2.5 Networking and content delivery

  •    2.6 Analytics

  •    2.7 SQS-SNS

  •    2.8 Workmail

  •    2.9 SES

  •    2.10 Systems manager

  •    2.11 CloudTrail

  •    2.12 Route53

  •    2.13 Elastic Load Balancing (ELB)

  •    2.14 Certificate manager

  •    2.15 Directory service

  •    2.16 Amazon Simple Storage Service (S3)

  •    2.17 Identity and Access Management (IAM)

Module 3: AWS Basic Summary

  •    3.1 AWS Basic Summary

Module 4: Introduction to AWS Deep Dive

  •    4.1 AWS Deep Dive Intro

Module 5: AWS Management of Services and Features Deep Dive

  •    5.1 VPC and Endpoint services pt 1

  •    5.1 VPC and Endpoint services pt 2

  •    5.2 DNS (Route 53)

  •    5.3 Elastic Load Balancing (ELB) & Certificate manager pt 1

  •    5.3 Elastic Load Balancing (ELB) & Certificate manager pt 2

  •    5.4 Compute-EC2 Stand alone and SA with AR pt 1

  •    5.4 Compute-EC2 Stand alone and SA with AR pt 2

  •    5.5 ASG and Suspended ASG processes pt 1

  •    5.5 ASG and Suspended ASG processes pt 2

  •    5.6 Code deploy pt 1

  •    5.6 Code deploy pt 2

  •    5.7 Backups-Recovery of EC2 pt 1

  •    5.7 Backups-Recovery of EC2 pt 2

  •    5.7 Backups-Recovery of EC2 pt 3

  •    5.8 RDS pt 1

  •    5.8 RDS pt 2

  •    5.8 RDS pt 3

  •    5.9 Directory service

  •    5.10 Identity and Access Management (IAM) pt 1

  •    5.10 Identity and Access Management (IAM) pt 2

  •    5.11 Amazon Simple Storage Service (S3)

  •    5.12 SES

  •    5.13 Cloudwatch

  •    5.14 Cloudtrail

Module 6: AWS Deep Dive Summary

  •    6.1 AWS Deep Dive Summary

Adobe InDesign 2021 Course Content

Module 1

  •    1.1 Instructor Bio

  •    1.2 Course Intro

Module 2

  •    2.1 Creating a New Document

  •    2.2 Importing Images and Understanding Links

  •    2.3 Basic Tools and Navigating the Interface

  •    2.4 Properties Panel

  •    2.5 Creating Your Own Graphics within InDesign-

  •    2.6 Working with Layers

Module 3

  •    3.1 Color Theory

  •    3.2 Adding and Altering Fills, Strokes, Colors and Gradients

Module 4

  •    4.1 Pages Panel

  •    4.2 Master Pages

Module 5

  •    5.1 Typography Terms and Definitions

  •    5.2 Creating Text + Character and Paragraph Formatting

  •    5.3 Character and Paragraph Styles

  •    5.4 Wrapping Text Around an Image

  •    5.5 Working with Tables

Module 6

  •    6.1 Saving, Preflight and Packaging Your Document

  •    6.2 Exporting a PDF

Module 7

  •    7.1 Principles of Design

Module 8

  •    8.1 Letterheads

  •    8.2 Business Card

  •    8.3 Brochure

  •    8.4 Multi-Page Binded Document

  •    8.5 Print Booklet

Module 9

  •    9.1 Creating a Template in InDesign

  •    9.2 Using Step and Repeat

  •    9.3 Grouping Objects

  •    9.4 Island Spread & Page Tool-

  •    9.5 Scripts

  •    9.6 Object Styles

  •    9.7 Content Collector & Content Placer

  •    9.8 Gap Tool

  •    9.9 Pathfinder Pallet

Module 10

  •    10.1 Considerations When Working with Interactive Documents

  •    10.2 Web Docs, Hyperlinks, Buttons and Rollovers

  •    10.3 Creating Your Own Path

  •    10.4 Exporting

Module 11

  •    11.1 Outro

Introduction to Adobe Illustrator 2021 Course Content

Module 1: Introduction

  •    1.1 Instructor Intro

  •    1.2 Course Intro

Module 2: Getting Started

  •    2.1 What are Vectors

  •    2.2 Creating a New Document

  •    2.3 Navigating the Interface

Module 3: Drawing

  •    3.1 Drawing and Manipulating Primitive Shapes

  •    3.2 Drawing Custom Shapes Part 1

  •    3.2 Drawing Custom Shapes Part 2

  •    3.2 Drawing Custom Shapes Part 3

  •    3.3 Importing Images

  •    3.4 Understanding Layers and Sublayers

  •    3.5 Additional Drawing and Manipulation Tools

Module 4: Colors and Gradients

  •    4.1 Color Theory

  •    4.2 In-depth dive into Color Palette-

  •    4.3 Creating Color Swatches

  •    4.4 Creating and Manipulating Gradients Part 1

  •    4.4 Creating and Manipulating Gradients part 2

  •    4.4 Creating and Manipulating Gradients Part 3

Module 5: Intermediate Illustration

  •    5.1 Appearance Palette

  •    5.2 Pathfinder Palette

  •    5.3 Drawing with Intent part 1

  •    5.3 Drawing with Intent Part 2

  •    5.4 Blending Modes & FX Part 1

  •    5.4 Blending Modes & FX Part 2

Module 6: Typography

  •    6.1. Introduction to Typography

  •    6.2. Type Tools in Illustrator

  •    6.3 Envelope Warp and Mesh

  •    6.4 Breaking Text into Outlines

Module 7: Live Trace, Paint Brush and Blob Brush

  •    7.1 Live Trace

  •    7.2 Paint and Blob Brush

Module 8: Exporting

  •    8.1 Difference Between File Formats and Exporting

  •    8.2 Course Conclusion

Microsoft Excel 2019 Course Content

Module 1: Beginner

  •    1.0 Intro

  •    1.1 The Ribbon

  •    1.2 Saving Files

  •    1.3 Entering and Formatting Data

  •    1.4 Printing from Excel & Using Page Layout View

  •    1.5 Formulas Explained

  •    1.6 Working with Formulas and Absolute References

  •    1.7 Specifying and Using Named Range

  •    1.8 Correct a Formula Error

  •    1.9 What is a Function

  •    1.10 Insert Function & Formula Builder

  •    1.11 How to Use a Function- AUTOSUM, COUNT, AVERAGE

  •    1.12 Create and Customize Charts

Module 2: Intermediate

  •    2.0 Recap

  •    2.1 Navigating and editing in two or more worksheets

  •    2.2 View options - Split screen, view multiple windows

  •    2.3 Moving or copying worksheets to another workbook

  •    2.4 Create a link between two worksheets and workbooks

  •    2.5 Creating summary worksheets

  •    2.6 Freezing Cells

  •    2.7 Add a hyperlink to another document

  •    2.8 Filters

  •    2.9 Grouping and ungrouping data

  •    2.10 Creating and customizing all different kinds of charts

  •    2.11 Adding graphics and using page layout to create visually appealing pages

  •    2.12 Using Sparkline formatting

  •    2.13 Converting tabular data to an Excel table

  •    2.14 Using Structured References

  •    2.15 Applying Data Validation to cells

  •    2.16 Comments - Add, review, edit

  •    2.17 Locating errors

Module 3: Advanced

  •    3.1 Recap

  •    3.2 Conditional (IF) functions

  •    3.3 Nested condition formulas

  •    3.4 Date and Time functions

  •    3.5 Logical functions

  •    3.6 Informational functions

  •    3.7 VLOOKUP & HLOOKUP

  •    3.8 Custom drop down lists

  •    3.9 Create outline of data

  •    3.10 Convert text to columns

  •    3.11 Protecting the integrity of the data

  •    3.12 What is it, how we use it and how to create a new rule

  •    3.13 Clear conditional formatting & Themes

  •    3.14 What is a Pivot Table and why do we want one

  •    3.15 Create and modify data in a Pivot Table

  •    3.16 Formatting and deleting a Pivot Table

  •    3.17 Create and modify Pivot Charts

  •    3.18 Customize Pivot Charts

  •    3.19 Pivot Charts and Data Analysis

  •    3.20 What is it and what do we use it for

  •    3.21 Scenarios

  •    3.22 Goal Seek

  •    3.23 Running preinstalled Macros

  •    3.24 Recording and assigning a new Macro

  •    3.25 Save a Workbook to be Macro enabled

  •    3.26 Create a simple Macro with Visual Basics for Applications (VBA)

  •    3.27 Outro

Microsoft Word 2019 Course Content

Module 1: Beginner

  •    1.01 Instructor Intro

  •    1.02 Course Intro

  •    1.1 Explaining the Ribbon

  •    1.2 Creating a Document

  •    1.3 Saving Files

  •    1.4 Page Views

  •    1.5 Formatting Text

  •    1.6 Ruler, Margins and Tab Stops

  •    1.7 Moving and Duplicating Text

  •    1.8 Line Spacing and Paragraph Formatting

  •    1.9 Basic Editing

  •    1.10 Insert a Basic Table and Graphics

  •    1.11 Working with Styles

Module 2: Intermediate

  •    2.1 Intermediate Intro

  •    2.2 Collaboration & Co-Authorship

  •    2.3 Tracking and Viewing Changes

  •    2.4 Commenting

  •    2.5 Templates & Layouts

  •    2.6 Layout Functions on the Ribbon

  •    2.7 Customize, Format and Convert Tables and Use as a Page Layout

  •    2.8 Insert and Edit a Cover Page

  •    2.9 Insert and Customize Headers and Footers

  •    2.10 Insert and Customize Endnotes and Footnotes

  •    2.11 Creating Sections in a Long Document

  •    2.12 Using Sections to Format a Document

  •    2.13 Deleting a Section

  •    2.14 Reviewing, Inserting and Updating TOC

  •    2.15 Creating a Data Source and Linking a Mailing List

  •    2.16 Print Settings for Mail Merge

Module 3: Advanced

  •    3.1 Adding the Developer Tab

  •    3.2 Functionality Among Microsoft Office Products

  •    3.3 Using Formulas in Word

  •    3.4 Citing Sources in Word

  •    3.5 Reviewing and Merging Versions of the Same Document

  •    3.6 Creating a Master Document

  •    3.7 Creating Sub Documents and Editing Master and Sub Docs

  •    3.8 Controlling Editable Content

  •    3.9 Form Creation Using the Developer Tab

  •    3.10 Macros

Adobe Premiere Pro Training Course Content

Module 1: Getting Started

  •    1.0 Course Intro

  •    1.1 Touring Adobe PP

  •    1.1 Touring Adobe PP pt.2

  •    1.2 Setting Up a Project

  •    1.3 Importing Media

  •    1.4 Organizing Media

  •    1.5 Mastering the Essentials of Video Editing

  •    1.6 Working with Clips and Markers

  •    1.7 Adding Transitions

  •    1.8 Multicamera Editing

  •    1.9 Advanced Editing Techniques

Module 2: Motion, Sound, and More

  •    2.1 Putting Clips in Motion

  •    2.2 Editing and Mixing Audio

  •    2.3 Sweetening Sound

  •    2.4 Adding Video Effects

  •    2.5 Basic Color Correction

  •    2.6 Compositing Techniques

  •    2.7 Creating Graphics

  •    2.8 Exporting Frames, Clips and Sequences

Introduction to Adobe Photoshop Course Content

Module 1: Getting Started

  •    1.1 Instructor Intro

  •    1.1 Course Intro

  •    1.2 Open Images

  •    1.3 Get Familiar with Work Space

  •    1.4 Zoom and Pan

  •    1.5 Undo and Save Pt 1

  •    1.5 Undo and Save Pt 2

  •    1.6 Resize and Resolution

  •    1.7 Crop and Straighten

  •    1.8 Expand the Canvas

  •    1.9 Basic Image Corrections

Module 2: Layers and More

  •    2.1 Layer Basics

  •    2.2 Resizing Layers

  •    2.3 Adding Text and Images

  •    2.4 Layer Styles

  •    2.5 Photo Merge and Panoramic Images

  •    2.6 Camera Raw

  •    2.7 Camera Raw Continued and Adjustment Layers

  •    2.8 Selection Basics

Module 3: Editing, Techniques and More

  •    3.1 Raw File XMP

  •    3.2 Masks

  •    3.3 Puppet Warp and Alpha Channel

  •    3.4 Typography

  •    3.5 Vector Drawing Techniques

  •    3.6 Advanced Compositing

ICD 10 & 11 Medical Coding and Billing Course Content

Module 1: Anatomy

  •    Module 1 Workbook

  •    1.1 Introduction

  •    1.2 Human Body

  •    1.3 Skin

  •    1.4 Bones, Muscles and Joints

  •    1.5 Heart and Blood Vessels

  •    1.6 Lungs

  •    1.7 Stomach, Intestines and Colon

  •    1.8 Kidney, Bladder, Prostate and More

  •    1.9 Uterus, Ovaries and Female Parts

  •    1.10 Eye

  •    1.11 Glands

  •    1.12 Ear, Nose and Throat

  •    1.13 Blood

  •    1.14 Immune

  •    1.15 Brain and Spinal Cord

Module 2: Diagnosis Coding

  •    Module 2 Workbook

  •    2.1 Overview of ICD

  •    2.2 Outpatient Guidelines

  •    2.3 Infectious and Parasitic

  •    2.4 Neoplasms

  •    2.5 Diseases of the Blood and Blood Organs

  •    2.6 Endocrine, Nutritional and Metabolic Diseases

  •    2.7 Mental and Behaviroal Health

  •    2.8 Pregnancy, Childbirth and the Puerperium

  •    2.9 Conditions Originating in Perinatal Period

  •    2.10 Symptoms, Signs and Abnormal Clinical and Laboratory Findings

  •    2.11 Injury, Poisoning and Certain Other External Causes

  •    2.12 Diseases of the Skin and Subcutaneous Tissue

  •    2.13 External Causes of Morbidity

  •    2.14 Factors Influencing Health

  •    2.15 Circulatory System

  •    2.16 Eye

  •    2.17 Respiratory

  •    2.18 Digestive

Module 3: Procedure Coding

  •    Module 3 Workbook

  •    3.1 Evaluation and Management part 1

  •    3.1 Evaluation and Management part 2

  •    3.1 Evaluation and Management part 3

  •    3.1 Evaluation and Management part 4

  •    3.2 Anesthesia

  •    3.3 Modifiers

  •    3.4 Surgery part 1

  •    3.4 Surgery part 2

  •    3.4 Surgery part 3

  •    3.5 Radiology

  •    3.6 Pathology

  •    3.7 OB/GYN

  •    3.8 Physical Medicine part 1

  •    3.8 Physical Medicine part 2

  •    3.9 HCPCS

  •    3.10 Diving Into Coding part 1

  •    3.10 Diving Into Coding part 2

  •    3.10 Diving Into Coding part 3

  •    3.11 NCCI, MUE and GME

  •    3.12 CAT Codes

Module 4: Billing Guidelines and Practices

  •    Module 4 Workbook

  •    4.1 HIPAA, Compliance and Reimbursement part 1

  •    4.1 HIPAA, Compliance and Reimbursement part 2

  •    4.1 HIPAA, Compliance and Reimbursement part 3

  •    4.1 HIPAA, Compliance and Reimbursement part 4

  •    4.2 The Next Steps

Microsoft AZ-203: Developing Solutions for Microsoft Azure Course Content

Module 1: Implement VM Solutions

  •    Intro

  •    Implement VM Solutions Pt 1

  •    Implement VM Solutions Pt 2

  •    Implement VM Solutions Pt 3

  •    Implement VM Solutions Pt 4

  •    Implement Batch Jobs Using AZ Batch Services

  •    Create Containerized Solutions Pt 1

  •    Create Containerized Solutions Pt 2

Module 2: Develop Azure Platform as a Service

  •    Develop Azure Platform as a Service (PaaS) Pt 1

  •    Develop Azure Platform as a Service (PaaS) Pt 2

  •    Develop Azure Platform as a Service (PaaS) Pt 3

  •    Develop Azure Platform as a Service (PaaS) Demo Pt 1

  •    Develop Azure Platform as a Service (PaaS) Demo Pt 2

  •    Create Azure App Service Mobile Apps

  •    Create Azure App Service API Apps

  •    Implement Azure Functions Pt 1

  •    Implement Azure Functions Pt 2

Module 3: Develop for Azure Storage

  •    Develop for Azure Storage Pt 1

  •    Develop for Azure Storage Pt 2

  •    Develop for Azure Storage Pt 3

  •    Develop Solutions that use Azure Cosmos DB Pt 1

  •    Develop Solutions that use Azure Cosmos DB Pt 2

  •    Develop Solutions that use Relational Database Pt 1

  •    Develop Solutions that use Relational Database Pt 2

  •    Develop Solutions that use Microsoft Blob Storage

Module 4: Implement Azure Security

  •    Implement Azure Security Pt 1

  •    Implement Azure Security Pt 2

  •    Implement Azure Security Pt 3

  •    Implementing Access Control Pt 1

  •    Implementing Access Control Pt 2

  •    Implementing Secure Data Solutions

Module 5: Monitor, Troubleshoot and Optimize Azure Solutions

  •    Monitor, Troubleshoot and Optimize Azure Solutions Pt 1

  •    Monitor, Troubleshoot and Optimize Azure Solutions Pt 2

  •    Develop for Code Scalability

  •    Instrument Solutions to Support Monitoring and Logging

  •    Integrate Caching and Content Delivery Pt 1

  •    Integrate Caching and Content Delivery Pt 2

Module 6: Connect to and Consume Azure and Third Party Services

  •    Connect to and Consume Azure and Third Party Services Pt 1

  •    Connect to and Consume Azure and Third Party Services Pt 2

  •    Working with Azure Search

  •    Azure API Management

  •    Develop Event Based Solutions Pt 1

  •    Develop Event Based Solutions Pt 2

  •    Develop Message Based Solutions Pt 1

  •    Develop Message Based Solutions Pt 2

  •    Outro

Adobe Lightroom Course Content

Module 1: Adobe Lightroom Overview

  •    Instructor Introduction

  •    Preparing To Use Adobe Lightroom

Module 2: Adobe Lightroom Use Case

  •    Non-Destructive Photo Editor

Module 3: Lightroom Library and Organization

  •    Lightroom Library And Organization Part 1

  •    Lightroom Library And Organization Part 2

  •    Lightroom Library And Organization Part 3

  •    Lightroom Library And Organization Part 4

Module 4: Editing Your Photo - Global Adjustments

  •    Edit Your Photo - Global Adjustments Part 1

  •    Edit Your Photo - Global Adjustments Part 2

  •    Edit Your Photo - Global Adjustments Part 3

  •    Edit Your Photo - Global Adjustments Part 4

  •    Edit Your Photo - Global Adjustments Part 5

  •    Edit Your Photo - Global Adjustments Part 6

  •    Edit Your Photo - Global Adjustments Part 7

  •    Edit Your Photo - Global Adjustments Part 8

  •    Edit Your Photo - Global Adjustments Part 9

  •    Edit Your Photo - Global Adjustments Part 10

  •    Edit Your Photo - Global Adjustments Part 11

Module 5: Edit Your Photo - Local Adjustments

  •    Edit Your Photo - Local Adjustments Part 1

  •    Edit Your Photo - Local Adjustments Part 2

  •    Edit Your Photo - Local Adjustments Part 3

  •    Edit Your Photo - Local Adjustments Part 4

  •    Edit Your Photo - Local Adjustments Part 5

  •    Edit Your Photo - Local Adjustments Part 6

Module 6: Saving and Exporting Your Photo In Lightroom Classic

  •    Exploring All Saving And Exporting Options

Module 7: Lightroom CC - A Cloud Based Version

  •    How to Launch And Work Within Lightroom CC

Module 8: Course Closeout

  •    Instructor Course Wrap Up

Digital Photography Introduction Course Content

Module 1: Intro

  •    Intro

Module 2: Camera Anatomy

  •    Camera Anatomy

  •    Camera Anatomy 2

Module 3: Scene Camera Modes

  •    Scene Camera Modules

Module 4: Achieve Exposure

  •    Achieve Exposure

  •    Achieve Exposure 2

Module 5: Filetypes

  •    Filetypes

Module 6: Sensor

  •    Sensor

Module 7: Resolution

  •    Resolution

Module 8: White Balance

  •    White Balance

  •    White Balance 2

Module 9: Color Theory

  •    Color Theory

Module 10: Depth of Field

  •    Depth of Field

Module 11: Focusing

  •    Focusing

Module 12: Lighting

  •    Lighting

  •    Lighting 2

Module 13: Metering

  •    Metering

Module 14: Composition

  •    Composition

VMWare vSphere 6.7 Fundamentals Course Content

Chapter 1: Course Introduction and Methodology

  •    1.1

  •    1.2

  •    1.3

Chapter 2: Virtualization Overview

  •    2.1

  •    2.2

Chapter 3: Planning and Installing ESXi

  •    3.1

  •    3.2

  •    3.3

  •    3.4

  •    3.5

  •    3.6

  •    3.7

Chapter 4: Using tools to Administer a VMware Environment

  •    4.1

  •    4.2

  •    4.3

Chapter 5: vCenter and Licensing

  •    5.1

  •    5.2

  •    5.3

  •    5.4

  •    5.5

  •    5.6

  •    5.7

Chapter 6: Configuring Networking

  •    6.1

  •    6.2

  •    6.3

Chapter 7: Configuring Storage

  •    7.1

  •    7.2

  •    7.3

  •    7.4

  •    7.5

  •    7.6

Chapter 8: VM Creation, Configuration, and Snapshots

  •    8.1

  •    8.2

  •    8.3

  •    8.4

  •    8.5

  •    8.6

  •    8.7

  •    8.8

  •    8.9

Chapter 9: Security and Permissions

  •    9.1a

  •    9.1b

  •    9.1c

  •    9.2

  •    9.3

  •    9.4

Chapter 10: Host and VM Monitoring

  •    10.1

  •    10.2a

  •    10.2b

  •    10.3

  •    10.4

  •    10.5

  •    10.6

Chapter 11: Advanced ESXi and vCenter Server Management

  •    11.1

  •    11.2

  •    11.3

  •    11.4

  •    11.5

  •    11.6

Chapter 12: Patching and Upgrading ESXi

  •    12.1a

  •    12.1b

  •    12.2a

  •    12.2b

Chapter 13: Disaster Recovery and Backup

  •    13.1

  •    13.2

  •    13.3

  •    13.4

Introduction to Python Course Content

Module 1: Getting Started with Python

  •    Module 1 File

  •    Intro to Course and Instructor

  •    Getting Started with Python

Module 2: Working with Primitive Data Types

  •    Module 2 File

  •    Working with Primitive Data Types

  •    Working with Primitive Data Types Part 2

  •    Working with Primitive Data Types Part 3

  •    Working with Primitive Data Types Part4

  •    Working with Primitive Data Types Part4 Answers

Module 3: Working with Multiple Assignments Statements

  •    Module 3 File

  •    Working with Multiple Assignments Statements

Module 4: Convert Types in Python

  •    Module 4 File

  •    Convert Types in Python

Module 5: Creating Lists

  •    Module 5 File

  •    Creating Lists

Module 6: Modifying Lists

  •    Module 6 Notes

  •    Modifying Lists

Module 7: Sorting and Reversing Lists

  •    Module 7 File

  •    Sorting and Reversing Lists

Module 8: Slicing Lists

  •    Module 8 File

  •    Slicing Lists

Module 9: Working With Operators

  •    Module 9 File

  •    Working With Operators

  •    Working With Operators Part2

  •    Working With Operators Part3

Module 10: Determining Operator Precedence

  •    Module 10 File

  •    Determining Operator Precedence

Module 11: Working with IF Statements

  •    Module 11 File

  •    Working with IF Statements

Module 12: Working With For Loops

  •    Module 12 File

  •    Working With For Loops

Module 13: Working With While Loops

  •    Module 13 File

  •    Working With While Loops

Module 14: Nesting for Loops

  •    Module 14 File

  •    Nesting for Loops

Module 15: Reading Files

  •    Module 15 File

  •    Reading Files Part1

  •    Reading Files Part2

Module 16: More on Files

  •    Module 16 File

  •    More on Files

Module 17: Merging Emails

  •    Module 17 File

  •    Merging Emails

Module 18: Reading Console Inputs and Formatting Outputs

  •    Module 18 File

  •    Reading Console Inputs and Formatting Outputs

Module 19: Reading Command Line Argument

  •    Module 19 File

  •    Reading Command Line Argument

Module 20: Defining Functions

  •    Module 20 File

  •    Defining Functions

Module 21: Using Default Argument

  •    Module 21 File

  •    Using Default Argument

Module 22: Using Keyword and Positional Arguments

  •    Module 22 File

  •    Using Keyword and Positional Arguments

Module 23: Handling Exceptions

  •    Module 23 File

  •    Handling Exceptions

Module 24: Using Math and Random Modules

  •    Module 24 File

  •    Using Math and Random Modules

Module 25: Displaying Daytime Working Directory and File Metadata

  •    Module 25 File

  •    Displaying Daytime Working Directory and File Metadata

CompTIA FC0-U61: IT Fundamentals Course Content

Module 1 - IT Concepts and Terminology

  •    Module 1 Notes

  •    0.1 Instructor Intro

  •    1.1 Compare and Contrast Notational Systems

  •    1.1 Compare and Contrast Notational Systems Demo

  •    1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics

  •    1.3 Illustrate the Basics of Computing and Processing

  •    1.4 Explain the Value of Data and Information

  •    1.5 Compare and Contrast Common Units of Measures

  •    1.5 Compare and Contrast Common Units of Measures Demo

  •    1.6 Explain the Troubleshooting Methodology

Module 2 - Infrastructure

  •    Module 2 Notes

  •    2.1 Classify Common Types of Input-Output Device Interfaces

  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC

  •    2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo

  •    2.3 Explain the Purpose of Common Internal Computing Components

  •    2.4 Compare & Contrast Common Internet Service Types-

  •    2.5 Compare & Contrast Storage Types

  •    2.6 Compare & Contrast Common Computing Devices & Their Purposes

  •    2.7 Explain Basic Networking Concepts

  •    2.7 Explain Basic Networking Concepts Demo

  •    2.7 Explain Basic Networking Concepts Part 2

  •    2.7 Explain Basic Networking Concepts Part 3

  •    2.7 Explain Basic Networking Concepts Part 4

  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network

  •    2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo

Module 3 - Applications and Software

  •    Module 3 Notes

  •    3.1 Explain the Purpose of Operating Systems

  •    3.1 Explain the Purpose of Operating Systems Demo

  •    3.2 Compare & Contrast Components of an Operating System

  •    3.2 Compare & Contrast Components of an Operating System Demo

  •    3.3 Explain the Purpose & Proper Use of Software

  •    3.4 Explain Methods of Application Architecture & Delivery Models

  •    3.5 Given a Scenario Configure & Use Web Browsers

  •    3.5 Given a Scenario Configure & Use Web Browsers FireFox

  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome

  •    3.5 Given a Scenario Configure & Use Web Browsers Demo Edge

  •    3.6 Compare & Contrast General Application Concepts & Uses

Module 4 - Software Development

  •    Module 4 Notes

  •    4.1 Compare & Contrast Programming Language Categories-

  •    4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-

  •    4.3 Explain the Purpose & Use of Programming Concepts-

  •    4.3 HTML Demo

Module 5 - Database Fundamentals

  •    Module 5 Notes

  •    5.1 Explain Database Concepts and the Purpose of Databases

  •    5.2 Compare and Contrast Various Database Structures

  •    5.3 Summarize Methods Used to Interface with Databases

  •    5.3 Summarize Methods Used to Interface with Databases Demo

Module 6 - Security

  •    Module 6 Notes

  •    6.1 Summarize Confidentiality, Integrity, and Availability Concerns

  •    6.2 Explain Methods to Secure Devices and Best Practices

  •    6.3 Summarize Behavioral Security Concepts

  •    6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts

  •    6.5 Explain Password Best Practices

  •    6.6 Explain Common Uses of Encryption

  •    6.7 Explain Business Continuity Concepts

  •    6.8 Takeaways-

  •    6.9 ITF Fundamentals Conclusion

Microsoft 98-365 MTA Windows Server 2016 Administration Course Content

Module 1 Introducing Windows Server 2016

  •    Module 1 Notes

  •    1. Windows Server 2016 Fundamentals Intro

  •    2. Mod 1 Introducing Windows Server 2016

  •    3. Mod 1a Introducing Windows Server 2016

Module 2 Managing Windows Server 2016

  •    Module 2 Notes

  •    4. Mod 2 Managing Windows Server 2016

  •    5. Mod 2a Managing Windows Server 2016

Module 3 Managing Storage

  •    Module 3 Notes

  •    6. Mod 3 Managing Storage

  •    7. Mod 3a Managing Storage

Module 4 Monitoring and Troubleshooting Servers

  •    Module 4 Notes

  •    8. Mod 4 Monitoring and Troubleshooting Servers

  •    9. Mod 4a Monitoring and Troubleshooting Servers

Module 5 Essential Services

  •    Module 5 Notes

  •    10. Mod 5 Essential Services

  •    11. Mod 5a Essential Services

Module 6 Understanding File and Print Services

  •    Module 6 Notes

  •    12. Mod 6 Understanding File and Print Services

Module 7 Windows Network Services and Applications

  •    Module 7 Notes

  •    13. Mod 7 Windows Network Services and Applications-

  •    14. Mod 7a Windows Network Services and Applications-

Mod 8 Key Takeaways

  •    Key Takeaway Notes

  •    15. Key takeaways Intro

  •    16. Key takeaways - Module 1 Introducing Windows Server 2016

  •    17. Key takeaways - Module 2 Managing Windows Server 2016

  •    18 Key takeaways - Module 3 Storing Data in Windows Server 2016

  •    19. Key takeaways - Module 4 Monitoring and Troubleshooting Servers

  •    20. Key takeaways - Module 5 Essential Services

  •    21. Key takeaways - Module 6 Understanding File and Print Services

  •    22. Key takeaways - Module 7 Windows Network Services and Applications

Mod 9 Terms to Know

  •    Terms to Know Notes

  •    23. Terms to Know Intro

  •    24. Terms to Know - Module 1 Introducing Windows Server 2016

  •    25. Terms to Know - Module 2 Managing Windows Server 2016

  •    26 Terms to Know - Module 3 Storing Data in Windows Server 2016

  •    27. Terms to Know - Module 4 Monitoring and Troubleshooting Servers

  •    28. Terms to Know - Module 5 Essential Services

  •    29. Terms to Know - Module 6 Understanding File and Print Services

  •    30. Terms to Know - Module 7 Windows Network Services and Applications

Mod 10 Hands on Labs

  •    Hands on Labs Setup Notes

  •    01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup

  •    02 Step by Step Install VMware Player 15 in Windows 10 1

  •    03 Installing and Configuring DC1 Virtual Machine

  •    04 Installing and Configuring SRV-1 Virtual Machine

  •    05 Installing and Configuring Client 1 Virtual Machine

  •    06 Installing and Configuring the Router Virtual Machine

  •    07 Creating and Configuring SRV-2 Virtual Machine

  •    08 Working with Windows Server 2016 Desktop Experience

  •    09 Managing Organizational Units and Groups in AD DS

Microsoft 98-367 MTA Security Fundamentals Course Content

Module 1 Understanding Security Layers

  •    Module 1 Notes

  •    1.0 Security Fundamentals Instructor

  •    1.1 Security Fundamentals Intro

  •    1.2 Understanding Security Layers Part1

  •    1.3 Understanding Security Layers Part2

Module 2 Authentication, Authorization, and Accounting

  •    Module 2 Notes

  •    2.0 Authentication, Authorization & Accounting Part1

  •    2.1 Authentication, Authorization & Accounting Part2

  •    2.2 Authentication, Authorization & Accounting Demo

Module 3 Understanding Security Policies

  •    Module 3 Notes

  •    3.0 Understanding Security Policies

Module 4 Understanding Network Security

  •    Module 4 Notes

  •    4.0 Understanding Network Security Part1

  •    4.1 Understanding Network Security Part2

Module 5 Locking Down Server and Client

  •    Module 5 Notes

  •    5.0 Locking Down the Server and Client

  •    5.1 Locking Down the Server and Client Part2

Module 6 Key Takeaways

  •    Key Takeaway Notes

  •    6.0 Key Take Aways Intro

  •    6.1 Understanding Security Layers

  •    6.2 Authentication Authorization and Accounting

  •    6.3 Understanding Security Policies

  •    6.4 Understanding Network Security

  •    6.5 Security Fundamentals Part 2

Module 7 Terms to Know

  •    Terms to Know Notes

  •    7.0 Terms to Know Intro

  •    7.1 Understanding Security Layers Terms

  •    7.2 Authentication Authorization and Accounting Terms

  •    7.3 Understanding Security Policies Terms

  •    7.4 Understanding Network Security Terms

  •    7.5 Locking Down Server and Client Terms

Microsoft 98-366 MTA Networking Fundamentals Course Content

Module 1 Understanding Local Area Networking

  •    Module 1 Notes

  •    1.0 Intro to Networking Fundamentals

  •    1.1 Exam Overview

  •    1.1 Examining Local Network Devices and Data Transfers 1a

  •    1.1 Examining Local Network Devices and Data Transfers 1b

  •    1.1 Examining Local Network Devices and Data Transfers 1c

  •    1.1 Examining Local Network Devices and Data Transfers 1d

  •    1.1 Examining Local Network Devices and Data Transfers 1e

  •    1.1 Examining Local Network Devices and Data Transfers 1f

  •    1.2 Examining Local Network Devices and Data Transfers Part 2a

  •    1.2 Examining Local Network Devices and Data Transfers Part 2b

Module 2 Defining Networks with the OSI Model

  •    Module 2 Notes

  •    2.1 Defining Networks with OSI Model Part 1a

  •    2.2 Defining Networks with OSI Model Part 1b

  •    2.3 Defining Networks with OSI Model Part 1c

  •    2.4 Defining Networks with OSI Model Part 1d

  •    2.5 Defining Networks with OSI Model Part 1e

  •    2.6 Defining Networks with OSI Model Part 1f

  •    2.7 Defining Networks with OSI Model Part 1g

  •    2.8 Defining Networks with OSI Model Part 1h

Module 3 Understanding Wired and Wireless Networks

  •    Module 3 Notes

  •    3.1 Understand Wired and Wireless Networks Part1

  •    3.2 Understand Wired and Wireless Networks Part2

Module 4 Understanding Internet Protocol

  •    Module 4 Notes

  •    4.1 Understanding Internet Protocol Part1

  •    4.2 Understanding Internet Protocol Part2

Module 5 Implementing TCP-IP in the command line

  •    Module 5 Notes

  •    5.1 Implementing TCPIP in the Command Line

Module 6 Working with Networking Services

  •    Module 6 Notes

  •    6.1 Working with Networking Services

Module 7 Understanding Wide Area Networks

  •    Module 7 Notes

  •    7.1 Understanding Wide Area Network Part1

  •    7.2 Understanding Wide Area Network Part2

Module 8 Defining Network Infrastructure and Security

  •    Module 8 Notes

  •    8.1 Defining Network Infrastructure & Network Security Part1

  •    8.2 Defining Network Infrastructure & Network Security Part2

Module 9 Key Takeaways

  •    Key Takeaway Notes

  •    1. Key Take Aways of Networking Fundamentals

  •    2. Key Take Aways Mod1

  •    3. Key Take Aways Mod2

  •    4. Key Take Aways Mod3

  •    5. Key Take Aways Mod4

  •    6. Key Take Aways Mod5

  •    7. Key Take Aways Mod6

  •    8. Key Take Aways Mod7

Module 10 Terms to Know

  •    Terms to Know Notes

  •    1. Terms to Know Networking Fundamentals

  •    2. Terms to Know Mod1

  •    3. Terms to Know Mod2

  •    4. Terms to Know Mod3

  •    5. Terms to Know Mod4

  •    6. Terms to Know Mod5

  •    7. Terms to Know Mod6

  •    8. Terms to Know Mod7

  •    9. Terms to Know Mod8

CompTIA A+ 220-1002 (Core 2) Course Content

Module 1 - Operating Systems

  •    Module 1 Workbook

  •    0.1 Intro to A+ Core2 Instructor

  •    1.0 Intro to A+ Core2

  •    1.1 Operating Systems Part1

  •    1.1 Operating Systems Part2

  •    1.2 Compare and Contrast features of Microsoft Windows Versions

  •    1.3 Summarize General OS Installation Considerations Upgrade Methods

  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part2

  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Part3

  •    1.3 Summarize General OS Installation Considerations Upgrade Methods Demo

  •    1.4 Scenario use appropriate Microsoft Command Line Tools Part1

  •    1.4 Scenario use appropriate Microsoft Command Line Tools Part2

  •    1.4 Scenario use appropriate Microsoft Command Line Tools Demo

  •    1.5 Microsoft Operating System and Tools Part1

  •    1.5 Microsoft Operating System and Tools Part1 Demo

  •    1.5 Microsoft Operating System and Tools Part2

  •    1.5 Microsoft Operating System and Tools Part2 Demo

  •    1.5 Microsoft Operating System and Tools Part3

  •    1.5 Microsoft Operating System and Tools Part3 Demo

  •    1.5 Microsoft Operating System and Tools Part4

  •    1.5 Microsoft Operating System and Tools Part4 Demo

  •    1.6 Microsoft Windows Control Panel Utilities

  •    1.6 Microsoft Windows Control Panel Utilities Demo

  •    1.7 Summerize Application Installation and Configuration Concepts

  •    1.8 Configure Windows Networking on a Client Desktop

  •    1.8 Configure Windows Networking on a Client Desktop Demo

  •    1.9 Features and Tools of MAC OS and Linux Client Desktop

Module 2 - Security

  •    Module 2 Workbook

  •    2.1 Security - Physical Security Measures

  •    2.2 Explain Logical Security Concepts

  •    2.2 Explain Logical Security Concepts Part2

  •    2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods

  •    2.4 Detect, Remove, and Prevent Malware using Appropriate Tools

  •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1

  •    2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2

  •    2.6 Compare Contrast the different Microsoft Windows Security Settings

  •    2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo

  •    2.7 Implement Security Best Practices to Secure a Workstation

  •    2.7 Implement Security Best Practices to Secure a Workstation Part2

  •    2.8 Implement Methods for Securing Mobile Devices

  •    2.9 Implement Appropriate Data Destruction & Disposal Methods

  •    2.10 Configure Security on SOHO Wireless and Wired Networks

  •    2.10 Configure Security on SOHO Wireless and Wired Networks Demo

Module 3 - Software Troubleshooting

  •    Module 3 Workbook

  •    3.1 Software Troubleshooting Part1

  •    3.1 Software Troubleshooting Part2

  •    3.1 Software Troubleshooting Demo

  •    3.2 Troubleshoot and Resolve PC Security Issues

  •    3.2 Troubleshoot and Resolve PC Security Issues Part2

  •    3.2 Troubleshoot and Resolve PC Security Issues Demo

  •    3.3 Best Practice Procedures for Malware Removal

  •    3.4 Troubleshoot Mobile OS and Application

  •    3.5 Troubleshoot Mobile OS and Application Security Issue

Module 4 - Operational Procedures

  •    Module 4 Workbook

  •    4.1 Operational Procedures

  •    4.2 Implement Basic Change Management Best Practices

  •    4.3 Implement Basic Disaster Prevention and Recovery Methods

  •    4.4 Explain Common Safety Procedures

  •    4.5 Explain Environmental Impacts and Appropriate Controls

  •    4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts

  •    4.7 Using Proper Communication Techniques and Professionalism

  •    4.8 Identify the Basic of Scripting

  •    4.8 Identify the Basic of Scripting Demo

  •    4.9 Use Remote Access Technologies

CompTIA A+ 220-1001 (Core 1) Course Content

Module 1 - Mobile Devices

  •    Module 1 Workbook

  •    0.1 Intro to A+ Core1 Instructor

  •    1.0 CompTIA A+ Course Intro

  •    1.1 Mobile Devices Part 1

  •    1.1 Mobile Devices Part 2

  •    1.1 Mobile Devices Part 3

  •    1.2 Installing Components in Laptop

  •    1.3 Laptop Features Part 1

  •    1.3 Laptop Features Part 2

  •    1.4 Compare and Contrast Types of Mobile Devices

  •    1.5 Accessories and Ports of Other Mobile Devices Part 1

  •    1.5 Accessories and Ports of Other Mobile Devices Part 2

  •    1.6 Configure Basic Device Network Connectivity and Application Support Part 1

  •    1.6 Configure Basic Device Network Connectivity and Application Support Part 2

  •    1.7 Use Methods to Perform Mobile Device Synchronization

  •    1.8 Laptop Disassemble and Assemble

Module 2 - Networking

  •    Module 2 Workbook

  •    2.1 Networking Part 1

  •    2.1 Networking Part 2

  •    2.2 Compare and Contrast Common Networking Hardware Devices Part 1

  •    2.2 Compare and Contrast Common Networking Hardware Devices Part 2

  •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1

  •    2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2

  •    2.3 Setting Up a Wireless Router

  •    2.4 Compare and Contrast Wireless Networking Protocols

  •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1

  •    2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2

  •    2.6 Explain Common Network Configuration Concepts Part 1

  •    2.6 Explain Common Network Configuration Concepts Part 2

  •    2.7 Compare and Contrast Internet Connection Types Network Types and Features

  •    2.8 Given a Scenario Using Appropriate Networking Tools

Module 3 - Hardware

  •    Module 3 Workbook

  •    3.1 Hardware Part 1

  •    3.1 Hardware Part 2

  •    3.1 Hardware Part 3

  •    3.2 Identify Common Connector Types

  •    3.3 Scenario Install RAM Types

  •    3.4 Scenario Select Install and Configure Storage Devices

  •    3.4 Scenario Select Install and Configure Storage Devices Part 2

  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1

  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2

  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3

  •    3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4

  •    3.5 Install Disassemble and Assemble a Desktop

  •    3.6 Purposes for Peripherals and Types

  •    3.7 Summarize Power Supplies

  •    3.8 Scenario Select and Configure Appropriate Components for Customers PCs

  •    3.9 Scenario Installand Configure Common Devices

  •    3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings

  •    3.11 Scenario Install and Maintain Various Print Technologies Part 1

  •    3.11 Scenario Install and Maintain Various Print Technologies Part 2

  •    3.11 Scenario Install and Maintain Various Print Technologies Part 3

Module 4 - Virtualization and Cloud Computing

  •    Module 4 Workbook

  •    4.1 Virtualization Part 1

  •    4.1 Virtualization Part 2

  •    4.2 Scenario Setup and Configure Client-side Virtualization

Module 5 - Hardware and Network Troubleshooting

  •    Module 5 Workbook

  •    5.1 Hardware and Networking Troubleshooting

  •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1

  •    5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2

  •    5.3 Troubleshoot Hard Drives and RAID Arrays

  •    5.4 Troubleshoot Video and Display Issues

  •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1

  •    5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2

  •    5.6 Troubleshoot Printers

  •    5.7 Troubleshoot Common Wired and Wireless Network Problems

AGILE/XP Course Content

Module 1 : Agile Principles and Mindset

  •    Agile Introduction XP

  •    Agile Core Principles XP

  •    Lean Product Development XP

  •    Agile Leadership Tasks XP

  •    Agile Communications XP

Module 2 : Value Driven Delivery

  •    Value Driven Delivery XP

  •    Value Driven Delivery XP Part2

Module 3 : Stakeholder Engagement

  •    Stakeholder Engagement XP

  •    Facilitation Tools XP

Module 4 : Team Performance

  •    Team Performance XP

  •    Digital Tools for Distibuted Teams XP

Module 5 : Adaptive Planning

  •    Adaptive Planning XP

  •    Adaptive Planning Part2 XP

Module 6 : Problem Detection and Resolution

  •    Problem Detection and Resolution XP

Module 7 : Continuous Improvement

  •    Continuous Improvement XP

AGILE/Scrum Course Content

Module 1 : Agile Principles and Mindset

  •    Agile Introduction Scrum

  •    Agile Core Principles Scrum

  •    Lean Product Development Scrum

  •    Agile Leadership Tasks Scrum

  •    Agile Communications Scrum

Module 2 : Value Driven Delivery

  •    Value Driven Delivery Scrum

  •    Value Driven Delivery Scrum Part2

Module 3 : Stakeholder Engagement

  •    Stakeholder Engagement Scrum

  •    Facilitation Tools Scrum

Module 4 : Team Performance

  •    Team Performance Scrum

  •    Digital Tools for Distibuted Teams Scrum

Module 5 : Adaptive Planning

  •    Adaptive Planning Scrum

  •    Adaptive Planning Scrum Part2

Module 6 : Problem Detection and Resolution

  •    Problem Detection and Resolution Scrum

Module 7 : Continuous Improvement

  •    Continuous Improvement Scrum

Microsoft 70-698: Installing and Configuring Windows 10 Course Content

Module 1 : Prepare for installation requirements

  •    Module 1 Workbook

  •    Prep for Installation Windows 10

  •    Clean Install or Upgrade Windows 10

  •    Editions of Windows 10

  •    What Features Do You Want

  •    Installation Media

  •    Looking at MS Application Compatibility Toolkit (ACT)

Module 2 : Install Windows

  •    Module 2 Workbook

  •    Installing Windows

  •    Clean installation of Windows 10-Demo

  •    Upgrade using Installation Media

  •    Configure Native Boot and VHD

  •    Migrating to Windows 10

  •    Chp2 Booting from VHD

  •    Creating a VHD-Demo

  •    Installing Windows 10 to a VHD-Demo

  •    Installing on Bootable USB

  •    Using USMT User State Migration Tool-Demo

  •    Additional Windows Features

  •    Create an MBR-Partitioned VHD-Demo

  •    Additional Regional and Language Support

  •    Putting Win 10 on a VHD with DISM-Demo

Module 3 : Configure devices and device drivers

  •    Module 3 Workbook

  •    Configure Devices and Device Drivers

  •    Resolve Driver Issues

  •    Configuring Driver Settings

  •    Manage Driver Packages

  •    Download and Import Driver Packages

  •    Using DISM

  •    Installing o Updating Drivers using Device Manager-Demo

  •    Roll Back Drivers-Demo

  •    Using Sigverif-Demo

  •    More on Device Manager-Demo

Module 4 : Perform post-installation configuration

  •    Module 4 Workbook

  •    Perform Post Installation Configuration

  •    Configure Accessibilty Options

  •    Configure Cortana

  •    Configure Microsoft Edge

  •    Configure Internet Explorer

  •    Configure Client Hyper-V

  •    Configure Power Settings

  •    Customizing the Start Menu-Demo

  •    Start Tiles-Demo

  •    Desktop Customization-Demo

  •    Action Center and Notifications-Demo

  •    Hyper V-Demo

  •    Power Settings-Demo

Module 5 : Implement Windows in an enterprise environment

  •    Module 5 Workbook

  •    Implement Windows in an Enterprise Enviornment

  •    Implementing Active Directory

  •    Implement Volume Activation Using a Key Mgmt Service

  •    Query and Configure Activation State using Command line

  •    Configure Active Directory Including Group Policies

  •    Configure and Optimize User Account Control UAC

  •    Using Software Licensing Manager; slmgr.vbs -dli-Demo

  •    Taking a look at UAC-Demo

Module 6 : Configure networking

  •    Module 6 Workbook

  •    Configuring Networking

  •    Configuring Name Resolution

  •    Connect to a Network

  •    Configure Network Locations

  •    Configure Windows Firewall

  •    Configure Windows Firewall with Advance Security

  •    Configure Network Discovery

  •    Configuring Wi-Fi Settings

  •    Troubleshoot Network Issues

  •    Configure VPNs

  •    Configure IPsec

  •    Configure DirectAccess

  •    Configure IP Addresses Manually-Demo

  •    DNS Settings-Demo

  •    Looking at Network Locations and where to make Chpanges-Demo

  •    Windows Firewall – Basic Settings-Demo

  •    Windows Firewall – Advanced Settings-Demo

  •    Troubleshooting Tools-Demo

  •    Create a VPN Connection-Demo

Module 7 : Configure storage

  •    Configure Storage

  •    Create and Configure VHD

  •    Configure Removable Devices

  •    Create and Configure Storage Spaces

  •    Troubleshoot Storage and Removable Device Issue

  •    Steps to create a simple volume-Demo

  •    Create VHD with Hyper-V Manager-Demo

  •    Create VHD with PowerShell-Demo

  •    Bitlocker to Go-Demo

Module 8 : Configure data access and usage

  •    Module 8 Workbook

  •    Configure Data Access and Usage File-Printer

  •    Configure File System Permissions

  •    Configure File Share Public Folders and OneDrive

  •    Configure OneDrive usage including Files On Demand

  •    Troubleshoot Data Access and Usage

  •    File Sharing-Demo

  •    Printer Sharing-Demo

  •    Set Printer Security-Demo

  •    File system permissions-Demo

  •    Public Folder Sharing-Demo

  •    OneDrive-Demo

  •    Storage Sense-Demo

  •    Disk Quotas-Demo

Module 9 : Implement Apps

  •    Module 9 Workbook

  •    Implement Apps

  •    Configure Startup Options

  •    Configure Windows Features

  •    Configure Windows Stores

  •    Implementing Windows Store Apps

  •    Implement Windows Store for Business and Education

  •    Provison Packages

  •    Create Packages

  •    Chpange Default Apps-Demo

  •    Application Startup Options-Demo

  •    Looking at Windows Features-Demo

  •    Windows Store-Demo

  •    Windows Imaging and Configuration Designer Tool ICD-Demo

Module 10 : Configure remote management

  •    Module 10 Workbook

  •    Configuring Remote Management

  •    Configure Remote Management Settings

  •    Configure Remote Desktop

  •    Configure Remote Assistance

  •    Modifying Using MMC or PS

  •    Configure Remote PowerShell

  •    Remote Management Settings-Demo

  •    Allow through Windows Firewall-Demo

  •    Remote Desktop-Demo

  •    Remote Assistance-Demo

  •    Remote with MMC-Demo

  •    Windows PowerShell Remoting-Demo

Module 11 : Configure Updates

  •    Module 11 Workbook

  •    Configure Update Windows 10

  •    Manage Update History

  •    Roll Back Updates

  •    Implement Insider Preview CB CBB and LTSB

  •    Update Windows Store Apps

  •    Windows Update Options-Demo

  •    Update History-Demo

  •    Rolling Back Updates-Demo

  •    Update Windows Store apps-Demo

Module 12 : Monitor Windows

  •    Module 12 Workbook

  •    Monitor Windows

  •    Configure Event Subscriptions

  •    Monitor Performance Using Task Manager

  •    Monitor System

  •    Monitor and Manage Printers

  •    Monitor Performance Using Performance Monitor Data Collectors

  •    Monitor and Manage Printers

  •    Configure Indexing Options

  •    Manage Client Security by Using Windows Defender

  •    Evaluate System Stability by Using Reliaability Monitor

  •    Troubleshoot Performance Issues

  •    Manage Security Using Windows Defender Security Center

  •    Configure Windows Defender Advanced Threat Detection

  •    Event Viewer-Demo

  •    Creating Event Subscriptions-Demo

  •    Task Manager-Demo

  •    Performance Monitor-Demo

  •    Resource Monitor-Demo

  •    Managing the Printers with Print Management-Demo

  •    Indexing-Demo

  •    Windows Defender-Demo

  •    Reliability Monitor-Demo

Module 13 : Configure System and Data Recovery

  •    Module 13 Workbook

  •    Configure System and Data Recovery

  •    Configure System Restore

  •    Configure Restore Points

  •    Peform a Refresh or Recycle

  •    Restore Previous Versions of Files and Folders

  •    Configure File History

  •    Recover Files from OneDrive

  •    Use Windows Backup and Restore

  •    Perform a Backup and Restore with WBAdmin

  •    Perform Recovery Operations Windows Recovery

  •    Configure a Recovery Drive-Demo

  •    Configure System Restore-Demo

  •    Configure Restore Points-Demo

  •    Performing a Refresh or Recycle-Demo

  •    Configure File History-Demo

  •    Use Windows Backup & Restore-Demo

Module 14 : Configure Authorization and Authentication

  •    Module 14 Workbook

  •    Configure Authorization and Authentication

  •    Configure Pictures Passwords and Biometrics

  •    Configure Workgroups

  •    Configure Domain Settings

  •    Configue Homegroup Settings

  •    Configure Credential Manager

  •    Configure Local Accounts

  •    Configure Microsoft Accounts

  •    Configure Device Registration

  •    Configure Windows Hello for Business

  •    Configure Device Guard

  •    Credential Guard

  •    Configure Device Health Attestation

  •    Configure UAC Behavior

  •    Configure Dynamic Look

  •    Picture Passwords-Demo

  •    Workgroups-Demo

  •    Domains-Demo

  •    Credential Manager-Demo

  •    Configure Local Accounts-Demo

  •    Dynamic Lock-Demo

Module 15 : Configure Advanced Management Tools

  •    Module 15 Workbook

  •    Configure Advanced Management Tools

  •    Configure Device Manager

  •    Configure and use the MMC

  •    Configure Task Schedule

  •    Configure Automation of Mgmt Task Using Windows PowerShell

  •    Convert Group Policy Objects to MDM Policies using the MDM

  •    Services-Demo

  •    Using the MMC-Demo

  •    Task Scheduler-Demo

  •    Opening PowerShell and the Integrated Scripting Environment-Demo

Managing Different Personality Types Course Content

Module 1: Intro and what will this course cover?

  •    Managing Different Personalities Intro

Module 2: My Story and background

  •    My Story

Module 3: Let's get on the same page

  •    Let's Start Together on the Same Page

Module 4: Two personality types

  •    Two Types of Personalities

Module 5: A Good vs Bad Manager

  •    Good vs Bad Manager

Module 6: What are the best ways to manage your team?

  •    What is the Best Way to Manage Your Team

Module 7: Mentalities to avoid

  •    Mentalities to Avoid

  •    Can You Be Your Employee's Friend

  •    Trying To Make Everyone Happy

  •    Talking Down to Your Team

Module 8: How to approach a problem with an employee?

  •    How To Approach a Problem with an Employee

Module 9: Diversity in your team

  •    There is A lot of Diversity Out There

Module 10: My personal difficulty with careless employees

  •    My Personal Difficulties

Module 11: Discipline

  •    Discipline

  •    Best Practices During Discipline

Module 12: Angry employees

  •    What To Do with Angry Employees

  •    Is It Ok To Yell at Your Employees

Module 13: When it is time to say goodbye

  •    When It Is Time to Say Goodbye

Module 14: Disrespect from your team

  •    Disrespect from Your Team

  •    How to Build Respect from Your Team

Module 15: Common management mistakes

  •    Common Mangement Mistakes

Module 16: How do I become a better manager?

  •    How Do I Become a Better Manager

Module 17: How to manage if you aren't the big, big boss

  •    How To Manage a Team if You're a Middle Manager

Module 18: Dealing with other managers

  •    Dealing with other Managers

Module 19: Conclusion and summary of course

  •    Summary

CompTIA PenTest+ (PT0-001) Course Content

Module 1 - The Pen Test Engagement

  •    Module 1 Notes

  •    1.0 PenTest Plus Introduction

  •    1.1 PenTest Plus Topics

  •    1.2 PenTest Engagement

  •    1.3 Threat Modeling

  •    1.4 Technical Constraints

  •    1.5 PenTest Engagement Review

  •    1.6 Examining PenTest Engagement Documents Act

Module 2 - Passive Reconnaissance

  •    Module 2 Notes

  •    2.1 Passive Reconnaissance part1

  •    2.2 WHOIS Act

  •    2.3 Passive Reconnaissance part2

  •    2.4 Google Hacking Act

  •    2.5 Passive Reconnaissance part3

  •    2.6 DNS Querying Act

  •    2.7 Passive Reconnaissance part4

  •    2.8 Email Server Querying Act

  •    2.9 SSL-TLS Cerfificates

  •    2.10 Shodan Act

  •    2.11 The Havester

  •    2.12 TheHarvester Act

  •    2.13 Recon-ng

  •    2.14 Recon-g Act

  •    2.14 Recon-ng-Part-2-API-key Act

  •    2.15 Maltego

  •    2.16 Have I been Pwned

  •    2.17 Punked and Owned Pwned Act

  •    2.18 Fingerprinting Organization with Collected Archives

  •    2.19 FOCA Act

  •    2.20 Findings Analysis Weaponization

  •    2.21 Chp 2 Review

Module 3 - Active Reconnaissance

  •    Module 3 Notes

  •    3.1 Active Reconnaissannce

  •    3.2 Discovery Scans Act

  •    3.3 Nmap

  •    3.4 Nmap Scans Types Act

  •    3.5 Nmap Options

  •    3.6 Nmap Options Act

  •    3.7 Stealth Scans

  •    3.8 Nmap Stealth Scans Act

  •    3.9 Full Scans

  •    3.10 Full Scans Act

  •    3.11 Packet Crafting

  •    3.12 Packet Crafting Act

  •    3.13 Network Mapping

  •    3.14 Metasploit

  •    3.15 Scanning with Metasploit Act

  •    3.16 Enumeration

  •    3.17 Banner Grabbing Act

  •    3.18 Windows Host Enumeration

  •    3.19 Winddows Host Enumeration Act

  •    3.20 Linux Host Enumeration

  •    3.21 Linux Host Enumeration Act

  •    3.22 Service Enumeration

  •    3.23 Service Enumeration Act

  •    3.24 Network Shares

  •    3.25 SMB Share Enumeration Act

  •    3.26 NFS Network Share Enumeration

  •    3.27 NFS Share Enumeration Act

  •    3.28 Null Sessions

  •    3.29 Null Sessions Act

  •    3.30 Website Enumeration

  •    3.31 Website Enumeration Act

  •    3.32 Vulnerability Scans

  •    3.33 Compliance Scans Act

  •    3.34 Credentialed Non-credentialed Scans

  •    3.35 Using Credentials in Scans Act

  •    3.36 Server Service Vulnerability Scan

  •    3.37 Vulnerability Scanning Act

  •    3.38 Web Server Database Vulnerability Scan

  •    3.39 SQL Vulnerability Scanning Act

  •    3.40 Vulnerability Scan Part 2 OpenVAS Act

  •    3.41 Web App Vulnerability Scan

  •    3.42 Web App Vulnerability Scanning Act

  •    3.43 Network Device Vulnerability Scan

  •    3.44 Network Device Vuln Scanning Act

  •    3.45 Nmap Scripts

  •    3.46 Using Nmap Scripts for Vuln Scanning Act

  •    3.47 Packet Crafting for Vulnerbility Scans

  •    3.48 Firewall Vulnerability Scans

  •    3.49 Wireless Access Point Vunerability

  •    3.50 Wireless AP Scans Act

  •    3.51 WAP Vulnerability Scans

  •    3.52 Container Security issues

  •    3.53 How to Update Metasploit Pro Expired Trial License

Module 4 - Physical Security

  •    Module 4 Notes

  •    4.1 Physical Security

  •    4.2 Badge Cloning Act

  •    4.3 Physical Security Review

Module 5 - Social Engineering

  •    Module 5 Notes

  •    5.1 Social Engineering

  •    5.2 Using Baited USB Stick Act

  •    5.3 Using Social Enginnering to Assist Attacks

  •    5.4 Phishing Act

  •    5.5 Social Engineering Review

Module 6 - Vulnerability Scan Analysis

  •    Module 6 Notes

  •    6.1 Vulnerbility Scan Analysis

  •    6.2 Validating Vulnerability Scan Results Act

  •    6.3 Vulnerbility Scan Analysis Review

Module 7 - Password Cracking

  •    Module 7 Notes

  •    7.1 Password Cracking

  •    7.2 Brute Force Attack Against Network Service Act

  •    7.3 Network Authentication Interception Attack

  •    7.4 Intercepting Network Authentication Act

  •    7.5 Pass the Hash Attacks

  •    7.6 Pass the Hash Act

  •    7.7 Password Cracking Review

Module 8 - Penetrating Wired Networks

  •    Module 8 Notes

  •    8.1 Penetrating Wired Network

  •    8.2 Sniffing Act

  •    8.3 Eavesdropping

  •    8.4 Eavesdropping Act

  •    8.5 ARP Poisoning

  •    8.6 ARP Poisoning Act

  •    8.7 Man In The Middle

  •    8.8 MITM Act

  •    8.9 TCP Session HiJacking

  •    8.10 Server Message Blocks SMB Exploits

  •    8.11 SMB Attack Act

  •    8.12 Web Server Attacks

  •    8.13 FTP Attacks

  •    8.14 Telnet Server Attacks

  •    8.15 SSH Server Attacks

  •    8.16 Simple Network Mgmt Protocol SNMP

  •    8.17 Simple Mail Transfer Protocol SMTP

  •    8.18 Domain Name System DNS Cache Poisoning

  •    8.19 Denail of Service Attack DoS-DDoS

  •    8.20 DoS Attack Act

  •    8.21 VLAN Hopping Review

Module 9 - Penetrating Wireless Networks

  •    Module 9 Notes

  •    9.1 Penetrating Wireless Networks

  •    9.2 Jamming Act

  •    9.3 Wireless Sniffing

  •    9.4 Replay Attacks

  •    9.5 WEP Cracking Act

  •    9.6 WPA-WPA2 Cracking

  •    9.7 WAP Cracking Act

  •    9.8 Evil Twin Attacks

  •    9.9 Evil Twin Attack Act

  •    9.10 WiFi Protected Setup

  •    9.11 Bluetooth Attacks

  •    9.12 Penetrating Wireless Networks

Module 10 - Windows Exploits

  •    Module 10 Notes

  •    10.1 Windows Exploits

  •    10.2 Dumping Stored Passwords Act

  •    10.3 Dictionary Attacks

  •    10.4 Dictionary Attack Against Windows Act

  •    10.5 Rainbow Table Attacks

  •    10.6 Credential Brute Force Attacks

  •    10.7 Keylogging Attack Act

  •    10.8 Windows Kernel

  •    10.9 Kernel Attack Act

  •    10.10 Windows Components

  •    10.11 Memory Vulnerabilities

  •    10.12 Buffer Overflow Attack Act

  •    10.13 Privilegde Escalation in Windows

  •    10.14 Windows Accounts

  •    10.15 Net and WMIC Commands

  •    10.16 Sandboxes

Module 11 - Linux Exploits

  •    Module 11 Notes

  •    11.1 Linux Exploits

  •    11.2 Exploiting Common Linux Features Act

  •    11.3 Password Cracking in Linux

  •    11.4 Cracking Linux Passwords Act

  •    11.5 Vulnerability Linux

  •    11.6 Priviledge Escalation Linux

  •    11.7 Linux Accounts

  •    11.8 Linux Exploits Review

Module 12 - Mobile Devices

  •    Module 12 Notes

  •    12.1 Mobile Devices

  •    12.2 Hacking Android Act

  •    12.3 Apple Exploits

  •    12.4 Moblie Devices Review

Module 13 - Specialized Systems

  •    Module 13 Notes

  •    13.1 Specialized Systems

  •    13.2 Specialized Systems Review

Module 14 - Scripts

  •    Module 14 Notes

  •    14.1 Scripts

  •    14.2 Powershell

  •    14.3 Python

  •    14.4 Ruby

  •    14.5 Common Scripting Elements

  •    14.6 Scripts Review

  •    14.7 Better Ping Sweep

  •    14.8 Simple Port Scanner2

  •    14.9 Multitarget Port Scanner

  •    14.10 Port Scanner with Nmap

  •    14.11 Scripts Review

Module 15 - Application Testing

  •    Module 15 Notes

  •    15.1 Application Testing

  •    15.2 Reverse Engineering

Module 16 - Web App Exploits

  •    Module 16 Notes

  •    16.1 Webb App Exploits

  •    16.2 Injection Attacks

  •    16.3 HTML Injection

  •    16.4 SQL Hacking - SQLmap Act

  •    16.5 Cross-Site Attacks

  •    16.6 Cross-Site Request Forgery

  •    16.7 Other Web-based Attacks

  •    16.8 File Inclusion Attacks

  •    16.9 Web Shells

  •    16.10 Web Shells Review

Module 17 - Lateral Movement

  •    Module 17 Notes

  •    17.1 Lateral Movement

  •    17.2 Lateral Movement with Remote Mgmt Services

  •    17.3 Process Migration Act

  •    17.4 Passing Control Act

  •    17.5 Pivoting

  •    17.6 Tools the Enable Pivoting

  •    17.7 Lateral Movement Review

Module 18 - Persistence

  •    Module 18 Notes

  •    18.1 Persistence

  •    18.2 Breeding RATS Act

  •    18.3 Bind and Reverse Shells

  •    18.4 Bind Shells Act

  •    18.5 Reverse Shells

  •    18.6 Reverse Shells Act

  •    18.7 Netcat

  •    18.8 Netcat Act

  •    18.9 Scheduled Tasks

  •    18.10 Scheduled Tasks Act

  •    18.11 Services and Domains

  •    18.12 Persistence Review

Module 19 - Cover Your Tracks

  •    Module 19 Notes

  •    19.1 Cover Your Tracks

  •    19.2 Cover Your Tracks - Timestomp Files Act

  •    19.3 Cover Your Tracks - Frame the Administrator Act

  •    19.4 Cover Your Tracks - Clear the Event Log Act

  •    19.5 Cover Your Tracks Review

Module 20 - The Report

  •    Module 20 Notes

  •    20.1 The Report

  •    20.2 The Report Review

Module 21 - Post Engagement Cleanup

  •    Module 21 Notes

  •    21.1 Post Engagement Cleanup_1

  •    21.3 Post Engagement Cleanup Review

  •    21.4 PenTest Plus Conclusion.mp4

Certified Associate in Project Management (CAPM) 6th Edition Course Content

Module 1 : Getting Certified to take the Examination

  •    Intro

Module 2 : Techniques for Preparing for and Taking the Examination

  •    Getting Certified to take the Exam

  •    Techniques for Preparing for the Exam

Module 3 : Project Management Framework

  •    PMBOK Framework prt1

  •    PMBOK Framework prt2

  •    PMBOK Framework prt3

Module 4 : Project Integration Management

  •    Project Integration Mgmt

  •    Project Integration Mgmt prt2

  •    Integration Questions

Module 5 : Project Scope Management

  •    Project Scope Mgmt

  •    Project Scope Mgmt prt2

  •    Scope Questions

Module 6 : Project Schedule Management

  •    Project Schedule Mgmt

  •    Project Schedule Mgmt prt2

  •    Project Schedule Mgmt prt3

  •    Schedule Knowledge Questions

Module 7 : Project Cost Management

  •    Project Cost Mgmt

  •    Earned Value Mgmt

  •    Trend Analysis

  •    Cost Questions

Module 8 : Project Quality Management

  •    Project Quality Mgmt

  •    Quality Zero Defects

  •    Control Quality

  •    Quality Questions

Module 9 : Project Resource Management

  •    Project Resource Mgmt

  •    Estimate Activity Resources

  •    Manage Team

  •    Resource Histogram

  •    Resource Questions

Module 10 : Project Communications Management

  •    Project Communication Mgmt

  •    Communication Methods

  •    Communications

  •    Communication Questions

Module 11 : Project Risk Management

  •    Project Risk Mgmt

  •    Identify Risk

  •    Quantitive Risk Analysis

  •    Plan Risk Responses

  •    Risk Questions

Module 12 : Project Procurement Management

  •    Project Procurement

  •    Make or Buy

  •    Share

  •    Procurement Documents

  •    Negotiations

  •    Procurement Questions

Module 13 : Project Stakeholder Management

  •    Project Stakeholder Mgmt

  •    Plan Stakeholder Engagement

  •    Project Stakeholder Questions

  •    CAPM Conclusion

CompTIA Advanced Security Practitioner (CASP) CAS-003 Course Content

Module 1 - Risk Management

  •    Module 1 Notes

  •    Intro CASP

  •    CASP Introduction

  •    Mod 1.1 Exploring Cloud Services Act

  •    Mod 1.1 Acquisition Merger Demerger

  •    Mod 1.1 Acquisition Merger Demerger Part2

  •    Mod 1.2 Compare and Contrast

  •    Mod 1.3 Given Scenario Execute Risk

  •    Mod 1.3 Given Scenario Execute Risk Part2

  •    Mod 1.3 Continuing Terminology IT Governance

  •    Mod 1.4 Analyze Security Solution Metrics and Attributes

  •    Mod 1.4 Analyze Risk

  •    Mod 1.4 Trend Analysis Act

Module 2 - Enterprise Security Architecture

  •    Module 2 Notes

  •    Mod 2 Enterprise Security Architecture

  •    Mod 2.1 Network Device Security Act

  •    Mod 2.1 Application and Protocol

  •    Mod 2.1 Advanced Network Security Act

  •    Mod 2.1 Complex Network Security Solution

  •    Mod 2.1 Implementing VLANs Switchport Sec Act

  •    Mod 2.1 Implementing VLANs Switchport Sec Act Part2

  •    Mod 2.1 Distributed Denial of Service

  •    Mod 2.1 Exploring DoS Attacks Act

  •    Mod 2.1 Security Zones

  •    Mod 2.1 Network Access Control

  •    Mod 2.1 Searching for Vulnerablie ICS-SCADA Act

  •    Mod 2.2 Analyze a Scenario Integrate Security

  •    Mod 2.2 Configuring Windows Firewall Act

  •    Mod 2.2 Log Monitoring and Auditing

  •    Mod 2.2 Group Policy Act

  •    Mod 2.2 Patch Management

  •    Mod 2.2 Management Interface

  •    Mod 2.2 Measured Launch

  •    Mod 2.3 Analyze a Scenario to Integrate Security Controls

  •    Mod 2.3 Security Implications Privacy

  •    Mod 2.3 Baseband

  •    Mod 2.4 Given Software Vulnerabilty Scenarios

  •    Mod 2.4 SQL Injection Act

  •    Mod 2.4 Improper Error and Exception Handling

  •    Mod 2.4 Buffer Overflows Act

  •    Mod 2.4 Memory Leaks

  •    Mod 2.4 Researching Vulnerabilities Exploits Act

Module 3 - Enterprise Security Operations

  •    Module 3 Notes

  •    Mod 3 Enterprise Security Operations

  •    Mod 3 Runtime Debugging

  •    Mod 3.1 Fingerprinting an OS Services Act

  •    Mod 3.1 Code Review

  •    Mod 3.1 Conducting OSINT Act

  •    Mod 3.1 Types

  •    Mod 3.1 Conducting a Vulnerability Assessment Act

  •    Mod 3.2 Analyze a Scenario Output

  •    Mod 3.2 Network Sniffing Act

  •    Mod 3.2 Security Content Automation

  •    Mod 3.2 Using a SCAP Scanner Act

  •    Mod 3.2 Network Enumerator

  •    Mod 3.2 Password Cracking Act

  •    Mod 3.2 Host Vulnerability Scanner

  •    Mod 3.2 Using Command Line Tools Act

  •    Mod 3.2 OpenSSL

  •    Mod 3.2 Scanning for Heartbleed Act

  •    Mod 3.2 Local Exploitation Tools

  •    Mod 3.2 Verifying File Integrity with SFC Act

  •    Mod 3.2 Log Analysis Tools

  •    Mod 3.3 Given Scenario Implement Incident

  •    Mod 3.3 Facilitate Incident Detection Response

  •    Mod 3.3 Using Incident Response Support Tools Act

  •    Mod 3.3 Severity of Incident Detection Breach

Module 4 - Technical Integration of Enterprise Security

  •    Module 4 Notes

  •    Mod 4 Technical Integration of Enterprise

  •    Mod 4 Technical Integration of Enterprise Part2

  •    Mod 4.1 DataSecurity Considerations

  •    Mod 4.1 Examing Network Diagrams Act

  •    Mod 4.1 Security and Privacy Considerations of Storage integration

  •    Mod 4.1 Exploring Directory Services and DNS Act

  •    Mod 4.2 Given Scenario Integrate Cloud and Virtualization

  •    Mod 4.2 Taking Another Look at Cloud Services Act

  •    Mod 4.2 Security Advantages and Disadvanatges of Virtualization

  •    Mod 4.2 Using Virtualization Act

  •    Mod 4.2 Cloud Augmented Security

  •    Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication

  •    Mod 4.4 Given Scenario Cryptographic

  •    Mod 4.4 Cryptographic Part2

  •    Mod 4.4 Mobile Device Encryption

  •    Mod 4.4 Cryptography Act

  •    Mod 4.5 Select the Appropriate Control

  •    Mod 4.5 Phising Act

  •    Mod 4.5 Telephony VoIP Integration

Module 5 - Research, Development and Collaboration

  •    Module 5 Notes

  •    Mod 5 Research Methods to Determine Industry Trends

  •    Mod 5.1 Practicing Threat Intelligence Act

  •    Mod 5.2 Scenario Implememt Security Activities Across

  •    Mod 5.2 Static Testing

  •    Mod 5.3 Explain the Importance of Interaction

  •    CASP Conclusion

Social Media & Digital Marketing 101 Course Content

Module 1 Online Lead Generation

  •    Intro to Social Media Digital Marketing

  •    Online Lead Generation prt1

  •    Online Lead Generation prt2

  •    Lead Examples

  •    Live Streaming Video for Leads

  •    Lead Generation

  •    Using Your Customers

  •    Be Ready

Module 2 Facebook, LinkedIn, and YouTube 101

  •    Create a Facebook Business Page

  •    Facebook Setup

  •    Marketing in Facebook Groups

  •    Messenger Bots

  •    More on Messenger

  •    Facebook Video using InShot

  •    Repurposing

  •    Setting Up LinkedIn Pro le

  •    Benefits of YouTube

Module 3 List Building & Email Marketing

  •    Email List prt1

  •    Email List prt2

  •    MailChimp prt1

  •    MailChimp prt2

  •    Email Content Ideas

  •    Email summary

Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps

  •    Canva Image Creation

  •    Making a video with your phone

  •    InShot video

  •    Purpose Video Marketing

  •    Transcribing Video

  •    Word Swag

  •    Ripl

  •    Instagram prt1

  •    Instagram prt2

  •    Instagram prt3

Module 5 Sales Funnels

  •    Click Funnel prt1

  •    Click Funnel prt2

  •    Funnel Building prt1

  •    Funnel Building prt2

Module 6 Apps & Tools Review

  •    Social Media apps

  •    Podcasting

  •    Customer Value Letter

  •    Tips and Tricks

  •    Fiverr

  •    Outro

Photography Basics Course Content

Module 1

  •    Introduction

  •    Photography Basics

  •    Photography Basics prt 2

  •    Questions and Answers

  •    Questions and Answers prt 2

  •    Questions and Answers prt 3

  •    Basic Accessories

  •    Basic Accessories prt 2

  •    Lenses

  •    DSLR vs DSLM

  •    Studio shoot

  •    Studio shoot with model prt 1

  •    Studio shoot with model prt 2

  •    Studio green-screen shoot

  •    Common Questions

  •    Common Questions prt 2

  •    Basic Editing

  •    Levitation and Transferring Images to Your PC

  •    Levitation and Importing into PhotoShop

  •    Logo and Watermark

  •    Deleting Backgrounds

  •    Product Photography

  •    Website

  •    Website Images prt 2

  •    Real Estate Photography

  •    Branding

  •    Camera phone

  •    Accessories for Mobile Phones and GoPro

  •    Conclusion

Starting Your Own YouTube Channel 101 Course Content

Starting Your Own YouTube Channel

  •    Welcome to the course

  •    What Will Your Channel Be About?

  •    Recording Device

  •    Your Competition

  •    Your Normal Video Formula

  •    Your Apprearance

  •    Your Personality On Camera

  •    Beware of Copy-written Content

  •    Elements To Make Your Channel and Videos Better Part 1

  •    Elements To Make Your Channel and Videos Better Part 2

  •    Sound Quality

  •    Post Schedule

  •    Doing Too Much

  •    Community Interaction

  •    Trolls and Negative Comments

  •    Fancy Equipment Or Not

  •    Patience

  •    Conclusion

Microsoft 70-765 SQL Server 2016 Provisioning SQL Databases Course Content

Module 1: Deploy a Microsoft Azure SQL Database

  •    Introduction

  •    Introducing the Azure SQL Database Part 1

  •    Introducing the Azure SQL Database Part 2

  •    Setting Up Azure Lab

  •    Chose a Service Tier Part 1

  •    Chose a Service Tier Part 2

  •    Create Servers and Databases Part 1

  •    Creating a Azure SQL Server and Database Lab

  •    Create Servers and Databases Part 2

  •    Create Servers and Databases Part 3

  •    Connecting SSMS to Azure SQL Lab Part 1

  •    Connecting SSMS to Azure SQL Lab Part 2

  •    Create a Sysadmin Account

  •    Creating Azure SQL Logins and Users Lab

  •    Congure Elastic Pools

  •    Creating and Conguring an Elastic Pool Lab

Module 2: Plan for SQL Server Installation

  •    Plan for an IaaS or On-Premises Deployment Part 1

  •    Plan for an IaaS or On-Premises Deployment Part 2

  •    Select the Appropriate Size for a Virtual Machine

  •    Plan Storage Pools Based on Performance Requirements Part 1

  •    Plan Storage Pools Based on Performance Requirements Part 2

  •    Evaluate Best Practices for Installation

  •    Design a Storage Layout for a SQL Server Virtual Machine

Module 3: Deploy SQL Server Instances

  •    Deploy a SQL Server Instance in IaaS and On-Premises

  •    Restoring AdventureWorks 2016 Database Lab

  •    Provision an Azure Virtual Machine to Host a SQL Server Instance

  •    Provisioning an Azure Virtual Machine to Host a SQL Server Lab

  •    Manually Install SQL Server on an Azure Virtual Machine

  •    Installing SQL 2016 Lab Part 1

  •    Installing SQL 2016 Lab Part 2

  •    Automate the Deployment of SQL Server Databases

  •    Exploring Azure SQL Database Automation Lab

  •    Deploy SQL Server by Using Templates

  •    Managing JSON Templates Lab

Module 4: Deploy SQL Server Databases to Azure Virtual Machines

  •    Migrate an On-Premises SQL Server Database to an Azure Virtual Machine

  •    Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 1

  •    Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 2

  •    Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 3

  •    Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 4

  •    Generate Benchmark Data for Performance Needs

  •    Generating Benchmark Data Lab Part 1

  •    Generating Benchmark Data Lab Part 2

  •    Perform Performance Tuning on Azure IaaS

  •    Perform Performance Tuning on Azure IaaS Lab Part 1

  •    Perform Performance Tuning on Azure IaaS Lab Part 2

  •    Support Availability Sets in Azure Part 1

  •    Support Availability Sets in Azure Part 2

  •    Manage High Availability Lab Part 1

  •    Manage High Availability Lab Part 2

  •    Manage High Availability Lab Part 3

  •    Manage High Availability Lab Part 4

  •    Manage High Availability Lab Part 5

Module 5: Configure Secure Access to Microsoft Azure SQL Databases

  •    Configure Firewall Rules

  •    Creating Firewall Rules Lab

  •    Configure Always Encrypted for Azure SQL Database

  •    Implementing Always Encrypted Lab

  •    Configure Cell-Level Encryption

  •    Cell-Level Encryption Lab

  •    Configure Dynamic Data Masking

  •    Dynamic Data Masking Lab

  •    Configure Transparent Data Encryption (TDE)

  •    Transparent Data Encryption (TDE) Lab

Module 6: Configure SQL Server performance settings

  •    Configure SQL Performance Settings

  •    Configuring SQL Performance Settings Lab

  •    Configure Max Server Memory

  •    Configuring SQL Memory Lab

  •    Configure Database Performance Settings

  •    Configure Database Performance Settings Lab

  •    Configure Operators and Alerts

  •    Configure alerts in Azure and On-Premise SQL Server Lab

Module 7: Manage SQL Server instances

  •    Create Databases

  •    Creating Databases Lab

  •    Manage Files and File Groups

  •    Managing Files and File Groups Lab

  •    Manage System Database Files

  •    Manage System Database Files Lab

  •    Configure tempdb

  •    Configure tempdb Lab

Module 8: Manage SQL Storage

  •    Manage SMB File Shares

  •    Manage SMB File Shares Lab

  •    Manage Stretch Databases

  •    Configure Azure Storage

  •    Change Service Tiers

  •    Change Service Tiers Lab Part 1

  •    Review Wait Statistics

  •    Manage Storage Pools

  •    Recover from Failed Storage

  •    Managing Storage Lab Part 1

  •    Managing Storage Lab Part 2

Module 9: Perform Database Maintenance

  •    Monitoring Tools

  •    Using Monitoring Tools Lab Part 1

  •    Using Monitoring Tools Lab Part 2

  •    Azure Performance Tuning

  •    Automate Maintenance Tasks

  •    Update Statistics and Indexes

  •    Update Statistics and Indexes Lab Part 1

  •    Update Statistics and Indexes Lab Part 2

  •    Verify Database Integrity

  •    Verify Database Integrity Lab

  •    Recover from Database Corruption

  •    Recover from Database Corruption Lab

  •    Conclusion

Microsoft 70-764 SQL 2016 - Administering a SQL Database Infrastructure Course Content

Module 1: Configure Encryption

  •    Introduction

  •    Exam Objectives and Lab Setup

  •    Restoring AdventureWorks 2016 Database Lab Part 1

  •    Restoring AdventureWorks 2016 Database Lab Part 2

  •    Restoring AdventureWorks 2016 Database Lab Part 3

  •    Configure Encryption

  •    Cell-Level Encryption Part 1

  •    Cell-Level Encryption Part 2

  •    Cell-Level Encryption Lab Part 1

  •    Cell-Level Encryption Lab Part 2

  •    Transparent Data Encryption

  •    Transparent Data Encryption Lab

  •    Always Encrypted

  •    Always Encrypted Lab

  •    Backup Encryption

  •    Backup Encryption Lab

  •    Connection Encryption

  •    Encryption Troubleshooting

Module 2: Configure Data Access and Permissions

  •    Create and Maintain Users

  •    Create and Maintain Users Lab Part 1

  •    Create and Maintain Users Lab Part 2

  •    Configure and Maintain Custom Roles

  •    Configure and Maintain Custom Roles Lab

  •    Manage Database Object Permissions Part 1

  •    Manage Database Object Permissions Part 2

  •    Manage Database Object Permissions Lab Part 1

  •    Manage Database Object Permissions Lab Part 2

  •    Configure User Options for Azure SQL Database

  •    Configure Row-Level Security

  •    Configure Dynamic Data Masking

  •    Configure Dynamic Data Masking Lab

Module 3: Configure Auditing

  •    Manage a SQL Server Audit

  •    Manage a SQL Server Audit Lab

  •    Query the SQL Server Audit Log

  •    Manage an Azure SQL Server Audit

Module 4: Develop a Backup Strategy

  •    Backup Types Part 1

  •    Backup Types Part 2

  •    Manage, Backup, and Restore Databases Lab Part 1

  •    Manage, Backup, and Restore Databases Lab Part 2

  •    Backup Very Large Databases Part 1

  •    Backup Very Large Databases Part 2

  •    Backup Very Large Databases Part 3

  •    Backup Very Large Databases Part 4

  •    4.9 Managing Very Large Databases Lab Part 1

  •    4.10 Managing Very Large Databases Lab Part 2

  •    4.11 Managing Very Large Databases Lab Part 3

  •    Configure Alerting for Failed Backups

  •    Configure Alerting for Failed Backups Lab Part 1

  •    Configure Alerting for Failed Backups Lab Part 2

  •    Back up Databases to Azure

  •    Manage Transaction Log Backups

  •    Configure Database Recovery Models

  •    Set Database Recovery Model Lab

  •    Configure Backup Automation

  •    Configure Backup Automation Lab

Module 5: Restore Databases

  •    Perform Piecemeal Restores

  •    Restore Databases Lab Part 1

  •    Restore Databases Lab Part 2

  •    Restore Databases Lab Part 3

  •    Perform Page Recovery

  •    Perform Point-in-Time Recovery

  •    Perform Point-in-Time Recovery Lab

  •    Restore File Groups

  •    Develop a Plan to Automate and Test Restores

Module 6: Manage Database Integrity

  •    Implement Database Consistency Checks

  •    Implement Database Consistency Checks Lab

  •    Identify Database Corruption

  •    Recover From Database Corruption

Module 7: Monitor Database Activity

  •    Monitor Current Sessions

  •    Monitor Current Sessions Lab

  •    Identify Sessions that Cause Blocking Activity

  •    Identify Sessions that Consume tempdb Resources

  •    Configure the Data Collector

Module 8: Monitor Queries

  •    Manage the Query Store

  •    Manage the Query Store Lab

  •    Configure Extended Events and Trace Events

  •    Identify Problematic Execution Plans

Module 9: Manage Indexes

  •    Identify and Repair Index Fragmentation

  •    Identify and Create Missing Indexes

  •    Identify and Drop Underutilized Indexes

  •    Manage Existing Columnstore Indexes Part 1

  •    Manage Existing Columnstore Indexes Part 2

  •    Partitioned Tables

Module 10: Monitor SQL Server Instances

  •    Create and Manage Operators

  •    Create and Manage SQL Agent Alerts

  •    Configure Policy-Based Management

  •    Configure Policy-Based Management Lab

  •    Identify Available Space on Data Volumes

  •    Identify the Cause of- Manage Performance Degradation

  •    Identify the Cause of- Manage Performance Degradation Lab Part 1

  •    Identify the Cause of- Manage Performance Degradation Lab Part 2

Module 11: Implement Log Shipping

  •    Configure and Monitor Log Shipping

  •    Configure and Monitor Log Shipping Lab Part 1

  •    Configure and Monitor Log Shipping Lab Part 2

Module 12: Implement Failover Cluster Instances

  •    Windows Server Failover Cluster

  •    Manage Shared Disks

  •    Configure Cluster Shared Volumes

  •    Configuring WSFC Lab

Module 13: Implement Always On Availability Groups

  •    Database Mirroring

  •    Create an Availability Group

  •    Manage Failover

  •    Configure Read-Only Routing

  •    Create Distributed Availability Groups

  •    Configuring Always On Availability Group Lab Part 1

  •    Configuring Always On Availability Group Lab Part 2

  •    Conclusion

Adobe Flash/Animate Course Content

Module 1

  •    1.1 Introduction

  •    1.2 What is Flash Animate

  •    1.3 Creating A New Document in Flash and Exploring the Interface

  •    1.4 Drawing in Flash Part 1

  •    1.5 Drawing in Flash Part 2

  •    1.6 Frame by Frame Animating in Flash Part 1

  •    1.7 Frame by Frame Animating in Flash Part 2

  •    1.8 Saving, Rendering, and Exporting

  •    1.9 Animating with Symbols Part 1

  •    1.10 Animating with Symbols Part 2

  •    1.11 Animating with Symbols Part 3

  •    1.12 Different Types of Tweening Part 1

  •    1.13 Different Types of Tweening Part 2

  •    1.14 Nesting Symbols

  •    1.15 Importing Graphics Part 1

  •    1.16 Importing Graphics Part 2

  •    1.17 Masking Part 1

  •    1.18 Masking Part 2

  •    1.19 Camera and Parallax Scrolling Part 1

  •    1.20 Camera and Parallax Scrolling Part 2

  •    1.21 Camera and Parallax Scrolling Part 3

  •    1.22 Rotoscoping Part 1

  •    1.23 Rotoscoping Part 2

  •    1.24 Rotoscoping Part 3

  •    1.25 Rotoscoping Part 4

  •    1.26 Rotoscoping Part 5

  •    1.27 Rotoscoping Part 6

  •    1.28 Rotoscoping Part 7

  •    1.29 Creating a Puppet Part 1

  •    1.30 Creating a Puppet Part 2

  •    1.31 Creating a Puppet Part 3

  •    1.32 Creating a Puppet Part 4

  •    1.33 Creating a Puppet Part 5

  •    1.34 Creating a Puppet Part 6

  •    1.35 Animating a Puppet Part 1

  •    1.36 Animating a Puppet Part 2

  •    1.37 Animating a Puppet Part 3

  •    1.38 Animating a Puppet Part 4

  •    1.39 Cycles

  •    1.40 Interchangeable Parts

  •    1.41 Interactivity

  •    1.42 Text Part 1

  •    1.43 Text Part 2

  •    1.44 Animating with Code

  •    1.45 Dialog Part 1

  •    1.46 Dialog Part 2

  •    1.47 Dialog Part 3

  •    1.48 Dialog Part 4

  •    1.49 Controlling the Timeline Part 1

  •    1.50 Controlling the Timeline Part 1

  •    1.51 Putting Together an Interactive eCard Part 1

  •    1.52 Putting Together an Interactive eCard Part 2

  •    1.53 Putting Together an Interactive eCard Part 3

  •    1.54 Putting Together an Interactive eCard Part 4

  •    1.55 Putting Together an Interactive eCard Part 5

  •    1.56 Bone Tool

  •    1.57 Conclusion

Microsoft 70-742 Identity in Windows Server 2016 MCSA Course Content

Module 1: Installing and Configuring Domain Controllers

  •    Introduction

  •    Overview of Identity Management Concepts Part 1

  •    Overview of Identity Management Concepts Part 2

  •    Active Directory Domain Services Components Part 1

  •    Active Directory Domain Services Components Part 2

  •    Active Directory Domain Services Components Part 3

  •    Overview of ADDS Domain Services Part 1

  •    Overview of ADDS Domain Services Part 2

  •    Deploying Domain Controllers Part 1

  •    Deploying Domain Controllers Part 2

  •    Deploying Domain Controllers Part 3

Module 2: Managing AD DS Objects

  •    Overview of Object Management Part 1

  •    Overview of Object Management Part 2

  •    Managing User Accounts Part 1

  •    Managing User Accounts Part 2

  •    Managing User Accounts Part 3

  •    Managing User Accounts Part 4

  •    Managing User Accounts Part 5

  •    Managing Groups Part 1

  •    Managing Groups Part 2

  •    Managing Groups Part 3

  •    Managing Computer Accounts Part 1

  •    Managing Computer Accounts Part 2

  •    Managing Organizational Units Part 1

  •    Managing Organizational Units Part 2

Module 3: Securing Active Directory Domain Services

  •    Managing Organizational Units Part 1

  •    Managing Organizational Units Part 2

  •    Implementing Account Security Part 1

  •    Implementing Account Security Part 2

  •    Auditing AD DS

  •    Configuring Managed Service Accounts

Module 4: Working with Complex AD Infrastructures

  •    Overview of Advanced AD DS Deployments

  •    Deploying a Distributed AD DS Environment Part 1

  •    Deploying a Distributed AD DS Environment Part 2

  •    Deploying a Distributed AD DS Environment Part 3

  •    Overview of AD DS Replication

  •    Configuring AD DS Services Part 1

  •    Configuring AD DS Services Part 2

  •    Configuring AD DS Services Part 3

Module 5: Implementing Group Policy

  •    Overview of Group Policy Part 1

  •    Overview of Group Policy Part 2

  •    Overview of Group Policy Part 3

  •    Creating and Configuring GPOs Part 1

  •    Creating and Configuring GPOs Part 2

  •    Monitoring and Troubleshooting Group Policy

  •    Managing Security Options for Computers using Group Policy Part 1

  •    Managing Security Options for Computers using Group Policy Part 2

  •    Managing User Environments Part 1

  •    Managing User Environments Part 2

  •    Managing User Environments Part 3

Module 6: Understanding Microsoft Azure AD and Directory Synchronization

  •    Planning Directory Synchronization Part 1

  •    Planning Directory Synchronization Part 2

  •    Implementing Azure AD Connect Part 1

  •    Implementing Azure AD Connect Part 2

  •    Managing Identities with Directory Synchronization

Module 7: Monitoring and Recovering AD DS

  •    Monitoring AD DS Part 1

  •    Monitoring AD DS Part 2

  •    Monitoring AD DS Part 3

  •    Database Management

  •    ackup and Recovery in AD DS Part 1

  •    Backup and Recovery in AD DS Part 2

Module 8: Implementing Active Directory Certificate Services

  •    Overview of Public Key Infrastructure and AD CS Part 1

  •    Overview of Public Key Infrastructure and AD CS Part 2

  •    Deploying Certificate Authority Hierarchy

  •    Administering Certificate Authorities

  •    Deploying and Managing Certificates Part 1

  •    Deploying and Managing Certificates Part 2

  •    Managing Revocation and Distribution

  •    Configuring Certificate Recovery

Module 9: Implementing Active Directory Federation Services

  •    Overview of AD FS

  •    Planning and Deploying AD FS

  •    Overview of Web Application Proxy

Module 10: Implementing Active Directory Rights Management Services

  •    Overview of AD RMS

  •    Deploying AD RMS

  •    Protecting with AD RMS

  •    Conclusion

Microsoft 70-741 Networking with Windows Server 2016 MCSA Course Content

Module 1: Plan and Implement IPv4 and IPv6 Networks

  •    Introduction

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6

  •    Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7

  •    Configuring IPv4 Hosts Part 1

  •    Configuring IPv4 Hosts Part 2

  •    Managing and Troubleshooting IPv4 Connectivity Part 1

  •    Managing and Troubleshooting IPv4 Connectivity Part 2

  •    Managing and Troubleshooting IPv4 Connectivity Part 3

  •    Implementing IPV6 for Network Hosts Part 1

  •    Implementing IPV6 for Network Hosts Part 2

  •    Implementing IPV6 for Network Hosts Part 3

  •    Implementing IPv6 Transitioning and Coexistence

Module 2: Installing and Configuring DHCP

  •    Overview of DHCP Server Role Part 1

  •    Overview of DHCP Server Role Part 2

  •    Deploying DHCP Part 1

  •    Deploying DHCP Part 2

  •    Deploying DHCP Part 3

  •    Deploying DHCP Part 4

  •    Deploying DHCP Part 5

  •    Managing and Troubleshooting DHCP Part 1

  •    Managing and Troubleshooting DHCP Part 2

  •    Managing and Troubleshooting DHCP Part 3

  •    Managing and Troubleshooting DHCP Part 4

  •    Managing and Troubleshooting DHCP Part 5

Module 3: Installing and Configuring DNS

  •    Implementing DNS Servers Part 1

  •    Implementing DNS Servers Part 2

  •    Implementing DNS Servers Part 3

  •    Creating and Configuring DNS Zones Part 1

  •    Creating and Configuring DNS Zones Part 2

  •    Creating and Configuring DNS Zones Part 3

  •    Creating and Configuring DNS Zones Part 4

  •    Understanding Active Directory Integration Part 1

  •    Configuring Advanced DNS Settings Part 1

  •    Configuring Advanced DNS Settings Part 2

  •    Configuring Advanced DNS Settings Part 3

  •    Troubleshooting DNS Name Resolution Part 1

  •    Troubleshooting DNS Name Resolution Part 2

Module 4: Implementing and Managing IP Address Management

  •    Overview of IPAM Part 1

  •    Overview of IPAM Part 2

  •    IPAM Deployment and Administration Part 1

  •    IPAM Deployment and Administration Part 2

  •    IPAM Deployment and Administration Part 3

  •    Managing IP Address Spaces by Using IPAM

Module 5: Implementing Remote Access

  •    Remote Access Overview Part 1

  •    Remote Access Overview Part 2

  •    Remote Access Overview Part 3

  •    Implementing the Web Application Proxy

  •    Planning and Implementing Virtual Private Networks Part 1

  •    Planning and Implementing Virtual Private Networks Part 2

  •    Planning and Implementing Virtual Private Networks Part 3

  •    Planning and Implementing Virtual Private Networks Part 4

  •    Planning and Implementing Virtual Private Networks Part 5

  •    Overview of Direct Access Part 1

  •    Overview of Direct Access Part 2

  •    Implementing Direct Access Part 1

  •    Implementing Direct Access Part 2

  •    Implementing Direct Access Part 3

Module 8: Securing the Network Infrastructure

  •    Using the Windows Firewall with Advanced Security Part 1

  •    Using the Windows Firewall with Advanced Security Part 2

  •    Utilizing IP Security Part 1

  •    Utilizing IP Security Part 2

  •    Conclusion

Adobe Introduction to Animation Course Content

Module 1: What is Animation and the Basics

  •    1.1 Introduction

  •    1.2 What is Animation - Part1

  •    1.3 What is Animation - Part2

  •    1.4 Bouncy Ball Demo - Part1

  •    1.5 Bouncy Ball Demo - Part2

  •    1.6 Bouncy Ball Demo - Part3

  •    1.7 Pendulum Demo - Part1

  •    1.8 Pendulum Demo - Part2

  •    1.9 Platform Pendulum Demo - Part1

  •    1.10 Platform Pendulum Demo - Part2

  •    1.11 Principles of Animation - Part1

  •    1.12 Principles of Animation - Part2

  •    1.13 Bouncy Ball in Perspective Demo - Part1

  •    1.14 Bouncy Ball in Perspective Demo - Part2

  •    1.15 Flag Wave Demo - Part1

Module 2: Intermediate Animation Techniques

  •    2.1 Weight Demo - Part1

  •    2.2 Weight Demo - Part2

  •    2.3 Weight Demo- Part3

  •    2.4 Breaking a Character Down Into Basic Shapes - Part1

  •    2.5 Breaking a Character Down Into Basic Shapes - Part2

  •    2.6 Breaking a Character Down Into Basic Shapes - Part3

  •    2.7 Boil Demo - Part1

  •    2.8 Boil Demo - Part2

  •    2.9 A Take Demo - Part1

  •    2.10 A Take Demo - Part2

  •    2.11 Staggering Demo - Part1

  •    2.12 Staggering Demo - Part2

  •    2.13 Staggering Demo - Part3

  •    2.15 Head Turn Demo - Part1

  •    2.16 Head Turn Demo - Part2

  •    2.17 Head Turn Demo - Part3

  •    2.18 Head Turn Demo - Part4

  •    2.19 Walk Cycles Demo - Part1

  •    2.20 Walk Cycles Demo - Part2

  •    2.21 Walk Cycles Demo - Part3

  •    2.22 Run Cycles Demo

  •    2.23 Dialogue Demo - Part1

  •    2.24 Dialogue Demo - Part2

  •    2.25 Dialogue Demo - Part3

  •    2.26 Dialogue Demo - Part4

  •    2.27 Conclusion

Adobe Premiere Pro Essential Training Course Content

Module 1: Introduction to Premiere and Getting Started on an Editing Project

  •    1.1 Course Introduction

  •    1.2 Introduction to Premiere Pro CC

  •    1.3 Creating a New Project

  •    1.4 Workspace Layout

  •    1.5 Importing Media

  •    1.6 Organizing Media

  •    1.7 Monitoring Footage

  •    1.8 Navigating the Source Monitor

  •    1.9 Creating a Sequence

  •    1.10 Editing Video Part 1

  •    1.11 Editing Video Part 2

  •    1.12 Editing with Multi Source Sequence Part 1

  •    1.13 Editing with Multi Source Sequence Part 2

  •    1.14 Editing with Multi Source Sequence Part 3

  •    1.15 Adding Titles

Module 2: More Editing Techniques and Completing a Project

  •    2.1 Editing Using Program Monitor

  •    2.2 Advanced Editing Techniques

  •    2.3 Inserting Graphics

  •    2.4 Adding Music

  •    2.5 Adjusting Audio

  •    2.6 Using The Tools In Tool Panel

  •    2.7 Trimming Using The Program Monitor

  •    2.8 Track Monitoring And Algorithm

  •    2.9 Transitions

  •    2.10 Basic Effects

  •    2.11 Manipulate Clip Speed

  •    2.12 Color Correction

  •    2.14 Exporting A Project

  •    2.15 Conclusion

Adobe Photoshop Course Content

Module 1: Tools and Effects in Photoshop

  •    1.1 Introduction

  •    1.2 Exploring the Tools and Work Area - Part1

  •    1.3 Exploring the Tools and Work Area - Part2

  •    1.4 Exploring the Tools and Work Area - Part3

  •    1.5 Exploring the Tools and Work Area - Part4

  •    1.6 Layers in Photoshop - Part1

  •    1.7 Layers in Photoshop - Part2

  •    1.8 Layers in Photoshop - Part3

  •    1.9 Crop and Transform

  •    1.10 Working with Text - Part1

  •    1.11 Working with Text - Part2

  •    1.12 Filters in Photoshop

  •    1.13 Layer Styles

  •    1.14 Adjustment Layers - Part1

  •    1.15 Adjustment Layers - Part2

Module 2: Creating Projects in Photoshop

  •    2.1 Photo Retouching Methods - Part1

  •    2.2 Photo Retouching Methods - Part2

  •    2.3 Creating a Poster Design - Part1

  •    2.4 Creating a Poster Design - Part2

  •    2.5 Creating a Poster Design - Part3

  •    2.6 Creating a Poster Design - Part4

  •    2.7 Coloring Digital Art - Part1

  •    2.8 Coloring Digital Art - Part2

  •    2.9 Coloring Digital Art - Part2

  •    2.10 Colorizing a Black and White Photo - Part1

  •    2.11 Colorizing a Black and White Photo - Part2

  •    2.12 Creating a Website Design - Part1

  •    2.13 Creating a Website Design - Part2

  •    2.14 Creating a Website Design - Part3

  •    2.15 Exporting in Photoshop

  •    2.16 Conclusion

Adobe InDesign Course Content

Module 1

  •    1.1 Introduction

  •    1.2 What is InDesign

  •    1.3 Creating a New Document

  •    1.4 Importing Images - Part1

  •    1.5 Importing Images - Part2

  •    1.6 Vector vs. Pixels

  •    1.7 Exploring the InDesign Work Area

  •    1.8 Master Pages

Module 2

  •    2.1 Typography - Part1

  •    2.2 Typography - Part2

  •    2.3 Creating Tables

  •    2.4 Packaging

  •    2.5 Principle of Design

  •    2.6 Knowing Your Output

  •    2.7 Advanced Techniques in InDesign

  •    2.8 Using InDesign for Ineractivity

  •    2.9 Scripts

  •    2.10 Exporting

  •    2.11 Conclusion

Adobe Illustrator Course Content

Module 1: Tools and Effects in Illustrator

  •    1.1 Course Introduction

  •    1.2 Introduction to Adobe Illustrator

  •    1.3 Basic Tools in Illustrator

  •    1.4 Working with Shapes

  •    1.5 Fills and Strokes

  •    1.6 Pencil Tool

  •    1.7 Pen Tool

  •    1.8 Brush Tool

  •    1.9 Compound Path

  •    1.10 Gradients

  •    1.11 Layers and Grooves

  •    1.12 Transparency and Graphic Style

  •    1.13 Transforming, Moving and Rotating Objects

  •    1.14 Type Tool

  •    1.15 Blending Shapes and Colors

  •    1.16 Basic Effects in Illustrator

  •    1.17 Image Trace Tool

Module 2: Creating Projects in Illustrator

  •    2.1 Creating a Caricature Part 1

  •    2.2 Creating a Caricature Part 2

  •    2.3 Creating a Caricature Part 3

  •    2.4 Creating a Caricature Part 4

  •    2.5 Recreating a Wonka Bar Logo Part 1

  •    2.6 Recreating a Wonka Bar Logo Part 2

  •    2.7 Creating a Logo

  •    2.8 Recreating a Pablo Picasso Painting Part 1

  •    2.9 Recreating a Pablo Picasso Painting Part 2

  •    2.10 Recreating a Pablo Picasso Painting Part 3

  •    2.11 Recreating a Pablo Picasso Painting Part 4

  •    2.12 Recreating a Pablo Picasso Painting Part 5

  •    2.13 Recreating a Pablo Picasso Painting Part 6

  •    2.14 Exporting

  •    2.15 Conclusion

Adobe After Effects - Legacy Course Content

Module 1: Introduction to After Effects

  •    1.1 Introduction

  •    1.2 What is After Effects?

  •    1.3 Creating a New Project in After Effects

  •    1.4 Creating and Animating Primitive Shapes Demo - Part1

  •    1.5 Creating and Animating Primitive Shapes Demo -Part2

  •    1.6 Simply Bouncing Ball Demo -Part1

  •    1.7 Simply Bouncy Ball Demo - Part2

  •    1.8 Complex Bouncy Ball Demo - Part1

  •    1.9 Complex Bouncing Ball Demo - Part2

  •    1.10 Exporting from After Effects

  •    1.11 Curves Editor Demo

  •    1.12 Importing Footage - Part1

  •    1.13 Importing Footage - Part2

  •    1.14 Parenting - Part1

  •    1.15 Parenting - Part2

Module 2: Intermediate Effects and Techniques in After Effects

  •    2.1 3D Layers and Cameras Demo - Part1

  •    2.2 3D Layers and Cameras Demo - Part2

  •    2.3 Animating Text Demo - Part1

  •    2.4 Animating Text Demo - Part2

  •    2.5 Animating Text Demo - Part3

  •    2.6 Animating Text Demo - Part4

  •    2.7 Importing and Syncing Audio

  •    2.8 Particles Demo - Part1

  •    2.9 Particles Demo - Part2

  •    2.10 Lights Demo

  •    2.11 Common Effects in After Effects

Module 3: More Advanced Effects and Techniques in After Effects

  •    3.1 Puppet Building Demo - Part1

  •    3.2 Puppet Building Demo - Part2

  •    3.3 Puppet Building Demo - Part3

Microsoft 70-740 Installation, Storage & Compute with Windows Server 2016 Course Content

Module 1: Installing Windows Server 2016 in Host and Compute Environments

  •    Course Introduction

  •    Determining Windows Server 2016-Part1

  •    Determining Windows Server 2016-Part2

  •    Determining Windows Server 2016-Part3

  •    Determining Windows Server 2016-Part4

  •    Determining Windows Server 2016-Part5

  •    Installing Windows 2016-Part1

  •    Installing Windows 2016-Part2

  •    Installing Windows 2016-Part3

  •    Installing Windows 2016-Part4

  •    Installing Windows 2016-Part5

  •    Managing Windows Installation With Windows PowerShell

  •    Creating Managing And Maintaining Windows Images For Deployment-Part1

  •    Creating Managing And Maintaining Windows Images For Deployment-Part2

  •    Creating Managing And Maintaining Windows Images For Deployment-Part3

  •    Creating Managing And Maintaining Windows Images For Deployment-Part4

Module 2: Configuring Active Directory Networks for Host and Compute Environments

  •    Overview Of Active Directory Domain Services-Part1

  •    Overview Of Active Directory Domain Services-Part2

  •    Overview Of Active Directory Domain Services-Part3

  •    Overview Of ADDS Domain Controllers-Part1

  •    Overview Of ADDS Domain Controllers-Part2

  •    Deploying Domain Controllers-Part1

  •    Deploying Domain Controllers-Part2

  •    Overview Of Group Policy Purpose Components And Processes-Part1

  •    Overview Of Group Policy Purpose Components And Processes-Part2

  •    Overview Of Group Policy Purpose Components And Processes-Part3

  •    Creating And Configuring GPOs-Part1

  •    Creating And Configuring GPOs-Part2

  •    Security Management Using Group Policy-Part1

  •    Security Management Using Group Policy-Part2

  •    Security Management Using Group Policy-Part3

Module 3: Implementing Local and Enterprise Storage Solutions

  •    Managing Disk And Volumes In Windows Server 2016-Part1

  •    Managing Disk And Volumes In Windows Server 2016-Part2

  •    Managing Disk And Volumes In Windows Server 2016-Part3

  •    Managing Disk And Volumes In Windows Server 2016-Part4

  •    Implementing And Managing Storage Spaces-Part1

  •    Implementing And Managing Storage Spaces-Part2

  •    Implementing And Managing Storage Spaces-Part3

  •    Configuring Data Duplication-Part1

  •    Configuring Data Duplication-Part2

  •    Understanding Various Types Of Storage

  •    Comparing SAN Options-Part1

  •    Comparing SAN Options-Part2

  •    Understanding ISNS DCB And MPIO

  •    Configuring File And Folder Sharing In Windows Server-Part1

  •    Configuring File And Folder Sharing In Windows Server-Part2

  •    Configuring File And Folder Sharing In Windows Server-Part3

  •    Configuring Advanced File Services With FSRM-Part1

  •    Configuring Advanced File Services With FSRM-Part2

  •    Configuring Advanced File Services With FSRM-Part3

Module 4: Implementing Hyper-V Virtualization and Containers

  •    Installing Hyper-V Virtualization

  •    Configuring Storage And Networking In Hyper-VHosts-Part1

  •    Configuring Storage And Networking In Hyper-VHosts-Part2

  •    Configuring And Managing Virtual Machines-Part1

  •    Configuring And Managing Virtual Machines-Part2

  •    Understanding Windows Server And Hyper-VContainers

  •    Deploying Windows Server And Hyper-VContainers

  •    Using Docker To Install Configure And Manage Containers

Module 5: Implementing High Availability

  •    Overview Of High Availability And Disaster Recovery-Part1

  •    Overview Of High Availability And Disaster Recovery-Part2

  •    Implementing Network Load Balancing-Part1

  •    Implementing Network Load Balancing-Part2

  •    Planning And Configuring Failover Clustering-Part1

  •    Planning And Configuring Failover Clustering-Part2

  •    Planning And Configuring Failover Clustering-Part3

  •    Managing A Failover Cluster

  •    Integrating Failover Clustering And Hyper-V-Part1

  •    Integrating Failover Clustering And Hyper-V-Part2

  •    Configuring Site Availability

Module 6: Maintaining and Monitoring Windows Server 2016

  •    Windows Server Update Services-Part1

  •    Windows Server Update Services-Part2

  •    Windows PowerShell Desired State Configuration

  •    Windows Server 2016 Monitoring Tools-Part1

  •    Windows Server 2016 Monitoring Tools-Part2

  •    Conclusion

Agile Project Management Course Content

Module 1: What Is Agile

  •    Course And Instructor Introduction

  •    What Is Agile - Part1

  •    What Is Agile Part2 - Agile Manifesto Principles 1-6

  •    What Is Agile Part3 - Agile Manifesto Principles 7-12

  •    What Is Agile Part4 - Agile Manifesto Values

  •    What Is Agile Part5 - Why Agile?

  •    What Is Agile - Part6 - Misconceptions about Agile

  •    What Is Agile Part7 - Agile Lifecycle

  •    What Is Agile Part8 - Key Definitions

  •    What Is Agile - Part9

Module 2: Projects And Projects Management In An Agile World

  •    Projects And Project Management In An Agile World Part 1 - Historical Information

  •    Projects And Project Management In An Agile World Part 2 - Organizational Projects

  •    Projects And Project Management In An Agile World Part 3 - Traditional Projects

  •    Projects And Project Management In An Agile World Part 4 - Roles

  •    Projects And Project Management In An Agile World Part 5 - Roles 2

Module 3: Agile and Scrum

  •    Agile And Scrum Part1 - In Depth

  •    Agile And Scrum Part2 - Major Activities

  •    Agile And Scrum Part3 - 3 Questions

  •    Agile And Scrum Part4 - Sprints

Module 4: Common Scrum Terminology

  •    Common Scrum Terminology-Part1

  •    Common Scrum Terminology-Part2

Module 5: Other Iterative Methods

  •    Other Iterative Methods

Module 6: Communication Skills In Agile World

  •    Communication Skills In Agile World Part1 - Model

  •    Communication Skills In Agile World Part2 - Verbal vs. Nonverbal

  •    Communication Skills In Agile World Part3 - Learned Patterns

  •    Communication Skills In Agile World Part4 - Key Skills

  •    Communication Skills In Agile World Part5 - Key Skills

  •    Communication Skills In Agile World Part6 - Conflict Resolution

  •    Communication Skills In Agile World Part7 - Tuckman's 5 Stages

Module 7: Using Agile Outside Software Development

  •    Using Agile Outside Software Development-Part1

  •    Using Agile Outside Software Development-Part2

Module 8: Case Studies Of Transitioning to Agile

  •    Case Studies Of Transitioning To Agile-Part1

  •    Case Studies Of Transitioning To Agile Part2 - Procurement

  •    Case Studies Of Transitioning To Agile Part3 - In an Agile World

  •    Case Studies Of Transitioning To Agile Part4 - Measurements

Module 9: Critique Of Agile

  •    Critique Of Agile-Part1

  •    Critique Of Agile-Part2

Module 10: Review Of Agile

  •    Review Of Agile-Part1

  •    Review Of Agile-Part2

  •    Review Of Agile-Part3

  •    Course Conclusion

Cisco 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 Course Content

Module 1: Configuring Ethernet LANs

  •    Introduction

  •    Ethernet LAN Fundamentals- Part 1

  •    Ethernet LAN Fundamentals- Part 2

  •    Implementing Virtual LANs- Part 1

  •    Implementing Virtual LANs- Part 2

  •    Using VLAN Trunking- Part 1

  •    Using VLAN Trunking- Part 2

  •    Understanding Spanning Tree Protocol- Part 1

  •    Understanding Spanning Tree Protocol- Part 2

  •    Understanding Spanning Tree Protocol- Part 3

  •    Spanning Tree Implementation- Part 1

  •    Spanning Tree Implementation- Part 2

  •    Spanning Tree Implementation- Part 3

  •    Security Management- Part 1

  •    Security Management- Part 2

  •    Security Management- Part 3

  •    Security Management- Part 4

Module 2: Configuring IPv4 Routing Protocols

  •    Understanding OSPF- Part 1

  •    Understanding OSPF- Part 2

  •    Understanding OSPF- Part 3

  •    Implementing OSPF- Part 1

  •    Implementing OSPF- Part 2

  •    Implementing OSPF- Part 3

  •    Implementing OSPF- Part 4

  •    Understanding EIGRP- Part 1

  •    Understanding EIGRP- Part 2

  •    Understanding EIGRP- Part 3

  •    Implementing EIGRP- Part 1

  •    Implementing EIGRP- Part 2

  •    Troubleshooting IPv4- Part 1

  •    Troubleshooting IPv4- Part 2

  •    Troubleshooting IPv4- Part 3

Module 3: Wide Area Networks

  •    Implementing Point-To-Point WANs- Part 1

  •    Implementing Point-To-Point WANs- Part 2

  •    Implementing Point-To-Point WANs- Part 3

  •    Private WANs With Ethernet And MPLS- Part 1

  •    Private WANs With Ethernet And MPLS- Part 2

  •    Private WANs With Ethernet And MPLS- Part 3

  •    Private WANs With Internet VPNs- Part 1

  •    Private WANs With Internet VPNs- Part 2

  •    Private WANs With Internet VPNs- Part 3

Module 4: IPv4 Services

  •    Basic Access Control Lists- Part 1

  •    Basic Access Control Lists- Part 2

  •    Advanced Access Control Lists- Part 1

  •    Advanced Access Control Lists- Part 2

  •    Quality Of Service- Part 1

  •    Quality Of Service- Part 2

Module 5: IPv4 Routing And Troubleshooting

  •    IPv4 Routing In The LAN- Part 1

  •    IPv4 Routing In The LAN- Part 2

  •    Implementing HSRP- Part 1

  •    Implementing HSRP- Part 2

  •    Troubleshooting IPv4 Routing- Part 1

  •    Troubleshooting IPv4 Routing- Part 2

Module 6: IPv6 Routing

  •    IPv6 Implementation And Routing Basics- Part 1

  •    IPv6 Implementation And Routing Basics- Part 2

  •    IPv6 Implementation And Routing Basics- Part 3

  •    IPv6 Implementation And Routing Basics- Part 4

  •    Implementing OSPF For IPv6- Part 1

  •    Implementing OSPF For IPv6- Part 2

  •    Implementing EIGRP For IPv6- Part 1

  •    Implementing EIGRP For IPv6- Part 2

  •    IPv6 Access Control Lists- Part 1

  •    IPv6 Access Control Lists- Part 2

Module 7: Cloud Based Networking

  •    Overview Of Cloud Computing- Part 1

  •    Overview Of Cloud Computing- Part 2

  •    Conclusion

Cisco 100-105 ICND1 Interconnecting Cisco Network Devices Part 1 Course Content

Module 1: Networking Fundamentals

  •    Introduction

  •    Introduction To TCPIP Networking- Part 1

  •    Introduction To TCPIP Networking- Part 2

  •    Introduction To TCPIP Networking- Part 3

  •    Introduction To TCPIP Networking- Part 4

  •    Ethernet LAN Fundamentals- Part 1

  •    Ethernet LAN Fundamentals- Part 2

  •    Ethernet LAN Fundamentals- Part 3

  •    Wide Area Networks- Part 1

  •    Wide Area Networks- Part 2

  •    IPv4 Addressing And Routing Fundamentals- Part 1

  •    IPv4 Addressing And Routing Fundamentals- Part 2

  •    IPv4 Addressing And Routing Fundamentals- Part 3

  •    TCPIP Transport And Applications- Part 1

  •    TCPIP Transport And Applications- Part 2

Module 2: Basic Ethernet LAN Implementation

  •    Command Line Essentials- Part 1

  •    Command Line Essentials- Part 2

  •    Command Line Essentials- Part 3

  •    Ethernet LAN Switching

  •    Managing Ethernet Switches- Part 1

  •    Managing Ethernet Switches- Part 2

  •    Configuring Switch Interfaces

Module 3: Designing Ethernet LANS

  •    Understanding LAN Design Options- Part 1

  •    Understanding LAN Design Options- Part 2

  •    Understanding LAN Design Options- Part 3

  •    Implementing And Configuring Ethernet VLANS- Part 1

  •    Implementing And Configuring Ethernet VLANS- Part 2

Module 4: Understanding IPv4

  •    IPv4 Subnetting- Part 1

  •    IPv4 Subnetting- Part 2

  •    IPv4 Subnetting- Part 3

  •    IPv4 Subnetting- Part 4

  •    Analyzing Classful IPv4 Networks- Part 1

  •    Analyzing Classful IPv4 Networks- Part 2

  •    Analyzing Classful IPv4 Networks- Part 3

  •    Analyzing Subnet Masks- Part 1

  •    Analyzing Subnet Masks- Part 2

  •    Analyzing Existing Subnets

Module 5: Working With Cisco Routers

  •    Implementing IPv4- Part 1

  •    Implementing IPv4- Part 2

  •    Configuring IPv4 Address And Static Routes- Part 1

  •    Configuring IPv4 Address And Static Routes- Part 2

  •    Configuring IPv4 Address And Static Routes- Part 3

  •    Using Dynamic Routing Protocols- Part 1

  •    Using Dynamic Routing Protocols- Part 2

  •    Configuring IPv4 Hosts- Part 1

  •    Configuring IPv4 Hosts- Part 2

Module 6: IPv4 Design And Troubleshooting

  •    Designing IP Subnets- Part 1

  •    Designing IP Subnets- Part 2

  •    Using VLAN- Part 1

  •    Using VLAN- Part 2

  •    Troubleshooting IPv4

Module 7: IPv4 Services

  •    Access Control Lists- Part 1

  •    Access Control Lists- Part 2

  •    Access Control Lists- Part 3

  •    Access Control Lists- Part 4

  •    Network Address Translation- Part 1

  •    Network Address Translation- Part 2

Module 8: Implementing IPv6

  •    IPv6 Fundamentals- Part 1

  •    IPv6 Fundamentals- Part 2

  •    IPv6 Fundamentals- Part 3

  •    IPv6 Fundamentals- Part 4

  •    IPv6 Addressing And Subnetting- Part 1

  •    IPv6 Addressing And Subnetting- Part 2

  •    Implementing IPv6- Part 1

  •    Implementing IPv6- Part 2

  •    Implementing IPv6- Part 3

  •    Implementing IPv6- Part 4

  •    Course Conclusion

Cisco 210-060 CICD: Implementing Cisco Collaboration Devices Course Content

Module 1: Introducing Cisco Collaboration Architecture

  •    Course Introduction

  •    Introducing Cisco Collaboration Architecture Part 1

  •    Introducing Cisco Collaboration Architecture Part 2

  •    Small To Mid-Size Business Part 1

  •    Small To Mid-Size Business Part 2

  •    Small To Mid-Size Business Part 3

  •    Cisco Unified Communications Manager Part 1

  •    Cisco Unified Communications Manager Part 2

  •    Cisco Unified Communications Manager Part 3

  •    Cisco Unified Connection

  •    Lab Introduction

Module 2: Telephony And Call Routing

  •    Telephony 101 Part 1

  •    Telephony 101 Part 2

  •    Telephony 101 Part 3

  •    Telephony 101 Part 4

  •    Telephony 101 Part 5

  •    Telephony 101 Part 6

  •    Call Routing 101 Part 1

  •    Call Routing 101 Part 2

  •    VoIP Call Routing 101

  •    Call Routing With DNS

  •    Deployment Scenarios Part 1

  •    Deployment Scenarios Part 2

  •    Deployment Scenarios Part 3

  •    Gateway Call Routing Basics Part 1

  •    Gateway Call Routing Basics Part 2

  •    Gateway Call Routing Basics Part 3

  •    Gateway Call Routing Basics Part 4

  •    Configuring The Gateway Lab Part 1

  •    Configuring The Gateway Lab Part 2

Module 3: Preparing The Network And Phone Behavior

  •    Preparing The Network For Voices Part 1

  •    Preparing The Network For Voices Part 2

  •    IP Phone Behavior

  •    Configuring The LAN Lab

  •    Standing Up The Platform Lab

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6

  •    Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7

  •    Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1

  •    Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2

Module 4: CUCM Administration Interfaces

  •    CUCM Administration Interfaces Part 1

  •    CUCM Administration Interfaces Part 2

  •    CUCM Stand Up

  •    CUCM Stand Up Lab

  •    End User Interfaces

  •    End User Configuration Lab

  •    AD Integration Lab

  •    End Point Implementation Part 1

  •    End Point Implementation Part 2

  •    IMP Integration Lab

  •    CUC Integration Lab Part 1

  •    CUC Integration Lab Part 2

  •    IP Communicator Lab

  •    Profiles And Templates Lab

  •    CUCME Phone Configuration

  •    Configuring CUCME Lab Part 1

  •    Configuring CUCME Lab Part 2

  •    CUCM End-User Portal Lab

  •    Configuring CUCM Phones From Scratch

  •    Configuring Cisco SX20 Codec Part 1

  •    Configuring Cisco SX20 Codec Part 2

Module 5: Call Configuration

  •    Advanced Call Coverage Part 1

  •    Advanced Call Coverage Part 2

  •    Advanced Call Coverage Part 3

  •    Call Coverage Lab Part 1

  •    Call Coverage Lab Part 2

  •    Call Coverage Lab Part 3

  •    Call Coverage Lab Part 4

  •    Call Coverage Lab Part 5

  •    Calling Constrictions And COS Part 1

  •    Calling Constrictions And COS Part 2

  •    Implementing Class Of Control Lab Part 1

  •    Implementing Class Of Control Lab Part 2

  •    Connecting To The PSTN Part 1

  •    Configuring Voice Gateway Features Lab Part 1

  •    Configuring Voice Gateway Features Lab Part 2

  •    Configuring Voice Gateway Features Lab Part 3

  •    Connecting To The PSTN Part 2

  •    PSTN Calling And Digit Manipulation Lab Part 1

  •    PSTN Calling And Digit Manipulation Lab Part 2

  •    PSTN Dial Plan Configuration Lab Part 1

  •    PSTN Dial Plan Configuration Lab Part 2

  •    Course Conclusion

Java Programming Course Content

Module 1: Foundations (Beginner)

  •    Introduction

  •    History Of Computer Programming

  •    Categories Of Programming Languages

  •    Condensed History Of Java

  •    Software Life Cycle

Module 2: Terms and Tools (Beginner)

  •    Programming General Terms

  •    Downloading And Installing Java

  •    Programmer Editors And Integrated Development Environments Part 1

  •    Programmer Editors And Integrated Development Environments Part 2

  •    Installing Eclipse

Module 3: Identifiers, Variables, and Data Types (Beginner)

  •    Understanding Identifiers

  •    Unicode And Java Syntax

  •    Variables Constants And Literals

  •    Field Member And Variable Components

  •    Primitive Data Types Part 1

  •    Primitive Data Types Part 2

  •    Primitive Data Types Part 3

  •    Operators Part 1

  •    Operators Part 2

  •    Escape Characters

  •    Type Conversions And Type Casting

  •    Java Reserved Words

  •    Commenting

  •    Abstract Data Types

Module 4: Object-Orientated Programming (Intermediate)

  •    Object Oriented Programming

  •    What Is An Object?

  •    Eclipse Lab

Module 5: Predefined Classes (Intermediate)

  •    String Class Part 1

  •    String Class Part 2

  •    String Class Part 3

  •    Date Class

  •    Simple Date Format Class

  •    Scanner Class Part 1

  •    Scanner Class Part 2

  •    Decimal Format Class Part 1

  •    Decimal Format Class Part 2

  •    JFrame Class

  •    Container Class Part 1

  •    Container Class Part 2

Module 6: Methods Part 1 (Intermediate)

  •    Methods

  •    Naming Methods

  •    Implementation Method Hiding

  •    Method Variables And Literals

  •    Invoking A Method

Module 7: Methods Part 2 (Advanced)

  •    Methods And Multiple Arguments

  •    Methods Lab

  •    Method Overloading

Module 8: Constructors (Advanced)

  •    Creating Objects

  •    Constructor Declarations

  •    Overloading And Default Constructors

Module 9: Control of Flow (Advanced)

  •    While Loop

  •    While Statement

  •    For Loop

Module 10: Arrays and Exceptions (Advanced)

  •    Array Structures

  •    Constants And Array Sizes Part 1

  •    Constants And Array Sizes Part 2

  •    Exceptions And The Try Catch Block

  •    Conclusion

Cisco 210-065 CIVND: Implementing Cisco Video Network Devices Course Content

Module 1: Pre-Course Chapter 1

  •    Course Introduction

  •    Civnd Intro Part 1

  •    Civnd Intro Part 2

  •    The Big Picture

Module 2: Pre-Course Chapter 2

  •    All About Video Part 1

  •    All About Video Part 2

  •    All About Video Part 3

  •    All About Video Part 4

Module 3: Cisco Video And Content Delivery

  •    Cisco Video And Content Delivery Part 1

  •    Cisco Video And Content Delivery Part 2

  •    Cisco Video And Content Delivery Part 3

Module 4: Cisco Video Surveillance

  •    Cisco Video Surveillance Part 1

  •    Cisco Video Surveillance Part 2

Module 5: Cisco Collaboration

  •    Cisco Collaboration Part 1

  •    Cisco Collaboration Part 2

  •    Cisco Collaboration Part 3

Module 6: Central Collaboration Endpoint Control

  •    Central Collaboration Endpoint Control

Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber

  •    Unified IP Phones Desk Endpoints And Cisco Jabber

Module 8: Configuring Unified IP Phones And Cisco Jabber

  •    Configuring Unified IP Phones And Cisco Jabber Part 1

  •    Configuring Unified IP Phones And Cisco Jabber Part 2

Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber

  •    Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1

  •    Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2

  •    Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3

Module 10: Cisco Telepresence Endpoints Installation And Characteristics

  •    Cisco Telepresence Endpoints Installation And Characteristics Part 1

  •    Cisco Telepresence Endpoints Installation And Characteristics Part 2

  •    Cisco Telepresence Endpoints Installation And Characteristics Part 3

  •    Cisco Telepresence Endpoints Installation And Characteristics Part 4

Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints

  •    Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1

  •    Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2

Module 12: Configuring Cisco Telepresence TC Endpoints

  •    Configuring Cisco Telepresence TC Endpoints Part 1

  •    Configuring Cisco Telepresence TC Endpoints Part 2

  •    Configuring Cisco Telepresence TC Endpoints Part 3

  •    Configuring Cisco Telepresence TC Endpoints Part 4

  •    Configuring Cisco Telepresence TC Endpoints Part 5

  •    Configuring Cisco Telepresence TC Endpoints Part 6

Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints

  •    Operating And Troubleshooting Cisco Telepresence Endpoints Part 1

  •    Operating And Troubleshooting Cisco Telepresence Endpoints Part 2

  •    Operating And Troubleshooting Cisco Telepresence Endpoints Part 3

  •    Operating And Troubleshooting Cisco Telepresence Endpoints Part 4

  •    Operating And Troubleshooting Cisco Telepresence Endpoints Part 5

Module 14: Cisco Multipoint Conferencing Solutions

  •    Cisco Multipoint Conferencing Solutions Part 1

  •    Cisco Multipoint Conferencing Solutions Part 2

  •    Cisco Multipoint Conferencing Solutions Part 3

Module 15: Configuring And Monitoring Cisco Multipoint

  •    Configuring And Monitoring Cisco Multipoint Part 1

  •    Configuring And Monitoring Cisco Multipoint Part 2

Module 16: Cisco DMP Characteristics And Installation

  •    Cisco DMP Characteristics And Installation Part 1

  •    Cisco DMP Characteristics And Installation Part 2

Module 17: Configuring Cisco DMPs

  •    Configuring Cisco DMP's

Module 18: Managing Cisco Edge 340 DMPs

  •    Managing Cisco Edge340 DMPs

  •    Course Conclusion

Module 19: Labs

  •    Basic Switch Port Configuration

  •    Dashboard Options Part 1

  •    Dashboard Options Part 2

  •    Preparations For Endpoints Part 1

  •    Preparations For Endpoints Part 2

  •    Preparations For Endpoints Part 3

  •    Preparations For Endpoints Part 4

  •    Basic Troubleshooting

  •    Setup TC Endpoint Part 1

  •    Setup TC Endpoint Part 2

  •    Setup TC Endpoint Part 3

  •    Setup TC Endpoint Part 4

Microsoft Word 2016 Course Content

Word 2016 Basic

  •    Introduction To Word Interface Part1

  •    Introduction To Word Interface Part2

  •    Introduction To Word Interface Part3

  •    View

  •    Typing Part1

  •    Typing Part2

  •    Typing Part3

  •    Typing Part4

  •    Resume Part1

  •    Resume Part2

  •    Bullet List

Word 2016 Intermediate

  •    Menus And Keyboard Shortcuts Part1

  •    Menus And Keyboard Shortcuts Part2

  •    Tabs

  •    Tables Part1

  •    Tables Part2

  •    Tables Part3

  •    Styles Part1

  •    Styles Part2

  •    Styles Part3

  •    Page Formatting Part1

  •    Page Formatting Part2

  •    Page Formatting Part3

Word 2016 Advanced

  •    Creating An Outline

  •    Inserting Images Part1

  •    Inserting Images Part2

  •    Tracking Changes

  •    Mail Merge Part1

  •    Mail Merge Part2

  •    Large Documents Part1

  •    Large Documents Part2

  •    Other Word Functions Part1

  •    Other Word Functions Part2

  •    Document Comparison

Microsoft PowerPoint 2016 Course Content

Basic Microsoft PowerPoint 2016

  •    What Is PowerPoint Part 1

  •    What Is PowerPoint Part 2

  •    New Presentation

  •    Viewing Presentation

  •    Inserting Transitions

  •    More Visual Designs Part 1

  •    More Visual Designs Part 2

  •    More Visual Designs Part 3

  •    More Visual Designs Part 4

  •    Notes

Intermediate Microsoft PowerPoint 2016

  •    Visual Designs With Logos And Animation Part1

  •    Visual Designs With Logos And Animation Part2

  •    Visual Designs With Logos And Animation Part3

  •    Visual Designs With Logos And Animation Part4

  •    Visual Designs With Logos And Animation Part5

  •    Exit Animation Part1

  •    Exit Animation Part2

  •    Exit Animation Part3

  •    Navigation Buttons

  •    Layout Options Part1

  •    Layout Options Part2

Advanced Microsoft PowerPoint 2016

  •    Master Pages Part1

  •    Master Pages Part2

  •    Software Simulation Part1

  •    Software Simulation Part2

  •    Setting Pictures To Music

  •    Advanced Animation Techniques

  •    Triggers

  •    Motion Path Animation

  •    Video In PowerPoint

  •    PowerPoint Review Part1

  •    PowerPoint Review Part2

  •    Additional Options

Microsoft Outlook 2016 Course Content

Outlook 2016 Basic

  •    Introduction Part 1

  •    Introduction Part 2

  •    Options For Displaying Email Messages

  •    Create And Send An Email

  •    Receive An Email

  •    Calendar Part 1

  •    Calendar Part 2

  •    Contacts Part 1

  •    Contacts Part 2

  •    Tasks

Outlook 2016 Intermediate

  •    Folder Structure Part

  •    Folder Structure Part 2

  •    Multiple Email Accounts Part 1

  •    Multiple Email Accounts Part 2

  •    Create A New Email Part 1

  •    Create A New Email Part 2

  •    Signatures

  •    Calendars Part 1

  •    Calendars Part 2

  •    Contacts

  •    Outlook Settings Part 1

  •    Outlook Settings Part 2

Outlook 2016 Advanced

  •    One Note Introduction Part 1

  •    One Note Introduction Part 2

  •    One Note And PowerPoint

  •    One Note And Word

  •    One Note And Outlook

  •    Sharing Information

  •    OneNote And Mobile Devices

  •    Additional Elements Part 1

  •    Additional Elements Part 2

Microsoft Excel 2016 Course Content

Excel 2016 Basic

  •    Tabs And Ribbons Part1

  •    Tabs And Ribbons Part2

  •    Cells Part1

  •    Cells Part2

  •    Cells Part3

  •    Cells Part4

  •    Calculations Part1

  •    Calculations Part2

  •    Calculations Part3

  •    Printing Part1

  •    Printing Part2

Excel 2016 Intermediate

  •    Menus And Keyboard Shortcuts Part1

  •    Menus And Keyboard Shortcuts Part2

  •    Menus And Keyboard Shortcuts Part3

  •    Tabs Part1

  •    Tabs Part2

  •    Formulas And Calculations Part1

  •    Formulas And Calculations Part2

  •    Formulas And Calculations Part3

  •    Formulas And Calculations Part4

  •    Importing Data Part1

  •    Importing Data Part2

  •    Invoices

Excel 2016 Advanced

  •    Advanced Invoice Part1

  •    Advanced Invoice Part2

  •    Advanced Invoice Part3

  •    Advanced Invoice Part4

  •    Number Crunching

  •    Creating A Pivot Table From Scratch

  •    Smaller Excel Components Part1

  •    Smaller Excel Components Part2

  •    Smaller Excel Components Part3

Microsoft Access 2016 Course Content

Access 2016 Basic

  •    Introduction Part1

  •    Introduction Part2

  •    Elements Part1

  •    Elements Part2

  •    Reviewing Data

  •    Queries Part1

  •    Queries Part2

  •    Tracking Time Part1

  •    Tracking Time Part2

  •    Tracking Time Part3

  •    Design Work With Forms

Access 2016 Intermediate

  •    Relationships Part1

  •    Relationships Part2

  •    Changing Information

  •    Loading Tables

  •    Relating Invoices Part1

  •    Relating Invoices Part2

  •    Relating Invoices Part3

  •    Relating Invoices Part4

  •    Time Entry Form

Access 2016 Advanced

  •    Queries Part1

  •    Queries Part2

  •    Queries Part3

  •    Queries Part4

  •    Reports Based On Queries

  •    Adding Additional Information

  •    Update Query Part1

  •    Update Query Part2

  •    Creating A Report From Scratch Part1

  •    Creating A Report From Scratch Part2

  •    Creating A Report From Scratch Part3

Cisco 210-260 IINS: Implementing Cisco Network Security Course Content

Module 1: Network Review

  •    Course Introduction

  •    Network Review Part 1

  •    Network Review Part 2

  •    Network Review Part 3

  •    Network Review Part 4

Module 2: Terminology And Fundamentals

  •    Terminology And Fundamentals Part 1

  •    Terminology And Fundamentals Part 2

  •    Terminology And Fundamentals Part 3

  •    Terminology And Fundamentals Part 4

  •    Terminology And Fundamentals Part 5

  •    Terminology And Fundamentals Part 6

  •    Terminology And Fundamentals Part 7

Module 3: PKI And Cryptography

  •    Pki And Cryptography Part 1

  •    Pki And Cryptography Part 2

Module 4: AAA

  •    AAA Part 1

  •    AAA Part 2

  •    AAA Part 3

Module 5: Bring Your Own Device

  •    Bring Your Own Device Part 1

  •    Bring Your Own Device Part 2

  •    Bring Your Own Device Part 3

Module 6: Secure Access

  •    Secure Access Part 1

  •    Secure Access Part 2

  •    Secure Access Part 3

  •    Secure Access Demo

Module 7: VPNs

  •    VPN Concepts Part 1

  •    VPN Concepts Part 2

  •    Remote Access VPNs Part 1

  •    Remote Access VPNs Part 2

  •    Site To Site VPNs

Module 8: Secure Routing And Switching

  •    Secure Routing And Switching Part 1

  •    Secure Routing And Switching Part 2

  •    Secure Routing And Switching Demo 1

  •    Secure Routing And Switching Demo 2

  •    Layer2 Attacks Part 1

  •    Layer2 Attacks Part 2

  •    Layer2 Attacks Part 3

  •    Mitigation Part 1

  •    Mitigation Part 2

Module 9: Firewalls

  •    Firewall Technologies Part 1

  •    Firewall Technologies Part 2

  •    Implementing Nat Part 1

  •    Implementing Nat Part 2

  •    Zone Based Firewall

  •    Firewall Features On The ASA Part 1

  •    Firewall Features On The ASA Part 2

  •    Firewall Features On The ASA Part 3

Module 10: Intrusion Protection System (IPS)

  •    Intrusion Protection System Part 1

  •    Intrusion Protection System Part 2

Module 11: Content And Endpoint Security

  •    Content And Endpoint Security Part 1

  •    Content And Endpoint Security Part 2

  •    Course Conclusion

Cisco 200-355: Implementing Cisco Wireless Network Fundamentals Course Content

Module 1: Wireless Basics

  •    Course And Instructor Introduction

  •    Wireless Basics Part 1

  •    Wireless Basics Part 2

  •    Wireless Basics Part 3

  •    Wireless Basics Part 4

  •    Wireless Basics Part 5

  •    Wireless Basics Part 6

Module 2: Wireless Standards

  •    Wireless Standards Part 1

  •    Wireless Standards Part 2

  •    Wireless Standards Part 3

  •    Wireless Standards Part 4

  •    Wireless Standards Part 5

Module 3: Wireless Signals

  •    Wireless Signals Part 1

  •    Wireless Signals Part 2

Module 4: Antennas

  •    Antennas Part 1

  •    Antennas Part 2

  •    Antennas Part 3

Module 5: Topologies

  •    Topologies Part 1

  •    Topologies Part 2

Module 6: Frame Types

  •    Frame Types Part 1

  •    Frame Types Part 2

  •    Frame Types Part 3

Module 7: Planning Coverage

  •    Planning Coverage Part 1

  •    Planning Coverage Part 2

  •    Planning Coverage Part 3

Module 8: Architectures

  •    Architectures Part 1

  •    Architectures Part 2

  •    Architectures Part 3

Module 9: Stand Alone And Cloud Deployments

  •    Stand Alone And Cloud Deployments Part 1

  •    Stand Alone And Cloud Deployments Part 2

Module 10: Controller Based Deployment

  •    Controller Based Deployment Part 1

  •    Controller Based Deployment Part 2

  •    Controller Based Deployment Part 3

Module 11: Controller Discovery

  •    Controller Discovery Part 1

  •    Controller Discovery Part 2

  •    Controller Discovery Part 3

Module 12: Roaming

  •    Roaming Part 1

  •    Roaming Part 2

Module 13: Radio Resource Management

  •    Radio Resource Management Part 1

  •    Radio Resource Management Part 2

  •    Radio Resource Management Part 3

Module 14: Wireless Security

  •    Wireless Security Part 1

  •    Wireless Security Part 2

  •    Wireless Security Part 3

Module 15: WLAN Configuration

  •    WLAN Configuration

Module 16: Guest Networks

  •    Guest Networks

Module 17: Client Connectivity

  •    Client Connectivity Part 1

  •    Client Connectivity Part 2

Module 18: Managing Wireless

  •    Managing Wireless Part 1

  •    Managing Wireless Part 2

Module 19: Interference

  •    Interference Part 1

  •    Interference Part 2

Module 20: Troubleshooting

  •    Troubleshooting Part 1

  •    Troubleshooting Part 2

  •    Course Conclusion

Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions Course Content

Module 1: Overview of SharePoint Development

  •    Course Introduction

  •    Introduction To SharePoint Development Part1

  •    Introduction To SharePoint Development Part2

  •    Introduction To SharePoint Development Part3

  •    Choosing A Development Approach Part1

  •    Choosing A Development Approach Part2

  •    SharePoint 2013 Deployment And Execution Models Part1

  •    SharePoint 2013 Deployment And Execution Models Part2

  •    SharePoint 2013 Deployment And Execution Models Part3

Module 2: Working With Objects, List, And Libraries

  •    Introduction To The SharePoint Object Hierarchy Part1

  •    Introduction To The SharePoint Object Hierarchy Part2

  •    Working With Sites And Webs Part1

  •    Working With Sites And Webs Part2

  •    Working With Sites And Webs Part3

  •    Working With Sites And Webs Part4

  •    Managing Execution Contexts Part1

  •    Managing Execution Contexts Part2

  •    Using Lists And Library Objects Part1

  •    Using Lists And Library Objects Part2

  •    Querying And Retrieving Data From Lists Part1

  •    Querying And Retrieving Data From Lists Part2

  •    Querying And Retrieving Data From Lists Part3

  •    Working With Large Lists Part1

  •    Working With Large Lists Part2

Module 3: Working With Features and Solutions

  •    Introduction To Features

  •    Introduction To Solutions

  •    Creating And Configuring Features And Solutions Part1

  •    Creating And Configuring Features And Solutions Part2

  •    Creating And Configuring Features And Solutions Part3

  •    Creating And Configuring Features And Solutions Part4

  •    Using Sandboxed Solutions

Module 4: Developing Server Side Code

  •    Web Parts

  •    Event Receivers Part1

  •    Event Receivers Part2

  •    Timer Jobs

  •    Storing Configuration Data Part1

  •    Storing Configuration Data Part2

Module 5: Managing Authentication And Authorization

  •    Introduction To Identity Management

  •    Managing Permissions

  •    Configuring Forms Based Authentication

  •    Working With Custom Authentication Part1

  •    Working With Custom Authentication Part2

  •    Working With Custom Authentication Part3

Module 6: Client Side SharePoint Development

  •    Using The CSOM For Managed Code Part1

  •    Using The CSOM For Managed Code Part2

  •    Using The CSOM For Managed Code Part3

  •    Using The CSOM For JavaScript

  •    Using The Rest API With JavaScript Part1

  •    Using The Rest API With JavaScript Part2

Module 7: Developing And Managing Apps

  •    Overview Of Apps For SharePoint Part1

  •    Overview Of Apps For SharePoint Part2

  •    Developing Apps For SharePoint

  •    Overview Of Remote Hosted Apps

  •    Configuring Remote Hosted Apps

  •    Developing Remote Hosted Apps Part1

  •    Developing Remote Hosted Apps Part2

  •    Publishing And Distributing Apps Part1

  •    Publishing And Distributing Apps Part2

  •    Publishing And Distributing Apps Part3

Module 8: Using Workflows To Automate Business Processes

  •    Overview Of Workflows In SharePoint 2013

  •    Building Workflows Part1

  •    Building Workflows Part2

  •    Developing Workflows Part1

  •    Developing Workflows Part2

Module 9: Customizing SharePoint Interfaces

  •    Working With Custom Actions

  •    Using Client-Side Interface Components

  •    Customizing The SharePoint List User Interface

  •    Course Conclusion

Microsoft 70-489: Developing Sharepoint 2013 Advanced Solutions Course Content

Module 1: Introduction To Creating Efficient Apps For Sharepoint

  •    Course And Instructor Introduction

  •    Apps For SharePoint Part1

  •    Apps For SharePoint Part2

  •    Communication From Apps To SharePoint Part1

  •    Communication From Apps To SharePoint Part2

  •    Authentication And Authorization Part1

  •    Authentication And Authorization Part2

  •    Designing Apps For Performance Part1

  •    Designing Apps For Performance Part2

  •    Designing Apps For Performance Part3

Module 2: Working With Managed Metadata Solutions

  •    Overview Of Managed Metadata Part1

  •    Overview Of Managed Metadata Part2

  •    Configuring Managed Metadata Term Sets Part1

  •    Configuring Managed Metadata Term Sets Part2

  •    Configuring Managed Metadata Term Sets Part3

  •    Configuring Managed Metadata Term Sets Part4

  •    Working With Managed Metadata Fields Part1

  •    Working With Managed Metadata Fields Part2

Module 3: Working With The Search Service

  •    Overview Of The SharePoint 2013 Search Service Part1

  •    Overview Of The SharePoint 2013 Search Service Part2

  •    Overview Of The SharePoint 2013 Search Service Part3

  •    Building Search Queries

  •    Using Code To Execute Search Queries Part1

  •    Using Code To Execute Search Queries Part2

  •    Customizing Query Processing Part1

  •    Customizing Query Processing Part2

  •    Customizing Search Results Part1

  •    Customizing Search Results Part2

  •    Customizing Content Processing Part1

  •    Customizing Content Processing Part2

Module 4: Implementing Enterprise Content Management

  •    Working With eDiscovery Part1

  •    Working With eDiscovery Part2

  •    Working With Content Management Part1

  •    Working With Content Management Part2

  •    Handling Automated Records Management Part1

  •    Handling Automated Records Management Part2

  •    Handling Automated Records Management Part3

Module 5: Developing Publishing Sites

  •    Introduction To Developing Publishing Solutions

  •    Developing Page Components For Web Content Publishing Part1

  •    Developing Page Components For Web Content Publishing Part2

  •    Developing Page Components For Web Content Publishing Part3

  •    Website Structure And Navigation Part1

  •    Website Structure And Navigation Part2

  •    Website Structure And Navigation Part3

  •    Publishing Content

  •    Publishing To Mobile Devices

  •    Optimizing For Search Engines Part1

  •    Optimizing For Search Engines Part2

  •    Optimizing Performance And Availability Part1

  •    Optimizing Performance And Availability Part2

Module 6: Interacting With Business Connectivity Services

  •    Overview Of Business Connectivity Services

  •    Creating BDC Models

  •    Creating An App Scoped External Content Type

  •    Conclusion

Information Technology Infrastructure Library (ITIL®) - Service Operations Course Content

Module 1: Service Operation Introduction

  •    Introduction

  •    Syllabus Exam Overview And Testing Tips

  •    Service Operation Introduction Part 1

  •    Service Operation Introduction Part 2

  •    Service Operation Introduction Part 3

  •    Service Operation Introduction Part 4

  •    Service Operation Introduction Part 5

Module 2: Service Management As a Practice

  •    Service Management As A Practice Part 1

  •    Service Management As A Practice Part 2

  •    Service Management As A Practice Part 3

Module 3: Service Operation Principles

  •    Service Operation Principles Part 1

  •    Service Operation Principles Part 2

  •    Service Operation Principles Part 3

  •    Service Operation Principles Part 4

Module 4: Service Operation Process

  •    Service Operation Process Part 1

  •    Service Operation Process Part 2

  •    Service Operation Process Part 3

  •    Incident Management Part 1

  •    Incident Management Part 2

  •    Problem Management

  •    Request Fulfillment

  •    Access Management

Module 5: Common Service Operation Activities

  •    Common Service Operation Activities Part 1

  •    Common Service Operation Activities Part 2

  •    Common Service Operation Activities Part 3

  •    Common Service Operation Activities Part 4

Module 6: Organizing For Service Operation

  •    Organizing For Service Operation Part 1

  •    Organizing For Service Operation Part 2

  •    Organizing For Service Operation Part 3

  •    Roles Part 1

  •    Roles Part 2

Module 7: Technology Considerations

  •    Technology Considerations

Module 8: Service Operation

  •    Implementation Of Service Operation

  •    Challenges Risks And Critical Success Factors

  •    Conclusion

CSS Essentials Course Content

Module 1: Introduction to CSS3

  •    Introduction

  •    The Advantages Of Style Sheets

  •    Discovering Cascading Style Sheets

  •    CSS Structure And Syntax Part1

  •    CSS Structure And Syntax Part2

  •    CSS Structure And Syntax Part3

  •    Using Different Kinds Of Style Sheets

Module 2: Understanding The CSS Box Model

  •    What Is The Box Model

  •    Height And Width

  •    Margin And Padding

  •    Working With Borders

Module 3: Working With Page Layouts

  •    Positioning Elements

  •    Floating Elements

  •    Controlling Display And Visibility

Module 4: Using Colors And Backgrounds

  •    Working With Colors

  •    Working With Backgrounds

Module 5: Web Typography

  •    Understanding Fonts

  •    Working With Text Properties

  •    Text And Shadow Effects Part1

  •    Text And Shadow Effects Part2

Module 6: Links, Lists, And Tables

  •    Working With Lists

  •    Using Navigation Bars

  •    Working With Tables Part1

  •    Working With Tables Part2

Module 7: Dynamic CSS3 Properties

  •    Using Transforms Part1

  •    Using Transforms Part2

  •    Using Transitions

  •    Using Animations

  •    CSS Project Part1

  •    CSS Project Part2

  •    Course Conclusion

Javascript Essentials Course Content

Module 1: Introduction To Javascript

  •    Introduction

  •    Java Script From The Dawn Of The Web Part 1

  •    Java Script From The Dawn Of The Web Part 2

  •    Getting The Right Tools

  •    Creating Your First JavaScript Program Part 1

  •    Creating Your First JavaScript Program Part 2

Module 2: Core Concepts And Syntax

  •    The Structure And Content Part 1

  •    The Structure And Content Part 2

  •    Naming And Casing Best Practices

  •    Understanding Variables Part 1

  •    Understanding Variables Part 2

  •    Understanding Variables Part 3

  •    Working With Operators Part 1

  •    Working With Operators Part 2

  •    Working With Loops Part 1

  •    Working With Loops Part 2

  •    Creating Functions Part 1

  •    Creating Functions Part 2

  •    Understanding Types And Objects Part 1

  •    Understanding Types And Objects Part 2

  •    Understanding Types And Objects Part 3

  •    Understanding Types And Objects Part 4

  •    Understanding Types And Objects Part 5

Module 3: Getting A Handle On The DOM

  •    Introduction To The HTML Document Object Model

  •    Accessing DOM Elements

  •    Changing DOM Elements

  •    Creating DOM Elements

  •    Responding To Events Part 1

  •    Responding To Events Part 2

Module 4: Working With Libraries

  •    Introduction To Libraries

  •    Installing And Using jQuery Part 1

  •    Installing And Using jQuery Part 2

  •    Modifying Web Pages Using jQuery Part 1

  •    Modifying Web Pages Using jQuery Part 2

  •    Conclusion

HTML Essentials Course Content

Module 1: What Is HTML?

  •    Introduction

  •    What Is HTML

  •    HTML Resources

  •    Choosing A Code Editor

  •    The Relationship Of HTML, CSS And JavaScript

Module 2: The Structure And Components

  •    The HTML Document

  •    DOCTYPE Declaration

  •    The Head

  •    The Body

  •    The Footer

Module 3: Formatting The Page

  •    Using Headings

  •    Creating Paragraphs

  •    Emphasizing Text

  •    Controlling Line Breaks And Whitespace

  •    Creating Lists

  •    Working With Tables

Module 4: Structuring Content

  •    Why Structure Matters

  •    Controlling Document Outlines

  •    Structure Elements Part 1

  •    Structure Elements Part 2

Module 5: Adding Links, Images And Other Media

  •    Working With Links Part 1

  •    Working With Links Part 2

  •    Working With Images Part 1

  •    Working With Images Part 2

Module 6: Styling Web Pages

  •    HTML And CSS

  •    Creating Inline Styles

  •    Controlling Typography

  •    Adding Color

  •    Externalizing Styles

Module 7: Creating Your Own Website

  •    Creating A Website Part 1

  •    Creating A Website Part 2

  •    Conclusion

Cyber Security Awareness and Prevention Course Content

Module 1: Cyber Security Awareness and Prevention

  •    Course Introduction

  •    Where We Are Today

  •    Areas Of Protection

  •    The Connection - Part 1

  •    The Connection - Part 2

  •    Network Protection

  •    Browsing Blunders - Part 1

  •    Browsing Blunders - Part 2

  •    Settings - Part 1

  •    Settings - Part 2

  •    Settings - Part 3

  •    Settings - Part 4

  •    Cookies

  •    Browsing Tips And Tricks

  •    Email Can't Hurt You Right - Part 1

  •    Email Can't Hurt You Right - Part 2

  •    Viruses - Part 1

  •    Viruses - Part 2

  •    Viruses - Part 3

Module 2: Managing Mobile Device Security

  •    Managing Mobile Device Security-Part1

  •    Managing Mobile Device Security-Part2

  •    Secure Access

  •    Secure Access iPhone Demo

  •    Secure Access Android Demo

  •    Protect The Digital

  •    Protect The Digital Android Demo

  •    Protect The Digital iPhone Demo

  •    Manage App Access

  •    Manage App Access iPhone Demo

  •    Manage App Access Android Demo

  •    Stay Up To Date

  •    Stay Up To Date Android Demo

  •    Stay Up To Date iPhone Demo

  •    Use Other Tools To Help

  •    Prepare For The Worst

  •    Prepare For The Worst-Android Demo

  •    Prepare For The Worst-iPhone Demo

  •    Best Practices

  •    Course Conclusion

Microsoft 70-486: Developing ASP.NET MVC Web Applications Course Content

Module 1: Introduction to Web Development

  •    Course And Instructor Introduction

  •    ASP.Net Using Visual Studio

  •    ASP.Net Tools In Visual Studio

  •    ASP.Net Data Validation-Part1

  •    ASP.Net Data Validation-Part2

  •    ASP.Net Web User Control

  •    ASP.Net Creating Web Service

  •    ASP.Net Web Service Explained

  •    Classes Defined

Module 2: C ­ Sharp

  •    Intro To C Sharp

  •    Functions In C Sharp

  •    If Statements In C Sharp

  •    Static Variables In C Sharp

  •    Loops In C Sharp

  •    Debugging In C Sharp

  •    Introduction To Windows Forms In C Sharp

  •    More Windows Forms In C Sharp

  •    Windows Forms Controls In C Sharp

  •    Object Oriented Programming In C Sharp

  •    Constructors And Destructors In C Sharp

  •    Members Of A Class In C Sharp

  •    Class Inheritance In C Sharp

  •    Abstract Classes In C Sharp

  •    Enumerations In C Sharp

  •    Exception Handling In C Sharp

  •    Creating XML Documents In C Sharp

  •    Putting It All Together In A File In C Sharp

Module 3: HTML and CSS Comprehensive Review

  •    Intro To HTML

  •    HTML Markup

  •    Lists In HTML

  •    Links In HTML

  •    Tables In HTML

  •    Forms In HTML

  •    Intro To CSS

  •    CSS Color Properties

Module 4: Intro to SQL Server

  •    Databases Defined

  •    Tables Defined

  •    Basic Query Optimization

  •    Defining And Using Store Procedures

  •    Creating Stored Procedure

  •    Executing Store Procedure From C Sharp

  •    Executing Store Procedure From ASP.Net

  •    Changing ASP.Net Interface To Retrieve Data-Part1

  •    Changing ASP.Net Interface To Retrieve Data-Part2

Module 5: Java Script A Comprehensive Introduction

  •    Intro To JavaScript

  •    Using JavaScript For Data Validation

  •    Using JavaScript To Manipulate Documents

  •    Variables In JavaScript

  •    If Statements In JavaScript

  •    Logical Operators In JavaScript

  •    If Else Statements In JavaScript

  •    Switch Statements In JavaScript

  •    For Loops In JavaScript

  •    For And While Loops In JavaScript

Module 6: Object Based Java Script

  •    Working With String Object

  •    More On String Object

  •    The Math Object

  •    Creating Your Own Objects

  •    String Manipulation In JavaScript

  •    Programming The Browser In JavaScript

  •    Browser Versions In JavaScript

  •    Working With Forms In JavaScript

Module 7: Model View and Controller

  •    MVC Mindset

  •    MVC Defined

  •    Create An MVC Project

  •    MVC Project Initial Walkthrough

  •    MVC Building Routes

  •    MVC Approach

  •    Controllers

  •    Controllers From Scratch

  •    MVC Routing

  •    MVC Routing Constraints

  •    Routing Constraint Attributes

  •    MVC Attribute Routing

Module 8: A Comprehensive Introduction to jQuery

  •    What Is jQuery

  •    jQuery Effects

  •    Get And Set Elements In jQuery

  •    Add And Remove Elements In jQuery

  •    CSS In jQuery

  •    Ancestors And Descendants

Module 9: Course Review

  •    MVC Best Practices

  •    Testing The Application

  •    Writing For Production

  •    Review Web Development

  •    Review C Sharp

  •    Review HTML And CSS

  •    Review SQL Server

  •    Review JavaScript

  •    Review Software Development Lifecycle

  •    Review Design Patterns

  •    Review jQuery

  •    Conclusion

Microsoft 70-487: Developing Microsoft Azure and Web Services Course Content

Module 1: Accessing Data

  •    Introduction To 70 - 487 Developing Microsoft Azure And Web Services

  •    Overview Of Service And Cloud Technologies

  •    Accessing Data Using ADO Dot NET Part1

  •    Accessing Data Using ADO Dot NET Part2

  •    Accessing Data From Web Service

  •    SQL Server Database In Azure

  •    Read And Write XML Data

  •    Implementing Azure Storage

  •    Managing Azure PowerShell

  •    WCF Data Services Part1

  •    WCF Data Services Part2

  •    WCF With Client

Module 2: Designing And Implementing WCF Services

  •    Create WCF Service And Client From Scratch Part1

  •    Create WCF Service And Client From Scratch Part2

  •    WCF Configuration Settings Part1

  •    WCF Configuration Settings Part2

  •    WCF And Azure SQL Database Part1

  •    WCF And Azure SQL Database Part2

  •    WCF And Azure SQL Database Part3

  •    WCF Services And Azure Review

Module 3: Querying And Manipulating Data Using Entity Framework

  •    Design And Implement An ERD

  •    Introduction To Entity Framework

  •    Introduction To LINQ

  •    LINQ To SQL

  •    LINQ To Entities

  •    Introduction To Lambda Expressions

  •    Introduction To Entity SQL

  •    Profiling Queries Created By Entity Framework

  •    Query Projections

  •    Query With Navigation Properties

  •    Bringing It All Together Part1

  •    Bringing It All Together Part2

  •    Using Entity Framework From Scratch

  •    Entity Framework Review

Module 4: Creating And Consuming Web API Based Services

  •    Introduction To Web API

  •    First Web API App

  •    Web API App Enhanced

  •    Web API App Extended

  •    Web API Using Standard Conventions

  •    Debugging Our Web API App

  •    Getting Data From Database In Web API App

  •    Web API Standards

  •    More On Web API Standards

  •    Simple Web API CRUD App

  •    Web API Example In Depth

  •    Summarizing Web API

Module 5: Deploying Web Applications And Services

  •    Introduction To Application Deployment Strategies Part1

  •    Introduction To Application Deployment Strategies Part2

  •    Introduction To Application Deployment Strategies Part3

  •    Introduction To Application Deployment Strategies Part4

  •    Deploying Web Applications ToIIs

  •    Deploying Web Applications To Azure

  •    Deployment Considerations

  •    Deployment Design

  •    Deployment Configurations

Module 6: Course Review

  •    Accessing Data

  •    Web Front End Options

  •    Course Conclusion

Data Security Compliance Course Content

Module 1: Data Breaches And ID Theft

  •    Course Introduction

  •    Treat And Cost

Module 2: Device Security Basics

  •    Device Access

  •    Device Management

Module 3: Avoiding Inadvertent Disclosure

  •    No More Oops Part1

  •    No More Oops Part2

Module 4: Physical And Technical Safeguards

  •    The DO Of Security Part1

  •    The DO Of Security Part2

  •    Course Conclusion

Ultimate Resume Building Course Content

Module 1: What is a Resume?

  •    Course Introduction

  •    What Is A Resume

  •    When Or Why Do You Need A Resume

  •    Plan Then Do

  •    Objective

  •    Skills And Accomplishments

  •    Backing It Up

  •    Types Of Resume

  •    Structure

  •    Collecting Information-Part 1

  •    Collecting Information-Part 2

  •    Expanding And Expounding

  •    Putting It On Paper

Module 2: Tips and Tricks

  •    Word Processor Tips And Tricks-Part 1

  •    Word Processor Tips And Tricks-Part 2

  •    Word Processor Tips And Tricks-Part 3

  •    Word Processor Tips And Tricks-Part 4

  •    Word Processor Tips And Tricks-Part 5

  •    Word Processor Tips And Tricks-Part 6

  •    Word Processor Tips And Tricks-Part 7

  •    Word Processor Tips And Tricks-Part 8

  •    Word Processor Tips And Tricks-Part 9

  •    Word Processor Tips And Tricks-Part 10

  •    Word Processor Tips And Tricks-Part 11

  •    Word Processor Tips And Tricks-Part 12

  •    Course Outro

SalesForce: Power User Course Content

Module 1: Intro to SalesForce Automation

  •    Course And Instructor Introduction

  •    What Is Salesforce Automation

  •    Sales Force Automation System Overview

  •    Why Salesforce

Module 2: Working With The SalesForce System

  •    Creating Accounts And Contacts

  •    Creating Leads And Opportunities

  •    Sales Process-Part 1

  •    Sales Process-Part 2

  •    Sales Process-Part 3

  •    Sales Process-Part 4

  •    Leads Through Social Channels

Module 3: SalesForce Solution

  •    Core Problems

  •    Managing Accounts

  •    Badges And Campaigns

  •    Custom Apps

Module 4: SalesForce Admin

  •    Introduction To RDBMS

  •    Introduction To The Cloud

  •    Introduction To Virtual Machines-Part1

  •    Introduction To Virtual Machines-Part2

  •    Salesforce Development

  •    Introduction To Building In The Cloud

  •    Salesforce Set Up

Module 5: Migrating To SalesForce

  •    Tasks To Complete Before Migration-Part 1

  •    Tasks To Complete Before Migration-Part 2

  •    Frequently Asked Questions-Part 1

  •    Frequently Asked Questions-Part 2

  •    Frequently Asked Questions-Part 3

  •    Frequently Asked Questions-Part 4

  •    Frequently Asked Questions-Part 5

  •    Frequently Asked Questions-Part 6

  •    Frequently Asked Questions-Part 7

  •    Frequently Asked Questions-Part 8

  •    Frequently Asked Questions-Part 9

Module 6: Course Conclusion

  •    The Salesforce Solution

  •    Conclusion

Windows 10 Power User (How to use Windows 10) Course Content

Module 1: Getting Started With Windows 10

  •    Introduction

  •    First Steps

  •    Navigating The Desktop

  •    Using Cortana To Search

Module 2: Using File Explorer

  •    File Explorer

  •    Understanding File And Folder Basics

  •    Work With Libraries

  •    Creating A Home Group

Module 3: Using Windows Applications

  •    Opening And Using Applications

  •    Installing New Applications From The Windows Store

  •    Using Default Applications

Module 4: Browsing the Web With Microsoft Edge

  •    Examining The Edge Window

  •    Searching The Web With Edge

  •    Bookmarking Important Sites

  •    Using The Reading List

  •    Marking A Page With Web Notes

  •    Conclusion

Module 5: Customizing Windows

  •    Introduction

  •    Customizing The Display

  •    Customizing File Explorer

  •    Configuring Cortanas Notebook Feature

  •    Customizing Privacy Settings

  •    Customizing Microsoft Edge

Module 6: Connecting Devices And Devices

  •    Connecting Printers

  •    Connecting And Using A Flash Drive

  •    Connect A Phone

Module 7: Managing User Accounts

  •    Create Additional Users

  •    Understanding User Profiles

  •    Sharing Data Between Profiles

Module 8: Backing Up Important Data

  •    Using File History

  •    Using Windows Backup

  •    Using System Restore

Module 9: Maintaining Windows

  •    Windows Updates

  •    Working With The Action Center

  •    Using Disk Defragmenter

  •    Managing Storage And Apps Using Settings

  •    Conclusion

Module 10: Protecting Windows

  •    Introduction

  •    Using Windows Defender

  •    Using Windows Firewall

  •    Using Bit Locker

  •    Windows Hello

Module 11: Monitoring Performance

  •    Using Task Manager

  •    Using Resource Monitor

Module 12: Working With Control Panel And Settings

  •    Control Panel Part 1

  •    Control Panel Part 2

  •    Settings App

  •    Using Device Manager

  •    Using Remote Desktop

  •    Conclusion

Microsoft 70-697: Configuring Windows Devices (Windows 10) Updated Version Course Content

Module 1: Introducing Windows 10

  •    Course Introduction

  •    What Makes Windows 10 Different

  •    Overview Of Windows 10 Features

  •    Navigating And Using Windows 10-Part 1

  •    Navigating And Using Windows 10-Part 2

Module 2: Installing Windows 10

  •    Preparing For Installation

  •    Installation Options

  •    Upgrading And Migrating-Part 1

  •    Upgrading And Migrating-Part 2

Module 3: Configuring Devices

  •    Overview Of Configuration Tools

  •    Common Configuration Options

  •    Managing User Accounts-Part 1

  •    Managing User Accounts-Part 2

  •    Using Control Panel

  •    Using Windows Administration Tools-Part 1

  •    Using Windows Administration Tools-Part 2

  •    Using Windows PowerShell-Part 1

  •    Using Windows PowerShell-Part 2

Module 4: Configuring Network Connectivity

  •    TCP IP Network Connectivity-Part 1

  •    TCP IP Network Connectivity-Part 2

  •    TCP IP Network Connectivity-Part 3

  •    Name Resolution

  •    Wireless

  •    Remote Access Overview-Part 1

  •    Remote Access Overview-Part 2

  •    Troubleshooting Connectivity

Module 5: Managing Storage, Data, And Printers

  •    Managing Hard Disks-Part 1

  •    Managing Hard Disks-Part 2

  •    Managing Hard Disks-Part 3

  •    Creating And Managing Storage Spaces

  •    Overview Of Data Access

  •    Configuring And Managing File Access

  •    Managing Shared Folder

  •    Understanding Work Folder

  •    Managing Printers

Module 6: Managing Apps

  •    Installing And Configuring Applications

  •    Managing Apps From The Windows Store

  •    Managing Microsoft Edge Web Browser

Module 7: Managing Device Security

  •    Configuring Network Security-Part 1

  •    Configuring Network Security-Part 2

  •    Configuring Local Security

  •    Configuring Data Security-Part 1

  •    Configuring Data Security-Part 2

  •    Configuring Device Security

Module 8: Maintaining Windows 10

  •    Updating Windows 10

  •    Monitoring And Optimizing Windows 10-Part 1

  •    Monitoring And Optimizing Windows 10-Part 2

Module 9: Troubleshooting And Recovery

  •    Managing Devices And Drives

  •    Recovery Files

  •    Recovering Devices

Module 10: Deploying Windows 10 Enterprise Desktops

  •    Overview Of Image Based Deployment

  •    Automating Installations

  •    Windows Activation

Module 11: Managing User Profiles And User State Virtualization

  •    Managing User Profiles-Part 1

  •    Managing User Profiles-Part 2

  •    User State Virtualization

  •    User Profile Migration

Module 12: Managing Desktop And Application Settings Using Group policy

  •    Using Group Policy To Manage Windows 10 Devices Part 1

  •    Using Group Policy To Manage Windows 10 Devices-Part 2

  •    Using Group Policy To Manage Windows 10 Devices-Part 3

  •    Using Group Policy To Manage Windows 10 Devices-Part 4

  •    Using Group Policy To Manage Applications-Part 1

  •    Using Group Policy To Manage Applications-Part 2

Module 13: Configuring And Managing Client Hyper-V

  •    Introduction To Client Hyper-V

  •    Creating Virtual Machines

  •    Managing Virtual Machine Storage And Snapshot

  •    Conclusion

Module 14: Configuring Windows Devices - December, 2017 Update - Part1

  •    Module 14 Workbook

  •    Flashcards (Updated)

  •    1. Intro to Windows 10 Update 70-697-1D

  •    2. Mod 1 Win 10 Update

  •    3. Mod 1 Installing Windows 10

  •    4. Mod 1 Examining Windows 10 Act

  •    5. Mod 3 Configuring Devices

  •    6. Mod 3 Examining GPOs Act

  •    7. Mod 3.3 Display Options

  •    8. Mod 3 Examining One Drive Act

  •    9. Mod 4 Configuring Network Connectivity

  •    10. Mod 4 Powershell Networking Commands Act

  •    11. Mod 4.1 Network Mgmt Tools

  •    12. Mod 4.1 Command Prompt Networkiing Tools Act

  •    13. Mod 4.1 Network Mgmt Tools Part2

  •    14. Mod 4.2 DNS

  •    15. Mod 4.2 Name Resolution Act

  •    16. Mod 4.3 Direct Access

  •    17. Mod 5 Managing Storage

  •    18. Mod 5 Server Based Storage

  •    19. Mod 5 Storage Act

  •    20. Mod 5.5 Diskpart

  •    21. Mod 5.6 Powershell Disk Mgmt

  •    22. Mod 5.7 Storage Mgmt

  •    23. Mod 5 Storage Mgmt Act

  •    24. Mod 6 Managing Files and Printers

  •    25. Mod 6 CMD and PS Files System Commands Act

  •    26. Mod 6.2 Permissions Inheritance

  •    27. Mod 6.2 NTFS and Sharing Permissions Act

  •    28. Mod 6.3 Type 4 Printer Drivers

  •    29. Mod 6 Printing Mgmt Act

  •    30. Mod 7 Managing Apps

  •    31. Mod 7 Internet Explorer 11 Act

  •    32. Mod 8 Managing Device Security

  •    33. Mod 8.1 Security Compliance Toolkit

  •    34. Mod 9 Maintaining Windows 10

  •    35. Mod 9 Windows Update Settings Act

  •    36. Mod 10 Startup and Recovery

  •    37. Mod 10 Startup and Recovery settings Act

  •    38. Mod 11 Additional Skills

  •    Windows Intro Update 70-697-2C

Module 15: Configuring Windows Devices - December, 2017 Update - Part2

  •    Module 15 Workbook

  •    Flashcards (Updated)

  •    1. Mod 1 Developing Mgmt Win 10

  •    2. Mod 1 Windows Defender Act

  •    3. Mod 1.1 Developing Part2

  •    4. Mod 1 Applocker Act2

  •    5. Mod1.2 Managing a Mobile Workforce

  •    6. Mod 1 Remote Access Act2

  •    7. Mod 1.2 Managing a Mobile Workforce Part2

  •    8. Mod 1.3 Overview

  •    9. Mod 1 Microsoft Azure Act2

  •    10. Mod 2 Managing Win 10 Sign-in

  •    11. Mod 2 Microsoft Account Act2

  •    12. Mod 2.2 Overview of Azure AD

  •    13. Mod 2 Microsoft Azure AD Act2

  •    14. Mod 3 Managing User Profiles and User

  •    15. Mod 4 Managing Desktop and Apps

  •    16. Mod 5 Managing Devices in MS365

  •    17. Mod 5 Office 365 Act2

  •    18. Mod 6 Managing PCs Devices using Intune

  •    19. Mod 6 Intune Act2

  •    20. Mod 6.3 Intune App Mgmt

  •    21. Mod 6.4 Working with WIP

  •    22. Mod 7 Configuring and Using MS Store

  •    23. Mod 7 Microsoft Store for Business Act2

  •    24. Mod 7.2 Deploy Win 10 Auto-pilot

  •    25. Mod 8 Managing Data Access Windows

  •    26. Mod 8.4 Publishing and Using RemoteApp

  •    27. Mod 9 Configuring and Managing Client Hyper-V

  •    28. Mod 10 Additional Skills

  •    29. Outr to Windows 10 Update 70-697

Wine Making Course Content

Wine Making

  •    Course Instructor Introduction

  •    Supplies And Ingredients Needed

  •    Cleaning And Prepping Equipment

  •    Chemicals Processing Aids And Oaks-Part 1

  •    Chemicals Processing Aids And Oaks-Part 2

  •    Wine Kits And Making Watermelon White Merlot

  •    Making Watermelon White Merlot-Part 2

  •    Making Amarone

  •    Apple Cider Wine

  •    Degassing Wine-Part 1

  •    Degassing Wine-Part 2

  •    Degassing Wine-Part 3

  •    Adding More Ingredients To You Wine

  •    Gentle Punch Down And Degassing Of Amarone

  •    Reracking The Amarone

Wine Mixing And Food Pairing

  •    Different Wine Varietals-Part 1

  •    Different Wine Varietals-Part 2

  •    Hydrometer

  •    Wine Yeast

  •    Wine Blending And Food Pairing-Part 1

  •    Wine Blending And Food Pairing-Part 2

  •    Bottling The Apple Cider Wine

  •    Conclusion

Microsoft 70-687: Configuring Windows 8 Course Content

Module 1: Installing and Deploying Windows 8.1

  •    Course Introduction

  •    Introduction To Windows

  •    Preparing To Install Windows 8.1

  •    Understanding Deployment Options Part 1

  •    Understanding Deployment Options Part 2

  •    Upgrading To Windows 8.1

  •    Migrating To Windows 8.1

  •    Automating Installations Part 1

  •    Automating Installations Part 2

  •    Automating Installations Part 3

  •    Windows Activation

Module 2: Enterprise Management in Windows 8.1

  •    Local And Management Tools Part 1

  •    Local And Management Tools Part 2

  •    Using Windows PowerShell To Manage Windows 8.1 Part 1

  •    Using Windows PowerShell To Manage Windows 8.1 Part 2

  •    Using Windows PowerShell To Manage Windows 8.1 Part 3

  •    Using Group Policy To Manage Windows 8.1

Module 3: Managing User Settings

  •    Managing User Profiles

  •    User State Virtualization

  •    User Profile Migration

Module 4: Configuring Hardware Access

  •    Managing And Maintaining HardDisk Drives Part 1

  •    Managing And Maintaining HardDisk Drives Part 2

  •    Working With Device Drivers

Module 5: Configuring Networking

  •    Configuring IPv4 Part 1

  •    Configuring IPv4 Part 2

  •    Configuring IPv4 Part 3

  •    Configuring IPv6

  •    Managing Name Resolution

  •    Configuring Wireless Connections

  •    Troubleshooting Network Connections

Module 6: Configuring Resource Access

  •    Configuring Network Access

  •    Managing File Access With NTFS

  •    Managing Shared Folders

  •    Configure And Manage Printers

  •    Providing Access To Non-Domain Devices

  •    Planning To Use One Drive

Module 7: Configuring Applications

  •    Installing And Configuring Applications

  •    Managing Apps From The Windows Store

  •    Controlling Desktop Applications

  •    Manage Internet Explorer

  •    Using Virtualisation To Support Applications

Module 8: Managing Security in Windows 8.1

  •    Overview Of Network Security

  •    Managing The Windows Firewall

  •    Malware Protection

  •    Configuring Data Security

  •    User Account Control

Module 9: Optimizing and Recovering Windows 8.1

  •    Performance Monitoring And Optimization

  •    Managing And Troubleshooting Reliability

  •    Troubleshooting With Event Viewer

  •    Managing Windows Updates

  •    Backing Up Data

  •    Recovery Options

Module 10: Mobile Computing With Windows 8.1

  •    Configuring Mobile Computer Settings

  •    Configuring VPNs

  •    Overview Of Direct Access

  •    Conclusion

Microsoft 70-346: Managing Office 365 Identities and Requirements Course Content

Module 1: Introduction To Office 365

  •    Course Introduction

  •    Introduction To Office 365 - Part 1

  •    Introduction To Office 365 - Part 2

  •    Planning A Pilot Implementation - Part 1

  •    Planning A Pilot Implementation - Part 2

  •    Planning A Pilot Implementation - Part 3

  •    Planning A Pilot Implementation - Part 4

  •    Provisioning Tenant Accounts - Part 1

  •    Configuring A Test Lab

  •    Provisioning Tenant Accounts - Part 2

Module 2: Administration In Office 365

  •    Introduction To Administration In Office 365 - Part 1

  •    Introduction To Administration In Office 365 - Part 2

  •    Introduction To Administration In Office 365 - Part 3

  •    Introduction To Administration In Office 365 - Part 4

  •    Introduction To Administration In Office 365 - Part 5

  •    Managing Users And Licenses - Part 1

  •    Managing Users And Licenses - Part 2

  •    Managing Users And Licenses - Part 3

  •    Managing Security And Distribution Groups - Part 1

  •    Managing Security And Distribution Groups - Part 2

Module 3: Managing Clients

  •    Planning For Office Clients - Part 1

  •    Planning For Office Clients - Part 2

  •    Planning For Office Clients - Part 3

  •    Managing User - Driver Client Deployments

  •    IT Managed Deployments - Part 1

  •    IT Managed Deployments - Part 2

  •    IT Managed Deployments - Part 3

  •    Office Telemetry And Reporting

Module 4: Planning DNS And Exchange Migrations

  •    Working With Custom Domains - Part 1

  •    Working With Custom Domains - Part 2

  •    Working With Custom Domains - Part 3

  •    Working With Custom Domains - Part 4

  •    Planning To Migrate Mailboxes

  •    Choosing A Migration Method - Part 1

  •    Choosing A Migration Method - Part 2

  •    Choosing A Migration Method - Part 3

Module 5: Planning And Configuring Exchange Online

  •    Planning For Exchange Online - Part 1

  •    Planning For Exchange Online - Part 2

  •    Planning For Exchange Online - Part 3

  •    Planning For Exchange Online - Part 4

  •    Planning For Exchange Online - Part 5

  •    Planning For Exchange Online - Part 6

  •    Planning For Exchange Online - Part 7

  •    Managing Recipients - Part 1

  •    Managing Recipients - Part 2

  •    Managing Recipients - Part 3

  •    Managing Recipients - Part 4

  •    Managing Anti-Malware And Anti-Spam

  •    Managing Message Retention Recovery - Part 1

  •    Managing Message Retention Recovery - Part 2

Module 6: Configuring Sharepoint Online

  •    Managing Site Collections - Part 1

  •    Managing Site Collections - Part 2

  •    Configuring Sharing With External Users

  •    Planning For Users Collaboration

Module 7: Configuring Lync Online

  •    Plan For Lync Online

  •    Configuring Lync Online Settings

Module 8: Implementing Coexistence Technologies

  •    Implementing Directory Synchorization - Part 1

  •    Implementing Directory Synchorization - Part 2

  •    Implementing Directory Synchorization - Part 3

  •    Implementing Organizational Federation

  •    Course Outro

Microsoft 70-680 TS: Configuring Windows 7 Course Content

Module 1: Installing,Upgrading and Migrating Windows 7

  •    Course And Instructor Introduction

  •    Introducing Windows 7-Part1

  •    Introducing Windows 7-Part2

  •    Pre Installation Requirements-Part1

  •    Pre Installation Requirements-Part2

  •    Installing Windows 7-Part1

  •    Installing Windows 7-Part2

  •    Upgrading Windows 7

  •    Migrating Windows 7

Module 2: Deploying Windows 7 in the Enterprise

  •    Overview Of Image Based Installations-Part1

  •    Overview Of Image Based Installations-Part2

  •    Overview Of Image Based Installations Demo

  •    Capturing System Images-Part1

  •    Capturing System Images-Part2

  •    Capturing System Images-Part3

  •    Preparing Images For Deployment-Part1

  •    Preparing Images For Deployment-Part2

  •    Working With User State

  •    Working With Virtual Drives

  •    Activating Windows 7

Module 3: Enterprise Management in Windows 7

  •    Automating Management Using Group Policy-Part1

  •    Automating Management Using Group Policy-Part2

  •    Automating Management Using Group Policy-Part3

  •    Using Windows Powershell 2.0-Part1

  •    Using Windows Powershell 2.0-Part2

  •    Using Windows Powershell 2.0-Part3

Module 4: Configuring Hardware and Applications

  •    Working With Device Drivers-Part1

  •    Working With Device Drivers-Part2

  •    Working With Hard Disks-Part1

  •    Working With Hard Disks-Part2

  •    Configuring Application Compatibility

  •    Configuring Internet Explorer-Part1

  •    Configuring Internet Explorer-Part2

  •    Configuring Application Restrictions

Module 5: Configuring Network Connectivity

  •    Configuring TCPIP-Part1

  •    Configuring TCPIP-Part2

  •    Configuring TCPIP-Part3

  •    IP Address Assignment-Part1

  •    IP Address Assignment-Part2

  •    Name Resolution Services-Part1

  •    Name Resolution Services-Part2

  •    Wireless Networking-Part1

  •    Wireless Networking-Part2

  •    Remote Management

  •    Troubleshooting Connectivity Issues

Module 6: Configuring Access to Resources

  •    Authentication And Authorization-Part1

  •    Authentication And Authorization-Part2

  •    Managing Access To Files Using NTFS

  •    Managing Sharing

  •    Managing Shared Printers

  •    Configuring Branch Cache

Module 7: Configuring Mobile Computing

  •    Configuring Mobile Computer And Device Settings-Part1

  •    Configuring Mobile Computer And Device Settings-Part2

  •    Configuring Remote Access-Part1

  •    Configuring Remote Access-Part2

Module 8: Configuring Security Options

  •    User Account Control

  •    Encrypting File Systems

  •    Bit Locker Drive Encryption-Part1

  •    Bit Locker Drive Encryption-Part2

  •    Network Access Protection

  •    Windows Firewall With Advanced Security

  •    Configuring Anti-Malware

  •    Auditing Network Access

Module 9: Monitoring And Maintaining Systems

  •    Configuring Windows Updates

  •    Event Monitoring

  •    Performance Monitoring

Module 10: Configuring Backup and Recovery Options

  •    Troubleshooting Startup Issues

  •    Using Windows Backup

  •    Using System Restore

  •    Course Conclusion

Microsoft 70-347: Enabling Office 365 Services Course Content

Module 1: Technology Review

  •    Introduction

  •    Active Directory Install And Configure

  •    PowerShell Primer

  •    Microsoft Exchange Server Install And Configure - Part 1

  •    Microsoft Exchange Server Install And Configure - Part 2

  •    Review Cloud Computing - Part 1

  •    Review Cloud Computing - Part 2

  •    Review Virtualization And The Cloud - Part 1

  •    Review Virtualization And The Cloud - Part 2

  •    Review Virtualization And The Cloud - Part 3

Module 2: Device Management

  •    Client Devices

  •    Demo Client Device Setup - Part 1

  •    Demo Client Device Setup - Part 2

  •    Office 365 Client Deployment

  •    Office 365 Components

  •    Office 365 Deployment Methods

  •    Office 365 Cloud Deployment Methods

  •    Office 365 Deployment Prerequisites

  •    Office 365 Deployment Readiness

  •    Office 365 Deployment Network Environment

Module 3: Office 365 Deployment Plan

  •    Network Planning

  •    Internet Network Usage Planning

  •    Network Device Planning

  •    Account Management Planning - Part 1

  •    Account Management Planning - Part 2

  •    Migration And Coexistence Options

  •    Single Sign On Architecture

  •    Demo Server 2012 Core With Active Directory Role

Module 4: Windows Azure

  •    SharePoint 2013 Using Windows Azure - Part 1

  •    SharePoint 2013 Using Windows Azure - Part 2

  •    SharePoint 2013 Capabilities

Module 5: PowerShell

  •    Scripting And PowerShell - Part 1

  •    Scripting And PowerShell - Part 2

  •    PowerShell Scripting Techniques - Part 1

  •    PowerShell Scripting Techniques - Part 2

  •    Enterprise Ready Scripts - Part 1

  •    Enterprise Ready Scripts - Part 2

  •    PowerShell Scripting Syntax - Part 1

  •    PowerShell Scripting Syntax - Part 2

  •    PowerShell Scripting Active Directory - Part 1

  •    PowerShell Scripting Active Directory - Part 2

  •    PowerShell Remoting

  •    PowerShell Adding Bulk Users In AD

Module 6: SQL Server

  •    Introduction To SQL Queries

  •    SQL Queries - Part 1

  •    SQL Queries - Part 2

  •    DML And DDL - Part 1

  •    DML And DDL - Part 2

  •    DDL

  •    SQL Server And PowerShell

  •    SQL Server PowerShell And AD

  •    Logging Data In SQL Server Using PowerShell

Module 7: Azure Lync and SharePoint

  •    Azure Active Directory Fundamentals - Part 1

  •    Azure Active Directory Fundamentals - Part 2

  •    Deploying Lync Server - Part 1

  •    Deploying Lync Server - Part 2

  •    Deploying Lync Server - Part 3

  •    SharePoint Designer

  •    Backup And Restore Share Point

  •    Windows PowerShell And SharePoint

  •    Identity Service With Active Directory

  •    Setup And Deploy Exchange

Module 8: Course Review

  •    Review Virtualization

  •    Review Cloud

  •    Review Automation Using PowerShell

  •    Review Desktop Applications

  •    Move To Office 365

  •    Conclusion

Microsoft 70-480:Programming in HTML5 with JavaScript and CSS3 Course Content

Module 1: Introduction to Web Development Technologies

  •    Intro To Software Development

  •    Introduction To HTML5-Part1

  •    Introduction To HTML5-Part2

  •    Introduction To CSS3

  •    Overview Of HTML CSS And JavaScript-Part1

  •    Overview Of HTML CSS And JavaScript-Part2

  •    Introduction To JavaScript-Part1

  •    Introduction To JavaScript-Part2

  •    Demo JavaScript

Module 2: HTML

  •    Demonstrating Formatting Quotations And Citations

  •    Tables Lists Blocks Classes And Layout-Part1

  •    Tables Lists Blocks Classes And Layout-Part2

  •    Page Design Frames And Colors

  •    Form Elements-Part1

  •    Form Elements-Part2

Module 3: CSS

  •    Comprehensive Introduction To CSS

  •    Styles With CSS-Part1

  •    Styles With CSS-Part2

  •    Selectors Content And Classes

Module 4: JavaScript

  •    Demo JavaScript Syntax-Part1

  •    Demo JavaScript Syntax-Part2

  •    Demo String Methods

  •    Demo Scope Events And Numbers-Part1

  •    Demo Scope Events And Numbers-Part2

  •    Demo Dates And Arrays-Part1

  •    Demo Dates And Arrays-Part2

  •    Demo Dates And Arrays-Part3

  •    Demo Comparisons Conditions And Loops

  •    Demo Breaks Conversion And Regular Expression-Part1

  •    Demo Breaks Conversion And Regular Expression-Part2

  •    Demo Errors And Debugging

Module 5: jQuery

  •    Intro To jQuery

  •    Demo Using jQuery

Module 6: HTML5

  •    HTML5

  •    Input Validation In HTML5

  •    Demo Password Validation

  •    Demo Using Regular Expressions To Validate Password

  •    Demo Validate A Checkbox

  •    Demo Validate Date And Time-Part1

  •    Demo Validate Date And Time-Part2

Module 7: CSS3

  •    Demo CSS3 Selectors-Part1

  •    Demo CSS3 Selectors-Part2

  •    Demo CSS3 Effects

Module 8: Course Review

  •    Review Of HTML5 CSS3 And JavaScript-Part1

  •    Review Of HTML5 CSS3 And JavaScript-Part2

  •    Comprehensive Walk through Of Visual Studio

  •    Cloud Computing Overview Using Azure-Part1

  •    Cloud Computing Overview Using Azure-Part2

  •    Cloud Computing Overview Using Azure-Part3

  •    Code Review HTML5 CSS3 And JavaScript

  •    Web Design Best Practices

  •    Review jQuery

  •    Course Conclusion

Cisco 300-115: CCNP - SWITCH - Routing and Switching Course Content

Module 1: Plan And Design

  •    Course And Instructor Introduction

  •    Planning For Complex Network-Part1

  •    Planning For Complex Network-Part2

  •    Intro To Cisco Enterprise Architecture And CAM-Part1

  •    Intro To Cisco Enterprise Architecture And CAM-Part2

  •    Review Networking Topology-Part1

  •    Review Networking Topology-Part2

  •    Review OSI Model

  •    Review SLA

  •    Network Discovery

  •    NTP Explained-Part1

  •    NTP Explained-Part2

  •    Network Security-Part1

  •    Network Security-Part2

Module 2: Switch Configuration

  •    VLAN And Trunking-Part1

  •    VLAN And Trunking-Part2

  •    VTP Intro And Config

  •    Ether Channel Configuration And Load Balancing

  •    More Ether Channel Configuration-Part1

  •    More Ether Channel Configuration-Part2

  •    Port Security

  •    Root Guard

  •    Configuring MST

Module 3: IP Configuration

  •    DHCP Intro And Config-Part1

  •    DHCP Intro And Config-Part2

  •    IPV6 Intro And Config-Part1

  •    IPV6 Intro And Config-Part2

  •    Configure DHCP

  •    Configure DHCPV6

  •    Configure IPSLA

  •    NTP Configuration

  •    Network Monitoring Using IPSLA-Part1

  •    Network Monitoring Using IPSLA-Part2

  •    Network Monitoring Using IPSLA-Part3

Module 4: STP And RTP

  •    Config Routing Between VLANs With A Router

  •    Improves STP Config-Part1

  •    Improve STP Config-Part2

  •    Improve STP Config-Part3

  •    Improve STP Config-Part4

  •    Implement RSTP

  •    Intro And Config MST

Module 5: Routing

  •    Config Routing Between VLANs With A Router

  •    Routing On A Multi Layer Switch

  •    Routing With An External Router

  •    Further Routing On Multilayer Switch

Module 6: HSRP, VRRP, GLBP

  •    Configure And Tune HSRP

  •    Configure HSRP With Load Balancing

  •    HSRP For IPv6

  •    Configure VRRP

  •    Configure VRRP With Load Balancing

  •    Implement GLBP

  •    Configure GLBP

Module 7: Course Review

  •    Designing Complex Networks

  •    Review Demo CAM

  •    Review Demo VLANs And Trunking

  •    Review Demo VTP Configure

  •    Review Demo Ether Channel And Load Balancing

  •    Review Demo RSTP

  •    Review Demo Routing Between VLANs With A Router

  •    Course Outro

Oracle 12c OCP 1Z0-062: Installation and Administration Course Content

Module 1: Database Concepts And Tools

  •    Instructor And Course Introduction

  •    Database Concepts And Tools - Part 1

  •    Database Concepts And Tools - Part 2

Module 2: Memory Structure

  •    Memory Structure - Part 1

  •    Memory Structure - Part 2

Module 3: Tables

  •    Tables - Part 1

  •    Tables - Part 2

Module 4: Indexes

  •    Indexes - Part 1

  •    Indexes - Part 2

Module 5: Constraints And Triggers

  •    Constraints And Triggers - Part 1

  •    Constraints And Triggers - Part 2

Module 6: Users

  •    Users

  •    Profiles

  •    Privileges

  •    Roles

Module 7: Internal Structures

  •    Storage Structures - Part 1

  •    Storage Structures - Part 2

  •    Internal Memory Structures - Part 1

  •    Internal Memory Structures - Part 2

  •    Background Processes - Part 1

  •    Background Processes - Part 2

Module 8: Starting Up and Shutting Down Database

  •    Starting And Stopping DataBase - Part 1

  •    Starting And Stopping DataBase - Part 2

Module 9: Critical Storage Files

  •    Critical Storage Files - Part 1

  •    Critical Storage Files - Part 2

Module 10: Data Manipulation Language

  •    DML Atomicity - Part 1

  •    DML Atomicity - Part 2

  •    DML Insert

  •    DML Update - Part 1

  •    DML Update - Part 2

  •    DML Delete And Review Of DML Statements - Part 1

  •    DML Delete And Review Of DML Statements - Part 2

Module 11: Data Concurrency

  •    Data Concurrency - Part 1

  •    Data Concurrency - Part 2

Module 12: BackUp And Recovery

  •    Back Up - Part 1

  •    Back Up - Part 2

  •    Back Up - Part 3

  •    RMAN Catalog

  •    RMAN BackUps - Part 1

  •    RMAN BackUps - Part 2

  •    Disaster Preparedness

  •    Recovery

  •    Flashback Recovery

Module 13: Installation

  •    Installation - Part 1

  •    Installation - Part 2

Module 14: Course Review

  •    Course Review - Part 1

  •    Course Review - Part 2

  •    Course Review - Part 3

  •    Course Review - Part 4

  •    Course Review - Part 5

  •    Course Outro

Microsoft 70-412: Configuring Advanced Windows Server 2012 Services (R2 update) Course Content

Module 1: Configuring Advanced DNS Services

  •    Introduction

  •    DNSSEC

  •    Socket Pool And Cache Locking

  •    Advanced DNS Settings

  •    Questions

Module 2: Advanced DHCP Services

  •    DHCP Scopes

  •    High Availability

  •    Policy-Based Assignments

  •    DHCPv6

  •    Questions

Module 3: Active Directory Forest Configuration

  •    Active Directory Forests

  •    Active Directory Sites

  •    Active Directory Trusts

  •    Active Directory Read Only Domain Controllers

  •    Active Directory Replication

Module 4: Active Directory Certificate Services

  •    ADCS Overview

  •    ADCS Management

Module 5: ISCSI And ISNS

  •    ISCSI And ISNS

  •    ISCSI And ISNS Demo

  •    Questions

Module 6: Configuring IPAM

  •    Install And Configure IPAM

  •    IPAM Demo

  •    Questions

Module 7: Network Balancing

  •    Install And Configure NLB

  •    NLB Demo

  •    Questions

Module 8: Failover Clusters

  •    Cluster Overview

  •    Cluster Aware Updating

  •    Failover Clusters Demo

  •    Questions

Module 9: Configuring Hyper_V Virtual Machines

  •    Create VM Replicas In Hyper-V And Migrate VMs

  •    Hyper V Virtual Machines Demo

  •    Questions

Module 10: Dynamic Access Control

  •    DAC Overview And Configure

  •    DAC Demo

  •    Questions

Module 11: Active Directory Rights Management Services

  •    Install ADRMS

  •    Manage ADRMS

  •    ADRMS Demo

  •    Questions

Module 12: Active Directory Federation Services

  •    Configure And Manage ADFS

  •    ADFS Demo

  •    Questions

Module 13: Disaster Recovery

  •    Configure And Restore Windows Server Backup

  •    Configure And Restore Windows Server Backup Demo

  •    Questions

Module 14: Configuring Additional Services

  •    Configuring Additional Services

  •    Configuring Additional Services Demo-Part1

  •    Configuring Additional Services Demo-Part2

  •    Questions

  •    Conclusion

Microsoft 70-411: Administering Windows Server 2012 (R2 update) Course Content

Module 1: Managing User and Service Accounts

  •    Introduction

  •    User Accounts-Part 1

  •    User Accounts-Part 2

  •    User Accounts-Part 3

  •    Service Accounts-Part 1

  •    Service Accounts-Part 2

  •    Questions

Module 2: Administer Group Policy

  •    Group Policy

  •    User Configuration-Part 1

  •    User Configuration-Part 2

  •    User Configuration-Part 3

  •    Computer Configurations

  •    Group Policy Management-Part 1

  •    Group Policy Management-Part 2

  •    Group Policy Management-Part 3

  •    Questions

Module 3: Managing Network File Services

  •    File System Resource Manager

  •    Distributed File System

  •    Encrypting File System

  •    Auditing Resources

  •    Questions

Module 4: Domain Name System

  •    DNS Functionality-Part 1

  •    DNS Functionality-Part 2

  •    DNS and Active Directory

  •    DNS Server Configuration-Part 1

  •    DNS Server Configuration-Part 2

  •    Questions

Module 5: Windows Deployment Services

  •    WDS Overview

  •    Creating Images

Module 6: Windows Server Update Services

  •    WSUS-Part 1

  •    WSUS-Part 2

Module 7: Remote Access

  •    Implement Remote Access-Part 1

  •    Implement Remote Access-Part 2

  •    Implement Remote Access-Part 3

  •    Offline Domain Join

  •    Implement Network Policy Server-Part 1

  •    Implement Network Policy Server-Part 2

  •    Implement Network Policy Server-Part 3

Module 8: Monitoring System

  •    Monitoring System Resources-Part 1

  •    Monitoring System Resources-Part 2

Module 9: Managing Active Directory Services

  •    Managing Active Directory Services-Part 1

  •    Managing Active Directory Services-Part 2

  •    Managing Active Directory Services-Part 3

  •    Conclusion

Oracle 12c OCP 1Z0-061: SQL Fundamentals Course Content

Module 1: Introduction To Oracle 12c SQL Fundamentals

  •    Introduction

  •    Intro To Oracle 12c-SQL Fundamentals

  •    Structure Of SQL

  •    Basic Select Statements

  •    Basic Select Statements Demo

Module 2: Retrieving Data

  •    Modifying Reported Output

  •    The Where Clause

  •    The Order By Clause

  •    Left And Right Outer Joins

  •    The Where Clause Demo

  •    Multi-Table Selection Demo

Module 3: SQL Functions

  •    Single Row Functions

  •    Aggregate Functions

  •    Single Row Functions Demo

  •    Muiltrow Functions Demo

  •    Group By

  •    Grouping Demo

  •    Conversion Functions

  •    Conversion Functions Demo

  •    Datetime Functions

  •    Datetime Functions Demo

Module 4: Subqueries

  •    Single-Row Subqueries

  •    Single-Row Subqueries Demo

  •    Multi-Row Subqueries

  •    Multi-Row Subqueries Demo

  •    Other Subquery Types

  •    Other Subquery Types Demo

Module 5: Data Manipulation Language

  •    Adding Data

  •    Changing Data

  •    Deleting Data

  •    DML Demo

Module 6: Data Control Language

  •    Security

  •    Object Privileges

  •    DCL Demo

Module 7: Data Definition Language

  •    Creating Objects In The Database

  •    Creating Objects In The Database Demo

  •    Sequences

  •    Sequenced Demo

  •    Indexes

  •    Views

Module 8: Combining Queries

  •    Combining Queries

Module 9: Oracle 12C SQL Fundamentals Review

  •    Oracle 12c SQL Fundamentals Review - Part 1

  •    Oracle 12c SQL Fundamentals Review - Part 2

  •    Oracle 12c SQL Fundamentals Review - Part 3

  •    Conclusion

Microsoft 70-410: Installing and Configuring Windows Server 2012 (R2 update) Course Content

Module 1: Installing And Configuring Windows Server 2012 R2

  •    Course And Instructor Introduction

  •    Overview-Part1

  •    Overview-Part2

  •    Overview-Part3

  •    Management-Part1

  •    Management-Part2

  •    Management-Part3

  •    Management-Part4

  •    Management-Part5

  •    Installation-Part1

  •    Installation-Part2

  •    Installation-Part3

  •    Questions-Part1

  •    Questions-Part2

Module 2: Installing and Configuring an Active Directory Domaine Control

  •    Active Directory Design-Part1

  •    Active Directory Design-Part2

  •    Active Directory Design-Part3

  •    Installing Active Directory Domain Services-Part1

  •    Installing Active Directory Domain Services-Part2

  •    Installing Active Directory Domain Services-Part3

  •    Installing Active Directory Domain Services-Part4

  •    Questions

Module 3: Administering Active Directory Objects

  •    Design And Create An Active Directory Hierarchy-Part1

  •    Design And Create An Active Directory Hierarchy-Part2

  •    Manage Users-Part1

  •    Manage Users-Part2

  •    Manage Users-Part3

  •    Manage Computers-Part1

  •    Manage Computers-Part2

  •    Manage Computers-Part3

  •    Questions

Module 4: Automating Administration Tasks

  •    Powershell Overview And Object Command-Part1

  •    Powershell Overview And Object Command-Part2

  •    Powershell Overview And Object Command-Part3

  •    Command Line Object Management And Bulk Operations-Part1

  •    Command Line Object Management And Bulk Operations-Part2

  •    Questions

Module 5: Configuring IPv4

  •    TCP IP Overview

  •    IPv4 Addressing-Part1

  •    IPv4 Addressing-Part2

  •    Subnetting And Supernetting

  •    Configure And Troubleshoot IPv4-Part1

  •    Configure And Troubleshoot IPv4-Part2

  •    Questions-Part1

  •    Questions-Part2

Module 6: Configuring IPv6

  •    Configuring IPV6-Part1

  •    Configuring IPV6-Part2

  •    Questions

Module 7: Installing and Configuring DHCP

  •    DHCP Overview Database Security-Part1

  •    DHCP Overview Database Security-Part2

  •    Questions

Module 8: Installing and Configuring DNS

  •    Installing And Configuring DNS-Part1

  •    Installing And Configuring DNS-Part2

  •    Installing And Configuring DNS-Part3

  •    Installing And Configuring DNS-Part4

  •    Installing And Configuring DNS-Part5

  •    Questions

Module 9: Configuring Storage Spaces And File And Print Services

  •    Design And Implement Storage Spaces-Part1

  •    Design And Implement Storage Spaces-Part2

  •    Design And Implement Storage Spaces-Part3

  •    Secure Files And Folders Configure Offline Files And Shadow Copies

  •    Implement Network Printing

  •    Questions

Module 10: Configuring Group Policy

  •    Create Group Policy Objects

  •    Configure Group Policy Settings-Part1

  •    Configure Group Policy Settings-Part2

  •    Implement A Central Store And Questions

Module 11: Securing Windows Servers

  •    Securing Windows Servers-Part1

  •    Securing Windows Servers-Part2

  •    Questions

Module 12: Installing and Configuring Virtual Servers and Clients

  •    Virtualization Solution

  •    Hyper V-Part1

  •    Hyper V-Part2

  •    Network Virtualization And Questions-Part1

  •    Network Virtualization And Questions-Part2

  •    Conclusion

Cisco 300-135: CCNP - TSHOOT - Troubleshooting and Maintaining Cisco IP Networks Course Content

Module 1: Introduction to Cisco Troubleshooting

  •    Introduction

  •    Troubleshooting And Maintenance

  •    IOS Troubleshooting Commands

  •    Remote Data Gathering

  •    Introduction To Graphical Troubleshooting Tools And Review

Module 2: Troubleshooting Switches

  •    Troubleshoot Catalyst Switches

  •    Troubleshoot TCAM

Module 3: Troubleshooting VLANS and Trunking

  •    Troubleshooting VLANs And Trunking-Part1

  •    Troubleshooting VLANs And Trunking-Part2

  •    Troubleshooting VLANs And Trunking-Part3

  •    Trouble Ticket 1 VLANS

Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel

  •    Spanning Tree Protocol

  •    STP Port Configuration

  •    Ether Channel

  •    Trouble Ticket 2-Trunking

Module 5: Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel

  •    Troubleshooting Inter-VLAN Routing

  •    Troubleshooting Layer 3 Ether Channel

Module 6: Troubleshooting Switch Security Features

  •    Troubleshoot Switch Security-Part1

  •    Troubleshoot Switch Security-Part2

  •    Trouble Ticket 3-Switch Security-Part1

  •    Trouble Ticket 3-Switch Security-Part2

Module 7: Troubleshooting First­Hop Redundancy Protocols

  •    HSRP

  •    VRRP

  •    Questions

  •    Trouble Ticket 4

Module 8: Troubleshooting IPv4 and IPv4 Addressing

  •    IPv4 Addressing DHCPNAT-Part1

  •    IPv4 Addressing DHCPNAT-Part2

  •    Trouble Ticket 5

  •    Trouble Ticket 6

Module 9: IPv6 Addressing and Addressing Technologies

  •    IPv6 Addressing Options

Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists

  •    IPv4 ACLs

  •    Prefixlists IPv6 ACLs

  •    Trouble Ticket Access Control List1

  •    Trouble Ticket Access Control List2

Module 11: Troubleshooting GRE and Basic Routing Tunnels

  •    IPv4 Routing-Part1

  •    IPv4 Routing-Part2

  •    IPv6 Routing

  •    GRE Tunnels

Module 12: Troubleshooting RIPv2 and RIPng

  •    RIPv2

  •    RIPng

Module 13: Troubleshooting EIGRP

  •    EIGRP

  •    EIGRP For IPv6

  •    Trouble Ticket 1

  •    Trouble Ticket 2

Module 14: OSPF and OSPFv3

  •    OSPF-Part1

  •    OSPF-Part2

  •    OSPFv3

  •    Trouble Ticket 1

  •    Trouble Ticket 2

  •    Trouble Ticket 3

Module 15: Troubleshooting Route Maps and Policy Based Routing

  •    Route Maps And Policy Based Routing

Module 16: Troubleshooting Redistribution

  •    Verifying Redistribution Configuration

  •    Troubleshooting Redistribution With Route Maps

Module 17: Troubleshooting BGP

  •    BGP Overview

  •    BGP Configuration-Part1

  •    BGP Configuration-Part2

  •    Trouble Ticket 1

  •    Trouble Ticket 2

Module 18: Troubleshooting Management Protocols and Tools

  •    Troubleshooting Management Protocols And Tools

  •    SPAN And RSPAN

Module 19: Troubleshooting Management Access

  •    Management Access Troubleshooting

  •    Conclusion

Wine Pairing and Tasting Course Content

Module 1: Introduction and White Wines

  •    White Wines

Module 2: Glassware, Temperature, Storage and Ratings

  •    Temperature Glassware Storage And Ratings

Module 3: Red Wines

  •    Red Wines

Module 4: Regions

  •    Europe

  •    Europe Continued

  •    North America

  •    South America Australia New Zealand

  •    Conclusion

Cisco 300-101: CCNP - ROUTE - Implementing Cisco IP Routing Course Content

Module 1: Plan And Design

  •    Introduction

  •    Review Routing Fundamentals

  •    Review Route Selection

  •    Review Switching Versus Routing

  •    Review IP Subnetting

  •    Review How To Subnet

  •    Review IP Address Classes

Module 2: EIGRP Enhanced Interior Gateway Routing Protocol

  •    Plan And Design-Part1

  •    Plan And Design-Part2

  •    EIGRP Config

  •    Configuring RIPng

  •    Building EIGRP Topology Table

  •    EIGRP Stub Routing

  •    EIGRP Summarization

  •    EIGRP Load Balancing

  •    Discovering Main EIGRP Configuration

  •    Implementing EIGRP Through Name Config

  •    Configure EIGRP Authentication

  •    Configure Authentication For EIGRP Routes

Module 3: IPv6

  •    Introduction To IPv6-Part1

  •    Introduction To IPv6-Part2

  •    IPv6 Addressing

  •    Basic IPv6 Configuration

  •    EIGRP For IPv6

  •    Configure And Optimize EIRGP For IPv6

Module 4: OSPF

  •    lntroduction To OSPF-Part1

  •    lntroduction To OSPF-Part2

  •    lntroduction To OSPF-Part3

  •    Configure OSPF

  •    Building The Link State Database

  •    OSPF Path Selection

  •    OSPF Route Summarization

  •    OSPF Stub Areas

  •    Implement OSPF

  •    Optimize OSPF

  •    OSPF Authentication Configuration

  •    Configure OSPFV3

  •    Basic Redistribution

Module 5: Border Gateway Protocol BGP

  •    Introduction To BGP

  •    BGP Specifics

  •    Basic BGP

  •    BGP Path Selection

  •    Configure BGP Authentication

  •    Configure BGP

Module 6: Course Review

  •    Configure Basic EIGRP

  •    Basic OSPF Configuration

  •    Summary Of-EIGRP-OSPF-IPv6-BGP

  •    Conclusion

Citrix CXA-206: XenApp 7.5 Design, Implement and Administer Course Content

Module 1: Introduction To Application Virtualization

  •    Course Introduction

  •    Introduction To Virtualization

  •    Introduction To Desktop Virtualization

  •    Introduction To Application Virtualization

  •    The XenApp Blue Print

  •    Building The Lab Environment

Module 2: XenApp Server Setup

  •    Configure XenApp Server After Initial Install

  •    Configuration Updates And Virtual Delivery Agent Install

  •    Build Master Image For Machine Catalog

  •    Complete Master Image Build

  •    Setup Delivery Group

  •    Test XenApp Application Delivery

Module 3: Plan For High Availability

  •    High Availability Explained-Part1

  •    High Availability Explained-Part2

  •    Windows Failover Cluster-Part1

  •    Windows Failover Cluster-Part2

  •    Complete Failover Cluster Configuration

  •    Complete Basic Cluster Configuration-Part1

  •    Complete Basic Cluster Configuration-Part2

  •    High Availability Explained-Part1

  •    High Availability Explained-Part2

  •    Windows Failover Cluster-Part1

  •    Windows Failover Cluster-Part2

  •    Complete Failover Cluster Configuration

  •    Complete Basic Cluster Configuration-Part1

  •    Complete Basic Cluster Configuration-Part2

Module 4: Scripting Primer

  •    Windows Batch Files-Part1

  •    Windows Batch Files-Part2

  •    Windows Batch Files-Part3

  •    Power Shell Scripts-Part1

  •    Power Shell Scripts-Part2

  •    Error Handling In PowerShell Scripts

  •    Scripts Explained

Module 5: Using VMware vSphere

  •    Introduction To VMware

  •    Configuring Windows 7 And Installing VMware Tools

  •    Power CLI Scripting In VMware

Module 6: Virtualization Using Microsoft Hyper-V

  •    Introduction To Hyper-V

  •    Introduction To Hyper-V Continued

  •    Windows Server Core Install And Configure-Part1

  •    Windows Server Core Install And Configure-Part2

  •    Install And Configure DHCP Server

  •    Hyper-V Virtual Networking

Module 7: Course Review

  •    Active Directory Fundamentals

  •    Permissions In Active Directory

  •    Logon Scripts In Windows

  •    Review Virtualization

  •    Review Application Virtualization

  •    Review High Availability

  •    Review Scripting

  •    Review XenApp Blue Print

  •    Course Conclusion

Microsoft 70-246: Monitoring and Operating a Private Cloud 2012 Course Content

Module 1: Introducing The Cloud Model

  •    Course And Instructor Introduction

  •    Overview Of Cloud Computing

  •    Dissecting Hybrid Cloud Environments

  •    Requirements For Cloud Implementation

  •    Using System Center To Operate The Cloud - Part 1

  •    Using System Center To Operate The Cloud - Part 2

  •    Using System Center To Operate The Cloud - Part 3

  •    Ongoing Cloud Maintenance

  •    System Center Component Integration

  •    Verifying The Cloud Infrastructure Demo

Module 2: Configuring The Private Cloud Environment

  •    Overview Of Virtual Machine Manager

  •    Managing Virtual Environments

  •    Creating Private Cloud

  •    Configuring And Optimizing The Private Cloud

Module 3: Deploying Services For The Private Cloud

  •    Understanding Service Templates

  •    Configuring Profiles - Part 1

  •    Configuring Profiles - Part 2

  •    Using Web Deploy Packages

  •    Configuring Server App-V

  •    Using Data Tier Applications

  •    Using App Controller To Deploy Services

  •    Deploying Cloud Services Demo

Module 4: Monitoring Cloud Based Applications

  •    Overview Of Operations Manager

  •    Deploying Monitoring Agents

  •    Customizing Monitoring Solutions

  •    Monitoring The Network Infrastructure

  •    Distributed Application Monitoring

  •    Application Performance Monitoring - Part 1

  •    Application Performance Monitoring - Part 2

  •    Application Performance Monitoring - Part 3

  •    Application Performance Monitoring - Part 4

  •    Application Performance Monitoring - Part 5

Module 5: Service Management For The New Cloud

  •    Configuring Service Manager - Part 1

  •    Configuring Service Manager - Part 2

  •    Configuring Service Manager - Part 3

  •    Configuring Service Manager - Part 4

  •    Automating Service Management - Part 1

  •    Automating Service Management - Part 2

  •    Automating Service Management - Part 3

  •    Managing Incidents And Problems

Module 6: High Availability And Disaster Recovery For The Private Cloud

  •    High Availability For The Private Cloud - Part 1

  •    High Availability For The Private Cloud - Part 2

  •    High Availability For The Private Cloud - Part 3

  •    High Availability For The Private Cloud - Part 4

  •    Protecting Data In The Private Cloud - Part 1

  •    Protecting Data In The Private Cloud - Part 2

  •    Recovering Data In The Private Cloud - Part 1

  •    Recovering Data In The Private Cloud - Part 2

Module 7: Optimizing The Private Cloud Infrastructure

  •    Applying Infrastructure Updates

  •    Applying Updates To Virtual Machines

  •    Extending The Private Cloud Infrastructure

  •    Optimizing The Cloud Infrastructure With System Center Advisor

  •    Using PRO-Tips To Optimize The Cloud

Module 8: Configuring Multi­Tenant Self­Service Using Windows Azure Pack

  •    Understanding Windows Azure Pack

  •    Windows Azure Pack Administration

  •    Windows Azure Pack Providers

Module 9: Configuring And Monitoring The Private Cloud Review

  •    Configuring And Monitoring The Private Cloud Review

  •    Conclusion

Microsoft 70-409: Server Virtualization with Windows Server Hyper-V and System Center Course Content

Module 1: Understanding Microsoft Applications

  •    Introduction To Exam 70-409

  •    Introduction To Microsoft Virtualization-Part1

  •    Introduction To Microsoft Virtualization-Part2

  •    Introduction To System Center 2012 R2 Components

  •    Evaluate The Existing Environment For Virtualization

  •    Module 1 Review Questions

Module 2: Installing And Configuring The Hyper-V Role

  •    Install The Hyper-V Role

  •    Manage Hyper-V

  •    Configure Hyper-V Settings

  •    Introduction To Hyper-V Host Storage And Networking

  •    Module 2 Review Questions

  •    Installing Hyper-V-Demo

Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual Machine Checkpoints

  •    Create And Configure Virtual Hard Disks

  •    Create And Configure Virtual Machines

  •    Install And Import Virtual Machines

  •    Manage Virtual Machine Checkpoints

  •    Monitor Hyper-V

  •    Design Virtual Machines For Server Roles-Services

  •    Module 3 Review Questions

  •    Creating A Virtual Machine-Demo

Module 4: Producing And Configuring Virtual Machine Networks

  •    Generate And Utilize Hyper-V Virtual Switches-Part1

  •    Generate And Utilize Hyper-V Virtual Switches-Part2

  •    Introduction To Advanced Hyper-V Networking Features

  •    Configure And Utilize Hyper-V Network Virtualization

  •    Module 4 Review Questions

  •    ControllingThe VM Demo

Module 5: Virtual Machine Movement And Hyper-V Replicas

  •    Deliver High Availability And Redundancy For Virtualization

  •    Implement Virtual Machine Movement

  •    Implement And Manage Hyper-V Replica

  •    Module 5 Review Questions

Module 6: Implementing Failover Clustering Using Hyper-V

  •    Introduction To Failover Clustering-Part1

  •    Introduction To Failover Clustering-Part2

  •    Configure And Utilize Shared Storage

  •    Implement And Manage Failover Clustering Using Hyper-V

  •    Module 6 Review Questions

  •    Exploring Clustering-Demo

Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual Machine Manager

  •    Integrated System Center And Server Virtualization

  •    Virtual Machine Manager

  •    Install VMM And Add Hosts And Manage Host Groups

  •    Module 7 Review Questions

  •    Exploring SCVMM

Module 8: Managing The Network And Storage Infrastructure In Microsoft System Center 2012 R2 Virtual Machine Manager

  •    Managing Networking Infrastructure

  •    Managing Storage Infrastructure And Infrastructure Updates

  •    Module 8 Review Questions

Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager

  •    Introduction To Virtual Machine Management Tasks In VMM

  •    Create Clone And Convert Virtual Machines

  •    Introduction To Virtual Machine Updating

  •    Module 9 Review Questions

Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library

  •    Introduction To The Virtual Machine Manager Library

  •    Working With Profiles And Templates

  •    Module 10 Review Questions

Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine Manager

  •    Introduction To The Cloud

  •    Produce And Manage A Cloud And User Role Utilization In VMM

  •    Module 11 Review Questions

Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual Machine Manager And Application Controller

  •    Managing Service In MSC 2012 R2 VMM And Application Controller-Part1

  •    Managing Service In MSC 2012 R2 VMM And Application Controller-Part2

  •    Module 12 Review Questions

Module 13: Protecting And Monitoring Virtualization Infrastructure

  •    Introduction To Backup And Restore Options For Virtual Machines

  •    Protecting Virtualization Infrastructure By Using DPM-Part1

  •    Protecting Virtualization Infrastructure By Using DPM-Part2

  •    Utilize Operations Manager For Monitoring And Reporting

  •    Integrate VMM With Operations Manager

  •    Module 13 Review Questions

  •    Exploring DPM-Demo

Module 14: Hyper-V And SCVMM Review

  •    Hyper-V And SCVMM Review-Part1

  •    Hyper-V And SCVMM Review-Part2

  •    Hyper-V And SCVMM Review-Part3

  •    Hyper-V And SCVMM Review-Part4

  •    Exam 70-409 Conclusion

Citrix CXS-203: XenServer 6.0 Design, Implement and Administer Course Content

Module 1: Intro To XenServer And Virtualization

  •    Intro To Virtual Computing

  •    Hypervisors-Part1

  •    Hypervisors-Part2

  •    Installing Your First VM

  •    Creating An Active Directory Domain In The VM

  •    Adding VM And Host To Domain

  •    Virtual Networks Explained

Module 2: Comprehensive Introduction To Linux

  •    Intro And Demo Of Linux

  •    Configuring Linux VM

  •    Network Configuration

  •    Linux Scripting And File Permissions

  •    Advanced Linux Permissions

  •    Linux DHCP And Disks Explained

  •    Install And Configure DHCP

Module 3: Hosts, Storage, And Networking

  •    Storage Access And Configuration

  •    iCSI Configuration And Access

  •    Storage Repository

  •    Subnets Explained

  •    Subnets Example

  •    More Subnetting

  •    Building A Linux Based VM Router

Module 4: Comprehensive Introduction To Powershell

  •    Why Powershell

  •    Using Powershell

  •    Pipelines And WMI

  •    More WMI And Scripting Using Powershell

  •    Advanced Powershell Scripting

Module 5: XenServer Components And Features

  •    Critical Components

  •    VM Templates

  •    Virtual Networking

  •    Automation Explained

  •    Automation Using XenServer CLI Demo

  •    Automation Using Powershell Demo

  •    Powershell Script Completion And Execution

  •    Protecting Your Virtual Environment Explained

  •    Protecting Your Virtual Environment Demo

  •    XenCenter Comprehensive Walk Through

Module 6: Problem Resolution

  •    Troubleshooting Explained

  •    VM Migration

Module 7: Review

  •    XenServer Exam Objectives

  •    PXE Server Explained

  •    PXE Server Demo

  •    XenServer Product Review

  •    AD Using Command Line And PowerShell

  •    Conclusion

Microsoft 70-336: MCSE: Core Solutions Lync Server 2013 Course Content

Module 1: Handling Design And Architecture For Microsoft Lync Server 2013

  •    Course And Instructor Introduction

  •    Introduction To Lync Server 2013 Architecture - Part 1

  •    Introduction To Lync Server 2013 Architecture - Part 2

  •    Introduction To Lync Server 2013 Architecture - Part 3

  •    Introduction To Lync Server 2013 Architecture - Part 4

  •    Introduction To Lync Server 2013 Architecture - Part 5

  •    Introduction To Lync Server 2013 Architecture - Part 6

  •    Introduction To Lync Server 2013 Core Capabilites

  •    Introduction To Lync Server 2013 Design Process

  •    Evaluate Infrastructure Requirements And Update The Design

  •    Plan For All Phases Of Microsoft Solutions Framework - Part 1

  •    Plan For All Phases Of Microsoft Solutions Framework - Part 2

  •    Plan For All Phases Of Microsoft Solutions Framework - Part 3

  •    Module 1 Questions

Module 2: Designing A Lync Server 2013

  •    Plan Infrastructure Requirements For Lync Server 2013 - Part 1

  •    Plan Infrastructure Requirements For Lync Server 2013 - Part 2

  •    Use The Lync Server 2013 Planning Tool

  •    Use The Topology Builder - Part 1

  •    Use The Topology Builder - Part 2

  •    Plan The Server Infrastructure

  •    Design Documentation With The Use Of Microsoft Office - Part 1

  •    Design Documentation With The Use Of Microsoft Office - Part 2 And Module 2 Questions

Module 3: Installing Lync

  •    Prepare For Installation

  •    Install Lync - Part 1

  •    Install Lync - Part 2

Module 4: Using Management Tools And RBAC

  •    Using Management Tools - Part 1

  •    Using Management Tools - Part 2

  •    Using Management Tools - Part 3

  •    Using Management Tools - Part 4

  •    Using Management Tools - Part 5

  •    Using Management Tools - Part 6

  •    Introduction To Role-Based Access Control

  •    Module 4 Questions

Module 5: Deploying And Managing Clients And Devices

  •    Prepare For Client Deployment

  •    Deploy And Manage Lync 2013 Clients

  •    Prepare For Device Deployment And Module 5 Questions

Module 6: Conferencing In Lync Server 2013

  •    Introduction To Conference In Lync Server 2013 - Part 1

  •    Introduction To Conference In Lync Server 2013 - Part 2

  •    Design For Web And Audio-Video Conferencing

  •    Introduction To Dial-In Conferencing In Lync Server 2013

  •    Manage And Administer Conferencing And Module 6 Questions

Module 7: Designing And Deploying External Access

  •    Introduction To Lync 2013 External Capabilities - Part 1

  •    Introduction To Lync 2013 External Capabilities - Part 2

  •    Plan For IM And Presence Federation

  •    Design Edge Requirements - Part 1

  •    Design Edge Requirements - Part 2

  •    Module 7 Questions

Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat

  •    Introduction To Persistent Chat Architecture And Design Considerations In Lync Server 2013

  •    Deploy And Configure Lync Server 2013 Persistent Chat And Module 8 Questions

Module 9: Archiving And Monitoring

  •    Introduction To The Archiving And Monitoring Services

  •    Configure Archiving And Monitoring And Module 9 Questions

Module 10: Administering And Maintaining Lync Server 2013

  •    Administering And Maintaining Lync Server 2013 - Part 1

  •    Administering And Maintaining Lync Server 2013 - Part 2

Module 11: Configuring And Managing High Availability In Lync Server 2013

  •    Introduction To High Availability In Lync Server 2013

  •    Design Load Balancing - Part 1

  •    Design Load Balancing - Part 2

Module 12: Understanding Disaster Recover In Lync Server 2013

  •    Understanding Disaster Recover In Lync Server 2013 - Part 1

  •    Understanding Disaster Recover In Lync Server 2013 - Part 2

  •    Module 12 Real World Scenarios And Questions

Module 13: Planning a Migration to Lync Server 2013

  •    Introduction To Coexistence And Migration - Part 1

  •    Introduction To Coexistence And Migration - Part 2

  •    Introduction To Coexistence And Migration - Part 3

  •    Introduction To Migration Steps - Part 1

  •    Introduction To Migration Steps - Part 2

  •    Plan For Clients And Devices And Design Client Migration And Device Migration Strategy

  •    Course Outro

Microsoft 70-337: MCSE: Communication - Lync Server Course Content

Module 1: Understanding Voice Architecture

  •    Course Introduction

  •    Introduction To Architecture And Server Roles - Part 1

  •    Introduction To Architecture And Server Roles - Part 2

  •    Introduction To Architecture And Server Roles - Part 3

  •    Introduction To Architecture And Server Roles - Part 4

  •    Introduction To Architecture And Server Roles - Part 5

Module 2: Configuring Key Enterprise Voice Functionality

  •    Introduction To Lync Voice Routing

  •    Configure Enterprise Voice - Part 1

  •    Configure Enterprise Voice - Part 2

  •    Configure Enterprise Voice - Part 3

  •    Define Voice Policies - Part 1

  •    Define Voice Policies - Part 2

Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with Lync Server 2013

  •    Introduction To Exchange 2013 Unified Messaging - Part 1

  •    Introduction To Exchange 2013 Unified Messaging - Part 2

  •    Configure Exchange UM To Work With Lync 2013 - Part 1

  •    Configure Exchange UM To Work With Lync 2013 - Part 2

  •    Configure Exchange UM To Work With Lync 2013 - Part 3

  •    Configure Exchange UM To Work With Lync 2013 - Part 4

  •    Configuring Exchange And Lync Feature Integration - Part 1

  •    Configuring Exchange And Lync Feature Integration - Part 2

  •    Configuring Exchange And Lync Feature Integration - Part 3

  •    Configuring Exchange And Lync Feature Integration - Part 4

  •    Configuring Exchange And Lync Feature Integration - Part 5

Module 4: Understanding Voice Applications

  •    Introduction To Response Group Services - Part 1

  •    Introduction To Response Group Services - Part 2

  •    Introduction To Response Group Services - Part 3

  •    Introduction To Response Group Services - Part 4

Module 5: Configuring and Deploying Emergency Calling

  •    Introduction To Location Information Server - Part 1

  •    Introduction To Location Information Server - Part 2

  •    Introduction To Set Up And Call Flow - Part 1

  •    Introduction To Set Up And Call Flow - Part 2

  •    E911 User Experience

Module 6: Integrating the PSTN

  •    Connect To The PSTN - Part 1

  •    Connect To The PSTN - Part 2

  •    Connect To The PSTN - Part 3

  •    Connect To The Existing PBX

  •    Intro To M-N Interworking Routing

  •    Introduction To Call Routing Reliability

Module 7: Understanding Lync Server 2013 and Networking

  •    Plan For Media Requirements - Part 1

  •    Plan For Media Requirements - Part 2

  •    Plan For Call Admission Control - Part 1

  •    Plan For Call Admission Control - Part 2

  •    Introduction To Media Bypass

Module 8: Understanding Phones and Devices

  •    Introduction To Phones And Devices Deploy Device - Part 1

  •    Introduction To Phones And Devices Deploy Device - Part 2

  •    Introduction To Phones And Devices Deploy Device - Part 3

  •    Lync Server 2013 Phones Management - Part 1

  •    Lync Server 2013 Phones Management - Part 2

Module 9: Configuring And Migrating Lync Online

  •    Introduction To Office 365 Architecture

  •    Deploy Lync Online

  •    Introduction To Lyncy brid Scenerios

Module 10: Monitoring

  •    Introduction To Voice Quality Concepts

  •    Explore Lync Monitoring Server Components

  •    Explore Lync Monitoring Server Reports

Module 11: Understanding Lync Server2013 Voice Resiliency

  •    Introduction To Voice Resilience

  •    Introduction Lync Pool Resilience

  •    Introduction Branch Office Resilience

  •    Course Outro

Microsoft 70-467: Designing Business Intelligence Solutions with SQL Server 2012 Course Content

Module 1: Intro To Business Intelligence

  •    Introduction

  •    The Business Intelligence Solution

  •    Overview Of Business Intelligence

  •    BI And Power Pivot Demo

  •    ETL Intro

  •    Designing Data Warehouses

  •    Design For Speed

  •    BI Semantic Model

Module 2: Database Essentials

  •    Basic Database Objects Demo

  •    Stored Procedures And Triggers Demo

  •    Database Clusters Demo

  •    SQL Server Management

  •    Table Triggers

  •    DB Config Options

  •    DB Backup

  •    DB Files And Restore

Module 3: Business Intelligence Development

  •    Using SQL Server Data Tools Demo

  •    Building An IS Integration Services Package Demo

  •    Loading Data From Remote Sources Demo

Module 4: Business Intelligence Results

  •    Report Building Intro Setup Demo

  •    Using Report Builder Demo

  •    Processing Data From Web Service Demo

  •    Reporting From Multiple Tables Demo

  •    Report Function And Matrix Demo

  •    Interactive Reports Demo

  •    Sorting Report Data Demo

Module 5: Advanced Reporting And Development

  •    Drill Through Reports

  •    Data Visualization

  •    Creating Store Procedure From Scratch

  •    Memory Optimize Table

Module 6: SQL Server Integration Services (SSIS)

  •    Building Our First Integration Project

  •    Data Transformation

  •    Introduction To Big Data

  •    Transformation Using Store Procedure

  •    Transformation Using SSIS

  •    Building Fact Table Using Store Procedure

  •    Building Fact Table Using SSIS

Module 7: SQL Server 2014 New Features

  •    Backup Enhancements

  •    Index Enhancements

  •    Online DB Enhancements

  •    BackUp To The Cloud

  •    Partition Data

Module 8: Course Review And Exam Prep

  •    BI Review

  •    SharePoint Overview

  •    SharePoint Demo

  •    Exam Prep

  •    Before You Take The Exam

  •    Conclusion

Citrix CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.6 Course Content

Module 1: Introduction To Virtualization

  •    Introduction

  •    Intro To Virtualization-Part1

  •    Virtualization Demo-Part1

  •    Virtualization Demo-Part2

  •    Intro To Virtualization-Part2

Module 2: Introduction To Desktop Virtualization

  •    Into To Desktop Virtualization

Module 3: XenDesktop 7.6 Requirements and Implementations

  •    Intro To Xen Desktop Concepts And Components

  •    Xen Desktop Implementations-Part1

  •    Xen Desktop Implementations-Part2

Module 4: Plan and Design XenDesktop Infrastructure

  •    Intro To Plan And Design-Part1

  •    Intro To Plan And Design-Part2

  •    Active Directory Permissions Demo

  •    Customize The Desktop Demo

  •    Customize Environment Demo

  •    Folder Redirection Demo

  •    Custom Scripts Demo

  •    Dynamic VM Demo

  •    Network Design Considerations

  •    VM From Scratch Demo

  •    Access And Optimize

  •    Cloud Considerations Demo

  •    Design Monitoring

Module 5: Data And Network Redundancy

  •    Intro To Network Redundancy

  •    Intro To Data Redundancy

  •    VM Availability Demo-Part1

  •    VM Availability Demo-Part2

  •    VM Availability Demo-Part3

  •    Citrix Linux VM And Citrix Xendesktop Site Configuration Demo

Module 6: Automating Using Powershell

  •    Intro To Powershell-Part1

  •    Intro To Powershell-Part2

  •    Powershell Scripting Demo

  •    Creating Functions In Powershell

Module 7: Virtualizing Using Hyper-V

  •    Introduction To Hyper-V Installtion

  •    Introduction To Hyper-V VM Build

  •    Automating Admin In Hyper-V

Module 8: Build Test And Deploy VM To Xen Desktop

  •    Customize Client OS Demo

  •    Customize User Profiles Demo

  •    Installing XenDesktop Client Components For Pooled Desktops Demo

  •    Installing XenDesktop Client Components For Remote Desktops Demo

  •    Deploy XenDesktop Client After VDA Install Demo

  •    Test Client Deployment Demo

Module 9: Internet Information Services

  •    Intro And Install Of Information Services-Part1

  •    Intro And Install Of Information Services-Part2

  •    Creating Websites And Managing Application Pools

  •    Backup And Restore WebServer

Module 10: Course Review

  •    Active Directory Domain

  •    Windows Permissions And Configurations

  •    Configure Citrix XenDesktop Studio

  •    Failover Cluster Demo

  •    Citrix Authentication And Troubleshooting

  •    XenDesktop Technical Overview

  •    SQL Server Database Overview Demo

  •    SQL Server DBA Tasks

  •    Conclusion

Aerobic Bootcamp Course Content

Module 1: Beginner

  •    Beginner

Module 2: Intermediate

  •    Intermediate

Module 3: Advanced

  •    Advanced

How to Become a Personal Trainer Course Content

How to Become a Personal Trainer

  •    Intro

  •    Requirements

  •    Skills For A Successful Personal Trainer

  •    Questions To Consider

  •    Certifications

  •    Job Opportunities

  •    Salary For Personal Trainer

  •    First Aid And CPR

  •    Time Needed To Become A Personal Trainer

  •    Know Your Clients

  •    Interesting And Fun

  •    Common Mistakes

  •    Retaining Your Clients

  •    Insurance

  •    Summary

Six Sigma Black Belt Course Content

Module 1: Organization­ - Wide Planning and Deployment

  •    Introduction

  •    Wide Planning And Deployment-Part 1

  •    Wide Planning And Deployment-Part 2

  •    Wide Planning And Deployment-Part 3

Module 2: Leadership

  •    Leadership-Part 1

  •    Leadership-Part 2

Module 3: Organizational Process Measures and Management

  •    Organizational Process Measures And Management-Part 1

  •    Organizational Process Measures And Management-Part 2

Module 4: Team Management

  •    Team Management-Part 1

  •    Team Management-Part 2

  •    Team Management-Part 3

  •    Team Management-Part 4

Module 5: Define Phase­ - Overview of the Define Phase and the Voice of the Customer

  •    Overview Of The Define Phase And The Voice Of The Customer-Part 1

  •    Overview Of The Define Phase And The Voice Of The Customer-Part 2

  •    Overview Of The Define Phase And The Voice Of The Customer-Part 3

Module 6: Define Phase - Business Case and Project Charter

  •    Business Case And Project Charter-Part 1

  •    Business Case And Project Charter-Part 2

Module 7: Define Phase­ - Analytical Tools

  •    Analytical Tools

Module 8: Measure Phase­ - Process Analysis and Documentation

  •    Process Analysis And Documentation-Part 1

  •    Process Analysis And Documentation-Part 2

  •    Process Analysis And Documentation-Part 3

Module 9: Measure Phase­ - Data Collection

  •    Data Collection

Module 10: Measure Phase - ­Measurement Systems

  •    Measurement Systems-Part 1

  •    Measurement Systems-Part 2

Module 11: Measure Phase­ - Basic Statistics

  •    Basic Statistics-Part 1

  •    Basic Statistics-Part 2

Module 12: Measure Phase­ - Probability

  •    Probability

Module 13: Measure Phase­ - Process Capability

  •    Process Capability

Module 14: Analyze Phase - Measuring and Modeling Relationships

  •    Measuring And Modeling Relationships

Module 15: Analyze Phase­ - Hypothesis Testing

  •    Hypothesis Testing

Module 16: Analyze Phase­ - FEMA and Additional Analysis Methods

  •    FMEA And Additional Analysis Methods-Part 1

  •    FMEA And Additional Analysis Methods-Part 2

  •    FMEA And Additional Analysis Methods-Part 3

  •    FMEA And Additional Analysis Methods-Part 4

Module 17: Improve Phase­ - Design of Experiments (DOE)

  •    Design Of Experiments-Part 1

  •    Design Of Experiments-Part 2

Module 18: Improve Phase­ - Lean Method

  •    Lean Method-Part 1

  •    Lean Method-Part 2

  •    Lean Method-Part 3

Module 19: Improve Phase -­ Implementation

  •    Implementation

Module 20: Control Phase­ - Statistical Process Control (SPC)

  •    Statistical Process Control

Module 21: Control Phase­ - Other Controls

  •    Other Controls

Module 22: Control Phase­ - Maintain Controls and Sustain Improvements

  •    Maintain Controls And Sustain Improvements

Module 23: DFSS

  •    DFSS

Module 24: Exam Review­ - Prep and Key Concepts

  •    Prep And Key Concepts-Part 1

  •    Prep And Key Concepts-Part 2

  •    Prep And Key Concepts-Part 3

  •    Prep And Key Concepts-Part 4

  •    Prep And Key Concepts-Part 5

  •    Conclusion

Six Sigma Green Belt Course Content

Module 1: Six Sigma And The Organization

  •    Introduction

  •    Six Sigma And The Organization Goals-Part 1

  •    Six Sigma And The Organization Goals-Part 2

  •    Lean Principles In The Organization

  •    Design For Six Sigma

Module 2: Define Phase­Project Identification

  •    Define Phase-Project Identification-Part 1

  •    Define Phase-Project Identification-Part 2

  •    Define Phase-Project Identification-Part 3

Module 3: Define Phase­Voice Of The Customer

  •    Define Phase-Voice Of The Customer-Part 1

  •    Define Phase-Voice Of The Customer-Part 2

Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt

  •    Define Phase-Project Management Basics-Part 1

  •    Define Phase-Project Management Basics-Part 2

Module 5: Define Phase­Management And Planning Tools

  •    Define Phase-Management And Planning Tools-Part 1

  •    Define Phase-Management And Planning Tools-Part 2

Module 6: Define Phase­Business Results For Projects

  •    Define Phase-Business Results For Projects-Part 1

  •    Define Phase-Business Results For Projects-Part 2

Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions

  •    Define Phase-Team Dynamics And Review Questions

  •    Define Phase-Summary And Review Questions

Module 8: Measure Phase­Process Analysis And Documentation

  •    Measure Phase-Process Analysis And Documentation

Module 9: Measure Phase­Probability And Statistics

  •    Measure Phase-Probability And Statistics

Module 10: Measure Phase­Statistical Distributions

  •    Measure Phase-Statistical Distributions

Module 11: Measure Phase­Collecting And Summarizing Data

  •    Measure Phase-Collecting And Summarizing Data-Part 1

  •    Measure Phase-Collecting And Summarizing Data-Part 2

Module 12: Measure Phase­Measurements System Analysis (MSA)

  •    Measure Phase-Measurements System Analysis(MSA)

Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review

  •    Measure Phase-Process And Performance Capability And Measure Phase Summary And Review

Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing

  •    Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part1

  •    Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part2

  •    Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part3

Module 15: Analyze Phase ­ Process Drivers

  •    Analyze Phase-Process Drivers-Part 1

  •    Analyze Phase-Process Drivers-Part 2

  •    Analyze Phase-Process Drivers-Part 3

  •    Analyze Phase-Process Drivers-Part 4

  •    Analyze Phase-Process Drivers-Part 5

Module 16: Improve Phase­Design Of Experiment (DOE)

  •    Improve Phase-Design Of Experiment(DOE)-Part 1

  •    Improve Phase-Design Of Experiment(DOE)-Part 2

Module 17: Improve Phase­Root Cause Analysis

  •    Improve Phase-Root Cause Analysis-Part 1

  •    Improve Phase-Root Cause Analysis-Part 2

  •    Improve Phase-Root Cause Analysis-Demo

Module 18: Improve Phase­Lean Tools

  •    Improve Phase-Lean Tools-Part 1

  •    Improve Phase-Lean Tools-Part 2

  •    Improve Phase-Lean Tools-Part 3

  •    Improve Phase-Lean Tools-Part 4

Module 19: Control Phase­ Statistical Process Control

  •    Control Phase-Statistical Process Control

Module 20: Control Phase­Lean Tools For Process Control

  •    Control Phase-Lean Tools For Process Control-Part 1

  •    Control Phase-Lean Tools For Process Control-Part 2

  •    Control Phase-Lean Tools For Process Control-Part 3

Module 21: Review Exam­Prep And Key Concepts

  •    Exam Review And Key Concepts-Part 1

  •    Exam Review And Key Concepts-Part 2

  •    Exam Review And Key Concepts-Part 3

  •    Exam Review And Key Concepts-Part 4

  •    Exam Review And Key Concepts-Part 5

  •    Exam Review And Key Concepts-Part 6

  •    Exam Review And Key Concepts-Part 7

  •    Exam Review-Flash Cards

  •    Conclusion

Microsoft 70-247: Configuring and Deploying a Private Cloud 2012 Course Content

Module 1: Designing For The Cloud

  •    Introduction

  •    Designing The Cloud

  •    Reason For Using The Cloud

  •    Choosing The Right Cloud Model

  •    Designing Private Clouds

  •    Overview Of Virtualization Components

  •    Windows Server 2012 R2 And Hyper-V

  •    System Center 2012 R2 - Part 1

  •    System Center 2012 R2 - Part 2

  •    Deploying Highly Available Hyper-V Hosts

Module 2: Using System Center Virtual Machine Manager R2

  •    Overview Of Virtual Machine - Part 1

  •    Overview Of Virtual Machine - Part 2

  •    Deploying VMM

  •    Configuring Role Based Access Control

  •    Managing Hosts

  •    Configuring Networking - Part 1

  •    Configuring Networking - Part 2

  •    Configuring Storage

Module 3: Deploying And Maintaining Fabric Resources

  •    Extending And Maintaining The Cloud Infrastructure

  •    Deploying Hyper-V Host Servers - Part 1

  •    Deploying Hyper-V Host Servers - Part 2

  •    Providing Patch Management For Fabric Resources - Part 1

  •    Providing Patch Management For Fabric Resources - Part 2

Module 4: Building The Private Cloud

  •    Creating Building Blocks For The Private Cloud - Part 1

  •    Creating Building Blocks For The Private Cloud - Part 2

  •    Creating Virtual Machine Templates

  •    Creating A Private Cloud

  •    Creating And Deploying Applications - Part 1

  •    Creating And Deploying Applications - Part 2

  •    Creating And Deploying Applications - Part 3

  •    Creating And Configuring Services - Part 1

  •    Creating And Configuring Services - Part 2

  •    Configuring Access To The Private Cloud

Module 5: Monitoring And Optimizing The Private Cloud

  •    Overview Of Operations Manager

  •    Installing Operations Manager

  •    Deploying Monitoring Agents

  •    Configuring Access To Operations Manager

  •    Creating And Configuring Management Packs

  •    Configuring System Center Integration

  •    Extending And Optimizing Monitoring - Part 1

  •    Extending And Optimizing Monitoring - Part 2

Module 6: Planning And Deploying Service Management

  •    Overview Of Service Manager

  •    Deploying Service Manager

  •    Service Manager Work Items - Part 1

  •    Service Manager Work Items - Part 2

  •    Service Manager Work Items - Part 3

  •    Service Manager Notifications

  •    System Center Integration - Part 1

  •    System Center Integration - Part 2

Module 7: Automating And Standardizing The Private Cloud

  •    Overview Of Orchestrator

  •    Deploying Automation Using Orchestrator

  •    Configuring Integration Packs

  •    Configuring And Managing Runbooks

Module 8: Disaster Recovery And High Availability For The Private Cloud

  •    Overview Of Data Protection Manager

  •    Planning For Data Protection Manager

  •    Deploying Data Protection Manager

  •    Configuring Protection For The Private Cloud

  •    Configuring Protection For Applications - Part 1

  •    Configuring Protection For Applications - Part 2

  •    Hyper-V Recovery Manager

Module 9: Implementing Self­Service Multi­Tenant Private Clouds

  •    Implementing The Cloud Services Process Pack - Part 1

  •    Implementing The Cloud Services Process Pack - Part 2

  •    Service Provider Foundation

  •    Configuring The Windows Azure Pack

  •    Conclusion

Weight Loss Course Content

Weight Loss

  •    Introduction

  •    Emotional Eating And Digestion

  •    Metabolism And Improving Digestion

  •    Food Mood And Steps For Weight Loss

  •    Portion Size

  •    Calorie Intake

  •    Supplements And Heart rate

Microsoft 70-688: Managing and Maintaining Windows 8 Course Content

Module 1: Introduction

  •    Intro To Exam 70-688

  •    Implementing A Methodology For Troubleshooting-Part1

  •    Implementing A Methodology For Troubleshooting-Part2

  •    Implementing A Methodology For Troubleshooting-Demo

Module 2: Troubleshooting Start Up Issues

  •    Troubleshooting Start Up Issues-Part1

  •    Troubleshooting Start Up Issues-Part2

  •    Troubleshooting Start Up Issues-Part3

  •    Troubleshooting Start Up Issues-Part4

  •    Troubleshooting Start Up Issues-Demo

Module 3: ​Managing Drivers And Hardware

  •    Managing Drivers And Hardware-Part1

  •    Managing Drivers And Hardware-Part2

  •    Managing Drivers And Hardware-Part3

  •    Managing Drivers And Hardware-Demo

Module 4: Troubleshooting Remote Computers

  •    Troubleshooting Remote Computers-Part1

  •    Troubleshooting Remote Computers-Part2

  •    Troubleshooting Remote Computers-Part3

Module 5: Resolving Problems With Network Connectivity

  •    Resolving Problems With Network Connectivity-Part1

  •    Resolving Problems With Network Connectivity-Part2

  •    Resolving Problems With Network Connectivity-Part3

  •    Resolving Problems With Network Connectivity-Part4

  •    Resolving Problems With Network Connectivity-Part5

Module 6: Troubleshooting Group Policy

  •    Troubleshooting Group Policy-Part1

  •    Troubleshooting Group Policy-Part2

  •    Troubleshooting Group Policy-Part3

  •    Troubleshooting Group Policy-Part4

Module 7: Troubleshooting User Settings

  •    Troubleshooting User Settings-Part1

  •    Troubleshooting User Settings-Part2

  •    Troubleshooting User Settings-Part3

Module 8: Configuring And Troubleshooting Remote Connectivity

  •    Configuring And Troubleshooting Remote Connectivity-Part1

  •    Configuring And Troubleshooting Remote Connectivity-Part2

  •    Configuring And Troubleshooting Remote Connectivity-Part3

  •    Configuring And Troubleshooting Remote Connectivity Demo-Part1

  •    Configuring And Troubleshooting Remote Connectivity Demo-Part2

  •    Configuring And Troubleshooting Remote Connectivity Demo-Part3

Module 9: ​Troubleshooting Resource Access In A Domain

  •    Troubleshooting Resource Access In A Domain-Part1

  •    Troubleshooting Resource Access In A Domain-Part2

  •    Troubleshooting Resource Access In A Domain-Part3

  •    Troubleshooting Resource Access In A Domain-Demo

Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members

  •    Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1

  •    Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2

  •    Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3

  •    Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo

Module 11: Troubleshooting Applications

  •    Troubleshooting Applications-Part1

  •    Troubleshooting Applications-Part2

  •    Troubleshooting Applications-Part3

  •    Troubleshooting Applications-Part4

  •    Troubleshooting Applications-Demo

Module 12: Maintaining Windows 8.1

  •    Maintaining Windows 8.1-Part1

  •    Maintaining Windows 8.1-Part2

  •    Maintaining Windows 8.1-Part3

  •    Maintaining Windows 8.1-Part4

  •    Maintaining Windows 8.1-Demo

Module 13: Recovering Windows 8.1

  •    Recovering Windows 8.1

  •    Conclusion

Microsoft 70-686 Pro: Windows 7, Enterprise Desktop Administrator Course Content

Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment

  •    Introduction

  •    Developing A Strategy-Part1

  •    Developing A Strategy-Part2

  •    Developing A Strategy-Part3

  •    Developing A Strategy-Part4

  •    Developing A Strategy Demo-Part1

  •    Developing A Strategy Demo-Part2

Module 2: Evaluating Application Compatibility in Windows® 7

  •    Evaluating Application Compatibility-Part1

  •    Evaluating Application Compatibility-Part2

  •    Evaluating Application Compatibility-Demo

Module 3: Assessing Deployment Methods for Windows® 7

  •    Assessing Deployment Methods-Part1

  •    Assessing Deployment Methods-Part2

  •    Assessing Deployment Methods-Demo

Module 4: Designing Standard Images for Windows® 7

  •    Designing Standard Images-Part1

  •    Designing Standard Images-Part2

  •    Designing Standard Images-Part3

  •    Designing Standard Images-Demo

Module 5: Deploying Windows® 7 with Windows AIK

  •    Deploying Windows With Windows AIK

  •    Deploying Windows With Windows AIK-Demo

Module 6: Using Windows Deployment Services to Deploy Windows® 7

  •    Using Windows Deployment Services-Part1

  •    Using Windows Deployment Services-Part2

  •    Using Windows Deployment Services-Demo

Module 7: Deploying Windows® 7 Using Lite Touch Installation

  •    Deploying Windows 7 Using Lite Touch Installation

  •    Deploying Windows 7 Using Lite Touch Installation-Demo

Module 8: Deploying Windows® 7 Using Zero Touch Installation

  •    Deploying Windows 7 Using Zero Touch Installation

  •    Deploying Windows 7 Using Zero Touch Installation-Demo

Module 9: Migrating User State Using USMT 4.0 and WET

  •    Migrating User State Using USMT 4.0 And WET-Part1

  •    Migrating User State Using USMT 4.0 And WET-Part2

Module 10: Planning, Configuring, and Managing the Client Environment

  •    Planning Configuring And Managing The Client Environment-Part1

  •    Planning Configuring And Managing The Client Environment-Part2

  •    Planning Configuring And Managing The Client Environment-Part3

  •    Planning Configuring And Managing The Client Environment-Part4

  •    Planning Configuring And Managing The Client Environment-Demo

Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients

  •    Planning And Deploying Applications And Updates To Windows 7 Clients-Part1

  •    Planning And Deploying Applications And Updates To Windows 7 Clients-Part2

  •    Planning And Deploying Applications And Updates To Windows 7 Clients-Part3

  •    Planning And Deploying Applications And Updates To Windows 7 Clients-Demo

Microsoft 70-432: SQL Server 2008, Implementation and Maintenance Course Content

Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  •    Introduction

  •    Installing Part 1

  •    Installing Part 2

  •    Installing Part 2 Demo 1

  •    Installing Part 2 Demo 2

Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  •    Getting Familiar With SQL Part 1

  •    Getting Familiar With SQL Part 1 Demo

  •    Getting Familiar With SQL Part 2

  •    Getting Familiar With SQL Part 2 Demo

  •    Getting Familiar With SQL Part 3

  •    Getting Familiar With SQL Part 3 Demo

Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  •    Data Types

  •    Data Types Demo

Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  •    Databases Part 1

  •    Databases Part 1 Demo

  •    Databases Part 2

  •    Databases Part 2 Demo

  •    Databases Part 3

Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance

  •    Tables

  •    Tables Demo

Module 6: Looking at Views

  •    Views Part 1

  •    Views Part 1 Demo

  •    Views Part 2

  •    Views Part 2 Demo

  •    Views Part 3

Module 7: About Constraints

  •    Constraints Part 1

  •    Constraints Part 1 Demo

  •    Constraints Part 2

Module 8: Looking at Stored Procedures

  •    Stored Procedures Part 1

  •    Stored Procedures Part 1 Demo

  •    Stored Procedures Part 2

Module 9: Functions

  •    Functions

  •    Functions Demo

Modules 10: About Service Broker

  •    Service Broker Part 1

  •    Service Broker Part 2

Modules 11: Integrity

  •    Data Integrity Part 1

  •    Data Integrity Part 2

Modules 12: Permissions in SQL

  •    Permissions Part 1

  •    Permissions Part 1 Demo

  •    Permissions Part 2

Modules 13: Accounts

  •    Logins Roles And Credentials

  •    Logins Roles And Credentials Demo

Modules 14: Security

  •    Additional Security Tools

  •    Additional Security Tools Demo

Modules 15: Backups/Restores

  •    Backing Up And Restoring Databases Part 1

  •    Backing Up And Restoring Databases Part 2

  •    Backing Up And Restoring Databases Demo

Modules 16: Endpoints

  •    Endpoints

Modules 17: Servers working together

  •    Linking Servers

Modules 18: Triggers in SQL

  •    Triggers

Modules 19: Replication between servers

  •    Replication Part 1

  •    Replication Part 2

Modules 20: Indexes

  •    Performing Indexing And Full Text Searching

Modules 21: Transactions in SQL

  •    Transaction And Locks

Modules 22: Data moves

  •    Moving Data

Modules 23: Data specialties in SQL

  •    Handling Specialty Data

Modules 24: Fault Tolerance

  •    High-Availability Methods Part 1

  •    High-Availability Methods Part 2

Modules 25: SQL Management

  •    Maintaining And Automating SQL Server

Modules 26: SQL Management Monitoring

  •    Monitoring And Optimizing SQL Server

  •    Monitoring And Optimizing SQL Server Demo

Modules 27: SQL Management tools

  •    SQL Server Management Tools

Module 28: Troubleshooting

  •    Troubleshooting Techniques

  •    Troubleshooting Techniques Demo

Module 29: Course Review

  •    Course Review Part 1

  •    Course Review Part 2

  •    Course Review Part 3

  •    Course Review Part 4

  •    Course Review Part 5

Module 30: Common Questions

  •    Common Student Questions Part 1

  •    Common Student Questions Part 2

Module 31: Real World Scenarios

  •    Real World Scenarios Part 1

  •    Real World Scenarios Part 2

Mastering Beer Brewing Course Content

Day 1

  •    Intro

  •    History

  •    Sanitation

  •    Cleaning

  •    Extract Batch Equipment

  •    Air Locks

  •    Extract Batch Ingredients

  •    Extract Batch Recipe

  •    Heating

  •    First Hop Addition

  •    Second Hop Addition

  •    Filtering

  •    Measuring Density

Day 2

  •    Mixed Batch Intro

  •    Adding Malt

  •    Removing Malt

  •    Adding Extract

  •    Adding 1st Hops

  •    2nd Hops Addition

  •    3rd Hops Addition

  •    Final Hop Adition

  •    Add Yeast Part 1

  •    Add Yeast Part 2

  •    All Grains Part 1

  •    All Grains Part 2

  •    All Ingredients

Day 3

  •    All Grains Intro

  •    CU of Fermentation Bubbling

  •    Adding Grain

  •    Adding Grain Insert

  •    Sparging Part 1

  •    Sparging Part 2

  •    Sparging Mid Process

  •    Boiling

  •    2nd Hop Addition

  •    Colling Wort

  •    Adding Yeast

  •    Alternative Methods

Day 4

  •    Post Brewing Overview

  •    Siphoning

  •    Bottling

  •    Capping

  •    Bottling Alternatives

  •    Kegs Part 1

  •    Kegs Part 2

  •    Natural Carbonation

  •    Forced Carbonation

  •    Kegerator

  •    Finished Product

  •    Outro

Mastering Bartending in a Week or Less Course Content

Day 1

  •    Intro

  •    Glassware

  •    Tools

  •    Alcohol Types

Day 2

  •    Martini

  •    Martini continued

  •    Flavored Martini

  •    Section Tool

  •    Long Island

  •    Sour Drinks

  •    Popular Drinks Part 1

  •    Popular Drinks Part 2

  •    Popular Drinks Part 3

  •    Popular Drinks Part 4

  •    Ruthie Martini

  •    Ruthie Martini Continued

  •    Flavored Martinis

  •    More Sour Drinks

Day 3

  •    Recap Drinks

  •    Muddlers

  •    Popular Drinks

  •    Popular Drinks 2

  •    Tropical Drinks

  •    Shooters Part 1

  •    Shooters Part 2

  •    Shooters Part 3

  •    Shots

  •    Shooters Conclusion

  •    Beer

  •    Greetings Customers

Day 4

  •    Recap-Drinks

  •    Layered Shots

  •    Wines

  •    Counterfeit Money

  •    Organizing Your Bar Part 1

  •    Organizing Your Bar Part 2

  •    Valid ID

  •    Tools and Accessories

  •    Common Issues

Day 5

  •    Review Intro

  •    Review Characters

  •    Review Tools

  •    Review Pour

  •    Review Glass

  •    Review Martinis

  •    Review Muddler

  •    Review Drinks

  •    Review Lit

  •    Review Sour Drinks

  •    Review Types of Liquor

  •    Review More Drinks

  •    Review Tropical Drinks

  •    Review Shooters

  •    Review Beer

  •    Review Layered Shots

  •    Review Money

  •    Review ID

  •    Conclusion

How to Handle Stress in the Workplace Course Content

How to Handle Stress in the Workplace

  •    Introduction

  •    What is Stress

  •    What Does Stress Lead To

  •    Stress And Food

  •    Chronic Stress And Cortisol-Part 1

  •    Chronic Stress And Cortisol-Part 2

  •    Client Stress Stories

  •    Stress In The Workplace

  •    Strategies For Managing Stress

  •    Planning Ahead

  •    Money

  •    Sleep

  •    Breathing

  •    Learn To Say No

  •    Stress Relief At Your Desk

  •    Stretching

  •    Conclusion

Yoga Course Content

Beginner

  •    Beginner

Intermediate

  •    Intermediate

Advanced

  •    Advanced

Become a Scrum Master Course Content

Module 1: Development Methods

  •    Introduction To Scrum Master

  •    Development Methods

Module 2: Agile Manifesto Principles

  •    Agile Manifesto Principles

Module 3: Scrum

  •    Scrum

  •    Scrum Summary

Module 4: Why Scrum

  •    Why Scrum?

Module 5: Scrum-Roles Overview

  •    Scrum - Roles Overview

Module 6: Product Owner

  •    Product Owner

Module 7: Scrum Master

  •    Scrum Master

Module 8: Scrum Team

  •    Scrum Team

Module 9: Scrum Process

  •    Scrum Process

Module 10: Scrum Project Phase

  •    Scrum Project Phase

Module 11: Plan and Estimate

  •    Plan And Estimate

Module 12: Implement

  •    Implement

Module 13: Review and Retrospect

  •    Review And Retrospect

Module 14: Release

  •    Release

Module 15: Project Vision

  •    Project Vision

Module 16: Scrum Master and Stake Holder(s)

  •    Scrum Master And Stake Holders

Module 17: Form Scrum Team

  •    Form Scrum Team

Module 18: Develop Epics

  •    Develop Epics

Module 19: User Stories

  •    User Stories

Module 20: Justifications and Sample Change(s)

  •    Justifications And Sample Changes

Module 21: Creating a Prioritized Backlog

  •    Creating A Prioritized Backlog

Module 22: Conduct Release Planning

  •    Conduct Release Planning

Module 23: Sprints

  •    Sprints

Module 24: Scrum Framework

  •    Scrum Framework - Part 1 Roles

  •    Scrum Framework - Part 2 Ceremonies

  •    Scrum Framework - Part 3 Artifacts

Module 25: Scrum of Scrums

  •    Scrum Of Scrums

Module 26: Scrum Demo

  •    Scrum Demo

Module 27: Review

  •    Review

  •    Outro

Microsoft 70-466: Implementing Data Models & Reports with SQL Server 2012 Course Content

Module 1: Introduction To Business Intelligence And Data Modeling

  •    Introduction To Business Intelligence and Data Modeling Part1

  •    Introduction To Business Intelligence and Data Modeling Part2

  •    The Microsoft Business Intelligence Platform Part 1

  •    The Microsoft Business Intelligence Platform Part 2

  •    The Microsoft Business Intelligence Platform Part 3

  •    The Microsoft Business Intelligence Platform Part 4

Module 2: Implementing Reports The SQL Server Reporting Services

  •    Implementing Reports the SQL Server Reporting Services Part 1

  •    Implementing Reports the SQL Server Reporting Services Part 2

  •    Implementing Reports the SQL Server Reporting Services Part 3

  •    Implementing Reports the SQL Server Reporting Services Part 4

  •    Implementing Reports the SQL Server Reporting Services Part 5

  •    Implementing Reports the SQL Server Reporting Services Part 6

  •    Implementing Reports the SQL Server Reporting Services Part 7

  •    Implementing Reports the SQL Server Reporting Services Part 8

Module 3: Supporting Self Service Reporting

  •    Supporting Self Service Reporting Part 1

  •    Supporting Self Service Reporting Part 2

Module 4: Managing Report Execution And Delivery

  •    Managing Report Execution And Delivery

  •    Managing Report Execution

  •    Subscriptions And Data Alerts

Module 5: Creating Multidimensional Databases

  •    Creating Multidimensional Databases

  •    Creating Data Sources And Data Source Views

  •    Creating And Browsing a Cube

Module 6: Working With Cubes And Dimensions

  •    Working with Cubes And Dimensions

  •    Sorting And Grouping Attributes

Module 7: Working With Measures And Measure Groups

  •    Working With Measures and Measure Groups

Module 8: Introduction To MDX

  •    Introduction To MDX

  •    Adding Calculations To A Cube

Module 9: Customizing Cube Functionality

  •    Customizing Cube Functionality Part 1

  •    Customizing Cube Functionality Part 2

  •    Customizing Cube Functionality Part 3

Module 10: Implementing A Tabular Data Model

  •    Implementing A Tabular Data Model Part 1

  •    Implementing A Tabular Data Model Part 2

Module 11: Introduction To DAX

  •    Introduction to DAX

  •    Demonstration Making A Tabular Model Part 1

  •    Demonstration Making A Tabular Model Part 2

  •    Using DAX

Module 12: Implementing An Analysis Services Tabular Data Model

  •    Implementing An Analysis Services Tabular Data Model Part 1

  •    Implementing An Analysis Services Tabular Data Model Part 2

  •    Deploying A Tabular Data Model

Module 13: SQL Analysis Services

  •    SQL Analysis Services Part 1

  •    SQL Analysis Services Part 2

Module 14: Creating Data Visualizations With Power View

  •    Creating Data Visualizations With Power View

Module 15: Supporting Self Service Reporting

  •    Supporting Self Service Reporting

Module 16: Performing Predictive Analysis With Data Mining

  •    Performing Predictive Analysis With Data Mining

  •    Using The Data Mining Wizard

Module 17: Predictive Analytics

  •    Predictive Analytics Part 1

  •    Predictive Analytics Part 2

CompTIA CV0-001: CompTIA Cloud + Course Content

Module 1

  •    Introduction

  •    Models-Part 1

  •    Models-Part 2

  •    Service And Delivery Models

  •    Terms And Characteristics

  •    Objects Storage Concepts

Module 2

  •    Virtualization

  •    Install Configure Manage VM And Devices

  •    Backups

  •    Virtual Disks

  •    Virtual Switches

  •    Virtual Resource Migration

  •    Benefits Of Virtualization In A Cloud Environment

  •    Compare And Contrast Virtua lEnvironment

Module 3

  •    Infrastructure

  •    Different Access Protocols

  •    Explain Storage Configuration

  •    File Systems Types

  •    Executing Storage Provisioning

  •    Network Share Demo

  •    Implement Appropriate Network Configurations

  •    Importance Of Network Optimization

  •    Troubleshoot Basic Network Configuration-Part 1

  •    Troubleshoot Basic Network Configuration-Part 2

  •    Troubleshoot Commands-Part 1

  •    Troubleshoot Commands-Part 2

  •    Troubleshoot Commands-Part 3

  •    Explain Common Network Protocols

  •    Common Hardware Resources

Module 4

  •    Resource Management-Part 1

  •    Resource Management-Part 2

  •    Establishing Baselines And Thresholds

  •    Appropriately Allocate Physical Host Resources-Part 1

  •    Appropriately Allocate Physical Host Resources-Part 2

  •    Appropriately Allocate Virtual Guest Resources-Part 1

  •    Appropriately Allocate Virtual Guest Resources-Part 2

  •    Use Appropriate Tools For Remote Access

Module 5

  •    Security-Part 1

  •    Security-Part 2

  •    Storage Security Concepts And Methods

  •    Different Encryption Technologies

  •    Identify Access Control Methods

Module 6

  •    Systems Management-Part 1

  •    Systems Management-Part 2

  •    Diagnose Remediate And Optimize-Part 1

  •    Diagnose Remediate And Optimize-Part 2

  •    Common Performance Concepts-Part 1

  •    Common Performance Concepts-Part 2

  •    Testing Techniques

Module 7

  •    Business Continuity In Cloud-Part 1

  •    Business Continuity In Cloud-Part 2

  •    Solutions To Meet Availability Requirements

  •    Conclusion

Microsoft 70-685 Pro: Windows 7, Enterprise Desktop Support Technician Course Content

Module 1: Installing, Upgrading, and Migrating to Windows 7

  •    Introduction To Exam 685 Windows 7 Enterprise Desktop Support Technician

  •    Introduction To Installing Upgrading And Migrating To Windows 7

  •    Windows 7 Pre-Installation Requirements

  •    Installing Windows 7-Part1

  •    Installing Windows 7-Part2

  •    Installing Windows 7-Part3

  •    Overview Of Image Based Installations-Part1

  •    Overview Of Image Based Installations-Part2

  •    Overview Of Image Based Installations-Part3

  •    Configuring Application Compatibility

  •    Chapter 1 Summary

Module 2: Configuring Disks And Device Drivers

  •    Introduction To Configuring Disks And Device Drivers

  •    Managing And Maintaining Disks-Part1

  •    Managing And Maintaining Disks-Part2

  •    Managing And Maintaining Disks-Part3

  •    Installing And Configuring Device Drivers

  •    Chapter 2 Summary

Module 3: Configuring File Access And Printers

  •    Introduction To Configuring File Access And Printers

  •    Overview Of Authentication And Authorization

  •    Managing File Access-Part1

  •    Managing File Access-Part2

  •    Managing Shared Folders-Part1

  •    Managing Shared Folders-Part2

  •    Configuring File Compression

  •    Managing Printing

  •    Chapter 3 Summary

Module 4: Indentifying And Resolving Log on Problems

  •    Introduction To Identifying And Resolving Logon Problems

  •    Understanding Authentication

  •    Managing Computer Accounts

  •    Additional Network Services-Part1

  •    Additional Network Services-Part2

  •    Troubleshooting User Properties

  •    Resolving Logon Issues

  •    Chapter 4 Summary

Module 5: Configuring Network Connectivity

  •    Introduction To Configuring Network Connectivity

  •    Configuring TCPIP Connectivity-Part1

  •    Configuring TCPIP Connectivity-Part2

  •    Configuring TCPIP Connectivity-Part3

  •    Automatic IP Address Allocation

  •    Name Resolution

  •    Wireless Networking-Part1

  •    Wireless Networking-Part2

  •    Wireless Networking-Part3

  •    Chapter 5 Summary

Module 6: Troubleshooting Network Issues

  •    Introduction To Troubleshooting Network Issues

  •    Troubleshooting Network Connectivity-Part1

  •    Troubleshooting Network Connectivity-Part2

  •    Troubleshooting Network Connectivity-Part3

  •    Troubleshooting Name Resolution-Part1

  •    Troubleshooting Name Resolution-Part2

  •    Troubleshooting Name Resolution-Part3

  •    Troubleshooting Network Printing-Part1

  •    Troubleshooting Network Printing-Part2

  •    Troubleshooting Network Printing-Part3

  •    Chapter 6 Summary

Module 7: Mobile Computing And Remote Access

  •    Introduction To Mobile Computing And Remote Access

  •    Configuring Mobile Computer And Device Settings

  •    Using Remote Control Tools

  •    Configuring And Troubleshooting Remote Access-Part1

  •    Configuring And Troubleshooting Remote Access-Part2

  •    Configuring And Troubleshooting Remote Access-Part3

  •    Configuring And Troubleshooting Remote Access-Part4

  •    Configuring Branch Cache Managing Computer Accounts

  •    Chapter 7 Summary

Module 8: Securing Windows 7 Desktops

  •    Introduction To Securing Windows 7 Desktops

  •    Overview Of Security Management-Part1

  •    Overview Of Security Management-Part2

  •    Overview Of Security Management-Part3

  •    User Account Control

  •    Application Restrictions-Part1

  •    Application Restrictions-Part2

  •    Configuring The Windows Firewall-Part1

  •    Configuring The Windows Firewall-Part2

  •    Configuring The Windows Firewall-Part3

  •    Configuring The Windows Firewall-Part4

  •    Securing And Troubleshooting Internet Explorer-Part1

  •    Securing And Troubleshooting Internet Explorer-Part2

  •    Securing And Troubleshooting Internet Explorer-Part3

  •    Chapter 8 Summary

Module 9: Optimizing And Troubleshooting Performance And Reliabilty

  •    Introduction To Optimizing And Troubleshooting Performance And Reliability

  •    Overview Of Performance And Reliability Tools-Part1

  •    Overview Of Performance And Reliability Tools-Part2

  •    Optimizing Performance-Part1

  •    Optimizing Performance-Part2

  •    Dealing With Hardware Failure

  •    Chapter 9 Summary

Module 10: Maintaining Windows 7 Desktops

  •    Introduction To Maintaining Windows 7 Desktops

  •    Troubleshooting Utilities-Part1

  •    Troubleshooting Utilities-Part2

  •    Troubleshooting Utilities-Part3

  •    Troubleshooting Utilities-Part4

  •    Backing Up And Restoring Data

  •    Using System Restore

  •    Configuring Windows Update

  •    Chapter 10 Summary

  •    Conclusion

Microsoft 70-465: Designing Database Solutions for Microsoft SQL Server 2012 Course Content

Module 1: Designing A Database Server Infrastructure

  •    Introduction

  •    Designing A Database Server Infrastructure-Part1

  •    Designing A Database Server Infrastructure-Part2

  •    Designing A Database Server Infrastructure-Part3

  •    Designing A Database Server Infrastructure-Part4

  •    Considerations For Database Server Consolidation

  •    Managing Server Resources

Module 2: Designing A Logical Database Scheme

  •    Designing A Logical Database Scheme-Part1

  •    Designing A Logical Database Scheme-Part2

  •    Designing A Logical Database Scheme-Part3

  •    Designing A Logical Database Scheme-Part4

  •    Designing A Logical Database Scheme-Part5

Module 3: Designing A Physical Database Implementation

  •    Designing A Physical Database Implementation-Part1

  •    Designing A Physical Database Implementation-Part2

  •    Designing A Physical Database Implementation-Part3

Module 4: Incorporating Data Files Into the Database

  •    Incorporating Data Files Into The Database-Part1

  •    Incorporating Data Files Into The Database-Part2

  •    Incorporating Data Files Into The Database-Part3

  •    Incorporating Data Files Into The Database Demo

  •    Searching Data Files

  •    Searching Data Files Demo

Module 5: Tuning Database Performance

  •    Tuning Database Performance-Part1

  •    Tuning Database Performance-Part2

  •    Tuning Database Performance-Part3

  •    Working With Query Plans-Part1

  •    Working With Query Plans-Part2

  •    Working With Query Plans-Part3

  •    Working With Query Plans-Part4

Module 6: Designing Database Security

  •    Designing Database Security-Part1

  •    Designing Database Security-Part2

  •    Contained Databases

  •    Protecting Data With Encryption

Module 7: Policy Based Management

  •    Policy Based Management

  •    Policy Based Management Demo

Module 8: Monitoring Server Health

  •    Monitoring Server Health

  •    Monitoring Server Health Demo

Module 9: Designing Database Backup Solution

  •    Designing Database Backup Solution-Part1

  •    Designing Database Backup Solution-Part2

  •    Designing Database Backup Solution-Part3

  •    Designing Database Backup Solution-Part4

  •    Disaster Recovery Plan-Part1

  •    Disaster Recovery Plan-Part2

Module 10: Automating Multi Server Maintenance

  •    Automating Multi Server Maintenance

  •    Managing Multiple Servers

Module 11: Managing SQL Server With Windows Powershell

  •    Managing SQL Server WIth Windows Powershell

  •    Windows Powershell Lab

Module 12: Replicating Data

  •    Replicating Data-Part1

  •    Replicating Data-Part2

  •    Replicating Data-Part3

Module 13: Planning High Availability

  •    Planning High Availability-Part1

  •    Planning High Availability-Part2

Module 14: Review of SQL Statements

  •    Review Of SQL Statements-Part1

  •    Review Of SQL Statements-Part2

  •    Review Of SQL Statements-Part3

Module 15: Eleven Rules of Database Design

  •    Eleven Rules Of Database Design

  •    Conclusion

Microsoft 70-464: Developing Microsoft SQL Server 2012 Databases Course Content

Module 1: SQL 2012 And The 464 Test

  •    Introduction

  •    Intro To SQL Server 2012-Part1

  •    Intro To SQL Server 2012-Part2

  •    Management Studio Demo-Part1

  •    Management Studio Demo-Part2

  •    Management Studio Demo-Part3

  •    Other SQL Server Tools

Module 2: Working With Data Types

  •    Working With Data Types-Part1

  •    Working With Data Types-Part2

  •    Working With Data Types-Part3

  •    Other Data Types

Module 3: Tables

  •    Tables

  •    Creating Tables

Module 4: Data Constraints

  •    Data Constraints-Part1

  •    Data Constraints-Part2

Module 5: Planning In Indexing

  •    Planning In Indexing-Part1

  •    Planning In Indexing-Part2

  •    Planning In Indexing-Part3

  •    Planning In Indexing-Part4

Module 6: Table Structures

  •    Table Structures

  •    Working With Clustered Indexes

  •    Clustered Indexes

  •    Designing Effective Clustered Indexes

Module 7: Improving Performance with Non-Clustered Indexes

  •    Improving Performance With Non-Clustered Indexes-Part1

  •    Improving Performance With Non-Clustered Indexes-Part2

  •    Improving Performance With Non-Clustered Indexes-Part3

Module 8: Using Indexes And Execution Plans

  •    Using Indexes

  •    Execution Plans-Part1

  •    Execution Plans Demo

  •    Execution Plans-Part2

Module 9: Working with Views

  •    Working With Views-Part1

  •    Working With Views-Part2

Module 10: Designing and Implementing Stored Procedures

  •    Designing And Implementing Stored Procedures-Part1

  •    Designing And Implementing Stored Procedures-Part2

  •    Designing And Implementing Stored Procedures-Part3

Module 11: Merging Data and Passing Tables

  •    Merging Data And Passing Tables-Part1

  •    Merging Data And Passing Tables-Part2

  •    Merging Data And Passing Tables-Part3

Module 12: Designing and Implementing User Functions

  •    Designing And Implementing User Functions

Module 13: Creating Highly Concurrent SQL Server Applications

  •    Creating Highly Concurrent SQL Server Applications-Part1

  •    Creating Highly Concurrent SQL Server Applications-Part2

  •    Creating Highly Concurrent SQL Server Applications-Part3

Module 14: Handling Errors in T-SQL

  •    Handling Error InT-SQL-Part1

  •    Handling Error InT-SQL-Part2

Module 15: Triggers

  •    Triggers

Module 16: Implementing Managed Code

  •    Implementing Managed Code-Part1

  •    Implementing Managed Code-Part2

  •    Implementing Managed Code-Part3

  •    Implementing Managed Code-Part4

Module 17: Storing XML in SQL

  •    Storing XML In SQL-Part1

  •    Storing XML In SQL-Part2

Module 18: Querying XML

  •    Querying XML-Part1

  •    Querying XML-Part2

Module 19: Working with the Spatial Data

  •    Working With Spatial Data-Part1

  •    Working With Spatial Data-Part2

  •    Working With Spatial Data-Part3

Module 20: Working With Full-Text Indexes and Queries

  •    Working With Full-Text Indexes And Queries-Part1

  •    Working With Full-Text Indexes And Queries-Part2

  •    Working With Full-Text Indexes And Queries-Part3

Microsoft Office 365 Online Versions Course Content

Module 1: What Is Microsoft 365

  •    Introduction To 365

  •    A Little Background On MS Office

  •    Office 365 Versions And Features-Part1

  •    Office 365 Versions And Features-Part2

  •    Online Sign Up

Module 2: Word Online

  •    Word Online Overview

  •    Starting A Document In Word Online

  •    Word Saved To One Drive

  •    Navigating Word

  •    Tools And Features

  •    Fonts Attributes-Part1

  •    Fonts Attributes-Part2

  •    Lines And Paragraphs-Part1

  •    Lines And Paragraphs-Part2

  •    Bullets Numbering And Styles-Part1

  •    Bullets Numbering And Styles-Part2

  •    Inserts Pictures And Tools-Part1

  •    Inserts Pictures And Tools-Part2

  •    Tables And Formatting-Part1

  •    Tables And Formatting-Part2

  •    Sharing And Templates-Part1

  •    Sharing And Templates-Part2

Module 3: Excel Online

  •    Excel Online Overview

  •    Getting Started With Excel

  •    Data Entry And Navigation

  •    Data Entry-Part1

  •    Data Entry-Part2

  •    Data Entry And Formatting-Part1

  •    Data Entry And Formatting-Part2

  •    Intro To Formulas

  •    Formulas-Part1

  •    Formulas-Part2

  •    Formulas-Part3

  •    Intermediate Formula And Table Format-Part1

  •    Intermediate Formula And Table Format-Part 2

  •    Surveys

  •    More Formula And Charts-Part1

  •    More Formula And Charts-Part2

  •    Charts

  •    Sheets And Templates

Module 4: Powerpoint Online

  •    What Is Powerpoint

  •    Screen Layout

  •    Entering And Formatting Text

  •    Layouts And Designs Part 1

  •    Layouts And Designs Part 2

  •    Inserting Objects

  •    Objects And Transitions

  •    Animations

  •    Smart Art

  •    Notes Printing And Templates

Module 5: Outlook Online

  •    Intro To Outlook Online

  •    Intro To Email Accounts Screen Layout

  •    Configuring Outlook Online

  •    Sending Emails Outlook Online

  •    Organization Outlook Online

  •    Mail Rules In Outlook Online

  •    Additional Mail Options In Outlook Online

  •    Spam And Junk Outlook Online

Module 6: One Note Online

  •    What Is OneNote

  •    OneNote Screen Overview

  •    OneNote Desktop

  •    Drawing Tools With OneNote

  •    Send To OneNote

  •    Media With OneNote

Microsoft Outlook 2013 Course Content

Outlook 2013 Basic

  •    Introduction To Outlook

  •    Understanding Email Setting Outlook

  •    Configuring Interface-Part1

  •    Configuring Interface-Part2

  •    Email Window-Part1

  •    Email Window-Part2

  •    Managing The Inbox

  •    Using The Calendar-Part1

  •    Using The Calendar-Part2

  •    Contacts-Part1

  •    Contacts-Part2

  •    Task List

Outlook 2013 Intermediate

  •    Adding An Account From Scratch

  •    Multiple Email Accounts In One Window

  •    Searching For Mail

  •    Managing The Folders Views In Inbox

  •    Using Priority And Receipts

  •    Calendars

  •    Contacts-Part1

  •    Contacts-Part2

Outlook 2013 Advanced

  •    Mail Part 1 Auto-Replies

  •    Mail Part 2 Signatures

  •    Views and Options Part 1

  •    Views and Options Part 2

  •    Calendar Part 1

  •    Calendar Part 2

  •    Calendar Options

  •    Contacts

  •    Contacts Options

  •    Advanced Options Part 1

  •    Advanced Options Part 2

Microsoft Word 2013 Course Content

Word 2013 Basic

  •    Intro To Word

  •    Screen Layout

  •    Page Setup And Text Entry

  •    Auto-correct Text Formatting

  •    More Font Formatting

  •    Fonts-Part 3

  •    Font Attributes Using Right Click

  •    Paragraph Attributes

  •    Customizing Bullets And Numbers

  •    Reveal Codes Putting It All Together And Saving

  •    Viewing Rulers

  •    Formatting Images

  •    Inserting Images

  •    Tabs

  •    Window Views And Putting It All Together-Part 1

  •    Window Views And Putting It All Together-Part 2

Word 2013 Intermediate

  •    Intro To Word 2013 Intermediate

  •    Review Introduction To Styles

  •    Headers And Footers

  •    Section Breaks Section Footers

  •    More Objects Word Intermediate

  •    Tables In Word Intermediate

  •    Inserting Text Boxes Word Intermediate

  •    Additional Page Attributes Word Intermediate

  •    Intro To Customizing Attributes

  •    Continuing Auto-correct Options

  •    View Options In Navigation Pane

  •    Mail Merge-Part 1

  •    Mail Merge-Part 2

  •    Mail Merge-Part 3

  •    Table Of Contents

  •    Columns

  •    Working With Outlines

Word 2013 Advanced

  •    Word Advanced Introduction

  •    End Notes Foot Notes

  •    Captions

  •    Citations

  •    Table Of Authorities

  •    Reference Page Index Table

  •    Track Changes

  •    Compare

  •    Advance Mail Merge-Part 1

  •    Advance Mail Merge-Part 2

  •    Advance Smart Art

  •    Templates

  •    Custom Configuration

Microsoft Powerpoint 2013 Course Content

Powerpoint 2013 Basic

  •    What Is PowerPoint

  •    Screen Elements

  •    Starting A New Presentation

  •    Layouts

  •    Objects-Part1

  •    Objects-Part2

  •    Objects-Part3

  •    Slide Design

  •    Slide Transitions

  •    Animations-Part1

  •    Animations-Part2

  •    View And Slideshow

Powerpoint 2013 Intermediate

  •    Understanding Slide Masters

  •    Slide Masters

  •    Animations-Part1

  •    Animations-Part2

  •    Hotspots And Actions

  •    Views

  •    Printing Options

Powerpoint 2013 Advanced

  •    Introduction To Advanced And Inserting Charts

  •    Setting Up Slide Shows-Part1

  •    Setting Up Slide Shows-Part2

  •    Advanced Animations

  •    Templates Vs Shows

  •    Reviewing Information And Compare

  •    Copy And Paste Across Presentations

  •    Customizing Powerpoint

  •    Adding Media Video

  •    Adding Media Audio-Part1

  •    Adding Media Audio-Part2

Microsoft Excel 2013 Course Content

Excel 2013 Basic

  •    Intro To Excel Overview Of Screen

  •    Ribbon Elements

  •    Entering Data And Editing Font Attributes

  •    Number Formats

  •    Formatting Cells

  •    Printing

  •    Formulas - Part 1

  •    Formulas - Part 2

  •    Rearranging Data

  •    More Formulas - Part 1

  •    More Formulas - Part 2 Review And Sort

  •    More Formulas - Part 3 Concatenate

  •    Chart - Part 1

  •    Chart - Part 2

  •    Chart - Part 3

  •    Summary

Excel 2013 Intermediate

  •    Introduction

  •    Review

  •    Formulas Across Worksheets - Part 1

  •    Formulas Across Worksheets - Part 2

  •    Conditional Formatting

  •    Data Validation

  •    Names Ranges

  •    CSV Files

  •    Text To Column

  •    Grouping Data

  •    More Charts Beyond Building Blocks

  •    Working With Windows - Part 1

  •    Working With Windows - Part 2

  •    Headers Footers And Protecting Data

Excel 2013 Advanced

  •    Pivot Tables - Part 1

  •    Pivot Tables - Part 2

  •    Sparklines

  •    Trancing Formulas

  •    What If Scenario

  •    External Data Sources

  •    Customizing Menus And Options - Part 1

  •    Customizing Menus And Options - Part 2

  •    Macros

Microsoft Access 2013 Course Content

Access 2013 Introduction

  •    Access 2013 Introduction

  •    What Are Databases

  •    The Interface Window

  •    Setting Up The Database-Part1

  •    Setting Up The Database-Part2

  •    Creating Forms

  •    Understanding Table Relationships

  •    Introduction To Queries

  •    Introduction To Reports

Access 2013 Intermediate

  •    Introduction to Table Tools Part 1

  •    Table Tools-Part2

  •    Table Tools-Part3

  •    Forms And Design Intermediate-Part1

  •    Forms And Design Intermediate-Part2

  •    Forms Data Entry-Part1

  •    Forms Data Entry-Part2

  •    Queries

  •    Reports From Queries-Part1

  •    Reports From Queries-Part2

  •    Reports From Queries-Part3

  •    Specialized Form

Access 2013 Advanced

  •    Advance Introduction And Sub-forms

  •    Sub-forms

  •    Additional Types Of Queries

  •    Form And Macros-Part1

  •    Form And Macros-Part2

  •    Advance Forms

  •    Reports Advance-Part1

  •    Reports Advance-Part2

  •    Updating Reports

  •    Customization And Conclusion

Microsoft 70-243: Administering and Deploying SCCM 2012 Course Content

Module 1: Planning Configuration Manager Infrastructure

  •    Intro

  •    Planning Configuration Manager Infrastructure - Part 1

  •    Planning Configuration Manager Infrastructure - Part 2

  •    Planning Configuration Manager Infrastructure - Part 3

  •    Planning Configuration Manager Infrastructure - Part 4

  •    Planning Configuration Manager Infrastructure - Part 5

Module 2: Migrating To Configuration Manager 2012

  •    Migrating To Configuration Manager 2012

Module 3: Installations and Site Role Configuration

  •    Installation And Site Role Configuration - Part 1

  •    Installation And Site Role Configuration - Part 2

  •    Installation And Site Role Configuration - Lab 1

  •    Installation And Site Role Configuration - Lab 2

Module 4: Cloud Integration

  •    Cloud Integration

Module 5: Installing The Client

  •    Installing The Client - Part 1

  •    Installing The Client - Part 2

  •    Installing The Client - Part 3

  •    Installing The Client Lab

Module 6: Client Health

  •    Client Health

Module 7: Application Deployment

  •    Application Deployment

  •    Application Deployment Lab

Module 8: Software Updates

  •    Software Updates - Part 1

  •    Software Updates - Part 2

  •    Software Updates Lab

Module 9: Operating System Deployment

  •    Operating System Deployment - Part 1

  •    Operating System Deployment - Part 2

  •    Operating System Deployment - Part 3

Module 10: Inventory and Software Metering

  •    Inventory And Software Metering

  •    Inventory And Software Metering Lab

Module 11: Asset Intelligence

  •    Asset Intelligence

Module 12: Reporting

  •    Reporting

  •    Reporting Lab

Module 13: Compliance Settings

  •    Compliance Settings

Module 14: Endpoint Protection

  •    Endpoint Protection

Module 15: Mobile Device Management

  •    Mobile Device Management - Part 1

  •    Mobile Device Management - Part 2

Module 16: Role-Based Administration

  •    Role Based Administration

Module 17: Disaster Recovery

  •    Disaster Recovery

Module 18: Troubleshooting

  •    Troubleshooting

  •    Outro

Cooking Course Content

Module 1: Intro

  •    Introduction

Module 2: Wonton

  •    Wonton

Module 3: Tomato Basil

  •    Tomato Basil

Module 4: Ricotta Gnocchi

  •    Ricotta Nyoki

Module 5: Potato Gnocchi

  •    Potato Nyoki

Module 6: Pizza Tart

  •    Pizza Tart

Module 7: Pesto

  •    Pesto

Module 8: Potato Pancakes

  •    Potato Pancakes

Module 9: Crostini

  •    Crostini

Module 10: Fish Chowder

  •    Fish Chowder

Module 11: Fritters

  •    Fritters

Module 12: Risotto

  •    Risotto

Module 13: Risotto Cakes

  •    Risotto Cakes

Module 14: Spanakopita

  •    Spanakopita

Module 15: Vegetable Puree Soup

  •    Vegetable Puree Soup

Module 16: Corn Chowder

  •    Corn Chowder

Module 17: Tempura

  •    Tempura

Module 18: Panko Crusted Chicken

  •    Panko Crusted Chicken

Module 19: Pork Tenderloin

  •    Pork Tenderloin

Module 20: Potato Crusted Salmon

  •    Potato Crusted Salmon

Module 21: Grilled Veggies

  •    Grilled Veggies-Part1

  •    Grilled Veggies-Part2

  •    Grilled Veggies-Part3

Module 22: Veggie Risotto

  •    Veggie Risotto-Part1

  •    Veggie Risotto-Part2

  •    Veggie Risotto-Part3

Module 23: Outro

  •    Conclusion

Microsoft 70-448: Microsoft SQL Server 2008, Business Intelligence Development and Maintenance Course Content

Module 1: SSIS Packages

  •    Introduction

  •    Creating SSIS Packages

  •    Creating A New Package Lab

  •    Data Sources Lab

  •    Connections Lab

  •    Control Flow

  •    Creating And Editing Control Flow Lab

  •    Data Flow

  •    Data Flow Transformations

  •    Data Flow Lab

Module 2: Debugging and Error Handling in SSIS

  •    Debugging And Error Handling in SSIS-Part1

  •    Enable Transactions And Observe Trans Rollback Lab

  •    Set Checkpoints In A Package Lab

  •    Debugging And Error Handling in SSIS-Part2

  •    Setting Up Constraints Lab

  •    Turn On Logging Lab

  •    Debugging And Error Handling in SSIS-Part3

  •    Identifying Data Flow Errors Lab

Module 3: Deploying and Configuring SSIS Packages

  •    Lesson1-Part1 Deploying

  •    Lesson1-Part2 Sharing Ordering And Configuring

  •    Create An XML Configuration Lab

  •    Create A SQL Server Configuration Lab

  •    Use A Property Expression To Update A Connection Lab

  •    Deploying An SSIS Package

  •    Create And Deploy An Installer Kit Lab

Module 4: Securing and Executing SSIS Packages; Service Administration

  •    Lesson1-Part1 Securing And Executing SSIS Packages

  •    Lesson1-Part2 SSIS Package Security

  •    Turn On Package Encryption Lab

  •    Change Security Roles Lab

  •    Lesson2 Executing And Administration

  •    Create And Execute A Command-Line Statement Lab

  •    Execute A Package Through SQL Server Agent Lab

Module 5: Data Analysis

  •    Lesson1 SSAS Cube Development

  •    Create SSAS Project Lab

  •    Create A Data Source Lab

  •    Create A Data Source View Lab

  •    Lesson2 Creating And Modifying SSAS Cube

  •    Creating A Cube Lab

  •    Using Cube Designer To Edit A Cube Structure Lab

  •    Lesson3 Creating A Dimension

  •    Create A New Dimension Lab

  •    Lesson4 Creating Measure Groups And Measures

  •    Add Measure Groups Lab

  •    Configure Measure Groups And Measures Lab

Module 6: Extending SSAS Cubes

  •    Lesson1 Extending SSAS Cubes-Part1

  •    Define Attribute Relationships Lab

  •    Define User Hierarchy Lab

  •    Lesson2 Extending SSAS Cube-Part3

  •    Implement The Reseller Sales KPI Lab

  •    Lesson3 Extending SSAS Cube-Part3

  •    Turn On Proactive Caching Lab

Module 7: Extending SSAS Cubes

  •    Lesson1-Part1 SSAS Storage Processing And Deployment

  •    Lesson1-Part2 Aggregating And Enabling Proactive Caching

  •    Turning On Proactive Caching Lab

  •    Lesson2 SSAS Deployment

  •    Deploy Database With Deployment Wizard Lab

  •    Lesson3 Processing

  •    Processing Scripts Using SQL Server Agent Lab

Module 8: Securing and Administering SSAS

  •    Lesson1 SSAS Security

  •    Create A Role And Set Security Lab

  •    Lesson2 Backing Up SSAS

  •    Backing Up And Maintain Management Studio Lab

  •    Lesson3 Managing SSAS Turning And Logging

  •    Turning On Query Logging Lab

  •    Lesson4 SSAS Administering

  •    Turn On And Use SQL Server Profiler Lab

  •    Monitor SSAS Performance Lab

Module 9: Working With SSAS Data Mining

  •    Lesson1-Part1 Prepare And Creating Data Mining Structures

  •    Lesson1-Part2 Data Mining Algorithms And Usage

  •    Data Mining Wizard Lab

  •    Lesson2 Mapping Mining Structure Attributes To Source Columns

  •    Create A Model From A Cube Lab

  •    Lesson3 Predictive Models

  •    Lesson4 Data Mining Security

  •    Managing Permissions Lab

Module 10: Developing SSAS Reports

  •    Lesson1 Understanding SSRS Reports

  •    Creating Reports Lab

  •    Lesson2 Creating A New Report Database

  •    Generate More Reports Lab

  •    Lesson3 Advanced Report Object Properties-Part1

  •    Lesson4 Advanced Report Object Properties-Part2

Module 11: Extending and Deploying SSRS Reports

  •    Lesson1 SSRS Report Parameters

  •    Create A Report Without Using Wizard Lab

  •    Lesson2 Extending SSRS Reports

  •    Lesson3 Deploying SSRS Reports

Module 12: Scheduling Deployed Reports and Data Sources

  •    Lesson1 Scheduling Reports And Subscriptions

  •    Creating A New Role For SSRS Lab

  •    Lesson2 SSRS And Data Sources

  •    Set Up Shared Schedule Lab

Module 13: Configuring And Administering the SSRS Server

  •    Installing And Configuring SSRS Server

  •    Changing Settings In Configuration Manager Lab

  •    Lesson2 Administering The SSES Server And Command-Line Utilities

  •    Backing Up And Restoring Encryption Keys Lab

  •    Conclusion

CompTIA MB0-001: Mobility+ Course Content

Module 1: Over-The-Air Technologies

  •    Introduction

  •    Over-The-Air-Technologies

  •    Wireless Technologies-Part 1

  •    Wireless Technologies-Part 2

  •    Radio Frequency

  •    RF Power Fun

  •    Antennas

  •    Issues With RF

  •    NON Wireless

  •    Governing Bodies And Regulations

Module 2: Network Infrastructure

  •    Network Foundations-Part 1

  •    Network Foundations-Part 2

  •    Network Foundations-Part 3

  •    Network Foundations-Part 4

  •    OSI Model Review

  •    Wireless Terms And Terminology-Part 1

  •    Wireless Terms And Terminology-Part 2

  •    Wireless Media And Communication

  •    Unified Wireless Architecture

  •    SSIDs And VLANs

Module 3: Mobile Device Manager

  •    Mobile Device Management-Part 1

  •    Profiles And Polices-Part 1

  •    Profiles And Polices-Part 2

  •    Enterprise Mail And Messaging

  •    Wireless Site Survey-Part 1

  •    Wireless Site Survey-Part 2

  •    Wireless Site Survey-Part 3

  •    Wireless Site Survey-Part 4

  •    Wireless Device Management-Part 1

  •    Wireless Device Management-Part 2

Module 4: Security

  •    Mobile Device Security

  •    Network Security 101

  •    Security Protocols-Part 1

  •    Security Protocols-Part 2

  •    Security Protocols-Part 3

  •    EAP Overview

  •    Encryption Overview-Part 1

  •    Encryption Overview-Part 2

  •    Common Security Troubleshooting

  •    Wireless Risks-Part 1

  •    Wireless Risks-Part 2

  •    Other Risks

Module 5: Troubleshooting

  •    Wireless Troubleshooting-Part 1

  •    Wireless Troubleshooting-Part 2

  •    Wireless Troubleshooting-Part 3

  •    Conclusion

Microsoft 70-342: Advanced Solutions of Exchange Server 2013 Course Content

Module 1: Overview

  •    Intro

  •    Overview Of Advanced Solutions - Part 1

  •    Overview Of Advanced Solutions - Part 2

  •    Test Connectivity Demo

  •    Web Based Outlook Demo - Part 1

  •    Web Based Outlook Demo - Part 2

Module 2: Beginning Powershell

  •    Beginning Powershell

  •    New Mail Contact Demo

  •    New Mail Contacts Powershell Demo

Module 3: Exhange Control Panel

  •    Exchange Control Panel

Module 4: Create A New Mailbox with Powershell

  •    Create A New Mailbox With Powershell

  •    New Mailbox With Powershell Demo - Part 1

  •    New Mailbox With Powershell Demo - Part 2

Module 5: Mailbox Statistics With Powershell

  •    Mailbox Statistics With Powershell

  •    Get Mailbox Statistics Demo

Module 6: Intermediate Powershell

  •    Intermediate Powershell

  •    Wrap Up Of Intermediate Powershell

  •    Creating A New Accepted Domain Demo - Part 1

  •    Creating A New Accepted Domain Demo - Part 2

Module 7: Unified Messaging

  •    Unified Messaging - Part 1

  •    Unified Messaging - Part 2

  •    UM Dial Plan Demo

  •    UM Dial Plan Powershell Demo

Module 8: Installation and Configuration

  •    Installation And Configuration - Part 1

  •    Installation And Configuration - Part 2

  •    Build Exchange From Scratch Demo - Part 1

  •    Build Exchange From Scratch Demo - Part 2

  •    Build Exchange From Scratch Demo - Part 3

  •    Build Exchange From Scratch Demo - Part 4

  •    Build Exchange From Scratch Demo - Part 5

  •    Build Exchange From Scratch Demo - Part 6

  •    Confirming Installation Demo

  •    Scheme Changes - Part 1

  •    Scheme Changes - Part 2

  •    Required Software For Exchange

  •    Powershell Add Features - Part 1

  •    Powershell Add Features - Part 2

  •    Installation - Part 1

  •    Installation - Part 2

  •    Installation - Part 3

Module 9: Exchange Online

  •    Exchange Online - Part 1

  •    Exchange Online - Part 2

  •    Exchange Online Demo

Module 10: Advanced Design

  •    Advanced Design - Part 1

  •    Advanced Design - Part 2

  •    Advanced Design - Part 3

  •    Deployment Assistant Demo

  •    Ports And Protocols For Exchange Demo

  •    Outro

Cisco 640-864: CCDA Cisco Certified Design Associate Course Content

Module 1: Methodologies Used To Design A Network

  •    Introduction

  •    Developing Business Trends

  •    P P D I O O- Part 1

  •    P P D I O O- Part 2

  •    3 Layer Campus Design

  •    Modular Network Design

  •    Cisco Eight Step Design Methodology

  •    Cisco I I N

Module 2: Network Structure And Modularity

  •    Network Design Fundamentals

  •    Design Methods And Methodologies- Part 1

  •    Design Methods And Methodologies- Part 2

  •    Enterprise Campus Design- Part 1

  •    Enterprise Campus Design- Part 2

Module 3: Basic Enterprise Campus Networks

  •    Campus Design Considerations- Part 1

  •    Campus Design Considerations- Part 2

  •    Cisco S O N A

Module 4: Enterprise Edge And Remote Network Modules

  •    WAN Technologies And VPN- Part 1

  •    WAN Technologies And VPN- Part 2

  •    WAN Technologies- Part 1

  •    WAN Technologies- Part 2

  •    VPN Technologies- Part 1

  •    VPN Technologies- Part 2

  •    VPN Technologies- Part 3

Module 5: IP Addressing And Routing Protocols

  •    Routing Protocol Operation And Design- Part 1

  •    Routing Protocol Operation And Design- Part 2

  •    Routing Protocol Operation And Design- Part 3

  •    Routing Protocol Operation And Design- Part 4

  •    EIGRP - Part 1

  •    EIGRP - Part 2

Module 6: Enterprise Switching I

  •    Enterprise Switching

  •    Inter VLAN Routing

  •    Multilayer Switch

  •    Enterprise Switch Features And Design

  •    VSS

  •    Best Practices

Module 7: Enterprise Switching II

  •    Switch Macros And Smart Ports

  •    Private VLANs

  •    Etherchannel

Module 8: Subnetting

  •    IP v4

  •    Subnetting- Part 1

  •    Subnetting- Part 2

  •    Subnetting- Part 3

  •    Subnetting- Part 4

  •    IP v6

Module 9: Designing Advanced Services

  •    Designing Advanced Services

  •    GLBP

  •    Access Points

  •    Radio Frequencies

  •    Wireless Signals

  •    Wireless LAN To VLAN Mapping

  •    Conclusion

Microsoft 70-341: Core Solutions of Exchange Server 2013 Course Content

Module 1: Overview

  •    Introduction

  •    Overview Of Exchanger Server 2013 - Part 1

  •    Overview Of Exchanger Server 2013 - Part 2

  •    Overview Of Exchanger Server 2013 - Part 3

  •    Overview Of Exchanger Server 2013 - Part 4

  •    Overview Of Exchanger Server 2013 - Part 5

  •    Overview Of Exam - Part 1

  •    Overview Of Exam - Part 2

Module 2: Exchange Server 2013 Administration

  •    Exchange Server 2013 Administration - Part 1

  •    Exchange Server 2013 Administration - Part 2

  •    Exchange Server 2013 Administration - Part 3

  •    Exchange Server 2013 Administration - Part 4

  •    Exchange Server 2013 Administration - Demo 1

  •    Exchange Server 2013 Administration - Demo 2

  •    Exchange Server 2013 Administration - Demo 3

Module 3: Fundamentals of Exchange Administration

  •    Fundamentals Of Exchange Administration - Part 1

  •    Fundamentals Of Exchange Administration - Demo

Module 4: Archive Mailboxes

  •    Archive Mailboxes - Part 1

  •    Archive Mailboxes - Part 2

  •    Archive Mailboxes - Part 3

  •    Archive Mailboxes - Demo

Module 5: Properties of User Mailboxes

  •    Properties Of User Mailboxes

  •    Properties Of User Mailboxes - Demo

Module 6: Distribution Groups

  •    Distribution Groups

  •    Distribution Groups - Demo

Module 7: Outlook and Outlook Web Apps

  •    Outlook And Outlook Web Apps - Part 1

  •    Outlook And Outlook Web Apps - Part 2

  •    Outlook And Outlook Web Apps - Demo

Module 8: Preparation Prerequisites

  •    Preparation Prerequisites - Part 1

  •    Preparation Prerequisites - Part 2

  •    Preparation Prerequisites - Part 3

  •    Preparation Prerequisites Demo - Part 1

  •    Preparation Prerequisites Demo - Part 2

  •    Preparation Prerequisites Demo - Part 3

Module 9: Installation of Exchange 2013

  •    Installation Of Exchange 2013

  •    Installation Of Exchange 2013 - Demo

Module 10: Exchange 2013 Design

  •    Exchange 2013 Design - Part 1

  •    Exchange 2013 Design - Part 2

  •    Exchange 2013 Design - Part 3

  •    Exchange 2013 Design Demo - Part 1

  •    Exchange 2013 Design Demo - Part 2

  •    Exchange 2013 Design Demo - Part 3

  •    Exchange 2013 Design Demo - Part 4

  •    Exchange 2013 Design Demo - Part 5

  •    Exchange 2013 Design Demo - Part 6

Module 11: Labs and Demos

  •    Building Home Lab (setup)

  •    Creating A Win Server Virtual Machine

  •    Signing On To Server

  •    Configuration (Joining Domain)

  •    Installing Domain Controller - Part 1

  •    Installing Domain Controller - Part 2

  •    Checking The Domain Controller

  •    Setting Up DNS For Exchange

  •    Schema Updates

  •    Prerequisite For Exchange 2013

  •    Installing Exchange

  •    Confirmation Of Exchange

  •    How Exchange Is Installed

  •    Setting Up A Send Connector

  •    Outro

Microsoft 70-646 Pro: Windows Server 2008, Server Administrator Course Content

Module 1: Planning Server Deployment

  •    Introduction

  •    Overview Of Windows Server 2008 Deployment-Part1

  •    Overview Of Windows Server 2008 Deployment-Part2

  •    Overview Of Windows Server 2008 Deployment-Part3

  •    Overview Of Windows Server 2008 Deployment-Part4

  •    Identifying Windows Server 2008 Compatibility Issues

  •    Developing A Deployment Plan-Part1

  •    Developing A Deployment Plan-Part2

  •    Planning The Server Decommissioning

  •    Commissioning Windows 2008 Server

  •    Planning Server Deployment Summary

Module 2: Automating Server Deployment

  •    Understanding Deployment Options-Part1

  •    Understanding Deployment Options-Part2

  •    Windows Automated Installation Kit-Part1

  •    Windows Automated Installation Kit-Part2

  •    Windows Automated Installation Kit-Part3

  •    Working With Images

  •    Using Windows Deployment Services-Part1

  •    Using Windows Deployment Services-Part2

  •    Using Windows Deployment Services-Part3

  •    Using Windows Deployment Services-Part4

  •    Automating Server Activation

  •    Automating Server Deployment Summary

Module 3: Planning for Server Management

  •    Introduction To Server Management

  •    Remote Server Management-Part1

  •    Remote Server Management-Part2

  •    Remote Server Management-Part3

  •    Decentralizing Server Management-Part1

  •    Decentralizing Server Management-Part2

  •    Planning For Server Management Summary

Module 4: Planning the Network Infrastructure

  •    Planning An IPv4 Addressing Scheme-Part1

  •    Planning An IPv4 Addressing Scheme-Part2

  •    Planning An IPv4 Addressing Scheme-Part3

  •    Planning An IPv6 Transition

  •    Planning The DHCP Infrastructure-Part1

  •    Planning The DHCP Infrastructure-Part2

  •    Planning DHCP Configuration

  •    Planning The Network Infrastructure Summary

Module 5: Planning Name Resolution Services

  •    Gathering Information For The Name Resolution Design-Part1

  •    Gathering Information For The Name Resolution Design-Part2

  •    Designing A DNS Server Strategy-Part1

  •    Designing A DNS Server Strategy-Part2

  •    Designing DNS Zone Implementations-Part1

  •    Designing DNS Zone Implementations-Part2

  •    Optimizing DNS Servers

  •    Designing DNS For High Availability And Security

  •    Designing A WINS Name Resolution Strategy

  •    Planning Name Resolution Services Summary

Module 6: Planning File and Print Services

  •    Planning File Services-Part1

  •    Planning File Services-Part2

  •    Planning File Services-Part3

  •    Planning File Services-Part4

  •    Planning File Services-Part5

  •    Planning For Storage Management

  •    Planning Print Services-Part1

  •    Planning Print Services-Part2

  •    Planning Print Services-Part3

  •    Planning File And Print Services Summary

Module 7: Planning Active Directory Domain Services

  •    Planning ADDS Forests

  •    Planning ADDS Domains

  •    Planning ADDS Physical Structure-Part1

  •    Planning ADDS Physical Structure-Part2

  •    Planning Administrative Structures

  •    Planning ADDS Maintenance Strategies

  •    Planning Group Policy Implementations-Part1

  •    Planning Group Policy Implementations-Part2

  •    Planning Group Policy Implementations-Part3

  •    Planning Group Policy Implementations-Part4

  •    Planning ADDS Summary

Module 8: Planning Active Directory Certificate Services

  •    Overview Of PublicKey Infrastructure And ADCS-Part1

  •    Overview Of PublicKey Infrastructure And ADCS-Part2

  •    Designing Certificate Authority Hierarchy

  •    Design Certificate Template

  •    Designing Certificate Distribution And Revocation

  •    Planning AD Certificate Servers

Module 9: Planning High Availability

  •    Overview Of High Availability

  •    Planning Network Load Balancing

  •    Planning Failover Clustering-Part1

  •    Planning Failover Clustering-Part2

  •    Planning High Availability Summary

Module 10: Planning Backups For Windows Server

  •    Planning Backups For Windows Server-Part1

  •    Planning Backups For Windows Server-Part2

  •    Planning A Backup Policy

  •    Planning Restore Policies For Windows Server 2008

  •    Planning Business Continuity Summary

Module 11: Planning Server Monitoring and Maintenance

  •    Planning Server Monitoring-Part1

  •    Planning Server Monitoring-Part2

  •    Planning Server Maintenance

  •    Planning Server Monitoring And Maintenance Summary

  •    Conclusion

Microsoft 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring Course Content

Module 1: Installing and Configuring Windows Services

  •    Introduction

  •    Installing Windows Servers-Part1

  •    Installing Windows Servers-Part2

  •    Installing Windows Servers-Part3

  •    Managing Server Roles And Features-Part1

  •    Managing Server Roles And Features-Part2

  •    Windows Server 2008 Server Care Installations-Part1

  •    Windows Server 2008 Server Care Installations-Part2

  •    Installing And Configuring Windows Services Summary

Module 2: TCP/IP Protocol Suite

  •    Overview Of TCP IP-Part1

  •    Overview Of TCP IP-Part2

  •    TCP IP Addressing-Part1

  •    TCP IP Addressing-Part2

  •    Communication Types

  •    Name Resolution-Part1

  •    Name Resolution-Part2

  •    Name Resolution-Part3

  •    Name Resolution-Part4

  •    Dynamic IP Addressing

  •    TCP IP Tools

  •    TCP IP Protocol Suite Summary

Module 3: Configuring IPv4 Addressing

  •    Overview Of IPv4 Communication-Part1

  •    Overview Of IPv4 Communication-Part2

  •    Subnetting IPv4 Networks-Part1

  •    Subnetting IPv4 Networks-Part2

  •    Subnetting IPv4 Networks-Part3

  •    Configuring IPv4 Addressing Summary

Module 4: Configuring IP Address Assignment Services

  •    Overview Of DHC-Part1

  •    Overview Of DHC-Part2

  •    Configuring DHCP Scopes And Options-Part1

  •    Configuring DHCP Scopes And Options-Part2

  •    Configuring DHCP Scopes And Options-Part3

  •    Managing The DHCP Database

  •    Monitoring And Troubleshooting DHCP-Part1

  •    Monitoring And Troubleshooting DHCP-Part2

  •    Configuring IP Address Assignment Services Summary

Module 5: Configuring IPv6 Addressing

  •    Introduction To IPv6-Part1

  •    Introduction To IPv6-Part2

  •    Unicast IPv6 Addresses

  •    Configuring IPv6-Part1

  •    Configuring IPv6-Part2

  •    Configuring IPv6 Addressing Summary

Module 6: Configuring Name Resolution Services

  •    Overview Of DNS-Part1

  •    Overview Of DNS-Part2

  •    Configuring The DNS Server Role-Part1

  •    Configuring The DNS Server Role-Part2

  •    Configuring The DNS Server Role-Part3

  •    Configuring The DNS Server Role-Part4

  •    Configuring The DNS Server Role-Part5

  •    Manage And Troubleshooting DNS

  •    Migrating From WIN To DNS

  •    Configuring Name Resolution Services Summary

Module 7: Configuring File and Print Services

  •    Introduction To File Services

  •    Controlling Access To File Services-Part1

  •    Controlling Access To File Services-Part2

  •    Controlling Access To File Services-Part3

  •    Storage Management With File Server Resource Manager-Part1

  •    Storage Management With File Server Resource Manager-Part2

  •    Storage Management With File Server Resource Manager-Part3

  •    Storage Management With File Server Resource Manager-Part4

  •    Storage Management With File Server Resource Manager-Part5

  •    Configuring And Managing Distributed File Systems-Part1

  •    Configuring And Managing Distributed File Systems-Part2

  •    Configuring And Managing Distributed File Systems-Part3

  •    Configuring And Managing Distributed File Systems-Part4

  •    Optimizing Access For Branch Offices

  •    Configuring Printing-Part1

  •    Configuring Printing-Part2

  •    Configuring Printing-Part3

  •    Configuring Printing-Part4

  •    Configuring Printing-Part5

  •    Configuring File And Print Service Summary

Module 8: Securing Windows Servers and Network Communications

  •    Configuring Server Security Group-Part1

  •    Configuring Server Security Group-Part2

  •    Configuring Server Security Group-Part3

  •    Configuring Server Security Group-Part4

  •    Configuring Server Security Group-Part5

  •    Configuring Server Security Group-Part6

  •    Configuring Server Security Group-Part7

  •    Storage Security-Part1

  •    Storage Security-Part2

  •    Windows Firewall With Advanced Security-Part1

  •    Windows Firewall With Advanced Security-Part2

  •    Configuring And Troubleshooting IP Sec-Part1

  •    Configuring And Troubleshooting IP Sec-Part2

  •    Configuring And Troubleshooting IP Sec-Part3

  •    Configuring And Troubleshooting IP Sec-Part4

  •    SecuringWindows Servers And Network Communications Summary

Module 9: Configuring Routing and Remote Access

  •    Remote Access Overview

  •    Configuring Remote Access-Part1

  •    Configuring Remote Access-Part2

  •    Configuring Remote Access-Part3

  •    Configuring Remote Access-Part4

  •    Overview Of Network Routing-Part1

  •    Overview Of Network Routing-Part2

  •    Overview Of Network Routing-Part3

  •    Configuring Routing And Remote Access Summary

Module 10: Configuring Network Policy Services

  •    Overview Of Network Policy And Access Services-Part1

  •    Overview Of Network Policy And Access Services-Part2

  •    Understanding Network Policies

  •    Centralizing Authentication And Authorization-Part1

  •    Centralizing Authentication And Authorization-Part2

  •    Centralizing Authentication And Authorization-Part3

  •    Configuring Network Policy Services Summary

Module 11: Configuring Network Access Protection

  •    Overview Of Network Access Protection

  •    NAP Architecture

  •    NAP Enforcement

  •    NAP Policies-Part1

  •    NAP Policies-Part2

  •    Configuring NAP Summary

Module 12: Maintaining and Recovering Windows Server

  •    Disaster Recovery For Windows Servers-Part1

  •    Disaster Recovery For Windows Servers-Part2

  •    Disaster Recovery For Windows Servers-Part3

  •    Disaster Recovery For Windows Servers-Part4

  •    Disaster Recovery For Windows Servers-Part5

  •    Disaster Recovery For Windows Servers-Part6

  •    Configuring Update Management-Part1

  •    Configuring Update Management-Part2

  •    Configuring Update Management-Part3

  •    Configuring Update Management-Part4

  •    Maintaining And Recovering Windows Server Summary

  •    Conclusion

Microsoft 70-413: Designing and Implementing a Server Infrastructure Course Content

Module 1: Plan and Deploy Infrastructure

  •    Introduction

  •    Plan And Deploy Infrastructure-Part 1

  •    Plan And Deploy Infrastructure-Part 2

  •    Plan And Deploy Infrastructure-Part 3

Module 2: Planning and Implementing

  •    Planning And Implementing-Part 1

  •    Multicast Deployment Wizard Demo

  •    Planning And Implementing-Part 2

  •    Pre-staging Clients Demo

  •    Planning And Implementing-Part 3

  •    Configuring Windows Deployment Services Demo

  •    Planning And Implementing-Part 4

Module 3: Planning and Implementing Server Upgrade and Migration

  •    Planning And Implementing Server Upgrade And Migration-Part 1

  •    Planning And Implementing Server Upgrade And Migration-Part 2

  •    Planning And Implementing Server Upgrade And Migration-Part 3

Module 4: Planning and Deploying Virtual Machine Manager Resources

  •    Planning And Deploying Virtual Machine Manager Resources-Part 1

  •    Planning And Deploying Virtual Machine Manager Resources-Part 2

  •    Planning And Deploying Virtual Machine Manager Resources-Part 3

  •    Planning And Deploying Virtual Machine Manager Resources-Part 4

Module 5: Planning and Implementing File and Storage Services

  •    PlanningAnd Implementing File And Storage Services-Part 1

  •    Planning And Implementing File And Storage Services-Part 2

  •    Configuring The iSCSI Target Server Demo

  •    Planning And Implementing File And Storage Services-Part 3

  •    Configuring Internet Storage Name Server Demo

  •    Planning And Implementing File And Storage Services-Part 4

Module 6: Design and Implement Network Infrastructure Services

  •    Design And Implement Network Infrastructure Services

Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution

  •    Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 1

  •    Configuring Split Scope In DHCP Demo

  •    Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 2

  •    Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 3

Module 8: Design a Name Resolution Solution Strategy

  •    Design A Name Resolution Solution Strategy-Part 1

  •    Design A Name Resolution Solution Strategy-Part 2

  •    Configuring Global Names Zone Demo

  •    Design A Name Resolution Solution Strategy-Part 3

Module 9: Design and Manage an IP Address Management Solution

  •    Design And Manage An IP Address Management Solution-Part 1

  •    Design And Manage An IP Address Management Solution-Part 2

Module 10: Design and Implement Network Access Services

  •    Design And Implement Network Access Services

Module 11: Design a VPN Solution

  •    Design A VPN Solution-Part 1

  •    Design A VPN Solution-Part 2

Module 12: Design a DirectAccess Solution

  •    Design A Direct Access Solution-Part 1

  •    Design A Direct Access Solution-Part 2

Module 13: Implement a Scalable Remote Access Solution

  •    Implement A Scalable Remote Access Solution-Part 1

  •    Implementing Packet Tracing Demo

  •    Implement A Scalable Remote Access Solution-Part 2

  •    Implement A Scalable Remote Access Solution-Part 3

  •    Looking At Setting In Direct Access Demo

  •    Implement A Scalable Remote Access Solution-Part 4

Module 14: Design and Implement a Network Protection Solution

  •    Design And Implement A Network Protection Solution-Part 1

  •    Design And Implement A Network Protection Solution-Part 2

  •    Design And Implement A Network Protection Solution-Part 3

  •    Looking At Multiple RADIUS Servers Demo

  •    Design And Implement A Network Protection Solution-Part 4

  •    Taking A Look At IP Sec Policy Enforcement Demo

  •    Showing 802.1X Policy Enforcement Demo

  •    Design And Implement A Network Protection Solution-Part 5

Module 15: Design and Implement an Active Directory Infrastructure

  •    Design And Implement An Active Directory Infrastructure

Module 16: Design a Forest and Domain Infrastructure

  •    Design A Forest And Domain Infrastructure

Module 17: Implement a Forest and Domain Infrastructure

  •    Implement A Forest And Domain Infrastructure-Part 1

  •    Steps To Perform A Realm Trust Demo

  •    Implement A Forest And Domain Infrastructure-Part 2

Module 18: Design a Group Policy Strategy

  •    Design A Group Policy Strategy

Module 19: Design an Active Directory Permission Model

  •    Design An Active Directory Permission Model-Part 1

  •    Taking A Look At The Security Tab Or Lack Of Demo

  •    Design An Active Directory Permission Model-Part 2

  •    Taking A Look At The Delegation Or Control Wizard Demo

  •    Design An Active Directory Permission Model-Part 3

  •    Taking A Look At Kerberos Delegation Demo

  •    Design An Active Directory Permission Model-Part 4

Module 20: Design and Implement an Active Directory Infrastructure (Physical)

  •    Design And Implement An Active Directory Infrastructure Physical

Module 21: Design an Active Directory Site Topology

  •    Design An Active Directory Site Topology

Module 22: Design an Active Directory Site Topology

  •    Design A Domain Controller Strategy

Module 23: Design and Implement a Branch Office Infrastructure

  •    Design And Implement A Branch Office Infrastructure-Part 1

  •    Design And Implement A Branch Office Infrastructure-Part 2

  •    Taking A Look At Password Replication Policy Tab Demo

  •    Design And Implement A Branch Office Infrastructure-Part 3

  •    Conclusion

Microsoft 70-414: Implementing an Advanced Server Infrastructure Course Content

Module 1: Manage and Maintain a Server Infrastructure

  •    Introduction

  •    Manage And Maintain A Server Infrastructure-Part1

  •    Manage And Maintain A Server Infrastructure-Part2

  •    Design A Monitoring Strategy-Part1

  •    Design A Monitoring Strategy-Part2

  •    Plan And Implement Automated Remediation-Part1

  •    Plan And Implement Automated Remediation-Part2

  •    Plan And Implement Automated Remediation-Part3

Module 2: Plan and Implement a Highly Available Enterprise Infrastructure

  •    Plan And Implement A Highly Available Enterprise Infrastructure-Part1

  •    Plan And Implement A Highly Available Enterprise Infrastructure-Part2

  •    Highly Available Network Services-Part1

  •    Highly Available Network Services-Part2

  •    Plan And Implement Highly Available Storage Solutions-Part1

  •    Plan And Implement Highly Available Storage Solutions-Part2

  •    Plan And Implement Highly Available Roles-Part1

  •    Plan And Implement Highly Available Roles-Part2

  •    Business Continuity And Disaster Recovery Solution

Module 3: Plan and Implement a Server Virtualization Infrastructure

  •    Plan And Implement Virtual Hosts - Part 1

  •    Plan And Implement Virtual Hosts-Part2

  •    Plan And Implement Virtual Machines

  •    Plan And Implement Virtualization Networking-Part1

  •    Plan And Implement Virtualization Networking-Part2

  •    Plan And Implement Virtualization Storage

  •    Plan And Implement Virtual Machine Movement

  •    Manage And Maintain A Server Virtualization Infrastructure

Module 4: Design and Implement Identity and Access Solutions

  •    Design And Implement Identity And Access Solutions-Part1

  •    Design And Implement Identity And Access Solutions-Part2

  •    Implement And Manage Certificates

  •    Design And Implement A Federated Identity Solution

  •    Design And Implement AD Rights Management Services

  •    Conclusion

Microsoft 70-640 TS: Windows Server 2008 Active Directory, Configuring Course Content

Module 1: Active Directory - An Identity And Access Solution

  •    Introduction

  •    Understanding The Purpose Of Identity And Access Control

  •    Active Directory Server Roles For IDA Management-Part 1

  •    Active Directory Server Roles For IDA Management-Part 2

  •    Active Directory Server Roles That Support IDA Solutions

  •    Active Directory Summary

Module 2: Introduction To Active Directory Domain Services

  •    Overview Of Active Directory Identity And Access-Part 1

  •    Overview Of Active Directory Identity And Access-Part 2

  •    Overview Of Active Directory Identity And Access-Part 3

  •    Active Directory Components And Concepts-Part 1

  •    Active Directory Components And Concepts-Part 2

  •    Active Directory Components And Concepts-Part 3

  •    Active Directory Components And Concepts-Part 4

  •    Active Directory Components And Concepts-Part 5

  •    Implementing Active Directory-Part 1

  •    Implementing Active Directory-Part 2

  •    Implementing Active Directory-Part 3

  •    Implementing Active Directory-Part 4

  •    Implementing Active Directory-Part 5

  •    Implementing Active Directory-Part 6

  •    Implementing Active Directory-Part 7

  •    Implementing Active Directory-Part 8

  •    Overview Of Active Directory-Part1

  •    Overview Of Active Directory-Part2

  •    Overview Of Active Directory-Part3

  •    Summary

Module 3: Configuring DNS To Support Active Directory Domain Services

  •    Overview Of Active Directory And DNS Integration-Part 1

  •    Overview Of Active Directory And DNS Integration-Part 2

  •    Configure Active Directory Integrated Zones-Part 1

  •    Configure Active Directory Integrated Zones-Part 2

  •    Configure Dynamic Updates

  •    Configure Read-Only Zones

Module 4: Active Directory Object Management

  •    Overview Of Active Directory Objects

  •    Configuring User And Computer Accounts-Part 1

  •    Configuring User And Computer Accounts-Part 2

  •    Configuring User And Computer Accounts-Part 3

  •    Configuring Groups-Part1

  •    Configuring Groups-Part2

  •    Configuring Groups-Part3

  •    Configuring Groups-Part4

  •    Configuring Groups-Part5

  •    Automating Object Management-Part1

  •    Automating Object Management-Part2

  •    Automating Object Management-Part3

  •    Automating Object Management-Part4

  •    Automating Object Management-Part5

  •    Delegation Of Administrative Control-Part1

  •    Delegation Of Administrative Control-Part2

  •    Summary

Module 5: Managing Active Directory Replication Using Sites

  •    Configuring Sites And Subnets-Part 1

  •    Configuring Sites And Subnets-Part 2

  •    Configuring Replication-Part 1

  •    Configuring Replication-Part 2

  •    Configuring Replication-Part 3

  •    Configuring Replication-Part 4

  •    Summary

Module 6: Configuration Management Using Group Policy

  •    Understanding Group Policy-Part 1

  •    Understanding Group Policy-Part 2

  •    Understanding Group Policy-Part 3

  •    Understanding Group Policy-Part 4

  •    Understanding Group Policy-Part 5

  •    Understanding Group Policy-Part 6

  •    Working With GPOs-Part 1

  •    Working With GPOs-Part 2

  •    Working With GPOs-Part 3

  •    Working With GPOs-Part 4

  •    Troubleshooting Application Of GPO

  •    Delegating Administrative Control Of Group Policy

  •    Summary

Module 7: Desktop Environmental And Security Management

  •    Configure Scripts And Folder Redirection-Part 1

  •    Configure Scripts And Folder Redirection-Part 2

  •    Deploying Software-Part 1

  •    Deploying Software-Part 2

  •    Deploying Software-Part 3

  •    Delegating Computer Support

  •    Managing Security Settings-Part 1

  •    Managing Security Settings-Part 2

  •    Managing Security Settings-Part 3

  •    Managing Security Settings-Part 4

  •    Managing Security Settings-Part 5

  •    Utilizing Auditing-Part 1

  •    Utilizing Auditing-Part 2

  •    Summary

Module 8: Maintaining Active Directory

  •    Monitoring Active Directory-Part 1

  •    Monitoring Active Directory-Part 2

  •    Monitoring Active Directory-Part 3

  •    Monitoring Active Directory-Part 4

  •    Managing The Active Directory Database

  •    Disaster Recovery For Active Directory-Part 1

  •    Disaster Recovery For Active Directory-Part 2

  •    Disaster Recovery For Active Directory-Part 3

  •    Disaster Recovery For Active Directory-Part 4

  •    Maintaining Active Directory Domain Services Summary

Module 9: Deploy and Manage a Public Key Infrastructure

  •    Overview Of Public Key Infrastructure And ADCS-Part 1

  •    Overview Of Public Key Infrastructure And ADCS-Part 2

  •    Overview Of Public Key Infrastructure And ADCS-Part 3

  •    Deploying A Certificate Authority Hierarchy

  •    Installing ADCS-Part 1

  •    Installing ADCS-Part 2

  •    Installing ADCS-Part 3

  •    Installing ADCS-Part 4

  •    Deploying And Managing Certificates-Part 1

  •    Deploying And Managing Certificates-Part 2

  •    Deploying And Managing Certificates-Part 3

  •    Deploying And Managing Certificates-Part 4

  •    Managing Revocation And Distribution-Part 1

  •    Managing Revocation And Distribution-Part 2

  •    Configuring Certificate Recovery-Part 1

  •    Configuring Certificate Recovery-Part 2

  •    Deploy And Manage A Public Key Infrastructure Summary

Module 10: Supporting Applications with AD LDS

  •    ADLDS Overview-Part 1

  •    ADLDS Overview-Part 2

  •    Configuring ADLDS Instances

  •    Configuring Replication

  •    Understanding Integration With ADLDS

  •    Supporting Applications With ADLDS Summary

Module 11: Deploying Active Directory Federated Services

  •    ADFS Overview

  •    ADFS Deployment Scenarios

  •    Deploying ADFS-Part 1

  •    Deploying ADFS-Part 2

  •    Deploying ADFS-Part 3

  •    Deploying Active Directory Federated Services Summary

Module 12: Deploying Active Directory Rights Management Services

  •    ADRMS Overview

  •    Understanding ADRMS

  •    Managing ADRMS-Part 1

  •    Managing ADRMS-Part 2

  •    Managing ADRMS-Part 3

  •    Managing ADRMS-Part 4

  •    Deployment Active Directory Rights Management Services Summary

  •    Active Directory Conclusion

Cisco 640-461: Cisco Voice and Unified Communications Administration Course Content

Module 1: Introduction

  •    Intro Part 1

  •    Intro Part 2

  •    Intro Part 3

  •    Intro Part 4

  •    Intro Part 5

  •    Intro Part 6

  •    Intro Part 7

Module 2: Telephony

  •    Telephony Part 1

  •    Telephony Part 2

  •    Telephony Part 3

  •    Telephony Part 4

Module 3: Basic Call Routing

  •    Basic Call Routing Part 1

  •    Basic Call Routing Part 2

  •    Basic Call Routing Part 3

Module 4: VOIP Call Routing

  •    VOIP Call Routing Part 1

  •    VOIP Call Routing Part2

  •    VOIP Call Routing Part 3

  •    VOIP Call Routing Part 4

  •    VOIP Call Routing Part 5

Module 5: CUCME Call Routing Basics

  •    CUCME Call Routing Basics Part 1

  •    CUCME Call Routing Basics Part 2

  •    CUCME Call Routing Basics Part 3

  •    CUCME Call Routing Basics Part 4

  •    CUCME Call Routing Basics Part 5

  •    CUCME Call Routing Basics Part 6

  •    CUCME Call Routing Basics Part 7

  •    CUCME Call Routing Basics Part 8

  •    CUCME Call Routing Basics Part 9

  •    CUCME Call Routing Basics Part 10

  •    CUCME Call Routing Basics Part 11

Module 6: Preparing Network For Voice

  •    Preparing Network For Voice Part 1

  •    Preparing Network For Voice Part 2

  •    Preparing Network For Voice Part 3

  •    Preparing Network For Voice Part 4

  •    Preparing Network For Voice Part 5

  •    Preparing Network For Voice Part 6

Module 7: IP Phone Behavior

  •    IP Phone Behavior

Module 8: CUCME Administration Basics

  •    CUCME Administration Basics Part 1

  •    CUCME Administration Basics Part 2

  •    CUCME Administration Basics Part 3

  •    CUCME Administration Basics Part 4

Module 9: CUCME StandUp

  •    CUCME Stand Up Part 1

  •    CUCME Stand Up Part 2

  •    CUCME Stand Up Part 3

  •    CUCME Stand Up Part 4

  •    CUCME Stand Up Part 5

Module 10: CUCME StandUp Part 2

  •    CUCME Stand Up2 Part 1

  •    CUCME Stand Up2 Part 2

Module 11: CUCME StandUp CUCME

  •    CUCME Stand Up CUCME Part 1

  •    CUCME Stand Up CUCME Part 2

  •    CUCME Stand Up CUCME Part 3

Module 12: End Users and End User Interfaces

  •    End Users And End User Interfaces Part 1

  •    End Users And End User Interfaces Part 2

  •    End Users And End User Interfaces Part 3

Module 13: Endpoint Implementation

  •    Endpoint Implementation Part 1

  •    Endpoint Implementation Part 2

  •    Endpoint Implementation Part 3

  •    Endpoint Implementation Part 4

Module 14: Call Coverage

  •    Call Coverage Part 1

  •    Call Coverage Part 2

  •    Call Coverage Part 3

  •    Call Coverage Part 4

  •    Call Coverage Part 5

  •    Call Coverage Part 6

  •    Call Coverage Part 7

  •    Call Coverage Part 8

  •    Call Coverage Part 9

Module 15: Calling Restrictions and Routing

  •    Calling Restrictions And Routing Part 1

  •    Calling Restrictions And Routing Part 2

  •    Calling Restrictions And Routing Part 3

  •    Calling Restrictions And Routing Part 4

  •    Calling Restrictions And Routing Part 5

  •    Calling Restrictions And Routing Part 6

Module 16: CUCME Advance Call Coverage

  •    CUCME Advance Call Coverage Part 1

  •    CUCME Advance Call Coverage Part 2

Module 17: Implementing Unity Connection

  •    Implementing Unity Connection Part 1

  •    Implementing Unity Connection Part 2

  •    Implementing Unity Connection Part 3

  •    Implementing Unity Connection Part 4

  •    Implementing Unity Connection Part 5

  •    Implementing Unity Connection Part 6

  •    Implementing Unity Connection Part 7

  •    Implementing Unity Connection Part 8

  •    Outro

Unix Administration Basics Course Content

Module 1: Virtual Box

  •    Virtual Box-Part 1

  •    Virtual Box-Part 2

  •    Virtual Box-Part 3

  •    Virtual Box-Part 4

  •    Virtual Box-Part 5

  •    Virtual Box-Part 6

Module 2: Basic Commands

  •    Basic Commands-Part 1

  •    Basic Commands-Part 2

  •    Basic Commands-Part 3

  •    Basic Commands-Part 4

  •    Basic Commands-Part 5

  •    Basic Commands-Part 6

  •    Basic Commands-Part 7

  •    Basic Commands-Part 8

  •    Basic Commands-Part 9

  •    Basic Commands-Part 10

Module 3: Special Characters

  •    Special Characters-Part 1

  •    Special Characters-Part 2

  •    Special Characters-Part 3

Module 4: File Editing

  •    File Editing-Part 1

  •    File Editing-Part 2

  •    File Editing-Part 3

  •    File Editing-Part 4

  •    File Editing-Part 5

  •    File Editing-Part 6

  •    File Editing-Part 7

Module 5: File System Structure

  •    File System Structure-Part 1

  •    File System Structure-Part 2

  •    File System Structure-Part 3

  •    File System Structure-Part 4

Module 6: Finding Files

  •    Finding Files-Part 1

  •    Finding Files-Part 2

  •    Finding Files-Part 3

Module 7: Shell Special Characters

  •    Shell Special Characters-Part 1

  •    Shell Special Characters-Part 2

  •    Shell Special Characters-Part 3

Module 8: Regular Expressions

  •    Regular Expressions-Part 1

  •    Regular Expressions-Part 2

  •    Regular Expressions-Part 3

  •    Regular Expressions-Part 4

  •    Regular Expressions-Part 5

  •    Regular Expressions-Part 6

Module 9: Process Management

  •    Process Management-Part 1

  •    Process Management-Part 2

  •    Process Management-Part 3

  •    Process Management-Part 4

  •    Process Management-Part 5

  •    Process Management-Part 6

  •    Process Management-Part 7

  •    Process Management-Part 8

Module 10: Job Scheduling

  •    Job Scheduling-Part 1

  •    Job Scheduling-Part 2

  •    Job Scheduling-Part 3

  •    Job Scheduling-Part 4

  •    Job Scheduling-Part 5

  •    Job Scheduling-Part 6

Module 11: Customizing Your Account

  •    Customizing Your Account-Part 1

  •    Customizing Your Account-Part 2

  •    Customizing Your Account-Part 3

  •    Customizing Your Account-Part 4

  •    Customizing Your Account-Part 5

  •    Customizing Your Account-Part 6

Module 12: Unix Printing

  •    Unix Printing-Part 1

  •    Unix Printing-Part 2

  •    Unix Printing-Part 3

  •    Unix Printing-Part 4

Module 13: Networking

  •    Networking-Part 1

  •    Networking-Part 2

  •    Networking-Part 3

  •    Networking-Part 4

  •    Networking-Part 5

  •    Networking-Part 6

  •    Networking-Part 7

  •    Networking-Part 8

  •    Networking-Part 9

  •    Networking-Part 10

Module 14: X Windows

  •    X Windows-Part 1

  •    X Windows-Part 2

  •    X Windows-Part 3

  •    X Windows-Part 4

  •    X Windows-Part 5

Module 15: Back Up And Compression

  •    Back Up And Compression-Part 1

  •    Back Up And Compression-Part 2

  •    Back Up And Compression-Part 3

  •    Back Up And Compression-Part 4

Module 16: Text Utility

  •    Text Utility-Part 1

  •    Text Utility-Part 2

  •    Text Utility-Part 3

  •    Text Utility-Part 4

  •    Text Utility-Part 5

Module 17: Shell Scripting

  •    Shell Scripting-Part 1

  •    Shell Scripting-Part 2

  •    Shell Scripting-Part 3

  •    Shell Scripting-Part 4

  •    Shell Scripting-Part 5

  •    Shell Scripting-Part 6

  •    Shell Scripting-Part 7

  •    Shell Scripting-Part 8

  •    Shell Scripting-Part 9

  •    Shell Scripting-Part 10

  •    Shell Scripting-Part 11

Module 18: System Administration Basics

  •    System Administration Basics-Part 1

  •    System Administration Basics-Part 2

  •    System Administration Basics-Part 3

  •    System Administration Basics-Part 4

  •    System Administration Basics-Part 5

Information Technology Infrastructure Library (ITIL®) - Foundation Course Content

Module 1: The ITIL Qualification Scheme

  •    Intro

  •    About Scheme

  •    Levels Of Qualifications

  •    Qualification Bodies

  •    The I T I L Foundation Certification Stubble

Module 2: Introduction to Service Management

  •    Service And Service Management- Part 1

  •    Service And Service Management- Part2

  •    Service Management Processes- Part 1

  •    Service Management Processes- Part 2

  •    Service Management Best Practices And Summary

Module 3: ITIL and the Service Lifecycle

  •    Service Management Practices

  •    Why ITIL

  •    The Service Lifecycle

Module 4: Service Strategy

  •    Service Strategy Purpose And Objectives

  •    Service Strategy Scope

  •    Business Value Stubble

  •    Key Principles- Part1

  •    Key Principles- Part2

  •    Service Stragey Processes

Module 5: Service Design

  •    Service Design Purpose And Objectives

  •    Scope Of Service Design

  •    Business Value Service Design

  •    Service Design Key Principles

  •    Service Design Processes- Part 1

  •    Service Design Processes- Part 2

  •    Service Design Processes- Part 3

  •    Service Design Processes- Part 4

Module 6: Service Transition

  •    Service Transition Purpose And Objectives

  •    Service Transition Scope And Business Value

  •    Service Transition Key Principles

  •    Service Transition Processes- Part 1

  •    Service Transition Processes- Part 2

  •    Service Transition Processes- Part 3

  •    Service Transition Processes- Part 4

Module 7: Service Operation

  •    Intro To Service Operation

  •    Service Operation Basic Concepts

  •    Service Operation Processes-Part 1

  •    Service Operation Processes-Part 2

  •    Service Operation Access Management

  •    Service Operation Functions

Module 8: Continual Service Improvement

  •    Continual Service Improvement Purpose Objectives And Scope

  •    Continual Service Improvement Key Principles

  •    Continual Service Improvement Processes

Module 9: Service Management Technology

  •    SMT

  •    SMT Service Automation

  •    SMT Service Analytics

Module 10: How it all Fits Together

  •    How It All Fits Together

  •    Outro

Module 11: Bonus Material

  •    Lifecycle Stages Flow-Part 1

  •    Lifecycle Stages Flow-Part 2

  •    Lifecycle Stages Breakdown-Part 1

  •    Lifecycle Stages Breakdown-Part 2

  •    Lifecycle Stages Breakdown-Part 3

  •    Function Reviews-Part 1

  •    Function Reviews-Part 2

  •    Service Support Function

  •    Service Delivery Function-Part 1

  •    Service Delivery Function-Part 2

  •    Test Taking Tips

  •    Practice Questions

CompTIA LX0-101 & LX0-102: CompTIA Linux+ Course Content

Module 1: Instructions

  •    Introduction

  •    Introduction To Building Labs

  •    Things You Need To Do

  •    Install Demo Virtual Box

  •    Navigation

  •    Commands With LabDemo

  •    Internal And External Commands

  •    Overview Of Shell Commands Tricks

  •    Exploring Shell Configuration

  •    Stream Redirection

  •    Overview Of Processing Text Using Filters

  •    Overview File-Viewing Commands

  •    Overview Using Grep

  •    Sed Syntax And Summary

  •    Overview Of Exam Essentials

Module 2: Managing Software

  •    Managing Software

  •    Managing Software

  •    Overview Using RPM

  •    RPM-Part 2

  •    Overview Using Cpio

  •    Overview Using Debian And Apt Cache

  •    Using Apt-get

  •    Debian Tools

  •    Managing Shared Libraries

  •    Overview Locating Library Files

  •    Foreground and Background Processes

  •    Managing Software Summary

Module 3: Configuring Hardware

  •    Configuring Hardware

  •    Configuring Devices

  •    Configuring USB

  •    Configuring Hard Disk

  •    Designing Hard Disk Layout

  •    Logical Volume Management

  •    Overview Using Fdisk

  •    Overview Common File System Types

  •    Creating Filesystem

  •    Overview Maintaining File System Health

  •    Configuring Hardware Summary

Module 4: Managing Files

  •    Managing Files

  •    File Archiving Commands

  •    Managing Files Ownership

  •    Managing Disk Quotas

  •    Directories And Content

  •    Overview Tools For Locating Files

  •    Overview Of Exam Essentials

Module 5: Booting Files

  •    Booting Linux And Editing Files

  •    Boot And Reboot

  •    Understanding The Boot Process

  •    Run Levels Process

  •    Managing Run Level Services

  •    Editing With Vi

  •    Booting Summary

Module 6: X

  •    X Windows Systems

  •    X Configuration Options

  •    X Configuration Options-Part 2

  •    Untitled Media

  •    Configuring X Featuring Fonts

  •    Overview Managing GUI Logins

  •    Using X For Remote Access

  •    X Accessibility

  •    Addition Assistive Technologies

  •    Configuring Localization And Internationalization

  •    Querying And Setting Your Locale

  •    Configuring Printing-Part 1

  •    Configuring Printing-Part 2

  •    Using Web-Based CUPS Utilities

Module 7: Admin

  •    Administering

  •    Directly Modifying Account Configuration

  •    Components Of Account

  •    Adding Groups

  •    Tuning User And System Environments

  •    Reviewing Log File Contents

  •    Maintaining System Time

  •    Admin Summary

Module 8: Basic Networking

  •    Basic Networking

  •    Network Addressing-Part 1

  •    Network Addressing-Part 2

  •    DNS Data Flow Zone And Resolution

  •    Network Ports

  •    Connections

  •    Testing Connectivity

  •    Wireshark Demo

  •    Basic Networking Summary

Module 9: Scripts

  •    Scripts E-mail And Databases

  •    Writing Scripts-Part 1

  •    Writing Scripts-Part 2

  •    Managing E-mail

  •    Managing Data With SQL

  •    Advantages Of Database

  •    Scripts Summary

Module 10: Security

  •    Security

  •    Configuring Xinetd

  •    Uninstalling Or Reconfiguring Servers

  •    Tools For Managing Passwords

  •    Configuring SSH

  •    SSH Keys

  •    Controlling SSH Access

  •    Using GPG

  •    Security Summary

Medical Coding and Billing ICD-9 Course Content

Lesson 3 - Medical Terminology

  •    Medical Terminology

Lesson 2 - Anatomy Physiology

  •    Anatomy

  •    Anatomic Organ Systems

Lesson 4 - Introduction to ICD-9-cm

  •    Introduction To ICD-9-Part 1

  •    Introduction To ICD-9-Part 2

  •    Introduction To ICD-9-Part 3

  •    Introduction To ICD-9-Part 4

  •    Introduction To ICD-9-Part 5

  •    Introduction To ICD-9-Part 6

  •    Introduction To ICD-9-Part 7

  •    Diagnostic Procedures

  •    Coding And Reporting Guidelines-Part 1

  •    Coding And Reporting Guidelines-Part 2

  •    Coding And Reporting Guidelines-Part 3

Lesson 5 - Application of ICD-9-cm (Ch 1-9)

  •    Application Of ICD-9-CM

  •    Caution

  •    Neoplasms

  •    Other Metabolic And Immunity Disorders Section

  •    Hypertensive Heart And Chronic Kidney Disease

Lesson 7 - Introduction to ICD-10-CM

  •    Overview Of ICD-10-CM

Lesson 1 - Introduction to CPT and HCPCS

  •    Introduction To CPT And Level II National Codes-HCPCS

  •    CMS-1500 Form

  •    Categorized By

  •    Category I Codes

  •    Format

Lesson 2 - Evaluation and Management (E/M)

  •    Evaluation And Management-Part 1

  •    Evaluation And Management-Part 2

  •    Nature Of Evaluation And Management Services

  •    Example Of HPI

  •    Review Of Systems

  •    E And M Documentation Guidelines

  •    E And M Exam-Part 1

  •    E And M Exam-Part 2

  •    Exam

  •    Medical Decision Making

  •    Number Of Diagnoses Or Treatment Options

  •    Amount And Or Complexity Of Data Reviewed

  •    Nature Of Presenting Problem

  •    E And M Documentation-Level Based On TIme

  •    Hospital E And M Codes

  •    Subsequent Visits

  •    InitialInpatient Services

  •    ProlongedServices

  •    Modifiers

Lesson 3 - Surgery, Integumentary system, Anesthesia & Modifiers

  •    Anesthesia

  •    Physical Status Modifiers

  •    Medicare Policy

  •    Surgical Guidelines

  •    58 Staged Or Related Procedure

  •    Modifier 52-Reduced Services

  •    Ancillary Modifiers

  •    Integumentary System

  •    Morphology

  •    Integumentary-Nails

  •    Integumentary-Introduction

  •    Clinical Scenario

  •    Mohs Micrographic Surgury

Lesson 4 - Musculoskeletal

  •    Musculoskeletal System

  •    Rheumatism

  •    Endoscopy And Arthroscopy

Lesson 5 - Respiratory and Cardio

  •    Respiratory System

  •    Endoscopy

  •    Mediastinum And Diaphragm

  •    Circulatory Systems

  •    Associated Diagnosis

  •    Pacemaker Or Pacing Cardioverter-Defibrillator

  •    CABG

  •    Bypass Grafts

  •    Selective Catheterization

  •    Endovascular Revascularization

  •    Coronary Therapeutic Services And Procedures

  •    Intracardiac Electrophysiological Procedures And Studies

Lesson 6 - Female Genital System, Maternity Care and General Surgery

  •    Hemic And Lymphatic Systems

  •    Female Genitourinary And Maternity Care

  •    Ultrasound

  •    Male Genitourinary

  •    Bladder

  •    Eyes

  •    Ears

  •    Digestive System Terms

  •    Digestive Procedures

  •    Endocrine And Nervous System

  •    Nervous System-Part 1

  •    Nervous System-Part 2

  •    Nervous System-Part 3

Lesson 9 - Medicine

  •    Medicine

  •    Chemotherapy

  •    Category III Codes

  •    Conclusion

Lesson 1 - Introduction to Reimbursement

  •    Intro

  •    Medicare-PartB

  •    Fraud And Abuse

Lesson 7 - Radiology

  •    Radiology

  •    Modifiers

  •    Diagnostic Ultrasound

  •    Radiation Treatment Management

Lesson 8 - Pathology

  •    Regulatory Terms

  •    Urinalysis

Lesson 6 - Application of ICD-9-cm (Ch 10-19)

  •    Diseases Of The Genitourinary System

  •    Diabetes Mellitus In Pregnancy

  •    Diseases Of Musculoskeletal SystemAnd Connective Tissue

  •    Burns

  •    Adverse Effects Poisoning And Toxic Effects

Medical Coding and Billing ICD 10 Course Content

Module 1: Certain Infectious and Parasitic Diseases

  •    Intro

  •    Certain Infectious And Parasitic Diseases

Module 2: Neoplasm

  •    Neoplasm

Module 3: Diseases of the Blood and Blood Forming Organs

  •    Diseases Of The Blood And Blood Forming Organs

Module 4: Endocrine, Nutritional and Metabolic Diseases

  •    Endocrine Nutritional And Metabolic Diseases

Module 5: Mental Disorders

  •    Mental Disorders

Module 6: Diseases of the Nervous System

  •    Disesases Of The Nervous System

Module 7: Diseases of the Eye and Adnexa

  •    Diseases Of The Eye And Adnexa

Module 8: Diseases of the Ear and Mastoid Process

  •    Diseases Of The Ear And Mastoid

Module 9: Diseases of the Circulatory System

  •    Diseases Of The Circulatory System

Module 10: Diseases of the Respiratory System

  •    Diseases Of The Respiratory System

Module 11: Diseases of the Digestive System

  •    Diseases Of The Digestive System

  •    Specific Coding Exercises

Module 12: Diseases of the Skin and Subcutaneous Tissue

  •    Diseases Of The Skin And Subcutaneous Tissue

Module 13: Diseases of the Musculoskeletal System and Connective Tissue

  •    Diseases Of The Musculoskeletal System And Connective Tissue

Module 14: Diseases of the Genitourinary System

  •    Diseases Of The Genitourinary System

Module 15: Pregnancy, Childbirth, and the Puerperium

  •    Pregnancy Childbirth And The Puerperium

Module 16: Newborn (Perinatal) Guidelines

  •    Newborn Perinatal Guidelines

Module 17: Congenital Malformations, Deformations and Chromosomal Abnormalities

  •    Congenital Malformations Deformations And Chromosomal Abnormalities

Module 18: Symptoms, Signs and Abnormal Clinical and Laboratory Findings

  •    Symptoms Signs And Abnormal Clinical And Laboratory Findings

Module 19: Injury, Poisoning and Certain Other Consequences of the External Causes

  •    Injury Poisoning And Certain Other Consequences Of The External Causes

  •    Specific Coding Questions

Module 20: External Causes of Morbidity

  •    External Causes Of Morbidity

Module 21: Factors Influencing Health Status

  •    Factors Influencing Health Status

  •    Case Study 1 And 2

  •    Outro

Marketing Tools and Tips for Success Course Content

Marketing Tools and Tips for Success

  •    Determine Your Goals

  •    Create Your Persona Or Voice

  •    Decide On Your Platforms

  •    Establishing A Social Media Manager

  •    Coordinate With Customer Service

  •    Create A Predetermined Crisis Management Plan

  •    Stick To The Script

  •    Building Relationships With The Media

  •    Find Your Evangelist

  •    Stay Informed Part 1

  •    Stay Informed Part 2

  •    Bitly

  •    Woobox Part 1

  •    Woobox Part 2

  •    HootSuite Part 1

  •    HootSuite Part 2

  •    Storify

  •    Social Media Rules And Tips

  •    Social Media Conclusion

  •    Tweetdeck-Boolean Search

Marketing with Google and YouTube Course Content

Marketing with Google and YouTube

  •    Introduction To Google Plus

  •    Overview Of The Interface

  •    Setting Up A Google Plus Page

  •    Linking Your Other Social Networks

  •    Linking Your Website To Your Google Plus Page

  •    Review Of Your Google Plus Dashboard

  •    Notification Settings For Google Plus

  •    Photo Settings In Google Plus

  •    Google Plus And YouTube

  •    YouTube Advanced Settings

  •    Interface For Uploaded Videos

  •    Sharing Videos Across Your Social Network

  •    Updating Your About Section

  •    Quick Recap Of Everything Covered So Far

Basics of Marketing with Social Media Course Content

Basics of Marketing with Social Media

  •    Social Media Introduction

  •    Creating A Google Account

  •    Setting Up Your Twitter Account

  •    Getting Your Twitter House In Order

  •    Why Facebook For Your Business

  •    Using Facebook As A Business

  •    Setting Up Your Business Page

  •    Setting Your Cover Photo

  •    Tying It All Together

  •    Tip-Adding Admins In Facebook

Google Analytics Course Content

Module 1: Introduction to Google Analytics

  •    Intro Definitions-Part 1

  •    Intro Definitions-Part 2

  •    How Google Analytics Works

Module 2: Fundamentals of Google Analytics

  •    Build Analytics Infrastructure

  •    Setting Up Conversion Data

  •    Setting Up E-Commerce And Goal Tracking

  •    Cross Domain Tracking

  •    Input New Users

  •    Examine Data Points

Module 3: Basics of Google Anayltics

  •    Basic Features

  •    Dashboard

  •    Shortcuts

  •    Adding A Dashboard

  •    Sharing Reports

  •    Alerts

  •    Realtime Analytics

  •    Standard Reports

  •    Views

Module 4: Reports in Google Analytics

  •    Acquisitions Intro

  •    All Traffic Acquisitions

  •    Acquisitions Overview

  •    Acquisitions Channels

  •    All Referrals

  •    Campaign

  •    Keywords

  •    Social

  •    Webmaster Tools

Module 5: Behavioral Reports

  •    Behavioral Reports Intro

  •    Dimensions

  •    Content Drilldown

  •    Landing Pages

  •    Exit Pages

  •    Event Flow Report

  •    Working With Events

  •    Site Search Report-Part 1

  •    Site Search Report-Part 2

  •    Site Search Report-Part 3

  •    Site Search Report-Part 4

  •    Behavior Flow Report

  •    Site Speed

  •    Using Site Speed Search

  •    Page Timings

  •    Speed Suggestions

  •    User Timing Adsense

  •    Experiments

  •    Inpage Analytics

Module 6: Audience

  •    Audience Reports

  •    Location Report

  •    Language

  •    Behavior

  •    Frequency Recency

  •    Engagement Report

  •    Technology Reports

  •    Mobile Reporting

  •    Demographic Report

  •    Interests

  •    Visitor Flow Chart

Module 7: Conversions

  •    Intro To Module 7

  •    Funnel Visualization

  •    Goal Flow Report

  •    Reverse Goal Path

  •    Goal URLs

  •    E-commerce Reports

  •    Product Performance Reports

  •    Transactions Report

  •    Time To Purchase Report

  •    Multi-Channels Funnels Report

  •    Assisted Conversion Report

  •    Top Conversion Paths Report

  •    Time Log And Path Length Report

  •    Attribution Report And Model Comparison Tool

  •    Conclusion

Accounting and Business Basics Course Content

Accounting and Business Basics

  •    Introduction

  •    Business Entities

  •    Beginning Your Business

  •    Financial Basics Part 1

  •    Financial Basics Part 2

  •    Employees Payroll

  •    Getting Your Business Out There

  •    SEO

  •    Other Topics

  •    Closing

Quickbooks Point of Sale (POS) Course Content

Module 1: Creating and Setting Up Your Point of Sale Company File

  •    Intro To Point Of Sale

  •    Creating And Setting Up Point Of Sale

Module 2: Installing your System

  •    Determining Your Point Of Sale Additions

Module 3: Navigating and Customizing the Home Page

  •    Navigating And Customizing The Homepage

Module 4: Company Preferences

  •    Company Preferences

Module 5: Financial- Setting up QuickBooks Connection

  •    Setting Up Quickbooks Connection

Module 6: Setting up Sales Tax

  •    Setting Up Sales Tax

Module 7: Workstation Preferences

  •    Workstation Preferences

Module 8: Additional Features

  •    Additional Features

Module 9: Employees and Security

  •    Employees And Security

Module 10: Customers

  •    Customers

Module 11: Rewards Program

  •    Reward Programs

Module 12: Vendors

  •    Vendors

Module 13: Setting Up Your Inventory

  •    Setting Up Inventory

Module 14: Item Styles, Assemblies, and Group

  •    Adding Styles Assemblies And Groups

Module 15: Working with Inventory

  •    Working With Inventory

Module 16: Sales

  •    Sales

Module 17: Working with Price Levels and Discounts

  •    Working With Price Level And Discounts

Module 18: Collecting Sales Tax

  •    Collecting Sales Tax

Module 19: Adding Shipping Information (Pro/MS)

  •    Adding Shipping Info

Module 20: Tracking Sales Commissions

  •    Tracking Sales And Commission

Module 21: Taking Payment and Giving Change

  •    Taking Payments And Giving Change

Module 22: Recording Tips

  •    Recording Tip

Module 23: Handling Tricky Sales Returns

  •    Handling Tricky Sales And Returns

Module 24: Working with Sales Orders, Work Orders, and Layaways

  •    Working With Sales And Work Orders

Module 25: Purchasing Merchandise

  •    Purchasing Merchandise

Module 26: Receiving from a PO

  •    Receiving Purchase Orders

Module 27: Managing Inventory

  •    Managing Inventory

Module 28: Reporting

  •    Reporting Point Of Sales

Module 29: QuickBooks Financial

  •    Quickbooks Financial

Module 30: Multi-Store

  •    Multi-Store

Module 31: Protect your data

  •    Protecting Your Data

Module 32: Adding Third Party Applications

  •    Adding 3rd Party Apps

  •    Summary of Point of Sale

Mastering Your Android Phone Course Content

Module 1: The Phone

  •    Introduction

  •    Buttons

Module 2: The Screen

  •    Gestures

Module 3: The Keyboard

  •    Keypad

Module 4: Contacts

  •    Contacts

  •    Groups

Module 5: Phone Calls

  •    Phone

  •    Call Customization

Module 6: Messaging

  •    Messages-Part 1

  •    Messages - Part 2

  •    Messages - Part 3

  •    Messages - Part 4

  •    Customizing Messages

Module 7: Internet

  •    Internet - Part 1

  •    Internet - Part 2

  •    Internet Settings

Module 8: Email

  •    Email-Part1

  •    Email-Part 2

  •    Setup Email

Module 9: Music

  •    Music

Module 10: Android Specifics

  •    Google Voice

  •    Customization

  •    Lock Screen

  •    Stylus

Module 11: Photos & Video

  •    Camera-Part1

  •    Camera-Part2

  •    Taking Photos-Part1

  •    Taking Photos-Part2

  •    Editing Photos

  •    Capturing Video

Module 12: Conclusion

  •    Wrap Up

Mastering Your iPhone Course Content

Module 1: iPhone Basics

  •    Iphone Intro

  •    Iphone The Basics

Module 2: The Screen

  •    2.1 The Screen Pt. 1

  •    2.2 The Screen Pt. 2

  •    2.3 The Screen Pt. 3

  •    2.4 The Screen Pt. 4

Module 3: The Keyboard

  •    Basic Keyboard

  •    Advanced Keyboard

Module 4: Basic Calls and Settings

  •    Making A Call

  •    Settings-Part 1

  •    Settings-Part 2

Module 5: Contacts

  •    Contacts-Part 2

  •    Contacts-Part 2

Module 6: Phone Calls

  •    Phone Calls-Part 1

  •    Phone Calls-Part 2

  •    Phone Calls-Part 3

  •    Advanced Phone Calls

Module 7: Messaging

  •    Texting-Part 1

  •    Texting-Part 2

  •    Advanced Texting-Part 1

  •    Advanced Texting-Part 2

  •    Message Settings

Module 8: Web

  •    Web-Part 1

  •    Web-Part 2

  •    Web-Part 3

Module 9: Email

  •    Email-Part 1

  •    Email-Part 2

  •    Multiple Email Accounts

  •    Email Settings

Module 10: Siri

  •    SIRI

Module 11: Music

  •    Music-Part 1

  •    Music-Part 2

Module 12: Photos and Video

  •    Camera Functions

  •    Photography Settings

  •    Edit Photos

  •    Share Photos

  •    Video Functions

Module 13: Maps

  •    Apple Maps

Module 14: Conclusion

  •    Application Management

  •    Misc-Part 1

  •    Misc-Part 2

  •    Conclusion

Microsoft Windows 8 Power User Course Content

Lesson 1: Getting to Know PCs and the Windows 8 User Interface

  •    Introduction

  •    Identify Components of a Personal Computer

  •    Sign in to Windows 8

  •    Navigate the Desktop

Lesson 2: Using the Modern Apps and Navigation Features

  •    Using the Modern Apps and Navigation Features

Lesson 3: Working with Desktop Applications

  •    Navigate the Desktop

Lesson 4: Using Internet Explorer 10

  •    Navigate Internet Explorer 10

Lesson 5: Customizing the Windows 8 Environment

  •    Multitasking With Apps

  •    Use the Control Panel and Task Manager-Part1

  •    Use the Control Panel and Task Manager-Part2

Lesson 6: Using Windows 8 Security Features

  •    Customizing the Windows 8 Environment

  •    Security Features

  •    Using Other Windows 8 Features-Part1

  •    Using Other Windows 8 Features-Part2

  •    Using Other Windows 8 Features-Part3

Cloud Computing Security Knowledge (CCSK) Course Content

Module 1: Architecture

  •    Cloud Security Overview-Part1

  •    Cloud Security Overview-Part2

  •    Cloud Diagrams

  •    Cloud Services

Module 2: Governance and Enterprise Risk

  •    Risk Management

  •    Corporate Governance

  •    Enterprise Risk Management

  •    Risk Management Balance Process Supply Chain Security

  •    ERM Incidents Recommendations-Part1

  •    ERM Incidents Recommendations-Part2

  •    ERM Incidents Recommendations-Part3

Module 3: Legal Issues- Contracts and Electronic

  •    Cloud Legal Issues-Part1

  •    Cloud Legal Issues-Part2

  •    Cloud Legal Issues-Part3

Module 4: Compliance and Audit Management

  •    Audits

  •    Compliance And Audit

  •    Audit Recommendations

  •    Audit Requirements

Module 5: Information Management and Data Security

  •    Information And Security

  •    Storage

  •    Information Governance Classification

  •    Data Security

  •    Protecting Data Moving

  •    Client Database Encryption

  •    PaaS Encryption

Module 6: Interoperability and Portability

  •    Interoperability And Portability

  •    Interoperability Recommendations

  •    Portability Recommendations

  •    Recommendations SAAS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

  •    Business Continuity And Disaster Recovery

  •    Assessing CSP Security

  •    Equipment Maintenance

  •    Recommendations

Module 8: Data Center Operations

  •    Data Center Operations

Module 9: Incident Response

  •    Incident Response

  •    Testing

  •    IaaS

  •    C.E.R.- Containment, Eradication, And Recovery

Module 10: Application Security

  •    Application Security

  •    Security Testing

  •    Audit Compliance

  •    Security Assurance Recommendations

Module 11: Encryption and Key Management

  •    Encryption And Key Management

  •    Content Aware Encryption

  •    Storage Of Keys

Module 12: Identity, Entitlement, and Access Management

  •    Building Access Control

  •    Intro To Identity

  •    Entitlement Process

  •    Trust With Identity

  •    Recommendations For Identity Management

Module 13: Virtualization

  •    Virtualization

  •    Hypervisor And Virtual Machine

  •    Inter-Virtual Machine Attacks

  •    Virtual Machine Encryption

  •    Virtual Machine Recommendations And Requirements

Module 14: Security as a Service

  •    Security As A Service

  •    Security Offerings

  •    Intrusion Detection Prevention

  •    Business Continuity And Disaster Recovery

  •    European CCSK

  •    Top Security Benefits

  •    European Legal Based Issues

Certified Information Systems Auditor (CISA) Course Content

Module 1 - The Audit Process

  •    Introduction

  •    Audit Process

  •    Auditing Standards

  •    Auditing Guidelines

  •    Cobit Model

  •    Audit Management

  •    Internal Control Classifications

  •    Planning

  •    Program

  •    Evidence

  •    Audit Control Evaluation

  •    CSA Control Self-Assessment

Module 2 - Audit Governance and Compliance

  •    IT Governance

  •    Governance & Security Policies

  •    Outsourcing & Governance

  •    Outsourcing & Globalization

  •    Organizational Compliance

  •    IT Strategy

  •    IT Performance

Module 3 - System Infrastructure, Project Management, and Testing

  •    System & Infrastructure

  •    Requirements

  •    Project Management Tools - Part 1

  •    Project Management Tools - Part 2

  •    Applications

  •    Agile Development

  •    Monitoring & Controlling

  •    Acquisition Process

  •    Testing Process

  •    Information Systems Maintenance Practices

  •    Data Conversion Tools

Module 4 - Media Disposal, Reviews, and System Maintenance

  •    Media Disposal Process

  •    Post Implementation Review

  •    Periodic Review

  •    System Maintenance

Module 5 - IT Service Level Management

  •    IT Service Delivery and Support

  •    How to Evalutate Service Level Management Practices

  •    Operations Management

  •    Databases

  •    Structured Query Language (SQL)

  •    Monitoring Performance

  •    Source Code and Perfomance Monitoring

  •    Patch Management

  •    Incident Management

  •    Hardware Component Types

  •    Network Component Types

Module 6 - Auditor Technical Overview

  •    IS Auditor Technical Overview

  •    Security Design

  •    Monitoring Systems

  •    Types of Attacks

  •    Cryptography

  •    Encryption

  •    Asymmetric Encryption

  •    Digital Certificate

  •    Different Kinds of Attacks

  •    Access Controls

  •    Identification and Authenication

  •    Physical Access Exposure

  •    Environmental Security

  •    Network Security Devices and Network Components

  •    Network Address Translation

  •    Virtual Private Networks (VPNs)

  •    Voice System Risks

  •    Intrusion Detection

  •    Firewalls

  •    Firewall Implementation

  •    Network Access Protection

  •    HoneyPot

  •    Risks to Portable and Wireless Devices

  •    Bluetooth

  •    OSI Networking

  •    Managing Data

Module 7 - Business Continuity and Disaster Recovery

  •    Business Continuity and Disaster Recovery

  •    Fault Tolerance

  •    Business Continuity and Disaster Recovery Regulations

CompTIA Cloud Overview Course Content

Domain 1 - Characteristics of Cloud Services from a Business Perspect

  •    Overview

  •    History

  •    The Three Delivery Model Architecture

  •    SaaS

  •    Justification For Cloud

  •    Confidentiality And Availability

  •    Concepts From NIST

  •    On Demand Self-Service

  •    Broad Network Access

  •    Resource Pooling

  •    Measured Service

  •    Service Models

  •    Terms Of Service

  •    Recommendations

Domain 2 - Cloud Computing and Business Value

  •    Reasons For Cloud-Agility-Part1

  •    Reasons For Cloud-Agility-Part2

  •    New Business Opportunities

Domain 3 - Technical Perspectives/Cloud Types

  •    Technical Perspectives Cloud Types

  •    Sources

  •    Security Risk

  •    Technical Risk And Solutions

Domain 4 - Steps to Successful Adoption of Cloud

  •    Steps To Adopting Cloud-Part1

  •    Steps To Adopting Cloud-Part2

  •    Steps To Adopting Cloud-Part3

Domain 5 - Impact and Changes of Cloud Computing on IT Service Management

  •    Information Security Management System-Part1

  •    Information Security Management System-Part2

Domain 6 - Risks and Consequences of Cloud Computing

  •    Information Management And Security-Part1

  •    Information Management And Security-Part2

  •    The Data Security LifeCycle

  •    Governance

  •    Data Loss Prevention-Part1

  •    Data Loss Prevention-Part2

  •    Protecting Data

  •    Risk Management-Part1

  •    Risk Management-Part2

  •    Risk Management-Part3

  •    Risk Management-Part4

  •    Risk Management-Part5

  •    Recommendations-Part1

  •    Recommendations-Part2

  •    IT Governance

  •    Audit

  •    Recommendations For Audit-Part1

  •    Recommendations For Audit-Part2

Computer Hacking Forensic Investigator (CHFI) Course Content

Module 1: Computer Forensics Introduction

  •    Intro To Course-Part1

  •    Intro To Course-Part2

  •    Intro To Course-Part3

  •    Intro To Course-Part4

  •    Intro To Course-Part5

  •    Intro To Forensics-Part1

  •    Intro To Forensics-Part2

  •    Intro To Forensics-Part3

  •    Intro To Forensics-Part4

  •    Intro To Forensics-Part5

  •    Intro To Forensics-Part6

  •    Intro To Forensics-Part7

  •    Intro To Forensics-Part8

Module 2: Forensics Investigation Process

  •    Forensics Investigation Process-Part1

  •    Forensics Investigation Process-Part2

  •    Forensics Investigation Process-Part3

  •    Forensics Investigation Process-Part4

  •    Forensics Investigation Process-Part5

  •    Forensics Investigation Process-Part6

  •    Forensics Investigation Process-Part7

  •    Forensics Investigation Process-Part8

  •    Forensics Investigation Process-Part9

  •    Forensics Investigation Process-Part10

Module 3: Searching and Seizing

  •    Searching And Seizing-Part1

  •    Searching And Seizing-Part2

  •    Searching And Seizing-Part3

  •    Searching And Seizing-Part4

  •    Searching And Seizing-Part5

Module 4: Digital Evidence

  •    Digital Evidence-Part1

  •    Digital Evidence-Part2

  •    Digital Evidence-Part3

  •    Digital Evidence-Part4

  •    Digital Evidence-Part5

  •    Digital Evidence-Part6

  •    Digital Evidence-Part7

Module 5: First Responder Procedures

  •    First Responder Procedures-Part1

  •    First Responder Procedures-Part2

  •    First Responder Procedures-Part3

  •    First Responder Procedures-Part4

  •    First Responder Procedures-Part5

  •    First Responder Procedures-Part6

  •    First Responder Procedures-Part7

  •    First Responder Procedures-Part8

Module 6: Forensics Lab

  •    Forensic Lab-Part1

  •    Forensic Lab-Part2

  •    Forensic Lab-Part3

  •    Forensic Lab-Part4

  •    Forensic Lab-Part5

Module 7: Hard Disks and File Systems

  •    Hard Disks And File Systems-Part1

  •    Hard Disks And File Systems-Part2

  •    Hard Disks And File Systems-Part3

  •    Hard Disks And File Systems-Part4

  •    Hard Disks And File Systems-Part5

  •    Hard Disks And File Systems-Part6

  •    Hard Disks And File Systems-Part7

  •    Hard Disks And File Systems-Part8

  •    Hard Disks And File Systems-Part9

  •    Hard Disks And File Systems-Part10

Module 8: Windows Forensics

  •    Windows Forensics-Part1

  •    Windows Forensics-Part2

  •    Windows Forensics-Part3

  •    Windows Forensics-Part4

  •    Windows Forensics-Part5

  •    Windows Forensics-Part6

  •    Windows Forensics-Part7

  •    Windows Forensics-Part8

  •    Windows Forensics-Part9

  •    Windows Forensics-Part10

Module 9: Data Acquisition and Duplication

  •    Data Acquisition And Duplication-Part1

  •    Data Acquisition And Duplication-Part2

  •    Data Acquisition And Duplication-Part3

  •    Data Acquisition And Duplication-Part4

  •    Data Acquisition And Duplication-Part5

  •    Data Acquisition And Duplication-Part6

  •    Data Acquisition And Duplication-Part7

Module 10: Recovering Deleted Files and Partitions

  •    Recovering Deleted Files And Partitions-Part1

  •    Recovering Deleted Files And Partitions-Part2

Module 11: Using Access Data FTK

  •    Using Access Data FTK And Special Steps-Part1

  •    Using Access Data FTK And Special Steps-Part2

  •    Using Access Data FTK And Special Steps-Part3

  •    Using Access Data FTK And Special Steps-Part4

  •    Using Access Data FTK And Special Steps-Part5

  •    Using Access Data FTK And Special Steps-Part6

  •    Using Access Data FTK And Special Steps-Part7

  •    Using Access Data FTK And Special Steps-Part8

Module 12: Using EnCase

  •    EnCase-Part1

  •    EnCase-Part2

  •    EnCase-Part3

Module 13: Steganography

  •    Stenography-Part1

  •    Stenography-Part2

  •    Stenography-Part3

  •    Stenography-Part4

Module 14: Password Crackers

  •    Passwords-Part1

  •    Passwords-Part2

  •    Passwords-Part3

  •    Passwords-Part4

Module 15: Log Correlation

  •    Log Correlation-Part1

  •    Log Correlation-Part2

  •    Log Correlation-Part3

  •    Log Correlation-Part4

  •    Log Correlation-Part5

  •    Log Correlation-Part6

Module 16: Network Forensics

  •    Network Forensics-Part1

  •    Network Forensics-Part2

  •    Network Forensics-Part3

  •    Network Forensics-Part4

Module 17: Wireless Attacks

  •    Wireless Attacks-Part1

  •    Wireless Attacks-Part2

  •    Wireless Attacks-Part3

Module 18: Web Attacks

  •    Web Attacks-Part1

  •    Web Attacks-Part2

  •    Web Attacks-Part3

  •    Web Attacks-Part4

  •    Web Attacks-Part5

  •    Web Attacks-Part6

  •    Web Attacks-Part7

  •    Web Attacks-Part8

Module 19: Email Crimes

  •    Email Crimes-Part1

  •    Email Crimes-Part2

  •    Email Crimes-Part3

  •    Email Crimes-Part4

Module 20: Mobile Investigation

  •    Mobile Investigation-Part1

  •    Mobile Investigation-Part2

  •    Mobile Investigation-Part3

  •    Mobile Investigation-Part4

  •    Mobile Investigation-Part5

Module 21: Investigative Reports

  •    Investigation Reports-Part1

  •    Investigation Reports-Part2

  •    Investigation Reports-Part3

  •    Investigation Reports-Part4

Module 22: Expert Witness

  •    Expert Witness-Part1

  •    Expert Witness-Part2

  •    Expert Witness-Part3

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1

  •    EXIN Overview-Part 2

  •    EXIN Overview 2-Part 1

  •    EXIN Overview 2-Part 2

  •    The Basics

  •    History Of Cloud

  •    Delivery Model Architectures

  •    Software As A Service

  •    Justification For Cloud Computing

  •    Confidentiality And Availability

  •    Concepts From NIST

  •    Important Characteristics

  •    Broad Network Access

  •    Resource Pooling

  •    Measured Service

  •    Service Models

  •    Terms Of Service

  •    Recommendations

  •    Virtualization

  •    Virtualization Concepts

  •    Inter-Virtual Machine Attacks

  •    Virtual Machine Encryption

  •    Recommendations

  •    Service Models

  •    Business Process

  •    Outsourcing

  •    Software As A Service-Part 1

  •    Software As A Service-Part 2

  •    Risks And Recommendations

  •    Platform As A Service

  •    PaaS Considerations

  •    PaaS Issues

  •    Infrastructure As A Service

  •    Scope Of Control

  •    IaaS Benefits

  •    IaaS Issues And Concerns

  •    IaaS Recommendations

  •    Services Oriented Architecture

  •    Web Services

  •    Infrastructure On Demand

  •    Why Cloud

  •    Collaborative Working

  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud

  •    Storage Devices-Part 1

  •    Storage Devices-Part 2

  •    Application Programming Interfaces

  •    Traditional Software Model

  •    Impact Of Cloud On Users

  •    Providing Cloud Services

  •    Developing Added Services-Part 1

  •    Developing Added Services-Part 2

  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls

  •    Malicious Insiders

  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud

  •    Resource Scaling

  •    Quality

  •    Thin Clients

  •    Buying Cloud Services

  •    Pay As You Go Vs Ownership

  •    Establishing Requirements

  •    Contract Terms

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1

  •    EXIN Overview-Part 2

  •    EXIN Overview 2-Part 1

  •    EXIN Overview 2-Part 2

  •    The Basics

  •    History Of Cloud

  •    Delivery Model Architectures

  •    Software As A Service

  •    Justification For Cloud Computing

  •    Confidentiality And Availability

  •    Concepts From NIST

  •    Important Characteristics

  •    Broad Network Access

  •    Resource Pooling

  •    Measured Service

  •    Service Models

  •    Terms Of Service

  •    Recommendations

  •    Virtualization

  •    Virtualization Concepts

  •    Inter-Virtual Machine Attacks

  •    Virtual Machine Encryption

  •    Recommendations

  •    Service Models

  •    Business Process

  •    Outsourcing

  •    Software As A Service-Part 1

  •    Software As A Service-Part 2

  •    Risks And Recommendations

  •    Platform As A Service

  •    PaaS Considerations

  •    PaaS Issues

  •    Infrastructure As A Service

  •    Scope Of Control

  •    IaaS Benefits

  •    IaaS Issues And Concerns

  •    IaaS Recommendations

  •    Services Oriented Architecture

  •    Web Services

  •    Infrastructure On Demand

  •    Why Cloud

  •    Collaborative Working

  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud

  •    Storage Devices-Part 1

  •    Storage Devices-Part 2

  •    Application Programming Interfaces

  •    Traditional Software Model

  •    Impact Of Cloud On Users

  •    Providing Cloud Services

  •    Developing Added Services-Part 1

  •    Developing Added Services-Part 2

  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls

  •    Malicious Insiders

  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud

  •    Resource Scaling

  •    Quality

  •    Thin Clients

  •    Buying Cloud Services

  •    Pay As You Go Vs Ownership

  •    Establishing Requirements

  •    Contract Terms

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1

  •    EXIN Overview-Part 2

  •    EXIN Overview 2-Part 1

  •    EXIN Overview 2-Part 2

  •    The Basics

  •    History Of Cloud

  •    Delivery Model Architectures

  •    Software As A Service

  •    Justification For Cloud Computing

  •    Confidentiality And Availability

  •    Concepts From NIST

  •    Important Characteristics

  •    Broad Network Access

  •    Resource Pooling

  •    Measured Service

  •    Service Models

  •    Terms Of Service

  •    Recommendations

  •    Virtualization

  •    Virtualization Concepts

  •    Inter-Virtual Machine Attacks

  •    Virtual Machine Encryption

  •    Recommendations

  •    Service Models

  •    Business Process

  •    Outsourcing

  •    Software As A Service-Part 1

  •    Software As A Service-Part 2

  •    Risks And Recommendations

  •    Platform As A Service

  •    PaaS Considerations

  •    PaaS Issues

  •    Infrastructure As A Service

  •    Scope Of Control

  •    IaaS Benefits

  •    IaaS Issues And Concerns

  •    IaaS Recommendations

  •    Services Oriented Architecture

  •    Web Services

  •    Infrastructure On Demand

  •    Why Cloud

  •    Collaborative Working

  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud

  •    Storage Devices-Part 1

  •    Storage Devices-Part 2

  •    Application Programming Interfaces

  •    Traditional Software Model

  •    Impact Of Cloud On Users

  •    Providing Cloud Services

  •    Developing Added Services-Part 1

  •    Developing Added Services-Part 2

  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls

  •    Malicious Insiders

  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud

  •    Resource Scaling

  •    Quality

  •    Thin Clients

  •    Buying Cloud Services

  •    Pay As You Go Vs Ownership

  •    Establishing Requirements

  •    Contract Terms

Microsoft .NET 4.5 Programming with HTML 5 Course Content

Module 1

  •    Introduction and Developing in HTML5 with Javascript and CSS3

  •    Intro to HTML 5

  •    Examples of Browsers Using Codes

  •    Using HTML5 Codes and Utilizing Virtual Studio - Part 1

  •    Using HTML5 Codes and Utilizing Virtual Studio - Part 2

  •    Using HTML5 Codes and Utilizing Virtual Studio - Part 3

  •    Using HTML5 Codes and Utilizing Virtual Studio - Part 4

Module 2

  •    HTML5 Code Walk through - Part 1

  •    HTML5 Code Walk through - Part 2

  •    HTML5 Code Walk through - Part 3

  •    CSS3 Selectors and Style Properties - Part 1

  •    CSS3 Selectors and Style Properties - Part 2

  •    CSS3 Selectors and Style Properties - Part 3

  •    CSS3 Selectors and Style Properties - Part 4

  •    CSS3 Selectors and Style Properties - Part 5

  •    CSS3 Selectors and Style Properties - Part 6

Module 3

  •    Developer Tool Support

  •    Browse-Specific Feature Detection

  •    HTML Form Examples - Part 1

  •    HTML Form Examples - Part 2

  •    HTML Form Examples - Part 3

  •    HTML Form Examples - Part 4

Module 4

  •    HTML Form Enhancements - Part 1

  •    HTML Form Enhancements - Part 2

  •    HTML Form Enhancements - Part 3

  •    HTML Form Enhancements - Part 4

  •    HTML Form Enhancements - Part 5

  •    HTML Form Enhancements - Part 6

Module 5

  •    Building Websites - Part 1

  •    Building Websites - Part 2

  •    Building Websites - Part 3

  •    Building Websites - Part 4

Module 6

  •    More HTML5

  •    More HTML5 - Information Tags

  •    More HTML5 - Codes

  •    More HTML5 - Java Script

  •    Course Outro

Microsoft 70-331: Core Solutions of SharePoint Server 2013 Course Content

Module 1: Comprehensive Introduction to Sharepoint

  •    Course Intro

  •    Social Media

  •    Moblie Access

  •    Business Intelligence - Part 1

  •    Business Intelligence - Part 2

  •    Sharepoint Licensing Overview

  •    Organize Info

  •    Share Your Insights

  •    Minimal Download Strategy

  •    Enhances Social and Collaboration Features

  •    Enhanced Search

  •    Workflow

  •    Enterprise Content Management

  •    Web Content Management

Module 2: Installing SharePoint

  •    What We Will Cover - Part 1

  •    What We Will Cover - Part 2

  •    What We Will Cover - Part 3

  •    What We Will Cover - Part 4

  •    What We Will Cover - Part 5

  •    What We Will Cover - Part 6

  •    What We Will Cover - Part 7

  •    What We Will Cover - Part 8

  •    What We Will Cover - Part 9

  •    Software Requirements

  •    Service and Accounts

Module 3: SharePoint Architecture, Logical & Physical

  •    Physical Architecture

  •    Physical Architecture - Traditional Topologies

  •    Physical Architecture - Streamlined Topologies

  •    Physical Architecture - Search Architectures

  •    Physical Architecture - Enterprise Search Architecture

  •    Physical Architecture - Multi - Farm

  •    Logical Architecture

  •    Logical Architecture - Host Names Based Sites

  •    Logical Architecture - Path - Based

  •    Logical Architecture - Extranet

  •    Logical Architecture - Mobile

  •    Logical Architecture - Single Farm Deployment

  •    Databasis

  •    Summary

Module 4: Web Applications and Site Collections

  •    Web Applications and Site Collections Intro

  •    Logical Structure and Web Applications

  •    Demo

  •    Site Collections

  •    Demo - Part 1

  •    Demo - Part 2

  •    Application Pools and Summary

Module 5: Configure Service Applications

  •    Intro

  •    Service Applications

  •    Demo of Configuring Excel Services

  •    Sharepoint Management Shell Demo

  •    Summary

Module 6: Permissions

  •    Intro

  •    Site Permissions

  •    Terms

  •    Demo

  •    Authentication Modes

  •    O Auth

  •    Summary

Module 7: Search

  •    Intro

  •    Intro to Search

  •    Search Logical Architecture

  •    Crawling the Content

  •    Conent Processing

  •    Analytics Processing Component

  •    Summary

Module 8: User Profiles

  •    Intro

  •    User Profile Service

  •    User Profile Demo

  •    Profile Synchronization Goals

  •    Profile Synchronization Demo

  •    Sync Performance Changes

  •    Sync Performance Changes Demo

  •    Profile Import Options

Module 9: Ongoing Support and Maintenance

  •    Intro

  •    What To Look For

Microsoft 70-332: Advanced Solutions of SharePoint Server 2013 Course Content

Module 1: Business Continuity

  •    Course Intro

  •    Intro to Plan Business Continuity Management - Part 1

  •    Intro to Plan Business Continuity Management - Part 2

  •    Describe High Availability

  •    Degraded Availability

  •    Qualifying Downtime

  •    Qualifying Downtime Demo - Part 1

  •    Qualifying Downtime Demo - Part 2

  •    Qualifying Downtime Demo - Part 3

  •    Qualifying Downtime Demo - Part 4

  •    Qualifying Downtime Demo - Part 5

  •    Qualifying Downtime Demo - Part 6

  •    Disaster Recovery Plan (DRP) - Part 1

  •    Disaster Recovery Plan (DRP) - Part 2

  •    Measure Availability - Part 1

  •    Measure Availability (Demo) - Part 2

  •    Measure Availability - Part 3

  •    Downtime Metrics - Part 1

  •    Downtime Metrics - Part 2

  •    Performance to Availability Relationship

  •    Costs of HA

  •    HA Supports in a Farm

  •    Fault Tolerant in your HA Solution

  •    Backup and Recovery in SharePoint 2013

  •    Summary

Module 2: Model, Design, and Test

  •    Intro

  •    Plan for Success

  •    Model - Part 1

  •    Model - Part 2

  •    Model - Part 3

  •    Model - Part 4

  •    Model - Part 5

  •    Model - Part 6

  •    Model - Part 7

  •    Model - Part 8

  •    Design - Part 1

  •    Design - Part 2

  •    Design - Part 3

  •    Design - Part 4

  •    Design - Part 5

  •    Design - Part 6

  •    Design - Part 7

  •    Test - Part 1

  •    Test - Part 2

  •    Test - Part 3

  •    Test - Part 4

  •    Test - Part 5

  •    Test - Part 6

  •    Test - Part 7

  •    Deploy

  •    Monitor and Maintain

Module 3: Upgrade and Migrate

  •    Intro to Upgrade and Migrate to SharePoint 2013

  •    Upgrading to SharePoint 2013 - Part 1

  •    Upgrading to SharePoint 2013 - Part 2

  •    Upgrading to SharePoint 2013 - Part 3

  •    Upgrading to SharePoint 2013 - Part 4

  •    Upgrading to SharePoint 2013 - Part 5

  •    Upgrading to SharePoint 2013 - Part 6

  •    Upgrading to SharePoint 2013 - Part 7

Module 4: Create and Configure Service Applications

  •    Intro to Create and Configure Service Applications

  •    Create and Configure Service Applications

  •    Create and Configure Service Applications Demo

  •    Create and Configure Service Applications Summary

Module 5: SharePoint Management

  •    Intro to Manage SharePoint Solution, BI, and System Integration

  •    Manage SP Solutions, BI, and System Integration

Microsoft 70-461: Querying SQL Server 2012 Course Content

Lesson 1: Getting Started with SQL Server 2012

  •    Course Introduction

Lesson 2: Working with T-SQL

  •    Creating Queries-Part 1

  •    Creating Queries-Part 2

  •    Creating Queries-Part 3

  •    Creating Queries-Part 4

  •    Creating Queries-Part 5

  •    Constraints-Part 1

  •    Constraints-Part 2

  •    Constraints-Part 3

  •    Constraints-Part 4

  •    Constraints-Part 5

Lesson 3: Writing SELECT Queries

  •    Select Statement-Part 1

  •    Select Statement-Part 2

  •    Select Statement-Part 3

  •    Select Statement-Part 4

Lesson 4: Working with SQL Data Types

  •    Data Types-Part 1

  •    Data Types-Part 2

  •    Data Types-Part 3

  •    Data Types-Part 4

  •    Data Types-Part 5

  •    Data Types-Part 6

  •    Data Types-Part 7

  •    Data Types-Part 8

  •    Data Types-Part 9

  •    Data Types-Part 10

Lesson 5: Sorting and Filtering Data

  •    Sorting Results-Part 1

  •    Sorting Results-Part 2

  •    Sorting Results-Part 3

  •    Sorting Results-Part 4

  •    Sorting Results-Part 5

  •    Sorting Results-Part 6

Lesson 6: Querying Data from Multiple Tables

  •    Tables Part 1

  •    Tables Part 2

  •    Tables Part 3

  •    Tables Part 4

  •    Tables Part 5

  •    Tables Part 6

Lesson 7: Modifying Data

  •    Inserting Data-Part 1

  •    Inserting Data-Part 2

  •    Inserting Data-Part 3

  •    Inserting Data-Part 4

  •    Inserting Data-Part 5

  •    Inserting Data-Part 6

Lesson 8: Working with SQL Server Built-in Functions

  •    Functions

  •    Parse

  •    Logical Functions

  •    Group By

Lesson 9: Programming in T-SQL

  •    Programming-Part 1

  •    Programming-Part 2

  •    Programming-Part 3

  •    Programming-Part 4

  •    Programming-Part 5

  •    Programming-Part 6

Lesson 10: Implementing Stored Procedures

  •    Storage Procedures-Part 1

  •    Storage Procedures-Part 2

  •    Dynamic SQL-Part 1

  •    Dynamic SQL-Part 2

Lesson 11: Working with Subqueries and Table Expressions

  •    Sub-Queries And Table Expressions-Part 1

  •    Sub-Queries And Table Expressions-Part 2

  •    Sub-Queries And Table Expressions-Part 3

  •    Sub-Queries And Table Expressions-Part 4

Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions

  •    Set Operators-Part 1

  •    Set Operators-Part 2

  •    Window Functions-Part 1

  •    Window Functions-Part 2

  •    User Defined Functions-Part 1

  •    User Defined Functions-Part 2

  •    Advanced Analytical Functions

Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets

  •    Pivot

  •    Grouping Sets

Lesson 14: Managing Error Handling and Transactions

  •    Error Handling-Part 1

  •    Error Handling-Part 2

  •    Manage Transactions-Part 1

  •    Manage Transactions-Part 2

  •    Manage Transactions-Part 3

Lesson 15: Querying SQL Server System

  •    System Databases-Part 1

  •    System Databases-Part 2

  •    System Databases-Part 3

  •    System Databases-Part 4

Lesson 16: Optimizing Query Performance

  •    Query Planning-Part 1

  •    Query Planning-Part 2

  •    Index-Part 1

  •    Index-Part 2

  •    Index-Part 3

Microsoft 70-462: Administering SQL Server 2012 Databases Course Content

Lesson 1: Identifying the SQL Server Platform

  •    Overview

  •    DataStorage-Part 1

  •    DataStorage-Part 2

Lesson 2: Deploying SQL Server

  •    Install-Part 1

  •    Install-Part 2

Lesson 3: Configuring SQL Server

  •    Configuring-Part 1

  •    Configuring-Part 2

  •    Changing Memory-Part 1

  •    Changing Memory-Part 2

  •    Email-Part 1

  •    Email-Part 2

Lesson 4: Managing Databases in SQL Server 2012

  •    User Databases-Part 1

  •    User Databases-Part 2

  •    User Databases-Part 3

  •    User Databases-Part 4

  •    User Databases-Part 5

Lesson 5: Managing SQL Server Security

  •    Setting Security-Part 1

  •    Setting Security-Part 2

  •    Server Roles-Part 1

  •    Server Roles-Part 2

  •    Setting Permissions-Part 1

  •    Setting Permissions-Part 2

Lesson 6: Implementing Advanced Security Settings

  •    Querying Data From Multiple Tables-Part 1

  •    Querying Data From Multiple Tables-Part 2

  •    Querying Data From Multiple Tables-Part 3

  •    Querying Data From Multiple Tables-Part 4

  •    Querying Data From Multiple Tables-Part 5

Lesson 7: Applying Encryption and Compression

  •    Encrypting And Compressing-Part 1

  •    Encrypting And Compressing-Part 2

  •    Encrypting And Compressing-Part 3

Lesson 8: Working with Indexes and Log Files

  •    Functions-Part 1

  •    Functions-Part 2

  •    Functions-Part 3

  •    Functions-Part 4

  •    Functions-Part 5

  •    Functions-Part 6

Lesson 9: Working with Backup and Restore

  •    Managing Backups-Part 1

  •    Managing Backups-Part 2

  •    Managing Backups-Part 3

  •    Managing Backups-Part 4

  •    Managing Backups-Part 5

  •    Managing Backups-Part 6

  •    Managing Backups-Part 7

Lesson 10: Implementing High Availability

  •    Stored Procedures-Part 1

  •    Stored Procedures-Part 2

  •    Stored Procedures-Part 3

  •    Stored Procedures-Part 4

Lesson 11: Optimizing Server Performance

  •    Managing SQL Performance-Part 1

  •    Managing SQL Performance-Part 2

  •    Managing SQL Performance-Part 3

  •    Managing SQL Performance-Part 4

  •    Managing SQL Performance-Part 5

  •    Managing SQL Performance-Part 6

  •    Managing SQL Performance-Part 7

Lesson 12: Troubleshooting Issues and Recovering Databases

  •    Set Operators-Part 1

  •    Set Operators-Part 2

  •    Set Operators-Part 3

  •    Set Operators-Part 4

  •    Set Operators-Part 5

Lesson 13: Performing Advanced Database Management Tasks

  •    Managing Database Infrastructures-Part 1

  •    Managing Database Infrastructures-Part 2

  •    Managing Database Infrastructures-Part 3

Microsoft 70-463: Implementing a Data Warehouse with SQL Server 2012 Course Content

Lesson 1: Introduction to Data Warehouse

  •    Introduction

  •    Introduction To Data Warehouse-Part1

  •    Introduction To Data Warehouse-Part2

  •    Introduction To Data Warehouse-Part3

  •    Introduction To Data Warehouse-Part4

  •    Introduction To Data Warehouse-Part5

  •    Introduction To Data Warehouse-Part6

Lesson 2: Creating Dimensions and Changing Granularity of Dimensions

  •    Creating Dimensions And Changing Granularity Of Dimensions-Part1

  •    Creating Dimensions And Changing Granularity Of Dimensions-Part2

  •    Creating Dimensions And Changing Granularity Of Dimensions-Part3

  •    Creating Dimensions And Changing Granularity Of Dimensions-Part4

  •    Creating Dimensions And Changing Granularity Of Dimensions-Part5

  •    Creating Dimensions And Changing Granularity Of Dimensions-Part6

Lesson 3: Creating Fact Tables and ColumnStore Indexes

  •    Creating Fact Tables And Column Store Indexes-Part1

  •    Creating Fact Tables And Column Store Indexes-Part2

  •    Creating Fact Tables And Column Store Indexes-Part3

  •    Creating Fact Tables And Column Store Indexes-Part4

  •    Creating Fact Tables And Column Store Indexes-Part5

Lesson 4: Implementing Data Warehouse in SQL Server 2012

  •    Implementing Data Warehouse-Part1

  •    Implementing Data Warehouse-Part2

  •    Implementing Data Warehouse-Part3

  •    Implementing Data Warehouse-Part4

Lesson 5: Working with Integration Services

  •    Working With Integration Services-Part1

  •    Working With Integration Services-Part2

  •    Working With Integration Services-Part3

  •    Working With Integration Services-Part4

  •    Working With Integration Services-Part5

  •    Working With Integration Services-Part6

Lesson 6: Managing Control Flow

  •    Managing Control Flow-Part1

  •    Managing Control Flow-Part2

  •    Managing Control Flow-Part3

  •    Managing Control Flow-Part4

  •    Managing Control Flow-Part5

Lesson 7: Working with Dynamic Variables

  •    Working With Dynamic Variables-Part1

  •    Working With Dynamic Variables-Part2

  •    Working With Dynamic Variables-Part3

  •    Working With Dynamic Variables-Part4

  •    Working With Dynamic Variables-Part5

  •    Working With Dynamic Variables-Part6

  •    Working With Dynamic Variables-Part7

  •    Working With Dynamic Variables-Part8

Lesson 8: Implementing Data Flow

  •    Implementing DataFlow-Part1

  •    Implementing DataFlow-Part2

  •    Implementing DataFlow-Part3

  •    Implementing DataFlow-Part4

  •    Implementing DataFlow-Part5

  •    Implementing DataFlow-Part6

  •    Implementing DataFlow-Part7

  •    Implementing DataFlow-Part8

Lesson 9: Managing Data Flow

  •    Managing DataFlow-Part1

  •    Managing DataFlow-Part2

  •    Managing DataFlow-Part3

  •    Managing DataFlow-Part4

Lesson 10: Managing SSIS Package Execution

  •    Managing SSIS Package Execution-Part1

  •    Managing SSIS Package Execution-Part2

  •    Managing SSIS Package Execution-Part3

  •    Managing SSIS Package Execution-Part4

  •    Managing SSIS Package Execution-Part5

  •    Managing SSIS Package Execution-Part6

Lesson 11: Debugging and Troubleshooting

  •    Debugging And Troubleshooting-Part1

  •    Debugging And Troubleshooting-Part2

  •    Debugging And Troubleshooting-Part3

  •    Debugging And Troubleshooting-Part4

Lesson 12: Deploying Packages

  •    Deploying Packages-Part1

  •    Deploying Packages-Part2

  •    Deploying Packages-Part3

Lesson 13: Securing Packages and Databases

  •    Securing Packages And Databases-Part1

  •    Securing Packages And Databases-Part2

Lesson 14: Working with MDS and Windows

  •    Working With MDS And Windows Azure

Microsoft ASP .NET MVC Course Content

Module 1

  •    Exploring ASP Dot NET MVC 4 - Part 1

  •    Exploring ASP Dot NET MVC 4 - Part 2

  •    Exploring ASP Dot NET MVC 4 - Part 3

  •    Exploring ASP Dot NET MVC 4 - Part 4

Module 2

  •    Designing Web Applications - Part 1

  •    Designing Web Applications - Part 2

  •    Designing Web Applications - Part 3

  •    Designing Web Applications - Part 4

  •    Designing Web Applications - Part 5

Module 3

  •    Developing ASP Dot NET MVC 4 Models - Part 1

  •    Developing ASP Dot NET MVC 4 Models - Part 2

  •    Developing ASP Dot NET MVC 4 Models - Part 3

Module 4

  •    Developing ASP Dot NET MVC 4 Controllers - Part 1

  •    Developing ASP Dot NET MVC 4 Controllers - Part 2

  •    Developing ASP Dot NET MVC 4 Controllers - Part 3

  •    Developing ASP Dot NET MVC 4 Controllers - Part 4

Module 5

  •    Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 1

  •    Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 2

  •    Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 3

  •    Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 4

  •    Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 5

Module 6

  •    Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 1

  •    Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 2

  •    Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 3

  •    Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 4

  •    Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 5

Module 7

  •    Structuring ASP Dot NET MVC 4 Web Applications - Part 1

  •    Structuring ASP Dot NET MVC 4 Web Applications - Part 2

  •    Structuring ASP Dot NET MVC 4 Web Applications - Part 3

Module 8

  •    Troubleshooting ASP Dot NET MVC 4 Web Applications

Microsoft Excel 2010 Course Content

Excel 2010 Basic

  •    Intro to Excel Basic

  •    Interface and Functions

  •    Cells

  •    Entering Data Into Cells

  •    Basic Formatting in Excel

  •    Creating a Worksheet

  •    The Intelligence Of Excel

  •    Customizing Rows and Columns

  •    Creating Formulas

  •    Summary Pages and Moving Workbook to Workbook

  •    The Function Builder

  •    Conditional Formatting

  •    Sorting and Filtering Data

  •    Printing with Excel

  •    Conclusion

  •    Excel Basic Flashcards

Excel 2010 Intermediate

  •    Intro to Excel Intermediate

  •    Charts

  •    Headers Footers and Layout Options

  •    What If

  •    Basic Tables in Excel

  •    Pivot Tables

  •    Manipulating Data Within the Pivot Tables

  •    Pivot Table Charts

  •    Data Validation

  •    Conclusion

  •    Excel Intermediate Flashcards

Excel 2010 Advanced

  •    Intro to Excel Advanced

  •    Customizing the Ribbon and Cells

  •    Creating and Managing Ranges

  •    More Formulas

  •    Data Analysis

  •    Data From an Outside Source

  •    Spark Lines

  •    Macros

  •    Conclusion

  •    Excel Advanced Flashcards

Microsoft Outlook 2010 Course Content

Outlook 2010 Basic

  •    Intro To Outlook Basic

  •    Interface

  •    Customizing Interface

  •    E-mail 101

  •    Organizing Inbound E-mails

  •    Calendar Function

  •    Task Lists

  •    Contact List

  •    Multiple Accounts

  •    Conclusion

Outlook 2010 Intermediate

  •    Intro To Outlook Intermediate

  •    Message Functions

  •    Calendar

  •    More In-Depth Contact Functions

  •    Email Message Options

  •    Mail Rules

  •    Customizing Options

  •    Conclusion

Outlook 2010 Advanced

  •    Intro To Outlook Advanced

  •    Send And Receive

  •    Account Settings

  •    Calendars

  •    Quick Actions Within Messages

  •    Quick Steps

  •    Conclusion

Microsoft Powerpoint 2010 Course Content

Powerpoint 2010 Basic

  •     Powerpoint Basic Flashcards

  •    Intro To PowerPoint Basic

  •    The PowerPoint Interface

  •    Creating A New Presentation With Templates

  •    Slide Layout

  •    Visually Appealing Presentations

  •    Preview Mode And Page Setup

  •    Transitions

  •    Creating Custom Slides

  •    Animating Text

  •    Animating Objects

  •    Animation Timing

  •    Conclusion

Powerpoint 2010 Intermediate

  •    Powerpoint Intermediate Flashcards

  •    Introduction To PowerPoint Intermediate

  •    Sections And Organizing Slides

  •    Adding Autoshapes

  •    Inserting And Editing Pictures

  •    Inserting And Editing Video

  •    Inserting And Editing Tables

  •    SmartArt

  •    Animating Smart Art And Inserting Audio

  •    Headers And Footers In PowerPoint

  •    Setup Slideshow And Rehearsal Timing

  •    Conclusion

Powerpoint 2010 Advanced

  •    Powerpoint Advanced Flashcards

  •    Intro To PowerPoint Advanced

  •    Master Slides

  •    Styles

  •    More Functions With Video In PowerPoint

  •    Transitions And Action Buttons

  •    Customizing The Show

  •    Printing In PowerPoint

  •    Conclusion

Microsoft Word 2010 Course Content

Word 2010 Basic

  •    Flashcards

  •    Intro to the Word Interface

  •    Working with Templates

  •    Creating a New Blank Document

  •    Formatting a Document

  •    More Formatting Options

  •    Adding Shapes, Clipart, & Pictures

  •    Page Layout

  •    Conclusion

Word 2010 Intermediate

  •    Flashcards

  •    Introduction

  •    Tracking Changes in a Document

  •    Customizing the Interface

  •    Working with Styles

  •    Tables in Word

  •    Endnotes, Footnotes, & Captions

  •    Cover Pages, Headers, & Footers

  •    Working with Sections

  •    Headers & Footers

  •    Cover Sheet & Table of Contents

  •    Cover Letters & Mail Merge

  •    Conclusion

Word 2010 Advanced

  •    Flashcards

  •    Introduction to the Word Interface

  •    Customizing the Ribbon

  •    Embedding Non-Word Documents

  •    Working with Formulas

  •    Citations

  •    Comparing Documents

  •    Forms & Content Controls

  •    Master Documents & Subdocuments

  •    Conclusion

Oracle Database 11g Certified Associate (OCA) Fundamentals 1Z0-051 and Admin 1z0-052 Course Content

Module 1: Database Admininstration

  •    Intro to Oracle

  •    Database Administration

  •    Installing Oracle - Part 1

  •    Installing Oracle - Part 2

  •    Post Setup Overview - Part 1

  •    Post Setup Overview - Part 2

  •    SQLplus - Part 1

  •    SQLplus - Part 2

  •    SQLplus Demo - Part 1

  •    SQLplus Demo - Part 2

  •    SQLplus Demo - Part 3

  •    Startup and Shutdown - Part 1

  •    Startup and Shutdown - Part 2

Module 2: Oracle Architecture

  •    Oracle Architecture

  •    Schema Objects

  •    Data Access

  •    Architecture

Module 3: Database Schema

  •    Database Schema

  •    Create Table & Tablespace - Part 1

  •    Create Table & Tablespace - Part 2

  •    Create View

  •    Create Index

  •    Create Sequence

Module 4: Recovery Manager

  •    Recovery Manager

  •    What is RMAN

  •    RMAN Demo

  •    Restore - Part 1

  •    Restore - Part 2

Module 5: Introduction to SQL

  •    SQL - Part 1

  •    SQL - Part 2

  •    Parts of SQL Statement

  •    Select Statement

Module 6: Filtering and Sorting Data

  •    Build ERD - Part 1

  •    Build ERD - Part 2

  •    Build ERD - Part 3

Module 7: Functions

  •    Functions

  •    More Functions

  •    Group Functions

  •    Custom Functions

Module 8: SET Operators and Subqueries

  •    SET Operations

  •    Subqueries

Module 9: Regular Expressions and SQL Loader

  •    Regular Expressions

  •    SQL Loader

Microsoft Access 2010 Course Content

Access 2010 Basic

  •    Access Basic Flashcards

  •    Introduction

  •    Databases And The Access Interface

  •    Spreadsheets And Tables

  •    Entering Data In A Table

  •    Relationships Between Tables

  •    Editing A Form

  •    Queries

  •    Across The Tables

  •    Creating Forms

  •    Conclusion

Access 2010 Intermediate

  •    Access Intermediate Flashcards

  •    Introduction

  •    Primary Key

  •    Multiple Table Query

  •    Creating Forms

  •    Validation Within Forms

  •    Adding Related Fields

  •    Forms Created With Design View

  •    Find Functionality

  •    Creating Report

  •    Conclusion

Access 2010 Advanced

  •    Access Advanced Flashcards

  •    Introduction

  •    Customizing Access With Back Stage Options

  •    Mailing Labels

  •    Macros-Part1

  •    Macros-Part2

  •    Queries-Part1

  •    Queries-Part2

  •    Joining In Sequel

  •    Navigation

  •    Adding Chart With Specific Data

  •    Action Query

  •    Security

  •    Conclusion

Sage 50 Course Content

Module 1: Sage 50 2013

  •    Course Overview-Part1

  •    Course Overview-Part2

  •    Course Overview-Part3

  •    Course Overview-Part4

  •    New Features-Part1

  •    New Features-Part2

  •    New Features-Part3

  •    Quick Tab Menu Overview

  •    Business Status-Part1

  •    Business Status-Part2

  •    Customer And Sales

  •    Vendors And Purchases

  •    Inventory And Services

  •    Employees And Services

  •    Banking

  •    System-Part 1

  •    System-Part2

  •    Quick Tab Menu Review

  •    Sage 50 Menu Overview-Part1

  •    Sage 50 Menu Overview-Part 2

  •    Sage 50 Menu Overview-Part3

  •    Sage 50 Menu Overview-Part 4

  •    Sage 50 Menu Overview-Part5

  •    Sage 50 Menu Overview-Part6

  •    Sage 50 Menu Overview-Part7

Module 2: Sage 50 Basics

  •    Sage 50 Available Products

  •    Accounts Payable Features

  •    Vendors And Purchases-Part 1

  •    Vendors And Purchases-Part 2

  •    Vendors And Purchases-Part 3

  •    Vendors And Purchases-Part 4

  •    Vendors And Purchases-Part 5

  •    Vendors And Purchases-Part 6

  •    Accounts Payable Review

  •    Accounts Receivable Review

  •    Customer And Sales Menu

  •    Customers

  •    Jobs

  •    Sales Taxes

  •    Quotes And Proposals

  •    Sales Orders

  •    Invoices

  •    Finance Charges Basics

  •    Receive Money

  •    Bank Accounts

  •    Printing Statements

  •    Credits And Returns

  •    Accounts Receivable Report

  •    Basics Review

Module 3: Inventory

  •    Inventory And Services Overview

  •    Inventory Items-Part 1

  •    Inventory Items-Part 2

  •    Company Services

  •    Assemblies and Prices

  •    Purchase Orders

  •    Receiving Inventory Shipping And Tracking

  •    Inventory Count And Adjustments

  •    Inventory Reports

  •    Inventory Review

Module 4: Employee

  •    Employees And Payroll Overview

  •    Employees And Users-Part 1

  •    Employees And Users-Part 2

  •    1099's

  •    Payroll Setup

  •    Time And Expense Tickets

  •    Direct Deposit And Printing Payroll Checks

  •    Forms And Void Checks

  •    Employees Module Review

Module 5: Banking

  •    Banking Features Overview

  •    Write Checks

  •    Account Register

  •    Analysis Tools-Part 1

  •    Analysis Tools-Part 2

  •    Chart Of Accounts

  •    Receive Money And Bank Deposits-Part 1

  •    Receive Money And Bank Deposits-Part 2

  •    Enter Bills Pay Bills And Electronic Bill Pay

  •    Reconcile Accounts

  •    General Journal Entries

  •    Void Checks And Reports

  •    Banking Module Review

Module 6: Maintenance

  •    Automatic Backup

  •    BackUp Data-Part 1

  •    BackUp Data-Part 2

  •    Automatic Backup

  •    Restore Data

  •    Data Maintenance

  •    System Checks

  •    Company Maintenance

  •    Data Integrity

  •    Maintenance Review

Module 7: File Handling

  •    Attaching Documents

  •    Attaching And Managing Documents

  •    File Handling Review

Module 8: Manager

  •    Analysis Managers

  •    Cash Flow Manager-Part 1

  •    Cash Flow Manager-Part 2

  •    Cash Flow Manager-Part 3

  •    Collection Manager

  •    Payment Manager

  •    Financial Manager

  •    Manager Review

Module 9: Jobs

  •    MaintainingJobs

  •    CreatingJobs-Part 1

  •    Creating Jobs-Part 2

  •    Managing Jobs

  •    Jobs Review

Module 10: Budgets

  •    Maintain Budgets

  •    Creating And Managing Budgets-Part 1

  •    Creating And Managing Budgets-Part 2

  •    Budgets Module Review

Module 11: Charts of Accounts

  •    Maintain Chart Of Accounts

  •    Creating Accounts

  •    Accounts List-Part 1

  •    Accounts List-Part 2

  •    Chart Of Accounts Review

Module 12: Accounts Management

  •    Maintain Customers And Prospects

  •    Adding Customers And Prospects

  •    Accounts Aging

  •    Payment Methods

  •    Managing A Customer Account

  •    Accounts Management Review

Module 13: Customer Setup

  •    Customer Setup Guide

  •    Customer Setup-Part 1

  •    Customer Setup-Part 2

  •    Customer Setup-Part 3

  •    Customer Beginning Balance

  •    Customer Account Defaults

  •    Sales Tax

  •    Statement And Invoice Defaults

  •    Customer Setup Review

Module 14: Jobs Setup

  •    Jobs Setup Guide

  •    Jobs Setup

  •    Jobs Change Order

  •    Job Ledger

  •    Job Profitability Report-Part 1

  •    Job Profitability Report-Part 2

  •    Job Defaults

  •    Jobs Beginning Balances

  •    Jobs Setup Review

Module 15: Vendor Setup

  •    Vendors Setup Guide

  •    Vendor Setup-Part 1

  •    Vendor Setup-Part 2

  •    Vendor Setup-Part 3

  •    Vendor Setup-Part 4

  •    Vendor Beginning Balances

  •    Vendor Default

  •    Vendor Setup Review

Module 16: Inventory Setup

  •    Inventory And Services Items Setup

  •    Adding And Managing Inventory And Service Items-Part 1

  •    Adding And Managing Inventory And Service Items-Part 2

  •    Adding And Managing Inventory And Service Items-Part 3

  •    Adding And Managing Inventory And Service Items-Part 4

  •    Quantities On Hand

  •    Inventory And Service Items Default Setup

  •    Inventory Setup Review

Module 17: Employee Setup

  •    Employees Setup Guide

  •    Employee Payroll Settings

  •    Payroll Options Settings

  •    Company Information Setting

  •    Benefits Settings-Part 1

  •    Benefits Settings-Part 2

  •    Payroll Taxes And Place Order Settings

  •    Employee Setup

  •    Salary History Setup

  •    Employees Default Setup

  •    Employee Setup Review

Module 18: Security Setup

  •    Security Setup Guide

  •    Setup Security

  •    Set Up Users

  •    User Security Setup

  •    User List Rights And Permissions

  •    Setup Guide Next Steps

  •    Security Review

Module 19: ACTI Link

  •    Sage 50 ACT

  •    Sage ACT Link

  •    ACT Accounting Link Setup

  •    Creating And Editing Contact Links-Part 1

  •    Creating And Editing Contact Links-Part 2

  •    Creating And Editing Contact Links-Part 3

  •    Contact Link Updates Options

  •    ACT! Link Review

Module 20: Task Overview

  •    Tasks Menu

  •    Quotes Sales Orders And Proposals-Part 1

  •    Quotes Sales Orders And Proposals-Part 2

  •    Quotes Sales Orders And Proposals-Part 3

  •    Sales Invoicing And Time Expenses

  •    Shipments

  •    Receipts

  •    Finance Charges

  •    Select For Deposit

  •    Credit Memos

  •    Select For Purchase Orders-Part 1

  •    Select For Purchase Orders-Part 2

  •    Bills And Payments-Part 1

  •    Bills And Payments-Part 2

  •    Account Register

  •    Time And Expense

  •    Select For Payroll Entry

  •    General Journal Entry

  •    Asemblies

  •    Account Reconciliation And Void Checks

  •    Write Letters And Action Items

  •    System Tasks

  •    Tasks Overview Review

Module 21: Forms, Reports, and Recap

  •    Reports And Forms

  •    Form Types And Sample Forms-Part 1

  •    Form Types And Sample Forms-Part 2

  •    Form Types And Sample Forms-Part 3

  •    Reports-Part 1

  •    Reports-Part 2

  •    Reports-Part 3

  •    Reports-Part 4

  •    Reports-Part 5

  •    Services

  •    Program Review

The Key to Nutrition and Wellness Course Content

Module 1

  •    Wellness Intro-Part 1

  •    Wellness Intro-Part 2

  •    Wellness Intro-Part 3

Module 2

  •    Role Of Carbohydrates-Part 1

  •    Role Of Carbohydrates-Part 2

Module 3

  •    Role Of Fiber-Part 1

  •    Role Of Fiber-Part 2

Module 4

  •    Glycemic Index-Part 1

  •    Glycemic Index-Part 2

Module 5

  •    Impact Of Carbs

Module 6

  •    Gluten

Module 7

  •    Role Of Fat-Part 1

  •    Role Of Fat-Part 2

  •    How And Why We Gain Fat

  •    Role Of Protein

Module 8

  •    Digestion

Module 9

  •    Calories-Part 1

  •    Calories-Part 2

Module 10

  •    Organic Vs Inorganic

Module 11

  •    Roles Of Vitamins And Minerals-Part 1

  •    Roles Of Vitamins And Minerals-Part 2

  •    Roles Of Vitamins And Minerals-Part 3

Module 12

  •    Role of Water

Module 13

  •    Supplements-Part 1

  •    Supplements-Part 2

  •    Supplements-Part 3

  •    Supplements-Part 4

  •    Supplements-Part 5

  •    Supplements-Part 6

  •    Supplements-Part 7

  •    Supplements-Part 8

Module 14

  •    Artificial Sweeteners-Part 1

  •    Artificial Sweeteners-Part 2

  •    Artificial Sweeteners-Part 3

  •    Artificial Sweeteners-Part 4

  •    Artificial Sweeteners-Part 5

Module 15

  •    The Effects Of Caffeine

  •    Alcohol Does It Make You Fat

Module 16

  •    Sleep

  •    Stress

Module 17

  •    Fad Diets

  •    Raw Food Diet

  •    Cabbage Soup Diet

  •    Blood Group Diet

  •    Types Of Vegetarians

  •    Fad Diets And Genetics

Module 18

  •    Weight Loss Tips

  •    Setting Goals That Work For You

  •    Cancer

  •    Outro

Quickbooks Premier 2014 Course Content

Module 1: Intro and Setup

  •    Intro To Quickbooks

  •    Setup Quickbooks

Module 2: Tools

  •    Tools-Part 1

  •    Tools-Part 2

  •    Tools-Part 3

Module 3: Preferences

  •    Preferences

  •    Email Preferences

Module 4: Security & Users

  •    Security And Users

Module 5: Estimates

  •    Estimates

Module 6: Sales Orders

  •    Sales And Orders

Module 7: Receiving Money

  •    Account Receivable

  •    Batch Invoicing

  •    Customer Deposits

Module 8: Bounced Checks

  •    Bounced Checks

Module 9: Specific Tracking

  •    Vehicle Mileage

  •    Class Tracking Transactions

Module 10: Receiving and Depositing

  •    Receiving Payments

  •    Making Deposits

Module 11: Credit Cards and Bank Accounts

  •    Credit Cards

  •    Bank Accounts

Module 12: Payroll

  •    Payroll Preferences

  •    Employee Setup

  •    Processing Payroll

  •    Payroll Tax Forms

  •    Job Costing With Payroll

  •    Payroll Setup Advance

  •    Workers Compensation

Module 13: Transactions

  •    Special Transactions

  •    Memorized Transactions

Module 14: Accounts and Reports

  •    Other Account Types

  •    Quickbooks Reporting

  •    Advance Reporting

  •    Budgets And Forecast

Module 15: Integrating with Word

  •    Writing Letters In Microsoft Word

Module 16: Data Types

  •    Converting Importing And Exporting

  •    Quickooks Backup Data Integrity

  •    Multi-Currencies

Module 17: Conclusion

  •    Advance Features

  •    Update Or Upgrade

  •    Summary Of Quickbooks

Social Media Course Content

Module 1.0 Introduction

  •    Social Media Introduction

  •    Creating A Google Account

  •    Setting Up Your Twitter Account

  •    Getting Your Twitter House In Order

  •    Why Facebook For Your Business

  •    Using Facebook As A Business

  •    Setting Up Your Business Page

  •    Setting Your Cover Photo

  •    Tying It All Together

  •    Tip-Adding Admins In Facebook

Module 2.0 Adjusting Your Facebook Settings

  •    Adjusting Your Settings-Part1

  •    Adjusting Your Settings-Part2

  •    Adjusting Your Settings-Part3

  •    Updating Your Page Info-Part1

  •    Updating Your Page Info-Part2

  •    Tips For Getting 25 Likes

  •    Using Facebook As Your Business Page

Module 3.0 Posting on Facebook

  •    What Kind Of Person Would Your Business Be

  •    How To Post To Facebook

  •    What To Post

  •    Sharing Posts

  •    Sharing Links

  •    Pinning And Highlighting With Posts

  •    Tips For GeneratingTraffic

  •    Getting Notifications And Staying In Clients News Feed

  •    Comment Moderation

  •    The Activity Log-Where Do Hidden Posts Go

  •    Scheduling Posts

Module 7.0 Twitter

  •    Limiting the Number Of Actions

  •    Setting Your Twitter Preferences

  •    Finish Setting Up Your Profile

  •    Twitter Widgets

  •    Who To Follow

  •    Connect

  •    Bringing Followers From Facebook

  •    Intro To Hashtags

  •    Examples Of Hashtags

  •    Monitoring Whats Going On

  •    Using Twitter For Social Listening

  •    Social Media Tips

  •    Hashtags Across Social Media

Module 8.0 Pinterest

  •    Overview Of Pinterest

  •    How Does Pinterest Relate To Your Business

  •    Industry Specific Sites

  •    The Uses of Pinterest

  •    Conclusion Of Pinterest

Module 9.0 Reddit

  •    Introduction To Reddit

  •    The Rules Of Reddit

Module 11.0 LinkedIn

  •    Introduction To LinkedIn

  •    Overview Of The Interface And Settings

  •    Open Link Settings

  •    LinkedIn Groups

  •    Adding And Removing Applications

  •    Basic Account Settings

  •    Updating Your Public Profile

  •    LinkedIn Connections Groups And Pages

  •    LinkedIn Channels And Today

  •    Advertising On LinkedIn

Module 12.0 Google+ and Youtube

  •    Introduction To Google Plus

  •    Overview Of The Interface

  •    Setting Up A Google Plus Page

  •    Linking Your Other Social Networks

  •    Linking Your Website To Your Google Plus Page

  •    Review Of Your Google Plus Dashboard

  •    Notification Settings For Google Plus

  •    Photo Settings In Google Plus

  •    Google Plus And YouTube

  •    YouTube Advanced Settings

  •    Interface For Uploaded Video

  •    Sharing Videos Across Your Social Network

  •    Updating Your About Section

  •    Quick Recap Of Everything Covered So Far

Module 14.0 Additional Tools

  •    Bitly

  •    Woobox-Part1

  •    Woobox-Part2

  •    Hoot Suite-Part1

  •    Hoot Suite-Part2

  •    Storify

  •    Social Media Rules And Tips

  •    Tweet deck-Boolean Search

  •    Social Media Conclusion

Module 4.0 Facebook Advertising

  •    Intro To Facebook Advertising

  •    Setup Advertising Account

  •    Types Of Advertising On Facebook

  •    Ad Testing

  •    Choosing Our Audience-Location

  •    Choosing Our Audience-Age And Gender

  •    Choosing Our Audience-Precise Interests

  •    Choosing Our Audience-Broad Categories

  •    Choosing Our Audience-Connections

  •    Choosing Our Audience-Advanced Targeting Options

  •    Choosing Our Audience-Campaign And Budget

  •    Other Types Of Ads-Part1

  •    Other Types Of Ads-Part2

  •    Ad Campaign Manager-Part1

  •    Ad Campaign Manager-Part2

  •    Outside URLs

  •    Building Ad Text

  •    News Feed Format And Creating Your Audience

  •    Campaign Pricing And Schedule

  •    Ad Campaign Tracker

Module 5.0 Facebook Insights

  •    Facebook Insights-Overview Intro

  •    Analyzing Page Posts

  •    Engaged Users

  •    Talking About This

  •    Virality

  •    Likes

  •    Reach

  •    Reach And Frequency

  •    Page Visits

  •    Talking About This

  •    Conclusion

Module 6.0 Facebook Analytics

  •    6.0 New Facebook Analytics Overview

  •    6.1 Page Likes

  •    6.2 Post Reach

  •    6.3 Page Visits

  •    6.4 Posts

  •    6.5 People

  •    New Facebook Analytics Overview

  •    Page Likes

  •    Post Reach

  •    Page Visits

  •    Posts

  •    People

Module 10.0 Tumblr

  •    Tumblr Introduction

  •    Setting Up A Tumblr

  •    Dashboard

  •    Posting To Tumblr

  •    Testing Your Post

  •    URL Post

  •    Chat Post

  •    Audio On Tumblr

  •    Video On Tumblr

  •    Tumblr Conclusion

Module 13.0 Best Practices

  •    Determine Your Goals

  •    Create Your Persona Or Voice

  •    Decide On Your Platforms

  •    Establishing A Social Media Manager

  •    Coordinate With Customer Service

  •    Create A Predetermined Crisis Management Plan

  •    Stick To The Script

  •    Building Relationships With The Media

  •    Find Your Evangelist

  •    Stay Informed-Part1

  •    Stay Informed-Part2

Add a review
Currently, we are not accepting new reviews
4.8
Based on 80 reviews
1-5 of 80 reviews
  1. AA
  2. K
  3. BO
  4. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

  5. A

Your Training Instructors

Josh Schofer

Josh Schofer

Cybersecurity | Cloud Trainer

Josh has 15 plus years in account management and client support with over 5 years specifically in the healthcare industry. Josh provides hands-on leadership to the healthcare team at NetDirector by focusing on client success and innovative solutions. As the Healthcare Operations Manager, Josh ensures that each client implementation is completed as efficiently as possible with the greatest impact to the client. He holds a Bachelor of Arts degree from the University of South Florida.

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.

When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.

Chrys lives by, and is fond of repeating, her professional creed:

“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”

Dean Bushmiller

Dean Bushmiller

Lead Instructor for Expanding Security

Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.

All Access IT Training - 1 Year
 

$129.00

OR

Subscribe To All-Access
Lock In $14.99 / Month Forever

Gain access to this training and all our other courses, offering over 2,500 hours of content, with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.00 $14.99 Monthly

All Access IT Training – 1 Year

ON SALE 54% OFF
all-access-it-training
All Access IT Training – 1 Year
Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.

Monthly All-Access Subscription
7 Days Free - $39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses

$124.50 / month for 2 months

Get unlimited access to ITU’s online courses with a monthly subscription. Start learning today with our All Access Training program.

The monthly All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our monthly All-Access program.

ON SALE 70% OFF
ON SALE 70% OFF
All-Access IT Training Monthly Subscription

$14.99 / month with a 10-day free trial

Get unlimited access to ITU’s online courses with a monthly subscription. Start learning today with our All Access Training program.

The monthly All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our monthly All-Access program.

$279.00 / year

Get access to all ITU courses with an All Access Annual Subscription. Advance your IT career with our comprehensive online training!

The Annual All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our Annual All-Access program.