Monthly All-Access IT Training Subscription - ITU Online IT Training
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

Monthly All-Access IT Training Subscription

3130 Hrs 38 Min16,066 Videos24,585 QuestionsCertificate of CompletionClosed Captions

Monthly All-Access IT Training Subscription



CompTIA SecAI+ (CY0-001) : Module 1.0 : Basic AI Concepts Related to Cybersecurity
  • 0.1 Course Intro
  • 1.0 Module Overview
  • 1.1 Types of AI
  • 1.2 Demo – Generative AI vs Traditional Search
  • 1.3 Module Training Techniques
  • 1.4 Demo – Examining Machine Learning
  • 1.5 Prompt Engineering
  • 1.6 Demo – Examining Prompt Engineering Techniques
  • 1.7 Data Processing Security in AI
  • 1.8 Demo – Examining NLP and Language Models
  • 1.9 Data Security in AI
  • 1.10 Demo – Examining Fine-Tuning Concepts
  • 1.11 Examining Security and the AI Lifecycle
  • 1.12 Demo – Examining Data Cleansing with AI
  • 1.13 Module Overview
CompTIA SecAI+ (CY0-001) : Module 2.0 : Securing AI Systems
  • 2.0 Module Overview
  • 2.1 Threat-Modeling AI Systems
  • 2.2 Demo – Threat-Modeling AI Systems
  • 2.3 Security Controls in AI Systems
  • 2.4 Demo – Using Prompt Template for Security Control
  • 2.5 Access Control in AI Systems
  • 2.6 Data Security Controls in AI Systems
  • 2.7 Demo – Data Minimization with Sensitive Information
  • 2.8 Monitoring and Auditing for AI Systems
  • 2.9 Attack Evidence in AI Systems
  • 2.10 Demo – Model Poisoning in AI Systems
  • 2.11 Compensating Controls in AI Systems
  • 2.12 Demo – Implementing Compensating Controls in AI
  • 2.13 – Module Summary
CompTIA SecAI+ (CY0-001) : Module 3.0 : AI Assisted Security
  • 3.0 Module Overview
  • 3.1 Examining AI-enabled Tools for Security
  • 3.2 Demo – AI-Assisted Threat Categorization
  • 3.3 AI Attack Vector Enablement
  • 3.4 Demo – AI-Assisted Reconnaissance Acceleration
  • 3.5 AI Security Automation
  • 3.6 Demo – AI-Assisted Incident Report Summarization
  • 3.7 Module Summary
CompTIA SecAI+ (CY0-001) : Module 4.0 : AI Governance, Risk, and Compliance
  • 4.0 Module Overview
  • 4.1 Organizational Governance Structures Supporting AI
  • 4.2 Demo – AI Decision Authority Mapping
  • 4.3 Examining AI-related risks
  • 4.4 Demo – Internal Policy vs. External Law Conflict
  • 4.5 Examining the Compliance Impact of AI
  • 4.6 Demo – NIST AI RMF Lifecycle Mapping
  • 4.7 Module Summary
  • 4.8 Course Outro
CySA+ (CS0-004) : Module 1 : Security Operations
  • 0.1 Course Intro
  • 1.0 Module Overview
  • 1.1 Logging Concepts
  • 1.2 Demo – Logging in Windows Server
  • 1.3 Demo – Logging in Linux
  • 1.4 Operating System Concepts
  • 1.5 Demo – File Analysis and Pattern Recognition
  • 1.6 Infrastructure and System Architecture
  • 1.7 Demo – Virtualization and the Cloud
  • 1.8 Device Management and Network Architecture
  • 1.9 Demo – Mobile Device Management
  • 1.10 Identity and Access Management
  • 1.11 Data Protection and Encryption
  • 1.12 Critical Infrastructure
  • 1.13 Examining Host-related Indicators
  • 1.14 Examining Network-Related Indicators
  • 1.15 Application-related Indicators
  • 1.16 Cloud-related Indicators
  • 1.17 Demo – Email Header Analysis
  • 1.18 Demo – Using and Analyzing Cloud Logs
  • 1.19 Identity-Related Indicators
  • 1.20 Tools to Determine Malicious Activity
  • 1.21 Demo – Examining Intrustion Detection using Snort
  • 1.22 Demo – Decoding with CyberChef
  • 1.23 Programming Languages and Tools
  • 1.24 Demo – Examining Intrusion Detection using Suricata
  • 1.25 Threat Actors and TTPs
  • 1.26 Demo – Examining MITRE ATT&CK
  • 1.27 Threat Intelligence Collection Methods and Sources
  • 1.28 Demo – Examining Threat Intelligence with MISP
  • 1.29 Indicators of Compromise
  • 1.30 Demo – Domain and IP Reputation
  • 1.31 Threat Modeling and Mapping
  • 1.32 Demo – Examining a Threat Modeling Report
  • 1.33 Process Improvement in Security Operations
  • 1.34 AI in Security Operations
  • 1.35 Module Summary
CySA+ (CS0-004) : Module 2 : Vulnerability Management
  • 2.0 Module Overview
  • 2.1 Planning Vulnerability Scanning
  • 2.2 Vulnerability Scanning Types
  • 2.3 Demo – Passive Scanning with tcpdump and Wireshark
  • 2.4 Demo – Credentialed Scanning using Nessus
  • 2.5 Vulnerability Scanning Tools
  • 2.6 Demo – Metasploit Framework and Metasploitable
  • 2.7 Demo – Active Scanning with nmap and masscan
  • 2.8 Demo – Gathering OSINT using Maltego
  • 2.9 Control Types
  • 2.10 Risk Mitigation Strategies
  • 2.11 Vulnerability Prioritization
  • 2.12 Demo – Examining Vulnerability Prioritization
  • 2.13 Application Security
  • 2.14 Demo – Web Application Testing with Burp Suite
  • 2.15 Vulnerability Mitigation Strategies
  • 2.16 Module Summary
CySA+ (CS0-004) : Module 3 : Incident Response and Management
  • 3.0 Module Overview
  • 3.1 Attack Methodology Frameworks
  • 3.2 Demo – Examining the Cyber Kill Chain Methodology
  • 3.3 Incident Response Processes
  • 3.4 Incident Response Techniques
  • 3.5 Demo – Examining Chain of Custody Documentation
  • 3.6 Module Summary
CySA+ (CS0-004) : Module 4 : Reporting and Communication
  • 4.0 Module Overview
  • 4.1 Vulnerability Reporting and Communication
  • 4.2 Inhibitors to Remediation
  • 4.3 Incident Response Communication Plan
  • 4.4 Metrics and KPIs
  • 4.5 Examining Vulnerability Trends with NVD
  • 4.6 Module Summary
CySA+ (CS0-004) : Module 5 : The Exam
  • 5.1 Identifying Exam Requirements
  • 5.2 Taking the Exam
Module 1 – Introduction to the EU AI Act
  • 1.1 Background and Legislative Context
  • 1.2 Scope and Objectives of the EU AI Act
Module 2 – Risk-Based Classification of AI Systems
  • 2.1 Four Risk Categories Explained
  • 2.2 Real-World Examples of Each Risk Category
Module 3 – Obligations for High-Risk AI Systems
  • 3.1 High-Risk AI Identification
  • 3.2 Conformity Assessment Requirements
  • 3.3 Post-Market Monitoring and Incident Reporting
Module 4 – Transparency and Information Requirements
  • 4.1 Obligations for Limited-Risk AI Systems
  • 4.2 User Information and Instructions
Module 5 – Governance and Enforcement
  • 5.1 Roles and Responsibilities
  • 5.2 Market Surveillance and Regulatory Authorities
  • 5.3 Penalties and Sanctions
Module 6 – Interaction with Other Laws and Standards
  • 6.1 Interaction with Other Laws and Standards
  • 6.2 International Context
  • 6.3 Voluntary Codes of Conduct and Standards
Module 7 – Strategies for Compliance and Future-Proofing AI Systems
  • 7.1 Building a Compliance Framework
  • 7.2 Documentation and Audit Readiness
  • 7.3 Risk Management Lifecycle
  • 7.4 Preparing for the Future
Module 1 : Server Hardware Installation and Management
  • 1.0 Introduction to Server+
  • 1.1 Server Rooms and Data Centers
  • 1.2 Server Room Racking
  • 1.2.1 ACTIVITY – Installing a Tool-less Rail in a Rack
  • 1.3a Rack Power and Safety Part-1
  • 1.3b Rack Power and Safety Part-2
  • 1.4a Network Cabling and Components Part-1
  • 1.4b Network Cabling and Components Part-2
  • 1.4.1 ACTIVITY – Connecting Dissimilar Switchports in a Server Rack
  • 1.4.2 ACTIVITY – Testing a Fiber Optic Cable
  • 1.5 Server Components
  • 1.5.1 ACTIVITY – Installing a PCIe Expansion Card
  • 1.6a Data Storage Part-1
  • 1.6b Data Storage Part-2
  • 1.6.1 ACTIVITY – Creating a Software RAID on Windows Server
  • 1.7 Innovations in Server Hardware
  • 1.8a Server Hardware Maintenance Part-1
  • 1.8b Server Hardware Maintenance Part-2
  • 1.8.1 ACTIVITY – Servicing a Server in the Rack
  • 1.9 ACTIVITY – Hardware Tips n Tricks
Module 2 : Server Administration
  • 2.1 Install Server Operating Systems
  • 2.1.1 ACTIVITY – Installing the Operating System
  • 2.2a Server Network Infrastructure Services Part-1
  • 2.2b Server Network Infrastructure Services Part-2
  • 2.2.1 ACTIVITY – IP Subnetting for the Sysadmin
  • 2.2.2 ACTIVITY – Protecting a Server with VLANs
  • 2.2.3 ACTIVITY – Enabling VLAN Routing
  • 2.2.4 ACTIVITY – Protecting a Server with Firewall Rules
  • 2.3a Server Functions and Features Part-1
  • 2.3b Server Functions and Features Part-2
  • 2.3.1 ACTIVITY – Monitoring Linux
  • 2.3.2 ACTIVITY – Installing Server Roles
  • 2.4 Server High Availability
  • 2.5 Virtualization
  • 2.6 Scripting Basics for Server Administration
  • 2.7 Asset Management and Documentation
  • 2.8 Licensing Concepts
  • 2.9 ACTIVITY – Server Administration Tips & Tricks Part-1
  • 2.10 ACTIVITY – Server Administration Tips & Tricks Part-2
  • 2.11 ACTIVITY – Server Administration Tips & Tricks Part-3
  • 2.12 ACTIVITY – Server Administration Tips & Tricks Part-4
  • 2.13 BONUS ACTIVITY – Linux Disk, Hardware and Networking Commands
Module 3 : Security and Disaster Recovery
  • 3.1 Data Security Mechanisms
  • 3.1.1 ACTIVITY – Exploring Symmetric Encryption
  • 3.1.2 ACTIVITY – Examining Asymmetric Encryption
  • 3.1.3 ACTIVITY – Hashing
  • 3.2 Data Security Risks and Mitigation
  • 3.3 Backups and Restores
  • 3.4 Server Hardening Methods
  • 3.4.1 Scanning Servers for Open Ports
  • 3.5 IAM for Server Administration
  • 3.5.1 ACTIVITY – Implementing NTFS Permissions
  • 3.5.2 ACTIVITY – Configuring Multifactor Authentication
  • 3.6 Server Decommissioning
  • 3.7 Physical Security Concepts
  • 3.7.1 ACTIVITY – Testing User Social Engineering Awareness
  • 3.8a Disaster Recovery Part-1
  • 3.8b Disaster Recovery Part-2
  • 3.9 ACTIVITY – Security & DR Tips n Tricks Part-1
  • 3.10 ACTIVITY – Security & DR Tips n Tricks Part-2
Module 4 : Troubleshooting
  • 4.0 Server Troubleshooting
  • 4.1 ACTIVITY – Troubleshooting Connectivity to the Server
  • 4.2 ACTIVITY – Troubleshooting Tips n Tricks Part-1
  • 4.3 ACTIVITY – Troubleshooting Tips n Tricks Part-2
  • 4.4 Course Closeout
Module 1 : Preparing Infrastructure for Devices
  • 0.0 Course Introduction
  • 1.0 Module Overview
  • 1.1 Choosing a Device Join Type
  • 1.2 Joining Devices to Microsoft Entra ID
  • 1.3 Registering Devices to Microsoft Entra ID
  • 1.4 Groups for Devices in Microsoft Entra ID
  • 1.5 Configuring Enrollment Settings
  • 1.6 Configuring Automatic Enrollment for Windows
  • 1.7 Configuring Bulk Enrollment for iOS and Android
  • 1.8 Configuring Enrollment Profiles for Android Devices
  • 1.9 Managing Roles in Intune
  • 1.10 Implementing Compliance Policies using Intune
  • 1.11 Implementing Conditional Access Policies
  • 1.12 Configuring Windows Hello for Business
  • 1.13 Implementing and Managing LAPS for Microsoft Entra ID
  • 1.14 Managing Windows Local Groups using Intune
Module 2 : Managing and Maintaining Devices
  • 2.0 Module Overview
  • 2.1 Choosing Between Windows Autopilot and Provisioning Packages
  • 2.2 Choosing a Windows Autopilot Deployment Mode
  • 2.3 Applying a Device Name Templates
  • 2.3.1 Demo – Device Name Templates
  • 2.4 Implementing Deployments by using Windows Autopilot
  • 2.5 Creating an Enrollment Status Page (ESP)
  • 2.5.1 Demo – Enrollment Status Page
  • 2.6 Planning and Implementing Provisioning Packages
  • 2.7 Planning and Implementing Device Upgrades for Windows 11
  • 2.8 Implementing a Windows 365 Cloud PC Deployment
  • 2.9 Creating Device Configuration Profiles for Windows Devices
  • 2.9.1 Demo – Device Configuration Profile for Windows
  • 2.10 Creating Device Configuration Profiles for Android Devices
  • 2.10.1 Demo – Device Configuration Profile for Android
  • 2.11 Creating Device Configuration Profiles for iOS devices
  • 2.11.1 Demo – Device Configuration Profile for iOS and iPadOS
  • 2.12 Creating Device Configuration Profiles for Mac OS devices
  • 2.12.1 Demo – Device Configuration Profiles for macOS
  • 2.13 Creating Device Configuration Profiles for Enterprise Multi-session Devices
  • 2.13.1 Demo – Device Configuration for Multisesson Devices
  • 2.14 Targeting a Profile using Filters
  • 2.14.1 Demo – Targeting Profiles using Filters
  • 2.15 Configuring Endpoint Privilege Management
  • 2.15.1 Demo – Endpoint Privilege Management
  • 2.16 Managing Applications by using the Enterprise App Catalog
  • 2.16.1 Demo – Enterprise App Catalog
  • 2.17 Implementing Microsoft Intune Advanced Analytics
  • 2.18 Configuring Microsoft Intune Remote Help
  • 2.19 Identifying Use Cases for Cloud PKI
  • 2.20 Examining Microsoft Tunnel for MAM
  • 2.21 Performing Remote Actions in Microsoft Intune
  • 2.22 Updating Windows Defender Security Intelligence
  • 2.23 Rotating BitLocker Recovery Keys
  • 2.24 Running a Device Query by Using KQL
Module 3 : Managing applications
  • 3.0 Module Overview
  • 3.1 Preparing Applications for Deployment by using Intune
  • 3.2 Deploying Apps by using Intune
  • 3.2.1 Demo – Deploying Apps in Intune
  • 3.3 Deploying Microsoft 365 Apps by using Intune
  • 3.3.1 Demo – Deploying Microsoft 365 Apps with Intune
  • 3.4 Configuring Policies for Office Apps
  • 3.4.1 Demo – Configuring Policies for Microsoft 365 Apps
  • 3.5 Deploying MS365 Apps using ODT and OCT
  • 3.5.1 – Demo – Using the ODT and OCT
  • 3.6 Managing MS365 Apps using the Microsoft 365 Apps Admin Center
  • 3.6.1 Demo – Examining the Microsoft 365 Apps Admin Center
  • 3.7 Deploying Apps from Platform-specific App Stores using Intune
  • 3.7.1 Demo – Deploying to Platform-specific App Stores
  • 3.8 Planning and Implementing App Protection Policies
  • 3.8.1 Demo – Implementing App Protection Policies
  • 3.9 Implementing Conditional Access Policies for App Protection Policies
  • 3.9.1 Demo – Conditional Access Policies for App Protection Policies
  • 3.10 Planning and Implementing App Configuration Policies
  • 3.10.1 Demo – Deploying App Configuration Policies
Module 4 : Protecting devices
  • 4.0 Module Overview
  • 4.1 Creating Antivirus Policies
  • 4.1.1 Demo – Creating Endpoint AV Policies
  • 4.2 Creating Disk Encryption Policies
  • 4.2.1 Demo – Creating Disk Encryption Policies
  • 4.3 Creating Firewall Policies
  • 4.3.1 Demo – Creating Endpoint Firewall Policies
  • 4.4 Configuring Attack Surface Reduction Policies
  • 4.4.1 Demo – Creating Attack Surface Reduction Policies
  • 4.5 Planning and Implementing Security Baselines
  • 4.5.1 Demo – Creating Security Baselines
  • 4.6 Integrating Intune with Microsoft Defender for Endpoint
  • 4.6.1 Demo – Integrating Intune with MDE
  • 4.7 Onboarding Devices into Microsoft Defender for Endpoint
  • 4.7.1 Demo – Onboarding Devices into MDE
  • 4.8 Planning for Device Updates
  • 4.9 Creating and Manage Update Rings Using Intune
  • 4.9.1 Demo – Creating Update Ring Policies
  • 4.10 Creating and Manage Update Policies by using Intune
  • 4.10.1 Demo – Creating Update Policies in Intune
  • 4.11 Managing Android Updates using Configuration Profiles
  • 4.12 Configuring Windows Client Delivery Optimization using Intune
  • 4.13 Course Outro
Module 1: Introduction to Windows 11
  • 1.1 Module 1 Introduction
  • 1.2 Major Differences
  • 1.3 System Requirements
  • 1.4 How to check Compatibility
  • 1.5 How to upgrade to Windows 11
  • 1.6 Module 1 Conclusion
Module 2: Windows 11 Interface Basics
  • 2.1 Windows 11 Interface Basics
  • 2.2 Start Menu & Taskbar
  • 2.3 Navigating The Desktop Environment
  • 2.4 Using Windows Snap Layouts & Snap Groups
  • 2.5 Notifications And Quick Settings
  • 2.6 Module 2 Review
Module 3: File Management and Personalization
  • 3.1 File Management and Personalization
  • 3.2 Navigating File Explorer
  • 3.3 One Drive
  • 3.4 Search Functionality
  • 3.5 Module 3 Review
Module 4: Personalizing Windows 11
  • 4.1 Module 4 Introduction
  • 4.2 Themes
  • 4.3 Colors And Transparency
  • 4.4 Dark Mode & Light Mode
  • 4.5 Background Lock Screen Customization
  • 4.6 Module 4 Review
Module 5: Installing and Managing Apps
  • 5.1 Module 5 Introduction
  • 5.2 Installing Applications
  • 5.3 Managing App Permissions
  • 5.4 Uninstalling Apps
  • 5.5 Default Applications
  • 5.6 Module 5 Review
Module 6: Productivity Tools
  • 6.1 Module 6 Introduction
  • 6.2 Office Applications
  • 6.3 Configuring Microsoft Teams
  • 6.4 Focus Assist
  • 6.5 Virtual Desktops
  • 6.6 Module 6 Review
Module 7: System Configuration
  • 7.1 Module 7 Introduction
  • 7.2 Settings Vs Control Panel
  • 7.3 Power Management
  • 7.4 Multiple Monitors
  • 7.5 Audio & Notifications
  • 7.6 Module 7 Review
Module 8: Performance Optimization
  • 8.1 Module 8 Introduction
  • 8.2 Task Manager
  • 8.3 Startup Apps
  • 8.4 Storage Sense
  • 8.5 Windows Update Management
  • 8.6 Module 8 Review
Module 9: Windows 11 Security Features
  • 9.1 Module 9 Introduction
  • 9.2 Windows Security
  • 9.3 Virus and Threat Protection
  • 9.4 Account Protection
  • 9.5 Firewall and Network Protection
  • 9.6 Privacy Settings
  • 9.7 Module 9 Review
Module 10: Networking and Connectivity
  • 10.1 Module 10 Introduction
  • 10.2 Wifi & Ethernet Setup
  • 10.3 Bluetooth and Management
  • 10.4 Network Troubleshooting
  • 10.5 Remote Desktop
  • 10.6 Module 10 Review
Module 11: Advanced Windows 11 Features
  • 11.1 Module 11 Introduction
  • 11.2 Windows Sub System For Linux
  • 11.3 Windows Terminal
  • 11.4 Voice Typing
  • 11.5 Accesibility Features
Module 12: Troubleshooting and Support
  • 12.1 Module 12 Introduction
  • 12.2 Startup Repair Options
  • 12.3 Safe Mode & Recovery
  • 12.4 System Restore & Reset
  • 12.5 Windows Logs & Diagnostics
  • 12.6 Systematic Troubleshooting and Conclusion
Module 13: Introducing Microsoft Copilot
  • 13.1 – Introduction
  • 13.2 What is Windows 11 Copilot
  • 13.3 Accessing and Setting Up Copilot
  • 13.4 Basic Copilot Usage and Interactions
  • 13.5 Advanced copilot Features and Use Cases
  • 13.6 Privacy, Security and Best Practices
  • 13.7 Conclusion
Domain 1.0 – Cloud Architecture
  • 0.1 – CompTIA Cloud+ (CV0-004) – Course Intro
  • 1.0 – Module Overview
  • 1.1 – Cloud Service Models
  • 1.2 – Shared Responsibility Model
  • 1.3 – Resource Availability
  • 1.4 – Disaster Recovery (DR)
  • 1.5 – Public and Private Connections
  • 1.6 – Network Functions, Components and Services
  • 1.7 – Cloud Storage Types
  • 1.8 – Cloud Native Design Concepts
  • 1.9 – Containerization Concepts
  • 1.10 – Virtualization Concepts
  • 1.11 – Cloud Cost Conisderations
  • 1.12 – Database Concepts
  • 1.13 – Workload Optimization
  • 1.14 – Evolving Technologies
  • Demo – Examining Cloud Cost
  • Demo – Examining IaaS
  • Demo – Examining Resource Availability
  • Demo – Examining SaaS
Domain 2.0 – Deployment
  • 2.0 – Module Overview
  • 2.1 – Cloud Deployment Models
  • 2.2 – Deployment Strategies
  • 2.3 – Cloud Migrations
  • 2.4 – Application Migration Strategies
  • 2.5 – Using Code to Deploy and Configure Cloud Resources
  • 2.6 – Scripting Logic
  • 2.7 – Provisioning Cloud Resources
Domain 3.0 – Operations
  • 3.0 – Module Overview
  • 3.1 – Achieving Observability
  • 3.2 – Scaling Approaches
  • 3.3 – Backup and Recovery Methods
  • 3.4 – Backup Types
  • 3.5 – Cloud Resource Lifecycle Management
Domain 4.0 – Security
  • 4.0 – Module Overview
  • 4.1 – Vulnerability Management Concepts
  • 4.2 – Compliance and Regulation
  • 4.3 – Secure Cloud Access – Management and Resources
  • 4.4 – Authentication Models
  • 4.5 – Authorization Models
  • 4.6 – Security Best Practices
  • 4.7 – Cloud Security Controls
  • 4.8 – Identifying Common Attacks
  • Demo – Examining Management Access using a CLI
  • Demo – Examining Compliance and Regulations in the Cloud
Domain 5.0 – DevOps Fundamentals
  • 5.0 – Module Overview
  • 5.1 – Source Control Concepts
  • 5.2 – CI-CD Pipelines
  • 5.3 – Systems Integration
  • 5.4 – DevOps Tools
Domain 6.0 – Troubleshooting
  • 6.0 – Module 6 – Overview
  • 6.1 – Troubleshooting Deployment Issues
  • 6.2 – Troubleshooting Network Issues
  • 6.3 – Troubleshooting Network Service Issues
  • 6.4 – Troubleshooting Security Issues
  • 6.5 – CompTIA Cloud+ (CV0-004) – Course Outro
Module 1: The Role of AI in Cybersecurity
  • 1.1 Understanding AI and ML in the Context of Cybersecurity
  • 1.2 AI Use Cases Threat Detection, Automated Response, and Anomaly Detection
  • 1.3 Benefits and Risks of Embedding AI into Cybersecurity Products
  • 1.4 Emerging Challenges with GenAI Models in Production Environments
Module 2: Evolving Threat Landscape for AI and GenAI Systems
  • 2.1 Unique Threat Vectors in GenAI Environments
  • 2.2 Attack Surfaces in AI Pipelines and ML Model APIs
  • 2.3 Real-World Examples: Exploiting LLMs and Adversarial Input Crafting
  • 2.4 Considerations for Securing AI Model Endpoints
Module 3: AI-Powered Security Tools and Platforms
  • 3.1 Intrusion Detection and Anomaly Detection Us
  • 3.2 Threat Intelligence Platforms Powered by ML
  • 3.3 AI in Malware Classification, Phishing Detectioni and Behavioral Analytics
  • 3.4 Overview of Tools: Darktrace, Palo Alto Cortex XSIAM, Microsoft Defender XDR
Module 4: Securing the AI Lifecycle – From Training to Deployment
  • 4.1 Risks in AI/ML Model Lifecycle Stages
  • 4.2 Model Governance and Audit Trails
  • 4.3 Version Control, Drift Detection, and Rollback Strategies
  • 4.4 Safe Deployment Practices for LLMs and Neural Networks
Module 5: Identity, Access, and Data Protection in AI Systems
  • 5.1 Role-Based Access Control and Zero Trust Architecture in AI Pipelines
  • 5.2 Protecting Training and Inference Data
  • 5.3 Identity Threats: Model Abuse, Impersonation Attacks, and Shadow AI
  • 5.4 Integrating IAM into GenAI Workflows
Module 6: Specialized GenAI Cybersecurity Solutions
  • 6.1 AI Firewalls: What They Are and How They Defend GenAI Endpoints
  • 6.2 AI Security Posture Management (SPM) Tools
  • 6.3 Example Solutions_ Protect AI, Robust Intelligence, HiddenLayer
  • 6.4 Integrating Security Tools into Modern MLOps Workflows
Module 7: Governance, Privacy, and Compliance in AI Security
  • 7.1 Compliance Concerns in AI Systems
  • 7.2 Managing Bias, Fairness, and Explainability in AI Systems
  • 7.3 Ethics and Responsible AI Development
  • 7.4 Regulatory Landscape for GenAI and AI-Driven Decision-Making
Module 8: Looking Ahead – The Future of AI in Cybersecurity
  • 8.1 The Rise of Autonomous Security Agents
  • 8.2 AI vs. Adversarial AI: Red Teaming and Simulation
  • 8.3 Building Secure-by-Design GenAI Applications
  • 8.4 The Evolving Role of Security Engineers and AI Developers
Module 9: Operationalizing AI Cybersecurity in the Enterprise
  • 9.1 Building an AI Security Roadmap
  • 9.2 Creating an AI Security Governance Framework
  • 9.3 Embedding AI Security in MLOps Pipelines
  • 9.4 Vendor Evaluation and Procurement Guidelines
  • 9.5 Building a Cross-Functional AI Security Team
  • 9.6 Conducting an Internal AI Threat Modeling Workshop
  • 9.7 Communicating AI Security Risks to Executives
  • 9.8 Course Recap and What is Next
Module 1: Information Security and Ethical Hacking Overview
  • 1.0 Introduction to CEH v13
  • 1.1 Elements of Security
  • 1.2 Cyber Kill Chain
  • 1.3 MITRE ATT&CK Framework
  • 1.3.1 ACTIVITY – Examining MITRE ATT&CK
  • 1.4 Hacking
  • 1.5 Ethical Hacking
  • 1.6 Information Assurance
  • 1.7 Risk Management
  • 1.8 Incident Management
  • 1.9 Information Security Laws and Standards
  • 1.10 Using AI in Ethical Hacking
  • 1.11 Information Security and Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
  • 2.1 Footprinting Concepts
  • 2.2 OSINT Tools
  • 2.2.1 ACTIVITY – Finding Internet-Connected Devices with Shodan
  • 2.2.2 ACTIVITY – Performing OSINT with theHarvester
  • 2.3 Advanced Google Search
  • 2.3.1 ACTIVITY – Google Hacking
  • 2.4 Whois Footprinting
  • 2.4.1 ACTIVITY – Footprinting with WHOIS
  • 2.5 DNS Footprinting
  • 2.5.1 ACTIVITY – Enumerating DNS
  • 2.6 Website Footprinting
  • 2.7 Email Footprinting
  • 2.8 Network Footprinting
  • 2.8.1 ACTIVITY – Tracing a Network Path with Traceroute
  • 2.9 Social Network Footprinting
  • 2.10 Enhanced OSINT
  • 2.11 Footprinting-and-Reconnaissance-Countermeasures
  • 2.12 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
  • 3.1 Scanning Concepts
  • 3.2 Discovery Scans
  • 3.3 Port Scans
  • 3.4 Other Scan Types
  • 3.5 Scanning Tools
  • 3.6 NMAP
  • 3.6.1 ACTIVITY – Port Scanning and Fingerprinting with NMAP
  • 3.7 Firewall and IDS Evasion
  • 3.8 Proxies
  • 3.9 AI Enhanced SCANNING Tools
  • 3.10 Scanning counter-measures
  • 3.11 Scanning Networks Review
Module 4: Enumeration
  • 4.1 Enumeration Overview
  • 4.2 SMB_NetBIOS_Enumeration
  • 4.3 File Transfer Enumeration
  • 4.4 WMI Enumeration
  • 4.5 SNMP Enumeration
  • 4.6 LDAP Enumeration
  • 4.7 DNS Enumeration
  • 4.8 SMTP Enumeration
  • 4.8.1 ACTIVITY – SMTP Enumeration
  • 4.9 Remote Connection Enumeration
  • 4.10 Website Enumeration
  • 4.10.1 ACTIVITY – Enumerating Website Directories
  • 4.11 Local User and Active Directory Enumeration
  • 4.12 Other Enumeration Types
  • 4.13 Enumeration Using AI
  • 4.14 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
  • 5.1 Vulnerability Scanning
  • 5.1.1 ACTIVITY – Vulnerability Scanning with OpenVAS
  • 5.2 Vulnerability Assessment
  • 5.3 AI Assisted Vulnerability Assessment
  • 5.4 Vulnerability Analysis Review
Module 6: System Hacking
  • 6.1 System Hacking Concepts
  • 6.2 Common Operating System Exploits
  • 6.3 Buffer Overflows
  • 6.4 System Hacking Tools and Frameworks
  • 6.5 Metasploit
  • 6.5.1 ACTIVITY – Hacking with Metasploit
  • 6.6 Meterpreter
  • 6.6.1 ACTIVITY – Having Fun with Meterpreter
  • 6.7 Keylogging_and_Spyware-
  • 6.8 Netcat
  • 6.8.1 ACTIVITY – Using Netcat
  • 6.9 Windows Exploitation
  • 6.10 Windows Post- Exploitation
  • 6.10.1 ACTIVITY – Windows Post Exploitation with Eternal Blue
  • 6.10.2 ACTIVITY – Escalating Privilege with Token Passing
  • 6.11 Linux Exploitation
  • 6.11.1 ACTIVITY – Pwn a Linux Target from Start to Finish
  • 6.12 Linux Post-Exploitation
  • 6.13 Password Attacks
  • 6.13.1 ACTIVITY – Pass-the-Hash
  • 6.13.2 ACTIVITY – Password Spraying with Hydra
  • 6.14 Linux Password Cracking
  • 6.14.1 ACTIVITY – Password Cracking with Hashcat
  • 6.14.2 ACTIVITY – Brute Forcing with Medusa
  • 6.15 Additional Password Attacks
  • 6.16 Attacking Network Services
  • 6.16.1 ACTIVITY – Cracking Linux Passwords with John-the-Ripper
  • 6.17 Other Methods for Obtaining Passwords
  • 6.18 Network Service Attacks
  • 6.19 Lateral Movement
  • 6.19.1 ACTIVITY – Preparing to Pivot
  • 6.19.2 ACTIVITY – Lateral Movement through Pivoting
  • 6.20 Persistence
  • 6.20.1 ACTIVITY – Creating a Persistent Netcat Back Door
  • 6.20.2 ACTIVITY – APT Persistence
  • 6.21 Hiding Data
  • 6.21.1 ACTIVITY – Hiding Data with Steganography
  • 6.22 Covering Tracks
  • 6.22.1 ACTIVITY – Cover Tracks with Log Tampering
  • 6.23 Side-Channel-Attacks
  • 6.24 AI-Powered Vulnerability Exploitation Tools
  • 6.25 System Hacking Countermeasures
  • 6.26 System Hacking Review
Module 7: Malware Threats
  • 7.1 Malware Overview
  • 7.2 Viruses
  • 7.3 Trojans
  • 7.4 Rootkits
  • 7.5 Other Malware
  • 7.6 Advanced Malware Threats
  • 7.7 Malware Makers
  • 7.7.1 ACTIVITY – Creating a Malware Dropper and Handler
  • 7.8 Malware Deployment
  • 7.9 Malware Detection
  • 7.10 Malware Analysis
  • 7.10.1 ACTIVITY – Analyzing the SolarWinds Orion Hack
  • 7.11 AI and Malware
  • 7.12 Malware Countermeasures
  • 7.13 Malware Threats Review
Module 8: Sniffing and Spoofing
  • 8.1 Network Sniffing
  • 8.2 Sniffing Tools
  • 8.2.1 ACTIVITY – Intercepting Data with Wireshark
  • 8.2.2 ACTIVITY – Capturing Files off the Network
  • 8.3 MAC and ARP Attacks
  • 8.3.1 ACTIVITY – Performing an MITM Attack with Ettercap
  • 8.4 Name Resolution Attacks
  • 8.4.1 ACTIVITY – Spoofing an Authentication Service with Responder
  • 8.5 Other Layer 2 Attacks
  • 8.6 Sniffing and Spoofing Countermeasures
  • 8.7 Sniffing and Spoofing Review
Module 9: Social Engineering
  • 9.1 Social Engineering Concepts
  • 9.2 Social Engineering Techniques
  • 9.3 Social Engineering Tools
  • 9.3.1 ACTIVITY – Phishing for Credentials
  • 9.3.2 ACTIVITY – OMG Cable Baiting
  • 9.4 Social Media, Identity Theft, Insider Threats
  • 9.5 Social Engineering and AI
  • 9.6 Social Engineering Countermeasures
  • 9.7 Social Engineering Review
Module 10: Denial-of-Service
  • 10.1 DoS-DDoS Concepts
  • 10.2 Volumetric Attacks
  • 10.3 Fragmentation Attacks
  • 10.4 State Exhaustion Attacks
  • 10.5 Application Layer Attacks
  • 10.5.1 ACTIVITY – Conducting a Slowloris DDoS Attack
  • 10.6 Other Attacks
  • 10.7 DoS Tools
  • 10.7.1 ACTIVITY – Performing a HOIC DDoS Attack
  • 10.8 DoS Countermeasures
  • 10.9 DoS Review
Module 11: Session Hijacking
  • 11.1 Session Hijacking
  • 11.2 Compromising a Session Token
  • 11.3 XSS
  • 11.3.1 ACTIVITY – Web Session Hijacking with XSS
  • 11.4 CSRF
  • 11.5 Other Web Hijacking Attacks
  • 11.6 Network-Level Session Hijacking
  • 11.7 Session Hijacking Tools
  • 11.8 Session Hijacking Countermeasures
  • 11.9 Session Hijacking Review
Module12: Attack Detection and Prevention
  • 12.1 Types of IDS
  • 12.2 Snort
  • 12.3 Logging and Monitoring
  • 12.4 IDS Considerations
  • 12.5 IDS Evasion
  • 12.6 Firewalls
  • 12.7 Packet Filtering Rules
  • 12.8 Firewall Deployments
  • 12.9 Split DNS
  • 12.10 Firewall Product Types
  • 12.11 Firewall Evasion
  • 12.11.1 ACTIVITY – Busting the DOM for WAF Evasion
  • 12.12 NAC and Endpoint Security
  • 12.13 NAC and EDR Evasion
  • 12.14 Honeypots
  • 12.15 Evasion Countermeasures
  • 12.16 Attack Detection and Prevention Review
Module 13: Hacking Web Servers
  • 13.1 Web Server Operations
  • 13.2 Hacking Web Servers
  • 13.3 Common Web server Attacks
  • 13.4 Webserver Attack Tools
  • 13.5 AI and Webserver Attacks
  • 13.6 Hacking Web Servers Countermeasures
  • 13.7 Hacking Web Servers Review
Module 14: Hacking Web Applications
  • 14.1 Web Application Concepts
  • 14.2 Attacking Web Apps
  • 14.3 A01 Broken Access Control
  • 14.4 A02 Cryptographic Failures
  • 14.5 A03 Injection
  • 14.5.1 ACTIVITY – Command Injection
  • 14.6 A04 Insecure Design
  • 14.7 A05 Security Misconfiguration
  • 14.8 A06 Vulnerable and Outdated Components
  • 14.9 A07 Identification and Authentication Failures
  • 14.10 A08 Software and Data integrity Failures
  • 14.11 A09 Security Logging and Monitoring Failures
  • 14.12 A10 Server-Side Request Forgery
  • 14.13 XSS Attacks
  • 14.14 CSRF
  • 14.15 Parameter Tampering
  • 14.15.1 ACTIVITY – Parameter Tampering with Burp Suite
  • 14.16 Clickjacking
  • 14.16.1 ACTIVITY – Clickjacking with XSS and iFrame Injection
  • 14.17 SQL Injection
  • 14.17.1 ACTIVITY – Using SQL Injection to Steal Sensitive Data
  • 14.18 Insecure Deserialization Attacks
  • 14.19 IDOR
  • 14.19.1 ACTIVITY – IDOR Abuse with Burp Suite
  • 14.20 Directory Traversal
  • 14.20.1 ACTIVITY – Directory Traversal
  • 14.21 Session Management Attacks
  • 14.22 Response Splitting
  • 14.23 Overflow Attacks
  • 14.24 XXE Attacks
  • 14.25 Web App DoS
  • 14.26 Soap Attacks
  • 14.27 AJAX Attacks
  • 14.28 Web API Hacking
  • 14.29 Webhooks and Web Shells
  • 14.30 Web App Hacking Tools
  • 14.31 AI and Web Application Attacks
  • 14.32 Hacking Web Applications Countermeasures
  • 14.33 Hacking Web Applications Review
Module 15: SQL Injection
  • 15.1 SQL Injection Overview
  • 15.2 Basic SQL Injection
  • 15.3 Finding Vulnerable Websites
  • 15.4 Error-based SQL Injection
  • 15.5 Union SQL Injection
  • 15.5.1 ACTIVITY – SQLi on a Live Website – Part 1
  • 15.5.2 ACTIVITY – SQLi on a Live Website – Part 2
  • 15.6 Blind SQL Injection
  • 15.7 SQL Injection Tools
  • 15.8 Evading Detection
  • 15.9 Analyzing SQL Injection
  • 15.10 SQL Injection Countermeasures
  • 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
  • 16.1 Wireless Concepts
  • 16.2 Wireless Security Standards
  • 16.3 WI-FI Discovery Tools
  • 16.4 Common Wi-Fi Attacks
  • 16.5 Wi-Fi Password Cracking
  • 16.6 WEP Cracking
  • 16.7 WPA,WPA2,WPA3 Cracking
  • 16.7.1 ACTIVITY – WPA2 KRACK Attack
  • 16.8 WPS Cracking
  • 16.9 Bluetooth Hacking
  • 16.10 Other Wireless Hacking
  • 16.11 Wireless Security Tools
  • 16.12 Wireless Hacking Countermeasures
  • 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
  • 17.1 Mobile Platform Overview
  • 17.2 Mobile Device Attacks
  • 17.3 Android Overview
  • 17.4 Rooting Android
  • 17.5 Android Exploits
  • 17.5.1 ACTIVITY – Pwn a Mobile Device
  • 17.6 Android-based Hacking Tools
  • 17.7 Reverse Engineering an Android App
  • 17.8 Securing Android
  • 17.9 iOS Overview
  • 17.10 Jailbreaking iOS
  • 17.11 IOS Exploits
  • 17.12 iOS-based Hacking Tools
  • 17.13 Reverse Engineering an iOS App
  • 17.14 Securing iOS
  • 17.15 Mobile Device Management
  • 17.16 Hacking Mobile Platforms Countermeasures
  • 17.17 Hacking Mobile Platforms Review
Module 18: IoT Hacking & OT Hacking
  • 18.1 IoT Overview
  • 18.2 IoT Infrastructure
  • 18.3 IoT Vulnerabilities and Threats
  • 18.4 IoT Hacking Methodology and Tools
  • 18.4.1 ACTIVITY – Card Cloning with Flipper Zero
  • 18.5 IoT Hacking Countermeasures
  • 18.6 OT Concepts
  • 18.7 IT-OT Convergence
  • 18.8 OT Components
  • 18.9 OT Vulnerabilities
  • 18.10 OT Attack Methodology and Tools
  • 18.11 OT Hacking Countermeasures
  • 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
  • 19.1 Cloud Computing Concepts
  • 19.2 Cloud Types
  • 19.3 Cloud Benefits and Considerations
  • 19.4 Cloud Risks and Vulnerabilities
  • 19.5 AWS Hacking
  • 19.5.1 ACTIVITY – AWS S3 Bucket Hacking
  • 19.6 Azure Cloud Hacking
  • 19.7 Google Cloud Hacking
  • 19.8 Container Hacking
  • 19.9 Cloud Threat Countermeasures
  • 19.10 Cloud Computing Review
Module 20: Cryptography
  • 20.1 Cryptography Concepts
  • 20.2 Symmetric Encryption
  • 20.2.1 ACTIVITY – Symmetric Encryption
  • 20.3 Asymmetric Encryption
  • 20.3.1 ACTIVITY – Asymmetric Encryption
  • 20.4 Public Key Exchange
  • 20.5 PKI
  • 20.5.1 ACTIVITY – Generating and Using an Asymmetric Key Pair
  • 20.6 Digital Signatures
  • 20.7 Hashing
  • 20.7.1 ACTIVITY – Calculating Hashes
  • 20.8 Common Encryption Use Cases
  • 20.9 Cryptography Tools
  • 20.10 Cryptography Attacks
  • 20.11 Cryptography Review
  • 20.12 Course Conclusion
Module 21: Challenge Lab
  • 21.1-ACTIVITY-Challenge-Lab-Introduction
  • 21.2-ACTIVITY-Flag 1 – Port Authority, Please!
  • 21.3-ACTIVITY-Flag 2 – Moo-ve Fast and Break Things
  • 21.4-ACTIVITY-Flag 3 – Pixels, Packets & Patient X
  • 21.5-ACTIVITY-Flag 4 – Hexes and Hashes
  • 21.6-ACTIVITY-Flag 5 – APT & the PowerShell Symphony
  • 21.7-ACTIVITY-Flag 6 – Script Kiddie's Revenge
  • 21.8-ACTIVITY-Flag 7 – Oh Mannie, You Shouldn't Have!
  • 21.9-ACTIVITY-Report
Module 1 – Introduction to Six Sigma for White Belts
  • 1.1 What is Six Sigma
  • 1.2 Why Six Sigma Matters (Especially in IT)
Module 2 – Key Concepts Every White Belt Should Know
  • 2.1 Understanding Defects and Variation
  • 2.2 Speaking the Languages of Six Sigma
Module 3 – Six Sigma in Daily Work
  • 3.1 Your Role in a Six Sigma Team
  • 3.2 Thinking Like a Problem-Solver
Module 4 – Simple Tools to Get Started
  • 4.1 Visualizing and Understanding Processes
  • 4.2 Applying It All to Real Life
Module 5 – Building Practical Skills for Process Awareness
  • 5.1 Identifying Opportunities for Improvement
  • 5.2 Data Awareness for Non-Data People
  • 5.3 Everyday Quality Mindset
Module 6 – Moving Forward with Confidence
  • 6.1 Your Next Steps
  • 6.2 Six Sigma White Belt Course Closeout
Module 1 – Governance, Risk, & Compliance
  • CompTIA Security (CAS-005) Course Intro
  • 1.1 Security Program Management and Documentation
  • 1.2 Governance Frameworks
  • 1.3 Change and Configuration Management
  • 1.4 Data Governance in Staging Environments
  • 1.5 Risk Assessment and Management
  • 1.6 Risk Considerations
  • 1.7 Industry Information Security Standards
  • 1.8 Security and Reporting Frameworks
  • 1.9 Privacy Regulations
  • 1.10 Cross-Jurisdictional Compliance Requirements
  • 1.11 Threat Actors and Characteristics
  • 1.12 Attack Frameworks and Models
  • 1.13 Attack Surface Determination
  • 1.14 Security Challenges with Artificial Intelligence
Module 2 – Security Architecture
  • 2.1 Resilient System Design
  • 2.2 Software and Hardware Assurance Methods
  • 2.3 Continuous Integration-Continuous Deployment
  • 2.4 Secure Architecture Design
  • 2.5 Access Control Technologies
  • 2.6 Access Control Models
  • 2.7 Public Key Infrastructure
  • 2.8 Implementing Secure Cloud Capabilities
  • 2.9 Cloud Data Security Considerations
  • 2.10 Cloud Shared Responsibility Model
  • 2.11 Cloud Control Strategies
  • 2.12 Integrating Zero Trust in Secure Architecture
Module 3 – Security Engineering
  • 3.1 Subject Access Control
  • 3.2 Secrets Management
  • 3.3 Conditional Access
  • 3.4 Identity and Access Management Components
  • 3.5 Endpoint and Server Security
  • 3.6 Network Infrastructure Security Issues
  • 3.7 Network Misconfigurations
  • 3.8 IDS and IPS Issues
  • 3.9 Domain Name Security
  • 3.10 Email Security
  • 3.11 Hardware Security Technologies and Techniques
  • 3.12 Securing Specialized and Legacy Systems
  • 3.13 Using Automation to Implement Security in the Enterprise
  • 3.14 Security Content Automation Protocol
  • 3.15 Examining Advanced Cryptographic Concepts
  • 3.16 Identifying Cryptographic Use Cases
  • 3.17 Applying Cryptographic Techniques
Module 4 – Security Operations
  • 4.1 Security Information and Event Management
  • 4.2 Data Aggregation Analysis
  • 4.3 Behavior Baselines and Analytics
  • 4.4 Incorporating Data Sources
  • 4.5 Alerting, Reporting and Metrics
  • 4.6 Attacks and Vulnerabilities
  • 4.7 Mitigating Attacks and Vulnerabilities
  • 4.8 Threat-hunting and Threat Intelligence
  • 4.9 Threat Intelligence Sources
  • 4.10 Analyzing Data and Artifacts
  • 4.11 Malware Analysis
  • 4.12 CompTIA SecurityX (CAS-005) Course Outro
Module 1 – Foundations of Power Skills in IT
  • 1.1 Introduction to IT-Focused Power Skills
  • 1.2 Evolving Skills for IT Success
Module 2 – Personal Effectiveness and Energy Management in IT
  • 2.1 Balancing Time and Energy in IT Projects
  • 2.2 Mental and Physical Stamina for IT Success
  • 2.3 Emotional and Professional Wellness in IT
Module 3 – Resiliency and Adaptability for IT Professionals
  • 3.1 Resiliency in the Face of Rapid IT Changes
  • 3.2 Adapting to New Technologies and Methodologies
  • 3.3 Building a Resilient IT Career Path
Module 4 – Emotional Intelligence and Interpersonal Skills in IT
  • 4.1 Self-Management for IT Problem Solving
  • 4.2 Interpersonal Skills for Cross-Functional IT Work
  • 4.3 Professional Communication in IT Teams
Module 5 – Collaboration and Team Dynamics in IT
  • 5.1 Essentials of Collaboration in IT Projects
  • 5.2 Communication and Conflict Resolution in IT
  • 5.3 Leading IT Teams Effectively
Module 6 – Business Acumen and Customer-Centric Service in IT
  • 6.1 Building IT Business Acumen
  • 6.2 Service Orientation for IT Professionals
  • 6.3 Applying Business Acumen for IT Efficiency
Module 7 – Strategic Decision Making and Problem Solving in IT
  • 7.1 Developing Strategic IT Thinking
  • 7.2 Decision-Making Frameworks for IT
  • 7.3 Creative Problem Solving for IT Challenges
Module 8 – Building a Growth Mindset and Personal Branding in IT
  • 8.1 Fostering a Growth Mindset for IT Learning
  • 8.2 Personal Branding for IT Professionals
  • 8.3 Assessing and Enhancing Your IT Brand
  • 8.4 Reflecting on Power Skills for IT Success
Module 1: Transitioning from Technical Expert to Manager
  • 1.1 Understanding the Shift to Management
  • 1.2 Developing a Management Mindset
  • 1.3 Self-Assessment and Goal Setting for New Managers
Module 2: Communication and Time Management Essentials
  • 2.1 Communication and Stakeholder Management
  • 2.2 Time and Priority Management
Module 3: Emotional Intelligence and Leadership Styles
  • 3.1 Emotional Intelligence for IT Leaders
  • 3.2 Leadership Styles and Adaptability
Module 4: Building and Leading Your Support Team
  • 4.1 Recruiting and Hiring Technical Staff
  • 4.2 Developing and Coaching Technical Support Teams
  • 4.3 Motivation and Team Building
  • 4.4 Managing Remote and Hybrid Teams
Module 5: Managing IT Support Operations
  • 5.1 Essential Support Processes and Frameworks
  • 5.2 Metrics, Reporting, and Continuous Improvement
  • 5.3 Service Level Agreements (SLAs) and Escalation Paths
Module 6: Strategic Leadership in IT Support
  • 6.1 Budgeting and Resource Planning
  • 6.2 Navigating Organizational Change
  • 6.3 Aligning IT Support with Business Objectives
Module 7: Advanced Scenarios for IT Support Leaders
  • 7.1 Crisis and Incident Management
  • 7.2 Vendor and Supplier Management
  • 7.3 Legal, Compliance, and Security Considerations
Module 8: Capstone and Leadership Development Planning
  • 8.1 Real-World Case Study Analysis
  • 8.2 Creating Your Leadership Development Plan
Module 1 – Introduction to Generative AI
  • 1.1 What Is Generative AI
  • 1.2 – History and Evolution
  • 1.3 – Where is Generative AI Being Used
  • 1.4 – Ethical Considerations
Module 2 – Understanding the Foundations
  • 2.1 Generative AI – Recap
  • 2.2 Exploring Large Language Models (LLMs)
  • 2.3 Accessing and Using LLMs
  • 2.4 Prompt Engineering
  • 2.5 – Embeddings and Fine-Tuning
Module 3 – Generative AI Tools
  • 3.1 – Explore ChatGPT – Features & Capabilities
  • 3.2 – Text Generation with ChatGPT
  • 3.3 – Image and Art Generation with AI
  • 3.4 – Fine-Tuning LLMs for Specific Needs
  • 3.5 How to Fine-Tune a Large Language Model (LLM)
Module 4 – Generative AI in Context
  • 4.1 Generative AI Applications in Software Development
  • 4.2 Applications of Generative AI in Retail
  • 4.3 Applications of Generative AI in Marketing
Module 5 – The Future of Generative AI
  • 5.1 Trends and Innovations
  • 5.2 Careers in Generative AI_ Opportunities and Pathways
  • 5.3 Popular Generative AI Tools
  • 5.4 Course Closing_ The Future is AI-Powered
Module 1: Foundations of Microsoft Licensing
  • 1.1 Why Licensing Matters
  • 1.2 Key Licensing Terminology Explained
Module 2: Microsoft Licensing Programs and Models
  • 2.1 Volume Licensing Overview
  • 2.2 Enterprise Agreement (EA) Model
  • 2.3 Cloud Solution Provider (CSP) Program
Module 3: Office vs. Microsoft 365 – Choosing the Right Plan
  • 3.1 Comparing Office Perpetual and Microsoft 365
  • 3.2 Microsoft 365 Plans Demystified
Module 4: Licensing Optimization and Strategy
  • 4.1 Common Pitfalls and How to Avoid Them
  • 4.2 Rightsizing Your Licensing Portfolio
  • 4.3 Tools and Resources for Licensing Management
Module 5: Compliance and Audit Readiness
  • 5.1 Staying Compliant
  • 5.2 Policies and Internal Governance
  • 5.3 Microsoft Licensing Course Closeout, Next Steps and Recommedations
Module 1: Getting Started with Web Development
  • 1.1 Introduction to Web Development
  • 1.2 How the Web Works Clients, Servers, and HTTPHTTPS
  • 1.3 Setting Up Your Development Environment (VS Code, Prettier)
  • 1.4 Introduction to Git & Version Control
  • 1.5 HTML, CSS, JavaScript The Big Picture
Module 2: HTML Foundations
  • 2.1 HTML Basics: Structure, Tags, and Attributes
  • 2.2 Text Formatting, Lists, and Headings
  • 2.3 Links, Navigation, and Anchors
  • 2.4 Working with Images and Multimedia
  • 2.5 Forms and Input Types
  • 2.6 Tables, Accessibility & Semantic HTML
  • 2.7 Validating HTML with W3C Standards
  • 2.8 Best Practices & Clean Code
Module 3: Styling with CSS
  • 3.1 CSS Basics: Selectors, Properties, and Values
  • 3.2 Box Model: Margins, Padding, Borders
  • 3.3 Typography: Fonts, Colors, and Line Heights
  • 3.4 Positioning: Static, Relative, Absolute, Fixed
  • 3.5 Introduction to Flexbox for Layouts
  • 3.6 CSS Grid for Advanced Layouts
  • 3.7 Media Queries & Mobile-First Design
  • 3.8 CSS Variables and Custom Properties
  • 3.9 Pseudo-elements & Pseudo-classes
  • 3.10 CSS Animations & Transitions
  • 3.11 Writing Maintainable CSS (BEM, File Organization)
  • 3.12 Performance Optimization: Lazy Loading & Best Practices
Module 4: Bootstrap, Fast and Efficient CSS
  • 4.1 Introduction to Bootstrap and the Grid System
  • 4.2 Bootstrap Components: Buttons, Cards, Forms, and Modals
  • 4.3 Customizing Bootstrap with CSS
  • 4.4 Using Bootstrap Utilities for Rapid Prototyping
  • 4.5 Best Practices for Responsive Design with Bootstrap
  • 4.6 Bootstrap vs. Custom CSS: When to Use Which?
Module 5: JavaScript Fundamentals
  • 5.1 Introduction to JavaScript: Variables and Data Types
  • 5.2 Operators, Expressions, and Type Coercion
  • 5.3 Conditionals: if, else, switch
  • 5.4 Loops: for, while, forEach, for…of
  • 5.5 Functions: Regular, Arrow Functions, and Parameters
  • 5.6 Working with Arrays & Objects (Methods, Iteration)
  • 5.7 Scope and Closures: Understanding this
  • 5.8 JavaScript Debugging and Console Methods
  • 5.9 Writing Clean JavaScript Code (Best Practices)
  • 5.10 ES6+ Features (Destructuring, Spread & Rest Operators)
Module 6: Interactive Web Pages with JavaScript & DOM
  • 6.1 Understanding the DOM and How Browsers Render Pages
  • 6.2 Selecting and Modifying Elements (querySelector, getElementById)
  • 6.3 Event Handling (click, keydown, mouseover, input)
  • 6.4 Creating and Removing Elements Dynamically
  • 6.5 Form Handling and Validation
  • 6.6 Local Storage & Session Storage
  • 6.7 Real-World DOM Project: Interactive Form with Validation
Module 7: Working with APIs & AJAX
  • 7.1 Introduction to APIs and AJAX
  • 7.2 Fetch API: Making HTTP Requests
  • 7.3 Handling JSON Data in JavaScript
  • 7.4 Form Submissions with JavaScript
  • 7.5 Error Handling and Debugging API Calls
  • 7.6 Real-World API Project: Fetching & Displaying Data
Module 8: AI-Assisted Coding
  • 8.1 Introduction to AI-Powered Coding (GitHub Copilot, ChatGPT)
  • 8.2 Using AI to Generate HTML & CSS Code
  • 8.3 Using AI to Optimize JavaScript
  • 8.4 Best Practices for AI-Assisted Development
Module 9: Web Hosting & Deployment
  • 9.1 What is Web Hosting? (Netlify)
  • 9.2 Deploying a Website Using Netlify
  • 9.3 Security Considerations for Deployed Websites
Module 10: Final Project : Building a Portfolio Website
  • 10.1 Structuring the Portfolio with HTML & Bootstrap
  • 10.2 Styling the Portfolio with CSS & Animations
  • 10.3 Adding JavaScript for Interactivity
  • 10.4 Implementing Form Handling & Validation
  • 10.5 Publishing & Sharing Your Portfolio
Module 1: Introduction to Cloud Strategy and Microsoft CAF
  • 1.1 Why Cloud Transformation Needs a Framework
  • 1.2 Overview of the Microsoft Cloud Adoption Framework (CAF)
Module 2: Strategy – Defining Your Business Case
  • 2.1 Establishing Business Justification
  • 2.2 Building a Cloud Adoption Strategy
Module 3: Planning – Preparing for Success
  • 3.1 Assembling the Right Teams
  • 3.2 Skills Readiness and Organizational Alignment
  • 3.3 Creating the Adoption Plan
Module 4: Ready – Preparing Your Cloud Environment
  • 4.1 Landing Zones and Environment Design
  • 4.2 Subscription and Resource Organization
Module 5: Adopt – Migration and Innovation
  • 5.1 Cloud Migration Approaches
  • 5.2 Cloud Innovation Opportunities
Module 6: Govern – Establishing Governance and Compliance
  • 6.1 Creating a Cloud Governance Strategy
  • 6.2 Risk Management and Compliance
Module 7: Manage – Operational Excellence in the Cloud
  • 7.1 Operational Management Principles
  • 7.2 Cost Management and Optimization
Module 8: Real-World Application and Transformation Leadership
  • 8.1 Case Study Review
  • 8.2 Leading Cloud Transformation as an IT Leader
  • 8.3 Microsoft CAF Course Closeout_ Key Takeaways and Next Steps
Module 1: Understanding Emotional Intelligence
  • 1.1 What Is Emotional Intelligence?
  • 1.2 Why EQ Is Critical in IT Environments?
Module 2: Building Self-Awareness and Self-Regulation
  • 2.1 Developing Self-Awareness
  • 2.2 Practicing Self-Regulation
Module 3: Leading with Empathy and Social Skills
  • 3.1 Understanding and Using Empathy
  • 3.2 Improving Interpersonal Effectiveness
Module 4: Applying EQ in Real-World IT Scenarios
  • 4.1 Managing Conflict with EQ
  • 4.2 Leading Under Pressure
Module 5: Advancing EQ for Long-Term Leadership Growth
  • 5.1 Emotional Intelligence in Remote & Hybrid Teams
  • 5.2 Creating a Culture of EQ on Your Team
  • 5.3 EQ and Career Advancement
  • 5.4 Your EQ Growth Plan and Closeout
Module 1 – The Nature of Leadership in IT
  • 1.1 What Makes Leadership in IT Unique
  • 1.2 Leadership vs. Management in IT
Module 2 – The Transition From Peer to Manager
  • 2.1 Making The Shift
  • 2.2 New Responsibilities and Mindsets
Module 3 – Avoiding Early Leadership Mistakes
  • 3.1 Common Mistakes New IT Leaders Make
  • 3.2 Setting a Strong Foundation
Module 4 – Core Leadership Skills for Technical Teams
  • 4.1 Communicating as a Technical Leader
  • 4.2 Decision-Making in Complex Environments
  • 4.3 Coaching and Developing Technical Talent
Module 5 – Leading with Influence and Organizational Awareness
  • 5.1 Navigating Organizational Politics and Culture
  • 5.2 Leading Through Change and Uncertainty
  • 5.3 Building Cross-Functional Relationships
  • 5.4 Course Wrap-Up and Practical Advice for IT Leaders
Module 1 – Foundations of Sprint Planning and Meetings
  • 1.1 Understanding the Sprint Lifecycle
  • 1.2 Roles and Responsibilities in Agile Meetings
Module 2 – Preparing for Sprint Planning
  • 2.1 Setting Sprint Goals and Priorities
  • 2.2 Backlog Grooming for Sprint Planning
Module 3 – Conducting Effective Sprint Planning Sessions
  • 3.1 Structuring the Planning Meeting
  • 3.2 Engaging the Team in Planning
Module 4 – Running Daily Standups and Sprint Meetings
  • 4.1 Daily Standup Best Practices
  • 4.2 Sprint Reviews and Retrospectives
Module 5 – Overcoming Challenges in Sprint Planning and Meetings
  • 5.1 Addressing Anti-Patterns in Sprint Meetings
  • 5.2 Adapting for Team Dynamics and Remote Work
Module 6 – Enhancing Collaboration and Communication
  • 6.1 Effective Facilitation Techniques
  • 6.2 Continuous Improvement in Agile Meetings
Module 7 – Real-World Application and Continuous Learning
  • 7.1 Sprint Meeting Scenarios and Case Studies
  • 7.2 Course Recap and Strategies for Ongoing Improvement
Module 1 – IT Compliance Introduction
  • 1.1 Introduction to the IT Role in Compliance
  • 1.2 Overview of Regulations
Module 2 – General Data Protection Regulation (GDPR)
  • 2.1 Overview of GDPR
  • 2.2 Ensuring and Implementing GDPR Comp
  • 2.3 – Penalties and Repercussions for GDPR Non-Compliance
  • 2.4 – GDPR Extra References
Module 3 – Health Insurance Portability and Accountability Act (HIPAA)
  • 3.1 – Overview of HIPAA
  • 3.2 – Ensuring and Implementing HIPAA Compliance
  • 3.3 – Penalties and Repercussions for HIPAA Non-Compliance
  • 3.4 – HIPAA Extra Resources
Module 4 – Federal Information Security Management Act (FISMA)
  • 4.1 – Overview of FISMA
  • 4.2 – Ensuring and Implementing FISMA Compliance
  • 4.3 – Penalties and Repercussions of FISM Non-Compliance
  • 4.4 – FISMA Extra Resources
Module 5 – Sarbanes-Oxley Act (SOX)
  • 5.1 – Introduction to SOX
  • 5.2 – Ensuring and Implementing SOX Compliance
  • 5.3 – Penalties and Repercussions for SOX Non-Compliance
  • 5.4 SOX Extra References
Module 6 – Payment Card Industry Data Security Standard (PCI DSS)
  • 6.1 – Overview of PCI DSS
  • 6.2 – Ensuring and Implementing PCI DSS Compliance
  • 6.3 – Penalties and Repercussions for PCI DSS Non-Compliance
  • 6.4 – PCI DSS Extra References
Module 7 – Cybersecurity Maturity Model Certification (CMMC)
  • 7.1 Introduction to CMMC and Its Purpose
  • 7.2 Ensuring and Implementing CMMC Compliance
  • 7.3 Repercussions for CMMC Non-Compliance
  • 7.4 CMMC Extra References
Module 8 – California Consumer Privacy Act (CCPA)
  • 8.1 Overview of CCPA
  • 8.2 Ensuring and Implementing CCPA Compliance
  • 8.3 Penalties and Repercussions for CCPA Non-Compliance
  • 8.4 CCPA Extra References
Module 9 – ISO/IEC 27001 Compliance
  • 9.1 Overview of ISO/IEC 27001
  • 9.2 Ensuring and Implementing ISO/IEC 27001 Compliance
  • 9.3 Repercussions for ISO/IEC 27001 Non-Compliance
  • 9.4 ISO/IEC 27001 Extra References
Module 10 – Children's Online Privacy Protection Act
  • 10.1 Children's Online Privacy Protection Act (COPPA)
  • 10.2 Ensuring and Implementing COPPA Compliance
  • 10.3 Penalties and Repercussions for COPPA Non-Compliance
  • 10.4 COPPA Extra References
Module 11 – NIST Cybersecurity Framework (CSF)
  • 11.1 Overview of NIST CSF
  • 11.2 Ensuring and Implementing NIST CSF Compliance
  • 11.3 Repercussions for NIST CSF Non-Compliance
  • 11.4 NIST CSF Extra References
Module 12 – Gramm-Leach-Bliley Act (GLBA)
  • 12.1 Overview of GLBA
  • 12.2 Ensuring and Implementing GLBA Compliance
  • 12.3 Penalties and Repercussions for GLBA Non-Compliance
  • 12.4 GLBA Extra References
Module 13 – ISO 22301 Business Continuity Management
  • 13.1 Overview of ISO 22301
  • 13.2 Ensuring and Implementing ISO 22301 Compliance
  • 13.3 Repercussions for ISO 22301 Non-Compliance
  • 13.4 BCM Extra References
Module 14 – Cloud Security Alliance (CSA) CCM
  • 14.1 Overview of CSA CCM
  • 14.2 Ensuring and Implementing CSA CCM Compliance
  • 14.3 Repercussions for CSA CCM Non-Compliance
  • 14.4 CSA Extra References
Module 15 – Family Educational Rights and Privacy Act
  • 15.1 Overview of FERPA
  • 15.2 Ensuring and Implementing FERPA Compliance
  • 15.3 Penalties and Repercussions for FERPA Non-Compliance
  • 15.4 FERPA Extra References
Module 16 – Digital Millennium Copyright Act (DMCA)
  • 16.1 Overview of DMCA
  • 16.2 Ensuring and Implementing DMCA Compliance
  • 16.3 Penalties and Repercussions for DMCA Non-Compliance
  • 16.4 DMCA Extra References
  • 16.5 – IT Compliance Course Closeout
Module 1 – Mobile Devices
  • 1.0 CompTIA A+ Course Intro
  • 1.1 Mobile Device Hardware and Components
  • 1.2 Mobile Device Connections and Accessories
  • 1.3 Mobile Device Operating Systems
  • 1.4 Troubleshooting Mobile Devices
  • 1.5 Mobile Device,OS and Application Issues
  • 1.6 Mobile Device,OS and Application Security
  • 1.7 Identifying Connection Settings in Android
  • 1.8 Identifying Connection Settings in iOS
Module 2 – Networking
  • 2.1 Network Architecture
  • 2.2 Ports and Protocols
  • 2.3 Wireless Networking
  • 2.4 Network Hosts and Services
  • 2.5 DNS and DHCP
  • 2.5.1 Demo – Working with DNS and DHCP
  • 2.6 VPNs and VLANs
  • 2.7 Network Devices
  • 2.8 Basic SOHO Configuration
  • 2.9 Internet Connections and Network Types
  • 2.10 Networking Tools
  • 2.11 Networking in Windows
  • 2.11.1 Demo – Configuring Networking in Windows
  • 2.12 Networking Commands
  • 2.12.1 Demo – Working with Networking Commands
  • 2.13 Troubleshooting Network Issues
Module 3 – Hardware
  • 3.1 Display Components and Attributes
  • 3.2 Basic Cables and Connections
  • 3.3 Network Cables and Connections
  • 3.4 Storage Devices and Connections
  • 3.5 Introduction to RAID
  • 3.6 Motherboards and Form Factors
  • 3.7 Motherboard Connections
  • 3.8 BIOS and UEFI
  • 3.9 CPUs and CPU Architecture
  • 3.10 Expansion Cards
  • 3.11 System Cooling
  • 3.12 Power Supply Units
  • 3.13 Printers and Multifunction Devices
  • 3.14 Printer Maintenance
  • 3.15 Troubleshooting Computer Components
  • 3.16 Troubleshooting Storage and RAID Issues
  • 3.17 Troubleshooting Video and Display Issues
  • 3.18 Troubleshooting Printer Issues
Module 4 – Operating Systems
  • 4.1 Workstation Operating Systems
  • 4.2 Common File System Types
  • 4.3 Operating System Installation Types
  • 4.4 Operating System Boot Methods
  • 4.5 Storage Partitioning
  • 4.5.1 Demo – Working with Storage Partitions
  • 4.6 Identifying Windows Editions
  • 4.7 Windows Upgrades
  • 4.8 Windows OS Installations
  • 4.9 Using Windows Task Manager
  • 4.9.1 Demo – Working with Windows Task Manager
  • 4.10 MMC Snap-ins
  • 4.10.1 Demo – Working with MMC Snap-ins
  • 4.11 Windows Operating System Tools
  • 4.12 Microsoft Command Line Tools
  • 4.12.1 Demo – Working with Microsoft Command Prompt
  • 4.13 Configuring Microsoft Windows Settings
  • 4.14 Configuring Windows Power Options
  • 4.14.1 Demo – Working with Windows Power Options
  • 4.15 Windows File Explorer
  • 4.15.1 Demo – Working with File Explorer
  • 4.16 Windows Domains vs Workgroups
  • 4.17 macOS System Configuration
  • 4.17.1 Demo – macOS Features and Tools
  • 4.18 Linux Components
  • 4.19 Linux Tools
  • 4.20 Common Application Installation
Module 5 – Virtualization and Cloud Computing
  • 5.1 Virtualization Concepts
  • 5.1.1 Demo – Working with Virtual Machines
  • 5.2 Cloud Computing
  • 5.2.1 Demo – Working with the Cloud
  • 5.3 Cloud Productivity Tools
Module 6 – Security
  • 6.1 Physical Security
  • 6.2 Physical Access Security
  • 6.3 Logical Security
  • 6.4 Windows Security – Firewalls and Antivirus
  • 6.4.1 Demo – Working with the Windows Firewalls and Antivirus
  • 6.5 Windows Security Users and Groups
  • 6.6 Windows Security – NTFS and Share Permissions
  • 6.6.1 Demo – Working with NTFS and Share Permissions
  • 6.7 Windows Security – Active Directory
  • 6.8 Windows Security – Data Encryption
  • 6.9 Wireless Security
  • 6.10 Malware Types
  • 6.11 Malware Detection and Prevention
  • 6.12 Social Engineering
  • 6.13 Security Threats
  • 6.13.1 Demo – Security Vulnerabilities
  • 6.14 Malware Removal Process
  • 6.15 Workstation Security
  • 6.16 Data Destruction Concepts
  • 6.17 SOHO Network Security
  • 6.18 Browser Security Settings
  • 6.19 Troubleshooting PC Security Issues
Module 7 – Operational Procedures
  • 7.1 Ticketing Systems
  • 7.2 Asset Management
  • 7.3 Document Types
  • 7.4 Change Management
  • 7.5 Workstation Backup and Recovery
  • 7.6 Common Safety Procedures
  • 7.7 Environmental Impact and Controls
  • 7.8 Licensing and Policy Concepts
  • 7.9 Communication and Professionalism
  • 7.10 Basics of Scripting
  • 7.11 Remote Access Technologies
  • 7.12 Basics of Artificial Intelligence
  • 7.13 Troubleshooting Methodology
  • 7.14 CompTIA A+ Course Closeout
Module 1 – Understanding Agile Testing Fundamentals
  • 1.1 What is Agile Testing
  • 1.2 Agile Testing vs. Traditional Testing
Module 2 – Agile Methodologies: Scrum and Kanban for QA
  • 2.1 Scrum Overview and Testing Integration
  • 2.2 Kanban Overview and Testing Integration
Module 3 – Continuous Integration and Continuous Testing
  • 3.1 Understanding Continuous Integration (CI)
  • 3.2 Implementing Continuous Testing
Module 4 – Effective Collaboration in Agile Testing
  • 4.1 Developer and QA Collaboration
  • 4.2 Collaboration Techniques and Tools
Module 5 – Real-world Agile Testing Practices (Case Studies & Examples)
  • 5.1 Agile Testing in Practice
  • 5.2 Agile Testing Metrics and Improvement
  • 5.3 Course Review and Next Steps
Module 1 – Introduction to IT Asset Management (ITAM)
  • 1.1 What is IT Asset Management?
  • 1.2 The Benefits of ITAM
  • 1.3 ITAM Frameworks and Standards
Module 2 – Asset Lifecycle Management
  • 2.1 IT Asset Lifecycle Management
  • 2.2 Asset Procurement and Acquisition
  • 2.3 IT Asset Deployment and Utilization
Module 3 – IT Asset Inventory Management
  • 3.1 Building and Maintaining an IT Asset Inventory
  • 3.2 Asset Tagging and Identification
  • 3.3 Software Asset Management (SAM)
Module 4 – IT Asset Maintenance and Support
  • 4.1 Asset Monitoring and Maintenance
  • 4.2 IT Support and Service Desk Integration
  • 4.3 Managing End-of-Life (EOL) Assets
Module 5 – IT Asset Financial Management
  • 5.1 Financial Aspects of IT Asset Management
  • 5.2 Cost Optimization in IT Asset Management
  • 5.3 Asset Valuation and Reporting
Module 6 – IT Asset Compliance and Security
  • 6.1 Compliance and ITAM
  • 6.2 IT Asset Security
  • 6.3 Auditing IT Assets
Module 7 – IT Asset Management Tools and Technologies
  • 7.1 ITAM Tools and Platforms
  • 7.2 Automation and Emerging Trends in ITAM
Module 8 – Best Practices and Continuous Improvement
  • 8.1 Developing an ITAM Policy
  • 8.2 ITAM Governance and Stakeholder Engagement
  • 8.3 Continuous Improvement in ITAM
Module 1 – What is AI and How is It Used in IT Support?
  • 1.1 What is AI and How is It Used in IT Support?
  • 1.2 AI as an Enhancement, Not a Replacement
  • 1.3 Essential AI Tools for IT Support Professionals
Module 2 – AI-Powered Tools That Improve IT Support Efficiency
  • 2.1 AI Chatbots and Virtual Assistants for IT Help Desks
  • 2.2 AI in Ticketing and Incident Management
  • 2.3 AI-Driven Knowledge Bases for IT Support
  • 2.4 AI for Remote IT Support and Preventative Maintenance
Module 3 – Integrating AI into Daily IT Support Workflows
  • 3.1 Automating Routine IT Tasks with AI
  • 3.2 AI in Proactive Issue Detection and Prevention
  • 3.3 AI-Driven Security Monitoring for IT Support
Module 4 – Developing AI Skills for IT Support Specialists
  • 4.1 Building AI Literacy for IT Support Roles
  • 4.2 Working with AI-Enhanced IT Service Management (ITSM) Platforms
  • 4.3 Communicating AI Insights to Users and Management
Module 5 – Applying AI in IT Support Teams
  • 5.1 Practical AI Implementation for IT Support Teams
  • 5.2 Career Growth Strategies for IT Support Specialists in an AI
Module 1 – Engagement Management
  • 1.1 Pre Engagement Activities
  • 1.2 Collaboration and Communication Activities
  • 1.3 Testing Frameworks and Methodologies
  • 1.3.1 Examining MITRE ATT&CK
  • 1.4 Engagement Management Review
Module 2 – Reconnaissance and Enumeration
  • 2.1 Passive Reconnaissance
  • 2.1.1 Google Hacking
  • 2.2 Active Reconnaissance
  • 2.2.1 Port Scanning and Fingerprinting
  • 2.2.2 Tracing a Network Path with Traceroute
  • 2.2.3 Intercepting Data with Wireshark
  • 2.2.4 Web Scraping
  • 2.3 Enumeration Techniques
  • 2.3.1 Directory Enumeration
  • 2.3.2 Email Enumeration
  • 2.4 Reconnaissance and Enumeration Scripts
  • 2.4.1 Using Scripts
  • 2.5 Reconnaissance and Enumeration Tools
  • 2.5.1 Perform OSINT with Recon ng
  • 2.5.2 Adding an API Key to Recon ng
  • 2.5.3 Discovering IoT with Shodan
  • 2.5.4 Performing WHOIS Lookups
  • 2.5.5 Performing DNS Lookups
  • 2.5.6 Using NMAP Scripts
  • 2.5.7 Performing OSINT with theHarvester
  • 2.6 Reconnaissance and Enumeration Review
Module 3 – Vulnerability Discovery and Analysis
  • 3.1 Vulnerability Discovery
  • 3.1.1 Performing a Vulnerability Scan with OpenVAS
  • 3.1.2 Performing Static Code Analysis
  • 3.2 Reconnaissance, Scanning and Enumeration Output Analysis
  • 3.3 Physical Security
  • 3.3.1 Cloning an RFID Badge
  • 3.3.2 Cloning NFC with Flipper Zero
  • 3.4 Vulnerability Discover and Analysis Review
Module 4 – Attacks and Exploits
  • 4.1 Prioritize and Prepare Attacks
  • 4.2 Network Attacks
  • 4.2.1 Performing an On Path Attack
  • 4.2.2 Executing a Network Attack with Metasploit
  • 4.2.3 Migrating Meterpreter to Another Process
  • 4.2.4 Creating a Malware Dropper with Msfvenom
  • 4.2.5 Using Netcat
  • 4.2.6 Capturing Files with Wireshark
  • 4.3 Authentication Attacks
  • 4.3.1 Brute Forcing with Medusa
  • 4.3.2 Pass the Hash
  • 4.3.3 Password Spraying with Hydra
  • 4.3.4 Pass the Token Attack
  • 4.3.5 Spoofing Authentication with Responder
  • 4.3.6 Cracking Linux Passwords with John the Ripper
  • 4.3.7 Hashcat Password Cracking
  • 4.4 Host Based Attacks
  • 4.4.1 Privilege Escalation with Eternal Blue
  • 4.4.2 Log Tampering
  • 4.4.3 Pwn a Linux Target from Start to Finish
  • 4.5 Web Application Attacks
  • 4.5.1 Performing Directory Traversal
  • 4.5.2 Grabbing Passwords with SQL Injection
  • 4.5.3 SQLi on a Live Website Part 1
  • 4.5.4 SQLi on a Live Website Part 2
  • 4.5.5 Command Injection
  • 4.5.6 Injecting an iFrame with Stored XSS
  • 4.5.7 Busting the DOM
  • 4.5.8 IDOR Abuse with Burp Suite
  • 4.5.9 Web Session Hijacking
  • 4.5.10 Parameter Tampering with Burp Suite
  • 4.6 Cloud Based Attacks
  • 4.6.1 Hacking S3 Buckets
  • 4.7 Wireless Attacks
  • 4.7.1 WiFi Pumpkin Evil Twin
  • 4.7.2 WPA2 Crack Attack
  • 4.8 Social Engineering Attacks
  • 4.8.1 Phishing for Credentials
  • 4.8.2 OMG Cable Baiting
  • 4.9 Specialized System Attacks
  • 4.9.1 Pwn a Mobile Device
  • 4.10 Automated Script Attacks
  • 4.11 Attacks and Exploits Review
Module 5 – Post-exploitation and Lateral Movement
  • 5.1 Establishing and Maintaining Persistence
  • 5.1.1 Creating a Persistent Netcat Back Door
  • 5.1.2 Exfiltrating Data with a Scheduled Task
  • 5.2 Lateral Movement
  • 5.2.1 Preparing to Pivot
  • 5.2.2 Lateral Movement through Pivoting
  • 5.3 Staging and Exfiltration
  • 5.3.1 Hiding Data with Steganography
  • 5.3.2 Automatically Exfiltrating Data
  • 5.4 Cleanup and Restoration
  • 5.5 Post-Exploitation and Lateral Movement Review
Module 6 – Deliverables
  • 6.1 Penetration Test Report Components
  • 6.2 Report Findings and Recommendations
  • 6.2.1 Examining Pentest Reports
  • 6.3 Deliverables Review
  • 6.4 Course Conclusion
Module 1 – Preparing For and Taking the Exam
  • 1.1 What's New for CAPM in V7
  • 1.2 CAPM Certification Overview
  • 1.3 CAPM Exam Overview
  • 1.4 Mastering the CAPM 7th Edition Exam Tips for Success
  • 1.5 Maintaining Your CAPM Certification A Practical Guide
Module 2 – Project Management Fundamentals and Core Concepts
  • 2.1 Project Life Cycles and Processes
  • 2.2 Project Management Planning Activities
  • 2.3 Project Roles and Responsibilities
  • 2.4 Following and Executing Planned Strategies and Frameworks
  • 2.5 Common Problem-Solving Tools and Techniques
Module 3 – Predictive/Plan Based Methodologies
  • 3.1 When to Use Predictive Approaches in Project Management
  • 3.2 Understanding the Project Management Plan Schedule
  • 3.3 Project Controls for Predictive Projects
Module 4 – Agile Frameworks and Methodologies
  • 4.1 Suitability and Application of Adaptive Approaches
  • 4.2 Planning Project Iterations
  • 4.3 Project Controls for Adaptive Projects
  • 4.4 Adaptive Methodologies and Their Components
  • 4.5 Prioritization of Tasks in Adaptive Projects
Module 5 – Business Analysis Frameworks
  • 5.1 Business Analyst Roles and Responsibilities
  • 5.2 Stakeholder Communication
  • 5.3 Gathering Requirements for CAPM Certification
  • 5.4 Product Roadmaps
  • 5.5 How Project Methodologies Influence Business Analysis Processes
  • 5.6 Validating Project Requirements Through Product Delivery
  • 5.7 Wrapping Up Your CAPM Journey
Module 1: Understanding Social Networking in the Workplace
  • 1.1 – What is Social Networking
  • 1.2 – Why Social Networking is an Employment and Labor Law Issue
Module 2: Social Networking and the Recruiting Process
  • 2.1 – Social Networking in Recruitment
  • 2.2 – Discrimination Risks in Social Networking-Based Recruitment
  • 2.3 – Employer Strategies for Social Media Background Checks
Module 3: Employees' Social Networking Use, HR Concerns, and Potential Legal Issues
  • 3.1 – On-Duty and Off-Duty Social Networking Behavior
  • 3.2 – Handling Social Networking Issues Without Risking Discrimination
  • 3.3 – Legal Consequences of Failing to Address Social Networking
Module 4: Regulatory Views, Employee Rights, and State Laws
  • 4.1 – NLRB Guidance on Employees’ Social Networking
  • 4.2 – Privacy Rights of Employees on Social Networking Sites
  • 4.3 – Overview of State Laws on Employer Access to Social Networking
Module 5: Developing a Social Networking Policy
  • 5.1 – Essentials of a Social Networking Policy
  • 5.2 – Course Closeout, Key Takeaways and Final Thoughts
Module 1: Networking Concepts
  • 1.1 Networking Overview
  • 1.1.1-Activity-Creating a Network
  • 1.2 OSI and DOD Model
  • 1.2.1-Activity-Examining the OSI Layers
  • 1.3 Networking Appliances, Applications and Functions
  • 1.3.1-Activity-Using Online Proxies
  • 1.4 Cloud Concepts and Connectivity
  • 1.4.1-Activity-Creating Cloud Resources
  • 1.5 Ports, Protocols, Services and Traffic Types
  • 1.5.1-Activity-Examining ARP and ICMP
  • 1.5.2-Activity-Examining DNS and Ports
  • 1.6 Wireless Transmission Media
  • 1.6.1-Activity-Configuring-WiFi
  • 1.7 Wired Transmission Media and Transceivers
  • 1.8 Network Topologies, Architectures and Types
  • 1.9a IPv4 Network Addressing – Part 1
  • 1.9b IPv4 Network Addressing – Part 2
  • 1.9.1-Activity-Configuring Client IP Settings
  • 1.9.2-Activity-Subnetting – Delta 128
  • 1.9.3-Activity-Subnetting-Delta-64
  • 1.9.4-Activity-Subnetting WAN Links
  • 1.10a Modern Network Environments – Part 1
  • 1.10b Modern Network Environments – Part 2
Module 2: Network Implementation
  • 2.1 Implementing Routing Technologies
  • 2.1.1-Activity-Setting Up Basic Routing
  • 2.1.2-Activity-Adding Static Routes
  • 2.1.3-Activity- Configuring Routing Protocols
  • 2.1.4-Activity-Configuring Port Address Translation
  • 2.2 Configuring Switching Technologies and Features
  • 2.2.1-Activity-Connecting Devices with a Switch
  • 2.2.2-Activity-Creating VLANs
  • 2.2.3-Activity-Voice and Data VLANs
  • 2.2.4-Activity-VLAN-Trunking
  • 2.2.5-Activity-VLAN Routing
  • 2.3 Selecting and Configuring Wireless Devices and Technologies
  • 2.3.1-Activity-Creating a WLAN
  • 2.4 Physical Installations
  • 2.4.1-Activity-Managing Cable
  • 2.4.2-Activity-Punching Down Twisted Pair
Module 3: Network Operations
  • 3.1 Organizational Processes and Procedures
  • 3.2 Network Monitoring Technologies
  • 3.2.1-Activity-Exploring SNMP
  • 3.3 Disaster Recovery (DR)
  • 3.4 IPv4 and IPv6 Network Services
  • 3.4.1-Activity-Implementing a DHCP Relay Agent-Part 1
  • 3.4.2-Activity-Implementing a DHCP Relay Agent-Part 2
  • 3.4.3-Activity-DNS-Part 1
  • 3.4.4-Activity-DNS-Part 2
  • 3.5 Network Access and Management
Module 4: Network Security
  • 4.1a Network Security Concepts – Part 1
  • 4.1b Network Security Concepts – Part 2
  • 4.1.1-Activity-Exploring Encryption
  • 4.1.2-Activity-Applying Authorization
  • 4.1.3-Activity-Testing a Honeypot
  • 4.2 Network Attacks
  • 4.2.1-Activity-Launching a Denial of Service Attack
  • 4.2.2-Activity-Phishing for Credentials
  • 4.2.3-Activity-Deploying a Malicious Charging Cable
  • 4.3 Network Defense
  • 4.3.1-Activity-Implementing ACLs
Module 5: Network Troubleshooting
  • 5.1 Troubleshooting Methodology
  • 5.2 Common Cabling and Physical Interface Issues
  • 5.2.1-Activity-Selecting the Right Cable
  • 5.2.2-Activity-Crimping an RJ-45 End on a Cable
  • 5.3 Network Service Issues
  • 5.3.1-Activity-Troubleshooting a Routed Network
  • 5.4 Performance Issues
  • 5.5 Troubleshooting Tools and Protocols
  • 5.5.1-Activity-Using Command Line Commands
  • 5.5.2-Activity-Using NSLOOKUP and DIG
  • 5.5.3-Activity-Using NMAP
  • 5.5.4-Activity-Troubleshooting Using CDP and LLDP
  • 5.5.5-Activity-Testing a cable
  • 5.5.6-Activity-Toning a cable
  • 5.5.7-Activity-Using a Spectrum Analyzer
  • 5.5.8-Activity-Testing a Fiber Optic Cable
  • 5.5.9-Activity-Using Network Device Commands
  • 5.6 Course Closeout
Introduction – Certified Cloud Pre-Sales Cloud Solutions Architect (CCPSA)
  • Course Introduction
  • Instructor Introduction
  • Why take the CCPSA Exam and Course
  • Exam Objectives
  • Discussion – The Importance of Sales & Solutions Engineering
CCPSA Module 1 – Domain 1 – Customer Management (Course 1)
  • 1.1.1 Customer Management
  • 1.1.2 Customer Management Fundamentals
  • 1.1.3 What is Customer Management
  • 1.1.4 Understanding Customer Acquisition
  • 1.1.5 Enhancing Customer Engagement
  • 1.1.6 Attending Customer Events
  • 1.1.7 Understanding the Buyer
  • 1.1.8 Conducting Discovery
  • 1.1.9 Identifying and Qualify the Opportunity
  • 1.1.10 Create That Win Win Situation
  • 1.1.11 Solution Selling Mindset
  • 1.2.1 Become a Trusted Advisor
  • 1.2.2 What is a Trusted Advisor
  • 1.2.3 Traits of a Trusted Advisor
  • 1.2.4 Objection Handling
  • 1.2.5 Presenting a Business Case
  • 1.2.6 Creating Value Propositions (Uplift Metrics)
  • 1.2.7 Importance of Expertise
  • 1.2.8 Executive Messaging
  • 1.2.9 Story Telling
  • 1.2.10 SaaS Enablement Tools
  • 1.2.11 Module Review
  • 1.2.12 Module Review Questions
CCPSA Module 2 – Domain 2 – Sales Engineering Skills (Course 2)
  • 2.1.1 Sales Engineering Skills
  • 2.1.2 What is Pre Sales Engineering
  • 2.1.3 What is Sales Engineering
  • 2.1.4 Discussion – Presales vs Solutions Engineering
  • 2.1.5 Cloud Fundamentals
  • 2.1.6 Cloud Infrastructure
  • 2.1.7 Cloud APIS
  • 2.1.8 Cloud Considerations
  • 2.2.1 Responding to Customer Procurement Requirements
  • 2.2.2 Request for Proposals (RFP)
  • 2.2.3 Proposals Response
  • 2.2.4 Design Solutions Architectures
  • 2.2.5 What is a Cloud Fit
  • 2.2.6 Analytical Thinking
  • 2.3.1 Handling US Federal Sector Requirements
  • 2.3.2 Why the US Federal Sector is So Different
  • 2.3.3 Proposal Teams
  • 2.3.4 Subject Matter Experts (SME)
  • 2.3.5 Searching for Opportunities
  • 2.4.1 Handling Sales Engineering Activities
  • 2.4.2 Closing a Solution Deal
  • 2.4.3 Defining Expectations
  • 2.4.4 Defining Customer Discussion Agenda
  • 2.4.5 Pyramid Principle (Minto Pyramid)
  • 2.4.6 Proof of Concepts (POC)
  • 2.4.7 Demonstration – Performing Demonstrations
  • 2.4.8 Whiteboarding Best Practices
  • 2.4.9 Vendor Cost Optimization
  • 2.4.10 Using Solutions Collateral
  • 2.4.11 Module Review
  • 2.4.12 Review Questions
CCPSA Module 3 – Domain 3 – Sales and Financial Skills (Course 3)
  • 3.1.1 Sales and Financial Skills
  • 3.1.2 The Sales Process
  • 3.1.3 Creating Value in Sales Process
  • 3.1.4 Leading the conversation
  • 3.1.5 Asking the Right Questions
  • 3.1.6 Identifying Client Needs and Goals
  • 3.1.7 Highlighting Value Propositions
  • 3.1.8 Impacts and Opportunities
  • 3.2.1 Common Sales Team Organizational Structures
  • 3.2.2 Sales Team Organization Mapping
  • 3.2.3 SE-AE Ratio
  • 3.2.4 Sales Territories
  • 3.2.5 Proposal Team Structure
  • 3.3.1 Understanding the Sales Cycle and Activities
  • 3.3.2 Sales Cycles
  • 3.3.3 Sales Pipelines
  • 3.3.4 Inside Sales Leads
  • 3.3.5 What is the Deals Desk
  • 3.3.6 Selling into Specific Industries
  • 3.4.1 Important Sales Financial Terminology
  • 3.4.2 Estimating Return on Investments (ROI)
  • 3.4.3 Estimating Total Cost of Ownership (TCO)
  • 3.4.4 Cost of Customer Acquisition (COCA)
  • 3.4.5 Understanding CAPEX and OPEX
  • 3.4.6 Key Performance Indicators (KPI)
  • 3.4.7 Sales Team Compensation Structure
  • 3.4.8 Module Review
  • 3.4.9 Module Review Questions
  • 3.4.10 Course Closeout
Section 2: Advanced Capabilities
  • 2.1 Advanced Capabilities
  • 2.2 Deployment Options (node types, cluster options, etc.)
  • 2.3 Multi-AZ deployment with Amazon Redshift
  • 2.4 Backup and Recovery
  • 2.5 Demo -Deploy Cluster
  • 2.6 Demo – Resize Cluster
  • 2.7 Networking and Security
  • 2.8 Demo – Networking and Security
  • 2.9 HOE – Setup IAM and Deploy Cluster
  • 2.10 Whiteboard – Networking
  • 2.11 Demo – Connect to Database
  • 2.12 HOE – SQLWB
  • 2.13 Excel Connections
  • 2.14 Setting up and managing data ingestion with Amazon Redshift
  • 2.15 HOE – AWS S3 Data Load
  • 2.16 Monitoring Redshift
  • 2.17 Demo – Monitor Redshift
  • 2.18 HOE – Deploy an Amazon Redshift data warehouse cluster, load data into the cluster
  • 2.19 Amazon Redshift Spectrum
  • 2.20 Section Review
  • 2.21 Review Questions
  • 2.22 Resources
  • 2.23 Course Closeout
Introduction – AWS Redshift Fundamentals
  • Course Welcome
  • Course Overview
  • Course PreRequirements
Section 1: AWS Redshift Fundamentals
  • 1.1 Fundamentals of data warehouses and Amazon Redshift
  • 1.2 AWS Benefits and Limitations
  • 1.3 AWS Redshift Pricing
  • 1.4 Enterprise Use Cases
  • 1.5 Node Types
  • 1.6 Cluster Options
  • 1.7 Demo – Free Tier- Startup Credits
  • 1.8 Hands on Exercise 1 – Deploy a Cluster
  • 1.9 Whiteboard- Redshift Architecture
  • 1.10 Life of a Query
  • 1.11 Query and Cost Optimization
  • 1.12 Workload Management
  • 1.13 Whiteboard- Redshift WLM
  • 1.14 Redshift Performance Notes
  • 1.15 Column Oreiented structures
  • 1.16 Section Review
  • 1.17 Review Questions
Module 1: Understanding Soft Skills
  • 1.1 Course Overview
  • 1.2 Instructor Overview
  • 1.3 Understanding Soft Skills
  • 1.4 What are Soft Skills
  • 1.5 Why Soft Skills are important for Technical Roles
  • 1.6 What is a Cultural Fit
  • 1.7 Communication and Presentation Skills
  • 1.8 Attention to Details
  • 1.9 Critical Thinking and Problem-Solving Skills
  • 1.10 Tolerance to Change and Uncertainty
  • 1.11 Emotional Intelligence
  • 1.12 Motivation
  • 1.13 Compassion, Empathy and Humility
  • 1.14 Social Skills
  • 1.15 Leadership and Decision Making Skills
  • 1.16 Inspiration and Improvement Attitude
  • 1.17 Team Player
  • 1.18 Desire to Learn
  • 1.19 Open to Criticism and Feedback
  • 1.20 Conflict Resolution
  • 1.21 Work Ethics and Integrity
  • 1.22 Discussion – Common Soft Skills for Tech Sales Professionals
  • 1.23 Discussion – Common Soft Skills for Cloud Professionals
  • 1.24 Discussion – Common Soft Skills for Software Engineers, Programmers and Developers
  • 1.25 Module 1 Summary Review
  • 1.26 Module 1 Review Questions
Module 2: Preparing for the Tech Interview
  • 2.1 Preparing for the Tech Interview
  • 2.2 Getting Ready for a Tech Interview
  • 2.3 Showcase your Soft Skills
  • 2.4 How to Showcase Technical Skills with Soft Skills!
  • 2.5 Risk Assessment Used by Human Resources
  • 2.6 Addressing Company Specific Questions
  • 2.7 Topic Discussion Focus Common Soft Skills
  • 2.8 Module 2 Summary Review
  • 2.9 Module 2 Review Questions
  • 2.10 Course Resources and Closeout
Module 1 – Intro To GPC Disaster Recovery (DR) For SQL
  • 1.1 Introduction To Disaster Recovery (DR)
  • 1.2 Key DR Terminology and Concepts
Module 2 -DR Strategies for Microsoft SQL Server on GCP
  • 2.1 High Availability with Always On Availability Groups in GCP
  • 2.2 Commit Modes and Backup Strategies
Module 3 – Disaster Recovery Architectures and Operations on Google Cloud
  • 3.1 DR Deployment Architectures on GCP
  • 3.2 Active and Standby Modes in DR
  • 3.3 Executing Failover and Switchover Processes
  • 3.4 Testing and Validating DR Plans
Module 4 – Backup and Restore DR Strategy
  • 4.1 Integrating DR with Application Lifecycle
  • 4.2 Monitoring and Maintenance of DR Solutions
  • 4.3 Course Closing
Module 1: Crafting the Perfect Resume and Portfolio
  • 1.1 Beating the Bots – How to Get Past Automated Resume Screeners
  • 1.2 Understanding the IT Resume Essentials
  • 1.3 Tailoring Your Resume for Specific Roles
  • 1.4 Building an Impressive IT Portfolio
Module 2: Finding IT Job Opportunities
  • 2.1 Navigating IT Job Boards and Platforms
  • 2.2 Networking for IT Professionals
  • 2.3 Exploring Freelancing and Contract Work
Module 3: Preparing for IT Job Interviews
  • 3.1 Researching the Company and Role
  • 3.2 Preparing Your Elevator Pitch
  • 3.3 Building Confidence Through Mock Interviews
Module 4: Mastering Different Types of IT Interviews
  • 4.1 Succeeding in Remote Interviews
  • 4.2 Navigating In-Person Interviews
  • 4.3 Excelling in Team and Panel Interviews
Module 5: Conquering Technical Questions
  • 5.1 Tackling Common Technical Questions
  • 5.2 Handling Questions You Don’t Know
Module 6: The Power of Soft Skills in IT Careers
  • 6.1 Communication and Collaboration
  • 6.2 Emotional Intelligence and Adaptability
  • 6.3 Problem-Solving and Conflict Resolution
Module 7: Wrapping Up the Interview Process
  • 7.1 Post-Interview Follow-Up
  • 7.2 Negotiating Salary and Benefits
  • 7.3 Preparing for Your New Role
  • 7.4 Course Closeout
Module 1 – Foundations of Strategic Planning and Management in IT
  • 1.1 Strategic Planning and Management for IT Leaders
  • 1.2 Strategic Thinking for IT Leadership
Module 2 – Developing a Strategic Framework for IT
  • 2.1 Establishing Vision, Mission, and Strategic Goals for IT
  • 2.2 Assessing Internal and External Factors
  • 2.3 Creating Actionable Initiatives
Module 3 – Aligning IT Projects with Strategic Goals
  • 3.1 Bridging the Gap Between Strategy Design and Delivery
  • 3.2 Integrating Project Management and IT Strategy
  • 3.3 Prioritizing IT Projects in a Strategic Portfolio
Module 4 – Building Engagement and Buy-In for IT Strategy
  • 4.1 Creating an Inclusive Strategic Planning Process
  • 4.2 Communicating IT Strategy to Non-Technical Stakeholders
  • 4.3 Strengthening Team Commitment to IT Strategy
Module 5 – Strategic Goal Setting and SMART Metrics for IT
  • 5.1 Defining SMART Goals in an IT Context
  • 5.2 Developing Key Performance Indicators (KPIs) for IT
  • 5.3 Tracking and Adapting IT Goals Based on Performance
Module 6 – Managing IT Strategy Execution and Evaluation
  • 6.1 Overseeing IT Project Execution for Strategic Success
  • 6.2 Conducting Strategic Reviews and Assessments
  • 6.3 Lessons Learned and Continuous Improvement in IT Strategy
Module 7 – Sustaining Long-Term IT Strategy Success
  • 7.1 Managing and Updating IT Strategy for Long-Term Success
  • 7.2 Moving Forward as Strategic IT Leaders
Introduction – Responsible Automated Intelligence Ethics
  • Course Welcome
  • Instructor Introduction
Module 1: Introduction to AI Ethics
  • 1.1 Introduction to AI Ethics
  • 1.2 Understanding AI Ethics
  • 1.3 Ethical Frameworks and Principles in AI
  • 1.4 Ethical Challenges
  • 1.5 Whiteboard – Key Principles of Responsible AI
Module 2: Responsible AI Development
  • 2.1 Responsible AI Development – Introduction
  • 2.2 Responsible AI Development – Continued
  • 2.3 Bias and Fairness in AI
  • 2.4 Transparency in AI
  • 2.5 Demonstration – Microsoft Responsible AI
  • 2.6 Accountability and Governance in AI
Module 3: Privacy and Security with AI
  • 3.1 Privacy and Security in AI
  • 3.2 Data Collection and Usage
  • 3.3 Risks and Mitigation Strategies
  • 3.4 Ethical Data Management in AI
  • 3.5 Demonstration – Examples of Privacy EUL
Module 4: Social and Ethical Impacts of AI
  • 4.1 Social and Ethical Impacts of AI
  • 4.2 Automation and Job Displacement
  • 4.3 AI and Social Good
  • 4.4 Demonstration – ChatGPT
  • 4.5 Demonstration – Bard
Module 5: Policy Development
  • 5.1 Policy Development
  • 5.2 Ethical AI Leadership Culture
  • 5.3 Ethical AI Policy Elements
  • 5.4 Ethical AI in a Changing Landscape
  • 5.5 Course Review
  • 5.6 Course Closeout
Apache Kafka – Introduction
  • Course Introduction
  • Instructor Introduction
Module 1: Overview of Apache Kafka and Common Use Cases
  • 1.1 Overview and Common Use Cases
  • 1.2 What is Kafka
  • 1.3 Kafka History
  • 1.4 Kafka Use Cases
  • 1.5 Kafka APIs
  • 1.6 Kafka Pub Sub Patterns
  • 1.7 Whiteboard Discussion- Use Case
Module 2: Kafka Core Concepts
  • 2.1 Kafka Core Concepts
  • 2.2 The Importance of Event Data Streams
  • 2.3 Kafka Messaging, Topics, Partitions and Segments
  • 2.4 Whiteboard – Kafka Components
  • 2.5 Whiteboard – Brokers and Clusters
  • 2.6 Kafka Streams and Patterns
  • 2.7 Whiteboard – Zookeeper and Kraft
  • 2.8 Demonstration – Kafka Connect
  • 2.9 Whiteboard- – Architecture Deep Dive
  • 2.10 Whiteboard – Kafka Design Patterns
Module 3: Installing and Deploying Kafka
  • 3.1 Installing and Deploying Kafka
  • 3.2 Demonstration – Kafka Resources and Licensing
  • 3.3 Demonstration – Kafka Installation Options, Considerations and Requirements
  • 3.4 Demonstration – Deployment and Environment
  • 3.5 Demonstration – Starting Kafka
  • 3.6 Demonstration – Terminating Kafka Environment
  • 3.7 Whiteboard – Connections and Processing Events
  • 3.8 Additional Resources
  • 3.9 Putting it all together – Course Review
Cloud Interview ACE
  • 1.1 Welcome to the Course
  • 1.2 About Your Instructor
  • 1.3 Course Objectives
  • 1.4 Cloud Computing Roles
  • 1.5 Top Reasons to Be a Cloud Professionals
  • 1.6 Cloud Role Skill Mapping
  • 1.7 Non Tech Role Transitions
  • 1.8 Tech Role Transitions
  • 1.9 Cloud Computing Career Growth
  • 1.10 Cloud Computing Salary Range
  • 1.11 Importance of Cloud Certifications
  • 1.12 Cloud Computing Fundamentals Part 1
  • 1.13 Cloud Benefits
  • 1.14 Cloud FinOps
  • 1.15 Cloud Cost Models
  • 1.16 Cloud Architecture Part 1 Fundamentals
  • 1.17 Cloud Architecture Part 2 Whiteboards
  • 1.18 Why use one Cloud over another
  • 1.19 Multi Cloud and Hybrid Cloud
  • 1.20 Application Modernization
  • 1.21 Whiteboarding Best Practices
  • 1.22 Business Requirement Mapping
  • 1.23 Free Tier and Credits
  • 1.24 Cloud VMS
  • 1.25 Serverless
  • 1.26 Containers
  • 1.27 Shared Responsibility Model
  • 1.28 Cloud Compliance
  • 1.29 Infrastructure as Code (IaC)
  • 1.30 DevOps
  • 1.31 Development Integration
  • 1.32 Cloud Native
  • 1.33 Coaching
  • 1.34 Interview Questions Practice Exercise – Cloud Computing
  • 1.35 Interview Questions Practice Exercise – Cloud Native
  • 1.36 Interview Questions Practice Exercise – Cloud Architecture
  • 1.37 Interview Preparation
  • 1.38 Interview Preparation Exercise
  • 1.39 Course Review Questions
  • 1.40 Resources and Closeout
Module 1: Core Concepts of Leadership
  • 1.1 – Understanding Leadership vs. Management
  • 1.2 The Importance of Leadership in Administrative Roles
  • 1.3 The Role of Influence Without Authority
Module 2: Developing Personal Leadership Skills
  • 2.1 Self-Assessment with SWOT
  • 2.2 Identifying and Leveraging Personal Strengths
  • 2.3 Recognizing Weaknesses and Overcoming Threats
  • 2.4 Enhancing Emotional Intelligence
Module 3 – Communication and Building Trust
  • 3.1 Essential Communication Skills for Leaders
  • 3.2 Building Credibility and Trust
  • 3.3 Course Closeout
Module 1: Performing Basic Linux Tasks
  • 1.1 Introduction to Linux XK0-005
  • 1.2 Instructor Introduction
  • 1.3 Course Introduction
  • 1.4 Identify the Linux Design Philosophy
  • 1.5 Enter Shell Commands
  • 1.6 Shell Commands Activity
  • 1.7 Get Help with Linux
Module 2: Managing Users and Groups
  • 2.1 Assume Superuser Privileges
  • 2.2 Create, Modify, and Delete Users
  • 2.3 Create, Modify, and Delete Groups
  • 2.4 Query Users and Groups
  • 2.5 Configure Account Profiles
Module 3: Managing Permissions and Ownership
  • 3.1 Modify File and Directory Permissions
  • 3.2 Modify File and Directory Ownership
  • 3.3 Configure Special Permissions and Attributes
  • 3.4 Troubleshoot Permissions Issues
Module 4: Managing Storage
  • 4.1 Create Partitions
  • 4.2 Manage Logical Volumes
  • 4.3 Mount File Systems
  • 4.4 Manage File Systems
  • 4.5 Navigate the Linux Directory Structure
  • 4.6 Troubleshoot Storage Issues
  • 4.7 Container Storage Management
  • 4.8 Advanced Data Management and Security for Containers
Module 5: Managing Files and Directories
  • 5.1 Create and Edit Text Files
  • 5.2 Search for Files
  • 5.3 Perform Operations on Files and Directories
  • 5.4 Process Text Files
  • 5.5 Manipulate File Output
Module 6: Managing Kernel Modules
  • 6.1 Explore the Linux Kernel
  • 6.2 Install and Configure Kernel Modules
  • 6.3 Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
  • 7.1 Configure Linux Boot Components
  • 7.2 Configure GRUB
Module 8: Managing System Components
  • 8.1 Configure Localization Options
  • 8.2 Configure GUIs
  • 8.3 Manage Services
  • 8.4 Troubleshoot Process Issues
  • 8.5 Troubleshoot CPU and Memory Issues
  • 8.6 – Troubleshooting With systemd
Module 9: Managing Devices
  • 9.1 Identify the Types of Linux Devices
  • 9.2 Configure Devices
  • 9.3 Monitor Devices
  • 9.4 Troubleshoot Hardware Issues
Module 10: Managing Networking
  • 10.1 Identify TCP-IP Fundamentals
  • 10.2 Identify Linux Server Roles
  • 10.3 Connect to a Network
  • 10.4 Configure DHCP and DNS Client Services
  • 10.5 Configure Cloud and Virtualization Technologies
  • 10.6 Troubleshoot Networking Issues
Module 11: Managing Packages and Software
  • 11.1 Identify Package Managers
  • 11.2 Manage RPM Packages with YUM
  • 11.3 Manage Debian Packages with APT
  • 11.4 Configure Repositories
  • 11.5 Acquire Software
  • 11.6 Build Software from Source Code
  • 11.7 Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
  • 12.1 Implement Cybersecurity Best Practices
  • 12.2 Implement Identity and Access Management Methods
  • 12.3 Configure SELinux or AppArmor
  • 12.4 Configure Firewalls
  • 12.5 Implement Logging Services
  • 12.6 Back Up, Restore, and Verify Data
  • 12.7 NFTables – Setting Up Advanced Firewalls
Module 13: Working with Bash Scripts
  • 13.1 Customize the Bash Shell Environment
  • 13.2 Identify Scripting and Programming Fundamentals
  • 13.3 Write and Execute a Simple Bash Script
  • 13.4 Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
  • 14.1 Schedule Jobs
  • 14.2 Implement Version Control Using Git
  • 14.3 Identify Orchestration Concepts
Module 15: Installing Linux
  • 15.1 Prepare for Linux Installation
  • 15.2 Perform the Installation
Module 16 – Working With Modern IT Infrastruture
  • 16.1 – Infrastruture As Code (IAC)
  • 16.2 – Containers, Cloud, and Orchestration Concepts
  • 16.3 – Container Management
  • 16.4 – Container and Cloud Networking Basics
Course Introduction – How to break into a Technology Career
  • 01 Introduction to the Course
  • 02 Instructor Introduction
Module 1: Tech Career Development Fundamentals
  • 1.1 Tech Career Development Fundamentals
  • 1.2 Understanding the Tech Industry
  • 1.3 Discussion – Why Consider Tech as a Career
  • 1.4 Exploring Tech Career Paths and Specializations
  • 1.5 Creating a Career Roadmap
Module 2: Building a Strong Foundation
  • 2.1 Building a Strong Foundation
  • 2.2 Mastering Tech Tools and Technologies
  • 2.3 Developing Proficiency in Programming Languages
  • 2.4 Enhancing Problem-Solving Skills for Tech Professionals
Module 3: Personal Branding and Professional Presence
  • 3.1 Personal Branding and Professional Presence
  • 3.2 Crafting your Tech Personal Brand Story
  • 3.3 Building an Impressive Tech Portfolio and Projects Showcase
  • 3.4 Demonstration – GitHub
  • 3.5 Leveraging Tech Networks and Communities for Career Growth
  • 3.6 Demonstration – LinkedIn Profile
  • 3.7 Discussion – Meetups
  • 3.8 Demonstration – Stackoverflow
Module 4: Job Search and Application Strategies
  • 4.1 Job Search and Application Strategies
  • 4.2 Creating and Outstanding Tech Resume
  • 4.3 Crafting Tailored Cover Letters for Tech Positions
  • 4.4 Navigating Tech Job Boards and Industry Resources
  • 4.5 Demonstration – Job Search LinkedIn
Module 5: Tech Interview Preparation and Techniques
  • 5.1 Tech Interview Preparation and Techniques
  • 5.2 Understanding Different Types of Tech Interviews
  • 5.3 Preparing for Technical Interview Challenges
  • 5.4 Mastering Behavioral Interviews using the STAR Technique
Module 6: Advancing Your Tech Career
  • 6.1 Advancing Your Tech Career
  • 6.2 Negotiating Job Offers and Tech Salary Packages
  • 6.3 Excelling in the Tech Workplace- Communication and Collaboration
  • 6.4 Creating a Personalized Tech Career Development Plan
  • 6.5 Cloud InterviewACE
  • 6.6 CCPSA
  • 6.7 Resources
  • 6.8 Course Closeout
Module 1 – Key Elements of The FinOps Framework
  • 1.1 – Introduction to FinOps
  • 1.2 – Overview of the FinOps Framework
  • 1.3 – The FinOps Lifecycle Phases
  • 1.4 – The FinOps Principles
  • 1.5 – Collaboration and Accountability in FinOps
  • 1.6 – FinOps Persona and Allied Personas
  • 1.7 – FinOps Domains Overview
Module 2 – FinOps Domain: Cloud Usage & Cost
  • 2.1 – Understand Cloud Usage & Cost Introduction
  • 2.2 – Data Ingestion
  • 2.3 – Cost Allocation
  • 2.4 – Reporting & Analytics
  • 2.5 – Anomaly Management
Module 3 – FinOps Domain: Quantify Business Value
  • 3.1 – Introduction to the Quantify Business Value
  • 3.2 – Planning & Estimating
  • 3.3 – Forecasting
  • 3.4 – Budgeting
  • 3.5 – Benchmarking
Module 4 – FinOps Domain: Optimize Cloud Usage & Cost
  • 4.1 – Optimizing Cloud Usage and Costs Introduction
  • 4.2 – Architecting for the Cloud
  • 4.3 – Rate Optimization
  • 4.4 – Workload Optimization
  • 4.5 – Cloud Sustainability
  • 4.6 – Licensing and SaaS
Module 5 – FinOps Domain: Manage the FinOps Practice
  • 5.1 – Manage the FinOps Practice Overview
  • 5.2 – FinOps Practice Operations
  • 5.3 – Cloud Policy & Governance
  • 5.4 – FinOps Assessment
  • 5.5 – FinOps Tools & Services
  • 5.6 – FinOps Education and Enablement
  • 5.7 – Invoicing and Chargeback
  • 5.8 – Onboarding Workloads
  • 5.9 – Intersecting Disciplines
Module 6 – FinOps FOCUS
  • 6.1 – Introduction to FinOps FOCUS
  • 6.2 – Implementing FinOps FOCUS for AWS, Google Cloud, and Microsoft Azure
Module 7 – FinOps Certifications and Course Closeout
  • 7.1 – Exploring the FinOps Certifications
  • 7.2 – Course Closeout and Next Steps
Course Introduction – AI in Talent Management
  • 01 Course Introduction
  • 02 Instructor Introduction
Module 1: Introduction to AI in Talent Management
  • 1.1 Introduction to AI in Talent Management
  • 1.2 Understanding AI in Talent Management
  • 1.3 Leveraging AI for Candidate Sourcing
  • 1.4 Ethical Considerations of AI in Hiring
Module 2: AI-Powered Sourcing and Screening
  • 2.1 AI-Powered Sourcing and Screening
  • 2.2 AI-driven Candidate Search Engines
  • 2.3 Demonstration RecruiterGPT
  • 2.4 Automated Resume Screening and Skills Assessment
  • 2.5 Whiteboard – Workflow – How Resume Screening Works
  • 2.6 Chatbots and Conversational AI in Recruitment
Module 3: AI-Enhanced Interviewing and Selection
  • 3.1 AI-Enhanced Interviewing and Selection
  • 3.2 Video Interviews and Behavioral Analytics
  • 3.3 Predictive Analytics and Hiring Decisions
  • 3.4 Explainable AI and Building Trust in Hiring
Module 4: AI-Powered Upskilling and Development
  • 4.1 AI-powered Upskilling and Development
  • 4.2 Identifying Skills Gaps and Upskilling Needs
  • 4.3 Personalized Learning and AI-powered Learning Platforms
  • 4.4 Microlearning and Adaptive Learning with AI
Module 5: Implementing AI in Your Talent Acquisition Strategy
  • 5.1 Implementing AI in Your Talent Acquisition Strategy
  • 5.2 Evaluating AI Solutions for Your Organization
  • 5.3 Integrating AI with Existing Talent Acquisition Processes
  • 5.4 Change Management and Building a Culture of AI in Recruitment
Module 6: The Future of AI in Talent Management
  • 6.1 The Future of AI in Talent Acquisition
  • 6.2 Emerging Trends and Innovations in AI-powered Talent Acquisition
  • 6.3 Building a Sustainable Talent Pipeline with AI
  • 6.4 The Enduring Role of Humans in Talent Management
  • 6.5 Course Summary
  • 6.6 Course Closeout
Module 1 – Overview of Privileged Access Management (PAM)
  • 1.1 – Your Complete PAM Solution
  • 1.2 – Overview of CyberArk
Module 2 – CyberArk Architecture and Componets
  • 2.1 – CyberArk Architecture Overview
  • 2.2 – CyberArk Deployment Models
Module 3 – Working With The CyberArk Vault
  • 3.1 – The CyberArk Digital Vault
  • 3.2 Managing Users and Permissions
Module 4 – Privileged Account Management
  • 4.1 Add and Managing PAM Accounts
  • 4.2 – Password Rotation and Policy Management
Module 5 – Monitoring and Session Management
  • 5.1 – Using the Privileged Session Manager (PSM)
  • 5.2 – Session Monitoring and Reporting
Module 6 – Security Best Practices
  • 6.1 – CyberArk Hardening and Best Practices
  • 6.2 – Incident Reponse With CyberArk
Module 7 – Use Cases, Certification & Closeout
  • 7.1 – Real World Use Cases of CyberArk
  • 7.2 – CyberArk Certification Paths
  • 7.3 – CyberArk Fundamentals Course Closeout
Introduction To AI For Business Professionals
  • 01 Course Welcome
  • 02 Instructor Introduction
  • 03 Download Course Resources
Module 1 – Introduction to AI in Business
  • 1.1 Introduction to AI in Business
  • 1.2 Understanding the Basics of AI
  • 1.3 Exploring the Role of AI in Business
  • 1.4 Identifying the Benefits of AI in Business
  • 1.5 Whiteboard – How Does AI Actually Work?
  • 1.6 Demonstration – Google Bard AI
Module 2 – Implementing AI in Business
  • 2.1 Implementing AI in Business
  • 2.2 Preparing Your Business for AI Integration
  • 2.3 Whiteboard AI Strategy
  • 2.4 Identifying the Best AI Tools for Your Business
Module 3 – AI for Marketing and Sales
  • 3.1 Demonstration – Hacksocial AI
  • 3.2 How AI Can Help Your Marketing and Sales Efforts
  • 3.3 Exploring AI-Driven Customer Insights and Targeting
  • 3.4 Examples AI Sales Tools in 2023
  • 3.5 Optimizing Your Marketing and Sales Strategies with AI
  • 3.6 Demonstration – RegieAI Sales Workflows
Module 4 – AI Applications in Human Resources
  • 4.1 AI Applications in Human Resources
  • 4.2 Using AI for Talent Acquisition and Recruitment
  • 4.3 Optimizing Performance Management with AI
  • 4.4 Enhancing Employee Engagement with AI
  • 4.5 Whiteboard – Resume Filtering with AI
Module 5 – AI for Operations and Supply Chain Managemen
  • 5.1 AI for Operations and Supply Chain Management
  • 5.2 How AI Can Improve Your Operations and Supply Chain Management
  • 5.3 Exploring AI-Driven Predictive Maintenance and Quality Control
  • 5.4 Optimizing Your Operations and Supply Chain Strategies with AI
Module 6 – AI for Finance and Accounting
  • 6.1 AI for Finance and Accounting
  • 6.2 How AI Can Streamline Your Finance and Accounting Processes
  • 6.3 Exploring AI-Driven Fraud Detection and Risk Management
  • 6.4 Personal Finance AI Applications
  • 6.5 Optimizing Your Finance and Accounting Strategies with AI
  • 6.6 Demonstration – Using Bing AI Chatbot for Personal Finance
Module 7 – The Future of AI in Business
  • 7.1 The Future of AI in Business
  • 7.2 Latest Developments in AI Technology
  • 7.3 Implications of AI for Business and Society
  • 7.4 Discussion – Developing an AI Strategy
Module 8 – Course Closeout
  • 8.1 Course Closeout
  • 8.2 Course Review
  • 8.3 Course Closeout
Introduction To CompTIA Data+
  • Course Welcome
  • Module Overview
  • Instructor Introduction
  • What is the CompTIA Data Plus Exam
  • Roles that should consider the exam
  • Exam Objectives
  • Discussion – The Importance of Data
  • US DOD Member Data Directives and 8570
Module 1 – Data Concepts and Environments
  • 1.1 Module Overview
  • 1.2 Understanding Data Schemes
  • 1.3 Databases
  • 1.4 Demonstration – Google Cloud SQL
  • 1.5 Data Warehouses and Data Lakes
  • 1.7 Comparing OLTP and OLAP Processing
  • 1.8 Demonstration – AWS Redshift
  • 1.9 Demonstration – Deploy SQL DemoBench
  • 1.10 What is Column Database
  • 1.11 Data Structures, Files and Types
  • 1.12 Module Summary Review
  • 1.13 Module Review Questions
Module 2 – Data Mining
  • 2.1 Module 2 Overview
  • 2.2 Data Acquisition and Integration
  • 2.3 Demonstration – Data Integration Techniques
  • 2.4 API Fundamentals
  • 2.5 Demonstration – Google Vision API
  • 2.6 Data Profiling and Cleansing
  • 2.7 Data Collection Method Options
  • 2.8 Data Outliers
  • 2.9 Understanding ETL and ELT
  • 2.10 Query Optimization
  • 2.11 Understanding Data Manipulation Techniques
  • 2.12 Module Summary Review
  • 2.13 Module Review Questions
Module 3 – Data Analysis
  • 3.1 Module Overview
  • 3.2 Descriptive Statistical Methods
  • 3.3 Measures of Tendency and Dispersion
  • 3.4 Understanding Percentages
  • 3.5 Inferential Statistical Methods
  • 3.6 Hypothesis Testing with Excel
  • 3.7 Whiteboard – Linear Regression and Correlation
  • 3.8 Whiteboard – Analysis Testing
  • 3.9 Module Summary Review
  • 3.10 Module Review Questions
Module 4 – Data Visualization
  • 4.10 Module Review Questions
  • 4.1 Module Overview
  • 4.2 Translate Business Requirements to Reports
  • 4.3 Whiteboard – Translate Business Requirements
  • 4.4 Dashboard Fundamentals
  • 4.5 Demonstration – Dashboard Components
  • 4.6 Data Sources and Attributes
  • 4.7 Understanding Chart and Graphs
  • 4.8 Reports Type and Elements
  • 4.9 Module Summary Review
Module 5 – Data Governance, Quality and Controls
  • 5.1 Module Overview
  • 5.2 Introduction to Data Governance
  • 5.3 The Data Lifecycle
  • 5.4 Determining Data Classification
  • 5.5 Data Ownership
  • 5.6 Data Storage Access
  • 5.7 Data Privacy and Frameworks
  • 5.8 Information Rights Management (IRM) and Data Loss Prevention (DLP)
  • 5.9 Setting Data Quality Control
  • 5.10 Methods to Validate Quality
  • 5.11 Data Transformation Tools
  • 5.12 Data Security Fundamentals
  • 5.13 Master Data Management (MDM)
  • 5.14 Module Summary Review
  • 5.15 Module Review Questions
Module 6 – Exam Preparation and Practice Exams
  • 6.1 Module Overview
  • 6.2 Course Summary Review
  • 6.3 Data Plus Exam Experience
  • 6.4 Certification CEU Requirements
  • 6.5 Practice Exams-Additional Resources
  • 6.6 Course Closeout
Module 1 – Introduction and Security Concepts
  • Certification Overview
  • Exam Objectives
  • Instructor Introduction
  • ISC CiC Course Intro
  • 1.0 Module 1 Overview
  • 1.1.5 Password Security
  • 1.1.6 Whiteboard – Multifactor Authentication (MFA)
  • 1.2 Understand the risk management process
  • 1.2.1 Risk Management
  • 1.2.2 Risk Identification assessment and treatment
  • 1.3 Understand security controls
  • 1.3.1 Technical Controls
  • 1.3.2 Administrative Controls
  • 1.3.3 Physical Controls
  • 1.3.4 Whiteboard Discussion – Controls-
  • 1.3.5 Demonstration – AWS Access Controls
  • 1.4 – Understand ISC2 Code of Ethics
  • 1.4.1 Professional Code of Ethics
  • 1.5 Understand Governance processes
  • 1.5.1 Standards, Regulations, etc
  • 1.5.2 Security Policies
  • 1.5.3 Module Summary Review
  • 1.5.4 Module Review Questions
Module 2 – Incident Response, Business Continuity and Disaster Recovery Concepts
  • 2.0 Module 2 Overview
  • 2.1 Understand Business Continuity
  • 2.1.1 Business Continuity
  • 2.1.2 Components of a Business Continuity Plan
  • 2.2.1 Disaster Recovery
  • 2.2.2 RTO-RPO
  • 2.3 Understand Business Response
  • 2.3.1 Incident Response
  • 2.3.2 Post Incident Review
  • 2.3.3 Module Summary Review
  • 2.3.4 Module Review Questions
Module 3 – Access Control Concepts
  • 3.0 Module 3 Overview
  • 3.1 Understand physical access controls
  • 3.1.1 Defense In Depth
  • 3.1.2 Compare Physical Control Types
  • 3.1.3 Monitoring Controls
  • 3.2 Describe logical access controls
  • 3.2.1 Logical Access controls
  • 3.2.2 Principle of least privilege
  • 3.2.3 Segregation of duties
  • 3.2.4 Whiteboard – Access Control
  • 3.2.5 Demonstration – Cloud IAM Sequence 32
  • 3.2.6 Module Summary Review
  • 3.2.7 Module Review Questions
Module 4- Network Security
  • 4.0 Module 4 Overview
  • 4.1 Understanding computer networking
  • 4.1.1 Network Security Design
  • 4.1.2 Whiteboard – Networking Concepts
  • 4.1.3 Networking protocols and ports
  • 4.1.4 Demonstration – AWS VPC
  • 4.2 Understand Network Threats
  • 4.2.1 Types of network (cyber) threats and attacks
  • 4.2.2 Threat Actors
  • 4.2.3 Tools used to identify and prevent threats
  • 4.2.4 Whiteboard Discussion – DDoS attacks
  • 4.3 Network Security Infrastructure
  • 4.3.1 On Premises Architecture
  • 4.3.2 Data Center Design Discussion
  • 4.3.3 Cloud Architecture Service and Deployment Models
  • 4.3.4 Managed Service Providers
  • 4.3.5 Service Level Agreements (SLA)
  • 4.3.6 Shared Security Model
  • 4.3.7 Zero Trust
  • 4.3.8 Module Summary Review
  • 4.3.9 Module Review Questions
Module 5 – Security Operations
  • 5.0 Module 5 Overview
  • 5.1 Understand Data Security
  • 5.1.1 Data Security Fundamentals
  • 5.1.2 Data Handling Best Practices
  • 5.1.3 Encryption
  • 5.1.4 Data Security Compliance
  • 5.2 Understand System Hardening
  • 5.2.1 System Hardening
  • 5.2.2 Configuration Management
  • 5.3 Understanding Best Practice Security Policies
  • 5.3.1 Common Security Policies
  • 5.3.2 Demonstration – AUP
  • 5.3.3 Demonstration – Privacy Policy
  • 5.4 Security Awareness Training
  • 5.4.1 Importance of Security Awareness Training
  • 5.4.2 Social Engineering
  • 5.4.3 Module Summary Review
  • 5.4.4 Module Review Questions
  • 5.4.5 Next Steps and Course Closeout
Module 1 – Introduction To Windows Server 2022
  • 1.1 – Windows Server 2022 Overview
  • 1.2 – Preparing for Installation
Module 2 – Installation of Windows Server 2022
  • 2.1 – Installation Methods for Windows Server 2022
  • 2.2 – Performing A Clean Install
  • 2.3 – Post-Installation Configurations
Module 3 – Server Roles and Features
  • 3.1 – Server Roles and Features
  • 3.2 – Installing Active Directory
  • 3.3 – Verify and Update DNS Settings
  • 3.4 – Installing DHCP
  • 3.5 – Installing IIS
  • 3.6 – Power of Hyper-V on Windows Server 2022
  • 3.7 – Other Common Server Roles & Services
Module 4 – Deployment Tools
  • 4.1 – Deployment Techniques
  • 4.2 – Deploying Windows Server 2022 Using Windows Deployment Services (WDS)
  • 4.3 – Using Microsoft Deployment Toolkit (MDT)
  • 4.4 – SCCM Deployment
Module 5: Security and Maintenance
  • 5.1 – Securing Windows Server 2022
  • 5.2 – Managing Updates and Patches
  • 5.3 – Monitoring and Performance Tuning
  • 5.4 – Backup and Recovery
  • 5.5 – Regular Maintenance Task
Module 6: Integrating Windows Server 2022 with Azure
  • 6.1 – Integrating Windows Server 2022 with Azure
  • 6.2 – Course Closeout
Module 1 – Understanding Cyber Threats
  • 1.1 – Welcome to Essential Cybersecurity 101
  • 1.2 – 5 Cyber Threats and How to Stay Safe
Module 2 – Defending Against Cyber Attacks
  • 2.1 – Defending Against Ransomware
  • 2.2 – Phishing Attack Awareness
Module 3 – Securing Your Digital Environment
  • 3.1 – Securing Your Home Network
  • 3.2 – Best Practices for Securing Work-from-Home Devices and Data
Module 4 – The Human Element of Cybersecurity
  • 4.1 – Understanding Social Engineering
  • 4.2 – Protecting Your Digital Identity
Module 5 – The Role of AI in Cybersecurity
  • 5.1 – AI Powered Threat Detection and Prevention
  • 5.2 – AI in Cybersecurity Incident Response and Fraud Detection
Module 1 – IT Concepts and Terminology
  • 1.1 – Introduction to Tech+
  • 1.2 – Understanding Notational Systems
  • 1.3 – The Basics of Computing
  • 1.4 – Comparing Units of Measure
  • 1.5 – Troubleshooting Methodology, Cases and Tips
Module 2 – Infrastructure
  • 2.1 – Introduction to Infrastructure
  • 2.2 – Types of Computing Devices
  • 2.3 – Internal Components of A Computer
  • 2.4 – Types of Storage
  • 2.5 – Peripheral Devices and Installation
  • 2.6 – Virtualization and Cloud Technologies
  • 2.7 – Common Internet Service Types
Module 3 – Networking Fundaments
  • 3.1 – Introduction to Networking
  • 3.2 – Core Principles of Computer Networking
  • 3.3 – Network Ports
  • 3.4 – Network Addresses and Identifiers
  • 3.5 – Network Models and Types
  • 3.6 – Networking Devices and Connectors
  • 3.7 – Small Wireless Networks
Module 4 – Operating Systems
  • 4.1 Introduction to Operating Systems (OS)
  • 4.2 – What is an Operating System
  • 4.3 – Drivers, Applications, Tasks and System Services
  • 4.4 – File and Disk Management
  • 4.5 – Backup and Recovery
Module 5 – Software and Applications
  • 5.1 – Common Software Applications
  • 5.2 – Productivity Software
  • 5.3 – Business and Enterprise Software
  • 5.4 – Manging Software
  • 5.5 – Trusted Software Sources
Module 6 – Web Browsing, Configuration & Security
  • 6.1 – Introduction To Web Browsing
  • 6.2 – Browser Settings, Configuration and Maintenance
  • 6.3 – Secure Web Browsing
  • 6.4 – Protecting Your Privacy
Module 7 – Software Development Concepts
  • 7.1 – Introduction to Programming
  • 7.2 – Programming Tools
  • 7.3 – Programming Organization and Logic Flows
  • 7.4 – Understanding Programming Language Categories
  • 7.5 – Code Maintenance, Version Control Systems and Branching
  • 7.6 – Fundamental Data Types and Their Characteristics
Module 8 – Data and Database Fundamentals
  • 8.1 – Introduction to Databases and the Value of Data
  • 8.2 – Database Concepts and Structures
  • 8.3 – Working with Relational Databases
  • 8.4 – Database Operations and Access
  • 8.5 – Database Backup and Recovery
Module 9 – Security: Keeping Things Safe
  • 9.1 – Basic Security Concepts and Strategies
  • 9.2 – Identifying Common Security Threats
  • 9.3 – Securing Devices and Networks
  • 9.4 – Security Tools and Software
  • 9.5 – Encryption and Data Protection
Module 10 – AI Uses and Impact
  • 10.1 – The Impact and Use of AI
  • 10.2 – Course Closeout
Module 1: CCNA 200-301 v1.1 Network Fundamentals
  • 1.1 Intro to Networking
  • 1.2 OSI Model
  • 1.3 TCP-IP
  • 1.4 Network Components
  • 1.5 Network Topology
  • 1.6 Copper Cable Types
  • 1.7 Fiber Optic Cable Types
  • 1.8 Virtualization Fundamentals
  • 1.9 Review
Module 2: CCNA 200-301 v1.1 Network Device Management
  • 2.1 Connecting to a Cisco Device
  • 2.1.1 ACTIVITY – Intro to Packet Tracer
  • 2.2 Basic Cisco Commands
  • 2.2.1 ACTIVITY – Navigating the CLI
  • 2.3 Configuring for Connectivity
  • 2.3.1 ACTIVITY – Configuring a Router Interface
  • 2.3.2 ACTIVITY – Making a Remote Telnet Connection
  • 2.3.3 ACT – Making a Remote SSH Connection
  • 2.4 Neighbor Discovery
  • 2.4.1 ACT – Discovering Neighbors
  • 2.5 Basic Troubleshooting
  • 2.6 Review
Module 3: CCNA 200-301 v1.1 Switching
  • 3.1 Ethernet Basics
  • 3.2 Switching Overview
  • 3.2.1 ACTIVITY – Setting Up a Simple Switched Network
  • 3.3 Spanning-Tree Protocol
  • 3.4 Rapid PVST+
  • 3.5 VLANs
  • 3.6 VLAN Trunking Protocol
  • 3.6.1 ACTIVITY – Creating Trunk Links
  • 3.7 VLAN Trunking Protocol (VTP)
  • 3.8 VLAN Routing
  • 3.8.1 ACTIVITY – Configuring the VLAN 1 Interface on a Switch
  • 3.8.2 ACTIVITY – Routing Between VLANs
  • 3.9 Switchport Configuration
  • 3.9.1 ACTIVITY – Configuring Voice and Data VLANs
  • 3.10 EtherChannel
  • 3.10.1 ACTIVITY – Bundling Links into an EtherChannel
  • 3.11 Review
Module 4: CCNA 200-301 v1.1 Internet Protocol (IP)
  • 4.1 IPv4 Basics
  • 4.2 IP Packet and Interface Types
  • 4.3 Binary Numbering System
  • 4.4 Classful and Classless Addressing
  • 4.5 IPv4 Subnetting
  • 4.5.1 ACTIVITY – Moving the Subnet Mask
  • 4.6 Subnetting in Other Octets
  • 4.6.1 ACTIVITY – Subnetting
  • 4.6.2 ACTIVITY – Subnetting by Host Requirements
  • 4.6.3 ACTIVITY – Grouping Hosts into Subnets
  • 4.7 Supernetting
  • 4.7.1 ACTIVITY – Supernetting
  • 4.8 IPv6
  • 4.9 Review
Module 5: CCNA 200-301 v1.1 Routing
  • 5.1 Introducing the Route
  • 5.2 Routing Basics
  • 5.3 Packet Delivery on the Same Network
  • 5.4 IP Routing Across a Single Router
  • 5.4.1 ACTIVITY – Configuring Basic Routing
  • 5.5 IP Routing Across Multiple Routers
  • 5.5.1 ACTIVITY – Configuring IPv4 Static Routes
  • 5.5.2 ACTIVITY – Adding Special Static Routes
  • 5.6 Routing Protocols Overview
  • 5.7 Route Selection
  • 5.8 Open Shortest Path First (OSPF)
  • 5.8.1 ACTIVITY – Deploying Single Area OSPF
  • 5.9 First Hop Redundancy Protocol (FHRP)
  • 5.10 Network Address Translation (NAT)
  • 5.10.1 ACTIVITY – Implementing Static NAT
  • 5.10.2 ACTIVITY – Using a NAT Pool
  • 5.10.3 ACTIVITY – Configuring PAT
  • 5.11 Review
Module 6: CCNA 200-301 v1.1 IP Services
  • 6.1 Remote Control
  • 6.2 File Transfer
  • 6.3 Monitoring
  • 6.4 Infrastructure
  • 6.4.1 ACTIVITY – Implementing a DHCP Relay
  • 6.5 Quality of Service
  • 6.6 Review
Module 7: CCNA 200-301 v1.1 Wireless
  • 7.1 Wi-Fi Principles
  • 7.2 Cisco Wireless Architectures
  • 7.3 WLC Configuration
  • 7.3.1 ACT – Configuring a WLAN
  • 7.4 Review
Module 8: CCNA 200-301 v1.1 Security Fundamentals
  • 8.1 Intro to Security
  • 8.2 Local Device Access Control
  • 8.3 Protecting Privileged EXEC Mode
  • 8.4 Password Management
  • 8.5 Local User
  • 8.6 Password Recovery
  • 8.6.1 ACTIVITY – Password Recovery
  • 8.7 Remote Access
  • 8.8 Access Control List (ACL)
  • 8.8.1 ACTIVITY – Deploying a Standard ACL
  • 8.8.2 ACTIVITY – Deploying an Extended ACL
  • 8.9 DHCP Snooping
  • 8.10 Dynamic ARP Inspection (DAI)
  • 8.11 Layer 2 Port Security
  • 8.11.1 ACTIVITY – Securing Layer 2 Ports
  • 8.12 Authentication, Authorization and Accounting (AAA)
  • 8.13 Wireless Security
  • 8.14 Review
Module 9: CCNA 200-301 v1.1 Automation and Programmability
  • 9.1 Network Automation Overview
  • 9.2 Software Defined Networks
  • 9.3 JSON
  • 9.4 REST APIs
  • 9.5 Management Mechanisms
  • 9.6 AI in Network Operations
  • 9.7 Review
Module 1: Preparing for and Taking the PMI PMP v7 Exam
  • 1.1 Preparing to Take the PMP v7 Exam From PMI
  • 1.2 PMI PMP v7 Exam Characteristics
Module 2: Process Domain – PMI – PMP v7
  • 2.1 What’s New in PMBOK 7
  • 2.1.1 Performance Domains
  • 2.2 Process Domain and Framework defined
  • 2.3 Predictive, Iterative, Incremental and Adaptive Project Life Cycles
  • 2.4 Framework Definitions
  • 2.5 Project Manager Skills
  • 2.6 Framework Key Points to Remember
  • 2.6.1 Framework Key Points to Remember -Incorporating Agile
  • 2.7 Framework Example Questions Review
  • 2.8 Project Integration Management Knowledge Area Defined
  • 2.9 Develop Project Charter and Develop Project Management Plan
  • 2.10 Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
  • 2.11 Perform Integrated Change Control
  • 2.12 Close Project or Phase
  • 2.13 Integration Key Points to Remember
  • 2.13.1 Integration Key Points to Remember – Incorporating Agile
  • 2.14 Integration Example Questions Review
  • 2.15 Project Scope Management Knowledge Area Defined
  • 2.16 Plan Scope Management and Collect Requirements
  • 2.17 Define Scope and Create WBS
  • 2.18 Breakdown Structures used in WBS Dictionary
  • 2.19 Validate Scope and Control Scope
  • 2.20 Defining Requirements in Agile
  • 2.21 Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
  • 2.22 Scope Key Points to Remember
  • 2.22.1 Scope Key Points to Remember – Incorporating Agile
  • 2.23 Scope Example Questions Review
  • 2.24 Project Schedule Management Knowledge Area Defined
  • 2.25 Plan Schedule Management, Define Activities, and Sequence Activities
  • 2.26 Dependencies, Predecessors, Leads, and Lags
  • 2.27 Estimate Activity Durations
  • 2.28 Develop Schedule
  • 2.29 Critical Path Method
  • 2.30 Schedule Compression
  • 2.31 Resource Leveling, Schedule Format, and Control Schedule
  • 2.32 Agile Estimating
  • 2.33 Agile Schedule Planning and Reporting
  • 2.34 Schedule Key Points to Remember and Example Question review
  • 2.35 Project Cost Management Knowledge Area Defined
  • 2.36 Plan Cost Management and Estimate Cost
  • 2.37 Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
  • 2.38 Life Cycle Costing, Status Reporting, and Determine Budget
  • 2.39 Control Costs, and Earned Value Management
  • 2.40 Earned Schedule, and Agile Cost Control
  • 2.41 Cost Key Points to Remember
  • 2.41.1 Cost Key Points to Remember – Incorporating Agile
  • 2.42 Cost Example Questions Review
  • 2.43 Project Quality Management Knowledge Area Defined
  • 2.44 Plan Quality Management
  • 2.45 Manage Quality
  • 2.46 Control Quality
  • 2.47 Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
  • 2.48 Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
  • 2.49 Quality Key Points to Remember
  • 2.49.1 Quality Key Points to Remember – Incorporating Agile
  • 2.50 Quality Example Questions Review
  • 2.51 Project Risk Management Knowledge Area Defined
  • 2.52 Risk Management Plan and Identify Risks
  • 2.53 Risk Register and Issues Vs Risk
  • 2.54 Perform Qualitative and Quantitative Risk Analysis
  • 2.55 Plan Risk Responses
  • 2.56 Implement Risk Responses and Monitor Risks
  • 2.57 Agile Risk Tools and Risk Key Points to Remember
  • 2.57.1 Agile Risk Tools and Risk Key Points to Remember – Incorporating Agile
  • 2.58 Risk Example Questions Review
  • 2.59 Project Procurement Management Knowledge Area Defined
  • 2.60 Plan Procurement Management and Conduct Procurements
  • 2.61 Contracts
  • 2.62 Share and Point of Total Assumption
  • 2.63 Procurement Documents
  • 2.64 Non-Competitive Awards and Control Procurements
  • 2.65 Agile Contracts
  • 2.66 Procurement Key Points to Remember and Example Questions Review
  • 2.66.1 Procurement Key Points to Remember – Incorporating Agile
Module 3: People Domain – PMI – PMP v7
  • 3.1 People Domain and Project Communications Management Knowledge Area Defined
  • 3.2 Plan Communications Management
  • 3.3 Manage and Monitor Communications
  • 3.4 Agile Communications
  • 3.5 Communications Key Points to Remember
  • 3.6 Communications Example Question Review
  • 3.7 Project Stakeholder Management Knowledge Area Defined
  • 3.8 Stakeholder Position Descriptions
  • 3.9 Identify Stakeholders
  • 3.9.1 Identify Stakeholders – Incorporating Agile
  • 3.10 Plan Stakeholder Engagement and Manage Stakeholder Engagement
  • 3.11 Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
  • 3.12 Stakeholder Management Key Points to Remember
  • 3.12.1 Stakeholder Management Key Points to Remember – Incorporating Agile
  • 3.13 Stakeholder Management Example Question Review
  • 3.14 Resource Management Knowledge Area Defined
  • 3.15 Plan Resource Management and Estimate Activity Resources
  • 3.16 Acquire Resources and Develop Team
  • 3.17 Manage Team
  • 3.17.1 Manage Team – Focus on Servant Leadership
  • 3.18 Control Resources and Agile Teaming Concepts
  • 3.19 Other Agile Teaming Concepts
  • 3.20 Agile team roles and challenges
  • 3.21 Resources Key Points to Remember
  • 3.22 Resources Example Question Review
Module 4: Business Environment Domain – PMI – PMP v7
  • 4.1 Business Environment Domain Defined
  • 4.1.1 Business Environment Domain Defined – Focus on Organization Chnge Management
  • 4.2 Project Selection Tools
  • 4.3 PMO, Organizational Structure, and Reports
  • 4.3.1 PMO, Organizational Structure and Reports – Matching PMO's to PMBOK Terms
  • 4.4 Agile in the Business Environment
  • 4.5 Business Environment Key Points to Remember and Example Question Review
  • 4.6 Test Taking Tips and Techniques for PMI PMP v7
  • 4.6.1 Question Formats for PMI PMP v7
  • 4.6.2 Post Certification Requirements for PMI PMP
  • 4.7 Course Closing
Module 1 – Introduction to AI and Data Privacy
  • 1.1 Introduction to AI and Data Privacy
  • 1.2 The relationship Between AI and Data Privacy
Module 2 – How AI Technologies Handle and Protect Data
  • 2.1 How AI Technology Handle and Protects Data
  • 2.2 Real World Examples of AI Systems with Robust Privacy Measures
Module 3 – Understanding the Risks of AI and Data Privacy
  • 3.1 Understanding the Risks of AI and Data Protection
  • 3.2 Real World Cases Where AI Systems Mishandled Personal Data
Module 4 – Regulations & Best Practices for Ethical AI Data Privacy
  • 4.1 Regulations and Legal Frameworks for AI and Data
  • 4.2 Best Practices for Ethical AI Data Privacy
  • 4.3 – Role of Governments and Organizations in E
  • 4.4 – Recap and Course Closeout
Module 1 – Introduction to SDLC
  • 1.1 – Definition and Purpose of SDLC
  • 1.2 – Overview of the SDLC Process
Module 2 – Phases of the SDLC
  • 2.1 – Requirement Gathering and Analysis
  • 2.2 – Planning Phase
  • 2.3 – Design Phase
  • 2.4 – Development Phase
  • 2.5 – Testing Phase
  • 2.6 – Deployment Phase
  • 2.7 – Maintenance Phase
Module 3 – SDLC Methodologies
  • 3.1 – Waterfall Methodology
  • 3.2 – Agile Methodology
  • 3.3 – Lean Methodology
  • 3.4 DevOps Methodology
  • 3.5 – DevOps vs. Agile
  • 3.6 – Which Methodology To Use
Module 4 – Role of QA in SDLC
  • 4.1 – Importance of QA in the Software Development Process
  • 4.2 – QA Methodologies and Tools
Module 5 – Best Practices for Effective SDLC Management
  • 5.1 – Project Management and Communications
  • 5.2 – Risk Management In the SDLC
  • 5.3 – Continuous Improvement and Feedback Loops
  • 5.4 – Course Closeout
Module 1 – AI and the Workforce Transformation
  • 1.1 – The Future of Work with AI Intro
  • 1.2 – The Evolution of Work
  • 1.3 – AI's Impact on Job Roles
  • 1.4 – Emerging Job Roles in the Age of AI
Module 2 – Skills for the AI-Driven Economy
  • 2.1 – The Importance of Adaptability and Lifelong Learnin
  • 2.2 – Technical Skills and AI Literacy
  • 2.3 – Critical Soft Skills in the AI Era
  • 2.4 – The Role of Data in AI-Driven Decision Making
Module 3 – Preparing for AI-Driven Changes in the Workplace
  • 3.1 – Organizational Strategies for AI Integration
  • 3.2 – Workforce Reskilling and Upskilling
  • 3.3 – The Role of Leadership in AI Transition
  • 3.4 – Ethical Considerations and Workforce Well-being
Module 4 – Case Studies and Course Wrap-Up
  • 4.1 – Practical AI Case Studies
  • 4.2 – Developing a Personal or Organizational AI-Readines
  • 4.3 – In Closing, Embrace, Not Fear AI
Module 1 – Introduction to Change Management in IT
  • 1.1 – Change Management Course Introduction
  • 1.2 – Defining Change Management
  • 1.3 – Types of Change
Module 2 – Strategies for Managing Resistance to Change
  • 2.1 – Understanding Resistance to Change
  • 2.2 – Proactive Strategies for Overcoming Resistance
  • 2.3 – Building Resilience in IT Teams
Module 3 – Developing Communication Plans for Change Initiatives
  • 3.1 – Role of Communication in Successful
  • 3.2 – Crafting Clear and Consistent Messages
  • 3.3 – Utilizing Various Communication Channels
Module 4 – Tools and Technologies for Supporting Change in IT Teams
  • 4.1 – Digital Tools for Change Management
  • 4.2 – Automation and Workflow Management
  • 4.3 – Key Metrics for Tracking Change Management Success
Module 5 – Case Studies of Effective Change Management in IT
  • 5.1 – Case Study 1: Changing To Agile
  • 5.2 – Case Study 2: Cloud Migration
  • 5.3 – Course Closeout
Module 1 – What Is OSWASP
  • Module 1.1 – Introduction to OSWASP Top 10
Module 2 – Top 10 Web Application Security Risks
  • Module 2.1 – Overview of Risks We Will Explore
  • Module 2.2 – Injection
  • Module 2.3 – Broken Authentication
  • Module 2.4 – Sensitive Data Exposure
  • Module 2.5 – XML External Entities (XXE)
  • Module 2.6 – Broken Access Control
  • Module 2.7 – Security Misconfiguration
  • Module 2.8 – Cross-Site Scripting XSS
  • Module 2.9 – Insecure Deserialization
  • Module 2.10 – Using Vulnerable Components
  • Module 2.11 – Insufficient Logging and Monitoring
  • Module 2.12 – Course Conclusion
Module 1 – Security, Compliance, and Identity
  • Module 1.1 – Course Introduction
  • Module 1.2 – Core Concepts and Strategies
  • Module 1.3 – Identity Concepts
Module 2 – Microsoft Entra ID Capabilities
  • Module 2.1 – Microsoft Entra ID
  • Module 2.2 – Entra ID Authentication
  • Module 2.3 – Access Management Capabilities
  • Module 2.4 – Entra ID Governance
  • Module 2.5 – Entra ID Protection
Module 3 – Microsoft Security Solutions
  • Module 3.1 – Exploring Core Infrastructure Services
  • Module 3.2 – Security Management Capabilities
  • Module 3.3 – Microsoft Sentinal
  • Module 3.4 Microsoft Defender XDR
Module 4 – Microsoft Compliance Solutions
  • Module 4.1 – Service Trust Portal and Privacy
  • Module 4.2 – Microsoft Purview for Compliance
  • Module 4.3 – Information Protection, Data Lifecycle Management, and Data Governance
  • Module 4.4 – Insider Risk Capabilities
  • Module 4.5 – eDiscovery and Audit
Module 1 – Course Introduction and Overview
  • Module 1.1 – Welcome and Course Objectives
  • Module 1.2 – Introduction to PMBOK 7 Principles
  • Module 1.3 – Defining Project Managment & Your Role
Module 2 – Project Scope, Estimating and Planning
  • Module 2.1 – Defining the Project Scope
  • Module 2.2 – Project Estimating Techniques
  • Module 2.3 – Project Planning – Techniques and Task Breakdown
  • Module 2.4 – Scheduling and Resource Management
Module 3 -Effective Communication and Stakeholder Management
  • Module 3.1 – Communication Planning
  • Module 3.2 – Stakeholder Management
  • Module 3.3 – Team Collaboration
Module 4 – Risk Management and Adaptability
  • Module 4.1 – Introduction to Risk Management
  • Module 4.2 – Risk Identification and Analysis
  • Module 4.3 – Risk Response Planning
Module 5 – Project Execution and Control
  • Module 5.1 – Project Execution and Control
  • Module 5.2 – Monitoring and Controlling the Project
Module 6 – Project Tools and Techniques
  • Module 6.1 – Using Project Management Tools
  • Module 6.2 – Tools for Different Methodologies
Module 7 – Closing the Project
  • Module 7.1 – Project Closure
  • Module 7.2 – Post Project Evaluations
Module 1: Introduction to Cloud Concepts
  • Module 1.1 – Course Introduction
  • Module 1.2 – Introduction to Cloud Computing
  • Module 1.3 – Microsoft SaaS, PaaS, IaaS Offerings
  • Module 1.4 – Cloud, Hybrid, On-Premises Models – Benefits and Considerations
  • Module 1.5 – Exploring Public, Private and Hybrid Cloud Models
  • Module 1.6 – Cost Benefit of Cloud Solutions
  • Module 1.7 – The Hybrid Work and Flexible Work Concept
  • Module 1.8 – Introducing Microsoft Co-Pilot
  • Module 1.9 – Microsoft 365 Tenant
Module 2: Microsoft 365 Apps and Services
  • Module 2.1 – Core Productivity Solutions
  • Module 2.2 – Work Management in Microsoft 365
  • Module 2.3 – Collaboration Solutions
  • Module 2.4 – Microsoft Teams and Teams Phone Deep Dive
  • Module 2.5 – Extending Teams with Collaborative Apps
  • Module 2.6 – Endpoint Management with Microsoft Intune
  • Module 2.7 – Windows 365 vs. Azure Virtual Desktop
  • Module 2.8 – Deployment and Update Channels for Microsoft 365
  • Module 2.9 – Analytics in Microsoft 365
Module 3: Security, Compliance, Privacy, and Trust in Microsoft 365
  • Module 3.1 – Identity and Access Management with Microsoft Entra
  • Module 3.2 – Threat Protection – Defender Suite Overview
  • Module 3.3 – Zero Trust Model and Compliance Solutions
  • Module 3.4 – Information Protection and Data Residency
Module 4: Microsoft 365 Pricing, Licensing, and Support
  • Module 4.1 – Understanding Microsoft 365 Pricing and Billing
  • Module 4.2 – Licensing Options and Management
  • Module 4.3 – Microsoft 365 Support, SLAs and Monitoring Service
  • Module 4.4 – Microsoft 365 Fundamentals Course Closeout
Module 1 – Getting Started With AI
  • Module 1.1 Introduction To AI
  • Module 1.2 Understanding The Types of AI
Module 2 – Programming Lanaguages, Tools and Platforms For AI Solutions
  • Module 2.1 AI and Programming Languages
  • Module 2.2 AI, Machine Learning and Deep Learning
  • Module 2.3 AI Models
  • Module 2.4 AI Services in the Cloud
Module 3 – Data Science Fundamentals for AI
  • Module 3.1 Introduction to Data Science
  • Module 3.2 Data Preparation Techniques
  • Module 3.3 Exploratory Data Analysis (EDA)
Module 4 – AI In the Modern Workplace
  • Module 4.1 AI In The Workplace
  • Module 4.2 Data Analysis and Business Intelligence AI Tools
  • Module 4.3 Automation and Workflow Management Tools
  • Module 4.4 Natural Language Processing (NLP) Tools
  • Module 4.5 Virtual Assistants and Chatbots
Module 5 – Ethical AI and Future Trends
  • Module 5.1 Understanding Bias, Fairness, Privacy, and Security
  • Module 5.2 Impact of AI on Jobs and Society
  • Module 5.3 Emerging Trends in AI
  • Module 5.4 AI Governance and Regulation
Module 6 – Monumental Leaps Forward With AI
  • Module 6.1 AI for Social Good
  • Module 6.2 AI in Creative Industries
  • Module 6.3 AI in Cybersecurity
  • Module 6.4 AI in Smart Cities and Infrastructure
Module 7 – AI Project Lifecycle Management
  • Module 7.1 AI Project Lifecycle Management
  • Module 7.2 Development and Implementation
  • Module 7.3 Maintenance, Evaluation, and Scaling
Module 8 – AI Fundamentals Course Closeout
  • Module 8.1 Course Closeout
Module 1 – SY0-701 General Security Concepts
  • 1.0 Introduction to the Course
  • 1.1 Fundamental Security Concepts
  • 1.2 Zero Trust
  • 1.3 Deception and Disruption
  • 1.3.1 ACTIVITY – Testing a Honeypot
  • 1.4 Security Controls
  • 1.5 Change Management and Security
  • 1.6 Cryptography Basics
  • 1.6.1 ACTIVITY – Examining Symmetric Encryption
  • 1.7 Asymmetric Encryption
  • 1.7.1 ACTIVITY – Exploring Asymmetric Encryption
  • 1.8 Hashing
  • 1.8.1 ACTIVITY – Verifying Integrity with Hashing
  • 1.9 Digital Certificates
  • 1.10 Public Key Infrastructure
  • 1.11 Data and Keys
  • 1.12 Crypto Implementations
  • 1.13 Blockchain
  • 1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
  • 2.1 Threat Actors and Motivations
  • 2.2 Threat Vectors
  • 2.2.1 ACTIVITY – O.MG Cable Baiting
  • 2.2.2 O.MG-No Cable
  • 2.3 Social Engineering
  • 2.4 Operating System Vulnerabilities and Attacks
  • 2.5 Application Vulnerabilities and Attacks
  • 2.5.1 ACTIVITY – Performing a Buffer Overflow
  • 2.6 Web-based Vulnerabilities and Attacks
  • 2.6.1 ACTIVITY – Abusing Unsanitized Input
  • 2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
  • 2.6.3 ACTIVITY – Swiping a Token with XSS
  • 2.7 Other Vulnerabilities
  • 2.8 Common Malicious Activity Indicators
  • 2.9 Insider Threat Indicators
  • 2.10 Social Engineering Indicators
  • 2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
  • 2.11 Malware Activity Indicators
  • 2.12 Operating System Attack Indicators
  • 2.13 Application Attack Indicators
  • 2.13.1 ACTIVITY – Recognizing Directory Traversal
  • 2.14 Physical Attack Indicators
  • 2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
  • 2.15 Network Attack Indicators
  • 2.15.1 ACTIVITY – Crashing a Target with DoS
  • 2.16 Cryptographic Attack Indicators
  • 2.17 Password Attack Indicators
  • 2.17.1 ACTIVITY – Password Cracking
  • 2.18 Network Segmentation
  • 2.19 Access Control
  • 2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
  • 3.1 Network Segmentation
  • 3.1.1 ACTIVITY – Segementing a Network
  • 3.2 High Availability
  • 3.3 Virtualization
  • 3.3.1 ACTIVITY – Deploying Docker Containers
  • 3.4 Cloud
  • 3.5 Serverless Computing
  • 3.6 IoT
  • 3.7 ICS SCADA
  • 3.7.1 ACTIVITY – Operating a SCADA System
  • 3.8 RTOS and Embedded Systems
  • 3.9 Reducing the Attack Surface
  • 3.10 Firewalls
  • 3.11 IDS IPS.mp4
  • 3.12 Secure Communications – Access
  • 3.13 Port Security
  • 3.14 SD-WAN and SASE
  • 3.15 Data Classifications
  • 3.16 Protecting Data Types
  • 3.17 Data Considerations
  • 3.18 Redundancy
  • 3.19 Alternate Sites
  • 3.20 Multiple Platforms
  • 3.21 Business Continuity
Module 4 – SY0-701 Security Operations
  • 4.1 Secure Baselines
  • 4.2 Attack Surface Reduction
  • 4.3 Wireless Installation
  • 4.4 Wireless Security Settings
  • 4.5 Mobile Solutions
  • 4.5.1 ACTIVITY – Pwning a Mobile Device
  • 4.6 Application Security Management
  • 4.7 Asset Management
  • 4.8 Vulnerability Management
  • 4.9 Monitoring Activities
  • 4.10 Monitoring Tools
  • 4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
  • 4.11 Firewall Configuration
  • 4.11.1 ACTIVITY – Configuring Firewall Rules
  • 4.12 Intrusion Detection Configuration
  • 4.13 Web Traffic Filtering
  • 4.14 Operating System Policy
  • 4.14.1 ACTIVITY – Examining Windows Group Policy
  • 4.15 Network Service Security
  • 4.16 Data Loss Protection
  • 4.16.1 ACTIVITY – Checking File Integrity
  • 4.17 Network Access Control
  • 4.17.1 ACTIVITY – Require Multifactor Authentication
  • 4.18 Identity Management
  • 4.19 Access Management
  • 4.19.1 ACTIVITY – Implementing Access Control
  • 4.20 Security Automation
  • 4.21 Incident Response
  • 4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
  • 5.1 Elements of Effective Security Governance
  • 5.2 Elements of the Risk Management Process
  • 5.3 Third Party Risk Assessment and Management
  • 5.3.1 ACTIVITY – Analyzing the Solar Winds Supply Chain Failure
  • 5.4 Effective Security Compliance
  • 5.5 Audits and Assessments
  • 5.5.1 ACTIVITY – Conducting OSINT
  • 5.5.2 ACTIVITY – Performing Active Reconnaissance
  • 5.6 Security Awareness Practices
  • 5.7 Course Outro
Module 1 – Data Threats & ID Theft
  • Module 1.1 – Introduction
  • Module 1.2 – Data Threats & Costs
Module 2 – Device Security
  • Module 2.1 – Device Access
  • Module 2.2 – Device Management
Module 3 – Preventing Inadvertant Disclosure
  • Module 3.1 – Inadvertant Disclosure
  • Module 3.2 – Removing PII
  • Module 3.3 – Social Engineering
Module 4 – Physical & Technical Safeguards
  • Module 4.1 – Physical Security
  • Module 4.2 – Issues With Public Networds
  • Module 4.3 – Data Encryption and Destruction
  • Module 4.4 – Incident Reporting
  • Module 4.5 – Course Conclusion
Module 1 – CompTIA CySA+ CS0-003 Basics
  • 1.1 Course Introduction
  • 1.2 Instructor Introduction
  • 1.3 What is CySA
  • 1.4 Exam Objectives
  • 1.5 Cybersecurity Pathway
  • 1.6 DoD Baseline Certfication
Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
  • 2.1 Domain 1 – Security Operations Overview
  • 2.2 System and Network Architecture Concepts in Security Operations
  • 2.3 Log Files
  • 2.4 Operating Systems
  • 2.5 Infrastructure Concepts
  • 2.6 Network Architecture
  • 2.7 Software Defined Networking
  • 2.8 Whiteboard Discussion – Network Architectures
  • 2.9 Identity and Access Management IAM Basics
  • 2.10 Demonstration – IAM
  • 2.11 Encryption
  • 2.12 Sensitive Data
  • 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
  • 2.14 Network Attack
  • 2.15 Host Attacks
  • 2.16 Application Related Attacks
  • 2.17 Social Attacks
  • 2.18 Tools or Techniques to Determine Malicious Activity Overview
  • 2.19 Tools and Toolsets For Identifying Malicious Activity
  • 2.20 Common Techniques
  • 2.21 Programming Concerns
  • 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
  • 2.23 Threat Actors
  • 2.24 Tactics, Techniques and Procedures
  • 2.25 Confidence Levels IOC
  • 2.26 Collection Sources
  • 2.27 Threat Intelligence
  • 2.28 Cyber Response Teams
  • 2.29 Security Operations
  • 2.30 Standardized Processes and Operations
  • 2.31 Security Operations Tools and Toolsets
  • 2.32 Module 2 Review
Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
  • 3.1 Domain 2 – Vulnerability Management Overview
  • 3.2 Vulnerability Discovery and Scanning
  • 3.3 Asset Discovery and Scanning
  • 3.4 Industry Frameworks
  • 3.5 Mitigating Attacks
  • 3.6 CVSS and CVE
  • 3.7 Common Vulnerability Scoring System (CVSS) interpretation
  • 3.8 CVE Databases
  • 3.9 Cross Site Scripting (XSS)
  • 3.10 Vulnerability Response, Handling, and Management
  • 3.11 Control Types (Defense in Depth, Zero Trust)
  • 3.12 Patching and Configurations
  • 3.13 Attack Surface Management
  • 3.14 Risk Management Principles
  • 3.15 Threat Modeling
  • 3.16 Threat Models
  • 3.17 Secure Coding and Development (SDLC)
  • 3.18 Module 3 Review
Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and Management
  • 4.1 Domain 3 – Incident Response and Management Overview
  • 4.2 Attack Methodology Frameworks
  • 4.3 Cyber Kill Chain
  • 4.4 Frameworks to Know
  • 4.5 Incident Response and Post Reponse
  • 4.6 Detection and Analysis
  • 4.7 Post Incident Activities
  • 4.8 Containment, Eradication and Recovery
  • 4.9 Module 4 Review
Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
  • 5.1 Domain 4 – Reporting and Communication Overview
  • 5.2 Reporting Vulnerabilities Overview
  • 5.2.1 Vulnerability Reporting
  • 5.3 Compliance Reports
  • 5.4 Inhibitors to Remediation
  • 5.5 Metrics and KPI's
  • 5.6 Incident Response Reporting and Communications Overview
  • 5.7 Incident Declaration
  • 5.8 Communication with Stakeholders
  • 5.9 Root Cause Analysis
  • 5.10 Lessons Learned and Incident Closure
  • 5.11 Module 5 Review
Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
  • 6.1 Course Closeout Overview
  • 6.2 Practice Questions
  • 6.3 Exam Process
  • 6.4 Continuing Education
  • 6.5 Course Closeout
Module 1 – Welcome and Course Introduction
  • Module 1.0 – Introduction To Transitioning To The Cloud
  • Module 1.1 – Who Is This Course For
  • Module 1.2 – The Importance and Benefits Of Moving To The Cloud
  • Module 1.3 – Module Recap
Module 2 – Understanding On-Site Infrastructure
  • Module 2.1 – Defining On-Site Infrastructure
  • Module 2.2 – Pros and Cons of On-Site Infrastructure
Module 3 – Types of Cloud Services
  • Module 3.1 – What is Cloud Computing?
  • Module 3.2 – Categories of Cloud Computing
  • Module 3.3 – Key Advantages
  • Module 3.4 – Key Considerations
  • Module 3.5 – Recap
Module 4 – Why Transition To The Cloud?
  • Module 4.1 – Cost-Efficiency
  • Module 4.2 – Scalability
  • Module 4.3 – Flexibility and Mobility
  • Module 4.4 – Recap
Module 5 – Planning The Transition
  • Module 5.1 – Assessing Current Infrastructure
  • Module 5.2 – Choosing A Cloud Provider
  • Module 5.3 – Budget and Timeline
  • Module 5.4 – Recap
Module 6 – Key Steps in the Transition
  • Module 6.1 – Data Migration
  • Module 6.2 – Application Porting
  • Module 6.3 – Employee Training
  • Module 6.4 – Recap
Module 7 – Post-Transition Management
  • Module 7.1 – Monitoring and Analytics
  • Module 7.2 – Security Measures
  • Module 7.3 – On-going Costs
  • Module 7.4 – Recap
Combating Cyber Threats
  • Chrys Thorsen – Webinar – Road To Zero
Module 1 – Azure Overview
  • 1.0 Introduction to AZ-104
  • 1.1 Cloud Computing
  • 1.2 Cloud Services Benefits
  • 1.3 Cloud Service Types
  • 1.4 Azure Core Architectural Components
  • 1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
  • 1.5 Azure Compute Services
  • 1.6 Azure Application Hosting Options
  • 1.7 Azure Networking Services
  • 1.8 Azure Storage Services
  • 1.9 Azure Identity, Access, and Security
  • 1.10 Azure Cost Management
  • 1.10.1 ACTIVITY- Checking Your Azure Balance
  • 1.11 Azure Governance and Compliance Tools
  • 1.11.1 ACTIVITY- Assign an Azure Policy
Module 2 – Azure Tools
  • 2.1 Azure Portal
  • 2.1.1 ACTIVITY- Exploring the Azure Portal
  • 2.2 Azure Monitoring Tools
  • 2.3 Azure PowerShell
  • 2.3.1 ACTIVITY- Using Azure PowerShell
  • 2.4 Azure CLI
  • 2.4.1 ACTIVITY- Using the Azure CLI
  • 2.5 Azure Cloud Shell
  • 2.6 ARM Templates
  • 2.6.1 ACTIVITY- Using Templates to Deploy Resources
  • 2.7 Azure Resource Manager
  • 2.8 Hybrid Tools
Module 3 – Azure Identities and Governance
  • 3.1 Azure AD Overview
  • 3.1.1 ACTIVITY- Exploring Azure Active Directory
  • 3.1.2 ACTIVITY- Adding a Custom Domain
  • 3.2 Subscriptions
  • 3.3 Users and Groups
  • 3.3.1 ACTIVITY- Adding Azure Active Directory User
  • 3.3.2 ACTIVITY- Bulk Inviting New Users
  • 3.3.3 ACTIVITY- Creating Azure AD Groups
  • 3.4 Authentication
  • 3.5 SSPR
  • 3.5.1 ACTIVITY- Implementing SSPR
  • 3.6 Devices
  • 3.7 Azure Roles
  • 3.7.1 ACTIVITY- Assigning Azure Roles
  • 3.8 Azure AD Roles
  • 3.8.1 ACTIVITY- Assigning Azure AD Roles
  • 3.9 Conditional Access
  • 3.10 Authorization
  • 3.10.1 ACTIVITY- Managing Licenses
  • 3.11 Azure Policy
Module 4 – Azure Storage
  • 4.1 Storage Accounts
  • 4.1.1 ACTIVITY- Creating a Storage Account
  • 4.2 Storage Types
  • 4.2.1 ACTIVITY- Creating Storage Types
  • 4.3 Azure Storage Tools
  • 4.3.1 ACTIVITY- Azure Storage Explorer
  • 4.4 Azure Files and File Sync
  • 4.4.1 ACTIVITY- Deploying an Azure Files Share
  • 4.5 Azure Storage Security
Module 5 – Azure Compute Resources
  • 5.1 Virtual Machines
  • 5.1.1 ACTIVITY- Create Virtual Machines
  • 5.1.2 ACTIVITY- Delete a Virtual Machine
  • 5.2 VM Availability
  • 5.2.1 ACTIVITY- Increasing VM Availability
  • 5.3 VM Extensions
  • 5.4 Azure App Service
  • 5.5 Azure Container Instances
  • 5.6 Kubernetes
Module 6 – Azure Virtual Networks
  • 6.1 Virtual Networks
  • 6.1.1 ACTIVITY- Create a VNet
  • 6.2 Network Security Groups-Part 1
  • 6.2.1 Network Security Groups-Part 2
  • 6.3 Azure Firewall
  • 6.3.1 ACTIVITY- Deploying a Firewall
  • 6.4 Azure DNS-Part 1
  • 6.4.1 Azure DNS-Part 2
  • 6.4.2 ACTIVITY- Implementing Azure DNS Zone6
  • 6.5 Virtual Network Peering
  • 6.5.1 ACTIVITY- VNet Peering
  • 6.6 Azure VPN Gateway
  • 6.7 ExpressRoute and Virtual WANs
  • 6.8 Azure Load Balancer
  • 6.9 Azure Application Gateway
  • 6.10 Azure Routes
Module 7 – Azure Monitoring and Backup
  • 7.1 Network Watcher
  • 7.2 Azure Monitor
  • 7.3 Azure Backup-Part 1
  • 7.4 Azure Backup-Part 2
  • 7.5 Azure Backup-Part 3
  • 7.6 Conclusion to AZ-104
Module 1 – ChatGPT Fundamentals
  • 1.1 Course Welcome
  • 1.2 Instructor Introduction
  • 1.3 Download Course Resources
  • 1.4 ChatGPT Fundamentals
  • 1.5 What is ChatGPT
  • 1.6 Use Cases for ChatGPT
  • 1.7 Role of ChatGPT
  • 1.8 Future of ChatGPT
  • 1.9 ChatGPT Statistics, Facts & Trends
  • 1.10 Limitations
  • 1.11 What is a Chatbot
  • 1.12 Understanding AI-ML
  • 1.13 Demonstration – Tools to Use with ChatGPT
  • 1.14 Business Benefits
  • 1.15 Whiteboard – How it all works
  • 1.16 Demonstration – How to Get Started with ChatGPT
  • 1.17 Demonstration – Example Prompts
  • 1.18 Discussion – ChatGPT Performance Issues
  • 1.19 Module Summary
Module 2 – ChatGPT Prompt Demonstrations
  • 2.1 ChatGPT Prompt Demonstrations
  • 2.2 What is a Prompt
  • 2.3 Best Practices For Writing Prompts
  • 2.4 Prompt Demonstration – Asking Questions
  • 2.5 Prompt Demonstration – Top Ten Lists
  • 2.6 Prompt Demonstration – Long Form Docs
  • 2.7 Prompt Demonstration – Complex Form and Code
  • 2.8 Prompt Demonstration – Feedback
  • 2.9 Prompt Demonstration – Content Modification
  • 2.10 Prompt Demonstration – Instruction Generation
  • 2.11 Prompt Demonstration – Information Extraction
  • 2.12 Prompt Demonstration – Writing Computer Code
  • 2.13 Prompt Demonstration – Solving Math Problems
  • 2.14 Prompt Demonstration – Create YT Video Outline
  • 2.15 Prompt Demonstration – Write a Blog Article
  • 2.16 Prompt Demonstration – SEO Keywords
  • 2.17 Comparing Google Bard vs ChatGPT
  • 2.18 Module Summary
  • 2.19 Course Closeout
Module 1 – Introduction To Ethical Hacking
  • 1.0 Introduction to CEH v12
  • 1.1 Elements of Security
  • 1.2 Cyber Kill Chain
  • 1.3 MITRE ATT&CK Framework
  • 1.3.1 Activity – Researching the MITRE ATTACK Framework
  • 1.4 Hacking
  • 1.5 Ethical Hacking
  • 1.6 Information Assurance
  • 1.7 Risk Management
  • 1.8 Incident Management
  • 1.9 Information Security Laws and Standards
  • 1.10 Introduction to Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
  • 2.1 Footprinting Concepts
  • 2.2 OSINT Tools
  • 2.2.1 Activity – Conduct OSINT with OSR Framework
  • 2.2.2 Activity – OSINT with theHarvester
  • 2.2.3 Activity – Add API Keys to theHarvester
  • 2.2.4 Activity – Extract Document Metadata with FOCA
  • 2.2.5 Activity – Extract Document Metadata with FOCA
  • 2.3 Advanced Google Search
  • 2.3.1 Activity – Google Hacking
  • 2.4 Whois Footprinting
  • 2.4.1 Activity – Conducting Whois Research
  • 2.5 DNS Footprinting
  • 2.5.1 Activity – Query DNS with NSLOOKUP
  • 2.6 Website Footprinting
  • 2.6.1 Activity – Fingerprint a Webserver with ID Serve
  • 2.6.2 Activity – Extract Data from Websites
  • 2.6.3 Activity – Mirror a Website with HTTrack
  • 2.7 Email Footprinting
  • 2.7.1 Activity – Trace a Suspicious Email
  • 2.8 Network Footprinting
  • 2.9 Social Network Footprinting
  • 2.10 Footprinting and Reconnaissance Countermeasures
  • 2.11 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
  • 3.1 Scanning Concepts
  • 3.2 Discovery Scans
  • 3.2.1 Activity – ICMP ECHO and ARP Pings
  • 3.2.2 Activity – Host Discovery with Angry IP Scanner
  • 3.3 Port Scans
  • 3.3.1 Activity – Port Scan with Angry IP Scanner
  • 3.4 Other Scan Types
  • 3.5 Scanning Tools
  • 3.5.1 Activity – Hping3 Packet Crafting
  • 3.5.2 Activity – Fingerprinting with Zenmap
  • 3.6 NMAP
  • 3.6.1 Activity – Nmap Basic Scans
  • 3.6.2 Activity – Host Discovery with Nmap
  • 3.6.3 – Activity – Nmap Version Detection
  • 3.6.4 Activity – Nmap Idle (Zombie) Scan
  • 3.6.5 Activity – Nmap FTP Bounce Scan
  • 3.6.6 – Activity – NMAP Scripts
  • 3.7 Firewall and IDS Evasion
  • 3.7.1 Activity – Nmap Advanced Scans
  • 3.8 Proxies
  • 3.9 Scanning Countermeasures
  • 3.10 Scanning Networks Review
Module 4: Enumeration
  • 4.1 Enumeration Overview
  • 4.2 SMB_NetBIOS_Enumeration
  • 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
  • 4.3 File Transfer Enumeration
  • 4.4 WMI Enumeration
  • 4.4.1 – Activity – Enumerating WMI with Hyena
  • 4.5 SNMP Enumeration
  • 4.5.1 Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
  • 4.6 LDAP Enumeration
  • 4.7 DNS Enumeration
  • 4.8 SMTP Enumeration
  • 4.8.1 Activity – Enumerate Email Users with SMTP
  • 4.9 Remote Connection Enumeration
  • 4.10 Website Enumeration
  • 4.10.1 Activity – Enumerate a Website with DirBuster
  • 4.11 Other Enumeration Types
  • 4.12 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
  • 5.1 Vulnerability Scanning
  • 5.1.1 Vulnerability Scanning with OpenVAS
  • 5.2 Vulnerability Assessment
  • 5.3 Vulnerability Analysis Review
Module 6: System Hacking
  • 6.1 System Hacking Concepts
  • 6.2 Common OS Exploits
  • 6.3 Buffer Overflows
  • 6.3.1 Activity – Performing a Buffer Overflow
  • 6.4 System Hacking Tools and Frameworks
  • 6.4.1 Activity – Hack a Linux Target from Start to Finish
  • 6.5 Metasploit
  • 6.5.1 Activity – Get Started with Metasploit
  • 6.6 Meterpreter
  • 6.7 Keylogging and Spyware
  • 6.7.1 Activity – Keylogging with Meterpreter
  • 6.8 Netcat
  • 6.8.1 Activity – Using Netcat
  • 6.9 Hacking Windows
  • 6.9.1 Activity – Hacking Windows with Eternal Blue
  • 6.10 Hacking Linux
  • 6.11 Password Attacks
  • 6.11.1 Activity – Pass the Hash
  • 6.11.2 Activity – Password Spraying
  • 6.12 Password Cracking Tools
  • 6.13 Windows Password Cracking
  • 6.13.1 Activity – Cracking Windows Passwords
  • 6.13.2 Activity – Cracking Password Hashes with Hashcat
  • 6.14 Linux Password Cracking
  • 6.15 Other Methods for Obtaining Passwords
  • 6.16 Network Service Attacks
  • 6.16.1 Activity – Brute Forcing a Network Service with Medusa
  • 6.17 Post Exploitation
  • 6.18 Pivoting
  • 6.18.1 & 6.18.2 Activity – Pivoting Setup and Attack
  • 6.19 Maintaining Access
  • 6.19.1 Activity – Persistence
  • 6.20 Hiding Data
  • 6.20.1 Activity – Hiding Data Using Least Significant Bit Steganography
  • 6.21 Covering Tracks
  • 6.21.1 Activity – Clearing Tracks in Windows
  • 6.21.2 Activity – View and Clear Audit Policies with Auditpol
  • 6.22 System Hacking Countermeasures
  • 6.23 System Hacking Review
Module 7: Malware Threats
  • 7.1 Malware Overview
  • 7.2 Viruses
  • 7.3 Trojans
  • 7.3.1 Activity – Deploying a RAT
  • 7.4 Rootkits
  • 7.5 Other Malware
  • 7.6 Advanced Persistent Threat
  • 7.7 Malware Makers
  • 7.7.1 Activity – Creating a Malware Dropper and Handler
  • 7.8 Malware Detection
  • 7.9 Malware Analysis
  • 7.9.1 Activity – Performing a Static Code Review
  • 7.9.2 Activity – Analyzing the SolarWinds Orion Hack
  • 7.10 Malware Countermeasures
  • 7.11 Malware Threats Review
Module 8: Sniffing
  • 8.1 Network Sniffing
  • 8.2 Sniffing Tools
  • 8.2.1 Activity- Sniffing HTTP with Wireshark
  • 8.2.2 Activity – Capturing Files from SMB
  • 8.3 ARP and MAC Attacks
  • 8.3.1 Activity – Performing an MITM Attack with Ettercap
  • 8.4 Name Resolution Attacks
  • 8.4.1 Activity – Spoofing Responses with Responder
  • 8.5 Other Layer 2 Attacks
  • 8.6 Sniffing Countermeasures
  • 8.7 Sniffing Review
Module 9: Social Engineering
  • 9.1 Social Engineering Concepts
  • 9.2 Social Engineering Techniques
  • 9.2.1 Activity – Deploying a Baited USB Stick
  • 9.2.2 Activity – Using an O.MG Lightning Cable
  • 9.3 Social Engineering Tools
  • 9.3.1 Activity – Phishing for Credentials
  • 9.4 Social Media, Identity Theft, Insider Threats
  • 9.5 Social Engineering Countermeasures
  • 9.6 Social Engineering Review
Module 10: Denial-of-Service
  • 10.1 DoS-DDoS Concepts
  • 10.2 Volumetric Attacks
  • 10.3 Fragmentation Attacks
  • 10.4 State Exhaustion Attacks
  • 10.5 Application Layer Attacks
  • 10.5.1 Activity – Performing a LOIC Attack
  • 10.5.2 Activity – Performing a HOIC Attack
  • 10.5.3 Activity – Conducting a Slowloris Attack
  • 10.6 Other Attacks
  • 10.7 DoS Tools
  • 10.8 DoS Countermeasures
  • 10.9 DoS Review
Module 11: Session Hijacking
  • 11.1 Session Hijacking
  • 11.2 Compromising a Session Token
  • 11.3 XSS
  • 11.4 CSRF
  • 11.5 Other Web Hijacking Attacks
  • 11.6 Network-Level Session Hijacking
  • 11.6.1 Activity – Hijack a Telnet Session
  • 11.7 Session Hijacking Tools
  • 11.8 Session Hijacking Countermeasures
  • 11.9 Session Hijacking Review
Module 12: Evading IDS, Firewalls, and Honeypots
  • 12.1 Types of IDS
  • 12.2 Snort
  • 12.3 System Logs
  • 12.4 IDS Considerations
  • 12.5 IDS Evasion
  • 12.5.1 Activity – Fly Below IDS Radar
  • 12.6 Firewalls
  • 12.7 Packet Filtering Rules
  • 12.8 Firewall Deployments
  • 12.9 Split DNS
  • 12.10 Firewall Product Types
  • 12.11 Firewall Evasion
  • 12.11.1 Activity – Use Social Engineering to Bypass a Windows Firewall
  • 12.11.2 Activity – Busting the DOM for WAF Evasion
  • 12.12 Honeypots
  • 12.13 Honeypot Detection and Evasion
  • 12.13.1 Activity – Test and Analyze a Honey Pot
  • 12.14 Evading IDS, Firewalls, and Honeypots Review
Module 13: Hacking Web Servers
  • 13.1 Web Server Operations
  • 13.2 Hacking Web Servers
  • 13.3 Common Web Server Attacks
  • 13.3.1 Activity – Defacing a Website
  • 13.4 Web Server Attack Tools
  • 13.5 Hacking Web Servers Countermeasures
  • 13.6 Hacking Web Servers Review
Module 14: Hacking Web Applications
  • 14.1 Web Application Concepts
  • 14.2 Attacking Web Apps
  • 14.3 A01 Broken Access Control
  • 14.4 A02 Cryptographic Failures
  • 14.5 A03 Injection
  • 14.5.1 Activity – Command Injection
  • 14.6 A04 Insecure Design
  • 14.7 A05 Security Misconfiguration
  • 14.8 A06 Vulnerable and Outdated Components
  • 14.9 A07 Identification and Authentication Failures
  • 14.10 A08 Software and Data integrity Failures
  • 14.11 A09 Security Logging and Monitoring Failures
  • 14.12 A10 Server-Side Request Forgery
  • 14.13 XSS Attacks
  • 14.13.1 Activity – XSS Walkthrough
  • 14.13.2 Activity – Inject a Malicious iFrame with XXS
  • 14.14 CSRF
  • 14.15 Parameter Tampering
  • 14.15.1 Activity – Parameter Tampering with Burp
  • 14.16 Clickjacking
  • 14.17 SQL Injection
  • 14.18 Insecure Deserialization Attacks
  • 14.19 IDOR
  • 14.19.1 Activity – Hacking with IDOR
  • 14.20 Directory Traversal
  • 14.21 Session Management Attacks
  • 14.22 Response Splitting
  • 14.23 Overflow Attacks
  • 14.24 XXE Attacks
  • 14.25 Web App DoS
  • 14.26 Soap Attacks
  • 14.27 AJAX Attacks
  • 14.28 Web API Hacking
  • 14.29 Webhooks and Web Shells
  • 14.30 Web App Hacking Tools
  • 14.31 Hacking Web Applications Countermeasures
  • 14.32 Hacking Web Applications Review
Module 15: SQL Injection
  • 15.1 SQL Injection Overview
  • 15.2 Basic SQL Injection
  • 15.3 Finding Vulnerable Websites
  • 15.4 Error-based SQL Injection
  • 15.5 Union SQL Injection
  • 15.5.1 Activity – Testing SQLi on a Live Website – Part 1
  • 15.5.2 Activity – Testing SQLi on a Live Website – Part 2
  • 15.6 Blind SQL Injection
  • 15.7 SQL Injection Tools
  • 15.7.1 Activity – SQL Injection Using SQLmap
  • 15.8 Evading Detection
  • 15.9 Analyzing SQL Injection
  • 15.10 SQL Injection Countermeasures
  • 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
  • 16.1 Wireless Concepts
  • 16.2 Wireless Security Standards
  • 16.3 WI-FI Discovery Tools
  • 16.4 Common Wi-Fi Attacks
  • 16.5 Wi-Fi Password Cracking
  • 16.6 WEP Cracking
  • 16.6.1 Activity – Cracking WEP
  • 16.7 WPA,WPA2,WPA3 Cracking
  • 16.7.1 Activity – WPA KRACK Attack
  • 16.8 WPS Cracking
  • 16.9 Bluetooth Hacking
  • 16.10 Other Wireless Hacking
  • 16.10.1 Activity – Cloning an RFID badge
  • 16.10.2 Activity – Hacking with a Flipper Zero
  • 16.11 Wireless Security Tools
  • 16.12 Wireless Hacking Countermeasures
  • 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
  • 17.1 Mobile Device Overview
  • 17.2 Mobile Device Attacks
  • 17.3 Android Vulnerabilities
  • 17.4 Rooting Android
  • 17.5 Android Exploits
  • 17.5.1 Activity – Hacking Android
  • 17.5.2 Activity – Using a Mobile Device in a DDoS Campaign
  • 17.6 Android-based Hacking Tools
  • 17.7 Reverse Engineering an Android App
  • 17.8 Securing Android
  • 17.9 iOS Overview
  • 17.10 Jailbreaking iOS
  • 17.11 iOS Exploits
  • 17.12 iOS-based Hacking Tools
  • 17.13 Reverse Engineering an iOS App
  • 17.14 Securing iOS
  • 17.15 Mobile Device Management
  • 17.16 Hacking Mobile Platforms Countermeasures
  • 17.17 Hacking Mobile Platforms Review
Module 18: IoT AND OT Hacking
  • 18.1 IoT Overview
  • 18.2 IoT Infrastructure
  • 18.3 IoT Vulnerabilities and Threats
  • 18.3.1 Activity – Searching for Vulnerable IoT Devices
  • 18.4 IoT Hacking Methodology and Tools
  • 18.5 IoT Hacking Countermeasures
  • 18.6 OT Concepts
  • 18.7 IT-OT Convergence
  • 18.8 OT Components
  • 18.9 OT Vulnerabilities
  • 18.10 OT Attack Methodology and Tools
  • 18.11 OT Hacking Countermeasures
  • 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
  • 19.1 Cloud Computing Concepts
  • 19.2 Cloud Types
  • 19.3 Cloud Benefits and Considerations
  • 19.4 Cloud Risks and Vulnerabilities
  • 19.5 Cloud Threats and Countermeasures
  • 19.5.1 Activity – Hacking S3 Buckets
  • 19.6 Cloud Security Tools And Best Practices
  • 19.7 Cloud Computing Review
Module 20: Cryptography
  • 20.1 Cryptography Concepts
  • 20.2 Symmetric Encryption
  • 20.2.1 Activity – Symmetric Encryption
  • 20.3 Asymmetric Encryption
  • 20.3.1 Activity – Asymmetric Encryption
  • 20.4 Public Key Exchange
  • 20.5 PKI
  • 20.5.1 Activity – Generating and Using an Asymmetric Key Pair
  • 20.6 Digital Signatures
  • 20.7 Hashing
  • 20.7.1 Activity – Calculating Hashes
  • 20.8 Common Cryptography Use Cases
  • 20.9 Cryptography Tools
  • 20.10 Cryptography Attacks
  • 20.11 Cryptography Review
  • 20.12 Course Conclusion
Module 1 – CompTIA Cloud+ CV0-003 Course Overview
  • 1.0 Course Trailer
  • 1.1 Course Overview
  • 1.2 What is the Cloud + Exam
  • 1.3 Cloud + Domain Obectives Overview
  • 1.4 CompTIA Certification Pathways
  • 1.5 DoD and ISO Requirements
Module 2 – General Cloud Knowledge
  • 2.1 Domain Overview
  • 2.2 Compare and Contrast Cloud Models
  • 2.3 Cloud Computing Defined
  • 2.4 Deployment Models
  • 2.5 Service Models
  • 2.6 Cloud Characteristics
  • 2.7 Cloud Roles
  • 2.8 Evaluate Cloud Providers and Services
  • 2.9 Regions and Zones
  • 2.10 Shared Responsibility Model
  • 2.11 Demonstration – AWS Shared Security Model
  • 2.12 Comparing Cloud to Virtualization
  • 2.13 Comparing Cloud to On Premises
  • 2.14 What is a Virtual Machine
  • 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
  • 2.16 What is an API
  • 2.17 Capacity Planning Factors
  • 2.18 Licensing, Factors, Requirements and Planning
  • 2.19 Capacity Planning
  • 2.20 Demonstration – AWS Trusted Advisor
  • 2.21 HA and Scaling
  • 2.22 High Availability and Disaster Recovery
  • 2.23 Virtual, System and Communication Protection
  • 2.24 Hypervisor Affinity
  • 2.25 Analyze the solution design
  • 2.26 Business Requirements
  • 2.27 Business Enablers
  • 2.28 Demonstration -AWS Well Architected Tool
  • 2.29 Testing Techniques
  • 2.30 Testing Success Factors
  • 2.31 Module Review Questions
  • 2.32 Module Summary Review
Module 3 – Cloud Security
  • 3.1 Domain Overview
  • 3.2 Configure Identity and Access Management
  • 3.3 Identification and Authorization Management (IAM)
  • 3.4 SDLC
  • 3.5 Directory Services
  • 3.6 Security and Access Controls
  • 3.7 Federation
  • 3.8 SSO and MFA
  • 3.9 Certificates and Key Management
  • 3.10 Secure a Network in a Cloud Environment
  • 3.11 Networking Devices and Segmentation
  • 3.12 Firewalls and Proxies
  • 3.13 NAT and PAT
  • 3.14 Secure Network Configurations (Tunnelling and Encryption)
  • 3.15 Demo Hardening and Configuration Changes
  • 3.16 OS Application Controls and Security Credentials
  • 3.17 Policies and Permissions
  • 3.18 Host and Network Protections (HIDSIPS)
  • 3.19 Virtualization Security
  • 3.20 Monitoring
  • 3.21 Data Security and Compliance Controls in Cloud Environments
  • 3.22 Structured, Unstructured and Semi Structured Data
  • 3.23 Data Classification and Labeling
  • 3.24 Data Loss Prevention
  • 3.25 Demonstration – Google Cloud DLP
  • 3.26 Chain of Custody and Non-Repudiation
  • 3.27 Discussion – CASB
  • 3.28 Module Summary Review
  • 3.29 Module Review Questions
Module 4 – Cloud Deployment
  • 4.1 Domain Overview
  • 4.2 Integrate Components into Cloud Solutions
  • 4.3 Subscription Services
  • 4.4 Demonstration – Provision VM
  • 4.5 Cloud Infrastructure Components
  • 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
  • 4.7 Containers
  • 4.8 Microservices
  • 4.9 Demonstration – Deploy Containers
  • 4.10 Scaling
  • 4.11 Provision Storage
  • 4.12 Cloud Storage Protocols
  • 4.13 Storage Features
  • 4.14 Storage Cost Considerations
  • 4.15 Storage Performance
  • 4.16 RAID and Tiering
  • 4.17 Demonstration – AWS S3
  • 4.18 Deploy Cloud Networking Solutions
  • 4.19 Connecting to The Cloud
  • 4.20 Network Protocols
  • 4.21 VPNS, VPC and Connectivity
  • 4.22 Whiteboard – AWS VPC Connectivity
  • 4.23 Demonstration – AWS VPC
  • 4.24 Software Defined Networking (SDN)
  • 4.25 Compute Sizing
  • 4.26 Virtualization Considerations
  • 4.27 Resource Rightsizing (CPU, Memory, etc)
  • 4.28 Module Summary Review
  • 4.29 Module Review Questions
Module 5 – Operations and Support
  • 5.1 Domain Overview
  • 5.2 Logging Monitoring and Alerting
  • 5.3 Logging, Storage and Analysis of Data Events
  • 5.4 Monitoring Cloud Resources
  • 5.5 Service Level Agreements
  • 5.6 Demonstration – SLAs in AWS
  • 5.7 Maintain Efficient Operations of a Cloud Environment
  • 5.8 Lifecycle Management
  • 5.9 Change and Asset Management
  • 5.10 SOP, Patching and Upgrades
  • 5.11 Orchestration and Automation
  • 5.12 Orchestration or Automation
  • 5.13 DevOps, IaC and CICD Pipelines
  • 5.14 Playbooks and Templates
  • 5.15 Backup and Restore Operations
  • 5.16 Backup Types, Objects, Targets
  • 5.17 Restore and Recovery
  • 5.18 Module Summary Review
  • 5.19 Module Review Questions
Module 6 – Troubleshooting
  • 6.1 Domain Overview
  • 6.2 Troubleshooting Methodology Intro
  • 6.3 Troubleshooting Methodology
  • 6.4 Troubleshoot Security Issues
  • 6.5 Cloud Attacks
  • 6.6 Security Groups and NACLS
  • 6.7 Troubleshoot Deployment Issues
  • 6.8 Discussion Site Connectivity Issues
  • 6.9 Discussion – Capacity Issues
  • 6.10 Connectivity Issues
  • 6.11 Connectivity Troubleshooting Tools
  • 6.12 Demonstration – GCP AWS Azure Latency Test
  • 6.13 Module Summary Review
  • 6.14 Module Review Questions
Module 7 – Course Closeout
  • 7.1 Exam Preparation
  • 7.2 Course Closeout
Module 1 – Google Cloud Digital Leader Course Overview
  • 1.0 About Google Cloud Digital Leader
  • 1.1 Course and Instructor Intro
  • 1.2 Course PreReqs
  • 1.3 GCP Certification Overview
  • 1.4 GCP Digital Leader Exam Objectives
Module 2 – General Cloud Knowledge
  • 2.0 General Cloud Knowledge
  • 2.1 Domain Objectives
  • 2.2 Intro to Cloud Computing
  • 2.3 Essential Characteristics of Cloud Computing
  • 2.4 Service Models
  • 2.5 Deployment Models
  • 2.6 Multitenancy
  • 2.7 Resilency
  • 2.8 Replication
  • 2.9 Automation and Orchestration
  • 2.10 Chargeback
  • 2.11 Vendor Lockin
  • 2.12 Cloud Standards
  • 2.13 OpEx, CapEx
  • 2.14 TCO-ROI
  • 2.15 Business Enablers
  • 2.16 Section Summary
  • 2.17 Review Questions
Module 3 – General Google Cloud Knowledge
  • 3.0 General GCP Knowledge
  • 3.1 Domain Objectives
  • 3.2 GCP Overview
  • 3.3 Cloud Infrastructure
  • 3.4 Cloud Hierarchy
  • 3.5 Project Demo
  • 3.6 Whiteboard Hierarchy and Projects
  • 3.7 Service Options
  • 3.8 Demo – Services Overview
  • 3.9 Pricing Calculator
  • 3.10 Demo – Pricing Calculator
  • 3.11 Billing models and Discounts
  • 3.12 Demo Billing
  • 3.13 Compliance Resources
  • 3.14 Demo – Compliance Reports Manager
  • 3.15 Support Options
  • 3.16 Service Level Agreement (SLA)
  • 3.17 Google Cloud Framework and Maturity Model
  • 3.18 Demo – Maturity Assessment
  • 3.19 Access to GCP
  • 3.20 Demo – GCP ACCESS
  • 3.21 Section Summary
  • 3.22 Review Questions
Module 4 – Google Cloud Products and Services
  • 4.0 Google Cloud Products and Services
  • 4.1 Domain Objectives
  • 4.2 Core Services
  • 4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal
  • 4.4 Compute Storage and Disk Options
  • 4.5 App Engine, Google Cloud Functions, and Cloud Run
  • 4.6 Google Kubernetes Engine
  • 4.7 Demo Compute Services
  • 4.8 Container registry
  • 4.9 Cost and Performance Tradeoffs of Scale To Zero
  • 4.10 Database Options – Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
  • 4.11 Demo – Database Offerings
  • 4.12 Vision API, AI Platform, TPUs
  • 4.13 Pre Trained Models
  • 4.14 Data Pipeline Offerings
  • 4.15 Data Ingestion Options
  • 4.16 Software Development Life Cycle (SDLC)
  • 4.17 Visibility and Alerting Offerings
  • 4.18 Identify Data Migration Options
  • 4.19 Compute VM Migration
  • 4.20 Whiteboard – Migrations
  • 4.21 Application Modernization
  • 4.22 Define Software-Defined WAN (SD-WAN)
  • 4.23 Connectivity Options
  • 4.24 Whiteboard – Connectivity
  • 4.25 IAM and Security
  • 4.26 Whiteboard Cloud Architecture
  • 4.27 Section Summary
  • 4.28 Review Questions
Module 5 – Google Cloud Digital Leader Course Closeout
  • 5.0 Google Cloud Digital Leader Course Closeout
  • 5.1 Course Review
  • 5.2 Resources
  • 5.3 Exam Overview
  • 5.4 Course Closeout
Module 1 – Google Analytics 4 – Course Overview
  • 1.0 About Google Analytics 4
  • 1.1 Course Intro Welcome
  • 1.2 Instructor Intro
Module 2 – Fundamentals of Google Analytics
  • 2.1 What is a Digital Product
  • 2.2 Google Market Platform
  • 2.3 Google Analytics Overview
  • 2.4 Google Analytics 4 Overview
  • 2.5 Whiteboad Discussion-How Does GA Work
  • 2.6 Comparing GA3 to GA4
  • 2.7 Whiteboard Compare Data Models
  • 2.8 Demo- GA Console Walkthru
  • 2.9 Admin Panel
  • 2.10 Demo Admin Panel
  • 2.11 Tag Manager
  • 2.12 Demo Tag Manager
  • 2.13 Segment Review
  • 2.14 Segment Review Questions
Module 3 – Advanced Topics with Google Analytics
  • 3.1 Upgrading and Running Parallel
  • 3.2 Whiteboard Discussion – Parallel
  • 3.3 Demo Console Parallel
  • 3.4 Hands on Demo – Install GA4 on a Live Site
  • 3.5 Understand Reporting Options, Lifecycle Collections
  • 3.6 Hands on Demo – Exploring reports
  • 3.7 Hands on Demo – Set up GA4 Custom Eventsmp4
  • 3.8 Hands on Demo – Conversions, Audiences, DebugView
  • 3.9 Hands on Demo – Advertising
  • 3.10 Hands on Demo – Explorations:Insights
  • 3.11 Hands on Demo – Lifecycle and Users
  • 3.12 Google Big Query Connections
  • 3.13 Demo – BigQuery Data Integrations
  • 3.14 Google Ads
  • 3.15 Demo – Google Ads
  • 3.16 Google Signals
  • 3.17 Demo – Google Signals
  • 3.18 Certification Options
  • 3.19 Segment Summary
  • 3.20 Review Questions
  • 3.21 Resources
  • 3.22 Course Closeout
Module 1 – Devices, Setups, and Installs
  • 1.1 Introduction to the Course, Meet the Instructor
  • 1.2 Appropriate Safety Procedures
  • 1.3 PC Components
  • 1.4 Guidlines for PC Disassembly
  • 1.5 Motherboards
  • 1.6 CPU Sockets
  • 1.7 PCI Bus
  • 1.8 Storage Bus (SATA and IDE)
  • 1.9 Discussing PC Components
  • 1.10 Common Connection Interfaces
  • 1.11 Wired and Wireless Connection Standards
  • 1.12 Install Peripheral Devices
  • 1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 – Displays and Multimedia Devices
  • 2.1 Displays and Multimedia
  • 2.2 Display Device Connections and Cables
  • 2.3 Discussing Display Device Installation and Configuration
  • 2.4 Troubleshoot Display Devices
  • 2.5 Guidelines for Troubleshooting Display Devices
  • 2.6 Discussing Display Device Troubleshooting
  • 2.7 Install and Configure Multimedia Devices
  • 2.8 Discussing Multimedia Device Installation and Configuration
Module 3 – Supporting Multiple Drive Types
  • 3.1 Supporting Multiple Drive Types and Memory
  • 3.2 Memory Types
  • 3.3 RAM Types
  • 3.4 Memory Modules
  • 3.5 DIMM and SO-DIMM Technologies
  • 3.6 Parity and ECC RAM
  • 3.7 Memory Compatibility Issues
  • 3.8 Discussing System Memory Installation
  • 3.9 Install and Configure Mass Storage Devices
  • 3.10 Storage Adapters and Cables
  • 3.11 Solid State Drives
  • 3.12 Guidlines for Installing Mass Storage Devices
  • 3.13 Discussing Mass Storage Device Installation and Configuration
  • 3.14 Install and Configure Removable Storage
  • 3.15 Discussing Removable Storage Device Istallation and Configuration
  • 3.16 Configure RAID
  • 3.17 RAID Configuration Options
  • 3.18 Discussing RAID Configuration
  • 3.19 Troubleshoot Storage Devices
  • 3.20 Boot Failures
  • 3.21 Discussing Storage Device Troubleshooting
Module 4 – Accounting for CPUs and Internal Components
  • 4.1 Install Upgrade CPUs
  • 4.2 Multiprocessing and Multicore Processors
  • 4.3 Discussing CPU Upgrades
  • 4.4 Configure and Update BIOS UEFI
  • 4.5 Discussing BOIS-UEFI Configuration and Updates
  • 4.6 Install Power Supplies
  • 4.7 Discussing Power Supply Installation
  • 4.8 Troubleshoot Internal System Components
  • 4.9 POST and Boot Problems
  • 4.10 Boot Troubleshooting and Log Entries
  • 4.11 Motherboard Component Problems
  • 4.12 Discussing System Component Troubleshooting
Module 5 – All About Network Theories
  • 5.1 Wired Networks
  • 5.2 Common Ethernet Network Implementations
  • 5.3 Taps and Mirrors
  • 5.4 Discussing Wired Networks
  • 5.5 Network Hardware Devices
  • 5.6 Switches
  • 5.7 Power Over Ethernet
  • 5.8 Discussing Network Hardware Devices
  • 5.9 Wireless Networks
  • 5.10 Access Points and Wireless Network Modes
  • 5.11 Discussing Wireless Networks
  • 5.12 Internet Connection Types
  • 5.13 Wireless Internet Service Providers WISP
  • 5.14 Discussing Internet Connection Types
  • 5.15 Network Configuration Concepts
  • 5.16 The TCIP-IP Protocol Suite
  • 5.17 Internet Protocol and IP Addressing
  • 5.18 Public and Private IP Addresses
  • 5.19 IPv6
  • 5.20 Discussing Network Configuration Concepts
  • 5.21 Network Services
  • 5.22 DNS
  • 5.23 Dynamic and Static IP Configurations
  • 5.24 DNS Records MX and A
  • 5.25 Web Servers and HTTP-HTTPS
  • 5.26 Discussing Network Services
Module 6 – Network Operations and Diagnostics
  • 6.1 Configuring and Troubleshooting Networks
  • 6.2 Network Connections in Windows
  • 6.3 Install and Configure SOHO Networks
  • 6.4 Configure SOHO Network Security
  • 6.5 Firewalls
  • 6.6 Port Fowarding and Port Triggering
  • 6.7 Windows Firewall
  • 6.8 Network Security and Embedded Appliances
  • 6.9 Configure Remote Access
  • 6.10 Discussing Remote Access Configuration
  • 6.11 Troubleshoot Network Connections
  • 6.12 IP Configuration Issues
  • 6.13 Routing Issues
  • 6.14 Discussing Network Connection Troubleshooting
Module 7 – Cloud and Virtualization Computing
  • 7.1 Configure Client-Side Virtulaization
  • 7.2 Hypervisors
  • 7.3 Processor Support and Resource Requirements
  • 7.4 Virtual Networks
  • 7.5 Client-Side Virtualization
  • 7.6 Cloud Computing Concepts
  • 7.7 Internal and External Shared Resources
  • 7.8 Cloud Service Options
  • 7.9 Virtual Desktops
  • 7.10 Software-Defined Networking (SDN)
  • 7.11 Discussing Cloud Computing Concepts
Module 8 – Laptop Features and Troubleshooting
  • 8.1 Use Laptop Features
  • 8.2 Expansion Options
  • 8.3 Discussing Laptop Features
  • 8.4 Install and Configure Laptop Hardware
  • 8.5 Discussing Laptop Hardware Installation and Configuration
  • 8.6 Troubleshoot Common Laptop Issues
  • 8.7 Discussing Troubleshooting Common laptop Issues
Module 9 – Syncing and Setup of Mobile Devices
  • 9.1 Syncing and Setup of Mobile Devices
  • 9.2 Connect and Configure Mobile Devices
  • 9.3 Configure Mobile Device Network Connectivity
  • 9.4 Mobile VPN Configuration
  • 9.5 Email Configuration Options
  • 9.6 Discussing Mobile Device Network Connectivity Configuration
  • 9.7 Support Mobile Apps
  • 9.8 Discussing Mobile App Support
Module 10 – All Things Printing
  • 10.1 All Things Printing
  • 10.2 Discussing Laser Printer Maintenance
  • 10.3 Maintain Inkjet Printers
  • 10.4 Discussing Inkjet Printer Maintenance
  • 10.5 Maintain Impact, Thermal, and 3D Printers
  • 10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
  • 10.7 Install and Configure Printers
  • 10.8 Discussing Printer Installation and Configuration
  • 10.9 Troubleshoot Print Device Issues
  • 10.10 Install and Configure Imaging Devices
  • 10.11 Discussing Device Installation and Configuration
Module 11 – Resources and Testing
  • 11.1 Introduction to Resources and Testing
  • 11.2 Resources and Testing
  • 11.3 Joining a Domain with Windows 10
  • 11.4 Boot Order and BIOS
  • 11.5 Virtual Machine Install & Configure
  • 11.6 PC Teardown
  • 11.7 Exploring the Laptop
  • 11.8 Install Windows 10 Demonstration
Module 1 – Operating System Management
  • 1.1 Introduction to the Course, Meet the Instructor
  • 1.2 Identify Common Operating Systems
  • 1.3 Microsoft Windows
  • 1.4 Work and Education Features
  • 1.5 Windows System Limits
  • 1.6 Apple Operating Systems
  • 1.7 Linux Disk and File Management
  • 1.8 Discussing OS Types
  • 1.9 Use Windows Features and Tools
  • 1.10 Administrative Tools
  • 1.11 Manage Files in Windows
  • 1.12 System Hierarchies
  • 1.13 File Attributes
  • 1.14 Discussing Windows Features and Tools
  • 1.15 Manage Disks in Windows
  • 1.16 Discussing File Management in Windows
  • 1.17 The Windows Disk Management Console
  • 1.18 Discussing Windows Disk Management
  • 1.19 Manage Devices in Windows
  • 1.20 Device Manager
  • 1.21 Discussing Windows Device Manager
Module 2 – Configuring and installing the OS
  • 2.1 Configuring and Installing the OS
  • 2.2 Installation Boot Methods
  • 2.3 Disk Formatting and Partitioning
  • 2.4 Networking Considerations
  • 2.5 Post Installation Tasks
  • 2.6 OS Installation Types
  • 2.7 Unattended Installations
  • 2.8 Maintain OSs
  • 2.9 OS Updates
  • 2.10 Anti-Malware Updates
  • 2.11 Scheduled Backups
  • 2.12 Task Schedulers part 1
  • 2.13 Task Schedulers part 2
  • 2.14 Install Windows 10 Demonstration
  • 2.15 Discussing OS Maintenance
Module 3 – Tools to Troubleshoot and Maintain the OS
  • 3.1 Install and Manage Windows Applications
  • 3.2 Windows OS Tools
  • 3.3 Application and Print Services
  • 3.4 Task Manager
  • 3.5 Manage Windows Performance
  • 3.6 Windows Performance Management Tools
  • 3.7 Troubleshoot Windows
  • 3.8 Event Viewer
  • 3.9 The System Configuration Utility
  • 3.10 Troubleshooting Tips Boot Process
  • 3.11 Troubleshooting Tips for Windows System Issues
  • 3.12 Blue Screens and Spontaneous Shutdowns
  • 3.13 Troubleshooting Tips for File and Memory Corruption
  • 3.14 Safe Boot
  • 3.15 System Repair Disc
  • 3.16 System Restore
  • 3.17 Guidelines for Troubleshooting Windows Issues
Module 4 – Network Management Tools
  • 4.1 Network Management Tools
  • 4.2 Network Connectivity
  • 4.3 IP Addressing and Connection Types
  • 4.4 Proxy Settings
  • 4.5 Windows Client Configuration
  • 4.6 Location Services
  • 4.7 Firewalls
  • 4.8 Network Troubleshooting
  • 4.9 Remote Desktop Tools
  • 4.10 Desktop Management and Remote Monitoring Tools
  • 4.11 Disscussion Topics
Module 5 – Sharing Resources and Wrights Management
  • 5.1 Sharing Resources and Wrights Management
  • 5.2 User Group Accounts
  • 5.3 Local Secutity Policy
  • 5.4 SSO and Credential Manager
  • 5.5 Workgroups and Homegroups
  • 5.6 Network and Sharing Center
  • 5.7 Network Share Configuration
  • 5.8 NTSF File and Folder Permissions
  • 5.9 Configure Active Directory Accounts and Policies
  • 5.10 Domain Membership and Group Policy Objects
  • 5.11 Basic AD Functions
  • 5.12 Account Locks and Password Resets
Module 6 – Threats and Security Measures
  • 6.1 Threats and Security Measures
  • 6.2 Logical Security Concepts
  • 6.3 Encryption
  • 6.4 PKI and Certificates
  • 6.5 Execution Control
  • 6.6 NAC
  • 6.7 Discussing Logical Decurity Concepts
  • 6.8 Threats and Vulnerablilities
  • 6.9 Types of Password Attacks
  • 6.10 Discussing Threats and Vulnerabilities
  • 6.11 Physical Security Controls
  • 6.12 Discussing Physical Security Measures
Module 7 – Policies to Protect Data
  • 7.1 Policies to Protect Data
  • 7.2 Implement Security Best Practices
  • 7.3 Guidlines for Implementing Security Best Practices
  • 7.4 Discussing Security Best Practices Implementation
  • 7.5 Implement Data Protection Policies
  • 7.6 ACLs and Directory Permissions
  • 7.7 Full Disk Encryption
  • 7.8 Guildlines for Implementing Data Protection Policies
  • 7.9 Discussing Data Protection Policies
  • 7.10 Protect Data During Incident Response
  • 7.11 Discussing Data Protection During Incident Response
Module 8 – Prevent Malware and Security Threats
  • 8.1 Prevent Malware and Security Threats
  • 8.2 Detect, Remove, and Prevent Malware
  • 8.3 Trojan Horses and Spyware
  • 8.4 Sources of Malware Infection
  • 8.5 Best Practices for Malware Removal
  • 8.6 Discussing Detecting, Removing, and Preventing Malware Infections
  • 8.7 Troubleshoot Common Workstation Security Issues
  • 8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 – Supporting and Troubleshooting Mobile Devices
  • 9.1 Supporting and Troubleshooting Mobile Devices
  • 9.2 Secure Mobile Devices
  • 9.3 IOT Internet of Things
  • 9.4 Discussing Mobile Device Security
  • 9.5 Troubleshoot Mobile Device Issues
  • 9.6 Mobile Device Security Troubleshooting
  • 9.7 Discussing Troubleshooting Mobile Devices
Module 10 – Implementing Operational Procedures
  • 10.1 Implementing Operational Procedures
  • 10.2 Environmental Impacts and Controls
  • 10.3 Discussing Environmental Impact and Controls
  • 10.4 Create and Maintain Documentation
  • 10.5 Discussing Documentation Creation and Maintenance
  • 10.6 Use Basic Change Management Best Practices
  • 10.7 Discussing Change Management Best Practices
  • 10.8 Implement Disaster Prevention and Recovery Methods
  • 10.9 Discussing Implement Disaster Prevention and Recovery Methods
  • 10.10 Basic Scripting Concepts
  • 10.11 Discussing Scripting
  • 10.12 Professionalism and Communication
  • 10.13 Discussing Professionalism and Communication Skills
Module 11 – Resources and Testing
  • 11.1 Introduction to Resources and Testing
  • 11.2 Resources and Testing
  • 11.3 Joining a Domain with Windows 10
  • 11.4 Boot Order and BIOS
  • 11.5 Virtual Machine Install & Configure
  • 11.6 PC Teardown
  • 11.7 Exploring the Laptop
  • 11.8 Install Windows 10 Demonstration
Module 61 – CEH v11 Advanced Ethical Hacker Course Intro
  • 61.1 About This Course: Advanced Ethical Hacker
  • 61.2 About the Instructor
Module 62 – CEH v11 Session Hjacking
  • 62.1 Session Hijacking Concepts
  • 62.2 Token-based Authentication
  • 62.3 Compromising a Session Token
  • 62.4 XSS
  • 62.5 CSRF
  • 62.6 Other Attacks
Module 63 – CEH v11 Defending Against Hijacking
  • 63.1 Network Level Hijacking
  • 63.2 Session Hijacking Tools
  • 63.3 Session Hijacking Countermeasures
  • 63.4 Session Penetration Hijacking
  • 63.5 Review
Module 64 – CEH v11 Implementing Intrusion Detection
  • 64.1 IDS-IPS
  • 64.2 Snort
  • 64.3 Snort Rules
  • 64.4 Syslog
Module 65 – CEH v11 Testing Intrusion Detection
  • 65.1 WIPS
  • 65.2 IDS Considerations
  • 65.3 IDS Tools
  • 65.4 IDS Evasion
  • 65.5 IDS-Firewall Evasion Tools
  • 65.6 IDS Scenerios
Module 66 – CEH v11 Implementing Firewalls
  • 66.1 Firewalls
  • 66.2 Packet Filtering Rules
  • 66.3 Firewall Deployments
  • 66.4 Traffic Flow through Firewalls
  • 66.5 Split DNS
Module 67 – CEH v11 Testing Firewallls
  • 67.1 Firewall Tools
  • 67.2 Firewall Evasion
  • 67.3 Firewall Scenarios
Module 68 – CEH v11 Implementing Honeypots
  • 68.1 Honeypots
  • 68.2 Honeypot Detection
  • 68.3 IDS-Firewall Evasion Countermeasures
  • 68.4 IDS-Firewall Honeypot Penetration Testing
  • 68.5 Review
Module 69 – CEH v11 Attacker Webserver
  • 69.1 Webserver Security Overview
  • 69.2 Common Webservers
  • 69.3 Webserver Attacks
  • 69.4 Misconfiguration Attack Examples
Module 70 – CEH v11 Webserver Defense
  • 70.1 Webserver Attack Tools
  • 70.2 Attack Countermeasures
  • 70.3 Webserver Penetration Testing
  • 70.4 Review
Module 71 – CEH v11 Intro To Web Apps
  • 71.1 Web Application Concepts
  • 71.2 Attacking Web Apps
Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities
  • 72.1 A01 – Broken Access Control
  • 72.2 A02 – Cryptographic Failures
  • 72.3 A03 – Injection
  • 72.4 A04 – Insecure Design
  • 72.5 A05 – Security Misconfiguration
Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities
  • 73.1 A06 – Vulnerable and Outdated Components
  • 73.2 A07 – Identification and Authentication Failures
  • 73.3 A08 – Software and Data Integrity Failures
  • 73.4 A09 – Security Logging and Monitoring
  • 73.5 A10 – Server Side Request Forgery
Module 74 – CEH v11 Common Web App Attacks
  • 74.1 XSS Attacks
  • 74.2 CSRF
  • 74.3 Parameter Tampering
  • 74.4 Clickjacking
  • 74.5 SQL Injection
Module 75 – CEH v11 Unauthorized Access Through Web Apps
  • 75.1 Insecure Deserialization Attacks
  • 75.2 IDOR
  • 75.3 Directory Traversal
  • 75.4 Session Management Attacks
  • 75.5 Response Splitting
Module 76 – CEH v11 Web App Overflow Attacks
  • 76.1 Denial of Service
  • 76.2 Overflow Attacks
  • 76.3 XXE Attacks
  • 76.4 Soap Attacks
  • 76.5 Ajax Attacks
Module 77 – CEH v11 Defending Web Apps
  • 77.1 Web App Hacking Tools
  • 77.2 Web Hacking Countermeasures
  • 77.3 Web Application Penetration Testing
  • 77.4 Review
Module 78 – CEH v11 Intro To SQL Injection
  • 78.1 SQL Overview
  • 78.2 SQL Injection Concepts
  • 78.3 Basic SQL Injection
Module 79 – CEH v11 Performing SQL Injection
  • 79.1 Finding Vulnerable Websites
  • 79.2 Error-based SQL Injection
  • 79.3 Union SQL Injection
  • 79.4 Blind SQL Injection
  • 79.5 SQL Injection Scenarios
  • 79.6 Evading Detection
Module 80 – CEH v11 Defending Against SQL Injection
  • 80.1 SQL Injection Tools
  • 80.2 SQL Injection Countermeasures
  • 80.3 Safe Coding Examples
  • 80.4 SQL Wildcards
  • 80.5 SQL Injection Penetration Testing
  • 80.6 Review
Module 81 – CEH v11 Wireless Networking Overview
  • 81.1 Wireless Concepts
  • 81.2 Wireless Signal Encoding
  • 81.3 Wi-Fi Standards
  • 81.4 Wi-Fi Antennas
  • 81.5 Wireless Authentication
Module 82 – CEH v11 Wi-Fi Security
  • 82.1 Wi-Fi Security Standards
  • 82.2 Wireless Network Troubleshooting Tools
  • 82.3 Wi-Fi Discovery Tools
  • 82.4 Sniffing Wi-Fi
Module 83 – CEH v11 Hacking Wi-Fi
  • 83.1 Wi-Fi Attack Types
  • 83.2 Wi-Fi Rogue Access Point Attacks
  • 83.3 Wi-Fi Denial of Service Attacks
  • 83.4 Wi-Fi Password Cracking Attacks
  • 83.5 WEP Cracking
Module 84 – CEH v11 Advanced Wireless Attacks
  • 84.1 WPA-WPA2 Cracking
  • 84.2 WPA3 Attacks
  • 84.3 WPS Cracking
  • 84.4 Wi-Fi Attack Tools for Mobile Devices
  • 84.5 Bluetooth Hacking
  • 84.6 Other Wireless Hacking
Module 85 – CEH v11 Defending Wireless Networks
  • 85.1 Wireless Hacking Countermeasures
  • 85.2 Wireless Security Tools
  • 85.3 Wireless Penetration Testing
  • 85.4 Review
Module 86 – CEH v11 Mobile Platform Overview
  • 86.1 Mobile Platform Overview
  • 86.2 Mobile Device Vulnerabilities
  • 86.3 Mobile Device Attacks
Module 87 – CEH v11 Hacking Android
  • 87.1 Android
  • 87.2 Android Vulnerabilities
  • 87.3 Rooting Android
  • 87.4 Android Exploits
  • 87.5 Android Hacking Tools
  • 87.6 Reverse Engineering an Android App
  • 87.7 Securing Android
Module 88 – CEH v11 Hacking iOS
  • 88.1 iOS
  • 88.2 iOS Vulnerabilities
  • 88.3 Jailbreaking iOS
  • 88.4 iOS Exploits
  • 88.5 iOS Hacking Tools
  • 88.6 Securing iOS
Module 89 – CEH v11 Mobile Platform Defense
  • 89.1 Mobile Device Management
  • 89.2 BYOD
  • 89.3 Mobile Security Guidelines and Tools
  • 89.4 Mobile Device Penetration Testing
  • 89.5 Review
Module 90 – CEH v11 IoT Hacking
  • 90.1 loT Concepts
  • 90.2 loT Infrastructure
  • 90.3 Fog Computing
  • 90.4 loT Vulnerabilities
  • 90.5 loT Threats
Module 91 – CEH v11 IoT Defense
  • 91.1 IoT Hacking Methodologies and Tools
  • 91.2 IoT Hacking Methodolgies and Tools Part 2
  • 91.3 Hacking Countermeasures
  • 91.4 IoT Penetration Testing
  • 91.5 OT Concepts
  • 91.6 Industrial IoT
Module 92 – CEH v11 Operational Technology Overview
  • 92.1 IT-OT Convergence
  • 92.2 ICS
  • 92.3 SCADA
  • 92.4 DCS
  • 92.5 RTU
  • 92.6 PLC
  • 92.7 Addition OT Components
Module 93 – CEH v11 Hacking OT
  • 93.1 OT Variables
  • 93.2 Well-known OT attacks
  • 93.3 OT Attack Methodology and Basic Tools
  • 93.4 OT Reconnaissance
  • 93.5 OT Penetration and Control
Module 94 – CEH v11 Defending OT
  • 94.1 OT Attack Tools
  • 94.2 OT Hacking Countermeasures
  • 94.3 OT Penetration Testing
  • 94.4 Review
Module 95 – CEH v11 Attacking The Cloud
  • 95.1 Cloud Computing Concepts
  • 95.2 Virtualization
  • 95.3 Cloud Types
  • 95.4 Cloud Benefits and Considerations
  • 95.5 Cloud Risks and Vulnerablilities
Module 96 – CEH v11 Cloud Defense
  • 96.1 Cloud Threats and Countermeasures
  • 96.2 Cloud Security Tools
  • 96.3 Cloud Security Best Practices
  • 96.4 Cloud Penetration Testing
  • 96.5 Review
Module 97 – CEH v11 Cryptography Overview
  • 97.1 Cryptography Concepts
  • 97.2 Symetric Encryption
  • 97.3 Asymmetric Encryption
  • 97.4 Public Key Exchange
  • 97.5 PKI
Module 98 – CEH v11 Protecting Data With Crytography
  • 98.1 Digital Certificates
  • 98.2 Digital Signatures
  • 98.3 Hashing
  • 98.4 Email Encryption
  • 98.5 Network Communication Encryption
Module 99 – CEH v11 Protecting Data at Home and in Transit
  • 99.1 Disk Encryption
  • 99.2 VPN Encryption
  • 99.3 Cryptography Tools
Module 100 – CEH v11 Pentesting Cryptography
  • 100.1 Cryptography Attacks
  • 100.2 Cryptography Penetration Testing
  • 100.3 Review
  • 100.4 Conclusion
Module 21 – CEH v11 Ethical Hacker Course Intro
  • 21.1 About this course – Ethical Hacker
  • 21.2 About the Instructor
Module 22 – CEH v11 Intro to Footprinting
  • 22.1 Footprinting Concepts
  • 22.2 Footprinting Methodology
  • 22.3 OSINT Tools
  • 22.4 Advanced Google Search
  • 22.5 Whois Footprinting
  • 22.6 Activity – Performing a Whois Lookup
Module 23 – CEH v11 Footprinting Network Services
  • 23.1 DNS Footprinting
  • 23.2 Website Footprinting
  • 23.3 Email Footprinting
  • 23.4 Network Footprinting
  • 23.5 Footprinting through Social Networking Sites
Module 24 – CEH v11 Defend Against Footprinting
  • 24.1 Competitive Intelligence Gathering
  • 24.2 Footprinting Countermeasures
  • 24.3 Footprinting Penetration Testing
  • 24.4 Review
Module 25 – CEH v11 Intro to Scanning
  • 25.1 Scanning Concepts
  • 25.2 ICMP Discovery Scans
  • 25.3 Other Discovery Scans
Module 26 – CEH v11 Port Scanning
  • 26.1 Ports
  • 26.2 TCP Flags and Handshakes
  • 26.3 TCP Scan Types
  • 26.4 Other Scanning Techniques
Module 27 – CEH v11 Vulnerability Scanning
  • 27.1 Banner Grabbing
  • 27.2 Vulnerability Scanning
  • 27.3 SSDP Scanning
Module 28 – CEH v11 NMAP
  • 28.1 Nmap
  • 28.2 Common Nmap Scans
  • 28.3 Nmap Options
  • 28.4 Nmap Stealth Scans
  • 28.5 Hping and Other Scanners
Module 29 – CEH v11 Firewalls and Intrusion Detection
  • 29.1 Firewall Types
  • 29.2 Firewall Features
  • 29.3 Firewall Features Part 2
  • 29.4 Firewall Configurations
  • 29.5 Intrusion Detection and Prevention
Module 30 – CEH v11 Evading Detection
  • 30.1 Firewall and IDS Evasion
  • 30.2 Firewall and IDS Evasion Part 2
  • 30.3 Firewalking
  • 30.4 Probing a Firewall
  • 30.5 Probing a Firewall Part 2
Module 31 – CEH v11 Proxies and VPNs
  • 31.1 Proxies
  • 31.2 VPNs
  • 31.3 Tor
  • 31.4 Scanning Countermeasures
  • 31.5 Scanning Penetration Testing
  • 31.6 Review
Module 32 – CEH v11 Accessing Vulnerability
  • 32.1 Vulnerability Assessment Overview
  • 32.2 Vulnerability Scoring Systems
  • 32.3 Vulnerability Assessment Tools
Module 33 – CEH v11 Vulnerability Research
  • 33.1 Scanner Output and Reports
  • 33.2 Vulnerability Research
  • 33.3 Review
Module 34 – CEH v11 Intro to Enumeration
  • 34.1 Enumeration Concepts
  • 34.2 Enumeration Techniques and Tools
  • 34.3 Service and Application Enumeration
  • 34.4 SMB and NetBIOS Enumeration
Module 35 – CEH v11 Service Enumeration
  • 35.1 SNMP Enumeration
  • 35.2 LDAP Enumeration
  • 35.3 DNS Enumeration
  • 35.4 SMTP Enumeration
  • 35.5 NTP Enumeration
Module 36 – CEH v11 Advanced Enumeration
  • 36.1 Remote Connection Enumeration
  • 36.2 File Transfer Enumeration
  • 36.3 VoIP Enumeration
  • 36.4 IPSEC Enumeration
  • 36.5 IPv6 Enumeration
  • 36.6 BGP Enumeration
Module 37 – CEH v11 Command Line Enumeration
  • 37.1 Windows Command Line Enumeration
  • 37.2 Linux Command Line Enumeration
  • 37.3 Linux Command Line Enumeration Part 2
Module 38 – CEH v11 Defending Against Enumeration
  • 38.1 Enumeration Countermeasures
  • 38.2 Enumeration Countermeasures Part 2
  • 38.3 Enumeration Penetration Testing
  • 38.4 Review
Module 39 – CEH v11 Intro to System Hacking
  • 39.1 System Hacking Concepts
  • 39.2 System Hacking Tools and Frameworks
  • 39.3 Searchsploit
  • 39.4 Compiling and Running Exploits
Module 40 – CEH v11 System Hacking with Metasploit
  • 40.1 Metasploit
  • 40.2 Metasploit Search
  • 40.3 Metasploit Exploits and Payloads
  • 40.4 Metasploit Meterpreter
  • 40.5 Metasploit Connectivity
  • 40.6 Metasploit Impersonation and Migration
Module 41 – CEH v11 Further Attacking a Compromised System
  • 41.1 Netcat
  • 41.2 Pivoting
  • 41.3 Netcat Relays
  • 41.4 Metasploit Post Exploitation Modules
  • 41.5 Common Operating System Exploits
Module 42 – CEH v11 Hacking an Operating System
  • 42.1 Hacking Windows
  • 42.2 Hacking Linux
  • 42.3 Network Service Exploits
  • 42.4 Password Attacks
Module 43 – CEH v11 Password Cracking Overview
  • 43.1 Dictionary Attack
  • 43.2 Brute Force Attack
  • 43.3 Password Spraying
  • 43.4 Rainbow Tables
Module 44 – CEH v11 Performing Password Attacks
  • 44.1 Network Service Password Attacks
  • 44.2 Password Cracking Tools
  • 44.3 Online Password Cracking Sites
  • 44.4 Windows Password Cracking
  • 44.5 Linux Password Cracking
  • 44.6 Other Methods for Obtaining Passwords
Module 45 – CEH v11 Using Exploits
  • 45.1 Keylogging
  • 45.2 Spyware
  • 45.3 Rootkits
  • 45.4 Buffer Overflows
  • 45.5 Privilege Escalation
  • 45.6 Hiding Files
Module 46 – CEH v11 Hiding Information
  • 46.1 Alternate Data Streams
  • 46.2 Steganography
  • 46.3 Creating and Maintaining Remote Access
  • 46.4 Hiding Evidence
Module 47 – CEH v11 Covering Tracks
  • 47.1 Covering Tracks in Windows
  • 47.2 Covering Tracks in Linux
  • 47.3 System Hacking Counter-Measures
  • 47.4 System Hacking Penetration Testing
  • 47.5 Review
Module 48 – CEH v11 Malware Overview
  • 48.1 Intro to Malware
  • 48.2 Virus Overview
  • 48.3 Virus Types
  • 48.4 Self-Hiding Viruses
  • 48.5 Worms
  • 48.6 Trojans
  • 48.7 Trojan Types
  • 48.8 RATS
Module 49 – CEH v11 Hacking With Malware
  • 49.1 Ransomware
  • 49.2 Botnets
  • 49.3 Covert Channel Trojans
  • 49.4 Banking Trojans
  • 49.5 Rootkits
Module 50 – CEH v11 Creating Malware
  • 50.1 Other Malware
  • 50.2 Malware Makers
  • 50.3 Dropper and Stage Creation
  • 50.4 Exploit Kits
Module 51 – CEH v11 Detecting Malware
  • 51.1 Malware Detection
  • 51.2 Malware Detection Part 2
  • 51.3 Malware Analysis
Module 52 – CEH v11 Defending Against Malware
  • 52.1 Malware Reverse Engineering
  • 52.2 Malware Countermeasures
  • 52.3 Malware Penetration Testing
  • 52.4 Review
Module 53 – CEH v11 Sniffing
  • 53.1 Sniffing Concepts
  • 53.2 Types of Sniffing
  • 53.3 Sniffing Protocols
  • 53.4 Sniffing Tools
Module 54 – CEH v11 Spoofing and MITM
  • 54.1 ARP
  • 54.2 ARP Spoofing
  • 54.3 MITM
  • 54.4 MAC Attacks
  • 54.5 MAC Spoofing
  • 54.6 DHCP Attacks
Module 55 – CEH v11 Defending Against Poisoning and Sniffing
  • 55.1 Name Resolution Poisoning
  • 55.2 VLAN Hopping
  • 55.3 Sniffing Counter Measures
  • 55.4 Sniffing Penetration Testing
  • 55.5 Review
Module 56 – CEH v11 Social Engineering
  • 56.1 Social Engineering Concepts
  • 56.2 Social Engineering Techniques
  • 56.3 Social Engineering Examples
  • 56.4 Social Engineering Tools
Module 57 – CEH v11 Defending Against Social Engineering
  • 57.1 Social Media
  • 57.2 Identity Theft
  • 57.3 Insider Threats
  • 57.4 Social Engineering Countermeasures
  • 57.5 Social Engineering Penetration Testing
  • 57.6 Review
Module 58 – CEH v11 Denial-of-Service
  • 58.1 DoS-DDoS Concepts
  • 58.2 Volumetric Attacks
  • 58.3 Fragmentation Attacks
  • 58.4 State Exhaustion Attacks
  • 58.5 Application Layer Attacks
Module 59 – CEH v11 Advanced DoS Attacks
  • 59.1 Protocol Attacks
  • 59.2 Other Attacks
  • 59.3 Botnets
Module 60 – CEH v11 Defending Against Denial-of-Service
  • 60.1 DoS-DDoS Attack Tools
  • 60.2 DoS-DDoS Countermeasures
  • 60.3 Dos Penetration Testing
  • 60.4 Review
Module 1 – HTML5-CSS3 Introduction
  • 1.1 Introduction to the Course
Module 2 – The Internet and World Wide Web
  • 2.1 The Internet and World Wide Web
Module 3 – HTML Fundamentals
  • 3.1 Web Development Tools
  • 3.2 HTML Skeletons
  • 3.3 Paragraph Elements
  • 3.4 Phrase Elements
  • 3.5 HTML Comments
  • 3.6 HTML Entities
Module 4 – CSS Fundamentals
  • 4.1 CSS Fundamentals
  • 4.2 Inline Styles
  • 4.3 Embedded Style Sheets
  • 4.4 External Style Sheets
  • 4.5. Selector Types
  • 4.6 Decendent Selectors
  • 4.7 CSS Colors
  • 4.8 ID Versus Class
  • 4.9 CSS Text Properties
  • 4.10 CSS Box Model
Module 5 – Images and Links
  • 5.1 Images and Links
  • 5.2 Image Elements
  • 5.3 Images with Hyperlinks
  • 5.4 Open Links in New Tab
  • 5.5 Telephone and Email Links
  • 5.6 Validate and Debug
Module 6 – Responsive Design
  • 6.1 Responsive Design
  • 6.2 Fixed Layouts
  • 6.3 Viewport Meta Element
  • 6.4 Usefull CSS Styles
Module 7 – Media Queries
  • 7.1 More About Responsive Design
  • 7.2 Global Changes
  • 7.3 Mobile Devices
  • 7.4 Manipulate Logo
Module 8 – Layouts
  • 8.1 Layouts
  • 8.2 Tablets Part 1
  • 8.3 Tablets Part 2
  • 8.4 Styling Part 1
  • 8.5 Styling Part 2
  • 8.6 Styling Part 3
  • 8.7 Styling Part 4
  • 8.8 Styling Part 5
  • 8.9 Styling Part 6
Module 9 – Tables
  • 9.1 Tables Part 1
  • 9.2 Tables Part 2
Module 10 – Multimedia
  • 10.1 Multimedia
  • 10.2 Multimedia Part 2
  • 10.3 Multimedia Part 3
Module 11 – Forms and JavaScript
  • 11.1 Forms and JavaScript
  • 11.2 jQuery
  • 11.3 Styling Tables
Module 12 – The Web Server
  • 12.1 The Web Server
Module 13 – Programming and JavaScript
  • 13.1 Data Types
  • 13.2 Global Methods
  • 13.3 Variables
  • 13.4 Conditional Statements
  • 13.5 Loops
  • 13.6 Operators
Module 14 – The Calculator
  • 14.1 Calculator Part 1
  • 14.2 Calculator Part 2
  • 14.3 Calculator Part 3
  • 14.4 Calculator Part 4
  • 14.5 Calculator Part 5
  • 14.6 Calculator Part 6
  • 14.7 Calculator Part 7
Module 1 – Introduction to Security
  • 1.1 Introduction to Security
Module 2 – Malware and Social Engineering Attacks
  • 2.1 Malware and Social Engineering Attacks
Module 3 – Basic Cryptography
  • 3.1 Basic Cryptography
Module 4 – Advanced Cryptography and PKI
  • 4.1 Advanced Cryptography and PKI
Module 5 – Networking and Server Attacks
  • 5.1 Networking and Server Attacks
Module 6 – Network Security Devices, Designs and Technology
  • 6.1 Network Security Devices, Designs and Technology
Module 7 – Administering a Secure Network
  • 7.1 Administering a Secure Network
Module 8 – Wireless Network Security
  • 8.1 Wireless Network Security
Module 9 – Client and Application Security
  • 9.1 Client and Application Security
Module 10 – Mobile and Embedded Device Security
  • 10.1 Mobile and Embedded Device Security
Module 11 – Authentication and Account Management
  • 11.1 Authentication and Account Management
Module 12 – Access Management
  • 12.1 Access Management
Module 13 – Vulnerability Assessment and Data Security
  • 13.1 Vulnerability Assessment and Data Security
Module 14 – Business Continuity
  • 14.1 Business Continuity
Module 15 – Risk Mitigation
  • 15.1 Risk Mitigation
Module 16 – Security Plus Summary and Review
  • 16.1 – Security Plus Summary and Review
Module 17 – Hands-On Training
  • 17.1 Hands-On Scanning Part 1
  • 17.2 Hands-On Scanning Part 2
  • 17.3 Hands-On Advanced Scanning
  • 17.4 Hands-On MetaSploit
  • 17.5 Hands-On BurpSuite
  • 17.6 Hands-On Exploitation Tools Part 1
  • 17.7 Hands-On Exploitation Tools Part 2
  • 17.8 Hands-On Invisibility Tools
  • 17.9 Hands-On Connect to Tor
Module 1 – CEH v11 Foundations Course Introduction
  • 1.1 About this course: CEH Foundations
  • 1.2 About the Instructor
Module 2 – CEH v11 Introduction To Networking
  • 2.1 Networking Overview
  • 2.2 Network Scope
  • 2.3 Network Addressing
  • 2.4 Activity – Examining Network Addressing
Module 3 – CEH v11 Lan Components
  • 3.1 Protocols, Ports, Sockets
  • 3.2 Network Topologies
  • 3.3 LAN Devices
  • 3.4 LAN Devices Part 2
  • 3.5 VLANs
  • 3.6 Activity – Examining Ports and Sockets
  • 3.7 Activity – Examining Switches and VLANs
Module 4 – CEH v11 Routing and Network Access
  • 4.1 Routers
  • 4.2 Layer 3 Switches
  • 4.3 Modems and Remote Access
  • 4.4 Firewalls and Proxies
  • 4.5 Activity – Examining Routing
  • 4.6 Activity – Examining VLAN Routing
  • 4.7 Activity – Examining Firewall Rules
Module 5 – CEH v11 Intrusion Detection and Network Layers
  • 5.1 IDS and IPS
  • 5.2 OSI Model
  • 5.3 TCP-IP
  • 5.4 Activity – Examining Network Layers
Module 6 – CEH v11 Networking Protocols and Addressing
  • 6.1 Layer 4 Protocols
  • 6.2 Layer 3 Protocols
  • 6.3 Layer 2 Protocols
  • 6.4 IP Addressing
  • 6.5 Subnetting
  • 6.6 DHCP
  • 6.7 Activity – Examining TCP
  • 6.8 Activity – Examining UDP
  • 6.9 Activity – Examining IP
  • 6.10 Activity – Examining ICMP
  • 6.11 Activity – Examining ARP
Module 7 – CEH v11 Network Services
  • 7.1 DNS
  • 7.2 DNS Records
  • 7.3 NTP
  • 7.4 Authentication
  • 7.5 Biometrics
  • 7.6 Activity – Examining DNS
  • 7.7 Activity – Examining DNS Records
Module 8 – CEH v11 Access Control
  • 8.1 Local Authentication
  • 8.2 Directory Service Authentication
  • 8.3 Extending Authentication
  • 8.4 Authorization
  • 8.5 Activity – Testing Access Control
Module 9 – CEH v11 Intro to Linux
  • 9.1 Linux Overview
  • 9.2 Linux File System
  • 9.3 Linux Core Commands
  • 9.4 Linux Search and Read Commands
  • 9.5 Activity – Exploring Linux
  • 9.6 Activity – Using Linux Core Commands
  • 9.7 Activity – Using Linux Search Commands
  • 9.8 Activity – Using Linux Read Commands
Module 10 – CEH v11 Configuring Linux
  • 10.1 Linux File Permissions
  • 10.2 Linux Special Permissions
  • 10.3 Linux Configuration
  • 10.4 Linux Packages
  • 10.5 Linux User Management
Module 11 – CEH v11 Practicing Linux Configuration
  • 11.1 Activity – Setting Linux Permissions
  • 11.2 Activity – Setting Linux Special Permissions
  • 11.3 Activity – Managing Packages in Kali Linux
  • 11.4 Activity – Managing Users and Groups in Linux
Module 12 – CEH v11 Managing Linux
  • 12.1 Linux Job Scheduling
  • 12.2 Linux File, Directory, and Download Commands
  • 12.3 Linux System Commands
  • 12.4 Linux Network Management
  • 12.5 Linux Firewall
Module 13 – CEH v11 Practicing Linux Management
  • 13.1 Activity – Scheduling Tasks in Linux
  • 13.2 Activity – Using Linux File, Directory, and Download Commands
  • 13.3 Activity – Using Linux Edit and Archive Commands
  • 13.4 Activity – Compiling Malicious Code
  • 13.5 Activity – Using Linux Process and System Commands
  • 13.6 Activity – Using Linux Disk, Hardware, and Network Commands
Module 14 – CEH v11 Intro to Windows
  • 14.1 Windows Overview
  • 14.2 Windows Registry
  • 14.3 Windows Security
Module 15 – CEH v11 Windows Commands
  • 15.1 Windows Commands
  • 15.2 Windows Admin Commands
  • 15.3 Windows Network Commands
  • 15.4 Windows Run Line Commands
  • 15.5 Windows PowerShell
Module 16 – CEH v11 Practicing Windows Commands
  • 16.1 Activity – Using Windows Built-in Commands
  • 16.2 Activity – Using Windows Task Commands
  • 16.3 Activity – Using Windows Admin Commands
  • 16.4 Activity – Using Windows Network Commands
  • 16.5 Activity – Using Windows PowerShell
  • 16.6 Networking and OS Penetration Testing
  • 16.7 Review
Module 17 – CEH v11 Intro to Hacking
  • 17.1 Information Security Overview
  • 17.2 Hacking Concepts
  • 17.3 Ethical Hacking Concepts
  • 17.4 Penetration Testing
  • 17.5 Penetration Testing Part 2
  • 17.6 Activity – Performing a Static Code Review
Module 18 – CEH v11 Information Security
  • 18.1 Cyber Kill Chain Concepts
  • 18.2 Activity – Performing Weaponization
  • 18.3 Information Security
  • 18.4 Security Policies
  • 18.5 Security Controls
  • 18.6 Access Control
Module 19 – CEH v11 Protecting Data
  • 19.1 Data Protection
  • 19.2 Backup Sites
  • 19.3 Vulnerability Management
  • 19.4 SIEM
  • 19.5 Risks
Module 20 – CEH v11 Managing Risk
  • 20.1 Risk Management
  • 20.2 Incident Handling
  • 20.3 Information Security Laws and Standards
  • 20.4 Activity – Assessing Risk
  • 20.5 Ethical Hacking Penetration Testing
  • 20.6 Review
  • 20.7 Conclusion
Module 1 – Welcome to ENARSI
  • 1.1 Welcome to ENARSI
  • 1.2 A Few Things Before We Start
Module 2 – EIGRP (Enhanced Interior Gateway Protocol)
  • 2.1 EIGRP Features
  • 2.2 EIGRP Operations
  • 2.3 EIGRP Exchange of Routing Information
  • 2.4 EIGRP Metrics
  • 2.5 EIGRP Queries
  • 2.6 EIGRP Obtaining a Default Route
  • 2.7 EIGRP Load Balancing
  • 2.8 EIGRP Authentication
  • 2.9 Troubleshooting EIGRP Part 1
  • 2.10 Troubleshooting EIGRP Part 2
  • 2.11 Troubleshooting EIGRP Part 3
  • 2.12 Troubleshooting EIGRP Part 4
Module 3 – OSPF (Open Shortest Path First)
  • 3.1 Implementing OSPF Part 1
  • 3.2 Implementing OSPF Part 2
  • 3.3 Implementing OSPF Part 3 DR BDR Election
  • 3.4 Implementing OSPF Part 4 LSA Types
  • 3.5 Implementing OSPF Part 5 OSPF States
  • 3.6 Optimizing OSPF Summarization
  • 3.7 Optimizing OSPF Default Routing
  • 3.8 Optimizing OSPF Authentication
  • 3.9 Optimizing OSPF Virtual Links
Module 4 – Route Redistribution
  • 4.1 Route Redistribution Introduction
  • 4.2 Route Redistribution Implementation
  • 4.3 Route Redistribution OSPF E1 or E2
  • 4.4 Route Redistribution Types
  • 4.5 Route Redistribution Manipulation & Filtering
  • 4.6 Route Redistribution Prefix-Lists
  • 4.7 Route Redistribution Route-Maps
Module 5 – Implementing Path Control
  • 5.1 Implementing Path Control
  • 5.2 Implementing Path Control Implementation
Module 6 – BGP (Border Gateway Protocol)
  • 6.1 BGP Fundamentals
  • 6.2 BGP Attributes
  • 6.3 BGP Path Selection Criteria
  • 6.4 BGP Transit AS
  • 6.5 BGP Split Horizon
  • 6.6 BGP Weight Attribute
  • 6.7 BGP Local Preference Attribute
  • 6.8 BGP MED Attribute
  • 6.9 BGP Route Filtering
  • 6.10 BGP Peer Groups
  • 6.11 BGP Route Reflectors
  • 6.12 BGP Authentication
  • 6.13 BGP Troubleshooting Part 1
  • 6.14 BGP Troubleshooting Part 2
Module 7 – Implementing VRF (Virtual Routing and Forwarding)
  • 7.1 Implementing VRF-Lite
Module 8 – Implementing DHCP
  • 8.1 Implementing DHCP
  • 8.2 Implementing DHCP Relay Manual Binding and Options
  • 8.3 Implementing DHCP SLAAC and DHCPv6
  • 8.4 Troubleshooting DHCP
Module 9 – Securing Cisco Routers (Control Plane)
  • 9.1 Securing Cisco Routers Control Plane Security CoPP
  • 9.2 Securing Cisco Routers Control Plane Security CoPP Implementation
Module 10 – Infrastructure Services
  • 10.1 Infrasctucture Services AAA
  • 10.2 Infrastructure Services SNMP
  • 10.3 Infrastructure Services SYSLOG
  • 10.4 Infrastructure Services SSH
  • 10.5 Infrastructure Services HTTP FTP SCP
  • 10.6 Infrastructure Services NetFlow
Module 1 – Welcome to Adobe XD 2022
  • 1.1 Welcome to Adobe XD 2022
  • 1.2 What is Adobe XD 2022
Module 2 – Adobe XD 2022 Overview
  • 2.1 Adobe XD 2022 Overview
Module 3 – Designing in a Project with Adobe XD 2022
  • 3.1 Adobe XD 2022 Project Overview
  • 3.2 Designing Your First Screen in Adobe XD 2022
Module 4 – Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022
  • 4.1 Assets and Reusable Styles in Adobe XD 2022
  • 4.2 Responsive Resize in Adobe XD 2022
Module 5 – Images and Visual Effects in Adobe XD 2022
  • 5.1 Imports, Images, and Masks in Adobe XD 2022
  • 5.2 Special Visual Effects in Adobe XD 2022
Module 6 – Making Interactive Buttons in Adobe XD 2022
  • 6.1 Plugins in Adobe XD 2022
  • 6.2 Stacks in Adobe XD 2022
  • 6.3 Components in Adobe XD 2022
  • 6.4 Repeat Grid in Adobe XD 2022
Module 7 – Grouped Imports and Scroll Groups in Adobe XD 2022
  • 7.1 Grouped imports in Adobe XD 2022
  • 7.2 Scroll Groups in Adobe XD 2022
Module 8 – Prototyping and Animations in Adobe XD 2022
  • 8.1 Prototyping with Adobe XD 2022
  • 8.2 Animations in Adobe XD 2022
Module 9 – Exporting and Sharing with Adobe XD 2022
  • 9.1 Exports in Adobe XD 2022
  • 9.2 Adobe XD 2022 Conclusion
Module 1 – Introduction To Adobe Indesign
  • 1.1 Intro-InDesign
  • 1.2 What is InDesign
Module 2 – Getting Started With Adobe InDesign
  • 2.1 Creating a New Document
  • 2.2 Importing Images and Understanding Links
  • 2.3 Embedding
  • 2.4 Navigating the Interface
  • 2.5 Manipulating Graphics
  • 2.6 Creating simple shapes
  • 2.7 Basic Tools
  • 2.8 Properties Panel
  • 2.9 Working with Layers
  • 2.10 Elements of Design
Module 3 – Understanding and Applying Colors
  • 3.1 Color Theory
  • 3.2 Color Swatches RGB vs Lab vs CMYK
  • 3.3 Understanding and Applying Gradients
Module 4 – Pages
  • 4.1 Pages Panel
  • 4.2 Parent Pages
Module 5 – Typography
  • 5.1 Typography
  • 5.2 Creating Text
  • 5.3 Character and Paragraph Formatting
  • 5.4 Character and Paragraph Styles
  • 5.5 Chaining Text Boxes Together
  • 5.6 OpenType
  • 5.7 Creating Outlines
  • 5.8 Working with Tables
Module 6 – Packaging and Exporting for Web and Print
  • 6.1 Preflight
  • 6.2 Packaging Your Document
  • 6.3 Exporting a PDF
  • 6.4 Exporting an Image Sequence
Module 7 – Principles of Design
  • 7.1 Principles of Design
Module 8 – Designing for Your Output
  • 8.1 Letterheads
  • 8.2 Business Cards
  • 8.3 Resume
  • 8.4 Brochures
  • 8.5 Types of Binding
  • 8.6 Impose
Module 9 – Advanced Techniques in InDesign
  • 9.1 Clipping Mask
  • 9.2 Step and Repeat
  • 9.3 GREP
  • 9.4 Layer Effects
  • 9.5 Page Tool
  • 9.6 Scripts
Module 10 – Interactivity in InDesign
  • 10.1 Interactivity
  • 10.2 Importing Media
  • 10.3 Using Multiple Pages in Interactivity
  • 10.4 Crating an Interactive Project
  • 10.5 Animation
  • 10.6 InDesign Conclusion
Module 1 – Introduction to Adobe Illustrator 2022
  • 1.1 Instructor Bio
  • 1.2 Course Introduction
Module 2 – Getting Started with Adobe Illustrator 2022
  • 2.1 What are Vectors
  • 2.2 Creating a New Document
  • 2.3 Navigating the Interface
Module 3 – Drawing
  • 3.1 Drawing and Manipulating Primitive Shapes
  • 3.2 Drawing Custom Shapes
  • 3.3 Importing Images
  • 3.4 Understanding Layers and Sublayers
  • 3.5 Additional Drawing and Manipulation Tools
Module 4 – Colors and Gradients
  • 4.1 Color Theory
  • 4.2 In-depth dive into Color Palette-
  • 4.3 Creating Color Swatches
  • 4.3.2 Gradient Mesh
Module 5 – Intermediate Illustration
  • 5.1 Appearance Palette
  • 5.2 Pathfinder Palette
  • 5.3.1 Recreating an Existing Logo
  • 5.3.2 Creating an icon from a Sketch
  • 5.3.3 Creating a vector illustration from a sketch
  • 5.3.4 Blending Modes
Module 6 – Typography
  • 6.1 Introduction to Typography
  • 6.2 Type Tools in Illustrator
  • 6.3 Envelope Warp and Mesh
  • 6.4 Breaking Text into Outlines
  • 6.5 Caligramme Demo
Module 7 – Live Trace, Paintbrush and Blob Brush
  • 7.1 Live Trace
  • 7.2 Paint Brush
Module 8 – Advanced Illustration
  • 8.1 Illustrating a face from a photo
  • 8.2 Illustrating the body
  • 8.3 Hair and emulating texture
  • 8.4 Adding a background
  • 8.5 Shadows and highlights
Module 9 – Exporting
  • 9.1 Differences Between File Formats
  • Conclusion
Module 0 – Course introduction
  • 0.1 Instructor Intro
  • 0.2 Course Overview
Module 1 – Networking Fundamentals
  • 1.1 Intro to Networking
  • 1.1.1 Activity: Creating a Network
  • 1.2 Common Terminology
  • 1.2.1 Activity: Examining Ports and Sockets
  • 1.3 OSI Model
  • 1.4 DoD Model
  • 1.4.1 Activity: Examining Network Layers
  • 1.5 TCP, UDP, IP
  • 1.5.1 Activity: Examining TCP
  • 1.5.2 Activity: Examining UDP
  • 1.5.3 Activity: Examining IP
  • 1.6 ICMP, IGMP, ARP
  • 1.6.1 Activity: Examining ICMP
  • 1.6.2 Activity: Examining ARP
  • 1.6.3 Activity: Examining IGMP
  • 1.7 Network Topologies
  • 1.8 Network Types
  • 1.9 Part 1: Network Characteristics
  • 1.9 Part 2: Network Characteristics
  • 1.10 Module 1 outro
Module 2 – Cables and Connectors
  • 2.1 Ethernet Standards
  • 2.2 Copper Cable Types
  • 2.3 Fiber Optic Cable Types
  • 2.4 Connector Types
  • 2.4.1 Activity: Selecting the Right Cable
  • 2.5 Media Converters and Transceivers
  • 2.6 Cable Management
  • 2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
  • 3.1 IPv4 Basics
  • 3.2 IP Packet and Interface Types
  • 3.2.1 Activity: Configuring Client IP Settings
  • 3.3 Binary Numbering System
  • 3.4 Classful and Classless Addressing
  • 3.5 Understanding CIDR Notation
  • 3.6 IPv4 Subnetting Method
  • 3.7 Verifying with Binary
  • 3.8 Finding Subnet IDs
  • 3.8.1 Activity: Subnetting a Class C Network
  • 3.9 The Delta in Action
  • 3.9.1 Activity: Subnetting With the Delta
  • 3.10 Subnetting Based on Hosts
  • 3.11 Subnetting in Other Octets
  • 3.12 Supernetting
  • 3.12.1 Activity: Supernetting
  • 3.13 IPv6
  • 3.14 IPv4 – IPv6 Transition Mechanisms
  • 3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
  • 4.1 Remote Control Protocols
  • 4.2 File Sharing Protocols
  • 4.3 Web Protcols
  • 4.4 Email Protocols
  • 4.5 Database Protocols
  • 4.6 Voice Protocols
  • 4.7 Security Protocols
  • 4.8 Management Protocols
  • 4.9 Module 4 Outro
Module 5 – Network Services
  • 5.1 DHCP
  • 5.1.1 Activity: Configuring DHCP
  • 5.1.2 Activity: Configuring a DHCP Relay Agent
  • 5.2 DNS
  • 5.2.1 Activity: Configuring DNS – Part 1
  • 5.2.2 Activity: Configuring DNS – Part 2
  • 5.3 NTP
  • 5.4 Corporate and Datacenter Network Architecture
  • 5.5 Cloud Concepts and Connectivity Options
  • 5.6 Module 5 Outro
Module 6 – Networking Devices
  • 6.1 Introductory Concepts
  • 6.2 Repeaters and Hubs
  • 6.2.1 Activity: Connecting Devices with a Hub
  • 6.3 Bridges and Switches
  • 6.3.1 Activity: Connecting Devices with a Switch
  • 6.4 Routers and Multilayer Switches
  • 6.5 Security Devices
  • 6.6 Modems
  • 6.7 Module 6 Outro
Module 7 – Networked Devices
  • 7.1 IP Devices
  • 7.2 IoT
  • 7.2.1 Activity – Programming IoT Devices
  • 7.3 ICS/SCADA
  • 7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
  • 8.1 Routing Basics
  • 8.1.1 Activity: Configuring Static Routes
  • 8.2 Packet Delivery on the Same Network
  • 8.3 IP Routing Across a Single Router
  • 8.4 IP Routing Across Multiple Hops
  • 8.4.1 Activity: Static Routes – CHALLENGE
  • 8.5 Route Selection
  • 8.6 RIP
  • 8.6.1 Activity: Configuring RIP – CHALLENGE
  • 8.7 OSPF
  • 8.8 EIGRP
  • 8.9 BGP
  • 8.10 NAT/PAT
  • 8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
  • 9.1 Ethernet Basics
  • 9.2 Switching Overview
  • 9.2.1 Activity: Examining a MAC Table
  • 9.3 VLANs
  • 9.3.1 Activity: Creating VLANs
  • 9.4 VLAN Trunking
  • 9.4.1 Activity: Configuring VLAN Trunking
  • 9.5 VLAN Routing
  • 9.5.1 Activity: Configuring VLAN Routing
  • 9.6 Contention Management
  • 9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
  • 10.1 Wireless Overview
  • 10.2 Radio Basics
  • 10.3 Modulation
  • 10.4 Wi-Fi Standards
  • 10.5 Antennas
  • 10.6 Wi-Fi Service Sets
  • 10.7 Wi-Fi Security
  • 10.8 Cellular
Module 11 Network Performance
  • 11.1 Monitoring Performance
  • 11.2 Common Metrics
  • 11.2.1 Activity: Examining Interface Statistics
  • 11.3 SNMP
  • 11.4 Netflow
  • 11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
  • 12.1 HA and DR Concepts
  • 12.2 High Availability Mechanisms
  • 12.3 Disaster Recovery Mechanisms
  • 12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
  • 13.1 Plans and Procedures
  • 13.2 Security Policies
  • 13.3 Loss Prevention
  • 13.4 Common Agreements
  • 13.5 Common Documentation
  • 13.6 Structured Cabling – MDF and IDF
  • 13.7 Horizontal and Vertical Cabling
  • 13.7.1 Activity – Implementing Cable Management
  • 13.8 Labeling
  • 13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
  • 14.1 Common Security Concepts
  • 14.2 Common Attack Types
  • 14.3 Spoofing-based Attacks
  • 14.4 Hijacking and MITM
  • 14.5 Social Engineering
  • 14.6 Network Segmentation
  • 14.7 Private VLANs
  • 14.8 Single Organization Authentication
  • 14.9 Extending Authentication
  • 14.10 Authorization
  • 14.11 Network Device Hardening
  • 14.12 Wireless Security
  • 14.13 Remote Access Security
  • 14.14 IoT Security
  • 14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
  • 15.1 Troubleshooting Methodology
  • 15.2 Physical Connectivity Issues
  • 15.3 Hardware Testing Tools
  • 15.3.1 Activity – Testing an Ethernet Cable
  • 15.3.2 Activity – Crimping on an RJ-45 Connector
  • 15.3.3 Activity – Punching Down Twisted Pair
  • 15.3.4 Activity – Using a Telephone Toner
  • 15.4 Understanding Electricity
  • 15.4.1 Activity – Checking Cable Continuity
  • 15.4.2 Activity – Testing DC Voltage
  • 15.4.3 Activity – Testing AC Voltage
  • 15.5 Twisted Pair Pinout Problems
  • 15.6 Twisted Pair Termination Problems
  • 15.7 Repairing Damaged Twisted Pair Cable
  • 15.8 Fiber Optic Connectivity Issues
  • 15.8.1 Activity – Testing a Fiber Optic Cable
  • 15.9 Common Port Problems
  • 15.9.1 Working with Ports and Their Devices
  • 15.10 Common Software Testing Tools
  • 15.10.1 Activity – Scanning for Open Ports
  • 15.11 Common Command Line Utilities
  • 15.12 Troubleshooting Basic IP Networking Issues
  • 15.13 Common Switching Issues
  • 15.14 Switching Test Tools and Techniques
  • 15.15 Common IP Routing Issues
  • 15.16 Wi-Fi Access Point Issues
  • 15.17 Wirelss Interference
  • 15.17.1 Activity – Using a Spectrum Analyzer
  • 15.18 Wireless Antenna Issues
  • 15.18.1 Activity – Configuring a Wi-Fi Router
  • 15.19 WAP Placement Strategies
  • 15.20 Infrastructure Service Issues (DHCP)
  • 15.21 Infrastructure Service Issues (DNS)
  • 15.22 Infrastructure Service Issues (NTP)
  • 15.23 Fireall / ACL Issues
  • 15.24 VPN Issues
  • 15.25 Additional Network Security Troubleshooting and Tips
  • 15.26 Advanced Networking Issues
  • 15.27 Troubleshooting Server Services (with Module 15 Outro)
  • CompTIA Network+ N10-008 Course Outro
Module 1: Getting Started
  • 1.1 Course Introduction
  • 1.2 Keyboard Shortcuts
  • 1.3 Keyboard Tips
  • 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
  • 2.1 General Interface and Starting a Project
  • 2.2 Basic Title Animation Using Keyframes
  • 2.3 Keyframe Interpolation and Keyframe Assistan
  • 2.4 Renaming a Composition
  • 2.5 Soloing a Layer for Individual Edits
  • 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
  • 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
  • 3.1 Importing Files from Bridge and Creating a New Composition
  • 3.2 Horizontal Type Tool and Guides
  • 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
  • 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
  • 4.2 Preview and Apply Text Animation Presets and Use Keyframes
  • 4.3 Animate Layers Using Parenting
  • 4.4 Editing and Animating Imported Photoshop Text
  • 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
  • 5.1 Create and Customize a Shape with Shape Tool
  • 5.2 Self Animating Shape with a Wiggle Path (green marker)
  • 5.3 Create and Customize a Shape with Pen Tool
  • 5.4 Snap Layers
  • 5.5 Animating Shape Layers with Path Operations
  • 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
  • 6.1 Animate Multiple Layers Using Parenting
  • 6.2 Precomposing Layers
  • 6.3 Keyframing a Motion Path
  • 6.4 Animating a Character to Create Movement
  • 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
  • 7.1 Animating Change in Light
  • 7.2 Animating Birds Flying with a Track Mat
  • 7.3 Animating Shadows and Using Corner Pin
  • 7.4 Adding a Lens Flare Effect
  • 7.5 Render Composition and Retime
  • 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
  • 8.1 Setup a Basic Mask
  • 8.2 Refine and Apply Mask
  • 8.3 Creating a Reflection with a Mask and Blending Modes
  • 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
  • 9.1 Puppet Position Pen Tool
  • 9.2 Starch Pins
  • 9.3 Manually Animate with Puppet Tool
  • 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
  • 10.1 Extract Foreground Object from Background and Create a Mat
  • 10.2 Touch Up a Mat with the Refine Edge Tool
  • 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
  • 11.1 Set up Composition and Use Levels to Start Balancing the Color
  • 11.2 Basic Color Grading with Lumetri Color Effects
  • 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
  • 11.4 Use an Adjustment Layer to Create a Global Color Effect
  • 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
  • 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
  • 12.2 Using Adjustment Layers to Apply a Specific Effect
  • 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
  • 12.4 Create Checkboxes to Toggle Visibility of a Background Image
  • 12.5 Protect Portions of a Project from Time Stretching and Export Template
Module 1: Security and Risk Management
  • Intro
  • Security and Risk Management pt.1
  • Security and Risk Management pt.2
  • Security and Risk Management pt.3
  • Security and Risk Management Summary
  • Security and Risk Management Test Prep pt.1
  • Security and Risk Management Test Prep pt.2
  • Security and Risk Management Test Prep pt.3
  • Security and Risk Management Test Prep pt.4
Module 2: Asset Security
  • Asset Secutity pt.1
  • Asset Security pt.2
  • Asset Security Summary
  • Asset Security Test Prep
Module 3: Security Architecture and Engineering
  • Security Architecture and Engineering pt.1
  • Security Architecture and Engineering pt.2
  • Security Architecture and Engineering pt.3
  • Security Architecture and Engineering Summary
  • Security Architecture and Engineering Test Prep pt.1
  • Security Architecture and Engineering Test Prep pt.2
  • Security Architecture and Engineering Test Prep pt.3
Module 4: Communication and Network Security
  • Communication and Network Security pt.1
  • Communication and Network Security pt.2
  • Communication and Network Security Summary
  • Communication and Network Security Test Prep
Module 5: Identity and Access Management (IAM)
  • Identity and Access Management (IAM)
  • Identity and Access Management (IAM) Summary
  • Identity and Access Management (IAM) Test Prep pt.1
  • Identity and Access Management (IAM) Test Prep pt.2
  • Identity and Access Management (IAM) Test Prep pt.3
  • Identity and Access Management (IAM) Test Prep pt.4
Module 6: Security Assessment and Testing
  • Security Assessment and Testing
  • Security Assessment and Testing Summary
  • Security Assessment and Testing Test Prep
Module 7: Security Operations
  • Security Operations pt.1
  • Security Operations pt.2
  • Security Operations pt.3
  • Security Operations pt.4
  • Security Operations Summary
  • Security Operations Test Prep
Module 8: Software Development Security
  • Software Development Security pt.1
  • Software Development Security pt.2
  • Software Development Security pt.3
  • Software Development Security pt.4
  • Software Development Security pt.5
  • Software Development Security Summary
  • Software Development Security Test Prep
  • Outro
Module 1: Deploy and Update Operating Systems
  • 1.1 Instructor and Course Introduction
  • 1.2 Exam Information
  • 1.3 Deploy and Update Operating Systems Introduction
  • 1.4 Plan and Implement Windows 10 by Using Dynamic Deployment
  • 1.5 Plan and Implement Windows 10 by Using Windows Autopilot
  • 1.6 Upgrade Devices to Windows 10
  • 1.7 Manage Updates
  • 1.8 Manage Device Authentication
  • 1.9 Install VMware Workstation 15 in Windows 10 Demo
  • 1.10 Performing a Clean Install of Windows 10 Demo
  • 1.11 Upgrading Windows 8.1 to Windows 10 Demo
  • 1.12 Configuring Locales Demo
  • 1.13 Troubleshooting Failed Installation with Setup Logs Demo
  • 1.14 Installing Windows 16 Server Demo
  • 1.15 Installing Microsoft Deployment Toolkits (MDT) Part 1 Demo
  • 1.16 Installing Microsoft Deployment Toolkits (MDT) Part 2 Demo
  • 1.17 Setting Up an On-Site Domain Controller Demo
  • 1.18 Joining Windows 10 Client Machine to an On-Site Domain Controller Demo
  • 1.19 Getting Started with Free Azure Subscription Demo
  • 1.20 Getting Familiarized with Azure Portal Options Demo
  • 1.21 Create a Virtual Machine Demo
Module 2: Manage Policies and Profiles
  • 2.1 Managing Policies and Profiles Introduction
  • 2.2 Plan and Implement Co-Management
  • 2.3 Implement Conditional Access and Compliance Policies
  • 2.4 Configure Device Profiles
  • 2.5 Manage User Profiles
  • 2.6 Deploy Azure Container Instances Demo
  • 2.7 Manage Access with RBAC Demo
  • 2.8 Secure Network Traffic Demo
  • 2.9 Installing OneDrive Demo
Module 3: Manage and Protect Devices
  • 3.1 Manage and Protect Devices Introduction
  • 3.2 Manage Windows Defender
  • 3.3 Manage Intune Device Enrollment and Inventory
  • 3.4 Monitor Devices
  • 3.5 Windows Defender Security Center Overview Demo
  • 3.6 Installing Windows Defender Application Guard Demo
  • 3.7 Creating a New Inbound Rule Demo
Module 4: Manage Apps and Data
  • 4.1 Manage Apps and Data Introduction
  • 4.2 Deploy and Update Applications
  • 4.3 Implement Mobile Application Management
  • 4.4 Setting up a Microsoft Intune Account Demo
  • 4.5 Create a New Group Demo
  • 4.6 Confirm the Version of Windows Demo
Module 1 – Query Tools
  • 1.1 Course Introduction
  • 1.2 Intro to Management Studio
  • 1.3 Intro to command-line query tools
Module 2 – Introduction to T-SQL Querying
  • 2.1 Introducing T-SQL
  • 2.2 Understanding Sets
  • 2.3 Understanding the Logical Order of Operations in SELECT statements
Module 3 – Basic SELECT Queries
  • 3.1 Writing Simple SELECT Statements
  • 3.2 Eliminate Duplicates with DISTINCT
  • 3.3 Using Column and Table Aliases
  • 3.4 Write Simple CASE Expressions
Module 4 – Querying Multiple Tables
  • 4.1 Understanding Joins
  • 4.2 Querying with Inner Joins
  • 4.3 Querying with Outer Joins
  • 4.4 Querying with Cross Joins and Self Joins
Module 5 – Sorting and Filtering Data
  • 5.1 Sorting Data
  • 5.2 Filtering Data with Predicates
  • 5.3 Filtering with the TOP and OFFSET-FETCH
  • 5.4 Working with Unknown Values
Module 6 – Introduction to Business Intelligence and Data Modeling
  • 6.1 Introduction to Business Intelligence
  • 6.2 The Microsoft Business Intelligence Platform
  • 6.3 Exploring a Data Warehouse
  • 6.4 Exploring a Data Model
Module 7 – Prepare Data
  • 7.1 Introduction to Power BI
  • 7.2 Get data from various data sources
  • 7.3 Preview source data
Module 8 – Clean, Transform, and Load Data
  • 8.1 Data Transformation Intro
  • 8.2 Transformation Example 1
  • 8.3 Transformation Example 2
  • 8.4 Transformation Example 3
  • 8.5 Transformation Example 4
  • 8.6 Transformation Example 5
  • 8.7 Transformation Example 6
Module 9 – Design a Data Model
  • 9.1 Introduction to Data Modeling
  • 9.2 Model Relationships
  • 9.3 Table Configuration
  • 9.4 Model interface
  • 9.5 Quick Measures
  • 9.6 Many-to-many relationships
  • 9.7 Row-level security
Module 10 – Create Model Calculations using DAX
  • 10.1 DAX context
  • 10.2 Calculated Tables
  • 10.3 Calculated Columns
  • 10.4 Managing Date Tables
  • 10.5 Measures
  • 10.6 Filter Manipulation
  • 10.7 Time Intelligence
Module 11 – Create Reports
  • 11.1 Basic Report Creation
  • 11.2 Example Page 1
  • 11.3 Example Page 2
  • 11.4 Example Page 3
  • 11.5 Report Publishing
  • 11.6 Enhancing Reports
  • 11.7 Drill-Through Pages
  • 11.8 Conditional Formatting
  • 11.9 Buttons and Bookmarks
Module 12 – Create Dashboards
  • 12.1 Dashboard Basics
  • 12.2 Real Time Dashboards
  • 12.3 Enhanced Dashboards
Module 13 – Create Paginated Reports
  • 13.1 Introduction to Power BI Report Builder
  • 13.2 Report Layouts
  • 13.3 Report Data
  • 13.4 Report Tables
Module 14 – Perform Advanced Analytics
  • 14.1 Introduction to Advanced Analytics
  • 14.2 Scatter Chart
  • 14.3 Forecast
  • 14.4 Decomposition Tree
  • 14.5 Key Influencers
Module 15 – Create and Manage Workspaces
  • 15.1 Introduction to Workspaces
  • 15.2 Working with Workspaces and the Portal
Module 16 – Create Power App Visuals
  • 16.1 Introduction to Power Apps Visual
  • 16.2 Creating the App
  • 16.3 Basic Power Apps Concepts
  • 16.4 Refreshing the Report
Module 17 – Analysis Services and Power BI
  • 17.1 Introduction to Analysis Services
  • 17.2 Connecting with Multidimensional Models
  • 17.3 Premium Workspaces and Analysis Services
  • 17.4 Course Wrap Up
Module 1 – Query Tools
  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Intro to Management Studio
  • 1.4 Intro to command-line query tools
Module 2 – Introduction to T-SQL Querying
  • 2.1 Module 2 Introduction
  • 2.2 Introducing T-SQL
  • 2.3 Understanding Sets
  • 2.4 Understanding the Logical Order of Operations in SELECT statements
Module 3 – Basic SELECT Queries
  • 3.1 Module 3 Introduction
  • 3.2 Writing Simple SELECT Statements
  • 3.3 Eliminate Duplicates with DISTINCT
  • 3.4 Using Column and Table Aliases
  • 3.5 Write Simple CASE Expressions
Module 4 – Querying Multiple Tables
  • 4.1 Module 4 Introduction
  • 4.2 Understanding Joins
  • 4.3 Querying with Inner Joins
  • 4.4 Querying with Outer Joins
  • 4.5 Querying with Cross Joins and Self Joins
Module 5 – Sorting and Filtering Data
  • 5.1 Module 5 Introduction
  • 5.2 Sorting Data
  • 5.3 Filtering Data with Predicates
  • 5.4 Filtering with the TOP and OFFSET-FETCH
  • 5.5 Working with Unknown Values
Module 6 – Working with SQL Server Data Types
  • 6.1 Module 6 Introduction
  • 6.2 Writing Queries that return Date and Time Data
  • 6.3 Writing Queries that use Date and Time Functions
  • 6.4 Writing Queries that return Character Data
  • 6.5 Writing Queries that use Character Functions
Module 7 – Using DML to Modify Data
  • 7.1 Module 7 Introduction
  • 7.2 Inserting Records with DML
  • 7.3 Updating Records Using DML
  • 7.4 Deleting Records Using DML
Module 8 – Using Built-In Functions
  • 8.1 Module 8 Introduction
  • 8.2 Writing Queries with Built-In Functions
  • 8.3 Using Conversion Functions
  • 8.4 Using Logical Functions
  • 8.5 Using Functions to Work with NULL
Module 9 – Grouping and Aggregating Data
  • 9.1 Module 9 Introduction
  • 9.2 Using Aggregate Functions
  • 9.3 Using the GROUP BY Clause
  • 9.4 Filtering Groups with HAVING
Module 10 – Using Subqueries
  • 10.1 Module 10 Introduction
  • 10.2 Writing Self-Contained Subqueries
  • 10.3 Writing Correlated Subqueries
  • 10.4 Using the EXISTS Predicate with Subqueries
Module 11 – Using Table Expressions
  • 11.1 Module 11 Introduction
  • 11.2 Using Views
  • 11.3 Using Inline Table-Valued Functions
  • 11.4 Using Derived Tables
  • 11.5 Using Common Table Expressions
Module 12 – Using Set Operators
  • 12.1 Module 12 Introduction
  • 12.2 Writing Queries with the UNION operator
  • 12.3 Using EXCEPT and INTERSECT
  • 12.4 Using APPLY
Module 13 – Using Window Ranking, Offset, and Aggregate Functions
  • 13.1 Module 13 Introduction
  • 13.2 Creating Windows with OVER
  • 13.3 Exploring Window Functions
Module 14 – Pivoting and Grouping Sets
  • 14.1 Module 14 Introduction
  • 14.2 Writing Queries with PIVOT and UNPIVOT
  • 14.3 Working with Grouping Sets
Module 15 – Implementing Error Handling
  • 15.1 Module Introduction
  • 15.2 Implementing T-SQL error handling
  • 15.3 Implementing structured exception handling
Module 16 – Managing Transactions
  • 16.1 Module 16 Introduction
  • 16.2 Transactions and the Database Engine
  • 16.3 Controlling Transactions
  • 16.4 Course Wrap Up
Module 1 – Designing and Building Tables
  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Database Design
  • 1.4 Creating Tables
  • 1.5 Data Types
  • 1.6 Schemas
  • 1.7 Altering Tables
Module 2 – Enforcing Data Integrity
  • 2.1 Module 2 Introduction
  • 2.2 Introduction to Data Integrity
  • 2.3 Data Domain Integrity
  • 2.4 Implementing Data Domain Integrity
  • 2.5 Implementing Entity and Referential Integrity
Module 3 – Indexing
  • 3.1 Module 3 Introduction
  • 3.2 Core Indexing Concepts
  • 3.3 Heaps, Clustered, and Nonclustered Indexes
  • 3.4 Data Types and Indexes
  • 3.5 Single Column and Composite Indexes
Module 4 – Stored Procedures, Functions, and Triggers
  • 4.1 Module 4 Introduction
  • 4.2 Introduction to Database Programming
  • 4.3 Creating Stored Procedures
  • 4.4 Creating User-Defined Functions
  • 4.5 Creating Triggers
Module 5 – Blob and Filestream Data
  • 5.1 Module 5 Introduction
  • 5.2 Introduction to Binary Data
  • 5.3 Considerations for BLOB data
  • 5.4 FILESTREAM Example
  • 5.5 File Table Example
Module 6 – Full-Text Search
  • 6.1 Module 6 Introduction
  • 6.2 Introduction to Full-Text Search
  • 6.3 Full-Text Catalogs
  • 6.4 Full-Text Indexes
  • 6.5 Full-Text Queries
Module 7 – Azure vs On-Prem
  • 7.1 Module 7 Introduction
  • 7.2 SQL Server on Azure VM
  • 7.3 Azure Managed SQL Instance
  • 7.4 Azure SQL Database
  • 7.5 Course Wrap Up
Module 1: Certified Blockchain Developer Hyperledger Overview
  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Audience for the Certification
  • 1.4 What is a CBDH
  • 1.5 Exam Objectives
  • 1.6 Exam Overview
Module 2: Hyperledger Framework
  • 2.1 Module 2 Introduction
  • 2.2 Hyperledger Project Overview
  • 2.3 Hyperledger Frameworks
  • 2.4 Hyperledger Fabric
  • 2.5 Hyperledger Fabric Use Cases
Module 3: Hyperledger Fabric Blockchain
  • 3.1 Module 3 Introduction
  • 3.2 Hyperledger Fabric Design Overview
  • 3.3 Hyperledger Fabric Whiteboard 
  • 3.4 Hyperledger Fabric Consensus
  • 3.5 Hyperledger Fabric Transactions
  • 3.6 Transactions Whiteboard
  • 3.7 Hyperledger Fabric Ledger
  • 3.8 Ledger Whiteboard
  • 3.9 Hyperledger Fabric Versions
  • 3.10 Hyperledger Fabric Membership Services
  • 3.11 Node Types and Roles
  • 3.12 Nodes and Peers Whiteboard
  • 3.13 Channels
  • 3.14 Channels Whiteboard
Module 4: Access Controls and Secure Chaincode
  • 4.1 Module 4 Introduction
  • 4.2 Access Controls Lists (.acl)
  • 4.3 Certificates and Certificate Authority
  • 4.4 Organizations and Participants
  • 4.5 Endorsement Policies
  • 4.6 Rest APIs
Module 5: Plan and Prepare Apps for Deployment
  • 5.1 Module 5 Introduction
  • 5.2 Development Whiteboard
  • 5.3 Installation Considerations
  • 5.4 Composer
  • 5.5 Composer Demo
Module 6: Hyperledger Fabric Explorer
  • 6.1 Module 6 Introduction
  • 6.2 Hyperledger Fabric Explorer Basics
  • 6.3 Installation Requirements of Hyperledger Explorer
Module 7: Chaincode and Development
  • 7.1 Module 7 Introduction
  • 7.2 What is Chaincode
  • 7.3 Writing Chaincode Considerations
  • 7.4 Development Language
  • 7.5 Client App Considerations
  • 7.6 BNA Files
  • 7.7 Service Discovery
Module 8: Course Wrap Up
  • 8.1 Module 8 Introduction
  • 8.2 Course Review
  • 8.3 Top 10 Things to know for the exam
  • 8.4 Taking the Exam
  • 8.5 Course Closeout
Module 1: Certified Blockchain Solutions Architect Overview
  • 1.1 Module 1 Introduction
  • 1.2 What is a CBSA
  • 1.3 Exam Questions
  • 1.4 Exam Objectives
Module 2: Blockchain 101 Terminology and Components
  • 2.1 Module 2 Introduction
  • 2.2 What is a Blockchain
  • 2.3 Blockchain Terminology
  • 2.4 Blockchain Key Components
Module 3: Exam Objectives
  • 3.1 Module 3 Introduction
  • 3.2 Proof of Work, Proof of Stake, Other Proof Systems
  • 3.3 Why Cryptocurrency is Needed
  • 3.4 Public, Private, and Permissioned Blockchains
  • 3.5 How Blocks are Written to a Blockchain
  • 3.6 Block Activity Demo
  • 3.7 Transactions Whiteboard
  • 3.8 Cryptography
  • 3.9 LTC Wallet Demo
  • 3.10 Database or Blockchain
  • 3.11 Public Blockchain Common Uses
  • 3.12 Private & Permissioned Blockchain Common Uses
  • 3.13 Launching Your Own Blockchain
  • 3.14 Segwits and Forks
  • 3.15 Mining
  • 3.16 Byzantine Fault Tolerance
  • 3.17 Consensus Among Blockchains
  • 3.18 Hasing
  • 3.19 Anders Hashing Demo
  • 3.20 Security in Blockchain
  • 3.21 Smart Contracts and dApps
  • 3.22 History of Blockchain
  • 3.23 Blockchain Programming Languages
  • 3.24 Common Testing and Deployment Practices
  • 3.25 Metamask Demo
  • 3.26 Value Creation
  • 3.27 Blockchain Architecture
  • 3.28 Corda Blockchain Architecture Whiteboard
  • 3.29 Enterprise Blockchains
  • 3.30 Bitcoin Improvement Protocols
Module 4: Hyperledger
  • 4.1 Module 4 Introduction
  • 4.2 Hyperledger Project
  • 4.3 Hyperledger Fabric
  • 4.4 Hyperledger Chaincode
  • 4.5 Hyperledger Fabric Whiteboard
  • 4.6 Hyperledger Fabric on AWS Demo
Module 5: Ethereum
  • 5.1 Module 5 Introduction
  • 5.2 Ethereum Overview
  • 5.3 Ethereum EVM
  • 5.4 Ethereum Browsers
  • 5.5 Ethereum Development
  • 5.6 Etherscan Demo
Module 6: Course Closeout
  • 6.1 Module 6 Introduction
  • 6.2 Summary Review
  • 6.3 Taking the CBSA Exam
  • 6.4 Practice Question
Module 1: Course Overview
  • 1.1 Course Introduction
  • 1.2 Course Target Audience
  • 1.3 Course Pre-Requirements
Module 2: Pre-Sales Activities
  • 2.1 Module 2 Introduction
  • 2.2 Request for Proposals
  • 2.3 Request for Proposals Fintech
  • 2.4 Proof of Concepts
  • 2.5 Return on Investment
  • 2.6 Value Creation
  • 2.7 Cost Modeling
  • 2.8 Cost Considerations
  • 2.9 Enterprise Integration
  • 2.10 TPS
  • 2.11 Whiteboard Discussion
Module 3: Blockchain Fundamentals
  • 3.1 Module 3 Introduction
  • 3.2 What is a Blockchain
  • 3.3 Blockchain Components
  • 3.4 Blockchain Terminology
  • 3.5 Enterprise Blockchains
  • 3.6 Consensus and Mining
  • 3.7 Ledgers
  • 3.8 Permissioned vs Permissionless Blockchains
  • 3.9 Trust and Blockchain
  • 3.10 Advantages of Transparency
  • 3.11 Development Expertise
  • 3.12 Dapps
  • 3.13 BaaS
  • 3.14 AWS BaaS Whiteboard Discussion
  • 3.15 Understanding Blockchain Architecture
Module 4: Enterprise Blockchains
  • 4.1 Module 4 Introduction
  • 4.2 Hyperledger
  • 4.3 Ethereum
  • 4.4 Quorum
  • 4.5 R3 Corda
  • 4.6 Corda Demobench Demo
  • 4.7 Ripple
  • 4.8 IBM BaaS
  • 4.9 AWS BaaS Demo
Module 5: Use Cases
  • 5.1 Module 5 Introduction
  • 5.2 Ripple Use Cases
  • 5.3 Dubai Use Cases
Module 6: Course Closeout
  • 6.1 Module 6 Introduction
  • 6.2 Course Review
  • 6.3 Blockchain Roles
Module 1 – Introduction to Business Intelligence and Data Modeling
  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Business Intelligence
  • 1.4 The Microsoft Business Intelligence Platform
  • 1.5 Exploring a Data Warehouse
  • 1.6 Exploring a Data Model
Module 2 – Multidimensional Databases
  • 2.1 Module 2 Introduction
  • 2.2 Introduction to Multidimensional Analysis
  • 2.3 Overview of Cube Security
  • 2.4 Creating and Configuring a Cube
  • 2.5 Data Sources
  • 2.6 Data Source Views
  • 2.7 Adding a Dimension to a Cube
Module 3 – Cubes and Dimensions
  • 3.1 Module 3 Introduction
  • 3.2 Dimensions
  • 3.3 Attribute Hierarchies and Relationships
  • 3.4 Sorting and Grouping Attributes
  • 3.5 Slowly Changing Dimensions
Module 4 – Measures and Measure Groups
  • 4.1 Module 4 Introduction
  • 4.2 Measures
  • 4.3 Measure Groups and Relationships
  • 4.4 Measure Group Storage
Module 5 – Introduction to MDX
  • 5.1 Module 5 Introduction
  • 5.2 MDX Fundamentals
  • 5.3 Adding Calculations to a Cube
  • 5.4 Querying a cube using MDX
Module 6 – Customizing Cube Functionality
  • 6.1 Module 6 Introduction
  • 6.2 Key Performance Indicators
  • 6.3 Actions
  • 6.4 Perspectives
  • 6.5 Translations
Module 7 – Tabular Data Models
  • 7.1 Module 7 Introduction
  • 7.2 Introduction to Tabular Data Models
  • 7.3 Creating a Tabular Data Model
  • 7.4 Configure Relationships and Attributes
  • 7.5 Configuring Data Model for an Enterprise BI Solution
Module 8 – Data Analysis Expressions (DAX)
  • 8.1 Module 8 Introduction
  • 8.2 DAX Fundamentals
  • 8.3 Calculated Columns
  • 8.4 Relationships
  • 8.5 Measures
  • 8.6 Time Intelligence
  • 8.7 KPI
  • 8.8 Parent – Child Hierarchies
Module 9 – Data Mining
  • 9.1 Module 9 Introduction
  • 9.2 Overview of Data Mining
  • 9.3 Custom Data Mining Solutions
  • 9.4 Validating a Data Mining Model
  • 9.5 Consuming a Data Mining Model
  • 9.6 Course Wrap Up
Module 1 – Prepare Data
  • 1.1 Course Introduction
  • 1.2 Module 1 Introduction
  • 1.3 Introduction to Power BI
  • 1.4 Get data from various data sources
  • 1.5 Preview source data
Module 2 – Clean, Transform, and Load Data
  • 2.1 Module 2 Introduction
  • 2.2 DimEmployee Example
  • 2.3 DimEmployeeSalesTerritory Example
  • 2.4 DimReseller Example
  • 2.5 FactResellersSales Example
  • 2.6 ResellerSalesTargets Example
  • 2.7 Color Formats Example
Module 3 – Design a Data Model
  • 3.1 Module 3 Introduction
  • 3.2 Introduction to Data Modeling
  • 3.3 Model Relationships
  • 3.4 Table Configuration
  • 3.5 Model interface
  • 3.6 Quick Measures
  • 3.7 Many-to-many relationships
  • 3.8 Row-level security
Module 4 – Create Model Calculations using DAX
  • 4.1 Module 4 Introduction
  • 4.2 DAX context
  • 4.3 Calculated Tables
  • 4.4 Calculated Columns
  • 4.5 Managing Date Tables
  • 4.6 Measures
  • 4.7 Filter Manipulation
  • 4.8 Time Intelligence
Module 5 – Create Reports
  • 5.1 Module 5 Introduction
  • 5.2 Basic Report Creation
  • 5.3 Example Page 1
  • 5.4 Example Page 2
  • 5.5 Example Page 3
  • 5.6 Report Publishing
  • 5.7 Enhancing Reports
  • 5.8 Drill-Through Pages
  • 5.9 Conditional Formatting
  • 5.10 Buttons and Bookmarks
Module 6 – Create Dashboards
  • 6.1 Module 6 Introduction
  • 6.2 Dashboard Basics
  • 6.3 Real Time Dashboards
  • 6.4 Enhanced Dashboards
Module 7 – Create Paginated Reports
  • 7.1 Module 7 Introduction
  • 7.2 Introduction to Power BI Report Builder
  • 7.3 Report Layouts
  • 7.4 Report Data
  • 7.5 Report Tables
Module 8 – Perform Advanced Analytics
  • 8.1 Module 8 Introduction
  • 8.2 Introduction to Advanced Analytics
  • 8.3 Scatter Chart
  • 8.4 Forecast
  • 8.5 Decomposition Tree
  • 8.6 Key Influencers
Module 9 – Create and Manage Workspaces
  • 9.1 Introduction to Workspaces
  • 9.2 Working with Workspaces and the Portal
Module 10 – Create Power App Visuals
  • 10.1 Module 10 Introduction
  • 10.2 Introduction to Power Apps Visual
  • 10.3 Creating the App
  • 10.4 Basic Power Apps Concepts
  • 10.5 Refreshing the Report
Module 11 – Analysis Services and Power BI
  • 11.1 Module 11 Introduction
  • 11.2 Introduction to Analysis Services
  • 11.3 Connecting with Multidimensional Models
  • 11.4 Premium Workspaces and Analysis Services
  • 11.5 Course Wrap Up
Module 1: Course Overview
  • 1.1 Course Overview
  • 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
  • 2.1 Core Concepts
  • 2.2 What is the CKA Exam
  • 2.3 Why Get Certified
  • 2.4 CKA Exam Domains
  • 2.5 What is Kubernetes
  • 2.6 What is a Container
  • 2.7 What is Docker
  • 2.8 Kubernetes Terminology
  • 2.9 Kubernetes Components
  • 2.10 Kubernetes Documentation
  • 2.11 Whiteboard – Kubernetes Overview
Module 3: Kubernetes Installation
  • 3.1 Kubernetes Installation
  • 3.2 Installation Options
  • 3.3 MiniKube
  • 3.4 Demo – Install Minikube
  • 3.5 Demo – Clusters
  • 3.6 Kubectl Basics
  • 3.7 Demo – Install Kubectl
Module 4: Working with Kubernetes Clusters and Nodes
  • 4.1 Working with Kubernetes Clusters and Nodes
  • 4.2 Understanding the Architecture
  • 4.3 Understanding the nodes
  • 4.4 Core Objects
  • 4.5 API
  • 4.6 Create a Cluster
  • 4.7 Demo – Create a Cluster
  • 4.8 Demo – YAML
  • 4.9 Demo – Nodes
  • 4.10 Demo – Kubectl Client Config
Module 5: API Access and Commands
  • 5.1 API Access and Commands
  • 5.2 About the API
  • 5.3 Accessing the APIs
  • 5.4 Demo – Exploring APIS
  • 5.5 Kubectl
  • 5.6 Using YAML for API Objects
  • 5.7 Using Curl
  • 5.8 Labels and Annotations
Module 6: Running Pods and Deployments
  • 6.1 Running Pods and Deployments
  • 6.2 Pods and Deployments
  • 6.3 What is a Namespace
  • 6.4 Scalability Options
  • 6.5 Rolling Updates
  • 6.6 Apply Changes to a Pod
  • 6.7 Stateful Sets
  • 6.8 Demo – Manage Deployments
Module 7: Configuring Storage
  • 7.1 Configuring Storage
  • 7.2 Storage options with Kubernetes
  • 7.3 Configure Pod Volumes
  • 7.4 Configure Persistent Volumes
  • 7.5 Storage Classes
  • 7.6 Whiteboard – Persistent Volumes
  • 7.7 Demo – Configure Storage
Module 8: Kubernetes Networking
  • 8.1 Kubernetes Networking
  • 8.2 Understanding Networking
  • 8.3 Services
  • 8.4 Network Plugins
  • 8.5 DNS
  • 8.6 Network Policies
  • 8.7 Namespaces
  • 8.8 Demo – Networking
  • 8.9 Manage High Availability
Module 9: Managing Security
  • 9.1 Managing Security
  • 9.2 Kubernetes Security
  • 9.3 Container and Pod Security
  • 9.4 Certificates
  • 9.5 API Security
  • 9.6 Configmaps and Secrets
  • 9.7 Secure Images
  • 9.8 Security Context
  • 9.9 RBAC
Module 10: Managing Kubernetes In the Enterprise
  • 10.1 Managing Kubernetes In the Enterprise
  • 10.2 Cluster Management and Maintenance
  • 10.3 Demo – Scale Deployment
  • 10.4 Demo – Restart Cluster
  • 10.5 Demo – Add or Remove Nodes
  • 10.6 Demo – Create a Pod in the Background
  • 10.7 Kubelet Restarts and Drains
  • 10.8 UI Dashboard
  • 10.9 Demo – Describe Resources
  • 10.10 Kube-scheduler
  • 10.11 Demo – Set-Up Alias
Module 11: Kubernetes Monitoring and Troubleshooting
  • 11.1 Kubernetes Monitoring and Troubleshooting
  • 11.2 Monitoring Resources
  • 11.3 Monitoring Pods
  • 11.4 Demo – Monitoring Pods
  • 11.5 Logging
  • 11.6 Demo – Logging
  • 11.7 Troubleshooting
  • 11.8 Affinity and Taints
Module 12: CKA Practice Exams
  • 12.1 CKA Practice Exams
  • 12.2 Exam Preparation Must Know
  • 12.3 Question 1 – Create a Cluster, Deploy Pods and a Deployment
  • 12.4 Question 2 – Create a Pod and Verify
  • 12.5 Question 3 – Create a Pod with a Secret
  • 12.6 Question 4 – Get Logs on a Pod and Send to File
  • 12.7 Question 5 – Liveness Probe
  • 12.8 Question 6 – Use Labels
  • 12.9 Additional Questions
Module 13: Course Closeout
  • 13.1 Course Closeout
  • 13.2 Course Review
  • 13.3 Kubernetes Certifications
  • 13.4 Additional Resources
  • 13.5 Exam Readiness
  • 13.6 Course Closeout
Module 1: Course Overview
  • 1.1 Course Overview
  • 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
  • 2.1 Core Concepts
  • 2.2 What is the CKAD Exam
  • 2.3 Why Get Certified
  • 2.4 CKAD Exam Domains
  • 2.5 APIs
  • 2.6 Demo – Explore APIS
  • 2.7 Pods
  • 2.8 Whiteboard – Pod Creation Workflow
  • 2.9 Create a Pod
  • 2.10 Lifecycle Status
  • 2.11 Inspecting Pods
  • 2.12 Demo – Create a Pod and Inspect
Module 3: Configuration
  • 3.1 Configuration
  • 3.2 Understand Configmaps
  • 3.3 Understand Security Contexts
  • 3.4 Demo – Create a Security Context
  • 3.5 Create and Consume Secrets
  • 3.6 Understand Service Accounts
  • 3.7 Demo – Create a Pod to Use a Secret
  • 3.8 Demo – Define a Service Account
Module 4: Multi Container Pods
  • 4.1 Multi Container Pods
  • 4.2 Multi Container Pods Design and Patterns
  • 4.3 Ambassador Containers
  • 4.4 Connecting to Pods
  • 4.5 Side Cars
  • 4.6 Demo – Create an Init Container
Module 5: Observability
  • 5.1 Observability
  • 5.2 Container Health
  • 5.3 Probes
  • 5.4 Logging
  • 5.5 Monitor Resources and Apps
  • 5.6 Monitoring Pods
  • 5.7 Demo – Monitoring and Logging
Module 6: Pod Design
  • 6.1 Pod Design
  • 6.2 Deployments
  • 6.3 Rolling Updates
  • 6.4 Pod Changes
  • 6.5 Jobs and Crons
  • 6.6 Labels and Annotations
  • 6.7 Demo – Define and Query Labels
  • 6.8 Scalability Options
Module 7: Services and Networking
  • 7.1 Services and Networking
  • 7.2 Understanding Networking, Routing and Services
  • 7.3 Network Policies
  • 7.4 Namespaces
  • 7.5 Demo – Networking
Module 8: State Persistence
  • 8.1 State Persistence
  • 8.2 Storage Options
  • 8.3 Volume Storage
  • 8.4 Configure Pod Volumes
  • 8.5 Configure Persistent Volumes
  • 8.6 Whiteboard – Persistent Volumes
Module 9: CKA Practice Exams
  • 9.1 CKAD Practice Preparation
  • 9.2 Exam Prep Need to Know
  • 9.3 Question 1 – Create a Pod and Inspect
  • 9.4 Question 2 – Define a Pods Readiness
  • 9.5 Question 3 – Create a Pod with a Secret
  • 9.6 Question 4 – View Pods logs in Real Time
  • 9.7 Question 5 – Define and query labels
  • 9.8 Additional Questions
Module 10: Course Closeout
  • 10.1 Course Closeout
  • 10.2 Course Summary Review
  • 10.3 Kubernetes Certifications
  • 10.4 Additional Resources
  • 10.5 Exam Review
  • 10.6 Course Closeout
Module 1: Architecture
  • 1.1 About Your Instructor
  • 1.2 Course Introduction
  • 1.3 Welcome to the Architecture Domain
  • 1.4 Classic 3 and 2 Tier Models
  • 1.5 2 Tier Spine Leaf
  • 1.6 Fabric Capacity Planning
  • 1.7 High Availability
  • 1.8 Designing a WLAN Deployment
  • 1.9 Cloud vs On-Prem
  • 1.10 The Cisco SD-WAN
  • 1.11 Cisco SD-Access
  • 1.12 QoS
  • 1.13 Hardware vs Software Switching
Module 2: Virtualization
  • 2.1 Welcome to the Virtualization Domain
  • 2.2 Device Virtualization Technologies
  • 2.3 Data Path Virtualization
  • 2.4 Network Virtualization Concepts
Module 3: Infrastructure
  • 3.1 Welcome to the Infrastructure Domain
  • 3.2 Trunking – VTP – EtherChannel
  • 3.3 RSTP and MST
  • 3.4 EIGRP vs OSPF
  • 3.4 OSPF
  • 3.5 eBGP
  • 3.6 eBGP Part 2
  • 3.7 WLANs
  • 3.8 NTP NAT PAT
  • 3.9 HSRP VRRP GLBP
  • 3.10 Multicast
Module 4: Network Assurance
  • 4.1 Welcome to the Network Assurance Module
  • 4.2 Diagnose Network Issues
  • 4.3 NetFlow
  • 4.4 SPAN
  • 4.5 IP SLA
  • 4.6 DNA Center
Module 5: Security
  • 5.1 Welcome to the Security Module
  • 5.2 Device Access Control
  • 5.3 ACLs and CoPP
  • 5.4 Wireless Security
  • 5.5 Components in Security Design
Module 6: Automation
  • 6.1 Welcome to the Automation Module
  • 6.2 Python
  • 6.3 JSON
  • 6.4 YANG
  • 6.5 NETCONF-RESTCONF
  • 6.6 APIs
  • 6.7 EEM
  • 6.8 Orchestration Tools
Module 1: What are Big Data Clusters?
  • 1.1 Introduction
  • 1.2 Linux, PolyBase, and Active Directory
  • 1.3 Scenarios
Module 2: Big Data Cluster Architecture
  • 2.1 Introduction
  • 2.2 Docker
  • 2.3 Kubernetes
  • 2.4 Hadoop and Spark
  • 2.5 Components
  • 2.6 Endpoints
Module 3: Deployment of Big Data Clusters
  • 3.1 Introduction
  • 3.2 Install Prerequisites
  • 3.3 Deploy Kubernetes
  • 3.4 Deploy BDC
  • 3.5 Monitor and Verify Deployment
Module 4: Loading and Querying Data in Big Data Clusters
  • 4.1 Introduction
  • 4.2 HDFS with Curl
  • 4.3 Loading Data with T-SQL
  • 4.4 Virtualizing Data
  • 4.5 Restoring a Database
Module 5: Working with Spark in Big Data Clusters
  • 5.1 Introduction
  • 5.2 What is Spark
  • 5.3 Submitting Spark Jobs
  • 5.4 Running Spark Jobs via Notebooks
  • 5.5 Transforming CSV
  • 5.6 Spark-SQL
  • 5.7 Spark to SQL ETL
Module 6: Machine Learning on Big Data Clusters
  • 6.1 Introduction
  • 6.2 Machine Learning Services
  • 6.3 Using MLeap
  • 6.4 Using Python
  • 6.5 Using R
Module 7: Create and Consume Big Data Cluster Apps
  • 7.1 Introduction
  • 7.2 Deploying, Running, Consuming, and Monitoring an App
  • 7.3 Python Example – Deploy with azdata and Monitoring
  • 7.4 R Example – Deploy with VS Code and Consume with Postman
  • 7.5 MLeap Example – Create a yaml file
  • 7.6 SSIS Example – Implement scheduled execution of a DB backup
Module 8: Maintenance of Big Data Clusters
  • 8.1 Introduction
  • 8.2 Monitoring
  • 8.3 Managing and Automation
  • 8.4 Course Wrap Up
Module 1: Introduction and Deploy Windows
  • 1.1 Instructor and Course Introduction
  • 1.2 Exam Overview
  • 1.3 Deploy Windows Intro
  • 1.4 Deploy Windows 10
  • 1.5 Deploy Windows 10 Pt 2
  • 1.6 Preparing Virtual Lab Setup for the Client 1
  • 1.7 Installation of Windows 10 Enterprise
  • 1.8 Troubleshooting Failed Installations with Setup Logs
  • 1.9 Configuring Locales
  • 1.10 Perform Post-Installation Configuration
  • 1.11 Navigating Microsoft Edge
  • 1.12 Modifying Microsoft Edge Settings
  • 1.13 Customizing Your Computer Setting
Module 2: Manage Devices and Data
  • 2.1 Manage devices and data intro
  • 2.2 Manage local users, groups, and devices
  • 2.3 Configure data access and protection
  • 2.4 Adding and accessing local users and groups
  • 2.5 Managing NTFS permissions in Windows 10
  • 2.6 Configure devices by using local policies
  • 2.7 Configuring Audit Policies on Windows 10
  • 2.8 Manage Windows security
  • 2.9 How to change user account settings
Module 3: Configure Connectivity
  • 3.1 Configure connectivity intro
  • 3.2 Configure networking
  • 3.3 Configuring network adapter advanced properties
  • 3.4 Configuring a static TCP/IP address
  • 3.5 Viewing the networking connection details
  • 3.6 Setting up a VPN connection
  • 3.7 Configure remote connectivity
  • 3.8 Configure remote management
Module 4: Maintain Windows
  • 4.1 Maintain Windows intro
  • 4.2 Configure system and data recovery
  • 4.3 Backing up files in Windows 10
  • 4.4 Using the recycle bin
  • 4.5 Manage updates
  • 4.6 Check for updates in Windows 10
  • 4.7 Configuring hardware in Windows 10
  • 4.8 Monitor and manage Windows
  • 4.9 Configuring Windows 20 desktop options
  • 4.10 Installing new features
Module 1: Course Overview
  • Course Overview
  • Course Pre Reqs
Module 2: The Basics
  • The Basics
  • What is DevOps
  • DevOps Building Blocks
  • DevOps Best Practices
  • Why Containers
  • What is a Pipeline
  • Continuous Integration and Continous Delivery
  • Continuous Deployment
  • Pipelines – Whiteboard
Module 3: Development
  • Development Basics
  • CICD Strategy
  • Source Control Management
  • Demo – Build Management
Module 4: Infrastructure
  • Release and Deployments
  • Release Management
  • Demo – Release Management
  • Reliability Engineering
  • DevOps Tools
  • Infrastructure as Code
  • Automation
  • Demo – (IaaC) CloudFormation
  • Demo – Jenkins
  • Demo – GitHub
Module 5: Key Performance Indicators (KPIs)
  • Key Performance Indicators (KPI)
  • KPI Metrics
  • KPI Tools
  • Monitoring Applications
  • Demo – AWS CloudWatch
Module 6: Course Closeout
  • Course Closeout
  • Summary Review
  • Additional Resources
  • DevOps Job Outlook
  • Course Closeout
Module 1: Course Overview
  • Course Overview
  • Course PreReqs
Module 2: Basics of Kubernetes
  • Basics of Kubernetes
  • What is Kubernetes
  • Business Value of Kubernetes
  • What is a Container
  • What is Docker
  • Kubernetes History
  • Kuberntes Terminology
  • Kubernetes Components
  • Whiteboard – Kubernetes Overview
Module 3: Kubernetes Design and Architecture
  • Kubernetes Design and Architecture
  • Kubernetes Design Fundamentals
  • Whiteboard – Kubernetes Architecture
  • Deployment – Nodes, Pods, and Clusters
  • Etcd
  • Kubectl
  • Demo – Install Kubectl
  • Demo – Kubernetes Commands
  • Demo – Kubernetes Commands
Module 4: Deployments
  • Deployments
  • Options for Deployment
  • Deploying a Containerized Application
  • What is Minikube
  • Demo – Deploy MiniKube
  • Demo – Deploy Cluster Deployment
  • Demo – Deploy Services
  • Demo – Manage Application
Module 5: Course Closeout
  • Course Closeout
  • Course Review
  • Kubernetes Certifications
  • Additional Resources
  • Kubernetes Job Outlook
  • Course Closeout
Module 1: Course Overview
  • Course Overview
  • Course PreReqs
Module 2: DevOps Basics
  • DevOps Fundamentals
  • What is DevOps
  • What are Pipelines
  • Continuous Integration and Delivery
  • Continuous Deployment
  • Whiteboard Build Services
  • Demo – DevOps Services on GCP
Module 3: App Engine PaaS
  • App Engine
  • App Engine Basics
  • App Engine Demo
  • App Engine Security Scanner Demo
  • App Engine or Kubenetes Engine
Module 4: Kubenetes Engine Overview
  • Kubenetes Engine
  • Kubernetes Basics
  • What is Kubenetes Engine
  • Demo – Kubenetes Engine Clusters Demo
  • Kubenetes Engine Application Demo
  • Kubenetes Engine Whiteboard
Module 5: DevOps Developer Tools
  • DevOps Services & Tools
  • Demo – Cloud SDK
  • Demo – Cloud Shell
  • Demo – Cloud Build
  • Demo – Container Registry
  • Demo – Cloud Source Repositories
  • Demo – Private Catalog
  • Demo – Artifact Registry
Module 6: Microservices
  • Microservices
  • Demo – Cloud Watch
  • Cloud Functions-Cloud Run
  • Demo – Cloud Functions
  • Demo – Cloud Run
Module 7: Management of your DevOps Services
  • Management and Monitoring
  • Cloud Operations
  • Demo – Cloud Operations
  • Service Accounts
  • Cloud Endpoints and Apigee
  • Demo – Workflows and Cloud Tasks
  • Demo – Recommendation Engine
  • Infrastructure as Code (IaaC)
  • Deployment Manager
  • Demo – Deployment Manager
  • Demo – Cloud Marketplace
Module 8: Resources and Closeout
  • Resources and Closeout
  • Course Summary
  • DevOps Roles and Salary Demand
  • Additional Resources
  • Google Cloud Platform Certification
  • Course Closeout
Module 1: Installation
  • SQL Admin Intro
  • Installation
Module 2: Data Storage
  • Introduction to Data Storage with SQL Server
  • Managing Storage for System Databases
  • Managing Storage for User Databases
  • Moving Database Files
Module 3: Data Recover
  • Intro to Data Recovery
  • Understanding SQL Server Recovery Models
  • Planning a Backup Strategy
  • Backing up Databases and Transaction Logs
  • Using SSMS For Backup
  • Understanding the Restore Process
  • How to Restore a Database
  • Using SSMS For Restore
  • T-SQL Backup and Restore
  • Advanced Restore Scenarios
  • Introduction to Transferring Data
  • Importing and Exporting Table Data
  • Copying or Moving a Database
Module 4: Monitoring
  • Introduction to Monitoring SQL Server
  • Dynamic Management Views and Functions
  • Server Reports
  • System Performance Monitor
  • Tracing SQL Server Workload Activity
  • Extended Events
  • Database Tuning Advisor
Module 5: Security
  • Introduction to SQL Server Security
  • Managing Server-Level Security
  • Managing Database-Level Security
  • Row Level Security (RLS) Using Policies
  • Database Security Tools
  • Contained Database
  • Auditing Data Access in SQL Server
  • Implementing Transparent Data Encryption
Module 6: Maintenance
  • Introduction to Maintenance
  • Ensuring Database Integrity
  • Maintaining Indexes
  • Automating Routine Database Maintenance
  • Automating SQL Server Management
  • Monitoring SQL Server Errors
  • Configuring Database Mai
Module 1: Introduction
  • Instructor Introduction
  • Course Introduction
  • Exam Overview
Module 2: Information Security Governance
  • Module Overview
  • InfoSec Strategic Context Part 1
  • InfoSec Strategic Context Part 2
  • GRC Strategy and Assurance
  • Roles and Responsibilities
  • GMA Tasks Knowledge and Metrics
  • IS Strategy Overview
  • Strategy Implemenation
  • Strategy Development Support
  • Architecture and Controls
  • Considerations and Action Plan
  • InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
  • Module Overview
  • Risk Identification Task and Knowledge
  • Risk Management Strategy
  • Additional Considerations
  • Risk Analysis and Treatment Tasks & Knowledge
  • Leveraging Frameworks
  • Assessment Tools and Analysis
  • Risk Scenario Development
  • Additional Risk Factors
  • Asset Classification and Risk Management
  • Risk Monitoring and Communication
  • Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
  • Module Overview
  • Alignment and Resource Management – Task and Knowledge
  • Key Relationships
  • Standards Awareness and Training – Tasks and Knowledge
  • Awareness and Training
  • Building Security into Process and Practices – Tasks and Knowledge
  • Additional Technology Infrastructure Concerns
  • Security monitoring and reporting Overview Tasks and Knowledge
  • Metrics and Monitoring
  • Summary
Module 5: Information Security Incident Management
  • Module Overview
  • Planning and Integration Overview Task and Knowledge
  • Incident Response Concepts and Process
  • Forensics and Recovery
  • Readiness and Assessment – Overview Tasks and Knowledge
  • Identification and Response Overview Tasks and Knowledge
  • Incident Processes
Module 6: Exam Prep
  • Case Study – Security On a Shoestring Budget
  • Case Study – APT In Action
  • Summary
  • Exam Prep
Module 1: Preparing for and Taking the Exam
  • Preparing to Take the Exam and Instructor Introduction
  • Getting Certified to take the Examination
  • Examination Characteristics
  • Test Taking Tips and Techniques
  • Question Formats
  • Post Certification Requirements
Module 2: Process Domain
  • Process Domain and Framework defined
  • Predictive, Iterative, Incremental and Adaptive Project Life Cycles
  • Framework Definitions
  • Project Manager Skills
  • Framework Key Points to Remember
  • Framework Example Questions Review
  • Project Integration Management Knowledge Area Defined
  • Knowledge Area Process Mapping and Definitions
  • Develop Project Charter and Develop Project Management Plan
  • Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
  • Perform Integrated Change Control
  • Close Project or Phase
  • Integration Key Points to Remember
  • Integration Example Questions Review
  • Project Scope Management Knowledge Area Defined
  • Plan Scope Management and Collect Requirements
  • Nominal Group Technique (Delphi-Opinion Technique)
  • Define Scope and Create WBS
  • Breakdown Structures used in WBS Dictionary
  • Validate Scope and Control Scope
  • Defining Requirements in Agile
  • Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
  • Scope Key Points to Remember
  • Scope Example Questions Review
  • Project Schedule Management Knowledge Area Defined
  • Plan Schedule Management, Define Activities, and Sequence Activities
  • Dependencies, Predecessors, Leads, and Lags
  • Estimate Activity Durations
  • Develop Schedule
  • Critical Path Method
  • Schedule Compression
  • Resource Leveling, Schedule Format, and Control Schedule
  • Agile Estimating
  • Agile Schedule Planning and Reporting
  • Schedule Key Points to Remember and Example Question review
  • Project Cost Management Knowledge Area Defined
  • Plan Cost Management and Estimate Cost
  • Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
  • Life Cycle Costing, Status Reporting, and Determine Budget
  • Control Costs, and Earned Value Management
  • Earned Schedule, and Agile Cost Control
  • Cost Key Points to Remember
  • Cost Example Questions Review
  • Project Quality Management Knowledge Area Defined
  • Plan Quality Management
  • Manage Quality
  • Control Quality
  • Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
  • Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
  • Quality Key Points to Remember
  • Quality Example Questions Review
  • Project Risk Management Knowledge Area Defined
  • Risk Management Plan and Identify Risks
  • Risk Register and Issues Vs Risk
  • Perform Qualitative and Quantitative Risk Analysis
  • Plan Risk Responses
  • Implement Risk Responses and Monitor Risks
  • Agile Risk Tools and Risk Key Points to Remember
  • Risk Example Questions Review
  • Project Procurement Management Knowledge Area Defined
  • Plan Procurement Management and Conduct Procurements
  • Contracts
  • Share and Point of Total Assumption
  • Procurement Documents
  • Non-Competitive Awards and Control Procurements
  • Agile Contracts
  • Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
  • People Domain and Project Communications Management Knowledge Area Defined
  • Plan Communications Management
  • Manage and Monitor Communications
  • Agile Communications
  • Communications Key Points to Remember
  • Communications Example Question Review
  • Project Stakeholder Management Knowledge Area Defined
  • Stakeholder Position Descriptions
  • Identify Stakeholders
  • Plan Stakeholder Engagement and Manage Stakeholder Engagement
  • Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
  • Stakeholder Management Key Points to Remember
  • Stakeholder Management Example Question Review
  • Resource Management Knowledge Area Defined
  • Plan Resource Management and Estimate Activity Resources
  • Acquire Resources and Develop Team
  • Manage Team
  • Control Resources and Agile Teaming Concepts
  • Other Agile Teaming Concepts
  • Agile Team Roles and Troubleshooting Agile team issues
  • Resources Key Points to Remember
  • Resources Example Question Review
Module 4: Business Environment Domain
  • Business Environment Domain Defined
  • Project Selection Tools
  • PMO, Organizational Structure, and Reports
  • Agile in the Business Environment
  • Business Environment Key Points to Remember and Example Question Review
  • Course Closing
Module 1: Introduction to Cloud Computing
  • Welcome
  • Why Cloud Computing
  • What is Cloud Computing
  • Cloud Computing Deployment Models
  • Cloud Computing Types
  • AWS Cloud Overview
  • AWS Management Console Walk-Through
  • AWS Shared Responsibility
  • Summary
Module 2: Identity and Access Management IAM
  • IAM Overview
  • IAM Users & Groups Hands-On
  • IAM Policies Hands-On
  • MFA Overview
  • MFA Hands-On
  • AWS CLI
  • AWS CLI Installation Hands-On
  • AWS CLI Hands-On
  • IAM Roles
  • IAM Roles Hands-On
  • IAM Security Tools
  • IAM Security Tools Hands-On
  • IAM Best Practices
  • Shared Responsibility Model for IAM
  • IAM Summary
Module 3: Elastic Cloud Computing EC2
  • Budget Setup
  • EC2 Overview
  • EC2 Instance Hands-On
  • Security Groups
  • Security Groups Hands-On
  • SSH Overview
  • SSH Using Putty-Windows
  • SSH Using CMD-Windows
  • EC2 Instance Connect
  • EC2 Instance Roles
  • EC2 Launch Types
  • Shared Responsibility Model for EC2
  • EC2 Summary
Module 4: EC2 Storage
  • Intro to EC2 Instance Storage
  • EBS Volume Overview
  • EBS Volume Hands-On
  • EBS Snapshots
  • EBS Snapshots Hands-On
  • AMI Overview
  • AMI Hands-On
  • EC2 Instance Store
  • EC2 Instance Store Hands-On
  • Elastic File System – EFS
  • Shared responsibility Model for EC2 Storage
  • Section Cleanup
  • EC2 Instance Storage Summary
Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
  • Introduction to Scalability & High-Availability
  • High Availability, Scalability and Elasticity
  • ELB Overview
  • ELB Hands-On
  • ASG Overview
  • ASG Hands-On
  • Section Cleanup
  • Summary
Module 6: Amazon S3
  • S3 Introduction
  • S3 Overview
  • S3 Hands-On
  • S3 Security
  • S3 Bucket Policies Hands-On
  • S3 Websites
  • S3 Website Hands-On
  • S3 Versioning
  • S3 Versioning Hands-On
  • S3 Access Logs
  • S3 Access Logs Hands-On
  • S3 Replication
  • S3 Replication Hands-On
  • S3 Storage Classes
  • Snowball, Snowball Edge and SnowMobile
  • S3 Summary
Module 7: Database and Analytics
  • Database Introduction
  • RDS & Aurora Overview
  • RDS Database Hands-On
  • ElastiCache Overview
  • DynamoDB Overview
  • DynamoDB Hands-On
  • RedShift Overview
  • Amazon EMR Overview
  • Athena Overview
  • AWS Glue
  • DMS Overview
  • Database & Analytics Summary
Module 8: Other Services
  • Other Compute Introduction
  • ECS-Fargate-ECR Overview
  • What is Serverless
  • AWS Lambda
  • AWS Lambda Hands-On
  • AWS Batch
  • AWS LightSail
  • AWS LightSail Hands-On
  • Other Compute Summary
Module 9: Scaling Your Infrastructure
  • CloudFormation Overview
  • Cloud Formation Hands-On
  • Elastic Beanstalk Overview
  • Elastic Beanstalk Hands-On
  • AWS CodeDeploy
  • AWS SSM
  • AWS OpsWorks
  • Infrastructure at Scale Summary
Module 10: Global Applications
  • Why Global Application
  • Route 53
  • Route 53 Hands-On
  • CloudFront
  • CloudFront Hands-On
  • S3 Transfer Acceleration
  • AWS Global Aceelerator
  • Global Application Summary
Module 11: Cloud Integration
  • Cloud Integration Introduction
  • SQS Service
  • SQS Service Hands-On
  • SNS Service
  • SNS Service Hands-On
  • Cloud Integration Summary
Module 12: Cloud Monitoring
  • CloudWatch Metrics and Alarms
  • CloudWatch Metrics and Alarms Hands-On
  • CloudWatch Logs
  • CloudWatch Events and EventBridge
  • CloudWatch Events and EventBridge Hands-On
  • CloudTrail
  • X-Ray
  • Service Health Dashboard
  • Personal Health Dashboard
  • Monitoring Summary
Module 13: Virtual Private Network
  • Settings the Expectations
  • VPC and subnets, Internet Gateway and NAT Gateways
  • VPC and subnets, Internet Gateway and NAT Gateways-Hands-On
  • NACL and Security Groups
  • NACL and Security Groups Hands-On
  • VPC Flow Logs
  • VPC Peering
  • VPC Flow Logs and VPC Peering Hands-On
  • VPC Endpoints
  • VPC Endpoints Hands-On
  • Site-to-Site VPNs and Direct Connect
  • Transit Gateway
  • VPC Summary
Module 14: Security and Compliance
  • Introduction to Security and Compliance
  • DDoS Mitigration
  • Penetration Testing
  • KMS and CloudHSM
  • Secrets Manager
  • AWS Artifact
  • GuardDuty
  • Inspector
  • AWS Config
  • AWS Macie
  • Security and Compliance Summary
Module 15: Machine Learning
  • Amazon Rekognition
  • Amazon Transcribe
  • Amazon Polly
  • Amazon Translate
  • Amazon Lex and Connect
  • Amazon Comprehend
  • Amazon SageMaker
  • Machine Learning Summary
Module 16: Advanced Identity
  • Amazon Cognito
  • Directory Services
  • Single Sign-On (SSO)
  • Advanced Identity Summary
Module 17: Are You Well Architected?
  • Are You Well Architected
  • Operational Excellence
  • Security
  • Reliability
  • Performance Efficiency
  • Cost Optimization
  • Trusted Advisor
Module 18: Congratulations & Exam Preparation
  • Exam Tips & Congratulations
Module 1: Introduction
  • Instructor Introduction
  • Course Overview
  • Expectations
Module 2: Cloud Fundamentals
  • What is the Cloud
  • Basic Terms
  • Types of cloud computing
  • Cloud Service Models
Module 3: Azure’s Architecture
  • Regions and Availability
  • Resource Groups and Management
  • Azure Marketplace
  • Demo- Azure Console Exploration
Module 4: Compute
  • Virtual Machines
  • Containers
  • Demo – Containers
  • Functions
  • Demo – Functions
  • Windows Virtual Desktop and App Services
Module 5: Networking and CDN
  • Virtual Networks
  • Load Balancers
  • Gateways
  • Content Delivery Network
  • Network Security
  • Demo – Connecting two VMs
Module 6: Storage
  • Storage
  • Big Data and Analytics
  • Databases
  • Demo – SQL Database
  • Database Migration
Module 7: Azure Solutions
  • IoT
  • Demo – IoT Hub
  • AI
  • Serverless Computing
Module 8: Administration
  • Security
  • Identity and Access Management
  • Demo – Adding Users and Groups
  • Governance
  • Demo – Resource Locks
  • Privacy and Compliance
Module 9: Pricing and Service Level Agreements
  • Managing Costs
  • Demo – Pricing Calculator
  • Service Level Agreements and Service Lifecycles
Module 10: Exam Preparation
  • Exam Layout
  • Best Practices and Study Tips
  • Overview and Conclusion
Module 11: Review Questions
  • Module 11 pt 1
  • Module 11 pt 2
  • Module 11 pt 3
  • Module 11 pt 4
Module 1: Intro & Performing Basic Linux Tasks
  • Instructor Introduction
  • Course Introduction
  • Identify The Linux Design Philosophy
  • Enter Shell Commands
  • Shell Commands Activity
  • Get Help with Linux
Module 2: Managing Users and Groups
  • Assume Superuser and Groups
  • Create, Modify, and Delete Users
  • Create, Modify, and Delete Groups
  • Query Users and Groups
  • Configure Account Profiles
Module 3: Managing Permissions and Ownership
  • Modify File and Directory Permissions
  • Modify File and Directory Ownership
  • Configure Special Permissions and Attributes
  • Troubleshoot Permissions Issues
Module 4: Managing Storage
  • Create Partitions
  • Manage Logical Volumes
  • Mount File Systems
  • Manage File Systems
  • Navigate the Linux Directory Structure
  • Troubleshoot Storage Issues
Module 5: Managing Files and Directories
  • Create and Edit Text Files
  • Search for Files
  • Perform Operations on Files and Directories
  • Process Text Files
  • Manipulate File Output
Module 6: Managing Kernel Modules
  • Explore the Linux Kernel
  • Install and Configure Kernel Modules
  • Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
  • Configure Linux Boot Components
  • Configure GRUB
Module 8: Managing System Components
  • Configure Localization Options
  • Configure GUIs
  • Manage Services
  • Troubleshoot Process Issues
  • Troubleshoot CPU and Memory Issues
Module 9: Managing Devices
  • Identify the Types of Linux
  • Configure Devices
  • Monitor Devices
  • Troubleshoot Hardware Issues
Module 10: Managing Networking
  • Identify TCP/IP Fundamentals
  • Identify Linux Server Roles
  • Connect to a Network
  • Configure DHCP and DNS Client Services
  • Configure Cloud and Virtualization Technologies
  • Troubleshoot Networking Issues
Module 11: Managing Packages and Software
  • Identify Package Managers
  • Manage RPM Packages with YUM
  • Manage Debian Packages with APT
  • Configure Repositories
  • Acquire Software
  • Build Software from Source Code
  • Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
  • Implement Cybersecurity Best Practices
  • Implement Identity and Access Management Methods
  • Configure SELinux or AppArmor
  • Configure Firewalls
  • Implement Logging Services
  • Back Up, Restore, and Verify Data
Module 13: Working with Bash Scripts
  • Customize the Bash Shell Environment
  • Identify Scripting and Programming Fundamentals
  • Write and Execute a Simple Bash Script
  • Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
  • Schedule Jobs
  • Implement Version Control Using Git
  • Identify Orchestration Concepts
Module 15: Installing Linux
  • Prepare for Linux Installation
  • Perform the Installation
Module 1: Threat and Vulnerability Management
  • Instructor Intro
  • About the Exam
  • Test Taking Tips and Techniques
  • Explain the importance of threat data and intelligence
  • Given a scenario, utilize threat intelligence to support organizational security
  • Given a scenario, perform vulnerability management activities Pt 1
  • Given a scenario, perform vulnerability management activities Pt 2
  • Given a scenario, analyze the output from common vulnerability assessment tools
  • Explain the threats and vulnerabilities associated with specialized technology
  • Explain the threats and vulnerabilities associated with operating in the Cloud
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
  • Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
  • Outline
  • Given a scenario, apply security solutions for infrastructure management Pt 1
  • Given a scenario, apply security solutions for infrastructure management Pt 2
  • Given a scenario, apply security solutions for infrastructure management Pt 3
  • Flashcards
  • Scatter
  • Explain software assurance best practices
  • Explain hardware assurance best practices
  • Learn
  • Speller
  • Workbook
Module 3: Security Operations and Monitoring
  • Given a scenario, analyze data as part of security monitoring activities Pt 1
  • Given a scenario, analyze data as part of security monitoring activities Pt 2
  • Given a scenario, analyze data as part of security monitoring activities Pt 3
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 1
  • Given a scenario, implement configuration changes to existing controls to improve security Pt 2
  • Explain the importance of proactive threat hunting
  • Compare and contrast automation concepts and technologies
Module 4: Incident Response
  • Explain the importance of the incident response process
  • Given a scenario, apply the appropriate the incident response procedure
  • Given an incident, analyze potential indicators of compromise
  • Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
  • Understand the importance of data privacy and protection
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
  • Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
  • Explain the importance of frameworks, policies, procedures, and controls Pt 1
  • Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
  • Recap
  • Review Questions
  • Before the Exam
Module 1: The Basics
  • The Basics
Module 2: Construction and Facility
  • Construction and Facility
Module 3: MSDS Sheets
  • MSDS Sheets
Module 4: OSHA in Healthcare
  • OSHA in Healthcare
Module 5: Other Risk Areas
  • Other Risk Areas
Module 1: HIPAA and Privacy
  • HIPAA and Privacy
  • Security, Safeguards, and Controls
  • Examples and Cases
Module 2: Fraud, Waste, and Abuse
  • Fraud, Waste, and Abuse
  • Case Examples and Law
Module 3: Compliance and Prevention
  • Compliance and Prevention
Module 1: Basic Protections
  • Basic Protections
Module 2: Sexual Harassment
  • Sexual Harassment
Module 3: Other Harassment
  • Other Harassment
Module 4: Laws and Cases
  • Laws
  • Cases
Module 5: Recognize and Prevention
  • Recognize and Prevention
Module 1: Understanding Cloud Computing Concepts
  • Course Intro
  • Understand Basic Cloud Concepts and Terms Pt 1
  • Understand Basic Cloud Concepts and Terms Pt 2
  • Understand Basic Cloud Concepts and Terms Activity
  • Identify Cloud Network and Cloud Storage Technologies
  • Identify Cloud Network and Cloud Storage Technologies Activity
  • Recognize Cloud Design Aspects
  • Recognize Cloud Design Aspects Activity
Module 2: Applying Cloud Business Principles
  • Relate Cloud Concepts to Business Principles
  • Relate Cloud Concepts to Business Principles Activity
  • Establish Cloud Vendor Relations
  • Establish Cloud Vendor Relations Activity
  • Distinguish the Financial Aspects of Engaging a Cloud Service Provider
  • Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity
  • Report Financial Expenditures
  • Report Financial Expenditures Activity
Module 3: Advising a Cloud Design and Migration
  • Relate Cloud Concepts to Cloud Design and Migration
  • Relate Cloud Concepts to Cloud Design and Migration Activity
  • Use Cloud Assessments
  • Use Cloud Assessments Activity
  • Manage Cloud Design
  • Manage Cloud Design Activity
  • Compare Cloud Migration Approaches
  • Compare Cloud Migration Approaches Activity
  • Identity Benefits and Solutions of Cloud Services
  • Identity Benefits and Solutions of Cloud Services Activity
Module 4: Operating in the Cloud
  • Relate Cloud Concepts to Technical Operations
  • Relate Cloud Concepts to Technical Operations Activity
  • Identify the Technical Aspects of Cloud Operations
  • Identify the Technical Aspects of Cloud Operations Activity
  • Understand DevOps in the Cloud
  • Understand DevOps in the Cloud Activity
  • Explain Cloud Security Concerns, Measures, and Concepts Part 1
  • Explain Cloud Security Concerns, Measures, and Concepts Part 2
  • Explain Cloud Security Concerns, Measures, and Concepts Activity
Module 5: Managing Cloud Governance
  • Relate Cloud Concepts to Governance
  • Relate Cloud Concepts to Governance Activity
  • Apply Risk Management Concepts
  • Apply Risk Management Concepts Activity
  • Understand Compliance and the Cloud
  • Understand Compliance and the Cloud Activity
  • Manage Policies and Procedures for Cloud Services
  • Manage Policies and Procedures for Cloud Services Activity
Module 6: Exam Information, Review and Summary
  • Exam Information
  • Exam Review Pt 1
  • Exam Review Pt 2
  • Exam Review Pt 3
  • Exam Review Pt 4
Module 7: Activities
  • Apply Risk Management Concepts Activity
  • Compare Cloud Migration Approaches Activity
  • Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity
  • Establish Cloud Vendor Relations Activity
  • Explain Cloud Security Concerns, Measures, and Concepts Activity
  • Identify Cloud Network and Cloud Storage Technologies Activity
  • Identify the Technical Aspects of Cloud Operations Activity
  • Identity Benefits and Solutions of Cloud Services Activity
  • Manage Cloud Design Activity
  • Manage Policies and Procedures for Cloud Services Activity
  • Recognize Cloud Design Aspects Activity
  • Relate Cloud Concepts to Business Principles Activity
  • Relate Cloud Concepts to Cloud Design and Migration Activity
  • Relate Cloud Concepts to Governance Activity
  • Relate Cloud Concepts to Technical Operations Activity
  • Report Financial Expenditures Activity
  • Understand Basic Cloud Concepts and Terms Activity
  • Understand Compliance and the Cloud Activity
  • Understand DevOps in the Cloud Activity
  • Use Cloud Assessments Activity
Module 8: Tools and Resources
  • AWS Tools and Resources
  • Azure Tools and Resources
  • GCP Tools and Resources
Module 1: Preparing to Deploy Cloud Solutions
  • Course Introduction
  • Instructor Intro
  • Describe Interaction of Cloud Components and Services
  • Activity Scenario Introduction
  • Describe Interaction of Cloud Components and Services Activity
  • Describe Interaction of Non-cloud Components and Services
  • Describe Interaction of Non-cloud Components and Services Activity
  • Evaluate Existing Components and Services for Cloud Deployment
  • Evaluate Existing Components and Services for Cloud Deployment Activity
  • Evaluate Automation and Orchestration Options
  • Evaluate Automation and Orchestration Options Activity
  • Prepare for Cloud Deployment
  • Prepare for Cloud Deployment Activity
Module 2: Deploying a Pilot Project
  • Manage Change in a Pilot Project
  • Manage Change in a Pilot Project Activity
  • Execute Cloud Deployment Workflow
  • Execute Cloud Deployment Workflow Activity
  • Complete Post-Deployment Configuration
  • Complete Post-Deployment Configuration Activity
Module 3: Testing Pilot Project Deployments
  • Identify Cloud Service Components for Testing
  • Identify Cloud Service Components for Testing Activity
  • Test for High Availability and Accessibility
  • Test for High Availability and Accessibility Activity
  • Perform Deployment Load Testing
  • Perform Deployment Load Testing Activity
  • Analyze Test Results
  • Analyze Test Results Activity
Module 4: Designing a Secure and Compliant Cloud Infrastructure
  • Design Cloud Infrastructure for Security
  • Design Cloud Infrastructure for Security Activity
  • Determine Organizational Compliance Needs
  • Determine Organizational Compliance Needs Activity
Module 5: Designing and Implementing a Secure Cloud Environment
  • Design Virtual Network for Cloud Deployment
  • Design Virtual Network for Cloud Deployment Activity
  • Determine Network Access Requirements
  • Determine Network Access Requirements Activity
  • Secure Networks for Cloud Interaction
  • Secure Networks for Cloud Interaction Activity
  • Manage Cloud Component Security
  • Implement Security Technologies
  • Implement Security Technologies Activity
Module 6: Planning Identity and Access Management for Cloud Deployments
  • Determine Identity Management and Authentication Technologies
  • Determine Identity Management and Authentication Technologies Activity
  • Plan Account Management Policies for the Network and Systems
  • Plan Account Management Policies for the Network and Systems Activity
  • Control Access to Cloud Objects
  • Control Access to Cloud Objects Activity
  • Provision Accounts
  • Provision Accounts Activity
Module 7: Determing CPU and Memory Sizing for Cloud Deployments
  • Determine CPU Size for Cloud Deployment
  • Determine CPU Size for Cloud Deployment Activity
  • Determine Memory Size for Cloud Deployment
Module 8: Determing Storage Requirements for Cloud Deployments
  • Determine Storage Technology Requirements
  • Determine Storage Technology Requirements Activity
  • Select Storage Options for Deployment
  • Select Storage Options for Deployment Activity
  • Determine Storage Access and Provisioning Requirements
  • Determine Storage Access and Provisioning Requirements Activity
  • Determine Storage Security Options
  • Determine Storage Security Options Activity
Module 9: Analyzing Workload Characteristics to Ensure Successful Migration
  • Determine the Type of Cloud Deployment to Perform
  • Determine the Type of Cloud Deployment to Perform Activity
  • Manage Virtual Machine and Container Migration
  • Manage Virtual Machine and Container Migration Activity
  • Manage Network, Storage, and Data Migration
  • Manage Network, Storage, and Data Migration Activity
Module 10: Maintaining Cloud Systems
  • Patch Cloud Systems
  • Patch Cloud Systems Activity
  • Design and Implement Automation and Orchestration for Maintenance
  • Design and Implement Automation and Orchestration for Maintenance Activity
Module 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures
  • Back Up and Restore Cloud Data
  • Back Up and Restore Cloud Data Activity
  • Implement Disaster Recovery Plans
  • Implement Disaster Recovery Plans Activity
  • Implement Business Continuity Plans
  • Implement Business Continuity Plans Activity
Module 12: Analyzing Cloud Systems for Performance
  • Monitor Cloud Systems to Measure Performance
  • Monitor Cloud Systems to Measure Performance Activity
  • Optimize Cloud Systems to Meet Performance Criteria
  • Optimize Cloud Systems to Meet Performance Criteria Activity
Module 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting
  • Monitor for Anomalies and Resource Needs
  • Monitor for Anomalies and Resource Needs Activity
  • Plan for Capacity
  • Plan for Capacity Activity
  • Create Reports on Cloud System Metrics
  • Create Reports on Cloud System Metrics Activity
Module 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues
  • Troubleshoot Deployment Issues
  • Troubleshoot Deployment Issues Activity
  • Troubleshoot Capacity Issues
  • Troubleshoot Capacity Issues Activity
  • Troubleshoot Automation and Orchestration Issues
  • Troubleshoot Automation and Orchestration Issues Activity
Module 15: Troubleshooting Connectivity Issues
  • Identify Connectivity Issues
  • Identify Connectivity Issues Activity
  • Troubleshoot Connectivity Issues
  • Troubleshoot Connectivity Issues Activity
Module 16: Troubleshooting Security Issues
  • Troubleshoot Identity and Access Issues
  • Troubleshoot Identity and Access Issues Activity
  • Troubleshoot Attacks
  • Troubleshoot Attacks Activity
  • Troubleshoot Other Security Issues
  • Troubleshoot Other Security Issues Activity
Module 17: Exam Information, Review, and Summary
  • Exam Information
  • Course Review
Module 18: Activities
  • Activity Scenario Introduction
  • Describe Interaction of Cloud Components and Services Activity
  • Describe Interaction of Non-cloud Components and Services Activity
  • Evaluate Existing Components and Services for Cloud Deployment Activity
  • Evaluate Automation and Orchestration Options Activity
  • Prepare for Cloud Deployment Activity
  • Manage Change in a Pilot Project Activity
  • Execute Cloud Deployment Workflow Activity
  • Complete Post-Deployment Configuration Activity
  • Identify Cloud Service Components for Testing Activity
  • Test for High Availability and Accessibility Activity
  • Perform Deployment Load Testing Activity
  • Analyze Test Results Activity
  • Design Cloud Infrastructure for Security Activity
  • Determine Organizational Compliance Needs Activity
  • Design Virtual Network for Cloud Deployment Activity
  • Determine Network Access Requirements Activity
  • Secure Networks for Cloud Interaction Activity
  • Implement Security Technologies Activity
  • Determine Identity Management and Authentication Technologies Activity
  • Plan Account Management Policies for the Network and Systems Activity
  • Control Access to Cloud Objects Activity
  • Provision Accounts Activity
  • Determine CPU Size for Cloud Deployment Activity
  • Determine Storage Technology Requirements Activity
  • Select Storage Options for Deployment Activity
  • Determine Storage Access and Provisioning Requirements Activity
  • Determine Storage Security Options Activity
  • Determine the Type of Cloud Deployment to Perform Activity
  • Manage Virtual Machine and Container Migration Activity
  • Manage Network, Storage, and Data Migration Activity
  • Patch Cloud Systems Activity
  • Design and Implement Automation and Orchestration for Maintenance Activity
  • Back Up and Restore Cloud Data Activity
  • Implement Disaster Recovery Plans Activity
  • Implement Business Continuity Plans Activity
  • Monitor Cloud Systems to Measure Performance Activity
  • Optimize Cloud Systems to Meet Performance Criteria Activity
  • Monitor for Anomalies and Resource Needs Activity
  • Plan for Capacity Activity
  • Create Reports on Cloud System Metrics Activity
  • Troubleshoot Deployment Issues Activity
  • Troubleshoot Capacity Issues Activity
  • Troubleshoot Automation and Orchestration Issues Activity
  • Identify Connectivity Issues Activity
  • Troubleshoot Connectivity Issues Activity
  • Troubleshoot Identity and Access Issues Activity
  • Troubleshoot Attacks Activity
  • Troubleshoot Other Security Issues Activity
Module 1: Risk Management Fundamentals
  • Instructor Intro
  • Course Intro
  • Risk Management Fundamentals Pt 1
  • Risk Management Fundamentals Pt 2
Module 2: Test Requirements
  • Test Requirements
Module 3: Test Domains
  • Test Domains Pt 1
  • Test Domains Pt 2
Module 4: Risk Strategy and Planning
  • Risk Strategy and Planning Pt 1
  • Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
  • Stakeholder Engagement Pt 1
  • Stakeholder Engagement Pt 2
  • Stakeholder Engagement Pt 3
  • Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
  • Risk Process Facilitation Pt1
  • Risk Process Facilitation Pt2
  • Risk Process Facilitation Pt3
Module 7: Risk Monitoring and Reporting
  • Risk Monitoring and Reporting Pt 1
  • Risk Monitoring and Reporting Pt 2
  • Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
  • Specialized Risk Analyses Pt 1
  • Specialized Risk Analyses Pt 2
  • Specialized Risk Analyses Pt 3
Module 9: RMP Recap
  • RMP Recap
Module 10: RMP Review Questions
  • RMP Review Questions Pt 1
  • RMP Review Questions Pt 2
  • RMP Review Questions Pt 3
  • RMP Review Questions Pt 4
  • RMP Review Questions Pt 5
Module 1: Course Orientation, Internet & Web
  • Instructor Intro
  • Course Intro
  • Internet and the Web
Module 2: HTML Basics
  • HTML Overview and Your First Webpage
  • Create a Template
  • Heading Element
  • Paragraph Element
  • Line Break Elemen
  • Blockquote Element
  • Phrase Elements
  • Ordered List and Unordered Lists
  • Description List
  • Special Characters
  • Structural Elements
  • Anchor Elements
  • HTML Validation
Module 3: Color & Text, CSS
  • Overview of Cascading Style Sheets
  • Using Color on Web Pages
  • Inline CSS with the Style Attribute
  • Embedded CSS with the Style Element
  • Configuring Text with CSS
  • CSS Class, ID, and Descendant Selectors
  • Span Element
  • Using External Style Sheets
  • Center HTML Elements with CSS
  • The Cascade
  • CSS Validation
Module 4: Visual Elements & Graphics
  • Visual Elements and Graphics
  • Types of Graphics
  • Image Element
  • Image Hyperlinks
  • HTML5 Visual Elements
  • HTML5 Visual Elements Continued
  • Meter and Progress Element
  • Background Images
  • More About Images
  • Sources and Guidelines for Graphics
  • CSS3 Visual Effects Pt 1
  • CSS3 Visual Effects Pt 2
Module 5: Web Design
  • Web Design
Module 6: Page Layout
  • Page Layout Pt 1
  • Page Layout Pt 2
  • Hyperlinks in an Unordered List
  • Practice with CSS Two-column Layout
  • Header Text Image Replacement
  • Practice with an Image Gallery
  • Positioning with CSS
  • CSS Debugging Techniques
  • More HTML5 Structured Elements
Module 7: Links, Layout, & Mobile
  • Links, Layout, & Mobile
  • Fragment Identifiers
  • The Target Attribute
  • CSS Sprites
  • Three-column CSS Page Layout Pt 1
  • Three-column CSS Page Layout Pt 2
  • Three-column CSS Page Layout Pt 3
  • Three-column CSS Page Layout Pt 4
  • Three-column CSS Page Layout Pt 5
  • Three-column CSS Page Layout Pt 6
  • CSS Styling for Print
  • Designing for the Mobile Web
  • Viewport Meta Tag & CSS Media Queries
  • Responsive Images
  • Testing Mobile Display
  • Flexible Box Layout
  • CSS Grid Layout
Module 8: Tables
  • Tables Pt 1
  • Tables Pt 2
Module 9: Forms
  • Overview of Forms
  • Input Element Form Controls Pt 1
  • Input Element Form Controls Pt 2
  • HTML5 Form Controls
Module 10: Web Development
  • Web Development Pt 1
  • Web Development Pt 2
Module 11: Web Multimedia and Interactvity
  • Web Multimedia and Interactivity
  • Getting Started with Audio and Video
  • HTML5 Audio and Video Elements
  • CSS3 and Interactivity Pt 1
  • CSS3 and Interactivity Pt 2
  • CSS3 Transform Property and Transition Property Pt 1
  • CSS3 Transform Property and Transition Property Pt 2
  • CSS3 Transform Property and Transition Property Pt 3
  • HTML5 Details and Summary Elements
  • Java, JavaScript, Ajax, and jQuery Programming Languages
  • HTML5 APIs
Module 12: JavaScript and jQuery
  • JavaScript and jQuery
  • Debugging
  • Document Object Model
  • Events and Event Handlers
  • Variables
  • Programming Concepts
  • Form Handling
  • jQuery
  • jQuery Selectors and jQuery Methods
  • jQuery Image Gallery Pt 1
  • jQuery Image Gallery Pt 2
  • jQuery Plugins Pt 1
  • jQuery Plugins Pt 2
Module 13: Course Summary
  • Course Summary
Cloud Concepts, Architecture and Design
  • Course Intro
  • Cloud Concepts, Architecture and Design – Part 1
  • Cloud Concepts, Architecture and Design – Part 2
  • Cloud Concepts, Architecture and Design – Part 3
  • Cloud Concepts, Architecture and Design – Part 4
  • Cloud Concepts, Architecture and Design – Part 5
  • Cloud Concepts, Architecture and Design – Part 6
  • Cloud Concepts, Architecture and Design – Part 7
  • Cloud Concepts, Architecture and Design – Part 8
  • Cloud Concepts, Architecture and Design – Part 9
Legal, Risk and Compliance
  • Legal, Risk and Compliance Part 1
  • Legal, Risk and Compliance Part 2
  • Legal, Risk and Compliance Part 3
  • Legal, Risk and Compliance Part 4
  • Legal, Risk and Compliance Part 5
  • Legal, Risk and Compliance Part 6
  • Legal, Risk and Compliance Part 7
Cloud Data Security
  • Cloud Data Security – Part 1
  • Cloud Data Security – Part 2
  • Cloud Data Security – Part 3
  • Cloud Data Security – Part 4
  • Cloud Data Security – Part 5
  • Cloud Data Security – Part 6
  • Cloud Data Security – Part 7
Cloud Platform and Infrastructure Security
  • Cloud Platform and Infrastructure Security – Part 1
  • Cloud Platform and Infrastructure Security – Part 2
  • Cloud Platform and Infrastructure Security – Part 3
  • Cloud Platform and Infrastructure Security – Part 4
  • Cloud Platform and Infrastructure Security – Part 5
  • Cloud Platform and Infrastructure Security – Part 6
  • Cloud Platform and Infrastructure Security – Part 7
  • Cloud Platform and Infrastructure Security – Part 8
Cloud Application Security
  • Cloud Application Security – Part 1
  • Cloud Application Security – Part 2
  • Cloud Application Security – Part 3
  • Cloud Application Security – Part 4
  • Cloud Application Security – Part 5
  • Cloud Application Security – Part 6
  • Cloud Application Security – Part 7
  • Cloud Application Security – Part 8
  • Cloud Application Security – Part 9
Cloud Security Operations
  • Cloud Security Operations – Part 1
  • Cloud Security Operations – Part 2
  • Cloud Security Operations – Part 3
  • Cloud Security Operations – Part 4
  • Cloud Security Operations – Part 5
  • Cloud Security Operations – Part 6
  • Cloud Security Operations – Part 7
  • Cloud Security Operations – Part 8
  • Cloud Security Operations – Part 9
  • Cloud Security Operations – Part 10
  • Cloud Security Operations – Part 11
  • Course Outro
Module 1: Exploring the Functions of Networking
  • Course Introduction
  • Instructor Introduction
  • Exploring the Functions of Networking Pt 1
  • Exploring the Functions of Networking Pt 2
Module 2: Introducing the Host-To-Host Communications Model
  • Introducing the Host-To-Host Communications Model Pt 1
  • Introducing the Host-To-Host Communications Model Pt 2
Module 3: Introducing LANs
  • Introducing LANs
  • Get Started with CLI Demo Pt 1
  • Get Started with CLI Pt Demo 2
  • Adding Descriptions to Interfaces Demo
  • Configure Gateway on a Switch Demo
  • Visualize Interfaces and Statistics Demo
  • Show Version Command Demo
  • CDP Demo
Module 4: Exploring the TCP/IP Link Layer
  • Exploring the TCP-IP Link Layer Pt 1
  • Exploring the TCP-IP Link Layer Pt 2
Module 5: Subnetting
  • Subnetting Pt 1
  • Subnetting Pt 2
  • Subnetting Pt 3
  • Subnetting Pt 4
  • Subnetting Pt 5
  • Subnetting Pt 6
Module 6: Explaining the TCP/IP Transport Layer and Application Layer
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 1
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 2
  • Explaining the TCP-IP Transport Layer and Application Layer Pt 3
Module 7: Exploring the Functions of Routing
  • Exploring the Functions of Routing Pt 1
  • Exploring the Functions of Routing Pt 2
  • Exploring the Functions of Routing Pt 3
  • Configuring RIP Demo
  • EIGRP Demo Pt 1
  • EIGRP Demo Pt 2
Module 8: Exploring the Packet Delivery Process
  • Exploring the Packet Delivery Process
Module 9: Troubleshooting a Simple Network
  • Troubleshooting a Simple Network
Module 10: Introducing Basic IPv6
  • Introducing Basic IPv6 Pt 1
  • Introducing Basic IPv6 Pt 2
  • Introducing Basic IPv6 Pt 3
  • Introducing Basic IPv6 Pt 4
  • Introducing Basic IPv6 Pt 5
  • Introducing Basic IPv6 Pt 6
  • Introducing Basic IPv6 Pt 7
  • Introducing Basic IPv6 Pt 8
  • IPV6 Basic Configuration and SLAAC Demo Pt 1
  • IPV6 Basic Configuration and SLAAC Demo Pt 2
  • IPV6 Routing Demo Pt 1
  • IPV6 Routing Demo Pt 2
  • IPV6 Static Routes Demo
Module 11: Configuring Static Routing
  • Configuring Static Routing
  • Static Routes Demo
Module 12: Implementing VLANs and Trunks
  • Implementing VLANs and Trunks Pt 1
  • Implementing VLANs and Trunks Pt 2
  • Implementing VLANs and Trunks Pt 3
  • Implementing VLANs and Trunks Pt 4
  • Spanning-tree Protocol Demo Pt 1
  • Spanning-tree Protocol Demo Pt 2
  • Spanning-tree Protocol Demo Pt 3
Module 13: Routing Between VLANs
  • Routing Between VLANs
  • Inter VLAN Routing Demo
Module 14: Introducing OSPF
  • Introducing OSPF Pt 1
  • Introducing OSPF Pt 2
  • Introducing OSPF Pt 3
  • Introducing OSPF Pt 4
  • OSPF Single Area Demo Pt 1
  • OSPF Single Area Demo Pt 2
  • OSPF Multiple Area Demo Pt 1
  • OSPF Multiple Area Demo Pt 2
Module 15: Building Redundant Switched Topologies
  • Building Redundant Switched Topologies Pt 1
  • Building Redundant Switched Topologies Pt 2
Module 16: Improving Redundant Switched Topologies with EtherChannel
  • Improving Redundant Switched Topologies with Ether Channel Pt 1
  • Improving Redundant Switched Topologies with Ether Channel Pt 2
  • Configuring Ether Channel Demo
Module 17: Exploring Layer 3 Redundancy
  • Exploring Layer 3 Redundancy
Module 18: Introducing WAN Technologies
  • Introducing WAN Technologies Pt 1
  • Introducing WAN Technologies Pt 2
  • Introducing WAN Technologies Pt 3
  • Introducing WAN Technologies Pt 4
  • Introducing WAN Technologies Pt 5
  • Introducing WAN Technologies Pt 6
Module 19: Explaining Basics of ACL
  • Explaining Basics of ACL Pt 1
  • Explaining Basics of ACL Pt 2
  • Explaining Basics of ACL Pt 3
Module 20: Enabling Internet Connectivity
  • Enabling Internet Connectivity
  • DHCP Demo
  • Static NAT Demo
  • PAT Using Specific IP Demo
  • PAT Using IP of Interface Demo
Module 21: Introducing QoS
  • Introducing QoS Pt 1
  • Introducing QoS Pt 2
  • Introducing QoS Pt 3
  • Introducing QoS Pt 4
  • Introducing QoS Pt 5
Module 22: Introducing Architectures and Virtualization
  • Introducing Architectures and Virtualization Pt 1
  • Introducing Architectures and Virtualization Pt 2
  • Introducing Architectures and Virtualization Pt 3
  • Introducing Architectures and Virtualization Pt 4
Module 23: Introducing System Monitoring
  • Introducing System Monitoring Pt 1
  • Introducing System Monitoring Pt 2
  • Introducing System Monitoring Pt 3
Module 24: Managing Cisco Devices
  • Managing Cisco Devices Pt 1
  • Managing Cisco Devices Pt 2
  • NTP Demo
  • Syslog Demo
Module 25: Examining the Security Threat Landscape
  • Examining the Security Threat Landscape Pt 1
  • Examining the Security Threat Landscape Pt 2
Module 26: Implementing Threat Defense Technologies
  • Implementing Threat Defense Technologies Pt 1
  • Implementing Threat Defense Technologies Pt 2
  • Implementing Threat Defense Technologies Pt 3
  • Implementing Threat Defense Technologies Pt 4
  • Implementing Threat Defense Technologies Pt 5
  • Authentication Protocols Demo Pt 1
  • Authentication Protocols Demo Pt 2
  • Device Hardening Demo Pt 1
  • Device Hardening Demo Pt 2
  • Device Hardening Demo Pt 3
  • Port Security Demo
Module 27: Exam Preparation
  • Exam Prep Tips
Module 28: Practice Demos
  • Get Started with CLI Demo Pt 1
  • Get Started with CLI Pt Demo 2
  • Adding Descriptions to Interfaces Demo
  • Configure Gateway on a Switch Demo
  • Visualize Interfaces and Statistics Demo
  • Show Version Command Demo
  • CDP Demo
  • Static Routes Demo
  • DHCP Demo
  • Static NAT Demo
  • PAT Using Specific IP Demo
  • PAT Using IP of Interface Demo
  • Configuring RIP Demo
  • Configuring Ether Channel Demo
  • Inter VLAN Routing Demo
  • Spanning-tree Protocol Demo Pt 1
  • Spanning-tree Protocol Demo Pt 2
  • Spanning-tree Protocol Demo Pt 3
  • EIGRP Demo Pt 1
  • EIGRP Demo Pt 2
  • Authentication Protocols Demo Pt 1
  • Authentication Protocols Demo Pt 2
  • NTP Demo
  • Syslog Demo
  • Device Hardening Demo Pt 1
  • Device Hardening Demo Pt 2
  • Device Hardening Demo Pt 3
  • Port Security Demo
  • OSPF Single Area Demo Pt 1
  • OSPF Single Area Demo Pt 2
  • OSPF Multiple Area Demo Pt 1
  • OSPF Multiple Area Demo Pt 2
  • IPV6 Basic Configuration and SLAAC Demo Pt 1
  • IPV6 Basic Configuration and SLAAC Demo Pt 2
  • IPV6 Routing Demo Pt 1
  • IPV6 Routing Demo Pt 2
  • IPV6 Static Routes Demo
Module 1: Setup and Maintenance
  • Module 1 Notes
  • Course Introduction
  • Knowing Which Account is Right for You
  • Getting Started
  • User Setup
  • Access Rights
  • User Setup Completion
  • Adding Employees to Payroll
  • Inviting Your Accountant
  • Dashboard and 3 Ways to Navigate QBO
  • Commonly Used Forms
  • Module 1 Summary
Module 2: List Management
  • Module 2 Notes
  • Defining Lists
  • Importing Lists
  • Employees vs 1099
  • Adding and Removing Entries
  • Updating Entries
  • Editing and Managing List Elements Demo
  • Merging Items (entries)
  • Form Requirements
  • Module 2 Summary
Module 3: Sales (Money-In)
  • Module 3 Notes
  • Product and Service Setup
  • Customer Setup Demo
  • Invoicing Workflows
  • Recording Sales
  • Customer Statements
  • Tracking Audit History Demo
  • Sales Reciept Workflow
  • Undeposited Funds Account
  • Accounts Receivable Impact
  • Impact of Connecting Your Bank Account to QBO
  • Billable Expense Invoicing
  • Recording a Customer Credit
  • Delayed Charges
  • Estimates
  • Module 3 Summary
Module 4: Purchased (Money-Out)
  • Module 4 Notes
  • Product and Service Setup on Purchase Forms
  • Vendor Setup
  • Purchase Order Transactions
  • Entering and Paying Bills
  • Recording Checks
  • Recording Credit and Debit Card Transactions
  • Recording EFTs, Online Payments, and Wire Transfers
  • Recording Vendor Credits
  • Voiding vs Deleting Checks
  • Vendor Page and Report Insights
  • Module 4 Summary
Module 5: Accounting
  • Module 5 Notes
  • Basic financial statements (Balance sheet, income statement, and statement of cash flows)
  • Financial Statements Expanded
  • Cash and Accrual Accounting Differences
  • Difference Between Cash and Accrual Reporting
  • Setting a Closing Date
  • Balancing Your Books aka Reconciling Demo
  • Journal Entries
  • Audit Log Insights
  • Project Profitability Demo
  • Module 5 Summary
Module 6: Reports
  • Module 6 Notes
  • Customized Reports
  • Commonly Used Reports Demo
  • Setup Automatic Report Emails
  • Collapse and Expand Report Function
  • Exporting and Importing Reports
  • Module 6 Summary
Module 7: Customizations and Time Savers
  • Module 7 Notes
  • Tracking Income and Expenses for Multiple Locations
  • Organizing your Chart of Accounts
  • Custom Fields on Invoices
  • Recurring Transactions
  • Customizing a Sales Form
  • Keyboard Shortcuts
  • QBO Mobile App Preview
  • Connecting Third Party Apps to QBO
  • Module 7 Summary
Module 8: Extra
  • Module 8 Notes
  • Common Mistakes QBO Users Make
  • Final Note on Bookkeeping Best Practices
  • Why QBO is Awesome
  • Course Outro
  • Defining Terms and Sample Quiz Questions
Module 1: Social Media Marketing
  • Course Intro
  • How to Utilize Social Media
  • Client Briefs
  • Target Markets
  • Personas Pt 1
  • Personas Pt 2
  • Personas Pt 3
  • Competitive Analysis Pt 1
  • Competitive Analysis Pt 2
  • Competitive Analysis Pt 3
Module 2: Social Media Marketing
  • What is the Right Content for You
  • Images Pt 1
  • Images Pt 2
  • Images Pt 3
  • Images Pt 4
  • Images Pt 5
  • Video Pt 1
  • Video Pt 2
  • Video Pt 3
  • Video Pt 4
  • Live Videos and Engagement Pt 1
  • Live Videos and Engagement Pt 2
Module 3: Social Media Marketing
  • What are Analytics and How to Use Them
  • Free Analytic Tools Available
  • Paid Services to Consider Pt 1
  • Paid Services to Consider Pt 2
  • Finding the Right Hashtags
  • What is Automation
  • How to Best Use Automation
  • Course Outro
Module 1: Online Learning
  • Module 1 Notes
  • Course Introduction
  • History of Online Learning
  • What is Online Learning and Different Types
  • Introduction to Synchronous and Asynchronous Learning
  • Introduction to Bringing Your Class Online
  • Synchronous and Asynchronous Formats
  • Hybrid and Enhanced Formats
  • Tips for Any Format Part 1
  • Tips for Any Format Part 2
  • Community of Inquiry Learning Model
  • Popular Learning Management Systems
  • LMS Discussion Forums
  • LMS Announcements
  • LMS Content Management and Uploading
  • LMS Grading and Feedback
  • LMS Integration with Outside Applications
  • Moving to Online Teaching
  • Segmentation within Online Courses
  • Time Limitations in Traditional Teaching vs Online
  • Discussions and Engagement In-person vs Online
  • Changes and Variances in Online Teaching vs Traditional Teaching
  • Attendance in Online Courses
  • Deadlines in Online Courses
  • Feedback Online
  • Tips and Best Practices for Online Teaching
Module 2: Online Learning
  • Module 2 Notes
  • Creating Structure with Modules
  • Example of Module Course Structure within Canvas
  • Types of Resources
  • Zoom
  • Flipgrid
  • Slack
  • Ziteboard
  • Screencastify
  • Microsoft Teams
  • Google Classroom
  • Otter
  • edpuzzle
  • Best Tips and Practices for Lecturing Online Pt 1
  • Best Tips and Practices for Lecturing Online Pt 2
  • Best Tips and Practices for Grading Online Pt 1
  • Best Tips and Practices for Grading Online Pt 2
  • Best Tips and Practices for Online Office Hours and Feedback
  • Best Tips and Practices for Online Testing and Study Guides Pt 1
  • Best Tips and Practices for Online Testing and Study Guides Pt 2
  • Course Outro
Module 1: Getting Started
  • 1.1 Instructor Introduction
  • 1.2 Course Introduction
Module 2: Getting to Know Adobe Audition
  • 2.1 Setting Up Your Workspace and Using Shortcuts
Module 3: The Interface
  • 3.1 Setting Up and Adjusting Your Workspace
  • 3.3 Navigating the Media Browser
  • 3.4 Create a Short Cut to Media and Basic Dive into the Editor Panel
Module 4: Waveform Editing
  • 4.1 Opening Audio and Video Files
  • 4.2 Making a Basic Adjustment in the HUD
  • 4.3 Skipping and Deleting Unwanted Portions of Audio
  • 4.4 Quickly Insert Silence into an Audio Track
  • 4.5 Using the Zero Crossing Tool to Remove Pops in Audio
  • 4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards
  • 4.7 Merge Sections of Audio with Mix Paste
  • 4.8 Create a Loop
  • 4.9 Add an Audio Fade
Module 5: Effects
  • 5.1 Working With Effects
  • 5.2 Gain Staging
  • 5.3 Applying the Effect
  • 5.4 Amplitude and Compression
  • 5.5 Delay and Echo Effects
  • 5.6 Filter and EQ Effects
  • 5.7 Modulation Effects
  • 5.8 Reverb Effects
  • 5.9 Special Effects
  • 5.10 Stereo Imagery Effects
  • 5.11 Time and Pitch Effects
  • 5.12 Audio Plugin Manager and Effects Menu vs Effects Rack
  • 5.13 Invert, Reverse, Silence and Generate Effects
  • 5.14 Match Loudness and Additional Effects
  • 5.15 Create Effect Presets and Favorites
Module 6: Audio Restoration
  • 6.1 Hiss Reduction
  • 6.2 Crackle, Pop and Click Reduction
  • 6.3 Broadband Noise Reduction
  • 6.4 Hum Reduction
  • 6.5 Removing Artifacts Manually
  • 6.6 Automated Sound Removal
Module 7: Mastering
  • 7.1 Parametric Equalizer and Equalization
  • 7.2 Multi Band Compressor and Dynamic Processing
  • 7.3 Reverb and Ambience
  • 7.4 Stereo Imaging
  • 7.5 Diagnostic Tools and Metering
Module 8: Sound Design
  • 8.1 Generate Noise and Tones
  • 8.2 Generate Speech Based on Text
  • 8.3 Use a Sound File to Create Various Sound Effects Pt 1
  • 8.4 Use a Sound File to Create Various Sound Effects Pt 2
  • 8.5 Extracting Frequency Bands with the Frequency Band Splitter
Module 9: Creating and Recording Files
  • 9.1 Create a Project and Record Into the Waveform Editor
  • 9.2 Recording Into the MultiTrack Editor
  • 9.3 Check Remaining Free Space for Recording on Hard Drive
  • 9.4 Dragging Files Into Audition Directly From a Computer
  • 9.5 Import Tracks from a CD
Module 10: Multitrack Sessions
  • 10.1 Create a Multitrack session and Template
  • 10.2 Multitrack and Waveform Editor Integration
  • 10.3 Change Track Colors and Tracks Panel
  • 10.4 Track Controls and Creating Busses
  • 10.5 Channel Mapping in the Multitrack Editor
  • 10.6 Multitrack Editor Effects Rack
Module 11: Multitrack Session Editing
  • 11.1 Create a Session, Add Clips and Adjust Timing
  • 11.2 Mix Down Session Into a New Audio Track
  • 11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time
  • 11.4 Clip Editing Techniques and Effects
Module 12: Additional Features and Summary
  • 12.1 Advanced Features to Consider and Conclusion
Module 1: Getting Started
  • 1.1 Course Introduction
  • 1.2 Keyboard Shortcuts
  • 1.3 Keyboard Tips
  • 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
  • Practice Files 1
  • Practice Files 2
  • 2.1 General Interface and Starting a Project
  • 2.2 Basic Title Animation Using Keyframes
  • 2.3 Keyframe Interpolation and Keyframe Assistan
  • 2.4 Renaming a Composition
  • 2.5 Soloing a Layer for Individual Edits
  • 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
  • 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
  • Practice Files 3
  • 3.1 Importing Files from Bridge and Creating a New Composition
  • 3.2 Horizontal Type Tool and Guides
  • 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
  • Practice Files 4
  • 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
  • 4.2 Preview and Apply Text Animation Presets and Use Keyframes
  • 4.3 Animate Layers Using Parenting
  • 4.4 Editing and Animating Imported Photoshop Text
  • 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
  • Practice Files 5
  • 5.1 Create and Customize a Shape with Shape Tool
  • 5.2 Self Animating Shape with a Wiggle Path (green marker)
  • 5.3 Create and Customize a Shape with Pen Tool
  • 5.4 Snap Layers
  • 5.5 Animating Shape Layers with Path Operations
  • 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
  • Practice Files 6
  • 6.1 Animate Multiple Layers Using Parenting
  • 6.2 Precomposing Layers
  • 6.3 Keyframing a Motion Path
  • 6.4 Animating a Character to Create Movement
  • 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
  • Practice Files 7
  • 7.1 Animating Change in Light
  • 7.2 Animating Birds Flying with a Track Mat
  • 7.3 Animating Shadows and Using Corner Pin
  • 7.4 Adding a Lens Flare Effect
  • 7.5 Render Composition and Retime
  • 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
  • Practice Files 8
  • 8.1 Setup a Basic Mask
  • 8.2 Refine and Apply Mask
  • 8.3 Creating a Reflection with a Mask and Blending Modes
  • 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
  • Practice Files 9
  • 9.1 Puppet Position Pen Tool
  • 9.2 Starch Pins
  • 9.3 Manually Animate with Puppet Tool
  • 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
  • Practice Files 10
  • 10.1 Extract Foreground Object from Background and Create a Mat
  • 10.2 Touch Up a Mat with the Refine Edge Tool
  • 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
  • Practice Files 11
  • 11.1 Set up Composition and Use Levels to Start Balancing the Color
  • 11.2 Basic Color Grading with Lumetri Color Effects
  • 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
  • 11.4 Use an Adjustment Layer to Create a Global Color Effect
  • 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
  • Practice Files 12.1
  • Practice Files 12.2
  • Practice Files 12.3
  • Practice Files 12.4
  • 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
  • 12.2 Using Adjustment Layers to Apply a Specific Effect
  • 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
  • 12.4 Create Checkboxes to Toggle Visibility of a Background Image
  • 12.5 Protect Portions of a Project from Time Stretching and Export Template
Adobe XD: Module 1
  • Instructor Into
  • What is XD
  • UI and UX Design
  • Prototype Forms and Wireframes
  • Starting a New Design in XD
  • Assets and Character Styles
Adobe XD: Module 2
  • Importing Content
  • Responsive Resize and Changing Formats
  • Adding Interactivity
  • Animating Elements
  • Sharing and Exporting
Adobe Spark: Module 1
  • Instructor Intro
  • Course Intro
  • Web Based vs Mobile Device
  • How to Access Spark
  • Branding in Spark
Adobe Spark: Module 2
  • Using Spark Post
  • Uploading Content from Post for Exporting
  • Using Spark Video
  • Exporting Finished Videos
  • Using Spark Page
  • Putting Spark Pages on the Web
Adobe Premiere Rush: Module 1
  • Instructor Intro
  • Course Intro
  • How Does Rush Differ
  • Starting a New Project
  • Video Resolution and Creating Content
  • Finding and Importing Content
  • Timeline Controls
  • Importing Audio
Adobe Premiere Rush: Module 2
  • Gernal Editing
  • Advanced Editing
  • Color Grading
  • Adding Titles
  • Principles of Typography in Video
  • Fixing Audio
  • Video and Audio Transitions
  • Exporting Finished Projects
Adobe Dreamweaver: Module 1
  • Instructor Intro
  • Course Intro
  • Getting Images Ready for the Web
  • Setting Up Your Workspace
  • Creating a New Site
Adobe Dreamweaver: Module 2
  • Building Your First Web Pages pt.1
  • Building Your First Web Pages pt.2
  • Linking Your Web Pages
  • Adding Colors and Style
  • Creating a Page Visually in Photoshop
  • Importing Into Dreamweaver
  • Export Site to Web
Module 1 – Adobe Stock
  • Instructor Info
  • Course Info
  • Interface and Features
  • Images
  • Videos and Licensing
  • Templaes and Premium
  • Contributing Content
  • Best Practices when Contributing
Module 1 – Adobe Portfolio Website Editor
  • Instructor Introduction
  • Getting Started With Adobe Portfolio
  • Creating A Website To Showcase Your Work
  • Importing And Syncing From Adobe Lightroom
  • Customizing Your Landing Page
Module 1 – Adobe Fonts
  • Instructor Intro
  • Course Intro
  • Navigating the Interface
  • Activating and Deactivating Fonts
  • Font Packs
  • Type Kit Web Fonts
  • Course Conclusion
Get Creative With Adobe Behance
  • Instructor Introduction
  • Adobe Behance Course Introduction
  • Adobe Behance – A Creative, Collaborative Application
  • Using The Profile page
  • Creating A Project
  • Exploring The Jobs Section
Module 1: Introduction to AWS Basics
  • 1.1 Instructor Intro
  • 1.2 AWS Basic Intro
  • 1.3 What Is AWS
  • 1.4 Advantages of cloud computing
  • 1.5 Types of cloud computing
Module 2: AWS Web Services and Cloud Platform Services
  • 2.1 Console
  • 2.2 CLI
  • 2.3 Compute/EC2
  • 2.4 Database-RDS
  • 2.5 Networking and content delivery
  • 2.6 Analytics
  • 2.7 SQS-SNS
  • 2.8 Workmail
  • 2.9 SES
  • 2.10 Systems manager
  • 2.11 CloudTrail
  • 2.12 Route53
  • 2.13 Elastic Load Balancing (ELB)
  • 2.14 Certificate manager
  • 2.15 Directory service
  • 2.16 Amazon Simple Storage Service (S3)
  • 2.17 Identity and Access Management (IAM)
Module 3: AWS Basic Summary
  • 3.1 AWS Basic Summary
Module 4: Introduction to AWS Deep Dive
  • 4.1 AWS Deep Dive Intro
Module 5: AWS Management of Services and Features Deep Dive
  • 5.1 VPC and Endpoint services pt 1
  • 5.1 VPC and Endpoint services pt 2
  • 5.2 DNS (Route 53)
  • 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 1
  • 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 2
  • 5.4 Compute-EC2 Stand alone and SA with AR pt 1
  • 5.4 Compute-EC2 Stand alone and SA with AR pt 2
  • 5.5 ASG and Suspended ASG processes pt 1
  • 5.5 ASG and Suspended ASG processes pt 2
  • 5.6 Code deploy pt 1
  • 5.6 Code deploy pt 2
  • 5.7 Backups-Recovery of EC2 pt 1
  • 5.7 Backups-Recovery of EC2 pt 2
  • 5.7 Backups-Recovery of EC2 pt 3
  • 5.8 RDS pt 1
  • 5.8 RDS pt 2
  • 5.8 RDS pt 3
  • 5.9 Directory service
  • 5.10 Identity and Access Management (IAM) pt 1
  • 5.10 Identity and Access Management (IAM) pt 2
  • 5.11 Amazon Simple Storage Service (S3)
  • 5.12 SES
  • 5.13 Cloudwatch
  • 5.14 Cloudtrail
Module 6: AWS Deep Dive Summary
  • 6.1 AWS Deep Dive Summary
Module 1
  • 1.1 Instructor Bio
  • 1.2 Course Intro
Module 2
  • 2.1 Creating a New Document
  • 2.2 Importing Images and Understanding Links
  • 2.3 Basic Tools and Navigating the Interface
  • 2.4 Properties Panel
  • 2.5 Creating Your Own Graphics within InDesign-
  • 2.6 Working with Layers
Module 3
  • 3.1 Color Theory
  • 3.2 Adding and Altering Fills, Strokes, Colors and Gradients
Module 4
  • 4.1 Pages Panel
  • 4.2 Master Pages
Module 5
  • 5.1 Typography Terms and Definitions
  • 5.2 Creating Text + Character and Paragraph Formatting
  • 5.3 Character and Paragraph Styles
  • 5.4 Wrapping Text Around an Image
  • 5.5 Working with Tables
Module 6
  • 6.1 Saving, Preflight and Packaging Your Document
  • 6.2 Exporting a PDF
Module 7
  • 7.1 Principles of Design
Module 8
  • 8.1 Letterheads
  • 8.2 Business Card
  • 8.3 Brochure
  • 8.4 Multi-Page Binded Document
  • 8.5 Print Booklet
Module 9
  • 9.1 Creating a Template in InDesign
  • 9.2 Using Step and Repeat
  • 9.3 Grouping Objects
  • 9.4 Island Spread & Page Tool-
  • 9.5 Scripts
  • 9.6 Object Styles
  • 9.7 Content Collector & Content Placer
  • 9.8 Gap Tool
  • 9.9 Pathfinder Pallet
Module 10
  • 10.1 Considerations When Working with Interactive Documents
  • 10.2 Web Docs, Hyperlinks, Buttons and Rollovers
  • 10.3 Creating Your Own Path
  • 10.4 Exporting
Module 11
  • 11.1 Outro
Module 1: Introduction
  • 1.1 Instructor Intro
  • 1.2 Course Intro
Module 2: Getting Started
  • 2.1 What are Vectors
  • 2.2 Creating a New Document
  • 2.3 Navigating the Interface
Module 3: Drawing
  • 3.1 Drawing and Manipulating Primitive Shapes
  • 3.2 Drawing Custom Shapes Part 1
  • 3.2 Drawing Custom Shapes Part 2
  • 3.2 Drawing Custom Shapes Part 3
  • 3.3 Importing Images
  • 3.4 Understanding Layers and Sublayers
  • 3.5 Additional Drawing and Manipulation Tools
Module 4: Colors and Gradients
  • 4.1 Color Theory
  • 4.2 In-depth dive into Color Palette-
  • 4.3 Creating Color Swatches
  • 4.4 Creating and Manipulating Gradients Part 1
  • 4.4 Creating and Manipulating Gradients part 2
  • 4.4 Creating and Manipulating Gradients Part 3
Module 5: Intermediate Illustration
  • 5.1 Appearance Palette
  • 5.2 Pathfinder Palette
  • 5.3 Drawing with Intent part 1
  • 5.3 Drawing with Intent Part 2
  • 5.4 Blending Modes & FX Part 1
  • 5.4 Blending Modes & FX Part 2
Module 6: Typography
  • 6.1. Introduction to Typography
  • 6.2. Type Tools in Illustrator
  • 6.3 Envelope Warp and Mesh
  • 6.4 Breaking Text into Outlines
Module 7: Live Trace, Paint Brush and Blob Brush
  • 7.1 Live Trace
  • 7.2 Paint and Blob Brush
Module 8: Exporting
  • 8.1 Difference Between File Formats and Exporting
  • 8.2 Course Conclusion
Module 1: Beginner
  • 1.0 Intro
  • 1.1 The Ribbon
  • 1.2 Saving Files
  • 1.3 Entering and Formatting Data
  • 1.4 Printing from Excel & Using Page Layout View
  • 1.5 Formulas Explained
  • 1.6 Working with Formulas and Absolute References
  • 1.7 Specifying and Using Named Range
  • 1.8 Correct a Formula Error
  • 1.9 What is a Function
  • 1.10 Insert Function & Formula Builder
  • 1.11 How to Use a Function- AUTOSUM, COUNT, AVERAGE
  • 1.12 Create and Customize Charts
Module 2: Intermediate
  • 2.0 Recap
  • 2.1 Navigating and editing in two or more worksheets
  • 2.2 View options – Split screen, view multiple windows
  • 2.3 Moving or copying worksheets to another workbook
  • 2.4 Create a link between two worksheets and workbooks
  • 2.5 Creating summary worksheets
  • 2.6 Freezing Cells
  • 2.7 Add a hyperlink to another document
  • 2.8 Filters
  • 2.9 Grouping and ungrouping data
  • 2.10 Creating and customizing all different kinds of charts
  • 2.11 Adding graphics and using page layout to create visually appealing pages
  • 2.12 Using Sparkline formatting
  • 2.13 Converting tabular data to an Excel table
  • 2.14 Using Structured References
  • 2.15 Applying Data Validation to cells
  • 2.16 Comments – Add, review, edit
  • 2.17 Locating errors
Module 3: Advanced
  • 3.1 Recap
  • 3.2 Conditional (IF) functions
  • 3.3 Nested condition formulas
  • 3.4 Date and Time functions
  • 3.5 Logical functions
  • 3.6 Informational functions
  • 3.7 VLOOKUP & HLOOKUP
  • 3.8 Custom drop down lists
  • 3.9 Create outline of data
  • 3.10 Convert text to columns
  • 3.11 Protecting the integrity of the data
  • 3.12 What is it, how we use it and how to create a new rule
  • 3.13 Clear conditional formatting & Themes
  • 3.14 What is a Pivot Table and why do we want one
  • 3.15 Create and modify data in a Pivot Table
  • 3.16 Formatting and deleting a Pivot Table
  • 3.17 Create and modify Pivot Charts
  • 3.18 Customize Pivot Charts
  • 3.19 Pivot Charts and Data Analysis
  • 3.20 What is it and what do we use it for
  • 3.21 Scenarios
  • 3.22 Goal Seek
  • 3.23 Running preinstalled Macros
  • 3.24 Recording and assigning a new Macro
  • 3.25 Save a Workbook to be Macro enabled
  • 3.26 Create a simple Macro with Visual Basics for Applications (VBA)
  • 3.27 Outro
Module 1: Beginner
  • 1.01 Instructor Intro
  • 1.02 Course Intro
  • 1.1 Explaining the Ribbon
  • 1.2 Creating a Document
  • 1.3 Saving Files
  • 1.4 Page Views
  • 1.5 Formatting Text
  • 1.6 Ruler, Margins and Tab Stops
  • 1.7 Moving and Duplicating Text
  • 1.8 Line Spacing and Paragraph Formatting
  • 1.9 Basic Editing
  • 1.10 Insert a Basic Table and Graphics
  • 1.11 Working with Styles
Module 2: Intermediate
  • 2.1 Intermediate Intro
  • 2.2 Collaboration & Co-Authorship
  • 2.3 Tracking and Viewing Changes
  • 2.4 Commenting
  • 2.5 Templates & Layouts
  • 2.6 Layout Functions on the Ribbon
  • 2.7 Customize, Format and Convert Tables and Use as a Page Layout
  • 2.8 Insert and Edit a Cover Page
  • 2.9 Insert and Customize Headers and Footers
  • 2.10 Insert and Customize Endnotes and Footnotes
  • 2.11 Creating Sections in a Long Document
  • 2.12 Using Sections to Format a Document
  • 2.13 Deleting a Section
  • 2.14 Reviewing, Inserting and Updating TOC
  • 2.15 Creating a Data Source and Linking a Mailing List
  • 2.16 Print Settings for Mail Merge
Module 3: Advanced
  • 3.1 Adding the Developer Tab
  • 3.2 Functionality Among Microsoft Office Products
  • 3.3 Using Formulas in Word
  • 3.4 Citing Sources in Word
  • 3.5 Reviewing and Merging Versions of the Same Document
  • 3.6 Creating a Master Document
  • 3.7 Creating Sub Documents and Editing Master and Sub Docs
  • 3.8 Controlling Editable Content
  • 3.9 Form Creation Using the Developer Tab
  • 3.10 Macros
Module 1: Getting Started
  • 1.0 Course Intro
  • 1.1 Touring Adobe PP
  • 1.1 Touring Adobe PP pt.2
  • 1.2 Setting Up a Project
  • 1.3 Importing Media
  • 1.4 Organizing Media
  • 1.5 Mastering the Essentials of Video Editing
  • 1.6 Working with Clips and Markers
  • 1.7 Adding Transitions
  • 1.8 Multicamera Editing
  • 1.9 Advanced Editing Techniques
Module 2: Motion, Sound, and More
  • 2.1 Putting Clips in Motion
  • 2.2 Editing and Mixing Audio
  • 2.3 Sweetening Sound
  • 2.4 Adding Video Effects
  • 2.5 Basic Color Correction
  • 2.6 Compositing Techniques
  • 2.7 Creating Graphics
  • 2.8 Exporting Frames, Clips and Sequences
Module 1: Getting Started
  • 1.1 Instructor Intro
  • 1.1 Course Intro
  • 1.2 Open Images
  • 1.3 Get Familiar with Work Space
  • 1.4 Zoom and Pan
  • 1.5 Undo and Save Pt 1
  • 1.5 Undo and Save Pt 2
  • 1.6 Resize and Resolution
  • 1.7 Crop and Straighten
  • 1.8 Expand the Canvas
  • 1.9 Basic Image Corrections
Module 2: Layers and More
  • 2.1 Layer Basics
  • 2.2 Resizing Layers
  • 2.3 Adding Text and Images
  • 2.4 Layer Styles
  • 2.5 Photo Merge and Panoramic Images
  • 2.6 Camera Raw
  • 2.7 Camera Raw Continued and Adjustment Layers
  • 2.8 Selection Basics
Module 3: Editing, Techniques and More
  • 3.1 Raw File XMP
  • 3.2 Masks
  • 3.3 Puppet Warp and Alpha Channel
  • 3.4 Typography
  • 3.5 Vector Drawing Techniques
  • 3.6 Advanced Compositing
Module 1: Anatomy
  • Module 1 Workbook
  • 1.1 Introduction
  • 1.2 Human Body
  • 1.3 Skin
  • 1.4 Bones, Muscles and Joints
  • 1.5 Heart and Blood Vessels
  • 1.6 Lungs
  • 1.7 Stomach, Intestines and Colon
  • 1.8 Kidney, Bladder, Prostate and More
  • 1.9 Uterus, Ovaries and Female Parts
  • 1.10 Eye
  • 1.11 Glands
  • 1.12 Ear, Nose and Throat
  • 1.13 Blood
  • 1.14 Immune
  • 1.15 Brain and Spinal Cord
Module 2: Diagnosis Coding
  • Module 2 Workbook
  • 2.1 Overview of ICD
  • 2.2 Outpatient Guidelines
  • 2.3 Infectious and Parasitic
  • 2.4 Neoplasms
  • 2.5 Diseases of the Blood and Blood Organs
  • 2.6 Endocrine, Nutritional and Metabolic Diseases
  • 2.7 Mental and Behaviroal Health
  • 2.8 Pregnancy, Childbirth and the Puerperium
  • 2.9 Conditions Originating in Perinatal Period
  • 2.10 Symptoms, Signs and Abnormal Clinical and Laboratory Findings
  • 2.11 Injury, Poisoning and Certain Other External Causes
  • 2.12 Diseases of the Skin and Subcutaneous Tissue
  • 2.13 External Causes of Morbidity
  • 2.14 Factors Influencing Health
  • 2.15 Circulatory System
  • 2.16 Eye
  • 2.17 Respiratory
  • 2.18 Digestive
Module 3: Procedure Coding
  • Module 3 Workbook
  • 3.1 Evaluation and Management part 1
  • 3.1 Evaluation and Management part 2
  • 3.1 Evaluation and Management part 3
  • 3.1 Evaluation and Management part 4
  • 3.2 Anesthesia
  • 3.3 Modifiers
  • 3.4 Surgery part 1
  • 3.4 Surgery part 2
  • 3.4 Surgery part 3
  • 3.5 Radiology
  • 3.6 Pathology
  • 3.7 OB/GYN
  • 3.8 Physical Medicine part 1
  • 3.8 Physical Medicine part 2
  • 3.9 HCPCS
  • 3.10 Diving Into Coding part 1
  • 3.10 Diving Into Coding part 2
  • 3.10 Diving Into Coding part 3
  • 3.11 NCCI, MUE and GME
  • 3.12 CAT Codes
Module 4: Billing Guidelines and Practices
  • Module 4 Workbook
  • 4.1 HIPAA, Compliance and Reimbursement part 1
  • 4.1 HIPAA, Compliance and Reimbursement part 2
  • 4.1 HIPAA, Compliance and Reimbursement part 3
  • 4.1 HIPAA, Compliance and Reimbursement part 4
  • 4.2 The Next Steps
Module 1: Implement VM Solutions
  • Intro
  • Implement VM Solutions Pt 1
  • Implement VM Solutions Pt 2
  • Implement VM Solutions Pt 3
  • Implement VM Solutions Pt 4
  • Implement Batch Jobs Using AZ Batch Services
  • Create Containerized Solutions Pt 1
  • Create Containerized Solutions Pt 2
Module 2: Develop Azure Platform as a Service
  • Develop Azure Platform as a Service (PaaS) Pt 1
  • Develop Azure Platform as a Service (PaaS) Pt 2
  • Develop Azure Platform as a Service (PaaS) Pt 3
  • Develop Azure Platform as a Service (PaaS) Demo Pt 1
  • Develop Azure Platform as a Service (PaaS) Demo Pt 2
  • Create Azure App Service Mobile Apps
  • Create Azure App Service API Apps
  • Implement Azure Functions Pt 1
  • Implement Azure Functions Pt 2
Module 3: Develop for Azure Storage
  • Develop for Azure Storage Pt 1
  • Develop for Azure Storage Pt 2
  • Develop for Azure Storage Pt 3
  • Develop Solutions that use Azure Cosmos DB Pt 1
  • Develop Solutions that use Azure Cosmos DB Pt 2
  • Develop Solutions that use Relational Database Pt 1
  • Develop Solutions that use Relational Database Pt 2
  • Develop Solutions that use Microsoft Blob Storage
Module 4: Implement Azure Security
  • Implement Azure Security Pt 1
  • Implement Azure Security Pt 2
  • Implement Azure Security Pt 3
  • Implementing Access Control Pt 1
  • Implementing Access Control Pt 2
  • Implementing Secure Data Solutions
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
  • Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
  • Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
  • Develop for Code Scalability
  • Instrument Solutions to Support Monitoring and Logging
  • Integrate Caching and Content Delivery Pt 1
  • Integrate Caching and Content Delivery Pt 2
Module 6: Connect to and Consume Azure and Third Party Services
  • Connect to and Consume Azure and Third Party Services Pt 1
  • Connect to and Consume Azure and Third Party Services Pt 2
  • Working with Azure Search
  • Azure API Management
  • Develop Event Based Solutions Pt 1
  • Develop Event Based Solutions Pt 2
  • Develop Message Based Solutions Pt 1
  • Develop Message Based Solutions Pt 2
  • Outro
Module 1: Adobe Lightroom Overview
  • Instructor Introduction
  • Preparing To Use Adobe Lightroom
Module 2: Adobe Lightroom Use Case
  • Non-Destructive Photo Editor
Module 3: Lightroom Library and Organization
  • Lightroom Library And Organization Part 1
  • Lightroom Library And Organization Part 2
  • Lightroom Library And Organization Part 3
  • Lightroom Library And Organization Part 4
Module 4: Editing Your Photo – Global Adjustments
  • Edit Your Photo – Global Adjustments Part 1
  • Edit Your Photo – Global Adjustments Part 2
  • Edit Your Photo – Global Adjustments Part 3
  • Edit Your Photo – Global Adjustments Part 4
  • Edit Your Photo – Global Adjustments Part 5
  • Edit Your Photo – Global Adjustments Part 6
  • Edit Your Photo – Global Adjustments Part 7
  • Edit Your Photo – Global Adjustments Part 8
  • Edit Your Photo – Global Adjustments Part 9
  • Edit Your Photo – Global Adjustments Part 10
  • Edit Your Photo – Global Adjustments Part 11
Module 5: Edit Your Photo – Local Adjustments
  • Edit Your Photo – Local Adjustments Part 1
  • Edit Your Photo – Local Adjustments Part 2
  • Edit Your Photo – Local Adjustments Part 3
  • Edit Your Photo – Local Adjustments Part 4
  • Edit Your Photo – Local Adjustments Part 5
  • Edit Your Photo – Local Adjustments Part 6
Module 6: Saving and Exporting Your Photo In Lightroom Classic
  • Exploring All Saving And Exporting Options
Module 7: Lightroom CC – A Cloud Based Version
  • How to Launch And Work Within Lightroom CC
Module 8: Course Closeout
  • Instructor Course Wrap Up
Module 1: Intro
  • Intro
Module 2: Camera Anatomy
  • Camera Anatomy
  • Camera Anatomy 2
Module 3: Scene Camera Modes
  • Scene Camera Modules
Module 4: Achieve Exposure
  • Achieve Exposure
  • Achieve Exposure 2
Module 5: Filetypes
  • Filetypes
Module 6: Sensor
  • Sensor
Module 7: Resolution
  • Resolution
Module 8: White Balance
  • White Balance
  • White Balance 2
Module 9: Color Theory
  • Color Theory
Module 10: Depth of Field
  • Depth of Field
Module 11: Focusing
  • Focusing
Module 12: Lighting
  • Lighting
  • Lighting 2
Module 13: Metering
  • Metering
Module 14: Composition
  • Composition
Chapter 1: Course Introduction and Methodology
  • 1.1
  • 1.2
  • 1.3
Chapter 2: Virtualization Overview
  • 2.1
  • 2.2
Chapter 3: Planning and Installing ESXi
  • 3.1
  • 3.2
  • 3.3
  • 3.4
  • 3.5
  • 3.6
  • 3.7
Chapter 4: Using tools to Administer a VMware Environment
  • 4.1
  • 4.2
  • 4.3
Chapter 5: vCenter and Licensing
  • 5.1
  • 5.2
  • 5.3
  • 5.4
  • 5.5
  • 5.6
  • 5.7
Chapter 6: Configuring Networking
  • 6.1
  • 6.2
  • 6.3
Chapter 7: Configuring Storage
  • 7.1
  • 7.2
  • 7.3
  • 7.4
  • 7.5
  • 7.6
Chapter 8: VM Creation, Configuration, and Snapshots
  • 8.1
  • 8.2
  • 8.3
  • 8.4
  • 8.5
  • 8.6
  • 8.7
  • 8.8
  • 8.9
Chapter 9: Security and Permissions
  • 9.1a
  • 9.1b
  • 9.1c
  • 9.2
  • 9.3
  • 9.4
Chapter 10: Host and VM Monitoring
  • 10.1
  • 10.2a
  • 10.2b
  • 10.3
  • 10.4
  • 10.5
  • 10.6
Chapter 11: Advanced ESXi and vCenter Server Management
  • 11.1
  • 11.2
  • 11.3
  • 11.4
  • 11.5
  • 11.6
Chapter 12: Patching and Upgrading ESXi
  • 12.1a
  • 12.1b
  • 12.2a
  • 12.2b
Chapter 13: Disaster Recovery and Backup
  • 13.1
  • 13.2
  • 13.3
  • 13.4
Module 1: Getting Started with Python
  • Module 1 File
  • Intro to Course and Instructor
  • Getting Started with Python
Module 2: Working with Primitive Data Types
  • Module 2 File
  • Working with Primitive Data Types
  • Working with Primitive Data Types Part 2
  • Working with Primitive Data Types Part 3
  • Working with Primitive Data Types Part4
  • Working with Primitive Data Types Part4 Answers
Module 3: Working with Multiple Assignments Statements
  • Module 3 File
  • Working with Multiple Assignments Statements
Module 4: Convert Types in Python
  • Module 4 File
  • Convert Types in Python
Module 5: Creating Lists
  • Module 5 File
  • Creating Lists
Module 6: Modifying Lists
  • Module 6 Notes
  • Modifying Lists
Module 7: Sorting and Reversing Lists
  • Module 7 File
  • Sorting and Reversing Lists
Module 8: Slicing Lists
  • Module 8 File
  • Slicing Lists
Module 9: Working With Operators
  • Module 9 File
  • Working With Operators
  • Working With Operators Part2
  • Working With Operators Part3
Module 10: Determining Operator Precedence
  • Module 10 File
  • Determining Operator Precedence
Module 11: Working with IF Statements
  • Module 11 File
  • Working with IF Statements
Module 12: Working With For Loops
  • Module 12 File
  • Working With For Loops
Module 13: Working With While Loops
  • Module 13 File
  • Working With While Loops
Module 14: Nesting for Loops
  • Module 14 File
  • Nesting for Loops
Module 15: Reading Files
  • Module 15 File
  • Reading Files Part1
  • Reading Files Part2
Module 16: More on Files
  • Module 16 File
  • More on Files
Module 17: Merging Emails
  • Module 17 File
  • Merging Emails
Module 18: Reading Console Inputs and Formatting Outputs
  • Module 18 File
  • Reading Console Inputs and Formatting Outputs
Module 19: Reading Command Line Argument
  • Module 19 File
  • Reading Command Line Argument
Module 20: Defining Functions
  • Module 20 File
  • Defining Functions
Module 21: Using Default Argument
  • Module 21 File
  • Using Default Argument
Module 22: Using Keyword and Positional Arguments
  • Module 22 File
  • Using Keyword and Positional Arguments
Module 23: Handling Exceptions
  • Module 23 File
  • Handling Exceptions
Module 24: Using Math and Random Modules
  • Module 24 File
  • Using Math and Random Modules
Module 25: Displaying Daytime Working Directory and File Metadata
  • Module 25 File
  • Displaying Daytime Working Directory and File Metadata
Module 1 – IT Concepts and Terminology
  • Module 1 Notes
  • 0.1 Instructor Intro
  • 1.1 Compare and Contrast Notational Systems
  • 1.1 Compare and Contrast Notational Systems Demo
  • 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
  • 1.3 Illustrate the Basics of Computing and Processing
  • 1.4 Explain the Value of Data and Information
  • 1.5 Compare and Contrast Common Units of Measures
  • 1.5 Compare and Contrast Common Units of Measures Demo
  • 1.6 Explain the Troubleshooting Methodology
Module 2 – Infrastructure
  • Module 2 Notes
  • 2.1 Classify Common Types of Input-Output Device Interfaces
  • 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
  • 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
  • 2.3 Explain the Purpose of Common Internal Computing Components
  • 2.4 Compare & Contrast Common Internet Service Types-
  • 2.5 Compare & Contrast Storage Types
  • 2.6 Compare & Contrast Common Computing Devices & Their Purposes
  • 2.7 Explain Basic Networking Concepts
  • 2.7 Explain Basic Networking Concepts Demo
  • 2.7 Explain Basic Networking Concepts Part 2
  • 2.7 Explain Basic Networking Concepts Part 3
  • 2.7 Explain Basic Networking Concepts Part 4
  • 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
  • 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 – Applications and Software
  • Module 3 Notes
  • 3.1 Explain the Purpose of Operating Systems
  • 3.1 Explain the Purpose of Operating Systems Demo
  • 3.2 Compare & Contrast Components of an Operating System
  • 3.2 Compare & Contrast Components of an Operating System Demo
  • 3.3 Explain the Purpose & Proper Use of Software
  • 3.4 Explain Methods of Application Architecture & Delivery Models
  • 3.5 Given a Scenario Configure & Use Web Browsers
  • 3.5 Given a Scenario Configure & Use Web Browsers FireFox
  • 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
  • 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
  • 3.6 Compare & Contrast General Application Concepts & Uses
Module 4 – Software Development
  • Module 4 Notes
  • 4.1 Compare & Contrast Programming Language Categories-
  • 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
  • 4.3 Explain the Purpose & Use of Programming Concepts-
  • 4.3 HTML Demo
Module 5 – Database Fundamentals
  • Module 5 Notes
  • 5.1 Explain Database Concepts and the Purpose of Databases
  • 5.2 Compare and Contrast Various Database Structures
  • 5.3 Summarize Methods Used to Interface with Databases
  • 5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 – Security
  • Module 6 Notes
  • 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
  • 6.2 Explain Methods to Secure Devices and Best Practices
  • 6.3 Summarize Behavioral Security Concepts
  • 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
  • 6.5 Explain Password Best Practices
  • 6.6 Explain Common Uses of Encryption
  • 6.7 Explain Business Continuity Concepts
  • 6.8 Takeaways-
  • 6.9 ITF Fundamentals Conclusion
Module 1 Introducing Windows Server 2016
  • Module 1 Notes
  • 1. Windows Server 2016 Fundamentals Intro
  • 2. Mod 1 Introducing Windows Server 2016
  • 3. Mod 1a Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
  • Module 2 Notes
  • 4. Mod 2 Managing Windows Server 2016
  • 5. Mod 2a Managing Windows Server 2016
Module 3 Managing Storage
  • Module 3 Notes
  • 6. Mod 3 Managing Storage
  • 7. Mod 3a Managing Storage
Module 4 Monitoring and Troubleshooting Servers
  • Module 4 Notes
  • 8. Mod 4 Monitoring and Troubleshooting Servers
  • 9. Mod 4a Monitoring and Troubleshooting Servers
Module 5 Essential Services
  • Module 5 Notes
  • 10. Mod 5 Essential Services
  • 11. Mod 5a Essential Services
Module 6 Understanding File and Print Services
  • Module 6 Notes
  • 12. Mod 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
  • Module 7 Notes
  • 13. Mod 7 Windows Network Services and Applications-
  • 14. Mod 7a Windows Network Services and Applications-
Mod 8 Key Takeaways
  • Key Takeaway Notes
  • 15. Key takeaways Intro
  • 16. Key takeaways – Module 1 Introducing Windows Server 2016
  • 17. Key takeaways – Module 2 Managing Windows Server 2016
  • 18 Key takeaways – Module 3 Storing Data in Windows Server 2016
  • 19. Key takeaways – Module 4 Monitoring and Troubleshooting Servers
  • 20. Key takeaways – Module 5 Essential Services
  • 21. Key takeaways – Module 6 Understanding File and Print Services
  • 22. Key takeaways – Module 7 Windows Network Services and Applications
Mod 9 Terms to Know
  • Terms to Know Notes
  • 23. Terms to Know Intro
  • 24. Terms to Know – Module 1 Introducing Windows Server 2016
  • 25. Terms to Know – Module 2 Managing Windows Server 2016
  • 26 Terms to Know – Module 3 Storing Data in Windows Server 2016
  • 27. Terms to Know – Module 4 Monitoring and Troubleshooting Servers
  • 28. Terms to Know – Module 5 Essential Services
  • 29. Terms to Know – Module 6 Understanding File and Print Services
  • 30. Terms to Know – Module 7 Windows Network Services and Applications
Mod 10 Hands on Labs
  • Hands on Labs Setup Notes
  • 01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
  • 02 Step by Step Install VMware Player 15 in Windows 10 1
  • 03 Installing and Configuring DC1 Virtual Machine
  • 04 Installing and Configuring SRV-1 Virtual Machine
  • 05 Installing and Configuring Client 1 Virtual Machine
  • 06 Installing and Configuring the Router Virtual Machine
  • 07 Creating and Configuring SRV-2 Virtual Machine
  • 08 Working with Windows Server 2016 Desktop Experience
  • 09 Managing Organizational Units and Groups in AD DS
Module 1 Understanding Security Layers
  • Module 1 Notes
  • 1.0 Security Fundamentals Instructor
  • 1.1 Security Fundamentals Intro
  • 1.2 Understanding Security Layers Part1
  • 1.3 Understanding Security Layers Part2
Module 2 Authentication, Authorization, and Accounting
  • Module 2 Notes
  • 2.0 Authentication, Authorization & Accounting Part1
  • 2.1 Authentication, Authorization & Accounting Part2
  • 2.2 Authentication, Authorization & Accounting Demo
Module 3 Understanding Security Policies
  • Module 3 Notes
  • 3.0 Understanding Security Policies
Module 4 Understanding Network Security
  • Module 4 Notes
  • 4.0 Understanding Network Security Part1
  • 4.1 Understanding Network Security Part2
Module 5 Locking Down Server and Client
  • Module 5 Notes
  • 5.0 Locking Down the Server and Client
  • 5.1 Locking Down the Server and Client Part2
Module 6 Key Takeaways
  • Key Takeaway Notes
  • 6.0 Key Take Aways Intro
  • 6.1 Understanding Security Layers
  • 6.2 Authentication Authorization and Accounting
  • 6.3 Understanding Security Policies
  • 6.4 Understanding Network Security
  • 6.5 Security Fundamentals Part 2
Module 7 Terms to Know
  • Terms to Know Notes
  • 7.0 Terms to Know Intro
  • 7.1 Understanding Security Layers Terms
  • 7.2 Authentication Authorization and Accounting Terms
  • 7.3 Understanding Security Policies Terms
  • 7.4 Understanding Network Security Terms
  • 7.5 Locking Down Server and Client Terms
Module 1 Understanding Local Area Networking
  • Module 1 Notes
  • 1.0 Intro to Networking Fundamentals
  • 1.1 Exam Overview
  • 1.1 Examining Local Network Devices and Data Transfers 1a
  • 1.1 Examining Local Network Devices and Data Transfers 1b
  • 1.1 Examining Local Network Devices and Data Transfers 1c
  • 1.1 Examining Local Network Devices and Data Transfers 1d
  • 1.1 Examining Local Network Devices and Data Transfers 1e
  • 1.1 Examining Local Network Devices and Data Transfers 1f
  • 1.2 Examining Local Network Devices and Data Transfers Part 2a
  • 1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
  • Module 2 Notes
  • 2.1 Defining Networks with OSI Model Part 1a
  • 2.2 Defining Networks with OSI Model Part 1b
  • 2.3 Defining Networks with OSI Model Part 1c
  • 2.4 Defining Networks with OSI Model Part 1d
  • 2.5 Defining Networks with OSI Model Part 1e
  • 2.6 Defining Networks with OSI Model Part 1f
  • 2.7 Defining Networks with OSI Model Part 1g
  • 2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
  • Module 3 Notes
  • 3.1 Understand Wired and Wireless Networks Part1
  • 3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
  • Module 4 Notes
  • 4.1 Understanding Internet Protocol Part1
  • 4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
  • Module 5 Notes
  • 5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
  • Module 6 Notes
  • 6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
  • Module 7 Notes
  • 7.1 Understanding Wide Area Network Part1
  • 7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
  • Module 8 Notes
  • 8.1 Defining Network Infrastructure & Network Security Part1
  • 8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
  • Key Takeaway Notes
  • 1. Key Take Aways of Networking Fundamentals
  • 2. Key Take Aways Mod1
  • 3. Key Take Aways Mod2
  • 4. Key Take Aways Mod3
  • 5. Key Take Aways Mod4
  • 6. Key Take Aways Mod5
  • 7. Key Take Aways Mod6
  • 8. Key Take Aways Mod7
Module 10 Terms to Know
  • Terms to Know Notes
  • 1. Terms to Know Networking Fundamentals
  • 2. Terms to Know Mod1
  • 3. Terms to Know Mod2
  • 4. Terms to Know Mod3
  • 5. Terms to Know Mod4
  • 6. Terms to Know Mod5
  • 7. Terms to Know Mod6
  • 8. Terms to Know Mod7
  • 9. Terms to Know Mod8
Module 1 – Operating Systems
  • Module 1 Workbook
  • 0.1 Intro to A+ Core2 Instructor
  • 1.0 Intro to A+ Core2
  • 1.1 Operating Systems Part1
  • 1.1 Operating Systems Part2
  • 1.2 Compare and Contrast features of Microsoft Windows Versions
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
  • 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
  • 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
  • 1.5 Microsoft Operating System and Tools Part1
  • 1.5 Microsoft Operating System and Tools Part1 Demo
  • 1.5 Microsoft Operating System and Tools Part2
  • 1.5 Microsoft Operating System and Tools Part2 Demo
  • 1.5 Microsoft Operating System and Tools Part3
  • 1.5 Microsoft Operating System and Tools Part3 Demo
  • 1.5 Microsoft Operating System and Tools Part4
  • 1.5 Microsoft Operating System and Tools Part4 Demo
  • 1.6 Microsoft Windows Control Panel Utilities
  • 1.6 Microsoft Windows Control Panel Utilities Demo
  • 1.7 Summerize Application Installation and Configuration Concepts
  • 1.8 Configure Windows Networking on a Client Desktop
  • 1.8 Configure Windows Networking on a Client Desktop Demo
  • 1.9 Features and Tools of MAC OS and Linux Client Desktop
Module 2 – Security
  • Module 2 Workbook
  • 2.1 Security – Physical Security Measures
  • 2.2 Explain Logical Security Concepts
  • 2.2 Explain Logical Security Concepts Part2
  • 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
  • 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
  • 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings
  • 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
  • 2.7 Implement Security Best Practices to Secure a Workstation
  • 2.7 Implement Security Best Practices to Secure a Workstation Part2
  • 2.8 Implement Methods for Securing Mobile Devices
  • 2.9 Implement Appropriate Data Destruction & Disposal Methods
  • 2.10 Configure Security on SOHO Wireless and Wired Networks
  • 2.10 Configure Security on SOHO Wireless and Wired Networks Demo
Module 3 – Software Troubleshooting
  • Module 3 Workbook
  • 3.1 Software Troubleshooting Part1
  • 3.1 Software Troubleshooting Part2
  • 3.1 Software Troubleshooting Demo
  • 3.2 Troubleshoot and Resolve PC Security Issues
  • 3.2 Troubleshoot and Resolve PC Security Issues Part2
  • 3.2 Troubleshoot and Resolve PC Security Issues Demo
  • 3.3 Best Practice Procedures for Malware Removal
  • 3.4 Troubleshoot Mobile OS and Application
  • 3.5 Troubleshoot Mobile OS and Application Security Issue
Module 4 – Operational Procedures
  • Module 4 Workbook
  • 4.1 Operational Procedures
  • 4.2 Implement Basic Change Management Best Practices
  • 4.3 Implement Basic Disaster Prevention and Recovery Methods
  • 4.4 Explain Common Safety Procedures
  • 4.5 Explain Environmental Impacts and Appropriate Controls
  • 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
  • 4.7 Using Proper Communication Techniques and Professionalism
  • 4.8 Identify the Basic of Scripting
  • 4.8 Identify the Basic of Scripting Demo
  • 4.9 Use Remote Access Technologies
Module 1 – Mobile Devices
  • Module 1 Workbook
  • 0.1 Intro to A+ Core1 Instructor
  • 1.0 CompTIA A+ Course Intro
  • 1.1 Mobile Devices Part 1
  • 1.1 Mobile Devices Part 2
  • 1.1 Mobile Devices Part 3
  • 1.2 Installing Components in Laptop
  • 1.3 Laptop Features Part 1
  • 1.3 Laptop Features Part 2
  • 1.4 Compare and Contrast Types of Mobile Devices
  • 1.5 Accessories and Ports of Other Mobile Devices Part 1
  • 1.5 Accessories and Ports of Other Mobile Devices Part 2
  • 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
  • 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
  • 1.7 Use Methods to Perform Mobile Device Synchronization
  • 1.8 Laptop Disassemble and Assemble
Module 2 – Networking
  • Module 2 Workbook
  • 2.1 Networking Part 1
  • 2.1 Networking Part 2
  • 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
  • 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
  • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
  • 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
  • 2.3 Setting Up a Wireless Router
  • 2.4 Compare and Contrast Wireless Networking Protocols
  • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
  • 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
  • 2.6 Explain Common Network Configuration Concepts Part 1
  • 2.6 Explain Common Network Configuration Concepts Part 2
  • 2.7 Compare and Contrast Internet Connection Types Network Types and Features
  • 2.8 Given a Scenario Using Appropriate Networking Tools
Module 3 – Hardware
  • Module 3 Workbook
  • 3.1 Hardware Part 1
  • 3.1 Hardware Part 2
  • 3.1 Hardware Part 3
  • 3.2 Identify Common Connector Types
  • 3.3 Scenario Install RAM Types
  • 3.4 Scenario Select Install and Configure Storage Devices
  • 3.4 Scenario Select Install and Configure Storage Devices Part 2
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
  • 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
  • 3.5 Install Disassemble and Assemble a Desktop
  • 3.6 Purposes for Peripherals and Types
  • 3.7 Summarize Power Supplies
  • 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
  • 3.9 Scenario Installand Configure Common Devices
  • 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 1
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 2
  • 3.11 Scenario Install and Maintain Various Print Technologies Part 3
Module 4 – Virtualization and Cloud Computing
  • Module 4 Workbook
  • 4.1 Virtualization Part 1
  • 4.1 Virtualization Part 2
  • 4.2 Scenario Setup and Configure Client-side Virtualization
Module 5 – Hardware and Network Troubleshooting
  • Module 5 Workbook
  • 5.1 Hardware and Networking Troubleshooting
  • 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
  • 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
  • 5.3 Troubleshoot Hard Drives and RAID Arrays
  • 5.4 Troubleshoot Video and Display Issues
  • 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
  • 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
  • 5.6 Troubleshoot Printers
  • 5.7 Troubleshoot Common Wired and Wireless Network Problems
Module 1 : Agile Principles and Mindset
  • Agile Introduction XP
  • Agile Core Principles XP
  • Lean Product Development XP
  • Agile Leadership Tasks XP
  • Agile Communications XP
Module 2 : Value Driven Delivery
  • Value Driven Delivery XP
  • Value Driven Delivery XP Part2
Module 3 : Stakeholder Engagement
  • Stakeholder Engagement XP
  • Facilitation Tools XP
Module 4 : Team Performance
  • Team Performance XP
  • Digital Tools for Distibuted Teams XP
Module 5 : Adaptive Planning
  • Adaptive Planning XP
  • Adaptive Planning Part2 XP
Module 6 : Problem Detection and Resolution
  • Problem Detection and Resolution XP
Module 7 : Continuous Improvement
  • Continuous Improvement XP
Module 1 : Agile Principles and Mindset
  • Agile Introduction Scrum
  • Agile Core Principles Scrum
  • Lean Product Development Scrum
  • Agile Leadership Tasks Scrum
  • Agile Communications Scrum
Module 2 : Value Driven Delivery
  • Value Driven Delivery Scrum
  • Value Driven Delivery Scrum Part2
Module 3 : Stakeholder Engagement
  • Stakeholder Engagement Scrum
  • Facilitation Tools Scrum
Module 4 : Team Performance
  • Team Performance Scrum
  • Digital Tools for Distibuted Teams Scrum
Module 5 : Adaptive Planning
  • Adaptive Planning Scrum
  • Adaptive Planning Scrum Part2
Module 6 : Problem Detection and Resolution
  • Problem Detection and Resolution Scrum
Module 7 : Continuous Improvement
  • Continuous Improvement Scrum
Module 1 : Prepare for installation requirements
  • Module 1 Workbook
  • Prep for Installation Windows 10
  • Clean Install or Upgrade Windows 10
  • Editions of Windows 10
  • What Features Do You Want
  • Installation Media
  • Looking at MS Application Compatibility Toolkit (ACT)
Module 2 : Install Windows
  • Module 2 Workbook
  • Installing Windows
  • Clean installation of Windows 10-Demo
  • Upgrade using Installation Media
  • Configure Native Boot and VHD
  • Migrating to Windows 10
  • Chp2 Booting from VHD
  • Creating a VHD-Demo
  • Installing Windows 10 to a VHD-Demo
  • Installing on Bootable USB
  • Using USMT User State Migration Tool-Demo
  • Additional Windows Features
  • Create an MBR-Partitioned VHD-Demo
  • Additional Regional and Language Support
  • Putting Win 10 on a VHD with DISM-Demo
Module 3 : Configure devices and device drivers
  • Module 3 Workbook
  • Configure Devices and Device Drivers
  • Resolve Driver Issues
  • Configuring Driver Settings
  • Manage Driver Packages
  • Download and Import Driver Packages
  • Using DISM
  • Installing o Updating Drivers using Device Manager-Demo
  • Roll Back Drivers-Demo
  • Using Sigverif-Demo
  • More on Device Manager-Demo
Module 4 : Perform post-installation configuration
  • Module 4 Workbook
  • Perform Post Installation Configuration
  • Configure Accessibilty Options
  • Configure Cortana
  • Configure Microsoft Edge
  • Configure Internet Explorer
  • Configure Client Hyper-V
  • Configure Power Settings
  • Customizing the Start Menu-Demo
  • Start Tiles-Demo
  • Desktop Customization-Demo
  • Action Center and Notifications-Demo
  • Hyper V-Demo
  • Power Settings-Demo
Module 5 : Implement Windows in an enterprise environment
  • Module 5 Workbook
  • Implement Windows in an Enterprise Enviornment
  • Implementing Active Directory
  • Implement Volume Activation Using a Key Mgmt Service
  • Query and Configure Activation State using Command line
  • Configure Active Directory Including Group Policies
  • Configure and Optimize User Account Control UAC
  • Using Software Licensing Manager; slmgr.vbs -dli-Demo
  • Taking a look at UAC-Demo
Module 6 : Configure networking
  • Module 6 Workbook
  • Configuring Networking
  • Configuring Name Resolution
  • Connect to a Network
  • Configure Network Locations
  • Configure Windows Firewall
  • Configure Windows Firewall with Advance Security
  • Configure Network Discovery
  • Configuring Wi-Fi Settings
  • Troubleshoot Network Issues
  • Configure VPNs
  • Configure IPsec
  • Configure DirectAccess
  • Configure IP Addresses Manually-Demo
  • DNS Settings-Demo
  • Looking at Network Locations and where to make Chpanges-Demo
  • Windows Firewall – Basic Settings-Demo
  • Windows Firewall – Advanced Settings-Demo
  • Troubleshooting Tools-Demo
  • Create a VPN Connection-Demo
Module 7 : Configure storage
  • Configure Storage
  • Create and Configure VHD
  • Configure Removable Devices
  • Create and Configure Storage Spaces
  • Troubleshoot Storage and Removable Device Issue
  • Steps to create a simple volume-Demo
  • Create VHD with Hyper-V Manager-Demo
  • Create VHD with PowerShell-Demo
  • Bitlocker to Go-Demo
Module 8 : Configure data access and usage
  • Module 8 Workbook
  • Configure Data Access and Usage File-Printer
  • Configure File System Permissions
  • Configure File Share Public Folders and OneDrive
  • Configure OneDrive usage including Files On Demand
  • Troubleshoot Data Access and Usage
  • File Sharing-Demo
  • Printer Sharing-Demo
  • Set Printer Security-Demo
  • File system permissions-Demo
  • Public Folder Sharing-Demo
  • OneDrive-Demo
  • Storage Sense-Demo
  • Disk Quotas-Demo
Module 9 : Implement Apps
  • Module 9 Workbook
  • Implement Apps
  • Configure Startup Options
  • Configure Windows Features
  • Configure Windows Stores
  • Implementing Windows Store Apps
  • Implement Windows Store for Business and Education
  • Provison Packages
  • Create Packages
  • Chpange Default Apps-Demo
  • Application Startup Options-Demo
  • Looking at Windows Features-Demo
  • Windows Store-Demo
  • Windows Imaging and Configuration Designer Tool ICD-Demo
Module 10 : Configure remote management
  • Module 10 Workbook
  • Configuring Remote Management
  • Configure Remote Management Settings
  • Configure Remote Desktop
  • Configure Remote Assistance
  • Modifying Using MMC or PS
  • Configure Remote PowerShell
  • Remote Management Settings-Demo
  • Allow through Windows Firewall-Demo
  • Remote Desktop-Demo
  • Remote Assistance-Demo
  • Remote with MMC-Demo
  • Windows PowerShell Remoting-Demo
Module 11 : Configure Updates
  • Module 11 Workbook
  • Configure Update Windows 10
  • Manage Update History
  • Roll Back Updates
  • Implement Insider Preview CB CBB and LTSB
  • Update Windows Store Apps
  • Windows Update Options-Demo
  • Update History-Demo
  • Rolling Back Updates-Demo
  • Update Windows Store apps-Demo
Module 12 : Monitor Windows
  • Module 12 Workbook
  • Monitor Windows
  • Configure Event Subscriptions
  • Monitor Performance Using Task Manager
  • Monitor System
  • Monitor and Manage Printers
  • Monitor Performance Using Performance Monitor Data Collectors
  • Monitor and Manage Printers
  • Configure Indexing Options
  • Manage Client Security by Using Windows Defender
  • Evaluate System Stability by Using Reliaability Monitor
  • Troubleshoot Performance Issues
  • Manage Security Using Windows Defender Security Center
  • Configure Windows Defender Advanced Threat Detection
  • Event Viewer-Demo
  • Creating Event Subscriptions-Demo
  • Task Manager-Demo
  • Performance Monitor-Demo
  • Resource Monitor-Demo
  • Managing the Printers with Print Management-Demo
  • Indexing-Demo
  • Windows Defender-Demo
  • Reliability Monitor-Demo
Module 13 : Configure System and Data Recovery
  • Module 13 Workbook
  • Configure System and Data Recovery
  • Configure System Restore
  • Configure Restore Points
  • Peform a Refresh or Recycle
  • Restore Previous Versions of Files and Folders
  • Configure File History
  • Recover Files from OneDrive
  • Use Windows Backup and Restore
  • Perform a Backup and Restore with WBAdmin
  • Perform Recovery Operations Windows Recovery
  • Configure a Recovery Drive-Demo
  • Configure System Restore-Demo
  • Configure Restore Points-Demo
  • Performing a Refresh or Recycle-Demo
  • Configure File History-Demo
  • Use Windows Backup & Restore-Demo
Module 14 : Configure Authorization and Authentication
  • Module 14 Workbook
  • Configure Authorization and Authentication
  • Configure Pictures Passwords and Biometrics
  • Configure Workgroups
  • Configure Domain Settings
  • Configue Homegroup Settings
  • Configure Credential Manager
  • Configure Local Accounts
  • Configure Microsoft Accounts
  • Configure Device Registration
  • Configure Windows Hello for Business
  • Configure Device Guard
  • Credential Guard
  • Configure Device Health Attestation
  • Configure UAC Behavior
  • Configure Dynamic Look
  • Picture Passwords-Demo
  • Workgroups-Demo
  • Domains-Demo
  • Credential Manager-Demo
  • Configure Local Accounts-Demo
  • Dynamic Lock-Demo
Module 15 : Configure Advanced Management Tools
  • Module 15 Workbook
  • Configure Advanced Management Tools
  • Configure Device Manager
  • Configure and use the MMC
  • Configure Task Schedule
  • Configure Automation of Mgmt Task Using Windows PowerShell
  • Convert Group Policy Objects to MDM Policies using the MDM
  • Services-Demo
  • Using the MMC-Demo
  • Task Scheduler-Demo
  • Opening PowerShell and the Integrated Scripting Environment-Demo
Module 1: Intro and what will this course cover?
  • Managing Different Personalities Intro
Module 2: My Story and background
  • My Story
Module 3: Let's get on the same page
  • Let's Start Together on the Same Page
Module 4: Two personality types
  • Two Types of Personalities
Module 5: A Good vs Bad Manager
  • Good vs Bad Manager
Module 6: What are the best ways to manage your team?
  • What is the Best Way to Manage Your Team
Module 7: Mentalities to avoid
  • Mentalities to Avoid
  • Can You Be Your Employee's Friend
  • Trying To Make Everyone Happy
  • Talking Down to Your Team
Module 8: How to approach a problem with an employee?
  • How To Approach a Problem with an Employee
Module 9: Diversity in your team
  • There is A lot of Diversity Out There
Module 10: My personal difficulty with careless employees
  • My Personal Difficulties
Module 11: Discipline
  • Discipline
  • Best Practices During Discipline
Module 12: Angry employees
  • What To Do with Angry Employees
  • Is It Ok To Yell at Your Employees
Module 13: When it is time to say goodbye
  • When It Is Time to Say Goodbye
Module 14: Disrespect from your team
  • Disrespect from Your Team
  • How to Build Respect from Your Team
Module 15: Common management mistakes
  • Common Mangement Mistakes
Module 16: How do I become a better manager?
  • How Do I Become a Better Manager
Module 17: How to manage if you aren't the big, big boss
  • How To Manage a Team if You're a Middle Manager
Module 18: Dealing with other managers
  • Dealing with other Managers
Module 19: Conclusion and summary of course
  • Summary
Module 1 – The Pen Test Engagement
  • Module 1 Notes
  • 1.0 PenTest Plus Introduction
  • 1.1 PenTest Plus Topics
  • 1.2 PenTest Engagement
  • 1.3 Threat Modeling
  • 1.4 Technical Constraints
  • 1.5 PenTest Engagement Review
  • 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
  • Module 2 Notes
  • 2.1 Passive Reconnaissance part1
  • 2.2 WHOIS Act
  • 2.3 Passive Reconnaissance part2
  • 2.4 Google Hacking Act
  • 2.5 Passive Reconnaissance part3
  • 2.6 DNS Querying Act
  • 2.7 Passive Reconnaissance part4
  • 2.8 Email Server Querying Act
  • 2.9 SSL-TLS Cerfificates
  • 2.10 Shodan Act
  • 2.11 The Havester
  • 2.12 TheHarvester Act
  • 2.13 Recon-ng
  • 2.14 Recon-g Act
  • 2.14 Recon-ng-Part-2-API-key Act
  • 2.15 Maltego
  • 2.16 Have I been Pwned
  • 2.17 Punked and Owned Pwned Act
  • 2.18 Fingerprinting Organization with Collected Archives
  • 2.19 FOCA Act
  • 2.20 Findings Analysis Weaponization
  • 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
  • Module 3 Notes
  • 3.1 Active Reconnaissannce
  • 3.2 Discovery Scans Act
  • 3.3 Nmap
  • 3.4 Nmap Scans Types Act
  • 3.5 Nmap Options
  • 3.6 Nmap Options Act
  • 3.7 Stealth Scans
  • 3.8 Nmap Stealth Scans Act
  • 3.9 Full Scans
  • 3.10 Full Scans Act
  • 3.11 Packet Crafting
  • 3.12 Packet Crafting Act
  • 3.13 Network Mapping
  • 3.14 Metasploit
  • 3.15 Scanning with Metasploit Act
  • 3.16 Enumeration
  • 3.17 Banner Grabbing Act
  • 3.18 Windows Host Enumeration
  • 3.19 Winddows Host Enumeration Act
  • 3.20 Linux Host Enumeration
  • 3.21 Linux Host Enumeration Act
  • 3.22 Service Enumeration
  • 3.23 Service Enumeration Act
  • 3.24 Network Shares
  • 3.25 SMB Share Enumeration Act
  • 3.26 NFS Network Share Enumeration
  • 3.27 NFS Share Enumeration Act
  • 3.28 Null Sessions
  • 3.29 Null Sessions Act
  • 3.30 Website Enumeration
  • 3.31 Website Enumeration Act
  • 3.32 Vulnerability Scans
  • 3.33 Compliance Scans Act
  • 3.34 Credentialed Non-credentialed Scans
  • 3.35 Using Credentials in Scans Act
  • 3.36 Server Service Vulnerability Scan
  • 3.37 Vulnerability Scanning Act
  • 3.38 Web Server Database Vulnerability Scan
  • 3.39 SQL Vulnerability Scanning Act
  • 3.40 Vulnerability Scan Part 2 OpenVAS Act
  • 3.41 Web App Vulnerability Scan
  • 3.42 Web App Vulnerability Scanning Act
  • 3.43 Network Device Vulnerability Scan
  • 3.44 Network Device Vuln Scanning Act
  • 3.45 Nmap Scripts
  • 3.46 Using Nmap Scripts for Vuln Scanning Act
  • 3.47 Packet Crafting for Vulnerbility Scans
  • 3.48 Firewall Vulnerability Scans
  • 3.49 Wireless Access Point Vunerability
  • 3.50 Wireless AP Scans Act
  • 3.51 WAP Vulnerability Scans
  • 3.52 Container Security issues
  • 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
  • Module 4 Notes
  • 4.1 Physical Security
  • 4.2 Badge Cloning Act
  • 4.3 Physical Security Review
Module 5 – Social Engineering
  • Module 5 Notes
  • 5.1 Social Engineering
  • 5.2 Using Baited USB Stick Act
  • 5.3 Using Social Enginnering to Assist Attacks
  • 5.4 Phishing Act
  • 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
  • Module 6 Notes
  • 6.1 Vulnerbility Scan Analysis
  • 6.2 Validating Vulnerability Scan Results Act
  • 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
  • Module 7 Notes
  • 7.1 Password Cracking
  • 7.2 Brute Force Attack Against Network Service Act
  • 7.3 Network Authentication Interception Attack
  • 7.4 Intercepting Network Authentication Act
  • 7.5 Pass the Hash Attacks
  • 7.6 Pass the Hash Act
  • 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
  • Module 8 Notes
  • 8.1 Penetrating Wired Network
  • 8.2 Sniffing Act
  • 8.3 Eavesdropping
  • 8.4 Eavesdropping Act
  • 8.5 ARP Poisoning
  • 8.6 ARP Poisoning Act
  • 8.7 Man In The Middle
  • 8.8 MITM Act
  • 8.9 TCP Session HiJacking
  • 8.10 Server Message Blocks SMB Exploits
  • 8.11 SMB Attack Act
  • 8.12 Web Server Attacks
  • 8.13 FTP Attacks
  • 8.14 Telnet Server Attacks
  • 8.15 SSH Server Attacks
  • 8.16 Simple Network Mgmt Protocol SNMP
  • 8.17 Simple Mail Transfer Protocol SMTP
  • 8.18 Domain Name System DNS Cache Poisoning
  • 8.19 Denail of Service Attack DoS-DDoS
  • 8.20 DoS Attack Act
  • 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
  • Module 9 Notes
  • 9.1 Penetrating Wireless Networks
  • 9.2 Jamming Act
  • 9.3 Wireless Sniffing
  • 9.4 Replay Attacks
  • 9.5 WEP Cracking Act
  • 9.6 WPA-WPA2 Cracking
  • 9.7 WAP Cracking Act
  • 9.8 Evil Twin Attacks
  • 9.9 Evil Twin Attack Act
  • 9.10 WiFi Protected Setup
  • 9.11 Bluetooth Attacks
  • 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
  • Module 10 Notes
  • 10.1 Windows Exploits
  • 10.2 Dumping Stored Passwords Act
  • 10.3 Dictionary Attacks
  • 10.4 Dictionary Attack Against Windows Act
  • 10.5 Rainbow Table Attacks
  • 10.6 Credential Brute Force Attacks
  • 10.7 Keylogging Attack Act
  • 10.8 Windows Kernel
  • 10.9 Kernel Attack Act
  • 10.10 Windows Components
  • 10.11 Memory Vulnerabilities
  • 10.12 Buffer Overflow Attack Act
  • 10.13 Privilegde Escalation in Windows
  • 10.14 Windows Accounts
  • 10.15 Net and WMIC Commands
  • 10.16 Sandboxes
Module 11 – Linux Exploits
  • Module 11 Notes
  • 11.1 Linux Exploits
  • 11.2 Exploiting Common Linux Features Act
  • 11.3 Password Cracking in Linux
  • 11.4 Cracking Linux Passwords Act
  • 11.5 Vulnerability Linux
  • 11.6 Priviledge Escalation Linux
  • 11.7 Linux Accounts
  • 11.8 Linux Exploits Review
Module 12 – Mobile Devices
  • Module 12 Notes
  • 12.1 Mobile Devices
  • 12.2 Hacking Android Act
  • 12.3 Apple Exploits
  • 12.4 Moblie Devices Review
Module 13 – Specialized Systems
  • Module 13 Notes
  • 13.1 Specialized Systems
  • 13.2 Specialized Systems Review
Module 14 – Scripts
  • Module 14 Notes
  • 14.1 Scripts
  • 14.2 Powershell
  • 14.3 Python
  • 14.4 Ruby
  • 14.5 Common Scripting Elements
  • 14.6 Scripts Review
  • 14.7 Better Ping Sweep
  • 14.8 Simple Port Scanner2
  • 14.9 Multitarget Port Scanner
  • 14.10 Port Scanner with Nmap
  • 14.11 Scripts Review
Module 15 – Application Testing
  • Module 15 Notes
  • 15.1 Application Testing
  • 15.2 Reverse Engineering
Module 16 – Web App Exploits
  • Module 16 Notes
  • 16.1 Webb App Exploits
  • 16.2 Injection Attacks
  • 16.3 HTML Injection
  • 16.4 SQL Hacking – SQLmap Act
  • 16.5 Cross-Site Attacks
  • 16.6 Cross-Site Request Forgery
  • 16.7 Other Web-based Attacks
  • 16.8 File Inclusion Attacks
  • 16.9 Web Shells
  • 16.10 Web Shells Review
Module 17 – Lateral Movement
  • Module 17 Notes
  • 17.1 Lateral Movement
  • 17.2 Lateral Movement with Remote Mgmt Services
  • 17.3 Process Migration Act
  • 17.4 Passing Control Act
  • 17.5 Pivoting
  • 17.6 Tools the Enable Pivoting
  • 17.7 Lateral Movement Review
Module 18 – Persistence
  • Module 18 Notes
  • 18.1 Persistence
  • 18.2 Breeding RATS Act
  • 18.3 Bind and Reverse Shells
  • 18.4 Bind Shells Act
  • 18.5 Reverse Shells
  • 18.6 Reverse Shells Act
  • 18.7 Netcat
  • 18.8 Netcat Act
  • 18.9 Scheduled Tasks
  • 18.10 Scheduled Tasks Act
  • 18.11 Services and Domains
  • 18.12 Persistence Review
Module 19 – Cover Your Tracks
  • Module 19 Notes
  • 19.1 Cover Your Tracks
  • 19.2 Cover Your Tracks – Timestomp Files Act
  • 19.3 Cover Your Tracks – Frame the Administrator Act
  • 19.4 Cover Your Tracks – Clear the Event Log Act
  • 19.5 Cover Your Tracks Review
Module 20 – The Report
  • Module 20 Notes
  • 20.1 The Report
  • 20.2 The Report Review
Module 21 – Post Engagement Cleanup
  • Module 21 Notes
  • 21.1 Post Engagement Cleanup_1
  • 21.3 Post Engagement Cleanup Review
  • 21.4 PenTest Plus Conclusion.mp4
Module 1 : Getting Certified to take the Examination
  • Intro
Module 2 : Techniques for Preparing for and Taking the Examination
  • Getting Certified to take the Exam
  • Techniques for Preparing for the Exam
Module 3 : Project Management Framework
  • PMBOK Framework prt1
  • PMBOK Framework prt2
  • PMBOK Framework prt3
Module 4 : Project Integration Management
  • Project Integration Mgmt
  • Project Integration Mgmt prt2
  • Integration Questions
Module 5 : Project Scope Management
  • Project Scope Mgmt
  • Project Scope Mgmt prt2
  • Scope Questions
Module 6 : Project Schedule Management
  • Project Schedule Mgmt
  • Project Schedule Mgmt prt2
  • Project Schedule Mgmt prt3
  • Schedule Knowledge Questions
Module 7 : Project Cost Management
  • Project Cost Mgmt
  • Earned Value Mgmt
  • Trend Analysis
  • Cost Questions
Module 8 : Project Quality Management
  • Project Quality Mgmt
  • Quality Zero Defects
  • Control Quality
  • Quality Questions
Module 9 : Project Resource Management
  • Project Resource Mgmt
  • Estimate Activity Resources
  • Manage Team
  • Resource Histogram
  • Resource Questions
Module 10 : Project Communications Management
  • Project Communication Mgmt
  • Communication Methods
  • Communications
  • Communication Questions
Module 11 : Project Risk Management
  • Project Risk Mgmt
  • Identify Risk
  • Quantitive Risk Analysis
  • Plan Risk Responses
  • Risk Questions
Module 12 : Project Procurement Management
  • Project Procurement
  • Make or Buy
  • Share
  • Procurement Documents
  • Negotiations
  • Procurement Questions
Module 13 : Project Stakeholder Management
  • Project Stakeholder Mgmt
  • Plan Stakeholder Engagement
  • Project Stakeholder Questions
  • CAPM Conclusion
Module 1 – Risk Management
  • Module 1 Notes
  • Intro CASP
  • CASP Introduction
  • Mod 1.1 Exploring Cloud Services Act
  • Mod 1.1 Acquisition Merger Demerger
  • Mod 1.1 Acquisition Merger Demerger Part2
  • Mod 1.2 Compare and Contrast
  • Mod 1.3 Given Scenario Execute Risk
  • Mod 1.3 Given Scenario Execute Risk Part2
  • Mod 1.3 Continuing Terminology IT Governance
  • Mod 1.4 Analyze Security Solution Metrics and Attributes
  • Mod 1.4 Analyze Risk
  • Mod 1.4 Trend Analysis Act
Module 2 – Enterprise Security Architecture
  • Module 2 Notes
  • Mod 2 Enterprise Security Architecture
  • Mod 2.1 Network Device Security Act
  • Mod 2.1 Application and Protocol
  • Mod 2.1 Advanced Network Security Act
  • Mod 2.1 Complex Network Security Solution
  • Mod 2.1 Implementing VLANs Switchport Sec Act
  • Mod 2.1 Implementing VLANs Switchport Sec Act Part2
  • Mod 2.1 Distributed Denial of Service
  • Mod 2.1 Exploring DoS Attacks Act
  • Mod 2.1 Security Zones
  • Mod 2.1 Network Access Control
  • Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
  • Mod 2.2 Analyze a Scenario Integrate Security
  • Mod 2.2 Configuring Windows Firewall Act
  • Mod 2.2 Log Monitoring and Auditing
  • Mod 2.2 Group Policy Act
  • Mod 2.2 Patch Management
  • Mod 2.2 Management Interface
  • Mod 2.2 Measured Launch
  • Mod 2.3 Analyze a Scenario to Integrate Security Controls
  • Mod 2.3 Security Implications Privacy
  • Mod 2.3 Baseband
  • Mod 2.4 Given Software Vulnerabilty Scenarios
  • Mod 2.4 SQL Injection Act
  • Mod 2.4 Improper Error and Exception Handling
  • Mod 2.4 Buffer Overflows Act
  • Mod 2.4 Memory Leaks
  • Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 – Enterprise Security Operations
  • Module 3 Notes
  • Mod 3 Enterprise Security Operations
  • Mod 3 Runtime Debugging
  • Mod 3.1 Fingerprinting an OS Services Act
  • Mod 3.1 Code Review
  • Mod 3.1 Conducting OSINT Act
  • Mod 3.1 Types
  • Mod 3.1 Conducting a Vulnerability Assessment Act
  • Mod 3.2 Analyze a Scenario Output
  • Mod 3.2 Network Sniffing Act
  • Mod 3.2 Security Content Automation
  • Mod 3.2 Using a SCAP Scanner Act
  • Mod 3.2 Network Enumerator
  • Mod 3.2 Password Cracking Act
  • Mod 3.2 Host Vulnerability Scanner
  • Mod 3.2 Using Command Line Tools Act
  • Mod 3.2 OpenSSL
  • Mod 3.2 Scanning for Heartbleed Act
  • Mod 3.2 Local Exploitation Tools
  • Mod 3.2 Verifying File Integrity with SFC Act
  • Mod 3.2 Log Analysis Tools
  • Mod 3.3 Given Scenario Implement Incident
  • Mod 3.3 Facilitate Incident Detection Response
  • Mod 3.3 Using Incident Response Support Tools Act
  • Mod 3.3 Severity of Incident Detection Breach
Module 4 – Technical Integration of Enterprise Security
  • Module 4 Notes
  • Mod 4 Technical Integration of Enterprise
  • Mod 4 Technical Integration of Enterprise Part2
  • Mod 4.1 DataSecurity Considerations
  • Mod 4.1 Examing Network Diagrams Act
  • Mod 4.1 Security and Privacy Considerations of Storage integration
  • Mod 4.1 Exploring Directory Services and DNS Act
  • Mod 4.2 Given Scenario Integrate Cloud and Virtualization
  • Mod 4.2 Taking Another Look at Cloud Services Act
  • Mod 4.2 Security Advantages and Disadvanatges of Virtualization
  • Mod 4.2 Using Virtualization Act
  • Mod 4.2 Cloud Augmented Security
  • Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
  • Mod 4.4 Given Scenario Cryptographic
  • Mod 4.4 Cryptographic Part2
  • Mod 4.4 Mobile Device Encryption
  • Mod 4.4 Cryptography Act
  • Mod 4.5 Select the Appropriate Control
  • Mod 4.5 Phising Act
  • Mod 4.5 Telephony VoIP Integration
Module 5 – Research, Development and Collaboration
  • Module 5 Notes
  • Mod 5 Research Methods to Determine Industry Trends
  • Mod 5.1 Practicing Threat Intelligence Act
  • Mod 5.2 Scenario Implememt Security Activities Across
  • Mod 5.2 Static Testing
  • Mod 5.3 Explain the Importance of Interaction
  • CASP Conclusion
Module 1 Online Lead Generation
  • Intro to Social Media Digital Marketing
  • Online Lead Generation prt1
  • Online Lead Generation prt2
  • Lead Examples
  • Live Streaming Video for Leads
  • Lead Generation
  • Using Your Customers
  • Be Ready
Module 2 Facebook, LinkedIn, and YouTube 101
  • Create a Facebook Business Page
  • Facebook Setup
  • Marketing in Facebook Groups
  • Messenger Bots
  • More on Messenger
  • Facebook Video using InShot
  • Repurposing
  • Setting Up LinkedIn Pro le
  • Benefits of YouTube
Module 3 List Building & Email Marketing
  • Email List prt1
  • Email List prt2
  • MailChimp prt1
  • MailChimp prt2
  • Email Content Ideas
  • Email summary
Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps
  • Canva Image Creation
  • Making a video with your phone
  • InShot video
  • Purpose Video Marketing
  • Transcribing Video
  • Word Swag
  • Ripl
  • Instagram prt1
  • Instagram prt2
  • Instagram prt3
Module 5 Sales Funnels
  • Click Funnel prt1
  • Click Funnel prt2
  • Funnel Building prt1
  • Funnel Building prt2
Module 6 Apps & Tools Review
  • Social Media apps
  • Podcasting
  • Customer Value Letter
  • Tips and Tricks
  • Fiverr
  • Outro
Module 1
  • Introduction
  • Photography Basics
  • Photography Basics prt 2
  • Questions and Answers
  • Questions and Answers prt 2
  • Questions and Answers prt 3
  • Basic Accessories
  • Basic Accessories prt 2
  • Lenses
  • DSLR vs DSLM
  • Studio shoot
  • Studio shoot with model prt 1
  • Studio shoot with model prt 2
  • Studio green-screen shoot
  • Common Questions
  • Common Questions prt 2
  • Basic Editing
  • Levitation and Transferring Images to Your PC
  • Levitation and Importing into PhotoShop
  • Logo and Watermark
  • Deleting Backgrounds
  • Product Photography
  • Website
  • Website Images prt 2
  • Real Estate Photography
  • Branding
  • Camera phone
  • Accessories for Mobile Phones and GoPro
  • Conclusion
Starting Your Own YouTube Channel
  • Welcome to the course
  • What Will Your Channel Be About?
  • Recording Device
  • Your Competition
  • Your Normal Video Formula
  • Your Apprearance
  • Your Personality On Camera
  • Beware of Copy-written Content
  • Elements To Make Your Channel and Videos Better Part 1
  • Elements To Make Your Channel and Videos Better Part 2
  • Sound Quality
  • Post Schedule
  • Doing Too Much
  • Community Interaction
  • Trolls and Negative Comments
  • Fancy Equipment Or Not
  • Patience
  • Conclusion
Module 1: Deploy a Microsoft Azure SQL Database
  • Introduction
  • Introducing the Azure SQL Database Part 1
  • Introducing the Azure SQL Database Part 2
  • Setting Up Azure Lab
  • Chose a Service Tier Part 1
  • Chose a Service Tier Part 2
  • Create Servers and Databases Part 1
  • Creating a Azure SQL Server and Database Lab
  • Create Servers and Databases Part 2
  • Create Servers and Databases Part 3
  • Connecting SSMS to Azure SQL Lab Part 1
  • Connecting SSMS to Azure SQL Lab Part 2
  • Create a Sysadmin Account
  • Creating Azure SQL Logins and Users Lab
  • Congure Elastic Pools
  • Creating and Conguring an Elastic Pool Lab
Module 2: Plan for SQL Server Installation
  • Plan for an IaaS or On-Premises Deployment Part 1
  • Plan for an IaaS or On-Premises Deployment Part 2
  • Select the Appropriate Size for a Virtual Machine
  • Plan Storage Pools Based on Performance Requirements Part 1
  • Plan Storage Pools Based on Performance Requirements Part 2
  • Evaluate Best Practices for Installation
  • Design a Storage Layout for a SQL Server Virtual Machine
Module 3: Deploy SQL Server Instances
  • Deploy a SQL Server Instance in IaaS and On-Premises
  • Restoring AdventureWorks 2016 Database Lab
  • Provision an Azure Virtual Machine to Host a SQL Server Instance
  • Provisioning an Azure Virtual Machine to Host a SQL Server Lab
  • Manually Install SQL Server on an Azure Virtual Machine
  • Installing SQL 2016 Lab Part 1
  • Installing SQL 2016 Lab Part 2
  • Automate the Deployment of SQL Server Databases
  • Exploring Azure SQL Database Automation Lab
  • Deploy SQL Server by Using Templates
  • Managing JSON Templates Lab
Module 4: Deploy SQL Server Databases to Azure Virtual Machines
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 1
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 2
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 3
  • Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 4
  • Generate Benchmark Data for Performance Needs
  • Generating Benchmark Data Lab Part 1
  • Generating Benchmark Data Lab Part 2
  • Perform Performance Tuning on Azure IaaS
  • Perform Performance Tuning on Azure IaaS Lab Part 1
  • Perform Performance Tuning on Azure IaaS Lab Part 2
  • Support Availability Sets in Azure Part 1
  • Support Availability Sets in Azure Part 2
  • Manage High Availability Lab Part 1
  • Manage High Availability Lab Part 2
  • Manage High Availability Lab Part 3
  • Manage High Availability Lab Part 4
  • Manage High Availability Lab Part 5
Module 5: Configure Secure Access to Microsoft Azure SQL Databases
  • Configure Firewall Rules
  • Creating Firewall Rules Lab
  • Configure Always Encrypted for Azure SQL Database
  • Implementing Always Encrypted Lab
  • Configure Cell-Level Encryption
  • Cell-Level Encryption Lab
  • Configure Dynamic Data Masking
  • Dynamic Data Masking Lab
  • Configure Transparent Data Encryption (TDE)
  • Transparent Data Encryption (TDE) Lab
Module 6: Configure SQL Server performance settings
  • Configure SQL Performance Settings
  • Configuring SQL Performance Settings Lab
  • Configure Max Server Memory
  • Configuring SQL Memory Lab
  • Configure Database Performance Settings
  • Configure Database Performance Settings Lab
  • Configure Operators and Alerts
  • Configure alerts in Azure and On-Premise SQL Server Lab
Module 7: Manage SQL Server instances
  • Create Databases
  • Creating Databases Lab
  • Manage Files and File Groups
  • Managing Files and File Groups Lab
  • Manage System Database Files
  • Manage System Database Files Lab
  • Configure tempdb
  • Configure tempdb Lab
Module 8: Manage SQL Storage
  • Manage SMB File Shares
  • Manage SMB File Shares Lab
  • Manage Stretch Databases
  • Configure Azure Storage
  • Change Service Tiers
  • Change Service Tiers Lab Part 1
  • Review Wait Statistics
  • Manage Storage Pools
  • Recover from Failed Storage
  • Managing Storage Lab Part 1
  • Managing Storage Lab Part 2
Module 9: Perform Database Maintenance
  • Monitoring Tools
  • Using Monitoring Tools Lab Part 1
  • Using Monitoring Tools Lab Part 2
  • Azure Performance Tuning
  • Automate Maintenance Tasks
  • Update Statistics and Indexes
  • Update Statistics and Indexes Lab Part 1
  • Update Statistics and Indexes Lab Part 2
  • Verify Database Integrity
  • Verify Database Integrity Lab
  • Recover from Database Corruption
  • Recover from Database Corruption Lab
  • Conclusion
Module 1: Configure Encryption
  • Introduction
  • Exam Objectives and Lab Setup
  • Restoring AdventureWorks 2016 Database Lab Part 1
  • Restoring AdventureWorks 2016 Database Lab Part 2
  • Restoring AdventureWorks 2016 Database Lab Part 3
  • Configure Encryption
  • Cell-Level Encryption Part 1
  • Cell-Level Encryption Part 2
  • Cell-Level Encryption Lab Part 1
  • Cell-Level Encryption Lab Part 2
  • Transparent Data Encryption
  • Transparent Data Encryption Lab
  • Always Encrypted
  • Always Encrypted Lab
  • Backup Encryption
  • Backup Encryption Lab
  • Connection Encryption
  • Encryption Troubleshooting
Module 2: Configure Data Access and Permissions
  • Create and Maintain Users
  • Create and Maintain Users Lab Part 1
  • Create and Maintain Users Lab Part 2
  • Configure and Maintain Custom Roles
  • Configure and Maintain Custom Roles Lab
  • Manage Database Object Permissions Part 1
  • Manage Database Object Permissions Part 2
  • Manage Database Object Permissions Lab Part 1
  • Manage Database Object Permissions Lab Part 2
  • Configure User Options for Azure SQL Database
  • Configure Row-Level Security
  • Configure Dynamic Data Masking
  • Configure Dynamic Data Masking Lab
Module 3: Configure Auditing
  • Manage a SQL Server Audit
  • Manage a SQL Server Audit Lab
  • Query the SQL Server Audit Log
  • Manage an Azure SQL Server Audit
Module 4: Develop a Backup Strategy
  • Backup Types Part 1
  • Backup Types Part 2
  • Manage, Backup, and Restore Databases Lab Part 1
  • Manage, Backup, and Restore Databases Lab Part 2
  • Backup Very Large Databases Part 1
  • Backup Very Large Databases Part 2
  • Backup Very Large Databases Part 3
  • Backup Very Large Databases Part 4
  • 4.9 Managing Very Large Databases Lab Part 1
  • 4.10 Managing Very Large Databases Lab Part 2
  • 4.11 Managing Very Large Databases Lab Part 3
  • Configure Alerting for Failed Backups
  • Configure Alerting for Failed Backups Lab Part 1
  • Configure Alerting for Failed Backups Lab Part 2
  • Back up Databases to Azure
  • Manage Transaction Log Backups
  • Configure Database Recovery Models
  • Set Database Recovery Model Lab
  • Configure Backup Automation
  • Configure Backup Automation Lab
Module 5: Restore Databases
  • Perform Piecemeal Restores
  • Restore Databases Lab Part 1
  • Restore Databases Lab Part 2
  • Restore Databases Lab Part 3
  • Perform Page Recovery
  • Perform Point-in-Time Recovery
  • Perform Point-in-Time Recovery Lab
  • Restore File Groups
  • Develop a Plan to Automate and Test Restores
Module 6: Manage Database Integrity
  • Implement Database Consistency Checks
  • Implement Database Consistency Checks Lab
  • Identify Database Corruption
  • Recover From Database Corruption
Module 7: Monitor Database Activity
  • Monitor Current Sessions
  • Monitor Current Sessions Lab
  • Identify Sessions that Cause Blocking Activity
  • Identify Sessions that Consume tempdb Resources
  • Configure the Data Collector
Module 8: Monitor Queries
  • Manage the Query Store
  • Manage the Query Store Lab
  • Configure Extended Events and Trace Events
  • Identify Problematic Execution Plans
Module 9: Manage Indexes
  • Identify and Repair Index Fragmentation
  • Identify and Create Missing Indexes
  • Identify and Drop Underutilized Indexes
  • Manage Existing Columnstore Indexes Part 1
  • Manage Existing Columnstore Indexes Part 2
  • Partitioned Tables
Module 10: Monitor SQL Server Instances
  • Create and Manage Operators
  • Create and Manage SQL Agent Alerts
  • Configure Policy-Based Management
  • Configure Policy-Based Management Lab
  • Identify Available Space on Data Volumes
  • Identify the Cause of- Manage Performance Degradation
  • Identify the Cause of- Manage Performance Degradation Lab Part 1
  • Identify the Cause of- Manage Performance Degradation Lab Part 2
Module 11: Implement Log Shipping
  • Configure and Monitor Log Shipping
  • Configure and Monitor Log Shipping Lab Part 1
  • Configure and Monitor Log Shipping Lab Part 2
Module 12: Implement Failover Cluster Instances
  • Windows Server Failover Cluster
  • Manage Shared Disks
  • Configure Cluster Shared Volumes
  • Configuring WSFC Lab
Module 13: Implement Always On Availability Groups
  • Database Mirroring
  • Create an Availability Group
  • Manage Failover
  • Configure Read-Only Routing
  • Create Distributed Availability Groups
  • Configuring Always On Availability Group Lab Part 1
  • Configuring Always On Availability Group Lab Part 2
  • Conclusion
Module 1
  • 1.1 Introduction
  • 1.2 What is Flash Animate
  • 1.3 Creating A New Document in Flash and Exploring the Interface
  • 1.4 Drawing in Flash Part 1
  • 1.5 Drawing in Flash Part 2
  • 1.6 Frame by Frame Animating in Flash Part 1
  • 1.7 Frame by Frame Animating in Flash Part 2
  • 1.8 Saving, Rendering, and Exporting
  • 1.9 Animating with Symbols Part 1
  • 1.10 Animating with Symbols Part 2
  • 1.11 Animating with Symbols Part 3
  • 1.12 Different Types of Tweening Part 1
  • 1.13 Different Types of Tweening Part 2
  • 1.14 Nesting Symbols
  • 1.15 Importing Graphics Part 1
  • 1.16 Importing Graphics Part 2
  • 1.17 Masking Part 1
  • 1.18 Masking Part 2
  • 1.19 Camera and Parallax Scrolling Part 1
  • 1.20 Camera and Parallax Scrolling Part 2
  • 1.21 Camera and Parallax Scrolling Part 3
  • 1.22 Rotoscoping Part 1
  • 1.23 Rotoscoping Part 2
  • 1.24 Rotoscoping Part 3
  • 1.25 Rotoscoping Part 4
  • 1.26 Rotoscoping Part 5
  • 1.27 Rotoscoping Part 6
  • 1.28 Rotoscoping Part 7
  • 1.29 Creating a Puppet Part 1
  • 1.30 Creating a Puppet Part 2
  • 1.31 Creating a Puppet Part 3
  • 1.32 Creating a Puppet Part 4
  • 1.33 Creating a Puppet Part 5
  • 1.34 Creating a Puppet Part 6
  • 1.35 Animating a Puppet Part 1
  • 1.36 Animating a Puppet Part 2
  • 1.37 Animating a Puppet Part 3
  • 1.38 Animating a Puppet Part 4
  • 1.39 Cycles
  • 1.40 Interchangeable Parts
  • 1.41 Interactivity
  • 1.42 Text Part 1
  • 1.43 Text Part 2
  • 1.44 Animating with Code
  • 1.45 Dialog Part 1
  • 1.46 Dialog Part 2
  • 1.47 Dialog Part 3
  • 1.48 Dialog Part 4
  • 1.49 Controlling the Timeline Part 1
  • 1.50 Controlling the Timeline Part 1
  • 1.51 Putting Together an Interactive eCard Part 1
  • 1.52 Putting Together an Interactive eCard Part 2
  • 1.53 Putting Together an Interactive eCard Part 3
  • 1.54 Putting Together an Interactive eCard Part 4
  • 1.55 Putting Together an Interactive eCard Part 5
  • 1.56 Bone Tool
  • 1.57 Conclusion
Module 1: Installing and Configuring Domain Controllers
  • Introduction
  • Overview of Identity Management Concepts Part 1
  • Overview of Identity Management Concepts Part 2
  • Active Directory Domain Services Components Part 1
  • Active Directory Domain Services Components Part 2
  • Active Directory Domain Services Components Part 3
  • Overview of ADDS Domain Services Part 1
  • Overview of ADDS Domain Services Part 2
  • Deploying Domain Controllers Part 1
  • Deploying Domain Controllers Part 2
  • Deploying Domain Controllers Part 3
Module 2: Managing AD DS Objects
  • Overview of Object Management Part 1
  • Overview of Object Management Part 2
  • Managing User Accounts Part 1
  • Managing User Accounts Part 2
  • Managing User Accounts Part 3
  • Managing User Accounts Part 4
  • Managing User Accounts Part 5
  • Managing Groups Part 1
  • Managing Groups Part 2
  • Managing Groups Part 3
  • Managing Computer Accounts Part 1
  • Managing Computer Accounts Part 2
  • Managing Organizational Units Part 1
  • Managing Organizational Units Part 2
Module 3: Securing Active Directory Domain Services
  • Managing Organizational Units Part 1
  • Managing Organizational Units Part 2
  • Implementing Account Security Part 1
  • Implementing Account Security Part 2
  • Auditing AD DS
  • Configuring Managed Service Accounts
Module 4: Working with Complex AD Infrastructures
  • Overview of Advanced AD DS Deployments
  • Deploying a Distributed AD DS Environment Part 1
  • Deploying a Distributed AD DS Environment Part 2
  • Deploying a Distributed AD DS Environment Part 3
  • Overview of AD DS Replication
  • Configuring AD DS Services Part 1
  • Configuring AD DS Services Part 2
  • Configuring AD DS Services Part 3
Module 5: Implementing Group Policy
  • Overview of Group Policy Part 1
  • Overview of Group Policy Part 2
  • Overview of Group Policy Part 3
  • Creating and Configuring GPOs Part 1
  • Creating and Configuring GPOs Part 2
  • Monitoring and Troubleshooting Group Policy
  • Managing Security Options for Computers using Group Policy Part 1
  • Managing Security Options for Computers using Group Policy Part 2
  • Managing User Environments Part 1
  • Managing User Environments Part 2
  • Managing User Environments Part 3
Module 6: Understanding Microsoft Azure AD and Directory Synchronization
  • Planning Directory Synchronization Part 1
  • Planning Directory Synchronization Part 2
  • Implementing Azure AD Connect Part 1
  • Implementing Azure AD Connect Part 2
  • Managing Identities with Directory Synchronization
Module 7: Monitoring and Recovering AD DS
  • Monitoring AD DS Part 1
  • Monitoring AD DS Part 2
  • Monitoring AD DS Part 3
  • Database Management
  • ackup and Recovery in AD DS Part 1
  • Backup and Recovery in AD DS Part 2
Module 8: Implementing Active Directory Certificate Services
  • Overview of Public Key Infrastructure and AD CS Part 1
  • Overview of Public Key Infrastructure and AD CS Part 2
  • Deploying Certificate Authority Hierarchy
  • Administering Certificate Authorities
  • Deploying and Managing Certificates Part 1
  • Deploying and Managing Certificates Part 2
  • Managing Revocation and Distribution
  • Configuring Certificate Recovery
Module 9: Implementing Active Directory Federation Services
  • Overview of AD FS
  • Planning and Deploying AD FS
  • Overview of Web Application Proxy
Module 10: Implementing Active Directory Rights Management Services
  • Overview of AD RMS
  • Deploying AD RMS
  • Protecting with AD RMS
  • Conclusion
Module 1: Plan and Implement IPv4 and IPv6 Networks
  • Introduction
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
  • Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
  • Configuring IPv4 Hosts Part 1
  • Configuring IPv4 Hosts Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 1
  • Managing and Troubleshooting IPv4 Connectivity Part 2
  • Managing and Troubleshooting IPv4 Connectivity Part 3
  • Implementing IPV6 for Network Hosts Part 1
  • Implementing IPV6 for Network Hosts Part 2
  • Implementing IPV6 for Network Hosts Part 3
  • Implementing IPv6 Transitioning and Coexistence
Module 2: Installing and Configuring DHCP
  • Overview of DHCP Server Role Part 1
  • Overview of DHCP Server Role Part 2
  • Deploying DHCP Part 1
  • Deploying DHCP Part 2
  • Deploying DHCP Part 3
  • Deploying DHCP Part 4
  • Deploying DHCP Part 5
  • Managing and Troubleshooting DHCP Part 1
  • Managing and Troubleshooting DHCP Part 2
  • Managing and Troubleshooting DHCP Part 3
  • Managing and Troubleshooting DHCP Part 4
  • Managing and Troubleshooting DHCP Part 5
Module 3: Installing and Configuring DNS
  • Implementing DNS Servers Part 1
  • Implementing DNS Servers Part 2
  • Implementing DNS Servers Part 3
  • Creating and Configuring DNS Zones Part 1
  • Creating and Configuring DNS Zones Part 2
  • Creating and Configuring DNS Zones Part 3
  • Creating and Configuring DNS Zones Part 4
  • Understanding Active Directory Integration Part 1
  • Configuring Advanced DNS Settings Part 1
  • Configuring Advanced DNS Settings Part 2
  • Configuring Advanced DNS Settings Part 3
  • Troubleshooting DNS Name Resolution Part 1
  • Troubleshooting DNS Name Resolution Part 2
Module 4: Implementing and Managing IP Address Management
  • Overview of IPAM Part 1
  • Overview of IPAM Part 2
  • IPAM Deployment and Administration Part 1
  • IPAM Deployment and Administration Part 2
  • IPAM Deployment and Administration Part 3
  • Managing IP Address Spaces by Using IPAM
Module 5: Implementing Remote Access
  • Remote Access Overview Part 1
  • Remote Access Overview Part 2
  • Remote Access Overview Part 3
  • Implementing the Web Application Proxy
  • Planning and Implementing Virtual Private Networks Part 1
  • Planning and Implementing Virtual Private Networks Part 2
  • Planning and Implementing Virtual Private Networks Part 3
  • Planning and Implementing Virtual Private Networks Part 4
  • Planning and Implementing Virtual Private Networks Part 5
  • Overview of Direct Access Part 1
  • Overview of Direct Access Part 2
  • Implementing Direct Access Part 1
  • Implementing Direct Access Part 2
  • Implementing Direct Access Part 3
Module 8: Securing the Network Infrastructure
  • Using the Windows Firewall with Advanced Security Part 1
  • Using the Windows Firewall with Advanced Security Part 2
  • Utilizing IP Security Part 1
  • Utilizing IP Security Part 2
  • Conclusion
Module 1: What is Animation and the Basics
  • 1.1 Introduction
  • 1.2 What is Animation – Part1
  • 1.3 What is Animation – Part2
  • 1.4 Bouncy Ball Demo – Part1
  • 1.5 Bouncy Ball Demo – Part2
  • 1.6 Bouncy Ball Demo – Part3
  • 1.7 Pendulum Demo – Part1
  • 1.8 Pendulum Demo – Part2
  • 1.9 Platform Pendulum Demo – Part1
  • 1.10 Platform Pendulum Demo – Part2
  • 1.11 Principles of Animation – Part1
  • 1.12 Principles of Animation – Part2
  • 1.13 Bouncy Ball in Perspective Demo – Part1
  • 1.14 Bouncy Ball in Perspective Demo – Part2
  • 1.15 Flag Wave Demo – Part1
Module 2: Intermediate Animation Techniques
  • 2.1 Weight Demo – Part1
  • 2.2 Weight Demo – Part2
  • 2.3 Weight Demo- Part3
  • 2.4 Breaking a Character Down Into Basic Shapes – Part1
  • 2.5 Breaking a Character Down Into Basic Shapes – Part2
  • 2.6 Breaking a Character Down Into Basic Shapes – Part3
  • 2.7 Boil Demo – Part1
  • 2.8 Boil Demo – Part2
  • 2.9 A Take Demo – Part1
  • 2.10 A Take Demo – Part2
  • 2.11 Staggering Demo – Part1
  • 2.12 Staggering Demo – Part2
  • 2.13 Staggering Demo – Part3
  • 2.15 Head Turn Demo – Part1
  • 2.16 Head Turn Demo – Part2
  • 2.17 Head Turn Demo – Part3
  • 2.18 Head Turn Demo – Part4
  • 2.19 Walk Cycles Demo – Part1
  • 2.20 Walk Cycles Demo – Part2
  • 2.21 Walk Cycles Demo – Part3
  • 2.22 Run Cycles Demo
  • 2.23 Dialogue Demo – Part1
  • 2.24 Dialogue Demo – Part2
  • 2.25 Dialogue Demo – Part3
  • 2.26 Dialogue Demo – Part4
  • 2.27 Conclusion
Module 1: Introduction to Premiere and Getting Started on an Editing Project
  • 1.1 Course Introduction
  • 1.2 Introduction to Premiere Pro CC
  • 1.3 Creating a New Project
  • 1.4 Workspace Layout
  • 1.5 Importing Media
  • 1.6 Organizing Media
  • 1.7 Monitoring Footage
  • 1.8 Navigating the Source Monitor
  • 1.9 Creating a Sequence
  • 1.10 Editing Video Part 1
  • 1.11 Editing Video Part 2
  • 1.12 Editing with Multi Source Sequence Part 1
  • 1.13 Editing with Multi Source Sequence Part 2
  • 1.14 Editing with Multi Source Sequence Part 3
  • 1.15 Adding Titles
Module 2: More Editing Techniques and Completing a Project
  • 2.1 Editing Using Program Monitor
  • 2.2 Advanced Editing Techniques
  • 2.3 Inserting Graphics
  • 2.4 Adding Music
  • 2.5 Adjusting Audio
  • 2.6 Using The Tools In Tool Panel
  • 2.7 Trimming Using The Program Monitor
  • 2.8 Track Monitoring And Algorithm
  • 2.9 Transitions
  • 2.10 Basic Effects
  • 2.11 Manipulate Clip Speed
  • 2.12 Color Correction
  • 2.14 Exporting A Project
  • 2.15 Conclusion
Module 1: Tools and Effects in Photoshop
  • 1.1 Introduction
  • 1.2 Exploring the Tools and Work Area – Part1
  • 1.3 Exploring the Tools and Work Area – Part2
  • 1.4 Exploring the Tools and Work Area – Part3
  • 1.5 Exploring the Tools and Work Area – Part4
  • 1.6 Layers in Photoshop – Part1
  • 1.7 Layers in Photoshop – Part2
  • 1.8 Layers in Photoshop – Part3
  • 1.9 Crop and Transform
  • 1.10 Working with Text – Part1
  • 1.11 Working with Text – Part2
  • 1.12 Filters in Photoshop
  • 1.13 Layer Styles
  • 1.14 Adjustment Layers – Part1
  • 1.15 Adjustment Layers – Part2
Module 2: Creating Projects in Photoshop
  • 2.1 Photo Retouching Methods – Part1
  • 2.2 Photo Retouching Methods – Part2
  • 2.3 Creating a Poster Design – Part1
  • 2.4 Creating a Poster Design – Part2
  • 2.5 Creating a Poster Design – Part3
  • 2.6 Creating a Poster Design – Part4
  • 2.7 Coloring Digital Art – Part1
  • 2.8 Coloring Digital Art – Part2
  • 2.9 Coloring Digital Art – Part2
  • 2.10 Colorizing a Black and White Photo – Part1
  • 2.11 Colorizing a Black and White Photo – Part2
  • 2.12 Creating a Website Design – Part1
  • 2.13 Creating a Website Design – Part2
  • 2.14 Creating a Website Design – Part3
  • 2.15 Exporting in Photoshop
  • 2.16 Conclusion
Module 1
  • 1.1 Introduction
  • 1.2 What is InDesign
  • 1.3 Creating a New Document
  • 1.4 Importing Images – Part1
  • 1.5 Importing Images – Part2
  • 1.6 Vector vs. Pixels
  • 1.7 Exploring the InDesign Work Area
  • 1.8 Master Pages
Module 2
  • 2.1 Typography – Part1
  • 2.2 Typography – Part2
  • 2.3 Creating Tables
  • 2.4 Packaging
  • 2.5 Principle of Design
  • 2.6 Knowing Your Output
  • 2.7 Advanced Techniques in InDesign
  • 2.8 Using InDesign for Ineractivity
  • 2.9 Scripts
  • 2.10 Exporting
  • 2.11 Conclusion
Module 1: Tools and Effects in Illustrator
  • 1.1 Course Introduction
  • 1.2 Introduction to Adobe Illustrator
  • 1.3 Basic Tools in Illustrator
  • 1.4 Working with Shapes
  • 1.5 Fills and Strokes
  • 1.6 Pencil Tool
  • 1.7 Pen Tool
  • 1.8 Brush Tool
  • 1.9 Compound Path
  • 1.10 Gradients
  • 1.11 Layers and Grooves
  • 1.12 Transparency and Graphic Style
  • 1.13 Transforming, Moving and Rotating Objects
  • 1.14 Type Tool
  • 1.15 Blending Shapes and Colors
  • 1.16 Basic Effects in Illustrator
  • 1.17 Image Trace Tool
Module 2: Creating Projects in Illustrator
  • 2.1 Creating a Caricature Part 1
  • 2.2 Creating a Caricature Part 2
  • 2.3 Creating a Caricature Part 3
  • 2.4 Creating a Caricature Part 4
  • 2.5 Recreating a Wonka Bar Logo Part 1
  • 2.6 Recreating a Wonka Bar Logo Part 2
  • 2.7 Creating a Logo
  • 2.8 Recreating a Pablo Picasso Painting Part 1
  • 2.9 Recreating a Pablo Picasso Painting Part 2
  • 2.10 Recreating a Pablo Picasso Painting Part 3
  • 2.11 Recreating a Pablo Picasso Painting Part 4
  • 2.12 Recreating a Pablo Picasso Painting Part 5
  • 2.13 Recreating a Pablo Picasso Painting Part 6
  • 2.14 Exporting
  • 2.15 Conclusion
Module 1: Introduction to After Effects
  • 1.1 Introduction
  • 1.2 What is After Effects?
  • 1.3 Creating a New Project in After Effects
  • 1.4 Creating and Animating Primitive Shapes Demo – Part1
  • 1.5 Creating and Animating Primitive Shapes Demo -Part2
  • 1.6 Simply Bouncing Ball Demo -Part1
  • 1.7 Simply Bouncy Ball Demo – Part2
  • 1.8 Complex Bouncy Ball Demo – Part1
  • 1.9 Complex Bouncing Ball Demo – Part2
  • 1.10 Exporting from After Effects
  • 1.11 Curves Editor Demo
  • 1.12 Importing Footage – Part1
  • 1.13 Importing Footage – Part2
  • 1.14 Parenting – Part1
  • 1.15 Parenting – Part2
Module 2: Intermediate Effects and Techniques in After Effects
  • 2.1 3D Layers and Cameras Demo – Part1
  • 2.2 3D Layers and Cameras Demo – Part2
  • 2.3 Animating Text Demo – Part1
  • 2.4 Animating Text Demo – Part2
  • 2.5 Animating Text Demo – Part3
  • 2.6 Animating Text Demo – Part4
  • 2.7 Importing and Syncing Audio
  • 2.8 Particles Demo – Part1
  • 2.9 Particles Demo – Part2
  • 2.10 Lights Demo
  • 2.11 Common Effects in After Effects
Module 3: More Advanced Effects and Techniques in After Effects
  • 3.1 Puppet Building Demo – Part1
  • 3.2 Puppet Building Demo – Part2
  • 3.3 Puppet Building Demo – Part3
Module 1: Installing Windows Server 2016 in Host and Compute Environments
  • Course Introduction
  • Determining Windows Server 2016-Part1
  • Determining Windows Server 2016-Part2
  • Determining Windows Server 2016-Part3
  • Determining Windows Server 2016-Part4
  • Determining Windows Server 2016-Part5
  • Installing Windows 2016-Part1
  • Installing Windows 2016-Part2
  • Installing Windows 2016-Part3
  • Installing Windows 2016-Part4
  • Installing Windows 2016-Part5
  • Managing Windows Installation With Windows PowerShell
  • Creating Managing And Maintaining Windows Images For Deployment-Part1
  • Creating Managing And Maintaining Windows Images For Deployment-Part2
  • Creating Managing And Maintaining Windows Images For Deployment-Part3
  • Creating Managing And Maintaining Windows Images For Deployment-Part4
Module 2: Configuring Active Directory Networks for Host and Compute Environments
  • Overview Of Active Directory Domain Services-Part1
  • Overview Of Active Directory Domain Services-Part2
  • Overview Of Active Directory Domain Services-Part3
  • Overview Of ADDS Domain Controllers-Part1
  • Overview Of ADDS Domain Controllers-Part2
  • Deploying Domain Controllers-Part1
  • Deploying Domain Controllers-Part2
  • Overview Of Group Policy Purpose Components And Processes-Part1
  • Overview Of Group Policy Purpose Components And Processes-Part2
  • Overview Of Group Policy Purpose Components And Processes-Part3
  • Creating And Configuring GPOs-Part1
  • Creating And Configuring GPOs-Part2
  • Security Management Using Group Policy-Part1
  • Security Management Using Group Policy-Part2
  • Security Management Using Group Policy-Part3
Module 3: Implementing Local and Enterprise Storage Solutions
  • Managing Disk And Volumes In Windows Server 2016-Part1
  • Managing Disk And Volumes In Windows Server 2016-Part2
  • Managing Disk And Volumes In Windows Server 2016-Part3
  • Managing Disk And Volumes In Windows Server 2016-Part4
  • Implementing And Managing Storage Spaces-Part1
  • Implementing And Managing Storage Spaces-Part2
  • Implementing And Managing Storage Spaces-Part3
  • Configuring Data Duplication-Part1
  • Configuring Data Duplication-Part2
  • Understanding Various Types Of Storage
  • Comparing SAN Options-Part1
  • Comparing SAN Options-Part2
  • Understanding ISNS DCB And MPIO
  • Configuring File And Folder Sharing In Windows Server-Part1
  • Configuring File And Folder Sharing In Windows Server-Part2
  • Configuring File And Folder Sharing In Windows Server-Part3
  • Configuring Advanced File Services With FSRM-Part1
  • Configuring Advanced File Services With FSRM-Part2
  • Configuring Advanced File Services With FSRM-Part3
Module 4: Implementing Hyper-V Virtualization and Containers
  • Installing Hyper-V Virtualization
  • Configuring Storage And Networking In Hyper-VHosts-Part1
  • Configuring Storage And Networking In Hyper-VHosts-Part2
  • Configuring And Managing Virtual Machines-Part1
  • Configuring And Managing Virtual Machines-Part2
  • Understanding Windows Server And Hyper-VContainers
  • Deploying Windows Server And Hyper-VContainers
  • Using Docker To Install Configure And Manage Containers
Module 5: Implementing High Availability
  • Overview Of High Availability And Disaster Recovery-Part1
  • Overview Of High Availability And Disaster Recovery-Part2
  • Implementing Network Load Balancing-Part1
  • Implementing Network Load Balancing-Part2
  • Planning And Configuring Failover Clustering-Part1
  • Planning And Configuring Failover Clustering-Part2
  • Planning And Configuring Failover Clustering-Part3
  • Managing A Failover Cluster
  • Integrating Failover Clustering And Hyper-V-Part1
  • Integrating Failover Clustering And Hyper-V-Part2
  • Configuring Site Availability
Module 6: Maintaining and Monitoring Windows Server 2016
  • Windows Server Update Services-Part1
  • Windows Server Update Services-Part2
  • Windows PowerShell Desired State Configuration
  • Windows Server 2016 Monitoring Tools-Part1
  • Windows Server 2016 Monitoring Tools-Part2
  • Conclusion
Module 1: What Is Agile
  • Course And Instructor Introduction
  • What Is Agile – Part1
  • What Is Agile Part2 – Agile Manifesto Principles 1-6
  • What Is Agile Part3 – Agile Manifesto Principles 7-12
  • What Is Agile Part4 – Agile Manifesto Values
  • What Is Agile Part5 – Why Agile?
  • What Is Agile – Part6 – Misconceptions about Agile
  • What Is Agile Part7 – Agile Lifecycle
  • What Is Agile Part8 – Key Definitions
  • What Is Agile – Part9
Module 2: Projects And Projects Management In An Agile World
  • Projects And Project Management In An Agile World Part 1 – Historical Information
  • Projects And Project Management In An Agile World Part 2 – Organizational Projects
  • Projects And Project Management In An Agile World Part 3 – Traditional Projects
  • Projects And Project Management In An Agile World Part 4 – Roles
  • Projects And Project Management In An Agile World Part 5 – Roles 2
Module 3: Agile and Scrum
  • Agile And Scrum Part1 – In Depth
  • Agile And Scrum Part2 – Major Activities
  • Agile And Scrum Part3 – 3 Questions
  • Agile And Scrum Part4 – Sprints
Module 4: Common Scrum Terminology
  • Common Scrum Terminology-Part1
  • Common Scrum Terminology-Part2
Module 5: Other Iterative Methods
  • Other Iterative Methods
Module 6: Communication Skills In Agile World
  • Communication Skills In Agile World Part1 – Model
  • Communication Skills In Agile World Part2 – Verbal vs. Nonverbal
  • Communication Skills In Agile World Part3 – Learned Patterns
  • Communication Skills In Agile World Part4 – Key Skills
  • Communication Skills In Agile World Part5 – Key Skills
  • Communication Skills In Agile World Part6 – Conflict Resolution
  • Communication Skills In Agile World Part7 – Tuckman's 5 Stages
Module 7: Using Agile Outside Software Development
  • Using Agile Outside Software Development-Part1
  • Using Agile Outside Software Development-Part2
Module 8: Case Studies Of Transitioning to Agile
  • Case Studies Of Transitioning To Agile-Part1
  • Case Studies Of Transitioning To Agile Part2 – Procurement
  • Case Studies Of Transitioning To Agile Part3 – In an Agile World
  • Case Studies Of Transitioning To Agile Part4 – Measurements
Module 9: Critique Of Agile
  • Critique Of Agile-Part1
  • Critique Of Agile-Part2
Module 10: Review Of Agile
  • Review Of Agile-Part1
  • Review Of Agile-Part2
  • Review Of Agile-Part3
  • Course Conclusion
Module 1: Configuring Ethernet LANs
  • Introduction
  • Ethernet LAN Fundamentals- Part 1
  • Ethernet LAN Fundamentals- Part 2
  • Implementing Virtual LANs- Part 1
  • Implementing Virtual LANs- Part 2
  • Using VLAN Trunking- Part 1
  • Using VLAN Trunking- Part 2
  • Understanding Spanning Tree Protocol- Part 1
  • Understanding Spanning Tree Protocol- Part 2
  • Understanding Spanning Tree Protocol- Part 3
  • Spanning Tree Implementation- Part 1
  • Spanning Tree Implementation- Part 2
  • Spanning Tree Implementation- Part 3
  • Security Management- Part 1
  • Security Management- Part 2
  • Security Management- Part 3
  • Security Management- Part 4
Module 2: Configuring IPv4 Routing Protocols
  • Understanding OSPF- Part 1
  • Understanding OSPF- Part 2
  • Understanding OSPF- Part 3
  • Implementing OSPF- Part 1
  • Implementing OSPF- Part 2
  • Implementing OSPF- Part 3
  • Implementing OSPF- Part 4
  • Understanding EIGRP- Part 1
  • Understanding EIGRP- Part 2
  • Understanding EIGRP- Part 3
  • Implementing EIGRP- Part 1
  • Implementing EIGRP- Part 2
  • Troubleshooting IPv4- Part 1
  • Troubleshooting IPv4- Part 2
  • Troubleshooting IPv4- Part 3
Module 3: Wide Area Networks
  • Implementing Point-To-Point WANs- Part 1
  • Implementing Point-To-Point WANs- Part 2
  • Implementing Point-To-Point WANs- Part 3
  • Private WANs With Ethernet And MPLS- Part 1
  • Private WANs With Ethernet And MPLS- Part 2
  • Private WANs With Ethernet And MPLS- Part 3
  • Private WANs With Internet VPNs- Part 1
  • Private WANs With Internet VPNs- Part 2
  • Private WANs With Internet VPNs- Part 3
Module 4: IPv4 Services
  • Basic Access Control Lists- Part 1
  • Basic Access Control Lists- Part 2
  • Advanced Access Control Lists- Part 1
  • Advanced Access Control Lists- Part 2
  • Quality Of Service- Part 1
  • Quality Of Service- Part 2
Module 5: IPv4 Routing And Troubleshooting
  • IPv4 Routing In The LAN- Part 1
  • IPv4 Routing In The LAN- Part 2
  • Implementing HSRP- Part 1
  • Implementing HSRP- Part 2
  • Troubleshooting IPv4 Routing- Part 1
  • Troubleshooting IPv4 Routing- Part 2
Module 6: IPv6 Routing
  • IPv6 Implementation And Routing Basics- Part 1
  • IPv6 Implementation And Routing Basics- Part 2
  • IPv6 Implementation And Routing Basics- Part 3
  • IPv6 Implementation And Routing Basics- Part 4
  • Implementing OSPF For IPv6- Part 1
  • Implementing OSPF For IPv6- Part 2
  • Implementing EIGRP For IPv6- Part 1
  • Implementing EIGRP For IPv6- Part 2
  • IPv6 Access Control Lists- Part 1
  • IPv6 Access Control Lists- Part 2
Module 7: Cloud Based Networking
  • Overview Of Cloud Computing- Part 1
  • Overview Of Cloud Computing- Part 2
  • Conclusion
Module 1: Networking Fundamentals
  • Introduction
  • Introduction To TCPIP Networking- Part 1
  • Introduction To TCPIP Networking- Part 2
  • Introduction To TCPIP Networking- Part 3
  • Introduction To TCPIP Networking- Part 4
  • Ethernet LAN Fundamentals- Part 1
  • Ethernet LAN Fundamentals- Part 2
  • Ethernet LAN Fundamentals- Part 3
  • Wide Area Networks- Part 1
  • Wide Area Networks- Part 2
  • IPv4 Addressing And Routing Fundamentals- Part 1
  • IPv4 Addressing And Routing Fundamentals- Part 2
  • IPv4 Addressing And Routing Fundamentals- Part 3
  • TCPIP Transport And Applications- Part 1
  • TCPIP Transport And Applications- Part 2
Module 2: Basic Ethernet LAN Implementation
  • Command Line Essentials- Part 1
  • Command Line Essentials- Part 2
  • Command Line Essentials- Part 3
  • Ethernet LAN Switching
  • Managing Ethernet Switches- Part 1
  • Managing Ethernet Switches- Part 2
  • Configuring Switch Interfaces
Module 3: Designing Ethernet LANS
  • Understanding LAN Design Options- Part 1
  • Understanding LAN Design Options- Part 2
  • Understanding LAN Design Options- Part 3
  • Implementing And Configuring Ethernet VLANS- Part 1
  • Implementing And Configuring Ethernet VLANS- Part 2
Module 4: Understanding IPv4
  • IPv4 Subnetting- Part 1
  • IPv4 Subnetting- Part 2
  • IPv4 Subnetting- Part 3
  • IPv4 Subnetting- Part 4
  • Analyzing Classful IPv4 Networks- Part 1
  • Analyzing Classful IPv4 Networks- Part 2
  • Analyzing Classful IPv4 Networks- Part 3
  • Analyzing Subnet Masks- Part 1
  • Analyzing Subnet Masks- Part 2
  • Analyzing Existing Subnets
Module 5: Working With Cisco Routers
  • Implementing IPv4- Part 1
  • Implementing IPv4- Part 2
  • Configuring IPv4 Address And Static Routes- Part 1
  • Configuring IPv4 Address And Static Routes- Part 2
  • Configuring IPv4 Address And Static Routes- Part 3
  • Using Dynamic Routing Protocols- Part 1
  • Using Dynamic Routing Protocols- Part 2
  • Configuring IPv4 Hosts- Part 1
  • Configuring IPv4 Hosts- Part 2
Module 6: IPv4 Design And Troubleshooting
  • Designing IP Subnets- Part 1
  • Designing IP Subnets- Part 2
  • Using VLAN- Part 1
  • Using VLAN- Part 2
  • Troubleshooting IPv4
Module 7: IPv4 Services
  • Access Control Lists- Part 1
  • Access Control Lists- Part 2
  • Access Control Lists- Part 3
  • Access Control Lists- Part 4
  • Network Address Translation- Part 1
  • Network Address Translation- Part 2
Module 8: Implementing IPv6
  • IPv6 Fundamentals- Part 1
  • IPv6 Fundamentals- Part 2
  • IPv6 Fundamentals- Part 3
  • IPv6 Fundamentals- Part 4
  • IPv6 Addressing And Subnetting- Part 1
  • IPv6 Addressing And Subnetting- Part 2
  • Implementing IPv6- Part 1
  • Implementing IPv6- Part 2
  • Implementing IPv6- Part 3
  • Implementing IPv6- Part 4
  • Course Conclusion
Module 1: Introducing Cisco Collaboration Architecture
  • Course Introduction
  • Introducing Cisco Collaboration Architecture Part 1
  • Introducing Cisco Collaboration Architecture Part 2
  • Small To Mid-Size Business Part 1
  • Small To Mid-Size Business Part 2
  • Small To Mid-Size Business Part 3
  • Cisco Unified Communications Manager Part 1
  • Cisco Unified Communications Manager Part 2
  • Cisco Unified Communications Manager Part 3
  • Cisco Unified Connection
  • Lab Introduction
Module 2: Telephony And Call Routing
  • Telephony 101 Part 1
  • Telephony 101 Part 2
  • Telephony 101 Part 3
  • Telephony 101 Part 4
  • Telephony 101 Part 5
  • Telephony 101 Part 6
  • Call Routing 101 Part 1
  • Call Routing 101 Part 2
  • VoIP Call Routing 101
  • Call Routing With DNS
  • Deployment Scenarios Part 1
  • Deployment Scenarios Part 2
  • Deployment Scenarios Part 3
  • Gateway Call Routing Basics Part 1
  • Gateway Call Routing Basics Part 2
  • Gateway Call Routing Basics Part 3
  • Gateway Call Routing Basics Part 4
  • Configuring The Gateway Lab Part 1
  • Configuring The Gateway Lab Part 2
Module 3: Preparing The Network And Phone Behavior
  • Preparing The Network For Voices Part 1
  • Preparing The Network For Voices Part 2
  • IP Phone Behavior
  • Configuring The LAN Lab
  • Standing Up The Platform Lab
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6
  • Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7
  • Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1
  • Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2
Module 4: CUCM Administration Interfaces
  • CUCM Administration Interfaces Part 1
  • CUCM Administration Interfaces Part 2
  • CUCM Stand Up
  • CUCM Stand Up Lab
  • End User Interfaces
  • End User Configuration Lab
  • AD Integration Lab
  • End Point Implementation Part 1
  • End Point Implementation Part 2
  • IMP Integration Lab
  • CUC Integration Lab Part 1
  • CUC Integration Lab Part 2
  • IP Communicator Lab
  • Profiles And Templates Lab
  • CUCME Phone Configuration
  • Configuring CUCME Lab Part 1
  • Configuring CUCME Lab Part 2
  • CUCM End-User Portal Lab
  • Configuring CUCM Phones From Scratch
  • Configuring Cisco SX20 Codec Part 1
  • Configuring Cisco SX20 Codec Part 2
Module 5: Call Configuration
  • Advanced Call Coverage Part 1
  • Advanced Call Coverage Part 2
  • Advanced Call Coverage Part 3
  • Call Coverage Lab Part 1
  • Call Coverage Lab Part 2
  • Call Coverage Lab Part 3
  • Call Coverage Lab Part 4
  • Call Coverage Lab Part 5
  • Calling Constrictions And COS Part 1
  • Calling Constrictions And COS Part 2
  • Implementing Class Of Control Lab Part 1
  • Implementing Class Of Control Lab Part 2
  • Connecting To The PSTN Part 1
  • Configuring Voice Gateway Features Lab Part 1
  • Configuring Voice Gateway Features Lab Part 2
  • Configuring Voice Gateway Features Lab Part 3
  • Connecting To The PSTN Part 2
  • PSTN Calling And Digit Manipulation Lab Part 1
  • PSTN Calling And Digit Manipulation Lab Part 2
  • PSTN Dial Plan Configuration Lab Part 1
  • PSTN Dial Plan Configuration Lab Part 2
  • Course Conclusion
Module 1: Foundations (Beginner)
  • Introduction
  • History Of Computer Programming
  • Categories Of Programming Languages
  • Condensed History Of Java
  • Software Life Cycle
Module 2: Terms and Tools (Beginner)
  • Programming General Terms
  • Downloading And Installing Java
  • Programmer Editors And Integrated Development Environments Part 1
  • Programmer Editors And Integrated Development Environments Part 2
  • Installing Eclipse
Module 3: Identifiers, Variables, and Data Types (Beginner)
  • Understanding Identifiers
  • Unicode And Java Syntax
  • Variables Constants And Literals
  • Field Member And Variable Components
  • Primitive Data Types Part 1
  • Primitive Data Types Part 2
  • Primitive Data Types Part 3
  • Operators Part 1
  • Operators Part 2
  • Escape Characters
  • Type Conversions And Type Casting
  • Java Reserved Words
  • Commenting
  • Abstract Data Types
Module 4: Object-Orientated Programming (Intermediate)
  • Object Oriented Programming
  • What Is An Object?
  • Eclipse Lab
Module 5: Predefined Classes (Intermediate)
  • String Class Part 1
  • String Class Part 2
  • String Class Part 3
  • Date Class
  • Simple Date Format Class
  • Scanner Class Part 1
  • Scanner Class Part 2
  • Decimal Format Class Part 1
  • Decimal Format Class Part 2
  • JFrame Class
  • Container Class Part 1
  • Container Class Part 2
Module 6: Methods Part 1 (Intermediate)
  • Methods
  • Naming Methods
  • Implementation Method Hiding
  • Method Variables And Literals
  • Invoking A Method
Module 7: Methods Part 2 (Advanced)
  • Methods And Multiple Arguments
  • Methods Lab
  • Method Overloading
Module 8: Constructors (Advanced)
  • Creating Objects
  • Constructor Declarations
  • Overloading And Default Constructors
Module 9: Control of Flow (Advanced)
  • While Loop
  • While Statement
  • For Loop
Module 10: Arrays and Exceptions (Advanced)
  • Array Structures
  • Constants And Array Sizes Part 1
  • Constants And Array Sizes Part 2
  • Exceptions And The Try Catch Block
  • Conclusion
Module 1: Pre-Course Chapter 1
  • Course Introduction
  • Civnd Intro Part 1
  • Civnd Intro Part 2
  • The Big Picture
Module 2: Pre-Course Chapter 2
  • All About Video Part 1
  • All About Video Part 2
  • All About Video Part 3
  • All About Video Part 4
Module 3: Cisco Video And Content Delivery
  • Cisco Video And Content Delivery Part 1
  • Cisco Video And Content Delivery Part 2
  • Cisco Video And Content Delivery Part 3
Module 4: Cisco Video Surveillance
  • Cisco Video Surveillance Part 1
  • Cisco Video Surveillance Part 2
Module 5: Cisco Collaboration
  • Cisco Collaboration Part 1
  • Cisco Collaboration Part 2
  • Cisco Collaboration Part 3
Module 6: Central Collaboration Endpoint Control
  • Central Collaboration Endpoint Control
Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber
  • Unified IP Phones Desk Endpoints And Cisco Jabber
Module 8: Configuring Unified IP Phones And Cisco Jabber
  • Configuring Unified IP Phones And Cisco Jabber Part 1
  • Configuring Unified IP Phones And Cisco Jabber Part 2
Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2
  • Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3
Module 10: Cisco Telepresence Endpoints Installation And Characteristics
  • Cisco Telepresence Endpoints Installation And Characteristics Part 1
  • Cisco Telepresence Endpoints Installation And Characteristics Part 2
  • Cisco Telepresence Endpoints Installation And Characteristics Part 3
  • Cisco Telepresence Endpoints Installation And Characteristics Part 4
Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints
  • Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1
  • Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2
Module 12: Configuring Cisco Telepresence TC Endpoints
  • Configuring Cisco Telepresence TC Endpoints Part 1
  • Configuring Cisco Telepresence TC Endpoints Part 2
  • Configuring Cisco Telepresence TC Endpoints Part 3
  • Configuring Cisco Telepresence TC Endpoints Part 4
  • Configuring Cisco Telepresence TC Endpoints Part 5
  • Configuring Cisco Telepresence TC Endpoints Part 6
Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 1
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 2
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 3
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 4
  • Operating And Troubleshooting Cisco Telepresence Endpoints Part 5
Module 14: Cisco Multipoint Conferencing Solutions
  • Cisco Multipoint Conferencing Solutions Part 1
  • Cisco Multipoint Conferencing Solutions Part 2
  • Cisco Multipoint Conferencing Solutions Part 3
Module 15: Configuring And Monitoring Cisco Multipoint
  • Configuring And Monitoring Cisco Multipoint Part 1
  • Configuring And Monitoring Cisco Multipoint Part 2
Module 16: Cisco DMP Characteristics And Installation
  • Cisco DMP Characteristics And Installation Part 1
  • Cisco DMP Characteristics And Installation Part 2
Module 17: Configuring Cisco DMPs
  • Configuring Cisco DMP's
Module 18: Managing Cisco Edge 340 DMPs
  • Managing Cisco Edge340 DMPs
  • Course Conclusion
Module 19: Labs
  • Basic Switch Port Configuration
  • Dashboard Options Part 1
  • Dashboard Options Part 2
  • Preparations For Endpoints Part 1
  • Preparations For Endpoints Part 2
  • Preparations For Endpoints Part 3
  • Preparations For Endpoints Part 4
  • Basic Troubleshooting
  • Setup TC Endpoint Part 1
  • Setup TC Endpoint Part 2
  • Setup TC Endpoint Part 3
  • Setup TC Endpoint Part 4
Word 2016 Basic
  • Introduction To Word Interface Part1
  • Introduction To Word Interface Part2
  • Introduction To Word Interface Part3
  • View
  • Typing Part1
  • Typing Part2
  • Typing Part3
  • Typing Part4
  • Resume Part1
  • Resume Part2
  • Bullet List
Word 2016 Intermediate
  • Menus And Keyboard Shortcuts Part1
  • Menus And Keyboard Shortcuts Part2
  • Tabs
  • Tables Part1
  • Tables Part2
  • Tables Part3
  • Styles Part1
  • Styles Part2
  • Styles Part3
  • Page Formatting Part1
  • Page Formatting Part2
  • Page Formatting Part3
Word 2016 Advanced
  • Creating An Outline
  • Inserting Images Part1
  • Inserting Images Part2
  • Tracking Changes
  • Mail Merge Part1
  • Mail Merge Part2
  • Large Documents Part1
  • Large Documents Part2
  • Other Word Functions Part1
  • Other Word Functions Part2
  • Document Comparison
Basic Microsoft PowerPoint 2016
  • What Is PowerPoint Part 1
  • What Is PowerPoint Part 2
  • New Presentation
  • Viewing Presentation
  • Inserting Transitions
  • More Visual Designs Part 1
  • More Visual Designs Part 2
  • More Visual Designs Part 3
  • More Visual Designs Part 4
  • Notes
Intermediate Microsoft PowerPoint 2016
  • Visual Designs With Logos And Animation Part1
  • Visual Designs With Logos And Animation Part2
  • Visual Designs With Logos And Animation Part3
  • Visual Designs With Logos And Animation Part4
  • Visual Designs With Logos And Animation Part5
  • Exit Animation Part1
  • Exit Animation Part2
  • Exit Animation Part3
  • Navigation Buttons
  • Layout Options Part1
  • Layout Options Part2
Advanced Microsoft PowerPoint 2016
  • Master Pages Part1
  • Master Pages Part2
  • Software Simulation Part1
  • Software Simulation Part2
  • Setting Pictures To Music
  • Advanced Animation Techniques
  • Triggers
  • Motion Path Animation
  • Video In PowerPoint
  • PowerPoint Review Part1
  • PowerPoint Review Part2
  • Additional Options
Outlook 2016 Basic
  • Introduction Part 1
  • Introduction Part 2
  • Options For Displaying Email Messages
  • Create And Send An Email
  • Receive An Email
  • Calendar Part 1
  • Calendar Part 2
  • Contacts Part 1
  • Contacts Part 2
  • Tasks
Outlook 2016 Intermediate
  • Folder Structure Part
  • Folder Structure Part 2
  • Multiple Email Accounts Part 1
  • Multiple Email Accounts Part 2
  • Create A New Email Part 1
  • Create A New Email Part 2
  • Signatures
  • Calendars Part 1
  • Calendars Part 2
  • Contacts
  • Outlook Settings Part 1
  • Outlook Settings Part 2
Outlook 2016 Advanced
  • One Note Introduction Part 1
  • One Note Introduction Part 2
  • One Note And PowerPoint
  • One Note And Word
  • One Note And Outlook
  • Sharing Information
  • OneNote And Mobile Devices
  • Additional Elements Part 1
  • Additional Elements Part 2
Excel 2016 Basic
  • Tabs And Ribbons Part1
  • Tabs And Ribbons Part2
  • Cells Part1
  • Cells Part2
  • Cells Part3
  • Cells Part4
  • Calculations Part1
  • Calculations Part2
  • Calculations Part3
  • Printing Part1
  • Printing Part2
Excel 2016 Intermediate
  • Menus And Keyboard Shortcuts Part1
  • Menus And Keyboard Shortcuts Part2
  • Menus And Keyboard Shortcuts Part3
  • Tabs Part1
  • Tabs Part2
  • Formulas And Calculations Part1
  • Formulas And Calculations Part2
  • Formulas And Calculations Part3
  • Formulas And Calculations Part4
  • Importing Data Part1
  • Importing Data Part2
  • Invoices
Excel 2016 Advanced
  • Advanced Invoice Part1
  • Advanced Invoice Part2
  • Advanced Invoice Part3
  • Advanced Invoice Part4
  • Number Crunching
  • Creating A Pivot Table From Scratch
  • Smaller Excel Components Part1
  • Smaller Excel Components Part2
  • Smaller Excel Components Part3
Access 2016 Basic
  • Introduction Part1
  • Introduction Part2
  • Elements Part1
  • Elements Part2
  • Reviewing Data
  • Queries Part1
  • Queries Part2
  • Tracking Time Part1
  • Tracking Time Part2
  • Tracking Time Part3
  • Design Work With Forms
Access 2016 Intermediate
  • Relationships Part1
  • Relationships Part2
  • Changing Information
  • Loading Tables
  • Relating Invoices Part1
  • Relating Invoices Part2
  • Relating Invoices Part3
  • Relating Invoices Part4
  • Time Entry Form
Access 2016 Advanced
  • Queries Part1
  • Queries Part2
  • Queries Part3
  • Queries Part4
  • Reports Based On Queries
  • Adding Additional Information
  • Update Query Part1
  • Update Query Part2
  • Creating A Report From Scratch Part1
  • Creating A Report From Scratch Part2
  • Creating A Report From Scratch Part3
Module 1: Network Review
  • Course Introduction
  • Network Review Part 1
  • Network Review Part 2
  • Network Review Part 3
  • Network Review Part 4
Module 2: Terminology And Fundamentals
  • Terminology And Fundamentals Part 1
  • Terminology And Fundamentals Part 2
  • Terminology And Fundamentals Part 3
  • Terminology And Fundamentals Part 4
  • Terminology And Fundamentals Part 5
  • Terminology And Fundamentals Part 6
  • Terminology And Fundamentals Part 7
Module 3: PKI And Cryptography
  • Pki And Cryptography Part 1
  • Pki And Cryptography Part 2
Module 4: AAA
  • AAA Part 1
  • AAA Part 2
  • AAA Part 3
Module 5: Bring Your Own Device
  • Bring Your Own Device Part 1
  • Bring Your Own Device Part 2
  • Bring Your Own Device Part 3
Module 6: Secure Access
  • Secure Access Part 1
  • Secure Access Part 2
  • Secure Access Part 3
  • Secure Access Demo
Module 7: VPNs
  • VPN Concepts Part 1
  • VPN Concepts Part 2
  • Remote Access VPNs Part 1
  • Remote Access VPNs Part 2
  • Site To Site VPNs
Module 8: Secure Routing And Switching
  • Secure Routing And Switching Part 1
  • Secure Routing And Switching Part 2
  • Secure Routing And Switching Demo 1
  • Secure Routing And Switching Demo 2
  • Layer2 Attacks Part 1
  • Layer2 Attacks Part 2
  • Layer2 Attacks Part 3
  • Mitigation Part 1
  • Mitigation Part 2
Module 9: Firewalls
  • Firewall Technologies Part 1
  • Firewall Technologies Part 2
  • Implementing Nat Part 1
  • Implementing Nat Part 2
  • Zone Based Firewall
  • Firewall Features On The ASA Part 1
  • Firewall Features On The ASA Part 2
  • Firewall Features On The ASA Part 3
Module 10: Intrusion Protection System (IPS)
  • Intrusion Protection System Part 1
  • Intrusion Protection System Part 2
Module 11: Content And Endpoint Security
  • Content And Endpoint Security Part 1
  • Content And Endpoint Security Part 2
  • Course Conclusion
Module 1: Wireless Basics
  • Course And Instructor Introduction
  • Wireless Basics Part 1
  • Wireless Basics Part 2
  • Wireless Basics Part 3
  • Wireless Basics Part 4
  • Wireless Basics Part 5
  • Wireless Basics Part 6
Module 2: Wireless Standards
  • Wireless Standards Part 1
  • Wireless Standards Part 2
  • Wireless Standards Part 3
  • Wireless Standards Part 4
  • Wireless Standards Part 5
Module 3: Wireless Signals
  • Wireless Signals Part 1
  • Wireless Signals Part 2
Module 4: Antennas
  • Antennas Part 1
  • Antennas Part 2
  • Antennas Part 3
Module 5: Topologies
  • Topologies Part 1
  • Topologies Part 2
Module 6: Frame Types
  • Frame Types Part 1
  • Frame Types Part 2
  • Frame Types Part 3
Module 7: Planning Coverage
  • Planning Coverage Part 1
  • Planning Coverage Part 2
  • Planning Coverage Part 3
Module 8: Architectures
  • Architectures Part 1
  • Architectures Part 2
  • Architectures Part 3
Module 9: Stand Alone And Cloud Deployments
  • Stand Alone And Cloud Deployments Part 1
  • Stand Alone And Cloud Deployments Part 2
Module 10: Controller Based Deployment
  • Controller Based Deployment Part 1
  • Controller Based Deployment Part 2
  • Controller Based Deployment Part 3
Module 11: Controller Discovery
  • Controller Discovery Part 1
  • Controller Discovery Part 2
  • Controller Discovery Part 3
Module 12: Roaming
  • Roaming Part 1
  • Roaming Part 2
Module 13: Radio Resource Management
  • Radio Resource Management Part 1
  • Radio Resource Management Part 2
  • Radio Resource Management Part 3
Module 14: Wireless Security
  • Wireless Security Part 1
  • Wireless Security Part 2
  • Wireless Security Part 3
Module 15: WLAN Configuration
  • WLAN Configuration
Module 16: Guest Networks
  • Guest Networks
Module 17: Client Connectivity
  • Client Connectivity Part 1
  • Client Connectivity Part 2
Module 18: Managing Wireless
  • Managing Wireless Part 1
  • Managing Wireless Part 2
Module 19: Interference
  • Interference Part 1
  • Interference Part 2
Module 20: Troubleshooting
  • Troubleshooting Part 1
  • Troubleshooting Part 2
  • Course Conclusion
Module 1: Overview of SharePoint Development
  • Course Introduction
  • Introduction To SharePoint Development Part1
  • Introduction To SharePoint Development Part2
  • Introduction To SharePoint Development Part3
  • Choosing A Development Approach Part1
  • Choosing A Development Approach Part2
  • SharePoint 2013 Deployment And Execution Models Part1
  • SharePoint 2013 Deployment And Execution Models Part2
  • SharePoint 2013 Deployment And Execution Models Part3
Module 2: Working With Objects, List, And Libraries
  • Introduction To The SharePoint Object Hierarchy Part1
  • Introduction To The SharePoint Object Hierarchy Part2
  • Working With Sites And Webs Part1
  • Working With Sites And Webs Part2
  • Working With Sites And Webs Part3
  • Working With Sites And Webs Part4
  • Managing Execution Contexts Part1
  • Managing Execution Contexts Part2
  • Using Lists And Library Objects Part1
  • Using Lists And Library Objects Part2
  • Querying And Retrieving Data From Lists Part1
  • Querying And Retrieving Data From Lists Part2
  • Querying And Retrieving Data From Lists Part3
  • Working With Large Lists Part1
  • Working With Large Lists Part2
Module 3: Working With Features and Solutions
  • Introduction To Features
  • Introduction To Solutions
  • Creating And Configuring Features And Solutions Part1
  • Creating And Configuring Features And Solutions Part2
  • Creating And Configuring Features And Solutions Part3
  • Creating And Configuring Features And Solutions Part4
  • Using Sandboxed Solutions
Module 4: Developing Server Side Code
  • Web Parts
  • Event Receivers Part1
  • Event Receivers Part2
  • Timer Jobs
  • Storing Configuration Data Part1
  • Storing Configuration Data Part2
Module 5: Managing Authentication And Authorization
  • Introduction To Identity Management
  • Managing Permissions
  • Configuring Forms Based Authentication
  • Working With Custom Authentication Part1
  • Working With Custom Authentication Part2
  • Working With Custom Authentication Part3
Module 6: Client Side SharePoint Development
  • Using The CSOM For Managed Code Part1
  • Using The CSOM For Managed Code Part2
  • Using The CSOM For Managed Code Part3
  • Using The CSOM For JavaScript
  • Using The Rest API With JavaScript Part1
  • Using The Rest API With JavaScript Part2
Module 7: Developing And Managing Apps
  • Overview Of Apps For SharePoint Part1
  • Overview Of Apps For SharePoint Part2
  • Developing Apps For SharePoint
  • Overview Of Remote Hosted Apps
  • Configuring Remote Hosted Apps
  • Developing Remote Hosted Apps Part1
  • Developing Remote Hosted Apps Part2
  • Publishing And Distributing Apps Part1
  • Publishing And Distributing Apps Part2
  • Publishing And Distributing Apps Part3
Module 8: Using Workflows To Automate Business Processes
  • Overview Of Workflows In SharePoint 2013
  • Building Workflows Part1
  • Building Workflows Part2
  • Developing Workflows Part1
  • Developing Workflows Part2
Module 9: Customizing SharePoint Interfaces
  • Working With Custom Actions
  • Using Client-Side Interface Components
  • Customizing The SharePoint List User Interface
  • Course Conclusion
Module 1: Introduction To Creating Efficient Apps For Sharepoint
  • Course And Instructor Introduction
  • Apps For SharePoint Part1
  • Apps For SharePoint Part2
  • Communication From Apps To SharePoint Part1
  • Communication From Apps To SharePoint Part2
  • Authentication And Authorization Part1
  • Authentication And Authorization Part2
  • Designing Apps For Performance Part1
  • Designing Apps For Performance Part2
  • Designing Apps For Performance Part3
Module 2: Working With Managed Metadata Solutions
  • Overview Of Managed Metadata Part1
  • Overview Of Managed Metadata Part2
  • Configuring Managed Metadata Term Sets Part1
  • Configuring Managed Metadata Term Sets Part2
  • Configuring Managed Metadata Term Sets Part3
  • Configuring Managed Metadata Term Sets Part4
  • Working With Managed Metadata Fields Part1
  • Working With Managed Metadata Fields Part2
Module 3: Working With The Search Service
  • Overview Of The SharePoint 2013 Search Service Part1
  • Overview Of The SharePoint 2013 Search Service Part2
  • Overview Of The SharePoint 2013 Search Service Part3
  • Building Search Queries
  • Using Code To Execute Search Queries Part1
  • Using Code To Execute Search Queries Part2
  • Customizing Query Processing Part1
  • Customizing Query Processing Part2
  • Customizing Search Results Part1
  • Customizing Search Results Part2
  • Customizing Content Processing Part1
  • Customizing Content Processing Part2
Module 4: Implementing Enterprise Content Management
  • Working With eDiscovery Part1
  • Working With eDiscovery Part2
  • Working With Content Management Part1
  • Working With Content Management Part2
  • Handling Automated Records Management Part1
  • Handling Automated Records Management Part2
  • Handling Automated Records Management Part3
Module 5: Developing Publishing Sites
  • Introduction To Developing Publishing Solutions
  • Developing Page Components For Web Content Publishing Part1
  • Developing Page Components For Web Content Publishing Part2
  • Developing Page Components For Web Content Publishing Part3
  • Website Structure And Navigation Part1
  • Website Structure And Navigation Part2
  • Website Structure And Navigation Part3
  • Publishing Content
  • Publishing To Mobile Devices
  • Optimizing For Search Engines Part1
  • Optimizing For Search Engines Part2
  • Optimizing Performance And Availability Part1
  • Optimizing Performance And Availability Part2
Module 6: Interacting With Business Connectivity Services
  • Overview Of Business Connectivity Services
  • Creating BDC Models
  • Creating An App Scoped External Content Type
  • Conclusion
Module 1: Service Operation Introduction
  • Introduction
  • Syllabus Exam Overview And Testing Tips
  • Service Operation Introduction Part 1
  • Service Operation Introduction Part 2
  • Service Operation Introduction Part 3
  • Service Operation Introduction Part 4
  • Service Operation Introduction Part 5
Module 2: Service Management As a Practice
  • Service Management As A Practice Part 1
  • Service Management As A Practice Part 2
  • Service Management As A Practice Part 3
Module 3: Service Operation Principles
  • Service Operation Principles Part 1
  • Service Operation Principles Part 2
  • Service Operation Principles Part 3
  • Service Operation Principles Part 4
Module 4: Service Operation Process
  • Service Operation Process Part 1
  • Service Operation Process Part 2
  • Service Operation Process Part 3
  • Incident Management Part 1
  • Incident Management Part 2
  • Problem Management
  • Request Fulfillment
  • Access Management
Module 5: Common Service Operation Activities
  • Common Service Operation Activities Part 1
  • Common Service Operation Activities Part 2
  • Common Service Operation Activities Part 3
  • Common Service Operation Activities Part 4
Module 6: Organizing For Service Operation
  • Organizing For Service Operation Part 1
  • Organizing For Service Operation Part 2
  • Organizing For Service Operation Part 3
  • Roles Part 1
  • Roles Part 2
Module 7: Technology Considerations
  • Technology Considerations
Module 8: Service Operation
  • Implementation Of Service Operation
  • Challenges Risks And Critical Success Factors
  • Conclusion
Module 1: Introduction to CSS3
  • Introduction
  • The Advantages Of Style Sheets
  • Discovering Cascading Style Sheets
  • CSS Structure And Syntax Part1
  • CSS Structure And Syntax Part2
  • CSS Structure And Syntax Part3
  • Using Different Kinds Of Style Sheets
Module 2: Understanding The CSS Box Model
  • What Is The Box Model
  • Height And Width
  • Margin And Padding
  • Working With Borders
Module 3: Working With Page Layouts
  • Positioning Elements
  • Floating Elements
  • Controlling Display And Visibility
Module 4: Using Colors And Backgrounds
  • Working With Colors
  • Working With Backgrounds
Module 5: Web Typography
  • Understanding Fonts
  • Working With Text Properties
  • Text And Shadow Effects Part1
  • Text And Shadow Effects Part2
Module 6: Links, Lists, And Tables
  • Working With Lists
  • Using Navigation Bars
  • Working With Tables Part1
  • Working With Tables Part2
Module 7: Dynamic CSS3 Properties
  • Using Transforms Part1
  • Using Transforms Part2
  • Using Transitions
  • Using Animations
  • CSS Project Part1
  • CSS Project Part2
  • Course Conclusion
Module 1: Introduction To Javascript
  • Introduction
  • Java Script From The Dawn Of The Web Part 1
  • Java Script From The Dawn Of The Web Part 2
  • Getting The Right Tools
  • Creating Your First JavaScript Program Part 1
  • Creating Your First JavaScript Program Part 2
Module 2: Core Concepts And Syntax
  • The Structure And Content Part 1
  • The Structure And Content Part 2
  • Naming And Casing Best Practices
  • Understanding Variables Part 1
  • Understanding Variables Part 2
  • Understanding Variables Part 3
  • Working With Operators Part 1
  • Working With Operators Part 2
  • Working With Loops Part 1
  • Working With Loops Part 2
  • Creating Functions Part 1
  • Creating Functions Part 2
  • Understanding Types And Objects Part 1
  • Understanding Types And Objects Part 2
  • Understanding Types And Objects Part 3
  • Understanding Types And Objects Part 4
  • Understanding Types And Objects Part 5
Module 3: Getting A Handle On The DOM
  • Introduction To The HTML Document Object Model
  • Accessing DOM Elements
  • Changing DOM Elements
  • Creating DOM Elements
  • Responding To Events Part 1
  • Responding To Events Part 2
Module 4: Working With Libraries
  • Introduction To Libraries
  • Installing And Using jQuery Part 1
  • Installing And Using jQuery Part 2
  • Modifying Web Pages Using jQuery Part 1
  • Modifying Web Pages Using jQuery Part 2
  • Conclusion
Module 1: What Is HTML?
  • Introduction
  • What Is HTML
  • HTML Resources
  • Choosing A Code Editor
  • The Relationship Of HTML, CSS And JavaScript
Module 2: The Structure And Components
  • The HTML Document
  • DOCTYPE Declaration
  • The Head
  • The Body
  • The Footer
Module 3: Formatting The Page
  • Using Headings
  • Creating Paragraphs
  • Emphasizing Text
  • Controlling Line Breaks And Whitespace
  • Creating Lists
  • Working With Tables
Module 4: Structuring Content
  • Why Structure Matters
  • Controlling Document Outlines
  • Structure Elements Part 1
  • Structure Elements Part 2
Module 5: Adding Links, Images And Other Media
  • Working With Links Part 1
  • Working With Links Part 2
  • Working With Images Part 1
  • Working With Images Part 2
Module 6: Styling Web Pages
  • HTML And CSS
  • Creating Inline Styles
  • Controlling Typography
  • Adding Color
  • Externalizing Styles
Module 7: Creating Your Own Website
  • Creating A Website Part 1
  • Creating A Website Part 2
  • Conclusion
Module 1: Cyber Security Awareness and Prevention
  • Course Introduction
  • Where We Are Today
  • Areas Of Protection
  • The Connection – Part 1
  • The Connection – Part 2
  • Network Protection
  • Browsing Blunders – Part 1
  • Browsing Blunders – Part 2
  • Settings – Part 1
  • Settings – Part 2
  • Settings – Part 3
  • Settings – Part 4
  • Cookies
  • Browsing Tips And Tricks
  • Email Can't Hurt You Right – Part 1
  • Email Can't Hurt You Right – Part 2
  • Viruses – Part 1
  • Viruses – Part 2
  • Viruses – Part 3
Module 2: Managing Mobile Device Security
  • Managing Mobile Device Security-Part1
  • Managing Mobile Device Security-Part2
  • Secure Access
  • Secure Access iPhone Demo
  • Secure Access Android Demo
  • Protect The Digital
  • Protect The Digital Android Demo
  • Protect The Digital iPhone Demo
  • Manage App Access
  • Manage App Access iPhone Demo
  • Manage App Access Android Demo
  • Stay Up To Date
  • Stay Up To Date Android Demo
  • Stay Up To Date iPhone Demo
  • Use Other Tools To Help
  • Prepare For The Worst
  • Prepare For The Worst-Android Demo
  • Prepare For The Worst-iPhone Demo
  • Best Practices
  • Course Conclusion
Module 1: Introduction to Web Development
  • Course And Instructor Introduction
  • ASP.Net Using Visual Studio
  • ASP.Net Tools In Visual Studio
  • ASP.Net Data Validation-Part1
  • ASP.Net Data Validation-Part2
  • ASP.Net Web User Control
  • ASP.Net Creating Web Service
  • ASP.Net Web Service Explained
  • Classes Defined
Module 2: C ­ Sharp
  • Intro To C Sharp
  • Functions In C Sharp
  • If Statements In C Sharp
  • Static Variables In C Sharp
  • Loops In C Sharp
  • Debugging In C Sharp
  • Introduction To Windows Forms In C Sharp
  • More Windows Forms In C Sharp
  • Windows Forms Controls In C Sharp
  • Object Oriented Programming In C Sharp
  • Constructors And Destructors In C Sharp
  • Members Of A Class In C Sharp
  • Class Inheritance In C Sharp
  • Abstract Classes In C Sharp
  • Enumerations In C Sharp
  • Exception Handling In C Sharp
  • Creating XML Documents In C Sharp
  • Putting It All Together In A File In C Sharp
Module 3: HTML and CSS Comprehensive Review
  • Intro To HTML
  • HTML Markup
  • Lists In HTML
  • Links In HTML
  • Tables In HTML
  • Forms In HTML
  • Intro To CSS
  • CSS Color Properties
Module 4: Intro to SQL Server
  • Databases Defined
  • Tables Defined
  • Basic Query Optimization
  • Defining And Using Store Procedures
  • Creating Stored Procedure
  • Executing Store Procedure From C Sharp
  • Executing Store Procedure From ASP.Net
  • Changing ASP.Net Interface To Retrieve Data-Part1
  • Changing ASP.Net Interface To Retrieve Data-Part2
Module 5: Java Script A Comprehensive Introduction
  • Intro To JavaScript
  • Using JavaScript For Data Validation
  • Using JavaScript To Manipulate Documents
  • Variables In JavaScript
  • If Statements In JavaScript
  • Logical Operators In JavaScript
  • If Else Statements In JavaScript
  • Switch Statements In JavaScript
  • For Loops In JavaScript
  • For And While Loops In JavaScript
Module 6: Object Based Java Script
  • Working With String Object
  • More On String Object
  • The Math Object
  • Creating Your Own Objects
  • String Manipulation In JavaScript
  • Programming The Browser In JavaScript
  • Browser Versions In JavaScript
  • Working With Forms In JavaScript
Module 7: Model View and Controller
  • MVC Mindset
  • MVC Defined
  • Create An MVC Project
  • MVC Project Initial Walkthrough
  • MVC Building Routes
  • MVC Approach
  • Controllers
  • Controllers From Scratch
  • MVC Routing
  • MVC Routing Constraints
  • Routing Constraint Attributes
  • MVC Attribute Routing
Module 8: A Comprehensive Introduction to jQuery
  • What Is jQuery
  • jQuery Effects
  • Get And Set Elements In jQuery
  • Add And Remove Elements In jQuery
  • CSS In jQuery
  • Ancestors And Descendants
Module 9: Course Review
  • MVC Best Practices
  • Testing The Application
  • Writing For Production
  • Review Web Development
  • Review C Sharp
  • Review HTML And CSS
  • Review SQL Server
  • Review JavaScript
  • Review Software Development Lifecycle
  • Review Design Patterns
  • Review jQuery
  • Conclusion
Module 1: Accessing Data
  • Introduction To 70 – 487 Developing Microsoft Azure And Web Services
  • Overview Of Service And Cloud Technologies
  • Accessing Data Using ADO Dot NET Part1
  • Accessing Data Using ADO Dot NET Part2
  • Accessing Data From Web Service
  • SQL Server Database In Azure
  • Read And Write XML Data
  • Implementing Azure Storage
  • Managing Azure PowerShell
  • WCF Data Services Part1
  • WCF Data Services Part2
  • WCF With Client
Module 2: Designing And Implementing WCF Services
  • Create WCF Service And Client From Scratch Part1
  • Create WCF Service And Client From Scratch Part2
  • WCF Configuration Settings Part1
  • WCF Configuration Settings Part2
  • WCF And Azure SQL Database Part1
  • WCF And Azure SQL Database Part2
  • WCF And Azure SQL Database Part3
  • WCF Services And Azure Review
Module 3: Querying And Manipulating Data Using Entity Framework
  • Design And Implement An ERD
  • Introduction To Entity Framework
  • Introduction To LINQ
  • LINQ To SQL
  • LINQ To Entities
  • Introduction To Lambda Expressions
  • Introduction To Entity SQL
  • Profiling Queries Created By Entity Framework
  • Query Projections
  • Query With Navigation Properties
  • Bringing It All Together Part1
  • Bringing It All Together Part2
  • Using Entity Framework From Scratch
  • Entity Framework Review
Module 4: Creating And Consuming Web API Based Services
  • Introduction To Web API
  • First Web API App
  • Web API App Enhanced
  • Web API App Extended
  • Web API Using Standard Conventions
  • Debugging Our Web API App
  • Getting Data From Database In Web API App
  • Web API Standards
  • More On Web API Standards
  • Simple Web API CRUD App
  • Web API Example In Depth
  • Summarizing Web API
Module 5: Deploying Web Applications And Services
  • Introduction To Application Deployment Strategies Part1
  • Introduction To Application Deployment Strategies Part2
  • Introduction To Application Deployment Strategies Part3
  • Introduction To Application Deployment Strategies Part4
  • Deploying Web Applications ToIIs
  • Deploying Web Applications To Azure
  • Deployment Considerations
  • Deployment Design
  • Deployment Configurations
Module 6: Course Review
  • Accessing Data
  • Web Front End Options
  • Course Conclusion
Module 1: Data Breaches And ID Theft
  • Course Introduction
  • Treat And Cost
Module 2: Device Security Basics
  • Device Access
  • Device Management
Module 3: Avoiding Inadvertent Disclosure
  • No More Oops Part1
  • No More Oops Part2
Module 4: Physical And Technical Safeguards
  • The DO Of Security Part1
  • The DO Of Security Part2
  • Course Conclusion
Module 1: What is a Resume?
  • Course Introduction
  • What Is A Resume
  • When Or Why Do You Need A Resume
  • Plan Then Do
  • Objective
  • Skills And Accomplishments
  • Backing It Up
  • Types Of Resume
  • Structure
  • Collecting Information-Part 1
  • Collecting Information-Part 2
  • Expanding And Expounding
  • Putting It On Paper
Module 2: Tips and Tricks
  • Word Processor Tips And Tricks-Part 1
  • Word Processor Tips And Tricks-Part 2
  • Word Processor Tips And Tricks-Part 3
  • Word Processor Tips And Tricks-Part 4
  • Word Processor Tips And Tricks-Part 5
  • Word Processor Tips And Tricks-Part 6
  • Word Processor Tips And Tricks-Part 7
  • Word Processor Tips And Tricks-Part 8
  • Word Processor Tips And Tricks-Part 9
  • Word Processor Tips And Tricks-Part 10
  • Word Processor Tips And Tricks-Part 11
  • Word Processor Tips And Tricks-Part 12
  • Course Outro
Module 1: Intro to SalesForce Automation
  • Course And Instructor Introduction
  • What Is Salesforce Automation
  • Sales Force Automation System Overview
  • Why Salesforce
Module 2: Working With The SalesForce System
  • Creating Accounts And Contacts
  • Creating Leads And Opportunities
  • Sales Process-Part 1
  • Sales Process-Part 2
  • Sales Process-Part 3
  • Sales Process-Part 4
  • Leads Through Social Channels
Module 3: SalesForce Solution
  • Core Problems
  • Managing Accounts
  • Badges And Campaigns
  • Custom Apps
Module 4: SalesForce Admin
  • Introduction To RDBMS
  • Introduction To The Cloud
  • Introduction To Virtual Machines-Part1
  • Introduction To Virtual Machines-Part2
  • Salesforce Development
  • Introduction To Building In The Cloud
  • Salesforce Set Up
Module 5: Migrating To SalesForce
  • Tasks To Complete Before Migration-Part 1
  • Tasks To Complete Before Migration-Part 2
  • Frequently Asked Questions-Part 1
  • Frequently Asked Questions-Part 2
  • Frequently Asked Questions-Part 3
  • Frequently Asked Questions-Part 4
  • Frequently Asked Questions-Part 5
  • Frequently Asked Questions-Part 6
  • Frequently Asked Questions-Part 7
  • Frequently Asked Questions-Part 8
  • Frequently Asked Questions-Part 9
Module 6: Course Conclusion
  • The Salesforce Solution
  • Conclusion
Module 1: Getting Started With Windows 10
  • Introduction
  • First Steps
  • Navigating The Desktop
  • Using Cortana To Search
Module 2: Using File Explorer
  • File Explorer
  • Understanding File And Folder Basics
  • Work With Libraries
  • Creating A Home Group
Module 3: Using Windows Applications
  • Opening And Using Applications
  • Installing New Applications From The Windows Store
  • Using Default Applications
Module 4: Browsing the Web With Microsoft Edge
  • Examining The Edge Window
  • Searching The Web With Edge
  • Bookmarking Important Sites
  • Using The Reading List
  • Marking A Page With Web Notes
  • Conclusion
Module 5: Customizing Windows
  • Introduction
  • Customizing The Display
  • Customizing File Explorer
  • Configuring Cortanas Notebook Feature
  • Customizing Privacy Settings
  • Customizing Microsoft Edge
Module 6: Connecting Devices And Devices
  • Connecting Printers
  • Connecting And Using A Flash Drive
  • Connect A Phone
Module 7: Managing User Accounts
  • Create Additional Users
  • Understanding User Profiles
  • Sharing Data Between Profiles
Module 8: Backing Up Important Data
  • Using File History
  • Using Windows Backup
  • Using System Restore
Module 9: Maintaining Windows
  • Windows Updates
  • Working With The Action Center
  • Using Disk Defragmenter
  • Managing Storage And Apps Using Settings
  • Conclusion
Module 10: Protecting Windows
  • Introduction
  • Using Windows Defender
  • Using Windows Firewall
  • Using Bit Locker
  • Windows Hello
Module 11: Monitoring Performance
  • Using Task Manager
  • Using Resource Monitor
Module 12: Working With Control Panel And Settings
  • Control Panel Part 1
  • Control Panel Part 2
  • Settings App
  • Using Device Manager
  • Using Remote Desktop
  • Conclusion
Module 1: Introducing Windows 10
  • Course Introduction
  • What Makes Windows 10 Different
  • Overview Of Windows 10 Features
  • Navigating And Using Windows 10-Part 1
  • Navigating And Using Windows 10-Part 2
Module 2: Installing Windows 10
  • Preparing For Installation
  • Installation Options
  • Upgrading And Migrating-Part 1
  • Upgrading And Migrating-Part 2
Module 3: Configuring Devices
  • Overview Of Configuration Tools
  • Common Configuration Options
  • Managing User Accounts-Part 1
  • Managing User Accounts-Part 2
  • Using Control Panel
  • Using Windows Administration Tools-Part 1
  • Using Windows Administration Tools-Part 2
  • Using Windows PowerShell-Part 1
  • Using Windows PowerShell-Part 2
Module 4: Configuring Network Connectivity
  • TCP IP Network Connectivity-Part 1
  • TCP IP Network Connectivity-Part 2
  • TCP IP Network Connectivity-Part 3
  • Name Resolution
  • Wireless
  • Remote Access Overview-Part 1
  • Remote Access Overview-Part 2
  • Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
  • Managing Hard Disks-Part 1
  • Managing Hard Disks-Part 2
  • Managing Hard Disks-Part 3
  • Creating And Managing Storage Spaces
  • Overview Of Data Access
  • Configuring And Managing File Access
  • Managing Shared Folder
  • Understanding Work Folder
  • Managing Printers
Module 6: Managing Apps
  • Installing And Configuring Applications
  • Managing Apps From The Windows Store
  • Managing Microsoft Edge Web Browser
Module 7: Managing Device Security
  • Configuring Network Security-Part 1
  • Configuring Network Security-Part 2
  • Configuring Local Security
  • Configuring Data Security-Part 1
  • Configuring Data Security-Part 2
  • Configuring Device Security
Module 8: Maintaining Windows 10
  • Updating Windows 10
  • Monitoring And Optimizing Windows 10-Part 1
  • Monitoring And Optimizing Windows 10-Part 2
Module 9: Troubleshooting And Recovery
  • Managing Devices And Drives
  • Recovery Files
  • Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
  • Overview Of Image Based Deployment
  • Automating Installations
  • Windows Activation
Module 11: Managing User Profiles And User State Virtualization
  • Managing User Profiles-Part 1
  • Managing User Profiles-Part 2
  • User State Virtualization
  • User Profile Migration
Module 12: Managing Desktop And Application Settings Using Group policy
  • Using Group Policy To Manage Windows 10 Devices Part 1
  • Using Group Policy To Manage Windows 10 Devices-Part 2
  • Using Group Policy To Manage Windows 10 Devices-Part 3
  • Using Group Policy To Manage Windows 10 Devices-Part 4
  • Using Group Policy To Manage Applications-Part 1
  • Using Group Policy To Manage Applications-Part 2
Module 13: Configuring And Managing Client Hyper-V
  • Introduction To Client Hyper-V
  • Creating Virtual Machines
  • Managing Virtual Machine Storage And Snapshot
  • Conclusion
Module 14: Configuring Windows Devices – December, 2017 Update – Part1
  • Module 14 Workbook
  • Flashcards (Updated)
  • 1. Intro to Windows 10 Update 70-697-1D
  • 2. Mod 1 Win 10 Update
  • 3. Mod 1 Installing Windows 10
  • 4. Mod 1 Examining Windows 10 Act
  • 5. Mod 3 Configuring Devices
  • 6. Mod 3 Examining GPOs Act
  • 7. Mod 3.3 Display Options
  • 8. Mod 3 Examining One Drive Act
  • 9. Mod 4 Configuring Network Connectivity
  • 10. Mod 4 Powershell Networking Commands Act
  • 11. Mod 4.1 Network Mgmt Tools
  • 12. Mod 4.1 Command Prompt Networkiing Tools Act
  • 13. Mod 4.1 Network Mgmt Tools Part2
  • 14. Mod 4.2 DNS
  • 15. Mod 4.2 Name Resolution Act
  • 16. Mod 4.3 Direct Access
  • 17. Mod 5 Managing Storage
  • 18. Mod 5 Server Based Storage
  • 19. Mod 5 Storage Act
  • 20. Mod 5.5 Diskpart
  • 21. Mod 5.6 Powershell Disk Mgmt
  • 22. Mod 5.7 Storage Mgmt
  • 23. Mod 5 Storage Mgmt Act
  • 24. Mod 6 Managing Files and Printers
  • 25. Mod 6 CMD and PS Files System Commands Act
  • 26. Mod 6.2 Permissions Inheritance
  • 27. Mod 6.2 NTFS and Sharing Permissions Act
  • 28. Mod 6.3 Type 4 Printer Drivers
  • 29. Mod 6 Printing Mgmt Act
  • 30. Mod 7 Managing Apps
  • 31. Mod 7 Internet Explorer 11 Act
  • 32. Mod 8 Managing Device Security
  • 33. Mod 8.1 Security Compliance Toolkit
  • 34. Mod 9 Maintaining Windows 10
  • 35. Mod 9 Windows Update Settings Act
  • 36. Mod 10 Startup and Recovery
  • 37. Mod 10 Startup and Recovery settings Act
  • 38. Mod 11 Additional Skills
  • Windows Intro Update 70-697-2C
Module 15: Configuring Windows Devices – December, 2017 Update – Part2
  • Module 15 Workbook
  • Flashcards (Updated)
  • 1. Mod 1 Developing Mgmt Win 10
  • 2. Mod 1 Windows Defender Act
  • 3. Mod 1.1 Developing Part2
  • 4. Mod 1 Applocker Act2
  • 5. Mod1.2 Managing a Mobile Workforce
  • 6. Mod 1 Remote Access Act2
  • 7. Mod 1.2 Managing a Mobile Workforce Part2
  • 8. Mod 1.3 Overview
  • 9. Mod 1 Microsoft Azure Act2
  • 10. Mod 2 Managing Win 10 Sign-in
  • 11. Mod 2 Microsoft Account Act2
  • 12. Mod 2.2 Overview of Azure AD
  • 13. Mod 2 Microsoft Azure AD Act2
  • 14. Mod 3 Managing User Profiles and User
  • 15. Mod 4 Managing Desktop and Apps
  • 16. Mod 5 Managing Devices in MS365
  • 17. Mod 5 Office 365 Act2
  • 18. Mod 6 Managing PCs Devices using Intune
  • 19. Mod 6 Intune Act2
  • 20. Mod 6.3 Intune App Mgmt
  • 21. Mod 6.4 Working with WIP
  • 22. Mod 7 Configuring and Using MS Store
  • 23. Mod 7 Microsoft Store for Business Act2
  • 24. Mod 7.2 Deploy Win 10 Auto-pilot
  • 25. Mod 8 Managing Data Access Windows
  • 26. Mod 8.4 Publishing and Using RemoteApp
  • 27. Mod 9 Configuring and Managing Client Hyper-V
  • 28. Mod 10 Additional Skills
  • 29. Outr to Windows 10 Update 70-697
Wine Making
  • Course Instructor Introduction
  • Supplies And Ingredients Needed
  • Cleaning And Prepping Equipment
  • Chemicals Processing Aids And Oaks-Part 1
  • Chemicals Processing Aids And Oaks-Part 2
  • Wine Kits And Making Watermelon White Merlot
  • Making Watermelon White Merlot-Part 2
  • Making Amarone
  • Apple Cider Wine
  • Degassing Wine-Part 1
  • Degassing Wine-Part 2
  • Degassing Wine-Part 3
  • Adding More Ingredients To You Wine
  • Gentle Punch Down And Degassing Of Amarone
  • Reracking The Amarone
Wine Mixing And Food Pairing
  • Different Wine Varietals-Part 1
  • Different Wine Varietals-Part 2
  • Hydrometer
  • Wine Yeast
  • Wine Blending And Food Pairing-Part 1
  • Wine Blending And Food Pairing-Part 2
  • Bottling The Apple Cider Wine
  • Conclusion
Module 1: Installing and Deploying Windows 8.1
  • Course Introduction
  • Introduction To Windows
  • Preparing To Install Windows 8.1
  • Understanding Deployment Options Part 1
  • Understanding Deployment Options Part 2
  • Upgrading To Windows 8.1
  • Migrating To Windows 8.1
  • Automating Installations Part 1
  • Automating Installations Part 2
  • Automating Installations Part 3
  • Windows Activation
Module 2: Enterprise Management in Windows 8.1
  • Local And Management Tools Part 1
  • Local And Management Tools Part 2
  • Using Windows PowerShell To Manage Windows 8.1 Part 1
  • Using Windows PowerShell To Manage Windows 8.1 Part 2
  • Using Windows PowerShell To Manage Windows 8.1 Part 3
  • Using Group Policy To Manage Windows 8.1
Module 3: Managing User Settings
  • Managing User Profiles
  • User State Virtualization
  • User Profile Migration
Module 4: Configuring Hardware Access
  • Managing And Maintaining HardDisk Drives Part 1
  • Managing And Maintaining HardDisk Drives Part 2
  • Working With Device Drivers
Module 5: Configuring Networking
  • Configuring IPv4 Part 1
  • Configuring IPv4 Part 2
  • Configuring IPv4 Part 3
  • Configuring IPv6
  • Managing Name Resolution
  • Configuring Wireless Connections
  • Troubleshooting Network Connections
Module 6: Configuring Resource Access
  • Configuring Network Access
  • Managing File Access With NTFS
  • Managing Shared Folders
  • Configure And Manage Printers
  • Providing Access To Non-Domain Devices
  • Planning To Use One Drive
Module 7: Configuring Applications
  • Installing And Configuring Applications
  • Managing Apps From The Windows Store
  • Controlling Desktop Applications
  • Manage Internet Explorer
  • Using Virtualisation To Support Applications
Module 8: Managing Security in Windows 8.1
  • Overview Of Network Security
  • Managing The Windows Firewall
  • Malware Protection
  • Configuring Data Security
  • User Account Control
Module 9: Optimizing and Recovering Windows 8.1
  • Performance Monitoring And Optimization
  • Managing And Troubleshooting Reliability
  • Troubleshooting With Event Viewer
  • Managing Windows Updates
  • Backing Up Data
  • Recovery Options
Module 10: Mobile Computing With Windows 8.1
  • Configuring Mobile Computer Settings
  • Configuring VPNs
  • Overview Of Direct Access
  • Conclusion
Module 1: Introduction To Office 365
  • Course Introduction
  • Introduction To Office 365 – Part 1
  • Introduction To Office 365 – Part 2
  • Planning A Pilot Implementation – Part 1
  • Planning A Pilot Implementation – Part 2
  • Planning A Pilot Implementation – Part 3
  • Planning A Pilot Implementation – Part 4
  • Provisioning Tenant Accounts – Part 1
  • Configuring A Test Lab
  • Provisioning Tenant Accounts – Part 2
Module 2: Administration In Office 365
  • Introduction To Administration In Office 365 – Part 1
  • Introduction To Administration In Office 365 – Part 2
  • Introduction To Administration In Office 365 – Part 3
  • Introduction To Administration In Office 365 – Part 4
  • Introduction To Administration In Office 365 – Part 5
  • Managing Users And Licenses – Part 1
  • Managing Users And Licenses – Part 2
  • Managing Users And Licenses – Part 3
  • Managing Security And Distribution Groups – Part 1
  • Managing Security And Distribution Groups – Part 2
Module 3: Managing Clients
  • Planning For Office Clients – Part 1
  • Planning For Office Clients – Part 2
  • Planning For Office Clients – Part 3
  • Managing User – Driver Client Deployments
  • IT Managed Deployments – Part 1
  • IT Managed Deployments – Part 2
  • IT Managed Deployments – Part 3
  • Office Telemetry And Reporting
Module 4: Planning DNS And Exchange Migrations
  • Working With Custom Domains – Part 1
  • Working With Custom Domains – Part 2
  • Working With Custom Domains – Part 3
  • Working With Custom Domains – Part 4
  • Planning To Migrate Mailboxes
  • Choosing A Migration Method – Part 1
  • Choosing A Migration Method – Part 2
  • Choosing A Migration Method – Part 3
Module 5: Planning And Configuring Exchange Online
  • Planning For Exchange Online – Part 1
  • Planning For Exchange Online – Part 2
  • Planning For Exchange Online – Part 3
  • Planning For Exchange Online – Part 4
  • Planning For Exchange Online – Part 5
  • Planning For Exchange Online – Part 6
  • Planning For Exchange Online – Part 7
  • Managing Recipients – Part 1
  • Managing Recipients – Part 2
  • Managing Recipients – Part 3
  • Managing Recipients – Part 4
  • Managing Anti-Malware And Anti-Spam
  • Managing Message Retention Recovery – Part 1
  • Managing Message Retention Recovery – Part 2
Module 6: Configuring Sharepoint Online
  • Managing Site Collections – Part 1
  • Managing Site Collections – Part 2
  • Configuring Sharing With External Users
  • Planning For Users Collaboration
Module 7: Configuring Lync Online
  • Plan For Lync Online
  • Configuring Lync Online Settings
Module 8: Implementing Coexistence Technologies
  • Implementing Directory Synchorization – Part 1
  • Implementing Directory Synchorization – Part 2
  • Implementing Directory Synchorization – Part 3
  • Implementing Organizational Federation
  • Course Outro
Module 1: Installing,Upgrading and Migrating Windows 7
  • Course And Instructor Introduction
  • Introducing Windows 7-Part1
  • Introducing Windows 7-Part2
  • Pre Installation Requirements-Part1
  • Pre Installation Requirements-Part2
  • Installing Windows 7-Part1
  • Installing Windows 7-Part2
  • Upgrading Windows 7
  • Migrating Windows 7
Module 2: Deploying Windows 7 in the Enterprise
  • Overview Of Image Based Installations-Part1
  • Overview Of Image Based Installations-Part2
  • Overview Of Image Based Installations Demo
  • Capturing System Images-Part1
  • Capturing System Images-Part2
  • Capturing System Images-Part3
  • Preparing Images For Deployment-Part1
  • Preparing Images For Deployment-Part2
  • Working With User State
  • Working With Virtual Drives
  • Activating Windows 7
Module 3: Enterprise Management in Windows 7
  • Automating Management Using Group Policy-Part1
  • Automating Management Using Group Policy-Part2
  • Automating Management Using Group Policy-Part3
  • Using Windows Powershell 2.0-Part1
  • Using Windows Powershell 2.0-Part2
  • Using Windows Powershell 2.0-Part3
Module 4: Configuring Hardware and Applications
  • Working With Device Drivers-Part1
  • Working With Device Drivers-Part2
  • Working With Hard Disks-Part1
  • Working With Hard Disks-Part2
  • Configuring Application Compatibility
  • Configuring Internet Explorer-Part1
  • Configuring Internet Explorer-Part2
  • Configuring Application Restrictions
Module 5: Configuring Network Connectivity
  • Configuring TCPIP-Part1
  • Configuring TCPIP-Part2
  • Configuring TCPIP-Part3
  • IP Address Assignment-Part1
  • IP Address Assignment-Part2
  • Name Resolution Services-Part1
  • Name Resolution Services-Part2
  • Wireless Networking-Part1
  • Wireless Networking-Part2
  • Remote Management
  • Troubleshooting Connectivity Issues
Module 6: Configuring Access to Resources
  • Authentication And Authorization-Part1
  • Authentication And Authorization-Part2
  • Managing Access To Files Using NTFS
  • Managing Sharing
  • Managing Shared Printers
  • Configuring Branch Cache
Module 7: Configuring Mobile Computing
  • Configuring Mobile Computer And Device Settings-Part1
  • Configuring Mobile Computer And Device Settings-Part2
  • Configuring Remote Access-Part1
  • Configuring Remote Access-Part2
Module 8: Configuring Security Options
  • User Account Control
  • Encrypting File Systems
  • Bit Locker Drive Encryption-Part1
  • Bit Locker Drive Encryption-Part2
  • Network Access Protection
  • Windows Firewall With Advanced Security
  • Configuring Anti-Malware
  • Auditing Network Access
Module 9: Monitoring And Maintaining Systems
  • Configuring Windows Updates
  • Event Monitoring
  • Performance Monitoring
Module 10: Configuring Backup and Recovery Options
  • Troubleshooting Startup Issues
  • Using Windows Backup
  • Using System Restore
  • Course Conclusion
Module 1: Technology Review
  • Introduction
  • Active Directory Install And Configure
  • PowerShell Primer
  • Microsoft Exchange Server Install And Configure – Part 1
  • Microsoft Exchange Server Install And Configure – Part 2
  • Review Cloud Computing – Part 1
  • Review Cloud Computing – Part 2
  • Review Virtualization And The Cloud – Part 1
  • Review Virtualization And The Cloud – Part 2
  • Review Virtualization And The Cloud – Part 3
Module 2: Device Management
  • Client Devices
  • Demo Client Device Setup – Part 1
  • Demo Client Device Setup – Part 2
  • Office 365 Client Deployment
  • Office 365 Components
  • Office 365 Deployment Methods
  • Office 365 Cloud Deployment Methods
  • Office 365 Deployment Prerequisites
  • Office 365 Deployment Readiness
  • Office 365 Deployment Network Environment
Module 3: Office 365 Deployment Plan
  • Network Planning
  • Internet Network Usage Planning
  • Network Device Planning
  • Account Management Planning – Part 1
  • Account Management Planning – Part 2
  • Migration And Coexistence Options
  • Single Sign On Architecture
  • Demo Server 2012 Core With Active Directory Role
Module 4: Windows Azure
  • SharePoint 2013 Using Windows Azure – Part 1
  • SharePoint 2013 Using Windows Azure – Part 2
  • SharePoint 2013 Capabilities
Module 5: PowerShell
  • Scripting And PowerShell – Part 1
  • Scripting And PowerShell – Part 2
  • PowerShell Scripting Techniques – Part 1
  • PowerShell Scripting Techniques – Part 2
  • Enterprise Ready Scripts – Part 1
  • Enterprise Ready Scripts – Part 2
  • PowerShell Scripting Syntax – Part 1
  • PowerShell Scripting Syntax – Part 2
  • PowerShell Scripting Active Directory – Part 1
  • PowerShell Scripting Active Directory – Part 2
  • PowerShell Remoting
  • PowerShell Adding Bulk Users In AD
Module 6: SQL Server
  • Introduction To SQL Queries
  • SQL Queries – Part 1
  • SQL Queries – Part 2
  • DML And DDL – Part 1
  • DML And DDL – Part 2
  • DDL
  • SQL Server And PowerShell
  • SQL Server PowerShell And AD
  • Logging Data In SQL Server Using PowerShell
Module 7: Azure Lync and SharePoint
  • Azure Active Directory Fundamentals – Part 1
  • Azure Active Directory Fundamentals – Part 2
  • Deploying Lync Server – Part 1
  • Deploying Lync Server – Part 2
  • Deploying Lync Server – Part 3
  • SharePoint Designer
  • Backup And Restore Share Point
  • Windows PowerShell And SharePoint
  • Identity Service With Active Directory
  • Setup And Deploy Exchange
Module 8: Course Review
  • Review Virtualization
  • Review Cloud
  • Review Automation Using PowerShell
  • Review Desktop Applications
  • Move To Office 365
  • Conclusion
Module 1: Introduction to Web Development Technologies
  • Intro To Software Development
  • Introduction To HTML5-Part1
  • Introduction To HTML5-Part2
  • Introduction To CSS3
  • Overview Of HTML CSS And JavaScript-Part1
  • Overview Of HTML CSS And JavaScript-Part2
  • Introduction To JavaScript-Part1
  • Introduction To JavaScript-Part2
  • Demo JavaScript
Module 2: HTML
  • Demonstrating Formatting Quotations And Citations
  • Tables Lists Blocks Classes And Layout-Part1
  • Tables Lists Blocks Classes And Layout-Part2
  • Page Design Frames And Colors
  • Form Elements-Part1
  • Form Elements-Part2
Module 3: CSS
  • Comprehensive Introduction To CSS
  • Styles With CSS-Part1
  • Styles With CSS-Part2
  • Selectors Content And Classes
Module 4: JavaScript
  • Demo JavaScript Syntax-Part1
  • Demo JavaScript Syntax-Part2
  • Demo String Methods
  • Demo Scope Events And Numbers-Part1
  • Demo Scope Events And Numbers-Part2
  • Demo Dates And Arrays-Part1
  • Demo Dates And Arrays-Part2
  • Demo Dates And Arrays-Part3
  • Demo Comparisons Conditions And Loops
  • Demo Breaks Conversion And Regular Expression-Part1
  • Demo Breaks Conversion And Regular Expression-Part2
  • Demo Errors And Debugging
Module 5: jQuery
  • Intro To jQuery
  • Demo Using jQuery
Module 6: HTML5
  • HTML5
  • Input Validation In HTML5
  • Demo Password Validation
  • Demo Using Regular Expressions To Validate Password
  • Demo Validate A Checkbox
  • Demo Validate Date And Time-Part1
  • Demo Validate Date And Time-Part2
Module 7: CSS3
  • Demo CSS3 Selectors-Part1
  • Demo CSS3 Selectors-Part2
  • Demo CSS3 Effects
Module 8: Course Review
  • Review Of HTML5 CSS3 And JavaScript-Part1
  • Review Of HTML5 CSS3 And JavaScript-Part2
  • Comprehensive Walk through Of Visual Studio
  • Cloud Computing Overview Using Azure-Part1
  • Cloud Computing Overview Using Azure-Part2
  • Cloud Computing Overview Using Azure-Part3
  • Code Review HTML5 CSS3 And JavaScript
  • Web Design Best Practices
  • Review jQuery
  • Course Conclusion
Module 1: Plan And Design
  • Course And Instructor Introduction
  • Planning For Complex Network-Part1
  • Planning For Complex Network-Part2
  • Intro To Cisco Enterprise Architecture And CAM-Part1
  • Intro To Cisco Enterprise Architecture And CAM-Part2
  • Review Networking Topology-Part1
  • Review Networking Topology-Part2
  • Review OSI Model
  • Review SLA
  • Network Discovery
  • NTP Explained-Part1
  • NTP Explained-Part2
  • Network Security-Part1
  • Network Security-Part2
Module 2: Switch Configuration
  • VLAN And Trunking-Part1
  • VLAN And Trunking-Part2
  • VTP Intro And Config
  • Ether Channel Configuration And Load Balancing
  • More Ether Channel Configuration-Part1
  • More Ether Channel Configuration-Part2
  • Port Security
  • Root Guard
  • Configuring MST
Module 3: IP Configuration
  • DHCP Intro And Config-Part1
  • DHCP Intro And Config-Part2
  • IPV6 Intro And Config-Part1
  • IPV6 Intro And Config-Part2
  • Configure DHCP
  • Configure DHCPV6
  • Configure IPSLA
  • NTP Configuration
  • Network Monitoring Using IPSLA-Part1
  • Network Monitoring Using IPSLA-Part2
  • Network Monitoring Using IPSLA-Part3
Module 4: STP And RTP
  • Config Routing Between VLANs With A Router
  • Improves STP Config-Part1
  • Improve STP Config-Part2
  • Improve STP Config-Part3
  • Improve STP Config-Part4
  • Implement RSTP
  • Intro And Config MST
Module 5: Routing
  • Config Routing Between VLANs With A Router
  • Routing On A Multi Layer Switch
  • Routing With An External Router
  • Further Routing On Multilayer Switch
Module 6: HSRP, VRRP, GLBP
  • Configure And Tune HSRP
  • Configure HSRP With Load Balancing
  • HSRP For IPv6
  • Configure VRRP
  • Configure VRRP With Load Balancing
  • Implement GLBP
  • Configure GLBP
Module 7: Course Review
  • Designing Complex Networks
  • Review Demo CAM
  • Review Demo VLANs And Trunking
  • Review Demo VTP Configure
  • Review Demo Ether Channel And Load Balancing
  • Review Demo RSTP
  • Review Demo Routing Between VLANs With A Router
  • Course Outro
Module 1: Database Concepts And Tools
  • Instructor And Course Introduction
  • Database Concepts And Tools – Part 1
  • Database Concepts And Tools – Part 2
Module 2: Memory Structure
  • Memory Structure – Part 1
  • Memory Structure – Part 2
Module 3: Tables
  • Tables – Part 1
  • Tables – Part 2
Module 4: Indexes
  • Indexes – Part 1
  • Indexes – Part 2
Module 5: Constraints And Triggers
  • Constraints And Triggers – Part 1
  • Constraints And Triggers – Part 2
Module 6: Users
  • Users
  • Profiles
  • Privileges
  • Roles
Module 7: Internal Structures
  • Storage Structures – Part 1
  • Storage Structures – Part 2
  • Internal Memory Structures – Part 1
  • Internal Memory Structures – Part 2
  • Background Processes – Part 1
  • Background Processes – Part 2
Module 8: Starting Up and Shutting Down Database
  • Starting And Stopping DataBase – Part 1
  • Starting And Stopping DataBase – Part 2
Module 9: Critical Storage Files
  • Critical Storage Files – Part 1
  • Critical Storage Files – Part 2
Module 10: Data Manipulation Language
  • DML Atomicity – Part 1
  • DML Atomicity – Part 2
  • DML Insert
  • DML Update – Part 1
  • DML Update – Part 2
  • DML Delete And Review Of DML Statements – Part 1
  • DML Delete And Review Of DML Statements – Part 2
Module 11: Data Concurrency
  • Data Concurrency – Part 1
  • Data Concurrency – Part 2
Module 12: BackUp And Recovery
  • Back Up – Part 1
  • Back Up – Part 2
  • Back Up – Part 3
  • RMAN Catalog
  • RMAN BackUps – Part 1
  • RMAN BackUps – Part 2
  • Disaster Preparedness
  • Recovery
  • Flashback Recovery
Module 13: Installation
  • Installation – Part 1
  • Installation – Part 2
Module 14: Course Review
  • Course Review – Part 1
  • Course Review – Part 2
  • Course Review – Part 3
  • Course Review – Part 4
  • Course Review – Part 5
  • Course Outro
Module 1: Configuring Advanced DNS Services
  • Introduction
  • DNSSEC
  • Socket Pool And Cache Locking
  • Advanced DNS Settings
  • Questions
Module 2: Advanced DHCP Services
  • DHCP Scopes
  • High Availability
  • Policy-Based Assignments
  • DHCPv6
  • Questions
Module 3: Active Directory Forest Configuration
  • Active Directory Forests
  • Active Directory Sites
  • Active Directory Trusts
  • Active Directory Read Only Domain Controllers
  • Active Directory Replication
Module 4: Active Directory Certificate Services
  • ADCS Overview
  • ADCS Management
Module 5: ISCSI And ISNS
  • ISCSI And ISNS
  • ISCSI And ISNS Demo
  • Questions
Module 6: Configuring IPAM
  • Install And Configure IPAM
  • IPAM Demo
  • Questions
Module 7: Network Balancing
  • Install And Configure NLB
  • NLB Demo
  • Questions
Module 8: Failover Clusters
  • Cluster Overview
  • Cluster Aware Updating
  • Failover Clusters Demo
  • Questions
Module 9: Configuring Hyper_V Virtual Machines
  • Create VM Replicas In Hyper-V And Migrate VMs
  • Hyper V Virtual Machines Demo
  • Questions
Module 10: Dynamic Access Control
  • DAC Overview And Configure
  • DAC Demo
  • Questions
Module 11: Active Directory Rights Management Services
  • Install ADRMS
  • Manage ADRMS
  • ADRMS Demo
  • Questions
Module 12: Active Directory Federation Services
  • Configure And Manage ADFS
  • ADFS Demo
  • Questions
Module 13: Disaster Recovery
  • Configure And Restore Windows Server Backup
  • Configure And Restore Windows Server Backup Demo
  • Questions
Module 14: Configuring Additional Services
  • Configuring Additional Services
  • Configuring Additional Services Demo-Part1
  • Configuring Additional Services Demo-Part2
  • Questions
  • Conclusion
Module 1: Managing User and Service Accounts
  • Introduction
  • User Accounts-Part 1
  • User Accounts-Part 2
  • User Accounts-Part 3
  • Service Accounts-Part 1
  • Service Accounts-Part 2
  • Questions
Module 2: Administer Group Policy
  • Group Policy
  • User Configuration-Part 1
  • User Configuration-Part 2
  • User Configuration-Part 3
  • Computer Configurations
  • Group Policy Management-Part 1
  • Group Policy Management-Part 2
  • Group Policy Management-Part 3
  • Questions
Module 3: Managing Network File Services
  • File System Resource Manager
  • Distributed File System
  • Encrypting File System
  • Auditing Resources
  • Questions
Module 4: Domain Name System
  • DNS Functionality-Part 1
  • DNS Functionality-Part 2
  • DNS and Active Directory
  • DNS Server Configuration-Part 1
  • DNS Server Configuration-Part 2
  • Questions
Module 5: Windows Deployment Services
  • WDS Overview
  • Creating Images
Module 6: Windows Server Update Services
  • WSUS-Part 1
  • WSUS-Part 2
Module 7: Remote Access
  • Implement Remote Access-Part 1
  • Implement Remote Access-Part 2
  • Implement Remote Access-Part 3
  • Offline Domain Join
  • Implement Network Policy Server-Part 1
  • Implement Network Policy Server-Part 2
  • Implement Network Policy Server-Part 3
Module 8: Monitoring System
  • Monitoring System Resources-Part 1
  • Monitoring System Resources-Part 2
Module 9: Managing Active Directory Services
  • Managing Active Directory Services-Part 1
  • Managing Active Directory Services-Part 2
  • Managing Active Directory Services-Part 3
  • Conclusion
Module 1: Introduction To Oracle 12c SQL Fundamentals
  • Introduction
  • Intro To Oracle 12c-SQL Fundamentals
  • Structure Of SQL
  • Basic Select Statements
  • Basic Select Statements Demo
Module 2: Retrieving Data
  • Modifying Reported Output
  • The Where Clause
  • The Order By Clause
  • Left And Right Outer Joins
  • The Where Clause Demo
  • Multi-Table Selection Demo
Module 3: SQL Functions
  • Single Row Functions
  • Aggregate Functions
  • Single Row Functions Demo
  • Muiltrow Functions Demo
  • Group By
  • Grouping Demo
  • Conversion Functions
  • Conversion Functions Demo
  • Datetime Functions
  • Datetime Functions Demo
Module 4: Subqueries
  • Single-Row Subqueries
  • Single-Row Subqueries Demo
  • Multi-Row Subqueries
  • Multi-Row Subqueries Demo
  • Other Subquery Types
  • Other Subquery Types Demo
Module 5: Data Manipulation Language
  • Adding Data
  • Changing Data
  • Deleting Data
  • DML Demo
Module 6: Data Control Language
  • Security
  • Object Privileges
  • DCL Demo
Module 7: Data Definition Language
  • Creating Objects In The Database
  • Creating Objects In The Database Demo
  • Sequences
  • Sequenced Demo
  • Indexes
  • Views
Module 8: Combining Queries
  • Combining Queries
Module 9: Oracle 12C SQL Fundamentals Review
  • Oracle 12c SQL Fundamentals Review – Part 1
  • Oracle 12c SQL Fundamentals Review – Part 2
  • Oracle 12c SQL Fundamentals Review – Part 3
  • Conclusion
Module 1: Installing And Configuring Windows Server 2012 R2
  • Course And Instructor Introduction
  • Overview-Part1
  • Overview-Part2
  • Overview-Part3
  • Management-Part1
  • Management-Part2
  • Management-Part3
  • Management-Part4
  • Management-Part5
  • Installation-Part1
  • Installation-Part2
  • Installation-Part3
  • Questions-Part1
  • Questions-Part2
Module 2: Installing and Configuring an Active Directory Domaine Control
  • Active Directory Design-Part1
  • Active Directory Design-Part2
  • Active Directory Design-Part3
  • Installing Active Directory Domain Services-Part1
  • Installing Active Directory Domain Services-Part2
  • Installing Active Directory Domain Services-Part3
  • Installing Active Directory Domain Services-Part4
  • Questions
Module 3: Administering Active Directory Objects
  • Design And Create An Active Directory Hierarchy-Part1
  • Design And Create An Active Directory Hierarchy-Part2
  • Manage Users-Part1
  • Manage Users-Part2
  • Manage Users-Part3
  • Manage Computers-Part1
  • Manage Computers-Part2
  • Manage Computers-Part3
  • Questions
Module 4: Automating Administration Tasks
  • Powershell Overview And Object Command-Part1
  • Powershell Overview And Object Command-Part2
  • Powershell Overview And Object Command-Part3
  • Command Line Object Management And Bulk Operations-Part1
  • Command Line Object Management And Bulk Operations-Part2
  • Questions
Module 5: Configuring IPv4
  • TCP IP Overview
  • IPv4 Addressing-Part1
  • IPv4 Addressing-Part2
  • Subnetting And Supernetting
  • Configure And Troubleshoot IPv4-Part1
  • Configure And Troubleshoot IPv4-Part2
  • Questions-Part1
  • Questions-Part2
Module 6: Configuring IPv6
  • Configuring IPV6-Part1
  • Configuring IPV6-Part2
  • Questions
Module 7: Installing and Configuring DHCP
  • DHCP Overview Database Security-Part1
  • DHCP Overview Database Security-Part2
  • Questions
Module 8: Installing and Configuring DNS
  • Installing And Configuring DNS-Part1
  • Installing And Configuring DNS-Part2
  • Installing And Configuring DNS-Part3
  • Installing And Configuring DNS-Part4
  • Installing And Configuring DNS-Part5
  • Questions
Module 9: Configuring Storage Spaces And File And Print Services
  • Design And Implement Storage Spaces-Part1
  • Design And Implement Storage Spaces-Part2
  • Design And Implement Storage Spaces-Part3
  • Secure Files And Folders Configure Offline Files And Shadow Copies
  • Implement Network Printing
  • Questions
Module 10: Configuring Group Policy
  • Create Group Policy Objects
  • Configure Group Policy Settings-Part1
  • Configure Group Policy Settings-Part2
  • Implement A Central Store And Questions
Module 11: Securing Windows Servers
  • Securing Windows Servers-Part1
  • Securing Windows Servers-Part2
  • Questions
Module 12: Installing and Configuring Virtual Servers and Clients
  • Virtualization Solution
  • Hyper V-Part1
  • Hyper V-Part2
  • Network Virtualization And Questions-Part1
  • Network Virtualization And Questions-Part2
  • Conclusion
Module 1: Introduction to Cisco Troubleshooting
  • Introduction
  • Troubleshooting And Maintenance
  • IOS Troubleshooting Commands
  • Remote Data Gathering
  • Introduction To Graphical Troubleshooting Tools And Review
Module 2: Troubleshooting Switches
  • Troubleshoot Catalyst Switches
  • Troubleshoot TCAM
Module 3: Troubleshooting VLANS and Trunking
  • Troubleshooting VLANs And Trunking-Part1
  • Troubleshooting VLANs And Trunking-Part2
  • Troubleshooting VLANs And Trunking-Part3
  • Trouble Ticket 1 VLANS
Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel
  • Spanning Tree Protocol
  • STP Port Configuration
  • Ether Channel
  • Trouble Ticket 2-Trunking
Module 5: Troubleshooting Inter­VLAN Routing and Layer 3 EtherChannel
  • Troubleshooting Inter-VLAN Routing
  • Troubleshooting Layer 3 Ether Channel
Module 6: Troubleshooting Switch Security Features
  • Troubleshoot Switch Security-Part1
  • Troubleshoot Switch Security-Part2
  • Trouble Ticket 3-Switch Security-Part1
  • Trouble Ticket 3-Switch Security-Part2
Module 7: Troubleshooting First­Hop Redundancy Protocols
  • HSRP
  • VRRP
  • Questions
  • Trouble Ticket 4
Module 8: Troubleshooting IPv4 and IPv4 Addressing
  • IPv4 Addressing DHCPNAT-Part1
  • IPv4 Addressing DHCPNAT-Part2
  • Trouble Ticket 5
  • Trouble Ticket 6
Module 9: IPv6 Addressing and Addressing Technologies
  • IPv6 Addressing Options
Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
  • IPv4 ACLs
  • Prefixlists IPv6 ACLs
  • Trouble Ticket Access Control List1
  • Trouble Ticket Access Control List2
Module 11: Troubleshooting GRE and Basic Routing Tunnels
  • IPv4 Routing-Part1
  • IPv4 Routing-Part2
  • IPv6 Routing
  • GRE Tunnels
Module 12: Troubleshooting RIPv2 and RIPng
  • RIPv2
  • RIPng
Module 13: Troubleshooting EIGRP
  • EIGRP
  • EIGRP For IPv6
  • Trouble Ticket 1
  • Trouble Ticket 2
Module 14: OSPF and OSPFv3
  • OSPF-Part1
  • OSPF-Part2
  • OSPFv3
  • Trouble Ticket 1
  • Trouble Ticket 2
  • Trouble Ticket 3
Module 15: Troubleshooting Route Maps and Policy Based Routing
  • Route Maps And Policy Based Routing
Module 16: Troubleshooting Redistribution
  • Verifying Redistribution Configuration
  • Troubleshooting Redistribution With Route Maps
Module 17: Troubleshooting BGP
  • BGP Overview
  • BGP Configuration-Part1
  • BGP Configuration-Part2
  • Trouble Ticket 1
  • Trouble Ticket 2
Module 18: Troubleshooting Management Protocols and Tools
  • Troubleshooting Management Protocols And Tools
  • SPAN And RSPAN
Module 19: Troubleshooting Management Access
  • Management Access Troubleshooting
  • Conclusion
Module 1: Introduction and White Wines
  • White Wines
Module 2: Glassware, Temperature, Storage and Ratings
  • Temperature Glassware Storage And Ratings
Module 3: Red Wines
  • Red Wines
Module 4: Regions
  • Europe
  • Europe Continued
  • North America
  • South America Australia New Zealand
  • Conclusion
Module 1: Plan And Design
  • Introduction
  • Review Routing Fundamentals
  • Review Route Selection
  • Review Switching Versus Routing
  • Review IP Subnetting
  • Review How To Subnet
  • Review IP Address Classes
Module 2: EIGRP Enhanced Interior Gateway Routing Protocol
  • Plan And Design-Part1
  • Plan And Design-Part2
  • EIGRP Config
  • Configuring RIPng
  • Building EIGRP Topology Table
  • EIGRP Stub Routing
  • EIGRP Summarization
  • EIGRP Load Balancing
  • Discovering Main EIGRP Configuration
  • Implementing EIGRP Through Name Config
  • Configure EIGRP Authentication
  • Configure Authentication For EIGRP Routes
Module 3: IPv6
  • Introduction To IPv6-Part1
  • Introduction To IPv6-Part2
  • IPv6 Addressing
  • Basic IPv6 Configuration
  • EIGRP For IPv6
  • Configure And Optimize EIRGP For IPv6
Module 4: OSPF
  • lntroduction To OSPF-Part1
  • lntroduction To OSPF-Part2
  • lntroduction To OSPF-Part3
  • Configure OSPF
  • Building The Link State Database
  • OSPF Path Selection
  • OSPF Route Summarization
  • OSPF Stub Areas
  • Implement OSPF
  • Optimize OSPF
  • OSPF Authentication Configuration
  • Configure OSPFV3
  • Basic Redistribution
Module 5: Border Gateway Protocol BGP
  • Introduction To BGP
  • BGP Specifics
  • Basic BGP
  • BGP Path Selection
  • Configure BGP Authentication
  • Configure BGP
Module 6: Course Review
  • Configure Basic EIGRP
  • Basic OSPF Configuration
  • Summary Of-EIGRP-OSPF-IPv6-BGP
  • Conclusion
Module 1: Introduction To Application Virtualization
  • Course Introduction
  • Introduction To Virtualization
  • Introduction To Desktop Virtualization
  • Introduction To Application Virtualization
  • The XenApp Blue Print
  • Building The Lab Environment
Module 2: XenApp Server Setup
  • Configure XenApp Server After Initial Install
  • Configuration Updates And Virtual Delivery Agent Install
  • Build Master Image For Machine Catalog
  • Complete Master Image Build
  • Setup Delivery Group
  • Test XenApp Application Delivery
Module 3: Plan For High Availability
  • High Availability Explained-Part1
  • High Availability Explained-Part2
  • Windows Failover Cluster-Part1
  • Windows Failover Cluster-Part2
  • Complete Failover Cluster Configuration
  • Complete Basic Cluster Configuration-Part1
  • Complete Basic Cluster Configuration-Part2
  • High Availability Explained-Part1
  • High Availability Explained-Part2
  • Windows Failover Cluster-Part1
  • Windows Failover Cluster-Part2
  • Complete Failover Cluster Configuration
  • Complete Basic Cluster Configuration-Part1
  • Complete Basic Cluster Configuration-Part2
Module 4: Scripting Primer
  • Windows Batch Files-Part1
  • Windows Batch Files-Part2
  • Windows Batch Files-Part3
  • Power Shell Scripts-Part1
  • Power Shell Scripts-Part2
  • Error Handling In PowerShell Scripts
  • Scripts Explained
Module 5: Using VMware vSphere
  • Introduction To VMware
  • Configuring Windows 7 And Installing VMware Tools
  • Power CLI Scripting In VMware
Module 6: Virtualization Using Microsoft Hyper-V
  • Introduction To Hyper-V
  • Introduction To Hyper-V Continued
  • Windows Server Core Install And Configure-Part1
  • Windows Server Core Install And Configure-Part2
  • Install And Configure DHCP Server
  • Hyper-V Virtual Networking
Module 7: Course Review
  • Active Directory Fundamentals
  • Permissions In Active Directory
  • Logon Scripts In Windows
  • Review Virtualization
  • Review Application Virtualization
  • Review High Availability
  • Review Scripting
  • Review XenApp Blue Print
  • Course Conclusion
Module 1: Introducing The Cloud Model
  • Course And Instructor Introduction
  • Overview Of Cloud Computing
  • Dissecting Hybrid Cloud Environments
  • Requirements For Cloud Implementation
  • Using System Center To Operate The Cloud – Part 1
  • Using System Center To Operate The Cloud – Part 2
  • Using System Center To Operate The Cloud – Part 3
  • Ongoing Cloud Maintenance
  • System Center Component Integration
  • Verifying The Cloud Infrastructure Demo
Module 2: Configuring The Private Cloud Environment
  • Overview Of Virtual Machine Manager
  • Managing Virtual Environments
  • Creating Private Cloud
  • Configuring And Optimizing The Private Cloud
Module 3: Deploying Services For The Private Cloud
  • Understanding Service Templates
  • Configuring Profiles – Part 1
  • Configuring Profiles – Part 2
  • Using Web Deploy Packages
  • Configuring Server App-V
  • Using Data Tier Applications
  • Using App Controller To Deploy Services
  • Deploying Cloud Services Demo
Module 4: Monitoring Cloud Based Applications
  • Overview Of Operations Manager
  • Deploying Monitoring Agents
  • Customizing Monitoring Solutions
  • Monitoring The Network Infrastructure
  • Distributed Application Monitoring
  • Application Performance Monitoring – Part 1
  • Application Performance Monitoring – Part 2
  • Application Performance Monitoring – Part 3
  • Application Performance Monitoring – Part 4
  • Application Performance Monitoring – Part 5
Module 5: Service Management For The New Cloud
  • Configuring Service Manager – Part 1
  • Configuring Service Manager – Part 2
  • Configuring Service Manager – Part 3
  • Configuring Service Manager – Part 4
  • Automating Service Management – Part 1
  • Automating Service Management – Part 2
  • Automating Service Management – Part 3
  • Managing Incidents And Problems
Module 6: High Availability And Disaster Recovery For The Private Cloud
  • High Availability For The Private Cloud – Part 1
  • High Availability For The Private Cloud – Part 2
  • High Availability For The Private Cloud – Part 3
  • High Availability For The Private Cloud – Part 4
  • Protecting Data In The Private Cloud – Part 1
  • Protecting Data In The Private Cloud – Part 2
  • Recovering Data In The Private Cloud – Part 1
  • Recovering Data In The Private Cloud – Part 2
Module 7: Optimizing The Private Cloud Infrastructure
  • Applying Infrastructure Updates
  • Applying Updates To Virtual Machines
  • Extending The Private Cloud Infrastructure
  • Optimizing The Cloud Infrastructure With System Center Advisor
  • Using PRO-Tips To Optimize The Cloud
Module 8: Configuring Multi­Tenant Self­Service Using Windows Azure Pack
  • Understanding Windows Azure Pack
  • Windows Azure Pack Administration
  • Windows Azure Pack Providers
Module 9: Configuring And Monitoring The Private Cloud Review
  • Configuring And Monitoring The Private Cloud Review
  • Conclusion
Module 1: Understanding Microsoft Applications
  • Introduction To Exam 70-409
  • Introduction To Microsoft Virtualization-Part1
  • Introduction To Microsoft Virtualization-Part2
  • Introduction To System Center 2012 R2 Components
  • Evaluate The Existing Environment For Virtualization
  • Module 1 Review Questions
Module 2: Installing And Configuring The Hyper-V Role
  • Install The Hyper-V Role
  • Manage Hyper-V
  • Configure Hyper-V Settings
  • Introduction To Hyper-V Host Storage And Networking
  • Module 2 Review Questions
  • Installing Hyper-V-Demo
Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual Machine Checkpoints
  • Create And Configure Virtual Hard Disks
  • Create And Configure Virtual Machines
  • Install And Import Virtual Machines
  • Manage Virtual Machine Checkpoints
  • Monitor Hyper-V
  • Design Virtual Machines For Server Roles-Services
  • Module 3 Review Questions
  • Creating A Virtual Machine-Demo
Module 4: Producing And Configuring Virtual Machine Networks
  • Generate And Utilize Hyper-V Virtual Switches-Part1
  • Generate And Utilize Hyper-V Virtual Switches-Part2
  • Introduction To Advanced Hyper-V Networking Features
  • Configure And Utilize Hyper-V Network Virtualization
  • Module 4 Review Questions
  • ControllingThe VM Demo
Module 5: Virtual Machine Movement And Hyper-V Replicas
  • Deliver High Availability And Redundancy For Virtualization
  • Implement Virtual Machine Movement
  • Implement And Manage Hyper-V Replica
  • Module 5 Review Questions
Module 6: Implementing Failover Clustering Using Hyper-V
  • Introduction To Failover Clustering-Part1
  • Introduction To Failover Clustering-Part2
  • Configure And Utilize Shared Storage
  • Implement And Manage Failover Clustering Using Hyper-V
  • Module 6 Review Questions
  • Exploring Clustering-Demo
Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual Machine Manager
  • Integrated System Center And Server Virtualization
  • Virtual Machine Manager
  • Install VMM And Add Hosts And Manage Host Groups
  • Module 7 Review Questions
  • Exploring SCVMM
Module 8: Managing The Network And Storage Infrastructure In Microsoft System Center 2012 R2 Virtual Machine Manager
  • Managing Networking Infrastructure
  • Managing Storage Infrastructure And Infrastructure Updates
  • Module 8 Review Questions
Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager
  • Introduction To Virtual Machine Management Tasks In VMM
  • Create Clone And Convert Virtual Machines
  • Introduction To Virtual Machine Updating
  • Module 9 Review Questions
Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library
  • Introduction To The Virtual Machine Manager Library
  • Working With Profiles And Templates
  • Module 10 Review Questions
Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine Manager
  • Introduction To The Cloud
  • Produce And Manage A Cloud And User Role Utilization In VMM
  • Module 11 Review Questions
Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual Machine Manager And Application Controller
  • Managing Service In MSC 2012 R2 VMM And Application Controller-Part1
  • Managing Service In MSC 2012 R2 VMM And Application Controller-Part2
  • Module 12 Review Questions
Module 13: Protecting And Monitoring Virtualization Infrastructure
  • Introduction To Backup And Restore Options For Virtual Machines
  • Protecting Virtualization Infrastructure By Using DPM-Part1
  • Protecting Virtualization Infrastructure By Using DPM-Part2
  • Utilize Operations Manager For Monitoring And Reporting
  • Integrate VMM With Operations Manager
  • Module 13 Review Questions
  • Exploring DPM-Demo
Module 14: Hyper-V And SCVMM Review
  • Hyper-V And SCVMM Review-Part1
  • Hyper-V And SCVMM Review-Part2
  • Hyper-V And SCVMM Review-Part3
  • Hyper-V And SCVMM Review-Part4
  • Exam 70-409 Conclusion
Module 1: Intro To XenServer And Virtualization
  • Intro To Virtual Computing
  • Hypervisors-Part1
  • Hypervisors-Part2
  • Installing Your First VM
  • Creating An Active Directory Domain In The VM
  • Adding VM And Host To Domain
  • Virtual Networks Explained
Module 2: Comprehensive Introduction To Linux
  • Intro And Demo Of Linux
  • Configuring Linux VM
  • Network Configuration
  • Linux Scripting And File Permissions
  • Advanced Linux Permissions
  • Linux DHCP And Disks Explained
  • Install And Configure DHCP
Module 3: Hosts, Storage, And Networking
  • Storage Access And Configuration
  • iCSI Configuration And Access
  • Storage Repository
  • Subnets Explained
  • Subnets Example
  • More Subnetting
  • Building A Linux Based VM Router
Module 4: Comprehensive Introduction To Powershell
  • Why Powershell
  • Using Powershell
  • Pipelines And WMI
  • More WMI And Scripting Using Powershell
  • Advanced Powershell Scripting
Module 5: XenServer Components And Features
  • Critical Components
  • VM Templates
  • Virtual Networking
  • Automation Explained
  • Automation Using XenServer CLI Demo
  • Automation Using Powershell Demo
  • Powershell Script Completion And Execution
  • Protecting Your Virtual Environment Explained
  • Protecting Your Virtual Environment Demo
  • XenCenter Comprehensive Walk Through
Module 6: Problem Resolution
  • Troubleshooting Explained
  • VM Migration
Module 7: Review
  • XenServer Exam Objectives
  • PXE Server Explained
  • PXE Server Demo
  • XenServer Product Review
  • AD Using Command Line And PowerShell
  • Conclusion
Module 1: Handling Design And Architecture For Microsoft Lync Server 2013
  • Course And Instructor Introduction
  • Introduction To Lync Server 2013 Architecture – Part 1
  • Introduction To Lync Server 2013 Architecture – Part 2
  • Introduction To Lync Server 2013 Architecture – Part 3
  • Introduction To Lync Server 2013 Architecture – Part 4
  • Introduction To Lync Server 2013 Architecture – Part 5
  • Introduction To Lync Server 2013 Architecture – Part 6
  • Introduction To Lync Server 2013 Core Capabilites
  • Introduction To Lync Server 2013 Design Process
  • Evaluate Infrastructure Requirements And Update The Design
  • Plan For All Phases Of Microsoft Solutions Framework – Part 1
  • Plan For All Phases Of Microsoft Solutions Framework – Part 2
  • Plan For All Phases Of Microsoft Solutions Framework – Part 3
  • Module 1 Questions
Module 2: Designing A Lync Server 2013
  • Plan Infrastructure Requirements For Lync Server 2013 – Part 1
  • Plan Infrastructure Requirements For Lync Server 2013 – Part 2
  • Use The Lync Server 2013 Planning Tool
  • Use The Topology Builder – Part 1
  • Use The Topology Builder – Part 2
  • Plan The Server Infrastructure
  • Design Documentation With The Use Of Microsoft Office – Part 1
  • Design Documentation With The Use Of Microsoft Office – Part 2 And Module 2 Questions
Module 3: Installing Lync
  • Prepare For Installation
  • Install Lync – Part 1
  • Install Lync – Part 2
Module 4: Using Management Tools And RBAC
  • Using Management Tools – Part 1
  • Using Management Tools – Part 2
  • Using Management Tools – Part 3
  • Using Management Tools – Part 4
  • Using Management Tools – Part 5
  • Using Management Tools – Part 6
  • Introduction To Role-Based Access Control
  • Module 4 Questions
Module 5: Deploying And Managing Clients And Devices
  • Prepare For Client Deployment
  • Deploy And Manage Lync 2013 Clients
  • Prepare For Device Deployment And Module 5 Questions
Module 6: Conferencing In Lync Server 2013
  • Introduction To Conference In Lync Server 2013 – Part 1
  • Introduction To Conference In Lync Server 2013 – Part 2
  • Design For Web And Audio-Video Conferencing
  • Introduction To Dial-In Conferencing In Lync Server 2013
  • Manage And Administer Conferencing And Module 6 Questions
Module 7: Designing And Deploying External Access
  • Introduction To Lync 2013 External Capabilities – Part 1
  • Introduction To Lync 2013 External Capabilities – Part 2
  • Plan For IM And Presence Federation
  • Design Edge Requirements – Part 1
  • Design Edge Requirements – Part 2
  • Module 7 Questions
Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat
  • Introduction To Persistent Chat Architecture And Design Considerations In Lync Server 2013
  • Deploy And Configure Lync Server 2013 Persistent Chat And Module 8 Questions
Module 9: Archiving And Monitoring
  • Introduction To The Archiving And Monitoring Services
  • Configure Archiving And Monitoring And Module 9 Questions
Module 10: Administering And Maintaining Lync Server 2013
  • Administering And Maintaining Lync Server 2013 – Part 1
  • Administering And Maintaining Lync Server 2013 – Part 2
Module 11: Configuring And Managing High Availability In Lync Server 2013
  • Introduction To High Availability In Lync Server 2013
  • Design Load Balancing – Part 1
  • Design Load Balancing – Part 2
Module 12: Understanding Disaster Recover In Lync Server 2013
  • Understanding Disaster Recover In Lync Server 2013 – Part 1
  • Understanding Disaster Recover In Lync Server 2013 – Part 2
  • Module 12 Real World Scenarios And Questions
Module 13: Planning a Migration to Lync Server 2013
  • Introduction To Coexistence And Migration – Part 1
  • Introduction To Coexistence And Migration – Part 2
  • Introduction To Coexistence And Migration – Part 3
  • Introduction To Migration Steps – Part 1
  • Introduction To Migration Steps – Part 2
  • Plan For Clients And Devices And Design Client Migration And Device Migration Strategy
  • Course Outro
Module 1: Understanding Voice Architecture
  • Course Introduction
  • Introduction To Architecture And Server Roles – Part 1
  • Introduction To Architecture And Server Roles – Part 2
  • Introduction To Architecture And Server Roles – Part 3
  • Introduction To Architecture And Server Roles – Part 4
  • Introduction To Architecture And Server Roles – Part 5
Module 2: Configuring Key Enterprise Voice Functionality
  • Introduction To Lync Voice Routing
  • Configure Enterprise Voice – Part 1
  • Configure Enterprise Voice – Part 2
  • Configure Enterprise Voice – Part 3
  • Define Voice Policies – Part 1
  • Define Voice Policies – Part 2
Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with Lync Server 2013
  • Introduction To Exchange 2013 Unified Messaging – Part 1
  • Introduction To Exchange 2013 Unified Messaging – Part 2
  • Configure Exchange UM To Work With Lync 2013 – Part 1
  • Configure Exchange UM To Work With Lync 2013 – Part 2
  • Configure Exchange UM To Work With Lync 2013 – Part 3
  • Configure Exchange UM To Work With Lync 2013 – Part 4
  • Configuring Exchange And Lync Feature Integration – Part 1
  • Configuring Exchange And Lync Feature Integration – Part 2
  • Configuring Exchange And Lync Feature Integration – Part 3
  • Configuring Exchange And Lync Feature Integration – Part 4
  • Configuring Exchange And Lync Feature Integration – Part 5
Module 4: Understanding Voice Applications
  • Introduction To Response Group Services – Part 1
  • Introduction To Response Group Services – Part 2
  • Introduction To Response Group Services – Part 3
  • Introduction To Response Group Services – Part 4
Module 5: Configuring and Deploying Emergency Calling
  • Introduction To Location Information Server – Part 1
  • Introduction To Location Information Server – Part 2
  • Introduction To Set Up And Call Flow – Part 1
  • Introduction To Set Up And Call Flow – Part 2
  • E911 User Experience
Module 6: Integrating the PSTN
  • Connect To The PSTN – Part 1
  • Connect To The PSTN – Part 2
  • Connect To The PSTN – Part 3
  • Connect To The Existing PBX
  • Intro To M-N Interworking Routing
  • Introduction To Call Routing Reliability
Module 7: Understanding Lync Server 2013 and Networking
  • Plan For Media Requirements – Part 1
  • Plan For Media Requirements – Part 2
  • Plan For Call Admission Control – Part 1
  • Plan For Call Admission Control – Part 2
  • Introduction To Media Bypass
Module 8: Understanding Phones and Devices
  • Introduction To Phones And Devices Deploy Device – Part 1
  • Introduction To Phones And Devices Deploy Device – Part 2
  • Introduction To Phones And Devices Deploy Device – Part 3
  • Lync Server 2013 Phones Management – Part 1
  • Lync Server 2013 Phones Management – Part 2
Module 9: Configuring And Migrating Lync Online
  • Introduction To Office 365 Architecture
  • Deploy Lync Online
  • Introduction To Lyncy brid Scenerios
Module 10: Monitoring
  • Introduction To Voice Quality Concepts
  • Explore Lync Monitoring Server Components
  • Explore Lync Monitoring Server Reports
Module 11: Understanding Lync Server2013 Voice Resiliency
  • Introduction To Voice Resilience
  • Introduction Lync Pool Resilience
  • Introduction Branch Office Resilience
  • Course Outro
Module 1: Intro To Business Intelligence
  • Introduction
  • The Business Intelligence Solution
  • Overview Of Business Intelligence
  • BI And Power Pivot Demo
  • ETL Intro
  • Designing Data Warehouses
  • Design For Speed
  • BI Semantic Model
Module 2: Database Essentials
  • Basic Database Objects Demo
  • Stored Procedures And Triggers Demo
  • Database Clusters Demo
  • SQL Server Management
  • Table Triggers
  • DB Config Options
  • DB Backup
  • DB Files And Restore
Module 3: Business Intelligence Development
  • Using SQL Server Data Tools Demo
  • Building An IS Integration Services Package Demo
  • Loading Data From Remote Sources Demo
Module 4: Business Intelligence Results
  • Report Building Intro Setup Demo
  • Using Report Builder Demo
  • Processing Data From Web Service Demo
  • Reporting From Multiple Tables Demo
  • Report Function And Matrix Demo
  • Interactive Reports Demo
  • Sorting Report Data Demo
Module 5: Advanced Reporting And Development
  • Drill Through Reports
  • Data Visualization
  • Creating Store Procedure From Scratch
  • Memory Optimize Table
Module 6: SQL Server Integration Services (SSIS)
  • Building Our First Integration Project
  • Data Transformation
  • Introduction To Big Data
  • Transformation Using Store Procedure
  • Transformation Using SSIS
  • Building Fact Table Using Store Procedure
  • Building Fact Table Using SSIS
Module 7: SQL Server 2014 New Features
  • Backup Enhancements
  • Index Enhancements
  • Online DB Enhancements
  • BackUp To The Cloud
  • Partition Data
Module 8: Course Review And Exam Prep
  • BI Review
  • SharePoint Overview
  • SharePoint Demo
  • Exam Prep
  • Before You Take The Exam
  • Conclusion
Module 1: Introduction To Virtualization
  • Introduction
  • Intro To Virtualization-Part1
  • Virtualization Demo-Part1
  • Virtualization Demo-Part2
  • Intro To Virtualization-Part2
Module 2: Introduction To Desktop Virtualization
  • Into To Desktop Virtualization
Module 3: XenDesktop 7.6 Requirements and Implementations
  • Intro To Xen Desktop Concepts And Components
  • Xen Desktop Implementations-Part1
  • Xen Desktop Implementations-Part2
Module 4: Plan and Design XenDesktop Infrastructure
  • Intro To Plan And Design-Part1
  • Intro To Plan And Design-Part2
  • Active Directory Permissions Demo
  • Customize The Desktop Demo
  • Customize Environment Demo
  • Folder Redirection Demo
  • Custom Scripts Demo
  • Dynamic VM Demo
  • Network Design Considerations
  • VM From Scratch Demo
  • Access And Optimize
  • Cloud Considerations Demo
  • Design Monitoring
Module 5: Data And Network Redundancy
  • Intro To Network Redundancy
  • Intro To Data Redundancy
  • VM Availability Demo-Part1
  • VM Availability Demo-Part2
  • VM Availability Demo-Part3
  • Citrix Linux VM And Citrix Xendesktop Site Configuration Demo
Module 6: Automating Using Powershell
  • Intro To Powershell-Part1
  • Intro To Powershell-Part2
  • Powershell Scripting Demo
  • Creating Functions In Powershell
Module 7: Virtualizing Using Hyper-V
  • Introduction To Hyper-V Installtion
  • Introduction To Hyper-V VM Build
  • Automating Admin In Hyper-V
Module 8: Build Test And Deploy VM To Xen Desktop
  • Customize Client OS Demo
  • Customize User Profiles Demo
  • Installing XenDesktop Client Components For Pooled Desktops Demo
  • Installing XenDesktop Client Components For Remote Desktops Demo
  • Deploy XenDesktop Client After VDA Install Demo
  • Test Client Deployment Demo
Module 9: Internet Information Services
  • Intro And Install Of Information Services-Part1
  • Intro And Install Of Information Services-Part2
  • Creating Websites And Managing Application Pools
  • Backup And Restore WebServer
Module 10: Course Review
  • Active Directory Domain
  • Windows Permissions And Configurations
  • Configure Citrix XenDesktop Studio
  • Failover Cluster Demo
  • Citrix Authentication And Troubleshooting
  • XenDesktop Technical Overview
  • SQL Server Database Overview Demo
  • SQL Server DBA Tasks
  • Conclusion
Module 1: Beginner
  • Beginner
Module 2: Intermediate
  • Intermediate
Module 3: Advanced
  • Advanced
How to Become a Personal Trainer
  • Intro
  • Requirements
  • Skills For A Successful Personal Trainer
  • Questions To Consider
  • Certifications
  • Job Opportunities
  • Salary For Personal Trainer
  • First Aid And CPR
  • Time Needed To Become A Personal Trainer
  • Know Your Clients
  • Interesting And Fun
  • Common Mistakes
  • Retaining Your Clients
  • Insurance
  • Summary
Module 1: Organization­ – Wide Planning and Deployment
  • Introduction
  • Wide Planning And Deployment-Part 1
  • Wide Planning And Deployment-Part 2
  • Wide Planning And Deployment-Part 3
Module 2: Leadership
  • Leadership-Part 1
  • Leadership-Part 2
Module 3: Organizational Process Measures and Management
  • Organizational Process Measures And Management-Part 1
  • Organizational Process Measures And Management-Part 2
Module 4: Team Management
  • Team Management-Part 1
  • Team Management-Part 2
  • Team Management-Part 3
  • Team Management-Part 4
Module 5: Define Phase­ – Overview of the Define Phase and the Voice of the Customer
  • Overview Of The Define Phase And The Voice Of The Customer-Part 1
  • Overview Of The Define Phase And The Voice Of The Customer-Part 2
  • Overview Of The Define Phase And The Voice Of The Customer-Part 3
Module 6: Define Phase – Business Case and Project Charter
  • Business Case And Project Charter-Part 1
  • Business Case And Project Charter-Part 2
Module 7: Define Phase­ – Analytical Tools
  • Analytical Tools
Module 8: Measure Phase­ – Process Analysis and Documentation
  • Process Analysis And Documentation-Part 1
  • Process Analysis And Documentation-Part 2
  • Process Analysis And Documentation-Part 3
Module 9: Measure Phase­ – Data Collection
  • Data Collection
Module 10: Measure Phase – ­Measurement Systems
  • Measurement Systems-Part 1
  • Measurement Systems-Part 2
Module 11: Measure Phase­ – Basic Statistics
  • Basic Statistics-Part 1
  • Basic Statistics-Part 2
Module 12: Measure Phase­ – Probability
  • Probability
Module 13: Measure Phase­ – Process Capability
  • Process Capability
Module 14: Analyze Phase – Measuring and Modeling Relationships
  • Measuring And Modeling Relationships
Module 15: Analyze Phase­ – Hypothesis Testing
  • Hypothesis Testing
Module 16: Analyze Phase­ – FEMA and Additional Analysis Methods
  • FMEA And Additional Analysis Methods-Part 1
  • FMEA And Additional Analysis Methods-Part 2
  • FMEA And Additional Analysis Methods-Part 3
  • FMEA And Additional Analysis Methods-Part 4
Module 17: Improve Phase­ – Design of Experiments (DOE)
  • Design Of Experiments-Part 1
  • Design Of Experiments-Part 2
Module 18: Improve Phase­ – Lean Method
  • Lean Method-Part 1
  • Lean Method-Part 2
  • Lean Method-Part 3
Module 19: Improve Phase -­ Implementation
  • Implementation
Module 20: Control Phase­ – Statistical Process Control (SPC)
  • Statistical Process Control
Module 21: Control Phase­ – Other Controls
  • Other Controls
Module 22: Control Phase­ – Maintain Controls and Sustain Improvements
  • Maintain Controls And Sustain Improvements
Module 23: DFSS
  • DFSS
Module 24: Exam Review­ – Prep and Key Concepts
  • Prep And Key Concepts-Part 1
  • Prep And Key Concepts-Part 2
  • Prep And Key Concepts-Part 3
  • Prep And Key Concepts-Part 4
  • Prep And Key Concepts-Part 5
  • Conclusion
Module 1: Six Sigma And The Organization
  • Introduction
  • Six Sigma And The Organization Goals-Part 1
  • Six Sigma And The Organization Goals-Part 2
  • Lean Principles In The Organization
  • Design For Six Sigma
Module 2: Define Phase­Project Identification
  • Define Phase-Project Identification-Part 1
  • Define Phase-Project Identification-Part 2
  • Define Phase-Project Identification-Part 3
Module 3: Define Phase­Voice Of The Customer
  • Define Phase-Voice Of The Customer-Part 1
  • Define Phase-Voice Of The Customer-Part 2
Module 4: Define Phase­ Project Management Basics on Six Sigma Green Belt
  • Define Phase-Project Management Basics-Part 1
  • Define Phase-Project Management Basics-Part 2
Module 5: Define Phase­Management And Planning Tools
  • Define Phase-Management And Planning Tools-Part 1
  • Define Phase-Management And Planning Tools-Part 2
Module 6: Define Phase­Business Results For Projects
  • Define Phase-Business Results For Projects-Part 1
  • Define Phase-Business Results For Projects-Part 2
Module 7: Define Phase­Team Dynamics And Define Phase Summary Review Questions
  • Define Phase-Team Dynamics And Review Questions
  • Define Phase-Summary And Review Questions
Module 8: Measure Phase­Process Analysis And Documentation
  • Measure Phase-Process Analysis And Documentation
Module 9: Measure Phase­Probability And Statistics
  • Measure Phase-Probability And Statistics
Module 10: Measure Phase­Statistical Distributions
  • Measure Phase-Statistical Distributions
Module 11: Measure Phase­Collecting And Summarizing Data
  • Measure Phase-Collecting And Summarizing Data-Part 1
  • Measure Phase-Collecting And Summarizing Data-Part 2
Module 12: Measure Phase­Measurements System Analysis (MSA)
  • Measure Phase-Measurements System Analysis(MSA)
Module 13: Measure Phase­Process And Performance Capability And Measure Phase Summary And Review
  • Measure Phase-Process And Performance Capability And Measure Phase Summary And Review
Module 14: Analyze Phase­Exploratory Data Analysis And Hypothesis Testing
  • Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part1
  • Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part2
  • Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part3
Module 15: Analyze Phase ­ Process Drivers
  • Analyze Phase-Process Drivers-Part 1
  • Analyze Phase-Process Drivers-Part 2
  • Analyze Phase-Process Drivers-Part 3
  • Analyze Phase-Process Drivers-Part 4
  • Analyze Phase-Process Drivers-Part 5
Module 16: Improve Phase­Design Of Experiment (DOE)
  • Improve Phase-Design Of Experiment(DOE)-Part 1
  • Improve Phase-Design Of Experiment(DOE)-Part 2
Module 17: Improve Phase­Root Cause Analysis
  • Improve Phase-Root Cause Analysis-Part 1
  • Improve Phase-Root Cause Analysis-Part 2
  • Improve Phase-Root Cause Analysis-Demo
Module 18: Improve Phase­Lean Tools
  • Improve Phase-Lean Tools-Part 1
  • Improve Phase-Lean Tools-Part 2
  • Improve Phase-Lean Tools-Part 3
  • Improve Phase-Lean Tools-Part 4
Module 19: Control Phase­ Statistical Process Control
  • Control Phase-Statistical Process Control
Module 20: Control Phase­Lean Tools For Process Control
  • Control Phase-Lean Tools For Process Control-Part 1
  • Control Phase-Lean Tools For Process Control-Part 2
  • Control Phase-Lean Tools For Process Control-Part 3
Module 21: Review Exam­Prep And Key Concepts
  • Exam Review And Key Concepts-Part 1
  • Exam Review And Key Concepts-Part 2
  • Exam Review And Key Concepts-Part 3
  • Exam Review And Key Concepts-Part 4
  • Exam Review And Key Concepts-Part 5
  • Exam Review And Key Concepts-Part 6
  • Exam Review And Key Concepts-Part 7
  • Exam Review-Flash Cards
  • Conclusion
Module 1: Designing For The Cloud
  • Introduction
  • Designing The Cloud
  • Reason For Using The Cloud
  • Choosing The Right Cloud Model
  • Designing Private Clouds
  • Overview Of Virtualization Components
  • Windows Server 2012 R2 And Hyper-V
  • System Center 2012 R2 – Part 1
  • System Center 2012 R2 – Part 2
  • Deploying Highly Available Hyper-V Hosts
Module 2: Using System Center Virtual Machine Manager R2
  • Overview Of Virtual Machine – Part 1
  • Overview Of Virtual Machine – Part 2
  • Deploying VMM
  • Configuring Role Based Access Control
  • Managing Hosts
  • Configuring Networking – Part 1
  • Configuring Networking – Part 2
  • Configuring Storage
Module 3: Deploying And Maintaining Fabric Resources
  • Extending And Maintaining The Cloud Infrastructure
  • Deploying Hyper-V Host Servers – Part 1
  • Deploying Hyper-V Host Servers – Part 2
  • Providing Patch Management For Fabric Resources – Part 1
  • Providing Patch Management For Fabric Resources – Part 2
Module 4: Building The Private Cloud
  • Creating Building Blocks For The Private Cloud – Part 1
  • Creating Building Blocks For The Private Cloud – Part 2
  • Creating Virtual Machine Templates
  • Creating A Private Cloud
  • Creating And Deploying Applications – Part 1
  • Creating And Deploying Applications – Part 2
  • Creating And Deploying Applications – Part 3
  • Creating And Configuring Services – Part 1
  • Creating And Configuring Services – Part 2
  • Configuring Access To The Private Cloud
Module 5: Monitoring And Optimizing The Private Cloud
  • Overview Of Operations Manager
  • Installing Operations Manager
  • Deploying Monitoring Agents
  • Configuring Access To Operations Manager
  • Creating And Configuring Management Packs
  • Configuring System Center Integration
  • Extending And Optimizing Monitoring – Part 1
  • Extending And Optimizing Monitoring – Part 2
Module 6: Planning And Deploying Service Management
  • Overview Of Service Manager
  • Deploying Service Manager
  • Service Manager Work Items – Part 1
  • Service Manager Work Items – Part 2
  • Service Manager Work Items – Part 3
  • Service Manager Notifications
  • System Center Integration – Part 1
  • System Center Integration – Part 2
Module 7: Automating And Standardizing The Private Cloud
  • Overview Of Orchestrator
  • Deploying Automation Using Orchestrator
  • Configuring Integration Packs
  • Configuring And Managing Runbooks
Module 8: Disaster Recovery And High Availability For The Private Cloud
  • Overview Of Data Protection Manager
  • Planning For Data Protection Manager
  • Deploying Data Protection Manager
  • Configuring Protection For The Private Cloud
  • Configuring Protection For Applications – Part 1
  • Configuring Protection For Applications – Part 2
  • Hyper-V Recovery Manager
Module 9: Implementing Self­Service Multi­Tenant Private Clouds
  • Implementing The Cloud Services Process Pack – Part 1
  • Implementing The Cloud Services Process Pack – Part 2
  • Service Provider Foundation
  • Configuring The Windows Azure Pack
  • Conclusion
Weight Loss
  • Introduction
  • Emotional Eating And Digestion
  • Metabolism And Improving Digestion
  • Food Mood And Steps For Weight Loss
  • Portion Size
  • Calorie Intake
  • Supplements And Heart rate
Module 1: Introduction
  • Intro To Exam 70-688
  • Implementing A Methodology For Troubleshooting-Part1
  • Implementing A Methodology For Troubleshooting-Part2
  • Implementing A Methodology For Troubleshooting-Demo
Module 2: Troubleshooting Start Up Issues
  • Troubleshooting Start Up Issues-Part1
  • Troubleshooting Start Up Issues-Part2
  • Troubleshooting Start Up Issues-Part3
  • Troubleshooting Start Up Issues-Part4
  • Troubleshooting Start Up Issues-Demo
Module 3: ​Managing Drivers And Hardware
  • Managing Drivers And Hardware-Part1
  • Managing Drivers And Hardware-Part2
  • Managing Drivers And Hardware-Part3
  • Managing Drivers And Hardware-Demo
Module 4: Troubleshooting Remote Computers
  • Troubleshooting Remote Computers-Part1
  • Troubleshooting Remote Computers-Part2
  • Troubleshooting Remote Computers-Part3
Module 5: Resolving Problems With Network Connectivity
  • Resolving Problems With Network Connectivity-Part1
  • Resolving Problems With Network Connectivity-Part2
  • Resolving Problems With Network Connectivity-Part3
  • Resolving Problems With Network Connectivity-Part4
  • Resolving Problems With Network Connectivity-Part5
Module 6: Troubleshooting Group Policy
  • Troubleshooting Group Policy-Part1
  • Troubleshooting Group Policy-Part2
  • Troubleshooting Group Policy-Part3
  • Troubleshooting Group Policy-Part4
Module 7: Troubleshooting User Settings
  • Troubleshooting User Settings-Part1
  • Troubleshooting User Settings-Part2
  • Troubleshooting User Settings-Part3
Module 8: Configuring And Troubleshooting Remote Connectivity
  • Configuring And Troubleshooting Remote Connectivity-Part1
  • Configuring And Troubleshooting Remote Connectivity-Part2
  • Configuring And Troubleshooting Remote Connectivity-Part3
  • Configuring And Troubleshooting Remote Connectivity Demo-Part1
  • Configuring And Troubleshooting Remote Connectivity Demo-Part2
  • Configuring And Troubleshooting Remote Connectivity Demo-Part3
Module 9: ​Troubleshooting Resource Access In A Domain
  • Troubleshooting Resource Access In A Domain-Part1
  • Troubleshooting Resource Access In A Domain-Part2
  • Troubleshooting Resource Access In A Domain-Part3
  • Troubleshooting Resource Access In A Domain-Demo
Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3
  • Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo
Module 11: Troubleshooting Applications
  • Troubleshooting Applications-Part1
  • Troubleshooting Applications-Part2
  • Troubleshooting Applications-Part3
  • Troubleshooting Applications-Part4
  • Troubleshooting Applications-Demo
Module 12: Maintaining Windows 8.1
  • Maintaining Windows 8.1-Part1
  • Maintaining Windows 8.1-Part2
  • Maintaining Windows 8.1-Part3
  • Maintaining Windows 8.1-Part4
  • Maintaining Windows 8.1-Demo
Module 13: Recovering Windows 8.1
  • Recovering Windows 8.1
  • Conclusion
Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment
  • Introduction
  • Developing A Strategy-Part1
  • Developing A Strategy-Part2
  • Developing A Strategy-Part3
  • Developing A Strategy-Part4
  • Developing A Strategy Demo-Part1
  • Developing A Strategy Demo-Part2
Module 2: Evaluating Application Compatibility in Windows® 7
  • Evaluating Application Compatibility-Part1
  • Evaluating Application Compatibility-Part2
  • Evaluating Application Compatibility-Demo
Module 3: Assessing Deployment Methods for Windows® 7
  • Assessing Deployment Methods-Part1
  • Assessing Deployment Methods-Part2
  • Assessing Deployment Methods-Demo
Module 4: Designing Standard Images for Windows® 7
  • Designing Standard Images-Part1
  • Designing Standard Images-Part2
  • Designing Standard Images-Part3
  • Designing Standard Images-Demo
Module 5: Deploying Windows® 7 with Windows AIK
  • Deploying Windows With Windows AIK
  • Deploying Windows With Windows AIK-Demo
Module 6: Using Windows Deployment Services to Deploy Windows® 7
  • Using Windows Deployment Services-Part1
  • Using Windows Deployment Services-Part2
  • Using Windows Deployment Services-Demo
Module 7: Deploying Windows® 7 Using Lite Touch Installation
  • Deploying Windows 7 Using Lite Touch Installation
  • Deploying Windows 7 Using Lite Touch Installation-Demo
Module 8: Deploying Windows® 7 Using Zero Touch Installation
  • Deploying Windows 7 Using Zero Touch Installation
  • Deploying Windows 7 Using Zero Touch Installation-Demo
Module 9: Migrating User State Using USMT 4.0 and WET
  • Migrating User State Using USMT 4.0 And WET-Part1
  • Migrating User State Using USMT 4.0 And WET-Part2
Module 10: Planning, Configuring, and Managing the Client Environment
  • Planning Configuring And Managing The Client Environment-Part1
  • Planning Configuring And Managing The Client Environment-Part2
  • Planning Configuring And Managing The Client Environment-Part3
  • Planning Configuring And Managing The Client Environment-Part4
  • Planning Configuring And Managing The Client Environment-Demo
Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Part1
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Part2
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Part3
  • Planning And Deploying Applications And Updates To Windows 7 Clients-Demo
Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
  • Introduction
  • Installing Part 1
  • Installing Part 2
  • Installing Part 2 Demo 1
  • Installing Part 2 Demo 2
Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
  • Getting Familiar With SQL Part 1
  • Getting Familiar With SQL Part 1 Demo
  • Getting Familiar With SQL Part 2
  • Getting Familiar With SQL Part 2 Demo
  • Getting Familiar With SQL Part 3
  • Getting Familiar With SQL Part 3 Demo
Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
  • Data Types
  • Data Types Demo
Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
  • Databases Part 1
  • Databases Part 1 Demo
  • Databases Part 2
  • Databases Part 2 Demo
  • Databases Part 3
Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
  • Tables
  • Tables Demo
Module 6: Looking at Views
  • Views Part 1
  • Views Part 1 Demo
  • Views Part 2
  • Views Part 2 Demo
  • Views Part 3
Module 7: About Constraints
  • Constraints Part 1
  • Constraints Part 1 Demo
  • Constraints Part 2
Module 8: Looking at Stored Procedures
  • Stored Procedures Part 1
  • Stored Procedures Part 1 Demo
  • Stored Procedures Part 2
Module 9: Functions
  • Functions
  • Functions Demo
Modules 10: About Service Broker
  • Service Broker Part 1
  • Service Broker Part 2
Modules 11: Integrity
  • Data Integrity Part 1
  • Data Integrity Part 2
Modules 12: Permissions in SQL
  • Permissions Part 1
  • Permissions Part 1 Demo
  • Permissions Part 2
Modules 13: Accounts
  • Logins Roles And Credentials
  • Logins Roles And Credentials Demo
Modules 14: Security
  • Additional Security Tools
  • Additional Security Tools Demo
Modules 15: Backups/Restores
  • Backing Up And Restoring Databases Part 1
  • Backing Up And Restoring Databases Part 2
  • Backing Up And Restoring Databases Demo
Modules 16: Endpoints
  • Endpoints
Modules 17: Servers working together
  • Linking Servers
Modules 18: Triggers in SQL
  • Triggers
Modules 19: Replication between servers
  • Replication Part 1
  • Replication Part 2
Modules 20: Indexes
  • Performing Indexing And Full Text Searching
Modules 21: Transactions in SQL
  • Transaction And Locks
Modules 22: Data moves
  • Moving Data
Modules 23: Data specialties in SQL
  • Handling Specialty Data
Modules 24: Fault Tolerance
  • High-Availability Methods Part 1
  • High-Availability Methods Part 2
Modules 25: SQL Management
  • Maintaining And Automating SQL Server
Modules 26: SQL Management Monitoring
  • Monitoring And Optimizing SQL Server
  • Monitoring And Optimizing SQL Server Demo
Modules 27: SQL Management tools
  • SQL Server Management Tools
Module 28: Troubleshooting
  • Troubleshooting Techniques
  • Troubleshooting Techniques Demo
Module 29: Course Review
  • Course Review Part 1
  • Course Review Part 2
  • Course Review Part 3
  • Course Review Part 4
  • Course Review Part 5
Module 30: Common Questions
  • Common Student Questions Part 1
  • Common Student Questions Part 2
Module 31: Real World Scenarios
  • Real World Scenarios Part 1
  • Real World Scenarios Part 2
Day 1
  • Intro
  • History
  • Sanitation
  • Cleaning
  • Extract Batch Equipment
  • Air Locks
  • Extract Batch Ingredients
  • Extract Batch Recipe
  • Heating
  • First Hop Addition
  • Second Hop Addition
  • Filtering
  • Measuring Density
Day 2
  • Mixed Batch Intro
  • Adding Malt
  • Removing Malt
  • Adding Extract
  • Adding 1st Hops
  • 2nd Hops Addition
  • 3rd Hops Addition
  • Final Hop Adition
  • Add Yeast Part 1
  • Add Yeast Part 2
  • All Grains Part 1
  • All Grains Part 2
  • All Ingredients
Day 3
  • All Grains Intro
  • CU of Fermentation Bubbling
  • Adding Grain
  • Adding Grain Insert
  • Sparging Part 1
  • Sparging Part 2
  • Sparging Mid Process
  • Boiling
  • 2nd Hop Addition
  • Colling Wort
  • Adding Yeast
  • Alternative Methods
Day 4
  • Post Brewing Overview
  • Siphoning
  • Bottling
  • Capping
  • Bottling Alternatives
  • Kegs Part 1
  • Kegs Part 2
  • Natural Carbonation
  • Forced Carbonation
  • Kegerator
  • Finished Product
  • Outro
Day 1
  • Intro
  • Glassware
  • Tools
  • Alcohol Types
Day 2
  • Martini
  • Martini continued
  • Flavored Martini
  • Section Tool
  • Long Island
  • Sour Drinks
  • Popular Drinks Part 1
  • Popular Drinks Part 2
  • Popular Drinks Part 3
  • Popular Drinks Part 4
  • Ruthie Martini
  • Ruthie Martini Continued
  • Flavored Martinis
  • More Sour Drinks
Day 3
  • Recap Drinks
  • Muddlers
  • Popular Drinks
  • Popular Drinks 2
  • Tropical Drinks
  • Shooters Part 1
  • Shooters Part 2
  • Shooters Part 3
  • Shots
  • Shooters Conclusion
  • Beer
  • Greetings Customers
Day 4
  • Recap-Drinks
  • Layered Shots
  • Wines
  • Counterfeit Money
  • Organizing Your Bar Part 1
  • Organizing Your Bar Part 2
  • Valid ID
  • Tools and Accessories
  • Common Issues
Day 5
  • Review Intro
  • Review Characters
  • Review Tools
  • Review Pour
  • Review Glass
  • Review Martinis
  • Review Muddler
  • Review Drinks
  • Review Lit
  • Review Sour Drinks
  • Review Types of Liquor
  • Review More Drinks
  • Review Tropical Drinks
  • Review Shooters
  • Review Beer
  • Review Layered Shots
  • Review Money
  • Review ID
  • Conclusion
How to Handle Stress in the Workplace
  • Introduction
  • What is Stress
  • What Does Stress Lead To
  • Stress And Food
  • Chronic Stress And Cortisol-Part 1
  • Chronic Stress And Cortisol-Part 2
  • Client Stress Stories
  • Stress In The Workplace
  • Strategies For Managing Stress
  • Planning Ahead
  • Money
  • Sleep
  • Breathing
  • Learn To Say No
  • Stress Relief At Your Desk
  • Stretching
  • Conclusion
Beginner
  • Beginner
Intermediate
  • Intermediate
Advanced
  • Advanced
Module 1: Development Methods
  • Introduction To Scrum Master
  • Development Methods
Module 2: Agile Manifesto Principles
  • Agile Manifesto Principles
Module 3: Scrum
  • Scrum
  • Scrum Summary
Module 4: Why Scrum
  • Why Scrum?
Module 5: Scrum-Roles Overview
  • Scrum – Roles Overview
Module 6: Product Owner
  • Product Owner
Module 7: Scrum Master
  • Scrum Master
Module 8: Scrum Team
  • Scrum Team
Module 9: Scrum Process
  • Scrum Process
Module 10: Scrum Project Phase
  • Scrum Project Phase
Module 11: Plan and Estimate
  • Plan And Estimate
Module 12: Implement
  • Implement
Module 13: Review and Retrospect
  • Review And Retrospect
Module 14: Release
  • Release
Module 15: Project Vision
  • Project Vision
Module 16: Scrum Master and Stake Holder(s)
  • Scrum Master And Stake Holders
Module 17: Form Scrum Team
  • Form Scrum Team
Module 18: Develop Epics
  • Develop Epics
Module 19: User Stories
  • User Stories
Module 20: Justifications and Sample Change(s)
  • Justifications And Sample Changes
Module 21: Creating a Prioritized Backlog
  • Creating A Prioritized Backlog
Module 22: Conduct Release Planning
  • Conduct Release Planning
Module 23: Sprints
  • Sprints
Module 24: Scrum Framework
  • Scrum Framework – Part 1 Roles
  • Scrum Framework – Part 2 Ceremonies
  • Scrum Framework – Part 3 Artifacts
Module 25: Scrum of Scrums
  • Scrum Of Scrums
Module 26: Scrum Demo
  • Scrum Demo
Module 27: Review
  • Review
  • Outro
Module 1: Introduction To Business Intelligence And Data Modeling
  • Introduction To Business Intelligence and Data Modeling Part1
  • Introduction To Business Intelligence and Data Modeling Part2
  • The Microsoft Business Intelligence Platform Part 1
  • The Microsoft Business Intelligence Platform Part 2
  • The Microsoft Business Intelligence Platform Part 3
  • The Microsoft Business Intelligence Platform Part 4
Module 2: Implementing Reports The SQL Server Reporting Services
  • Implementing Reports the SQL Server Reporting Services Part 1
  • Implementing Reports the SQL Server Reporting Services Part 2
  • Implementing Reports the SQL Server Reporting Services Part 3
  • Implementing Reports the SQL Server Reporting Services Part 4
  • Implementing Reports the SQL Server Reporting Services Part 5
  • Implementing Reports the SQL Server Reporting Services Part 6
  • Implementing Reports the SQL Server Reporting Services Part 7
  • Implementing Reports the SQL Server Reporting Services Part 8
Module 3: Supporting Self Service Reporting
  • Supporting Self Service Reporting Part 1
  • Supporting Self Service Reporting Part 2
Module 4: Managing Report Execution And Delivery
  • Managing Report Execution And Delivery
  • Managing Report Execution
  • Subscriptions And Data Alerts
Module 5: Creating Multidimensional Databases
  • Creating Multidimensional Databases
  • Creating Data Sources And Data Source Views
  • Creating And Browsing a Cube
Module 6: Working With Cubes And Dimensions
  • Working with Cubes And Dimensions
  • Sorting And Grouping Attributes
Module 7: Working With Measures And Measure Groups
  • Working With Measures and Measure Groups
Module 8: Introduction To MDX
  • Introduction To MDX
  • Adding Calculations To A Cube
Module 9: Customizing Cube Functionality
  • Customizing Cube Functionality Part 1
  • Customizing Cube Functionality Part 2
  • Customizing Cube Functionality Part 3
Module 10: Implementing A Tabular Data Model
  • Implementing A Tabular Data Model Part 1
  • Implementing A Tabular Data Model Part 2
Module 11: Introduction To DAX
  • Introduction to DAX
  • Demonstration Making A Tabular Model Part 1
  • Demonstration Making A Tabular Model Part 2
  • Using DAX
Module 12: Implementing An Analysis Services Tabular Data Model
  • Implementing An Analysis Services Tabular Data Model Part 1
  • Implementing An Analysis Services Tabular Data Model Part 2
  • Deploying A Tabular Data Model
Module 13: SQL Analysis Services
  • SQL Analysis Services Part 1
  • SQL Analysis Services Part 2
Module 14: Creating Data Visualizations With Power View
  • Creating Data Visualizations With Power View
Module 15: Supporting Self Service Reporting
  • Supporting Self Service Reporting
Module 16: Performing Predictive Analysis With Data Mining
  • Performing Predictive Analysis With Data Mining
  • Using The Data Mining Wizard
Module 17: Predictive Analytics
  • Predictive Analytics Part 1
  • Predictive Analytics Part 2
Module 1
  • Introduction
  • Models-Part 1
  • Models-Part 2
  • Service And Delivery Models
  • Terms And Characteristics
  • Objects Storage Concepts
Module 2
  • Virtualization
  • Install Configure Manage VM And Devices
  • Backups
  • Virtual Disks
  • Virtual Switches
  • Virtual Resource Migration
  • Benefits Of Virtualization In A Cloud Environment
  • Compare And Contrast Virtua lEnvironment
Module 3
  • Infrastructure
  • Different Access Protocols
  • Explain Storage Configuration
  • File Systems Types
  • Executing Storage Provisioning
  • Network Share Demo
  • Implement Appropriate Network Configurations
  • Importance Of Network Optimization
  • Troubleshoot Basic Network Configuration-Part 1
  • Troubleshoot Basic Network Configuration-Part 2
  • Troubleshoot Commands-Part 1
  • Troubleshoot Commands-Part 2
  • Troubleshoot Commands-Part 3
  • Explain Common Network Protocols
  • Common Hardware Resources
Module 4
  • Resource Management-Part 1
  • Resource Management-Part 2
  • Establishing Baselines And Thresholds
  • Appropriately Allocate Physical Host Resources-Part 1
  • Appropriately Allocate Physical Host Resources-Part 2
  • Appropriately Allocate Virtual Guest Resources-Part 1
  • Appropriately Allocate Virtual Guest Resources-Part 2
  • Use Appropriate Tools For Remote Access
Module 5
  • Security-Part 1
  • Security-Part 2
  • Storage Security Concepts And Methods
  • Different Encryption Technologies
  • Identify Access Control Methods
Module 6
  • Systems Management-Part 1
  • Systems Management-Part 2
  • Diagnose Remediate And Optimize-Part 1
  • Diagnose Remediate And Optimize-Part 2
  • Common Performance Concepts-Part 1
  • Common Performance Concepts-Part 2
  • Testing Techniques
Module 7
  • Business Continuity In Cloud-Part 1
  • Business Continuity In Cloud-Part 2
  • Solutions To Meet Availability Requirements
  • Conclusion
Module 1: Installing, Upgrading, and Migrating to Windows 7
  • Introduction To Exam 685 Windows 7 Enterprise Desktop Support Technician
  • Introduction To Installing Upgrading And Migrating To Windows 7
  • Windows 7 Pre-Installation Requirements
  • Installing Windows 7-Part1
  • Installing Windows 7-Part2
  • Installing Windows 7-Part3
  • Overview Of Image Based Installations-Part1
  • Overview Of Image Based Installations-Part2
  • Overview Of Image Based Installations-Part3
  • Configuring Application Compatibility
  • Chapter 1 Summary
Module 2: Configuring Disks And Device Drivers
  • Introduction To Configuring Disks And Device Drivers
  • Managing And Maintaining Disks-Part1
  • Managing And Maintaining Disks-Part2
  • Managing And Maintaining Disks-Part3
  • Installing And Configuring Device Drivers
  • Chapter 2 Summary
Module 3: Configuring File Access And Printers
  • Introduction To Configuring File Access And Printers
  • Overview Of Authentication And Authorization
  • Managing File Access-Part1
  • Managing File Access-Part2
  • Managing Shared Folders-Part1
  • Managing Shared Folders-Part2
  • Configuring File Compression
  • Managing Printing
  • Chapter 3 Summary
Module 4: Indentifying And Resolving Log on Problems
  • Introduction To Identifying And Resolving Logon Problems
  • Understanding Authentication
  • Managing Computer Accounts
  • Additional Network Services-Part1
  • Additional Network Services-Part2
  • Troubleshooting User Properties
  • Resolving Logon Issues
  • Chapter 4 Summary
Module 5: Configuring Network Connectivity
  • Introduction To Configuring Network Connectivity
  • Configuring TCPIP Connectivity-Part1
  • Configuring TCPIP Connectivity-Part2
  • Configuring TCPIP Connectivity-Part3
  • Automatic IP Address Allocation
  • Name Resolution
  • Wireless Networking-Part1
  • Wireless Networking-Part2
  • Wireless Networking-Part3
  • Chapter 5 Summary
Module 6: Troubleshooting Network Issues
  • Introduction To Troubleshooting Network Issues
  • Troubleshooting Network Connectivity-Part1
  • Troubleshooting Network Connectivity-Part2
  • Troubleshooting Network Connectivity-Part3
  • Troubleshooting Name Resolution-Part1
  • Troubleshooting Name Resolution-Part2
  • Troubleshooting Name Resolution-Part3
  • Troubleshooting Network Printing-Part1
  • Troubleshooting Network Printing-Part2
  • Troubleshooting Network Printing-Part3
  • Chapter 6 Summary
Module 7: Mobile Computing And Remote Access
  • Introduction To Mobile Computing And Remote Access
  • Configuring Mobile Computer And Device Settings
  • Using Remote Control Tools
  • Configuring And Troubleshooting Remote Access-Part1
  • Configuring And Troubleshooting Remote Access-Part2
  • Configuring And Troubleshooting Remote Access-Part3
  • Configuring And Troubleshooting Remote Access-Part4
  • Configuring Branch Cache Managing Computer Accounts
  • Chapter 7 Summary
Module 8: Securing Windows 7 Desktops
  • Introduction To Securing Windows 7 Desktops
  • Overview Of Security Management-Part1
  • Overview Of Security Management-Part2
  • Overview Of Security Management-Part3
  • User Account Control
  • Application Restrictions-Part1
  • Application Restrictions-Part2
  • Configuring The Windows Firewall-Part1
  • Configuring The Windows Firewall-Part2
  • Configuring The Windows Firewall-Part3
  • Configuring The Windows Firewall-Part4
  • Securing And Troubleshooting Internet Explorer-Part1
  • Securing And Troubleshooting Internet Explorer-Part2
  • Securing And Troubleshooting Internet Explorer-Part3
  • Chapter 8 Summary
Module 9: Optimizing And Troubleshooting Performance And Reliabilty
  • Introduction To Optimizing And Troubleshooting Performance And Reliability
  • Overview Of Performance And Reliability Tools-Part1
  • Overview Of Performance And Reliability Tools-Part2
  • Optimizing Performance-Part1
  • Optimizing Performance-Part2
  • Dealing With Hardware Failure
  • Chapter 9 Summary
Module 10: Maintaining Windows 7 Desktops
  • Introduction To Maintaining Windows 7 Desktops
  • Troubleshooting Utilities-Part1
  • Troubleshooting Utilities-Part2
  • Troubleshooting Utilities-Part3
  • Troubleshooting Utilities-Part4
  • Backing Up And Restoring Data
  • Using System Restore
  • Configuring Windows Update
  • Chapter 10 Summary
  • Conclusion
Module 1: Designing A Database Server Infrastructure
  • Introduction
  • Designing A Database Server Infrastructure-Part1
  • Designing A Database Server Infrastructure-Part2
  • Designing A Database Server Infrastructure-Part3
  • Designing A Database Server Infrastructure-Part4
  • Considerations For Database Server Consolidation
  • Managing Server Resources
Module 2: Designing A Logical Database Scheme
  • Designing A Logical Database Scheme-Part1
  • Designing A Logical Database Scheme-Part2
  • Designing A Logical Database Scheme-Part3
  • Designing A Logical Database Scheme-Part4
  • Designing A Logical Database Scheme-Part5
Module 3: Designing A Physical Database Implementation
  • Designing A Physical Database Implementation-Part1
  • Designing A Physical Database Implementation-Part2
  • Designing A Physical Database Implementation-Part3
Module 4: Incorporating Data Files Into the Database
  • Incorporating Data Files Into The Database-Part1
  • Incorporating Data Files Into The Database-Part2
  • Incorporating Data Files Into The Database-Part3
  • Incorporating Data Files Into The Database Demo
  • Searching Data Files
  • Searching Data Files Demo
Module 5: Tuning Database Performance
  • Tuning Database Performance-Part1
  • Tuning Database Performance-Part2
  • Tuning Database Performance-Part3
  • Working With Query Plans-Part1
  • Working With Query Plans-Part2
  • Working With Query Plans-Part3
  • Working With Query Plans-Part4
Module 6: Designing Database Security
  • Designing Database Security-Part1
  • Designing Database Security-Part2
  • Contained Databases
  • Protecting Data With Encryption
Module 7: Policy Based Management
  • Policy Based Management
  • Policy Based Management Demo
Module 8: Monitoring Server Health
  • Monitoring Server Health
  • Monitoring Server Health Demo
Module 9: Designing Database Backup Solution
  • Designing Database Backup Solution-Part1
  • Designing Database Backup Solution-Part2
  • Designing Database Backup Solution-Part3
  • Designing Database Backup Solution-Part4
  • Disaster Recovery Plan-Part1
  • Disaster Recovery Plan-Part2
Module 10: Automating Multi Server Maintenance
  • Automating Multi Server Maintenance
  • Managing Multiple Servers
Module 11: Managing SQL Server With Windows Powershell
  • Managing SQL Server WIth Windows Powershell
  • Windows Powershell Lab
Module 12: Replicating Data
  • Replicating Data-Part1
  • Replicating Data-Part2
  • Replicating Data-Part3
Module 13: Planning High Availability
  • Planning High Availability-Part1
  • Planning High Availability-Part2
Module 14: Review of SQL Statements
  • Review Of SQL Statements-Part1
  • Review Of SQL Statements-Part2
  • Review Of SQL Statements-Part3
Module 15: Eleven Rules of Database Design
  • Eleven Rules Of Database Design
  • Conclusion
Module 1: SQL 2012 And The 464 Test
  • Introduction
  • Intro To SQL Server 2012-Part1
  • Intro To SQL Server 2012-Part2
  • Management Studio Demo-Part1
  • Management Studio Demo-Part2
  • Management Studio Demo-Part3
  • Other SQL Server Tools
Module 2: Working With Data Types
  • Working With Data Types-Part1
  • Working With Data Types-Part2
  • Working With Data Types-Part3
  • Other Data Types
Module 3: Tables
  • Tables
  • Creating Tables
Module 4: Data Constraints
  • Data Constraints-Part1
  • Data Constraints-Part2
Module 5: Planning In Indexing
  • Planning In Indexing-Part1
  • Planning In Indexing-Part2
  • Planning In Indexing-Part3
  • Planning In Indexing-Part4
Module 6: Table Structures
  • Table Structures
  • Working With Clustered Indexes
  • Clustered Indexes
  • Designing Effective Clustered Indexes
Module 7: Improving Performance with Non-Clustered Indexes
  • Improving Performance With Non-Clustered Indexes-Part1
  • Improving Performance With Non-Clustered Indexes-Part2
  • Improving Performance With Non-Clustered Indexes-Part3
Module 8: Using Indexes And Execution Plans
  • Using Indexes
  • Execution Plans-Part1
  • Execution Plans Demo
  • Execution Plans-Part2
Module 9: Working with Views
  • Working With Views-Part1
  • Working With Views-Part2
Module 10: Designing and Implementing Stored Procedures
  • Designing And Implementing Stored Procedures-Part1
  • Designing And Implementing Stored Procedures-Part2
  • Designing And Implementing Stored Procedures-Part3
Module 11: Merging Data and Passing Tables
  • Merging Data And Passing Tables-Part1
  • Merging Data And Passing Tables-Part2
  • Merging Data And Passing Tables-Part3
Module 12: Designing and Implementing User Functions
  • Designing And Implementing User Functions
Module 13: Creating Highly Concurrent SQL Server Applications
  • Creating Highly Concurrent SQL Server Applications-Part1
  • Creating Highly Concurrent SQL Server Applications-Part2
  • Creating Highly Concurrent SQL Server Applications-Part3
Module 14: Handling Errors in T-SQL
  • Handling Error InT-SQL-Part1
  • Handling Error InT-SQL-Part2
Module 15: Triggers
  • Triggers
Module 16: Implementing Managed Code
  • Implementing Managed Code-Part1
  • Implementing Managed Code-Part2
  • Implementing Managed Code-Part3
  • Implementing Managed Code-Part4
Module 17: Storing XML in SQL
  • Storing XML In SQL-Part1
  • Storing XML In SQL-Part2
Module 18: Querying XML
  • Querying XML-Part1
  • Querying XML-Part2
Module 19: Working with the Spatial Data
  • Working With Spatial Data-Part1
  • Working With Spatial Data-Part2
  • Working With Spatial Data-Part3
Module 20: Working With Full-Text Indexes and Queries
  • Working With Full-Text Indexes And Queries-Part1
  • Working With Full-Text Indexes And Queries-Part2
  • Working With Full-Text Indexes And Queries-Part3
Module 1: What Is Microsoft 365
  • Introduction To 365
  • A Little Background On MS Office
  • Office 365 Versions And Features-Part1
  • Office 365 Versions And Features-Part2
  • Online Sign Up
Module 2: Word Online
  • Word Online Overview
  • Starting A Document In Word Online
  • Word Saved To One Drive
  • Navigating Word
  • Tools And Features
  • Fonts Attributes-Part1
  • Fonts Attributes-Part2
  • Lines And Paragraphs-Part1
  • Lines And Paragraphs-Part2
  • Bullets Numbering And Styles-Part1
  • Bullets Numbering And Styles-Part2
  • Inserts Pictures And Tools-Part1
  • Inserts Pictures And Tools-Part2
  • Tables And Formatting-Part1
  • Tables And Formatting-Part2
  • Sharing And Templates-Part1
  • Sharing And Templates-Part2
Module 3: Excel Online
  • Excel Online Overview
  • Getting Started With Excel
  • Data Entry And Navigation
  • Data Entry-Part1
  • Data Entry-Part2
  • Data Entry And Formatting-Part1
  • Data Entry And Formatting-Part2
  • Intro To Formulas
  • Formulas-Part1
  • Formulas-Part2
  • Formulas-Part3
  • Intermediate Formula And Table Format-Part1
  • Intermediate Formula And Table Format-Part 2
  • Surveys
  • More Formula And Charts-Part1
  • More Formula And Charts-Part2
  • Charts
  • Sheets And Templates
Module 4: Powerpoint Online
  • What Is Powerpoint
  • Screen Layout
  • Entering And Formatting Text
  • Layouts And Designs Part 1
  • Layouts And Designs Part 2
  • Inserting Objects
  • Objects And Transitions
  • Animations
  • Smart Art
  • Notes Printing And Templates
Module 5: Outlook Online
  • Intro To Outlook Online
  • Intro To Email Accounts Screen Layout
  • Configuring Outlook Online
  • Sending Emails Outlook Online
  • Organization Outlook Online
  • Mail Rules In Outlook Online
  • Additional Mail Options In Outlook Online
  • Spam And Junk Outlook Online
Module 6: One Note Online
  • What Is OneNote
  • OneNote Screen Overview
  • OneNote Desktop
  • Drawing Tools With OneNote
  • Send To OneNote
  • Media With OneNote
Outlook 2013 Basic
  • Introduction To Outlook
  • Understanding Email Setting Outlook
  • Configuring Interface-Part1
  • Configuring Interface-Part2
  • Email Window-Part1
  • Email Window-Part2
  • Managing The Inbox
  • Using The Calendar-Part1
  • Using The Calendar-Part2
  • Contacts-Part1
  • Contacts-Part2
  • Task List
Outlook 2013 Intermediate
  • Adding An Account From Scratch
  • Multiple Email Accounts In One Window
  • Searching For Mail
  • Managing The Folders Views In Inbox
  • Using Priority And Receipts
  • Calendars
  • Contacts-Part1
  • Contacts-Part2
Outlook 2013 Advanced
  • Mail Part 1 Auto-Replies
  • Mail Part 2 Signatures
  • Views and Options Part 1
  • Views and Options Part 2
  • Calendar Part 1
  • Calendar Part 2
  • Calendar Options
  • Contacts
  • Contacts Options
  • Advanced Options Part 1
  • Advanced Options Part 2
Word 2013 Basic
  • Intro To Word
  • Screen Layout
  • Page Setup And Text Entry
  • Auto-correct Text Formatting
  • More Font Formatting
  • Fonts-Part 3
  • Font Attributes Using Right Click
  • Paragraph Attributes
  • Customizing Bullets And Numbers
  • Reveal Codes Putting It All Together And Saving
  • Viewing Rulers
  • Formatting Images
  • Inserting Images
  • Tabs
  • Window Views And Putting It All Together-Part 1
  • Window Views And Putting It All Together-Part 2
Word 2013 Intermediate
  • Intro To Word 2013 Intermediate
  • Review Introduction To Styles
  • Headers And Footers
  • Section Breaks Section Footers
  • More Objects Word Intermediate
  • Tables In Word Intermediate
  • Inserting Text Boxes Word Intermediate
  • Additional Page Attributes Word Intermediate
  • Intro To Customizing Attributes
  • Continuing Auto-correct Options
  • View Options In Navigation Pane
  • Mail Merge-Part 1
  • Mail Merge-Part 2
  • Mail Merge-Part 3
  • Table Of Contents
  • Columns
  • Working With Outlines
Word 2013 Advanced
  • Word Advanced Introduction
  • End Notes Foot Notes
  • Captions
  • Citations
  • Table Of Authorities
  • Reference Page Index Table
  • Track Changes
  • Compare
  • Advance Mail Merge-Part 1
  • Advance Mail Merge-Part 2
  • Advance Smart Art
  • Templates
  • Custom Configuration
Powerpoint 2013 Basic
  • What Is PowerPoint
  • Screen Elements
  • Starting A New Presentation
  • Layouts
  • Objects-Part1
  • Objects-Part2
  • Objects-Part3
  • Slide Design
  • Slide Transitions
  • Animations-Part1
  • Animations-Part2
  • View And Slideshow
Powerpoint 2013 Intermediate
  • Understanding Slide Masters
  • Slide Masters
  • Animations-Part1
  • Animations-Part2
  • Hotspots And Actions
  • Views
  • Printing Options
Powerpoint 2013 Advanced
  • Introduction To Advanced And Inserting Charts
  • Setting Up Slide Shows-Part1
  • Setting Up Slide Shows-Part2
  • Advanced Animations
  • Templates Vs Shows
  • Reviewing Information And Compare
  • Copy And Paste Across Presentations
  • Customizing Powerpoint
  • Adding Media Video
  • Adding Media Audio-Part1
  • Adding Media Audio-Part2
Excel 2013 Basic
  • Intro To Excel Overview Of Screen
  • Ribbon Elements
  • Entering Data And Editing Font Attributes
  • Number Formats
  • Formatting Cells
  • Printing
  • Formulas – Part 1
  • Formulas – Part 2
  • Rearranging Data
  • More Formulas – Part 1
  • More Formulas – Part 2 Review And Sort
  • More Formulas – Part 3 Concatenate
  • Chart – Part 1
  • Chart – Part 2
  • Chart – Part 3
  • Summary
Excel 2013 Intermediate
  • Introduction
  • Review
  • Formulas Across Worksheets – Part 1
  • Formulas Across Worksheets – Part 2
  • Conditional Formatting
  • Data Validation
  • Names Ranges
  • CSV Files
  • Text To Column
  • Grouping Data
  • More Charts Beyond Building Blocks
  • Working With Windows – Part 1
  • Working With Windows – Part 2
  • Headers Footers And Protecting Data
Excel 2013 Advanced
  • Pivot Tables – Part 1
  • Pivot Tables – Part 2
  • Sparklines
  • Trancing Formulas
  • What If Scenario
  • External Data Sources
  • Customizing Menus And Options – Part 1
  • Customizing Menus And Options – Part 2
  • Macros
Access 2013 Introduction
  • Access 2013 Introduction
  • What Are Databases
  • The Interface Window
  • Setting Up The Database-Part1
  • Setting Up The Database-Part2
  • Creating Forms
  • Understanding Table Relationships
  • Introduction To Queries
  • Introduction To Reports
Access 2013 Intermediate
  • Introduction to Table Tools Part 1
  • Table Tools-Part2
  • Table Tools-Part3
  • Forms And Design Intermediate-Part1
  • Forms And Design Intermediate-Part2
  • Forms Data Entry-Part1
  • Forms Data Entry-Part2
  • Queries
  • Reports From Queries-Part1
  • Reports From Queries-Part2
  • Reports From Queries-Part3
  • Specialized Form
Access 2013 Advanced
  • Advance Introduction And Sub-forms
  • Sub-forms
  • Additional Types Of Queries
  • Form And Macros-Part1
  • Form And Macros-Part2
  • Advance Forms
  • Reports Advance-Part1
  • Reports Advance-Part2
  • Updating Reports
  • Customization And Conclusion
Module 1: Planning Configuration Manager Infrastructure
  • Intro
  • Planning Configuration Manager Infrastructure – Part 1
  • Planning Configuration Manager Infrastructure – Part 2
  • Planning Configuration Manager Infrastructure – Part 3
  • Planning Configuration Manager Infrastructure – Part 4
  • Planning Configuration Manager Infrastructure – Part 5
Module 2: Migrating To Configuration Manager 2012
  • Migrating To Configuration Manager 2012
Module 3: Installations and Site Role Configuration
  • Installation And Site Role Configuration – Part 1
  • Installation And Site Role Configuration – Part 2
  • Installation And Site Role Configuration – Lab 1
  • Installation And Site Role Configuration – Lab 2
Module 4: Cloud Integration
  • Cloud Integration
Module 5: Installing The Client
  • Installing The Client – Part 1
  • Installing The Client – Part 2
  • Installing The Client – Part 3
  • Installing The Client Lab
Module 6: Client Health
  • Client Health
Module 7: Application Deployment
  • Application Deployment
  • Application Deployment Lab
Module 8: Software Updates
  • Software Updates – Part 1
  • Software Updates – Part 2
  • Software Updates Lab
Module 9: Operating System Deployment
  • Operating System Deployment – Part 1
  • Operating System Deployment – Part 2
  • Operating System Deployment – Part 3
Module 10: Inventory and Software Metering
  • Inventory And Software Metering
  • Inventory And Software Metering Lab
Module 11: Asset Intelligence
  • Asset Intelligence
Module 12: Reporting
  • Reporting
  • Reporting Lab
Module 13: Compliance Settings
  • Compliance Settings
Module 14: Endpoint Protection
  • Endpoint Protection
Module 15: Mobile Device Management
  • Mobile Device Management – Part 1
  • Mobile Device Management – Part 2
Module 16: Role-Based Administration
  • Role Based Administration
Module 17: Disaster Recovery
  • Disaster Recovery
Module 18: Troubleshooting
  • Troubleshooting
  • Outro
Module 1: Intro
  • Introduction
Module 2: Wonton
  • Wonton
Module 3: Tomato Basil
  • Tomato Basil
Module 4: Ricotta Gnocchi
  • Ricotta Nyoki
Module 5: Potato Gnocchi
  • Potato Nyoki
Module 6: Pizza Tart
  • Pizza Tart
Module 7: Pesto
  • Pesto
Module 8: Potato Pancakes
  • Potato Pancakes
Module 9: Crostini
  • Crostini
Module 10: Fish Chowder
  • Fish Chowder
Module 11: Fritters
  • Fritters
Module 12: Risotto
  • Risotto
Module 13: Risotto Cakes
  • Risotto Cakes
Module 14: Spanakopita
  • Spanakopita
Module 15: Vegetable Puree Soup
  • Vegetable Puree Soup
Module 16: Corn Chowder
  • Corn Chowder
Module 17: Tempura
  • Tempura
Module 18: Panko Crusted Chicken
  • Panko Crusted Chicken
Module 19: Pork Tenderloin
  • Pork Tenderloin
Module 20: Potato Crusted Salmon
  • Potato Crusted Salmon
Module 21: Grilled Veggies
  • Grilled Veggies-Part1
  • Grilled Veggies-Part2
  • Grilled Veggies-Part3
Module 22: Veggie Risotto
  • Veggie Risotto-Part1
  • Veggie Risotto-Part2
  • Veggie Risotto-Part3
Module 23: Outro
  • Conclusion
Module 1: Introduction to Course and Tools
  • Introduction To The DIY Home Improvement Basics
  • Hand Tools
  • Power Tools
Module 2: Drywall Repair
  • Wall Preparation And Compound Application
  • Sanding And Primer Application
  • Painting
Module 3: Shelving
  • How To Install Basic Shelf
Module 4: Window Safety Locks
  • How To Install Basic Window Safety Locks
Module 5: Window Blinds
  • Removing Existing Blinds
  • Installing New Blinds
Module 6: Door Stop
  • How To Install Basic Door Stop
Module 7: Bi-Fold Closet Doors
  • How To Replace Bi-Fold Closet Doors
Module 8: Interior Doorknob
  • How To Replace An Interior Door Knob
Module 9: Exterior Doorknob and Deadbolt
  • Introduction To Exterior Doorknob And Deadbolt
  • Replacing The Deadbolt And Door Knob
  • Replacing The Strike Plates
Module 10: Door Weather Stripping
  • How To Replace Weather Stripping On An Exterior Door
Module 11: Light Fixture
  • How To Replace A Light Fixture
Module 12: Ceiling fan
  • Removing An Existing Ceiling Fan
  • Installing A New Ceiling Fan
  • Installing A Light On The Ceiling Fan
Module 13: Light Switch
  • How To Replace A Basic Light Switch
Module 14: Unclogging a Sink Drain
  • Introduction To Unclogging A Sink Drain
  • How To Remove Or Replace The Under-Sink Plumbing Trap
Module 15: Garbage Disposal
  • Removing The Exisiting Garbage Disposal
  • Replacing The Sink Flange And Mounting Hardware
  • Wiring
  • Attaching The New Garbage Disposal
Module 16: Bathroom Faucet
  • Introduction To Bathroom Faucets
  • Installing A New Bathroom Faucet
  • Connecting The Water Supply To Faucet
Module 17: Toilet
  • Preparing The Toilet Flange
  • Setting The New Toilet In Place
  • Connecting The Water Supply To Toilet
Module 18: Laminate Flooring
  • Introduction To Laminate Flooring
  • Removing The Existing Flooring
  • Preparing The Door Jambs
  • Transition Molding Layout
  • Underlayment-Part1
  • Underlayment-Part2
  • Laminate Flooring Layout
  • Cutting The Floor
  • Installing The Flooring-Part1
  • Cutting Around The Door Jambs
  • Installing Around Doorways
  • Marketing Transition Molding
  • Installing The Flooring-Part2
  • Final Row Installation
  • Installing The Transition Molding
  • Installing Quarter-Round Trim
Module 19: Conclusion
  • Conclusion
Module 1: SSIS Packages
  • Introduction
  • Creating SSIS Packages
  • Creating A New Package Lab
  • Data Sources Lab
  • Connections Lab
  • Control Flow
  • Creating And Editing Control Flow Lab
  • Data Flow
  • Data Flow Transformations
  • Data Flow Lab
Module 2: Debugging and Error Handling in SSIS
  • Debugging And Error Handling in SSIS-Part1
  • Enable Transactions And Observe Trans Rollback Lab
  • Set Checkpoints In A Package Lab
  • Debugging And Error Handling in SSIS-Part2
  • Setting Up Constraints Lab
  • Turn On Logging Lab
  • Debugging And Error Handling in SSIS-Part3
  • Identifying Data Flow Errors Lab
Module 3: Deploying and Configuring SSIS Packages
  • Lesson1-Part1 Deploying
  • Lesson1-Part2 Sharing Ordering And Configuring
  • Create An XML Configuration Lab
  • Create A SQL Server Configuration Lab
  • Use A Property Expression To Update A Connection Lab
  • Deploying An SSIS Package
  • Create And Deploy An Installer Kit Lab
Module 4: Securing and Executing SSIS Packages; Service Administration
  • Lesson1-Part1 Securing And Executing SSIS Packages
  • Lesson1-Part2 SSIS Package Security
  • Turn On Package Encryption Lab
  • Change Security Roles Lab
  • Lesson2 Executing And Administration
  • Create And Execute A Command-Line Statement Lab
  • Execute A Package Through SQL Server Agent Lab
Module 5: Data Analysis
  • Lesson1 SSAS Cube Development
  • Create SSAS Project Lab
  • Create A Data Source Lab
  • Create A Data Source View Lab
  • Lesson2 Creating And Modifying SSAS Cube
  • Creating A Cube Lab
  • Using Cube Designer To Edit A Cube Structure Lab
  • Lesson3 Creating A Dimension
  • Create A New Dimension Lab
  • Lesson4 Creating Measure Groups And Measures
  • Add Measure Groups Lab
  • Configure Measure Groups And Measures Lab
Module 6: Extending SSAS Cubes
  • Lesson1 Extending SSAS Cubes-Part1
  • Define Attribute Relationships Lab
  • Define User Hierarchy Lab
  • Lesson2 Extending SSAS Cube-Part3
  • Implement The Reseller Sales KPI Lab
  • Lesson3 Extending SSAS Cube-Part3
  • Turn On Proactive Caching Lab
Module 7: Extending SSAS Cubes
  • Lesson1-Part1 SSAS Storage Processing And Deployment
  • Lesson1-Part2 Aggregating And Enabling Proactive Caching
  • Turning On Proactive Caching Lab
  • Lesson2 SSAS Deployment
  • Deploy Database With Deployment Wizard Lab
  • Lesson3 Processing
  • Processing Scripts Using SQL Server Agent Lab
Module 8: Securing and Administering SSAS
  • Lesson1 SSAS Security
  • Create A Role And Set Security Lab
  • Lesson2 Backing Up SSAS
  • Backing Up And Maintain Management Studio Lab
  • Lesson3 Managing SSAS Turning And Logging
  • Turning On Query Logging Lab
  • Lesson4 SSAS Administering
  • Turn On And Use SQL Server Profiler Lab
  • Monitor SSAS Performance Lab
Module 9: Working With SSAS Data Mining
  • Lesson1-Part1 Prepare And Creating Data Mining Structures
  • Lesson1-Part2 Data Mining Algorithms And Usage
  • Data Mining Wizard Lab
  • Lesson2 Mapping Mining Structure Attributes To Source Columns
  • Create A Model From A Cube Lab
  • Lesson3 Predictive Models
  • Lesson4 Data Mining Security
  • Managing Permissions Lab
Module 10: Developing SSAS Reports
  • Lesson1 Understanding SSRS Reports
  • Creating Reports Lab
  • Lesson2 Creating A New Report Database
  • Generate More Reports Lab
  • Lesson3 Advanced Report Object Properties-Part1
  • Lesson4 Advanced Report Object Properties-Part2
Module 11: Extending and Deploying SSRS Reports
  • Lesson1 SSRS Report Parameters
  • Create A Report Without Using Wizard Lab
  • Lesson2 Extending SSRS Reports
  • Lesson3 Deploying SSRS Reports
Module 12: Scheduling Deployed Reports and Data Sources
  • Lesson1 Scheduling Reports And Subscriptions
  • Creating A New Role For SSRS Lab
  • Lesson2 SSRS And Data Sources
  • Set Up Shared Schedule Lab
Module 13: Configuring And Administering the SSRS Server
  • Installing And Configuring SSRS Server
  • Changing Settings In Configuration Manager Lab
  • Lesson2 Administering The SSES Server And Command-Line Utilities
  • Backing Up And Restoring Encryption Keys Lab
  • Conclusion
Module 1: Over-The-Air Technologies
  • Introduction
  • Over-The-Air-Technologies
  • Wireless Technologies-Part 1
  • Wireless Technologies-Part 2
  • Radio Frequency
  • RF Power Fun
  • Antennas
  • Issues With RF
  • NON Wireless
  • Governing Bodies And Regulations
Module 2: Network Infrastructure
  • Network Foundations-Part 1
  • Network Foundations-Part 2
  • Network Foundations-Part 3
  • Network Foundations-Part 4
  • OSI Model Review
  • Wireless Terms And Terminology-Part 1
  • Wireless Terms And Terminology-Part 2
  • Wireless Media And Communication
  • Unified Wireless Architecture
  • SSIDs And VLANs
Module 3: Mobile Device Manager
  • Mobile Device Management-Part 1
  • Profiles And Polices-Part 1
  • Profiles And Polices-Part 2
  • Enterprise Mail And Messaging
  • Wireless Site Survey-Part 1
  • Wireless Site Survey-Part 2
  • Wireless Site Survey-Part 3
  • Wireless Site Survey-Part 4
  • Wireless Device Management-Part 1
  • Wireless Device Management-Part 2
Module 4: Security
  • Mobile Device Security
  • Network Security 101
  • Security Protocols-Part 1
  • Security Protocols-Part 2
  • Security Protocols-Part 3
  • EAP Overview
  • Encryption Overview-Part 1
  • Encryption Overview-Part 2
  • Common Security Troubleshooting
  • Wireless Risks-Part 1
  • Wireless Risks-Part 2
  • Other Risks
Module 5: Troubleshooting
  • Wireless Troubleshooting-Part 1
  • Wireless Troubleshooting-Part 2
  • Wireless Troubleshooting-Part 3
  • Conclusion
Module 1: Overview
  • Intro
  • Overview Of Advanced Solutions – Part 1
  • Overview Of Advanced Solutions – Part 2
  • Test Connectivity Demo
  • Web Based Outlook Demo – Part 1
  • Web Based Outlook Demo – Part 2
Module 2: Beginning Powershell
  • Beginning Powershell
  • New Mail Contact Demo
  • New Mail Contacts Powershell Demo
Module 3: Exhange Control Panel
  • Exchange Control Panel
Module 4: Create A New Mailbox with Powershell
  • Create A New Mailbox With Powershell
  • New Mailbox With Powershell Demo – Part 1
  • New Mailbox With Powershell Demo – Part 2
Module 5: Mailbox Statistics With Powershell
  • Mailbox Statistics With Powershell
  • Get Mailbox Statistics Demo
Module 6: Intermediate Powershell
  • Intermediate Powershell
  • Wrap Up Of Intermediate Powershell
  • Creating A New Accepted Domain Demo – Part 1
  • Creating A New Accepted Domain Demo – Part 2
Module 7: Unified Messaging
  • Unified Messaging – Part 1
  • Unified Messaging – Part 2
  • UM Dial Plan Demo
  • UM Dial Plan Powershell Demo
Module 8: Installation and Configuration
  • Installation And Configuration – Part 1
  • Installation And Configuration – Part 2
  • Build Exchange From Scratch Demo – Part 1
  • Build Exchange From Scratch Demo – Part 2
  • Build Exchange From Scratch Demo – Part 3
  • Build Exchange From Scratch Demo – Part 4
  • Build Exchange From Scratch Demo – Part 5
  • Build Exchange From Scratch Demo – Part 6
  • Confirming Installation Demo
  • Scheme Changes – Part 1
  • Scheme Changes – Part 2
  • Required Software For Exchange
  • Powershell Add Features – Part 1
  • Powershell Add Features – Part 2
  • Installation – Part 1
  • Installation – Part 2
  • Installation – Part 3
Module 9: Exchange Online
  • Exchange Online – Part 1
  • Exchange Online – Part 2
  • Exchange Online Demo
Module 10: Advanced Design
  • Advanced Design – Part 1
  • Advanced Design – Part 2
  • Advanced Design – Part 3
  • Deployment Assistant Demo
  • Ports And Protocols For Exchange Demo
  • Outro
Module 1: Methodologies Used To Design A Network
  • Introduction
  • Developing Business Trends
  • P P D I O O- Part 1
  • P P D I O O- Part 2
  • 3 Layer Campus Design
  • Modular Network Design
  • Cisco Eight Step Design Methodology
  • Cisco I I N
Module 2: Network Structure And Modularity
  • Network Design Fundamentals
  • Design Methods And Methodologies- Part 1
  • Design Methods And Methodologies- Part 2
  • Enterprise Campus Design- Part 1
  • Enterprise Campus Design- Part 2
Module 3: Basic Enterprise Campus Networks
  • Campus Design Considerations- Part 1
  • Campus Design Considerations- Part 2
  • Cisco S O N A
Module 4: Enterprise Edge And Remote Network Modules
  • WAN Technologies And VPN- Part 1
  • WAN Technologies And VPN- Part 2
  • WAN Technologies- Part 1
  • WAN Technologies- Part 2
  • VPN Technologies- Part 1
  • VPN Technologies- Part 2
  • VPN Technologies- Part 3
Module 5: IP Addressing And Routing Protocols
  • Routing Protocol Operation And Design- Part 1
  • Routing Protocol Operation And Design- Part 2
  • Routing Protocol Operation And Design- Part 3
  • Routing Protocol Operation And Design- Part 4
  • EIGRP – Part 1
  • EIGRP – Part 2
Module 6: Enterprise Switching I
  • Enterprise Switching
  • Inter VLAN Routing
  • Multilayer Switch
  • Enterprise Switch Features And Design
  • VSS
  • Best Practices
Module 7: Enterprise Switching II
  • Switch Macros And Smart Ports
  • Private VLANs
  • Etherchannel
Module 8: Subnetting
  • IP v4
  • Subnetting- Part 1
  • Subnetting- Part 2
  • Subnetting- Part 3
  • Subnetting- Part 4
  • IP v6
Module 9: Designing Advanced Services
  • Designing Advanced Services
  • GLBP
  • Access Points
  • Radio Frequencies
  • Wireless Signals
  • Wireless LAN To VLAN Mapping
  • Conclusion
Module 1: Overview
  • Introduction
  • Overview Of Exchanger Server 2013 – Part 1
  • Overview Of Exchanger Server 2013 – Part 2
  • Overview Of Exchanger Server 2013 – Part 3
  • Overview Of Exchanger Server 2013 – Part 4
  • Overview Of Exchanger Server 2013 – Part 5
  • Overview Of Exam – Part 1
  • Overview Of Exam – Part 2
Module 2: Exchange Server 2013 Administration
  • Exchange Server 2013 Administration – Part 1
  • Exchange Server 2013 Administration – Part 2
  • Exchange Server 2013 Administration – Part 3
  • Exchange Server 2013 Administration – Part 4
  • Exchange Server 2013 Administration – Demo 1
  • Exchange Server 2013 Administration – Demo 2
  • Exchange Server 2013 Administration – Demo 3
Module 3: Fundamentals of Exchange Administration
  • Fundamentals Of Exchange Administration – Part 1
  • Fundamentals Of Exchange Administration – Demo
Module 4: Archive Mailboxes
  • Archive Mailboxes – Part 1
  • Archive Mailboxes – Part 2
  • Archive Mailboxes – Part 3
  • Archive Mailboxes – Demo
Module 5: Properties of User Mailboxes
  • Properties Of User Mailboxes
  • Properties Of User Mailboxes – Demo
Module 6: Distribution Groups
  • Distribution Groups
  • Distribution Groups – Demo
Module 7: Outlook and Outlook Web Apps
  • Outlook And Outlook Web Apps – Part 1
  • Outlook And Outlook Web Apps – Part 2
  • Outlook And Outlook Web Apps – Demo
Module 8: Preparation Prerequisites
  • Preparation Prerequisites – Part 1
  • Preparation Prerequisites – Part 2
  • Preparation Prerequisites – Part 3
  • Preparation Prerequisites Demo – Part 1
  • Preparation Prerequisites Demo – Part 2
  • Preparation Prerequisites Demo – Part 3
Module 9: Installation of Exchange 2013
  • Installation Of Exchange 2013
  • Installation Of Exchange 2013 – Demo
Module 10: Exchange 2013 Design
  • Exchange 2013 Design – Part 1
  • Exchange 2013 Design – Part 2
  • Exchange 2013 Design – Part 3
  • Exchange 2013 Design Demo – Part 1
  • Exchange 2013 Design Demo – Part 2
  • Exchange 2013 Design Demo – Part 3
  • Exchange 2013 Design Demo – Part 4
  • Exchange 2013 Design Demo – Part 5
  • Exchange 2013 Design Demo – Part 6
Module 11: Labs and Demos
  • Building Home Lab (setup)
  • Creating A Win Server Virtual Machine
  • Signing On To Server
  • Configuration (Joining Domain)
  • Installing Domain Controller – Part 1
  • Installing Domain Controller – Part 2
  • Checking The Domain Controller
  • Setting Up DNS For Exchange
  • Schema Updates
  • Prerequisite For Exchange 2013
  • Installing Exchange
  • Confirmation Of Exchange
  • How Exchange Is Installed
  • Setting Up A Send Connector
  • Outro
Module 1: Planning Server Deployment
  • Introduction
  • Overview Of Windows Server 2008 Deployment-Part1
  • Overview Of Windows Server 2008 Deployment-Part2
  • Overview Of Windows Server 2008 Deployment-Part3
  • Overview Of Windows Server 2008 Deployment-Part4
  • Identifying Windows Server 2008 Compatibility Issues
  • Developing A Deployment Plan-Part1
  • Developing A Deployment Plan-Part2
  • Planning The Server Decommissioning
  • Commissioning Windows 2008 Server
  • Planning Server Deployment Summary
Module 2: Automating Server Deployment
  • Understanding Deployment Options-Part1
  • Understanding Deployment Options-Part2
  • Windows Automated Installation Kit-Part1
  • Windows Automated Installation Kit-Part2
  • Windows Automated Installation Kit-Part3
  • Working With Images
  • Using Windows Deployment Services-Part1
  • Using Windows Deployment Services-Part2
  • Using Windows Deployment Services-Part3
  • Using Windows Deployment Services-Part4
  • Automating Server Activation
  • Automating Server Deployment Summary
Module 3: Planning for Server Management
  • Introduction To Server Management
  • Remote Server Management-Part1
  • Remote Server Management-Part2
  • Remote Server Management-Part3
  • Decentralizing Server Management-Part1
  • Decentralizing Server Management-Part2
  • Planning For Server Management Summary
Module 4: Planning the Network Infrastructure
  • Planning An IPv4 Addressing Scheme-Part1
  • Planning An IPv4 Addressing Scheme-Part2
  • Planning An IPv4 Addressing Scheme-Part3
  • Planning An IPv6 Transition
  • Planning The DHCP Infrastructure-Part1
  • Planning The DHCP Infrastructure-Part2
  • Planning DHCP Configuration
  • Planning The Network Infrastructure Summary
Module 5: Planning Name Resolution Services
  • Gathering Information For The Name Resolution Design-Part1
  • Gathering Information For The Name Resolution Design-Part2
  • Designing A DNS Server Strategy-Part1
  • Designing A DNS Server Strategy-Part2
  • Designing DNS Zone Implementations-Part1
  • Designing DNS Zone Implementations-Part2
  • Optimizing DNS Servers
  • Designing DNS For High Availability And Security
  • Designing A WINS Name Resolution Strategy
  • Planning Name Resolution Services Summary
Module 6: Planning File and Print Services
  • Planning File Services-Part1
  • Planning File Services-Part2
  • Planning File Services-Part3
  • Planning File Services-Part4
  • Planning File Services-Part5
  • Planning For Storage Management
  • Planning Print Services-Part1
  • Planning Print Services-Part2
  • Planning Print Services-Part3
  • Planning File And Print Services Summary
Module 7: Planning Active Directory Domain Services
  • Planning ADDS Forests
  • Planning ADDS Domains
  • Planning ADDS Physical Structure-Part1
  • Planning ADDS Physical Structure-Part2
  • Planning Administrative Structures
  • Planning ADDS Maintenance Strategies
  • Planning Group Policy Implementations-Part1
  • Planning Group Policy Implementations-Part2
  • Planning Group Policy Implementations-Part3
  • Planning Group Policy Implementations-Part4
  • Planning ADDS Summary
Module 8: Planning Active Directory Certificate Services
  • Overview Of PublicKey Infrastructure And ADCS-Part1
  • Overview Of PublicKey Infrastructure And ADCS-Part2
  • Designing Certificate Authority Hierarchy
  • Design Certificate Template
  • Designing Certificate Distribution And Revocation
  • Planning AD Certificate Servers
Module 9: Planning High Availability
  • Overview Of High Availability
  • Planning Network Load Balancing
  • Planning Failover Clustering-Part1
  • Planning Failover Clustering-Part2
  • Planning High Availability Summary
Module 10: Planning Backups For Windows Server
  • Planning Backups For Windows Server-Part1
  • Planning Backups For Windows Server-Part2
  • Planning A Backup Policy
  • Planning Restore Policies For Windows Server 2008
  • Planning Business Continuity Summary
Module 11: Planning Server Monitoring and Maintenance
  • Planning Server Monitoring-Part1
  • Planning Server Monitoring-Part2
  • Planning Server Maintenance
  • Planning Server Monitoring And Maintenance Summary
  • Conclusion
Module 1: Installing and Configuring Windows Services
  • Introduction
  • Installing Windows Servers-Part1
  • Installing Windows Servers-Part2
  • Installing Windows Servers-Part3
  • Managing Server Roles And Features-Part1
  • Managing Server Roles And Features-Part2
  • Windows Server 2008 Server Care Installations-Part1
  • Windows Server 2008 Server Care Installations-Part2
  • Installing And Configuring Windows Services Summary
Module 2: TCP/IP Protocol Suite
  • Overview Of TCP IP-Part1
  • Overview Of TCP IP-Part2
  • TCP IP Addressing-Part1
  • TCP IP Addressing-Part2
  • Communication Types
  • Name Resolution-Part1
  • Name Resolution-Part2
  • Name Resolution-Part3
  • Name Resolution-Part4
  • Dynamic IP Addressing
  • TCP IP Tools
  • TCP IP Protocol Suite Summary
Module 3: Configuring IPv4 Addressing
  • Overview Of IPv4 Communication-Part1
  • Overview Of IPv4 Communication-Part2
  • Subnetting IPv4 Networks-Part1
  • Subnetting IPv4 Networks-Part2
  • Subnetting IPv4 Networks-Part3
  • Configuring IPv4 Addressing Summary
Module 4: Configuring IP Address Assignment Services
  • Overview Of DHC-Part1
  • Overview Of DHC-Part2
  • Configuring DHCP Scopes And Options-Part1
  • Configuring DHCP Scopes And Options-Part2
  • Configuring DHCP Scopes And Options-Part3
  • Managing The DHCP Database
  • Monitoring And Troubleshooting DHCP-Part1
  • Monitoring And Troubleshooting DHCP-Part2
  • Configuring IP Address Assignment Services Summary
Module 5: Configuring IPv6 Addressing
  • Introduction To IPv6-Part1
  • Introduction To IPv6-Part2
  • Unicast IPv6 Addresses
  • Configuring IPv6-Part1
  • Configuring IPv6-Part2
  • Configuring IPv6 Addressing Summary
Module 6: Configuring Name Resolution Services
  • Overview Of DNS-Part1
  • Overview Of DNS-Part2
  • Configuring The DNS Server Role-Part1
  • Configuring The DNS Server Role-Part2
  • Configuring The DNS Server Role-Part3
  • Configuring The DNS Server Role-Part4
  • Configuring The DNS Server Role-Part5
  • Manage And Troubleshooting DNS
  • Migrating From WIN To DNS
  • Configuring Name Resolution Services Summary
Module 7: Configuring File and Print Services
  • Introduction To File Services
  • Controlling Access To File Services-Part1
  • Controlling Access To File Services-Part2
  • Controlling Access To File Services-Part3
  • Storage Management With File Server Resource Manager-Part1
  • Storage Management With File Server Resource Manager-Part2
  • Storage Management With File Server Resource Manager-Part3
  • Storage Management With File Server Resource Manager-Part4
  • Storage Management With File Server Resource Manager-Part5
  • Configuring And Managing Distributed File Systems-Part1
  • Configuring And Managing Distributed File Systems-Part2
  • Configuring And Managing Distributed File Systems-Part3
  • Configuring And Managing Distributed File Systems-Part4
  • Optimizing Access For Branch Offices
  • Configuring Printing-Part1
  • Configuring Printing-Part2
  • Configuring Printing-Part3
  • Configuring Printing-Part4
  • Configuring Printing-Part5
  • Configuring File And Print Service Summary
Module 8: Securing Windows Servers and Network Communications
  • Configuring Server Security Group-Part1
  • Configuring Server Security Group-Part2
  • Configuring Server Security Group-Part3
  • Configuring Server Security Group-Part4
  • Configuring Server Security Group-Part5
  • Configuring Server Security Group-Part6
  • Configuring Server Security Group-Part7
  • Storage Security-Part1
  • Storage Security-Part2
  • Windows Firewall With Advanced Security-Part1
  • Windows Firewall With Advanced Security-Part2
  • Configuring And Troubleshooting IP Sec-Part1
  • Configuring And Troubleshooting IP Sec-Part2
  • Configuring And Troubleshooting IP Sec-Part3
  • Configuring And Troubleshooting IP Sec-Part4
  • SecuringWindows Servers And Network Communications Summary
Module 9: Configuring Routing and Remote Access
  • Remote Access Overview
  • Configuring Remote Access-Part1
  • Configuring Remote Access-Part2
  • Configuring Remote Access-Part3
  • Configuring Remote Access-Part4
  • Overview Of Network Routing-Part1
  • Overview Of Network Routing-Part2
  • Overview Of Network Routing-Part3
  • Configuring Routing And Remote Access Summary
Module 10: Configuring Network Policy Services
  • Overview Of Network Policy And Access Services-Part1
  • Overview Of Network Policy And Access Services-Part2
  • Understanding Network Policies
  • Centralizing Authentication And Authorization-Part1
  • Centralizing Authentication And Authorization-Part2
  • Centralizing Authentication And Authorization-Part3
  • Configuring Network Policy Services Summary
Module 11: Configuring Network Access Protection
  • Overview Of Network Access Protection
  • NAP Architecture
  • NAP Enforcement
  • NAP Policies-Part1
  • NAP Policies-Part2
  • Configuring NAP Summary
Module 12: Maintaining and Recovering Windows Server
  • Disaster Recovery For Windows Servers-Part1
  • Disaster Recovery For Windows Servers-Part2
  • Disaster Recovery For Windows Servers-Part3
  • Disaster Recovery For Windows Servers-Part4
  • Disaster Recovery For Windows Servers-Part5
  • Disaster Recovery For Windows Servers-Part6
  • Configuring Update Management-Part1
  • Configuring Update Management-Part2
  • Configuring Update Management-Part3
  • Configuring Update Management-Part4
  • Maintaining And Recovering Windows Server Summary
  • Conclusion
Module 1: Plan and Deploy Infrastructure
  • Introduction
  • Plan And Deploy Infrastructure-Part 1
  • Plan And Deploy Infrastructure-Part 2
  • Plan And Deploy Infrastructure-Part 3
Module 2: Planning and Implementing
  • Planning And Implementing-Part 1
  • Multicast Deployment Wizard Demo
  • Planning And Implementing-Part 2
  • Pre-staging Clients Demo
  • Planning And Implementing-Part 3
  • Configuring Windows Deployment Services Demo
  • Planning And Implementing-Part 4
Module 3: Planning and Implementing Server Upgrade and Migration
  • Planning And Implementing Server Upgrade And Migration-Part 1
  • Planning And Implementing Server Upgrade And Migration-Part 2
  • Planning And Implementing Server Upgrade And Migration-Part 3
Module 4: Planning and Deploying Virtual Machine Manager Resources
  • Planning And Deploying Virtual Machine Manager Resources-Part 1
  • Planning And Deploying Virtual Machine Manager Resources-Part 2
  • Planning And Deploying Virtual Machine Manager Resources-Part 3
  • Planning And Deploying Virtual Machine Manager Resources-Part 4
Module 5: Planning and Implementing File and Storage Services
  • PlanningAnd Implementing File And Storage Services-Part 1
  • Planning And Implementing File And Storage Services-Part 2
  • Configuring The iSCSI Target Server Demo
  • Planning And Implementing File And Storage Services-Part 3
  • Configuring Internet Storage Name Server Demo
  • Planning And Implementing File And Storage Services-Part 4
Module 6: Design and Implement Network Infrastructure Services
  • Design And Implement Network Infrastructure Services
Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution
  • Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 1
  • Configuring Split Scope In DHCP Demo
  • Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 2
  • Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 3
Module 8: Design a Name Resolution Solution Strategy
  • Design A Name Resolution Solution Strategy-Part 1
  • Design A Name Resolution Solution Strategy-Part 2
  • Configuring Global Names Zone Demo
  • Design A Name Resolution Solution Strategy-Part 3
Module 9: Design and Manage an IP Address Management Solution
  • Design And Manage An IP Address Management Solution-Part 1
  • Design And Manage An IP Address Management Solution-Part 2
Module 10: Design and Implement Network Access Services
  • Design And Implement Network Access Services
Module 11: Design a VPN Solution
  • Design A VPN Solution-Part 1
  • Design A VPN Solution-Part 2
Module 12: Design a DirectAccess Solution
  • Design A Direct Access Solution-Part 1
  • Design A Direct Access Solution-Part 2
Module 13: Implement a Scalable Remote Access Solution
  • Implement A Scalable Remote Access Solution-Part 1
  • Implementing Packet Tracing Demo
  • Implement A Scalable Remote Access Solution-Part 2
  • Implement A Scalable Remote Access Solution-Part 3
  • Looking At Setting In Direct Access Demo
  • Implement A Scalable Remote Access Solution-Part 4
Module 14: Design and Implement a Network Protection Solution
  • Design And Implement A Network Protection Solution-Part 1
  • Design And Implement A Network Protection Solution-Part 2
  • Design And Implement A Network Protection Solution-Part 3
  • Looking At Multiple RADIUS Servers Demo
  • Design And Implement A Network Protection Solution-Part 4
  • Taking A Look At IP Sec Policy Enforcement Demo
  • Showing 802.1X Policy Enforcement Demo
  • Design And Implement A Network Protection Solution-Part 5
Module 15: Design and Implement an Active Directory Infrastructure
  • Design And Implement An Active Directory Infrastructure
Module 16: Design a Forest and Domain Infrastructure
  • Design A Forest And Domain Infrastructure
Module 17: Implement a Forest and Domain Infrastructure
  • Implement A Forest And Domain Infrastructure-Part 1
  • Steps To Perform A Realm Trust Demo
  • Implement A Forest And Domain Infrastructure-Part 2
Module 18: Design a Group Policy Strategy
  • Design A Group Policy Strategy
Module 19: Design an Active Directory Permission Model
  • Design An Active Directory Permission Model-Part 1
  • Taking A Look At The Security Tab Or Lack Of Demo
  • Design An Active Directory Permission Model-Part 2
  • Taking A Look At The Delegation Or Control Wizard Demo
  • Design An Active Directory Permission Model-Part 3
  • Taking A Look At Kerberos Delegation Demo
  • Design An Active Directory Permission Model-Part 4
Module 20: Design and Implement an Active Directory Infrastructure (Physical)
  • Design And Implement An Active Directory Infrastructure Physical
Module 21: Design an Active Directory Site Topology
  • Design An Active Directory Site Topology
Module 22: Design an Active Directory Site Topology
  • Design A Domain Controller Strategy
Module 23: Design and Implement a Branch Office Infrastructure
  • Design And Implement A Branch Office Infrastructure-Part 1
  • Design And Implement A Branch Office Infrastructure-Part 2
  • Taking A Look At Password Replication Policy Tab Demo
  • Design And Implement A Branch Office Infrastructure-Part 3
  • Conclusion
Module 1: Manage and Maintain a Server Infrastructure
  • Introduction
  • Manage And Maintain A Server Infrastructure-Part1
  • Manage And Maintain A Server Infrastructure-Part2
  • Design A Monitoring Strategy-Part1
  • Design A Monitoring Strategy-Part2
  • Plan And Implement Automated Remediation-Part1
  • Plan And Implement Automated Remediation-Part2
  • Plan And Implement Automated Remediation-Part3
Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
  • Plan And Implement A Highly Available Enterprise Infrastructure-Part1
  • Plan And Implement A Highly Available Enterprise Infrastructure-Part2
  • Highly Available Network Services-Part1
  • Highly Available Network Services-Part2
  • Plan And Implement Highly Available Storage Solutions-Part1
  • Plan And Implement Highly Available Storage Solutions-Part2
  • Plan And Implement Highly Available Roles-Part1
  • Plan And Implement Highly Available Roles-Part2
  • Business Continuity And Disaster Recovery Solution
Module 3: Plan and Implement a Server Virtualization Infrastructure
  • Plan And Implement Virtual Hosts – Part 1
  • Plan And Implement Virtual Hosts-Part2
  • Plan And Implement Virtual Machines
  • Plan And Implement Virtualization Networking-Part1
  • Plan And Implement Virtualization Networking-Part2
  • Plan And Implement Virtualization Storage
  • Plan And Implement Virtual Machine Movement
  • Manage And Maintain A Server Virtualization Infrastructure
Module 4: Design and Implement Identity and Access Solutions
  • Design And Implement Identity And Access Solutions-Part1
  • Design And Implement Identity And Access Solutions-Part2
  • Implement And Manage Certificates
  • Design And Implement A Federated Identity Solution
  • Design And Implement AD Rights Management Services
  • Conclusion
Module 1: Active Directory – An Identity And Access Solution
  • Introduction
  • Understanding The Purpose Of Identity And Access Control
  • Active Directory Server Roles For IDA Management-Part 1
  • Active Directory Server Roles For IDA Management-Part 2
  • Active Directory Server Roles That Support IDA Solutions
  • Active Directory Summary
Module 2: Introduction To Active Directory Domain Services
  • Overview Of Active Directory Identity And Access-Part 1
  • Overview Of Active Directory Identity And Access-Part 2
  • Overview Of Active Directory Identity And Access-Part 3
  • Active Directory Components And Concepts-Part 1
  • Active Directory Components And Concepts-Part 2
  • Active Directory Components And Concepts-Part 3
  • Active Directory Components And Concepts-Part 4
  • Active Directory Components And Concepts-Part 5
  • Implementing Active Directory-Part 1
  • Implementing Active Directory-Part 2
  • Implementing Active Directory-Part 3
  • Implementing Active Directory-Part 4
  • Implementing Active Directory-Part 5
  • Implementing Active Directory-Part 6
  • Implementing Active Directory-Part 7
  • Implementing Active Directory-Part 8
  • Overview Of Active Directory-Part1
  • Overview Of Active Directory-Part2
  • Overview Of Active Directory-Part3
  • Summary
Module 3: Configuring DNS To Support Active Directory Domain Services
  • Overview Of Active Directory And DNS Integration-Part 1
  • Overview Of Active Directory And DNS Integration-Part 2
  • Configure Active Directory Integrated Zones-Part 1
  • Configure Active Directory Integrated Zones-Part 2
  • Configure Dynamic Updates
  • Configure Read-Only Zones
Module 4: Active Directory Object Management
  • Overview Of Active Directory Objects
  • Configuring User And Computer Accounts-Part 1
  • Configuring User And Computer Accounts-Part 2
  • Configuring User And Computer Accounts-Part 3
  • Configuring Groups-Part1
  • Configuring Groups-Part2
  • Configuring Groups-Part3
  • Configuring Groups-Part4
  • Configuring Groups-Part5
  • Automating Object Management-Part1
  • Automating Object Management-Part2
  • Automating Object Management-Part3
  • Automating Object Management-Part4
  • Automating Object Management-Part5
  • Delegation Of Administrative Control-Part1
  • Delegation Of Administrative Control-Part2
  • Summary
Module 5: Managing Active Directory Replication Using Sites
  • Configuring Sites And Subnets-Part 1
  • Configuring Sites And Subnets-Part 2
  • Configuring Replication-Part 1
  • Configuring Replication-Part 2
  • Configuring Replication-Part 3
  • Configuring Replication-Part 4
  • Summary
Module 6: Configuration Management Using Group Policy
  • Understanding Group Policy-Part 1
  • Understanding Group Policy-Part 2
  • Understanding Group Policy-Part 3
  • Understanding Group Policy-Part 4
  • Understanding Group Policy-Part 5
  • Understanding Group Policy-Part 6
  • Working With GPOs-Part 1
  • Working With GPOs-Part 2
  • Working With GPOs-Part 3
  • Working With GPOs-Part 4
  • Troubleshooting Application Of GPO
  • Delegating Administrative Control Of Group Policy
  • Summary
Module 7: Desktop Environmental And Security Management
  • Configure Scripts And Folder Redirection-Part 1
  • Configure Scripts And Folder Redirection-Part 2
  • Deploying Software-Part 1
  • Deploying Software-Part 2
  • Deploying Software-Part 3
  • Delegating Computer Support
  • Managing Security Settings-Part 1
  • Managing Security Settings-Part 2
  • Managing Security Settings-Part 3
  • Managing Security Settings-Part 4
  • Managing Security Settings-Part 5
  • Utilizing Auditing-Part 1
  • Utilizing Auditing-Part 2
  • Summary
Module 8: Maintaining Active Directory
  • Monitoring Active Directory-Part 1
  • Monitoring Active Directory-Part 2
  • Monitoring Active Directory-Part 3
  • Monitoring Active Directory-Part 4
  • Managing The Active Directory Database
  • Disaster Recovery For Active Directory-Part 1
  • Disaster Recovery For Active Directory-Part 2
  • Disaster Recovery For Active Directory-Part 3
  • Disaster Recovery For Active Directory-Part 4
  • Maintaining Active Directory Domain Services Summary
Module 9: Deploy and Manage a Public Key Infrastructure
  • Overview Of Public Key Infrastructure And ADCS-Part 1
  • Overview Of Public Key Infrastructure And ADCS-Part 2
  • Overview Of Public Key Infrastructure And ADCS-Part 3
  • Deploying A Certificate Authority Hierarchy
  • Installing ADCS-Part 1
  • Installing ADCS-Part 2
  • Installing ADCS-Part 3
  • Installing ADCS-Part 4
  • Deploying And Managing Certificates-Part 1
  • Deploying And Managing Certificates-Part 2
  • Deploying And Managing Certificates-Part 3
  • Deploying And Managing Certificates-Part 4
  • Managing Revocation And Distribution-Part 1
  • Managing Revocation And Distribution-Part 2
  • Configuring Certificate Recovery-Part 1
  • Configuring Certificate Recovery-Part 2
  • Deploy And Manage A Public Key Infrastructure Summary
Module 10: Supporting Applications with AD LDS
  • ADLDS Overview-Part 1
  • ADLDS Overview-Part 2
  • Configuring ADLDS Instances
  • Configuring Replication
  • Understanding Integration With ADLDS
  • Supporting Applications With ADLDS Summary
Module 11: Deploying Active Directory Federated Services
  • ADFS Overview
  • ADFS Deployment Scenarios
  • Deploying ADFS-Part 1
  • Deploying ADFS-Part 2
  • Deploying ADFS-Part 3
  • Deploying Active Directory Federated Services Summary
Module 12: Deploying Active Directory Rights Management Services
  • ADRMS Overview
  • Understanding ADRMS
  • Managing ADRMS-Part 1
  • Managing ADRMS-Part 2
  • Managing ADRMS-Part 3
  • Managing ADRMS-Part 4
  • Deployment Active Directory Rights Management Services Summary
  • Active Directory Conclusion
Module 1: Introduction
  • Intro Part 1
  • Intro Part 2
  • Intro Part 3
  • Intro Part 4
  • Intro Part 5
  • Intro Part 6
  • Intro Part 7
Module 2: Telephony
  • Telephony Part 1
  • Telephony Part 2
  • Telephony Part 3
  • Telephony Part 4
Module 3: Basic Call Routing
  • Basic Call Routing Part 1
  • Basic Call Routing Part 2
  • Basic Call Routing Part 3
Module 4: VOIP Call Routing
  • VOIP Call Routing Part 1
  • VOIP Call Routing Part2
  • VOIP Call Routing Part 3
  • VOIP Call Routing Part 4
  • VOIP Call Routing Part 5
Module 5: CUCME Call Routing Basics
  • CUCME Call Routing Basics Part 1
  • CUCME Call Routing Basics Part 2
  • CUCME Call Routing Basics Part 3
  • CUCME Call Routing Basics Part 4
  • CUCME Call Routing Basics Part 5
  • CUCME Call Routing Basics Part 6
  • CUCME Call Routing Basics Part 7
  • CUCME Call Routing Basics Part 8
  • CUCME Call Routing Basics Part 9
  • CUCME Call Routing Basics Part 10
  • CUCME Call Routing Basics Part 11
Module 6: Preparing Network For Voice
  • Preparing Network For Voice Part 1
  • Preparing Network For Voice Part 2
  • Preparing Network For Voice Part 3
  • Preparing Network For Voice Part 4
  • Preparing Network For Voice Part 5
  • Preparing Network For Voice Part 6
Module 7: IP Phone Behavior
  • IP Phone Behavior
Module 8: CUCME Administration Basics
  • CUCME Administration Basics Part 1
  • CUCME Administration Basics Part 2
  • CUCME Administration Basics Part 3
  • CUCME Administration Basics Part 4
Module 9: CUCME StandUp
  • CUCME Stand Up Part 1
  • CUCME Stand Up Part 2
  • CUCME Stand Up Part 3
  • CUCME Stand Up Part 4
  • CUCME Stand Up Part 5
Module 10: CUCME StandUp Part 2
  • CUCME Stand Up2 Part 1
  • CUCME Stand Up2 Part 2
Module 11: CUCME StandUp CUCME
  • CUCME Stand Up CUCME Part 1
  • CUCME Stand Up CUCME Part 2
  • CUCME Stand Up CUCME Part 3
Module 12: End Users and End User Interfaces
  • End Users And End User Interfaces Part 1
  • End Users And End User Interfaces Part 2
  • End Users And End User Interfaces Part 3
Module 13: Endpoint Implementation
  • Endpoint Implementation Part 1
  • Endpoint Implementation Part 2
  • Endpoint Implementation Part 3
  • Endpoint Implementation Part 4
Module 14: Call Coverage
  • Call Coverage Part 1
  • Call Coverage Part 2
  • Call Coverage Part 3
  • Call Coverage Part 4
  • Call Coverage Part 5
  • Call Coverage Part 6
  • Call Coverage Part 7
  • Call Coverage Part 8
  • Call Coverage Part 9
Module 15: Calling Restrictions and Routing
  • Calling Restrictions And Routing Part 1
  • Calling Restrictions And Routing Part 2
  • Calling Restrictions And Routing Part 3
  • Calling Restrictions And Routing Part 4
  • Calling Restrictions And Routing Part 5
  • Calling Restrictions And Routing Part 6
Module 16: CUCME Advance Call Coverage
  • CUCME Advance Call Coverage Part 1
  • CUCME Advance Call Coverage Part 2
Module 17: Implementing Unity Connection
  • Implementing Unity Connection Part 1
  • Implementing Unity Connection Part 2
  • Implementing Unity Connection Part 3
  • Implementing Unity Connection Part 4
  • Implementing Unity Connection Part 5
  • Implementing Unity Connection Part 6
  • Implementing Unity Connection Part 7
  • Implementing Unity Connection Part 8
  • Outro
Module 1: Virtual Box
  • Virtual Box-Part 1
  • Virtual Box-Part 2
  • Virtual Box-Part 3
  • Virtual Box-Part 4
  • Virtual Box-Part 5
  • Virtual Box-Part 6
Module 2: Basic Commands
  • Basic Commands-Part 1
  • Basic Commands-Part 2
  • Basic Commands-Part 3
  • Basic Commands-Part 4
  • Basic Commands-Part 5
  • Basic Commands-Part 6
  • Basic Commands-Part 7
  • Basic Commands-Part 8
  • Basic Commands-Part 9
  • Basic Commands-Part 10
Module 3: Special Characters
  • Special Characters-Part 1
  • Special Characters-Part 2
  • Special Characters-Part 3
Module 4: File Editing
  • File Editing-Part 1
  • File Editing-Part 2
  • File Editing-Part 3
  • File Editing-Part 4
  • File Editing-Part 5
  • File Editing-Part 6
  • File Editing-Part 7
Module 5: File System Structure
  • File System Structure-Part 1
  • File System Structure-Part 2
  • File System Structure-Part 3
  • File System Structure-Part 4
Module 6: Finding Files
  • Finding Files-Part 1
  • Finding Files-Part 2
  • Finding Files-Part 3
Module 7: Shell Special Characters
  • Shell Special Characters-Part 1
  • Shell Special Characters-Part 2
  • Shell Special Characters-Part 3
Module 8: Regular Expressions
  • Regular Expressions-Part 1
  • Regular Expressions-Part 2
  • Regular Expressions-Part 3
  • Regular Expressions-Part 4
  • Regular Expressions-Part 5
  • Regular Expressions-Part 6
Module 9: Process Management
  • Process Management-Part 1
  • Process Management-Part 2
  • Process Management-Part 3
  • Process Management-Part 4
  • Process Management-Part 5
  • Process Management-Part 6
  • Process Management-Part 7
  • Process Management-Part 8
Module 10: Job Scheduling
  • Job Scheduling-Part 1
  • Job Scheduling-Part 2
  • Job Scheduling-Part 3
  • Job Scheduling-Part 4
  • Job Scheduling-Part 5
  • Job Scheduling-Part 6
Module 11: Customizing Your Account
  • Customizing Your Account-Part 1
  • Customizing Your Account-Part 2
  • Customizing Your Account-Part 3
  • Customizing Your Account-Part 4
  • Customizing Your Account-Part 5
  • Customizing Your Account-Part 6
Module 12: Unix Printing
  • Unix Printing-Part 1
  • Unix Printing-Part 2
  • Unix Printing-Part 3
  • Unix Printing-Part 4
Module 13: Networking
  • Networking-Part 1
  • Networking-Part 2
  • Networking-Part 3
  • Networking-Part 4
  • Networking-Part 5
  • Networking-Part 6
  • Networking-Part 7
  • Networking-Part 8
  • Networking-Part 9
  • Networking-Part 10
Module 14: X Windows
  • X Windows-Part 1
  • X Windows-Part 2
  • X Windows-Part 3
  • X Windows-Part 4
  • X Windows-Part 5
Module 15: Back Up And Compression
  • Back Up And Compression-Part 1
  • Back Up And Compression-Part 2
  • Back Up And Compression-Part 3
  • Back Up And Compression-Part 4
Module 16: Text Utility
  • Text Utility-Part 1
  • Text Utility-Part 2
  • Text Utility-Part 3
  • Text Utility-Part 4
  • Text Utility-Part 5
Module 17: Shell Scripting
  • Shell Scripting-Part 1
  • Shell Scripting-Part 2
  • Shell Scripting-Part 3
  • Shell Scripting-Part 4
  • Shell Scripting-Part 5
  • Shell Scripting-Part 6
  • Shell Scripting-Part 7
  • Shell Scripting-Part 8
  • Shell Scripting-Part 9
  • Shell Scripting-Part 10
  • Shell Scripting-Part 11
Module 18: System Administration Basics
  • System Administration Basics-Part 1
  • System Administration Basics-Part 2
  • System Administration Basics-Part 3
  • System Administration Basics-Part 4
  • System Administration Basics-Part 5
Module 1: The ITIL Qualification Scheme
  • Intro
  • About Scheme
  • Levels Of Qualifications
  • Qualification Bodies
  • The ITIL Foundation Certification Stubble
Module 2: Introduction to Service Management
  • Service And Service Management- Part 1
  • Service And Service Management- Part2
  • Service Management Processes- Part 1
  • Service Management Processes- Part 2
  • Service Management Best Practices And Summary
Module 3: ITIL and the Service Lifecycle
  • Service Management Practices
  • Why ITIL
  • The Service Lifecycle
Module 4: Service Strategy
  • Service Strategy Purpose And Objectives
  • Service Strategy Scope
  • Business Value Stubble
  • Key Principles- Part1
  • Key Principles- Part2
  • Service Stragey Processes
Module 5: Service Design
  • Service Design Purpose And Objectives
  • Scope Of Service Design
  • Business Value Service Design
  • Service Design Key Principles
  • Service Design Processes- Part 1
  • Service Design Processes- Part 2
  • Service Design Processes- Part 3
  • Service Design Processes- Part 4
Module 6: Service Transition
  • Service Transition Purpose And Objectives
  • Service Transition Scope And Business Value
  • Service Transition Key Principles
  • Service Transition Processes- Part 1
  • Service Transition Processes- Part 2
  • Service Transition Processes- Part 3
  • Service Transition Processes- Part 4
Module 7: Service Operation
  • Intro To Service Operation
  • Service Operation Basic Concepts
  • Service Operation Processes-Part 1
  • Service Operation Processes-Part 2
  • Service Operation Access Management
  • Service Operation Functions
Module 8: Continual Service Improvement
  • Continual Service Improvement Purpose Objectives And Scope
  • Continual Service Improvement Key Principles
  • Continual Service Improvement Processes
Module 9: Service Management Technology
  • SMT
  • SMT Service Automation
  • SMT Service Analytics
Module 10: How it all Fits Together
  • How It All Fits Together
  • Outro
Module 11: Bonus Material
  • Lifecycle Stages Flow-Part 1
  • Lifecycle Stages Flow-Part 2
  • Lifecycle Stages Breakdown-Part 1
  • Lifecycle Stages Breakdown-Part 2
  • Lifecycle Stages Breakdown-Part 3
  • Function Reviews-Part 1
  • Function Reviews-Part 2
  • Service Support Function
  • Service Delivery Function-Part 1
  • Service Delivery Function-Part 2
  • Test Taking Tips
  • Practice Questions
Module 1: Instructions
  • Introduction
  • Introduction To Building Labs
  • Things You Need To Do
  • Install Demo Virtual Box
  • Navigation
  • Commands With LabDemo
  • Internal And External Commands
  • Overview Of Shell Commands Tricks
  • Exploring Shell Configuration
  • Stream Redirection
  • Overview Of Processing Text Using Filters
  • Overview File-Viewing Commands
  • Overview Using Grep
  • Sed Syntax And Summary
  • Overview Of Exam Essentials
Module 2: Managing Software
  • Managing Software
  • Managing Software
  • Overview Using RPM
  • RPM-Part 2
  • Overview Using Cpio
  • Overview Using Debian And Apt Cache
  • Using Apt-get
  • Debian Tools
  • Managing Shared Libraries
  • Overview Locating Library Files
  • Foreground and Background Processes
  • Managing Software Summary
Module 3: Configuring Hardware
  • Configuring Hardware
  • Configuring Devices
  • Configuring USB
  • Configuring Hard Disk
  • Designing Hard Disk Layout
  • Logical Volume Management
  • Overview Using Fdisk
  • Overview Common File System Types
  • Creating Filesystem
  • Overview Maintaining File System Health
  • Configuring Hardware Summary
Module 4: Managing Files
  • Managing Files
  • File Archiving Commands
  • Managing Files Ownership
  • Managing Disk Quotas
  • Directories And Content
  • Overview Tools For Locating Files
  • Overview Of Exam Essentials
Module 5: Booting Files
  • Booting Linux And Editing Files
  • Boot And Reboot
  • Understanding The Boot Process
  • Run Levels Process
  • Managing Run Level Services
  • Editing With Vi
  • Booting Summary
Module 6: X
  • X Windows Systems
  • X Configuration Options
  • X Configuration Options-Part 2
  • Untitled Media
  • Configuring X Featuring Fonts
  • Overview Managing GUI Logins
  • Using X For Remote Access
  • X Accessibility
  • Addition Assistive Technologies
  • Configuring Localization And Internationalization
  • Querying And Setting Your Locale
  • Configuring Printing-Part 1
  • Configuring Printing-Part 2
  • Using Web-Based CUPS Utilities
Module 7: Admin
  • Administering
  • Directly Modifying Account Configuration
  • Components Of Account
  • Adding Groups
  • Tuning User And System Environments
  • Reviewing Log File Contents
  • Maintaining System Time
  • Admin Summary
Module 8: Basic Networking
  • Basic Networking
  • Network Addressing-Part 1
  • Network Addressing-Part 2
  • DNS Data Flow Zone And Resolution
  • Network Ports
  • Connections
  • Testing Connectivity
  • Wireshark Demo
  • Basic Networking Summary
Module 9: Scripts
  • Scripts E-mail And Databases
  • Writing Scripts-Part 1
  • Writing Scripts-Part 2
  • Managing E-mail
  • Managing Data With SQL
  • Advantages Of Database
  • Scripts Summary
Module 10: Security
  • Security
  • Configuring Xinetd
  • Uninstalling Or Reconfiguring Servers
  • Tools For Managing Passwords
  • Configuring SSH
  • SSH Keys
  • Controlling SSH Access
  • Using GPG
  • Security Summary
Lesson 3 – Medical Terminology
  • Medical Terminology
Lesson 2 – Anatomy Physiology
  • Anatomy
  • Anatomic Organ Systems
Lesson 4 – Introduction to ICD-9-cm
  • Introduction To ICD-9-Part 1
  • Introduction To ICD-9-Part 2
  • Introduction To ICD-9-Part 3
  • Introduction To ICD-9-Part 4
  • Introduction To ICD-9-Part 5
  • Introduction To ICD-9-Part 6
  • Introduction To ICD-9-Part 7
  • Diagnostic Procedures
  • Coding And Reporting Guidelines-Part 1
  • Coding And Reporting Guidelines-Part 2
  • Coding And Reporting Guidelines-Part 3
Lesson 5 – Application of ICD-9-cm (Ch 1-9)
  • Application Of ICD-9-CM
  • Caution
  • Neoplasms
  • Other Metabolic And Immunity Disorders Section
  • Hypertensive Heart And Chronic Kidney Disease
Lesson 7 – Introduction to ICD-10-CM
  • Overview Of ICD-10-CM
Lesson 1 – Introduction to CPT and HCPCS
  • Introduction To CPT And Level II National Codes-HCPCS
  • CMS-1500 Form
  • Categorized By
  • Category I Codes
  • Format
Lesson 2 – Evaluation and Management (E/M)
  • Evaluation And Management-Part 1
  • Evaluation And Management-Part 2
  • Nature Of Evaluation And Management Services
  • Example Of HPI
  • Review Of Systems
  • E And M Documentation Guidelines
  • E And M Exam-Part 1
  • E And M Exam-Part 2
  • Exam
  • Medical Decision Making
  • Number Of Diagnoses Or Treatment Options
  • Amount And Or Complexity Of Data Reviewed
  • Nature Of Presenting Problem
  • E And M Documentation-Level Based On TIme
  • Hospital E And M Codes
  • Subsequent Visits
  • InitialInpatient Services
  • ProlongedServices
  • Modifiers
Lesson 3 – Surgery, Integumentary system, Anesthesia & Modifiers
  • Anesthesia
  • Physical Status Modifiers
  • Medicare Policy
  • Surgical Guidelines
  • 58 Staged Or Related Procedure
  • Modifier 52-Reduced Services
  • Ancillary Modifiers
  • Integumentary System
  • Morphology
  • Integumentary-Nails
  • Integumentary-Introduction
  • Clinical Scenario
  • Mohs Micrographic Surgury
Lesson 4 – Musculoskeletal
  • Musculoskeletal System
  • Rheumatism
  • Endoscopy And Arthroscopy
Lesson 5 – Respiratory and Cardio
  • Respiratory System
  • Endoscopy
  • Mediastinum And Diaphragm
  • Circulatory Systems
  • Associated Diagnosis
  • Pacemaker Or Pacing Cardioverter-Defibrillator
  • CABG
  • Bypass Grafts
  • Selective Catheterization
  • Endovascular Revascularization
  • Coronary Therapeutic Services And Procedures
  • Intracardiac Electrophysiological Procedures And Studies
Lesson 6 – Female Genital System, Maternity Care and General Surgery
  • Hemic And Lymphatic Systems
  • Female Genitourinary And Maternity Care
  • Ultrasound
  • Male Genitourinary
  • Bladder
  • Eyes
  • Ears
  • Digestive System Terms
  • Digestive Procedures
  • Endocrine And Nervous System
  • Nervous System-Part 1
  • Nervous System-Part 2
  • Nervous System-Part 3
Lesson 9 – Medicine
  • Medicine
  • Chemotherapy
  • Category III Codes
  • Conclusion
Lesson 1 – Introduction to Reimbursement
  • Intro
  • Medicare-PartB
  • Fraud And Abuse
Lesson 7 – Radiology
  • Radiology
  • Modifiers
  • Diagnostic Ultrasound
  • Radiation Treatment Management
Lesson 8 – Pathology
  • Regulatory Terms
  • Urinalysis
Lesson 6 – Application of ICD-9-cm (Ch 10-19)
  • Diseases Of The Genitourinary System
  • Diabetes Mellitus In Pregnancy
  • Diseases Of Musculoskeletal SystemAnd Connective Tissue
  • Burns
  • Adverse Effects Poisoning And Toxic Effects
Module 1: Certain Infectious and Parasitic Diseases
  • Intro
  • Certain Infectious And Parasitic Diseases
Module 2: Neoplasm
  • Neoplasm
Module 3: Diseases of the Blood and Blood Forming Organs
  • Diseases Of The Blood And Blood Forming Organs
Module 4: Endocrine, Nutritional and Metabolic Diseases
  • Endocrine Nutritional And Metabolic Diseases
Module 5: Mental Disorders
  • Mental Disorders
Module 6: Diseases of the Nervous System
  • Disesases Of The Nervous System
Module 7: Diseases of the Eye and Adnexa
  • Diseases Of The Eye And Adnexa
Module 8: Diseases of the Ear and Mastoid Process
  • Diseases Of The Ear And Mastoid
Module 9: Diseases of the Circulatory System
  • Diseases Of The Circulatory System
Module 10: Diseases of the Respiratory System
  • Diseases Of The Respiratory System
Module 11: Diseases of the Digestive System
  • Diseases Of The Digestive System
  • Specific Coding Exercises
Module 12: Diseases of the Skin and Subcutaneous Tissue
  • Diseases Of The Skin And Subcutaneous Tissue
Module 13: Diseases of the Musculoskeletal System and Connective Tissue
  • Diseases Of The Musculoskeletal System And Connective Tissue
Module 14: Diseases of the Genitourinary System
  • Diseases Of The Genitourinary System
Module 15: Pregnancy, Childbirth, and the Puerperium
  • Pregnancy Childbirth And The Puerperium
Module 16: Newborn (Perinatal) Guidelines
  • Newborn Perinatal Guidelines
Module 17: Congenital Malformations, Deformations and Chromosomal Abnormalities
  • Congenital Malformations Deformations And Chromosomal Abnormalities
Module 18: Symptoms, Signs and Abnormal Clinical and Laboratory Findings
  • Symptoms Signs And Abnormal Clinical And Laboratory Findings
Module 19: Injury, Poisoning and Certain Other Consequences of the External Causes
  • Injury Poisoning And Certain Other Consequences Of The External Causes
  • Specific Coding Questions
Module 20: External Causes of Morbidity
  • External Causes Of Morbidity
Module 21: Factors Influencing Health Status
  • Factors Influencing Health Status
  • Case Study 1 And 2
  • Outro
Marketing Tools and Tips for Success
  • Determine Your Goals
  • Create Your Persona Or Voice
  • Decide On Your Platforms
  • Establishing A Social Media Manager
  • Coordinate With Customer Service
  • Create A Predetermined Crisis Management Plan
  • Stick To The Script
  • Building Relationships With The Media
  • Find Your Evangelist
  • Stay Informed Part 1
  • Stay Informed Part 2
  • Bitly
  • Woobox Part 1
  • Woobox Part 2
  • HootSuite Part 1
  • HootSuite Part 2
  • Storify
  • Social Media Rules And Tips
  • Social Media Conclusion
  • Tweetdeck-Boolean Search
Marketing with Google and YouTube
  • Introduction To Google Plus
  • Overview Of The Interface
  • Setting Up A Google Plus Page
  • Linking Your Other Social Networks
  • Linking Your Website To Your Google Plus Page
  • Review Of Your Google Plus Dashboard
  • Notification Settings For Google Plus
  • Photo Settings In Google Plus
  • Google Plus And YouTube
  • YouTube Advanced Settings
  • Interface For Uploaded Videos
  • Sharing Videos Across Your Social Network
  • Updating Your About Section
  • Quick Recap Of Everything Covered So Far
Basics of Marketing with Social Media
  • Social Media Introduction
  • Creating A Google Account
  • Setting Up Your Twitter Account
  • Getting Your Twitter House In Order
  • Why Facebook For Your Business
  • Using Facebook As A Business
  • Setting Up Your Business Page
  • Setting Your Cover Photo
  • Tying It All Together
  • Tip-Adding Admins In Facebook
Module 1: Introduction to Google Analytics
  • Intro Definitions-Part 1
  • Intro Definitions-Part 2
  • How Google Analytics Works
Module 2: Fundamentals of Google Analytics
  • Build Analytics Infrastructure
  • Setting Up Conversion Data
  • Setting Up E-Commerce And Goal Tracking
  • Cross Domain Tracking
  • Input New Users
  • Examine Data Points
Module 3: Basics of Google Anayltics
  • Basic Features
  • Dashboard
  • Shortcuts
  • Adding A Dashboard
  • Sharing Reports
  • Alerts
  • Realtime Analytics
  • Standard Reports
  • Views
Module 4: Reports in Google Analytics
  • Acquisitions Intro
  • All Traffic Acquisitions
  • Acquisitions Overview
  • Acquisitions Channels
  • All Referrals
  • Campaign
  • Keywords
  • Social
  • Webmaster Tools
Module 5: Behavioral Reports
  • Behavioral Reports Intro
  • Dimensions
  • Content Drilldown
  • Landing Pages
  • Exit Pages
  • Event Flow Report
  • Working With Events
  • Site Search Report-Part 1
  • Site Search Report-Part 2
  • Site Search Report-Part 3
  • Site Search Report-Part 4
  • Behavior Flow Report
  • Site Speed
  • Using Site Speed Search
  • Page Timings
  • Speed Suggestions
  • User Timing Adsense
  • Experiments
  • Inpage Analytics
Module 6: Audience
  • Audience Reports
  • Location Report
  • Language
  • Behavior
  • Frequency Recency
  • Engagement Report
  • Technology Reports
  • Mobile Reporting
  • Demographic Report
  • Interests
  • Visitor Flow Chart
Module 7: Conversions
  • Intro To Module 7
  • Funnel Visualization
  • Goal Flow Report
  • Reverse Goal Path
  • Goal URLs
  • E-commerce Reports
  • Product Performance Reports
  • Transactions Report
  • Time To Purchase Report
  • Multi-Channels Funnels Report
  • Assisted Conversion Report
  • Top Conversion Paths Report
  • Time Log And Path Length Report
  • Attribution Report And Model Comparison Tool
  • Conclusion
Accounting and Business Basics
  • Introduction
  • Business Entities
  • Beginning Your Business
  • Financial Basics Part 1
  • Financial Basics Part 2
  • Employees Payroll
  • Getting Your Business Out There
  • SEO
  • Other Topics
  • Closing
Module 1: Creating and Setting Up Your Point of Sale Company File
  • Intro To Point Of Sale
  • Creating And Setting Up Point Of Sale
Module 2: Installing your System
  • Determining Your Point Of Sale Additions
Module 3: Navigating and Customizing the Home Page
  • Navigating And Customizing The Homepage
Module 4: Company Preferences
  • Company Preferences
Module 5: Financial- Setting up QuickBooks Connection
  • Setting Up Quickbooks Connection
Module 6: Setting up Sales Tax
  • Setting Up Sales Tax
Module 7: Workstation Preferences
  • Workstation Preferences
Module 8: Additional Features
  • Additional Features
Module 9: Employees and Security
  • Employees And Security
Module 10: Customers
  • Customers
Module 11: Rewards Program
  • Reward Programs
Module 12: Vendors
  • Vendors
Module 13: Setting Up Your Inventory
  • Setting Up Inventory
Module 14: Item Styles, Assemblies, and Group
  • Adding Styles Assemblies And Groups
Module 15: Working with Inventory
  • Working With Inventory
Module 16: Sales
  • Sales
Module 17: Working with Price Levels and Discounts
  • Working With Price Level And Discounts
Module 18: Collecting Sales Tax
  • Collecting Sales Tax
Module 19: Adding Shipping Information (Pro/MS)
  • Adding Shipping Info
Module 20: Tracking Sales Commissions
  • Tracking Sales And Commission
Module 21: Taking Payment and Giving Change
  • Taking Payments And Giving Change
Module 22: Recording Tips
  • Recording Tip
Module 23: Handling Tricky Sales Returns
  • Handling Tricky Sales And Returns
Module 24: Working with Sales Orders, Work Orders, and Layaways
  • Working With Sales And Work Orders
Module 25: Purchasing Merchandise
  • Purchasing Merchandise
Module 26: Receiving from a PO
  • Receiving Purchase Orders
Module 27: Managing Inventory
  • Managing Inventory
Module 28: Reporting
  • Reporting Point Of Sales
Module 29: QuickBooks Financial
  • Quickbooks Financial
Module 30: Multi-Store
  • Multi-Store
Module 31: Protect your data
  • Protecting Your Data
Module 32: Adding Third Party Applications
  • Adding 3rd Party Apps
  • Summary of Point of Sale
Module 1: The Phone
  • Introduction
  • Buttons
Module 2: The Screen
  • Gestures
Module 3: The Keyboard
  • Keypad
Module 4: Contacts
  • Contacts
  • Groups
Module 5: Phone Calls
  • Phone
  • Call Customization
Module 6: Messaging
  • Messages-Part 1
  • Messages – Part 2
  • Messages – Part 3
  • Messages – Part 4
  • Customizing Messages
Module 7: Internet
  • Internet – Part 1
  • Internet – Part 2
  • Internet Settings
Module 8: Email
  • Email-Part1
  • Email-Part 2
  • Setup Email
Module 9: Music
  • Music
Module 10: Android Specifics
  • Google Voice
  • Customization
  • Lock Screen
  • Stylus
Module 11: Photos & Video
  • Camera-Part1
  • Camera-Part2
  • Taking Photos-Part1
  • Taking Photos-Part2
  • Editing Photos
  • Capturing Video
Module 12: Conclusion
  • Wrap Up
Module 1: iPhone Basics
  • Iphone Intro
  • Iphone The Basics
Module 2: The Screen
  • 2.1 The Screen Pt. 1
  • 2.2 The Screen Pt. 2
  • 2.3 The Screen Pt. 3
  • 2.4 The Screen Pt. 4
Module 3: The Keyboard
  • Basic Keyboard
  • Advanced Keyboard
Module 4: Basic Calls and Settings
  • Making A Call
  • Settings-Part 1
  • Settings-Part 2
Module 5: Contacts
  • Contacts-Part 2
  • Contacts-Part 2
Module 6: Phone Calls
  • Phone Calls-Part 1
  • Phone Calls-Part 2
  • Phone Calls-Part 3
  • Advanced Phone Calls
Module 7: Messaging
  • Texting-Part 1
  • Texting-Part 2
  • Advanced Texting-Part 1
  • Advanced Texting-Part 2
  • Message Settings
Module 8: Web
  • Web-Part 1
  • Web-Part 2
  • Web-Part 3
Module 9: Email
  • Email-Part 1
  • Email-Part 2
  • Multiple Email Accounts
  • Email Settings
Module 10: Siri
  • SIRI
Module 11: Music
  • Music-Part 1
  • Music-Part 2
Module 12: Photos and Video
  • Camera Functions
  • Photography Settings
  • Edit Photos
  • Share Photos
  • Video Functions
Module 13: Maps
  • Apple Maps
Module 14: Conclusion
  • Application Management
  • Misc-Part 1
  • Misc-Part 2
  • Conclusion
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
  • Introduction
  • Identify Components of a Personal Computer
  • Sign in to Windows 8
  • Navigate the Desktop
Lesson 2: Using the Modern Apps and Navigation Features
  • Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
  • Navigate the Desktop
Lesson 4: Using Internet Explorer 10
  • Navigate Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
  • Multitasking With Apps
  • Use the Control Panel and Task Manager-Part1
  • Use the Control Panel and Task Manager-Part2
Lesson 6: Using Windows 8 Security Features
  • Customizing the Windows 8 Environment
  • Security Features
  • Using Other Windows 8 Features-Part1
  • Using Other Windows 8 Features-Part2
  • Using Other Windows 8 Features-Part3
Module 1: Architecture
  • Cloud Security Overview-Part1
  • Cloud Security Overview-Part2
  • Cloud Diagrams
  • Cloud Services
Module 2: Governance and Enterprise Risk
  • Risk Management
  • Corporate Governance
  • Enterprise Risk Management
  • Risk Management Balance Process Supply Chain Security
  • ERM Incidents Recommendations-Part1
  • ERM Incidents Recommendations-Part2
  • ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
  • Cloud Legal Issues-Part1
  • Cloud Legal Issues-Part2
  • Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
  • Audits
  • Compliance And Audit
  • Audit Recommendations
  • Audit Requirements
Module 5: Information Management and Data Security
  • Information And Security
  • Storage
  • Information Governance Classification
  • Data Security
  • Protecting Data Moving
  • Client Database Encryption
  • PaaS Encryption
Module 6: Interoperability and Portability
  • Interoperability And Portability
  • Interoperability Recommendations
  • Portability Recommendations
  • Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
  • Business Continuity And Disaster Recovery
  • Assessing CSP Security
  • Equipment Maintenance
  • Recommendations
Module 8: Data Center Operations
  • Data Center Operations
Module 9: Incident Response
  • Incident Response
  • Testing
  • IaaS
  • C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
  • Application Security
  • Security Testing
  • Audit Compliance
  • Security Assurance Recommendations
Module 11: Encryption and Key Management
  • Encryption And Key Management
  • Content Aware Encryption
  • Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
  • Building Access Control
  • Intro To Identity
  • Entitlement Process
  • Trust With Identity
  • Recommendations For Identity Management
Module 13: Virtualization
  • Virtualization
  • Hypervisor And Virtual Machine
  • Inter-Virtual Machine Attacks
  • Virtual Machine Encryption
  • Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
  • Security As A Service
  • Security Offerings
  • Intrusion Detection Prevention
  • Business Continuity And Disaster Recovery
  • European CCSK
  • Top Security Benefits
  • European Legal Based Issues
Module 1 – The Audit Process
  • Introduction
  • Audit Process
  • Auditing Standards
  • Auditing Guidelines
  • Cobit Model
  • Audit Management
  • Internal Control Classifications
  • Planning
  • Program
  • Evidence
  • Audit Control Evaluation
  • CSA Control Self-Assessment
Module 2 – Audit Governance and Compliance
  • IT Governance
  • Governance & Security Policies
  • Outsourcing & Governance
  • Outsourcing & Globalization
  • Organizational Compliance
  • IT Strategy
  • IT Performance
Module 3 – System Infrastructure, Project Management, and Testing
  • System & Infrastructure
  • Requirements
  • Project Management Tools – Part 1
  • Project Management Tools – Part 2
  • Applications
  • Agile Development
  • Monitoring & Controlling
  • Acquisition Process
  • Testing Process
  • Information Systems Maintenance Practices
  • Data Conversion Tools
Module 4 – Media Disposal, Reviews, and System Maintenance
  • Media Disposal Process
  • Post Implementation Review
  • Periodic Review
  • System Maintenance
Module 5 – IT Service Level Management
  • IT Service Delivery and Support
  • How to Evalutate Service Level Management Practices
  • Operations Management
  • Databases
  • Structured Query Language (SQL)
  • Monitoring Performance
  • Source Code and Perfomance Monitoring
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Network Component Types
Module 6 – Auditor Technical Overview
  • IS Auditor Technical Overview
  • Security Design
  • Monitoring Systems
  • Types of Attacks
  • Cryptography
  • Encryption
  • Asymmetric Encryption
  • Digital Certificate
  • Different Kinds of Attacks
  • Access Controls
  • Identification and Authenication
  • Physical Access Exposure
  • Environmental Security
  • Network Security Devices and Network Components
  • Network Address Translation
  • Virtual Private Networks (VPNs)
  • Voice System Risks
  • Intrusion Detection
  • Firewalls
  • Firewall Implementation
  • Network Access Protection
  • HoneyPot
  • Risks to Portable and Wireless Devices
  • Bluetooth
  • OSI Networking
  • Managing Data
Module 7 – Business Continuity and Disaster Recovery
  • Business Continuity and Disaster Recovery
  • Fault Tolerance
  • Business Continuity and Disaster Recovery Regulations
Domain 1 – Characteristics of Cloud Services from a Business Perspect
  • Overview
  • History
  • The Three Delivery Model Architecture
  • SaaS
  • Justification For Cloud
  • Confidentiality And Availability
  • Concepts From NIST
  • On Demand Self-Service
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations
Domain 2 – Cloud Computing and Business Value
  • Reasons For Cloud-Agility-Part1
  • Reasons For Cloud-Agility-Part2
  • New Business Opportunities
Domain 3 – Technical Perspectives/Cloud Types
  • Technical Perspectives Cloud Types
  • Sources
  • Security Risk
  • Technical Risk And Solutions
Domain 4 – Steps to Successful Adoption of Cloud
  • Steps To Adopting Cloud-Part1
  • Steps To Adopting Cloud-Part2
  • Steps To Adopting Cloud-Part3
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
  • Information Security Management System-Part1
  • Information Security Management System-Part2
Domain 6 – Risks and Consequences of Cloud Computing
  • Information Management And Security-Part1
  • Information Management And Security-Part2
  • The Data Security LifeCycle
  • Governance
  • Data Loss Prevention-Part1
  • Data Loss Prevention-Part2
  • Protecting Data
  • Risk Management-Part1
  • Risk Management-Part2
  • Risk Management-Part3
  • Risk Management-Part4
  • Risk Management-Part5
  • Recommendations-Part1
  • Recommendations-Part2
  • IT Governance
  • Audit
  • Recommendations For Audit-Part1
  • Recommendations For Audit-Part2
Module 1: Computer Forensics Introduction
  • Intro To Course-Part1
  • Intro To Course-Part2
  • Intro To Course-Part3
  • Intro To Course-Part4
  • Intro To Course-Part5
  • Intro To Forensics-Part1
  • Intro To Forensics-Part2
  • Intro To Forensics-Part3
  • Intro To Forensics-Part4
  • Intro To Forensics-Part5
  • Intro To Forensics-Part6
  • Intro To Forensics-Part7
  • Intro To Forensics-Part8
Module 2: Forensics Investigation Process
  • Forensics Investigation Process-Part1
  • Forensics Investigation Process-Part2
  • Forensics Investigation Process-Part3
  • Forensics Investigation Process-Part4
  • Forensics Investigation Process-Part5
  • Forensics Investigation Process-Part6
  • Forensics Investigation Process-Part7
  • Forensics Investigation Process-Part8
  • Forensics Investigation Process-Part9
  • Forensics Investigation Process-Part10
Module 3: Searching and Seizing
  • Searching And Seizing-Part1
  • Searching And Seizing-Part2
  • Searching And Seizing-Part3
  • Searching And Seizing-Part4
  • Searching And Seizing-Part5
Module 4: Digital Evidence
  • Digital Evidence-Part1
  • Digital Evidence-Part2
  • Digital Evidence-Part3
  • Digital Evidence-Part4
  • Digital Evidence-Part5
  • Digital Evidence-Part6
  • Digital Evidence-Part7
Module 5: First Responder Procedures
  • First Responder Procedures-Part1
  • First Responder Procedures-Part2
  • First Responder Procedures-Part3
  • First Responder Procedures-Part4
  • First Responder Procedures-Part5
  • First Responder Procedures-Part6
  • First Responder Procedures-Part7
  • First Responder Procedures-Part8
Module 6: Forensics Lab
  • Forensic Lab-Part1
  • Forensic Lab-Part2
  • Forensic Lab-Part3
  • Forensic Lab-Part4
  • Forensic Lab-Part5
Module 7: Hard Disks and File Systems
  • Hard Disks And File Systems-Part1
  • Hard Disks And File Systems-Part2
  • Hard Disks And File Systems-Part3
  • Hard Disks And File Systems-Part4
  • Hard Disks And File Systems-Part5
  • Hard Disks And File Systems-Part6
  • Hard Disks And File Systems-Part7
  • Hard Disks And File Systems-Part8
  • Hard Disks And File Systems-Part9
  • Hard Disks And File Systems-Part10
Module 8: Windows Forensics
  • Windows Forensics-Part1
  • Windows Forensics-Part2
  • Windows Forensics-Part3
  • Windows Forensics-Part4
  • Windows Forensics-Part5
  • Windows Forensics-Part6
  • Windows Forensics-Part7
  • Windows Forensics-Part8
  • Windows Forensics-Part9
  • Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
  • Data Acquisition And Duplication-Part1
  • Data Acquisition And Duplication-Part2
  • Data Acquisition And Duplication-Part3
  • Data Acquisition And Duplication-Part4
  • Data Acquisition And Duplication-Part5
  • Data Acquisition And Duplication-Part6
  • Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
  • Recovering Deleted Files And Partitions-Part1
  • Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
  • Using Access Data FTK And Special Steps-Part1
  • Using Access Data FTK And Special Steps-Part2
  • Using Access Data FTK And Special Steps-Part3
  • Using Access Data FTK And Special Steps-Part4
  • Using Access Data FTK And Special Steps-Part5
  • Using Access Data FTK And Special Steps-Part6
  • Using Access Data FTK And Special Steps-Part7
  • Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
  • EnCase-Part1
  • EnCase-Part2
  • EnCase-Part3
Module 13: Steganography
  • Stenography-Part1
  • Stenography-Part2
  • Stenography-Part3
  • Stenography-Part4
Module 14: Password Crackers
  • Passwords-Part1
  • Passwords-Part2
  • Passwords-Part3
  • Passwords-Part4
Module 15: Log Correlation
  • Log Correlation-Part1
  • Log Correlation-Part2
  • Log Correlation-Part3
  • Log Correlation-Part4
  • Log Correlation-Part5
  • Log Correlation-Part6
Module 16: Network Forensics
  • Network Forensics-Part1
  • Network Forensics-Part2
  • Network Forensics-Part3
  • Network Forensics-Part4
Module 17: Wireless Attacks
  • Wireless Attacks-Part1
  • Wireless Attacks-Part2
  • Wireless Attacks-Part3
Module 18: Web Attacks
  • Web Attacks-Part1
  • Web Attacks-Part2
  • Web Attacks-Part3
  • Web Attacks-Part4
  • Web Attacks-Part5
  • Web Attacks-Part6
  • Web Attacks-Part7
  • Web Attacks-Part8
Module 19: Email Crimes
  • Email Crimes-Part1
  • Email Crimes-Part2
  • Email Crimes-Part3
  • Email Crimes-Part4
Module 20: Mobile Investigation
  • Mobile Investigation-Part1
  • Mobile Investigation-Part2
  • Mobile Investigation-Part3
  • Mobile Investigation-Part4
  • Mobile Investigation-Part5
Module 21: Investigative Reports
  • Investigation Reports-Part1
  • Investigation Reports-Part2
  • Investigation Reports-Part3
  • Investigation Reports-Part4
Module 22: Expert Witness
  • Expert Witness-Part1
  • Expert Witness-Part2
  • Expert Witness-Part3
Module 1: The principles of CC
  • EXIN Overview-Part 1
  • EXIN Overview-Part 2
  • EXIN Overview 2-Part 1
  • EXIN Overview 2-Part 2
  • The Basics
  • History Of Cloud
  • Delivery Model Architectures
  • Software As A Service
  • Justification For Cloud Computing
  • Confidentiality And Availability
  • Concepts From NIST
  • Important Characteristics
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations
  • Virtualization
  • Virtualization Concepts
  • Inter-Virtual Machine Attacks
  • Virtual Machine Encryption
  • Recommendations
  • Service Models
  • Business Process
  • Outsourcing
  • Software As A Service-Part 1
  • Software As A Service-Part 2
  • Risks And Recommendations
  • Platform As A Service
  • PaaS Considerations
  • PaaS Issues
  • Infrastructure As A Service
  • Scope Of Control
  • IaaS Benefits
  • IaaS Issues And Concerns
  • IaaS Recommendations
  • Services Oriented Architecture
  • Web Services
  • Infrastructure On Demand
  • Why Cloud
  • Collaborative Working
  • New Business Opportunities
Module 2: Implementing and Managing CC
  • Implementing And Managing Cloud Computing
Module 3: Using the Cloud
  • Relevent Technologies In Cloud
  • Storage Devices-Part 1
  • Storage Devices-Part 2
  • Application Programming Interfaces
  • Traditional Software Model
  • Impact Of Cloud On Users
  • Providing Cloud Services
  • Developing Added Services-Part 1
  • Developing Added Services-Part 2
  • Using Cloud Services
Module 4: Security and Compliance
  • Threats And Controls
  • Malicious Insiders
  • Insiders Remediation
Module 5: Evaluation of CC
  • Why Cloud
  • Resource Scaling
  • Quality
  • Thin Clients
  • Buying Cloud Services
  • Pay As You Go Vs Ownership
  • Establishing Requirements
  • Contract Terms
Module 1
  • Introduction and Developing in HTML5 with Javascript and CSS3
  • Intro to HTML 5
  • Examples of Browsers Using Codes
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 1
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 2
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 3
  • Using HTML5 Codes and Utilizing Virtual Studio – Part 4
Module 2
  • HTML5 Code Walk through – Part 1
  • HTML5 Code Walk through – Part 2
  • HTML5 Code Walk through – Part 3
  • CSS3 Selectors and Style Properties – Part 1
  • CSS3 Selectors and Style Properties – Part 2
  • CSS3 Selectors and Style Properties – Part 3
  • CSS3 Selectors and Style Properties – Part 4
  • CSS3 Selectors and Style Properties – Part 5
  • CSS3 Selectors and Style Properties – Part 6
Module 3
  • Developer Tool Support
  • Browse-Specific Feature Detection
  • HTML Form Examples – Part 1
  • HTML Form Examples – Part 2
  • HTML Form Examples – Part 3
  • HTML Form Examples – Part 4
Module 4
  • HTML Form Enhancements – Part 1
  • HTML Form Enhancements – Part 2
  • HTML Form Enhancements – Part 3
  • HTML Form Enhancements – Part 4
  • HTML Form Enhancements – Part 5
  • HTML Form Enhancements – Part 6
Module 5
  • Building Websites – Part 1
  • Building Websites – Part 2
  • Building Websites – Part 3
  • Building Websites – Part 4
Module 6
  • More HTML5
  • More HTML5 – Information Tags
  • More HTML5 – Codes
  • More HTML5 – Java Script
  • Course Outro
Module 1: Comprehensive Introduction to Sharepoint
  • Course Intro
  • Social Media
  • Moblie Access
  • Business Intelligence – Part 1
  • Business Intelligence – Part 2
  • Sharepoint Licensing Overview
  • Organize Info
  • Share Your Insights
  • Minimal Download Strategy
  • Enhances Social and Collaboration Features
  • Enhanced Search
  • Workflow
  • Enterprise Content Management
  • Web Content Management
Module 2: Installing SharePoint
  • What We Will Cover – Part 1
  • What We Will Cover – Part 2
  • What We Will Cover – Part 3
  • What We Will Cover – Part 4
  • What We Will Cover – Part 5
  • What We Will Cover – Part 6
  • What We Will Cover – Part 7
  • What We Will Cover – Part 8
  • What We Will Cover – Part 9
  • Software Requirements
  • Service and Accounts
Module 3: SharePoint Architecture, Logical & Physical
  • Physical Architecture
  • Physical Architecture – Traditional Topologies
  • Physical Architecture – Streamlined Topologies
  • Physical Architecture – Search Architectures
  • Physical Architecture – Enterprise Search Architecture
  • Physical Architecture – Multi – Farm
  • Logical Architecture
  • Logical Architecture – Host Names Based Sites
  • Logical Architecture – Path – Based
  • Logical Architecture – Extranet
  • Logical Architecture – Mobile
  • Logical Architecture – Single Farm Deployment
  • Databasis
  • Summary
Module 4: Web Applications and Site Collections
  • Web Applications and Site Collections Intro
  • Logical Structure and Web Applications
  • Demo
  • Site Collections
  • Demo – Part 1
  • Demo – Part 2
  • Application Pools and Summary
Module 5: Configure Service Applications
  • Intro
  • Service Applications
  • Demo of Configuring Excel Services
  • Sharepoint Management Shell Demo
  • Summary
Module 6: Permissions
  • Intro
  • Site Permissions
  • Terms
  • Demo
  • Authentication Modes
  • O Auth
  • Summary
Module 7: Search
  • Intro
  • Intro to Search
  • Search Logical Architecture
  • Crawling the Content
  • Conent Processing
  • Analytics Processing Component
  • Summary
Module 8: User Profiles
  • Intro
  • User Profile Service
  • User Profile Demo
  • Profile Synchronization Goals
  • Profile Synchronization Demo
  • Sync Performance Changes
  • Sync Performance Changes Demo
  • Profile Import Options
Module 9: Ongoing Support and Maintenance
  • Intro
  • What To Look For
Module 1: Business Continuity
  • Course Intro
  • Intro to Plan Business Continuity Management – Part 1
  • Intro to Plan Business Continuity Management – Part 2
  • Describe High Availability
  • Degraded Availability
  • Qualifying Downtime
  • Qualifying Downtime Demo – Part 1
  • Qualifying Downtime Demo – Part 2
  • Qualifying Downtime Demo – Part 3
  • Qualifying Downtime Demo – Part 4
  • Qualifying Downtime Demo – Part 5
  • Qualifying Downtime Demo – Part 6
  • Disaster Recovery Plan (DRP) – Part 1
  • Disaster Recovery Plan (DRP) – Part 2
  • Measure Availability – Part 1
  • Measure Availability (Demo) – Part 2
  • Measure Availability – Part 3
  • Downtime Metrics – Part 1
  • Downtime Metrics – Part 2
  • Performance to Availability Relationship
  • Costs of HA
  • HA Supports in a Farm
  • Fault Tolerant in your HA Solution
  • Backup and Recovery in SharePoint 2013
  • Summary
Module 2: Model, Design, and Test
  • Intro
  • Plan for Success
  • Model – Part 1
  • Model – Part 2
  • Model – Part 3
  • Model – Part 4
  • Model – Part 5
  • Model – Part 6
  • Model – Part 7
  • Model – Part 8
  • Design – Part 1
  • Design – Part 2
  • Design – Part 3
  • Design – Part 4
  • Design – Part 5
  • Design – Part 6
  • Design – Part 7
  • Test – Part 1
  • Test – Part 2
  • Test – Part 3
  • Test – Part 4
  • Test – Part 5
  • Test – Part 6
  • Test – Part 7
  • Deploy
  • Monitor and Maintain
Module 3: Upgrade and Migrate
  • Intro to Upgrade and Migrate to SharePoint 2013
  • Upgrading to SharePoint 2013 – Part 1
  • Upgrading to SharePoint 2013 – Part 2
  • Upgrading to SharePoint 2013 – Part 3
  • Upgrading to SharePoint 2013 – Part 4
  • Upgrading to SharePoint 2013 – Part 5
  • Upgrading to SharePoint 2013 – Part 6
  • Upgrading to SharePoint 2013 – Part 7
Module 4: Create and Configure Service Applications
  • Intro to Create and Configure Service Applications
  • Create and Configure Service Applications
  • Create and Configure Service Applications Demo
  • Create and Configure Service Applications Summary
Module 5: SharePoint Management
  • Intro to Manage SharePoint Solution, BI, and System Integration
  • Manage SP Solutions, BI, and System Integration
Lesson 1: Getting Started with SQL Server 2012
  • Course Introduction
Lesson 2: Working with T-SQL
  • Creating Queries-Part 1
  • Creating Queries-Part 2
  • Creating Queries-Part 3
  • Creating Queries-Part 4
  • Creating Queries-Part 5
  • Constraints-Part 1
  • Constraints-Part 2
  • Constraints-Part 3
  • Constraints-Part 4
  • Constraints-Part 5
Lesson 3: Writing SELECT Queries
  • Select Statement-Part 1
  • Select Statement-Part 2
  • Select Statement-Part 3
  • Select Statement-Part 4
Lesson 4: Working with SQL Data Types
  • Data Types-Part 1
  • Data Types-Part 2
  • Data Types-Part 3
  • Data Types-Part 4
  • Data Types-Part 5
  • Data Types-Part 6
  • Data Types-Part 7
  • Data Types-Part 8
  • Data Types-Part 9
  • Data Types-Part 10
Lesson 5: Sorting and Filtering Data
  • Sorting Results-Part 1
  • Sorting Results-Part 2
  • Sorting Results-Part 3
  • Sorting Results-Part 4
  • Sorting Results-Part 5
  • Sorting Results-Part 6
Lesson 6: Querying Data from Multiple Tables
  • Tables Part 1
  • Tables Part 2
  • Tables Part 3
  • Tables Part 4
  • Tables Part 5
  • Tables Part 6
Lesson 7: Modifying Data
  • Inserting Data-Part 1
  • Inserting Data-Part 2
  • Inserting Data-Part 3
  • Inserting Data-Part 4
  • Inserting Data-Part 5
  • Inserting Data-Part 6
Lesson 8: Working with SQL Server Built-in Functions
  • Functions
  • Parse
  • Logical Functions
  • Group By
Lesson 9: Programming in T-SQL
  • Programming-Part 1
  • Programming-Part 2
  • Programming-Part 3
  • Programming-Part 4
  • Programming-Part 5
  • Programming-Part 6
Lesson 10: Implementing Stored Procedures
  • Storage Procedures-Part 1
  • Storage Procedures-Part 2
  • Dynamic SQL-Part 1
  • Dynamic SQL-Part 2
Lesson 11: Working with Subqueries and Table Expressions
  • Sub-Queries And Table Expressions-Part 1
  • Sub-Queries And Table Expressions-Part 2
  • Sub-Queries And Table Expressions-Part 3
  • Sub-Queries And Table Expressions-Part 4
Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions
  • Set Operators-Part 1
  • Set Operators-Part 2
  • Window Functions-Part 1
  • Window Functions-Part 2
  • User Defined Functions-Part 1
  • User Defined Functions-Part 2
  • Advanced Analytical Functions
Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets
  • Pivot
  • Grouping Sets
Lesson 14: Managing Error Handling and Transactions
  • Error Handling-Part 1
  • Error Handling-Part 2
  • Manage Transactions-Part 1
  • Manage Transactions-Part 2
  • Manage Transactions-Part 3
Lesson 15: Querying SQL Server System
  • System Databases-Part 1
  • System Databases-Part 2
  • System Databases-Part 3
  • System Databases-Part 4
Lesson 16: Optimizing Query Performance
  • Query Planning-Part 1
  • Query Planning-Part 2
  • Index-Part 1
  • Index-Part 2
  • Index-Part 3
Lesson 1: Identifying the SQL Server Platform
  • Overview
  • DataStorage-Part 1
  • DataStorage-Part 2
Lesson 2: Deploying SQL Server
  • Install-Part 1
  • Install-Part 2
Lesson 3: Configuring SQL Server
  • Configuring-Part 1
  • Configuring-Part 2
  • Changing Memory-Part 1
  • Changing Memory-Part 2
  • Email-Part 1
  • Email-Part 2
Lesson 4: Managing Databases in SQL Server 2012
  • User Databases-Part 1
  • User Databases-Part 2
  • User Databases-Part 3
  • User Databases-Part 4
  • User Databases-Part 5
Lesson 5: Managing SQL Server Security
  • Setting Security-Part 1
  • Setting Security-Part 2
  • Server Roles-Part 1
  • Server Roles-Part 2
  • Setting Permissions-Part 1
  • Setting Permissions-Part 2
Lesson 6: Implementing Advanced Security Settings
  • Querying Data From Multiple Tables-Part 1
  • Querying Data From Multiple Tables-Part 2
  • Querying Data From Multiple Tables-Part 3
  • Querying Data From Multiple Tables-Part 4
  • Querying Data From Multiple Tables-Part 5
Lesson 7: Applying Encryption and Compression
  • Encrypting And Compressing-Part 1
  • Encrypting And Compressing-Part 2
  • Encrypting And Compressing-Part 3
Lesson 8: Working with Indexes and Log Files
  • Functions-Part 1
  • Functions-Part 2
  • Functions-Part 3
  • Functions-Part 4
  • Functions-Part 5
  • Functions-Part 6
Lesson 9: Working with Backup and Restore
  • Managing Backups-Part 1
  • Managing Backups-Part 2
  • Managing Backups-Part 3
  • Managing Backups-Part 4
  • Managing Backups-Part 5
  • Managing Backups-Part 6
  • Managing Backups-Part 7
Lesson 10: Implementing High Availability
  • Stored Procedures-Part 1
  • Stored Procedures-Part 2
  • Stored Procedures-Part 3
  • Stored Procedures-Part 4
Lesson 11: Optimizing Server Performance
  • Managing SQL Performance-Part 1
  • Managing SQL Performance-Part 2
  • Managing SQL Performance-Part 3
  • Managing SQL Performance-Part 4
  • Managing SQL Performance-Part 5
  • Managing SQL Performance-Part 6
  • Managing SQL Performance-Part 7
Lesson 12: Troubleshooting Issues and Recovering Databases
  • Set Operators-Part 1
  • Set Operators-Part 2
  • Set Operators-Part 3
  • Set Operators-Part 4
  • Set Operators-Part 5
Lesson 13: Performing Advanced Database Management Tasks
  • Managing Database Infrastructures-Part 1
  • Managing Database Infrastructures-Part 2
  • Managing Database Infrastructures-Part 3
Lesson 1: Introduction to Data Warehouse
  • Introduction
  • Introduction To Data Warehouse-Part1
  • Introduction To Data Warehouse-Part2
  • Introduction To Data Warehouse-Part3
  • Introduction To Data Warehouse-Part4
  • Introduction To Data Warehouse-Part5
  • Introduction To Data Warehouse-Part6
Lesson 2: Creating Dimensions and Changing Granularity of Dimensions
  • Creating Dimensions And Changing Granularity Of Dimensions-Part1
  • Creating Dimensions And Changing Granularity Of Dimensions-Part2
  • Creating Dimensions And Changing Granularity Of Dimensions-Part3
  • Creating Dimensions And Changing Granularity Of Dimensions-Part4
  • Creating Dimensions And Changing Granularity Of Dimensions-Part5
  • Creating Dimensions And Changing Granularity Of Dimensions-Part6
Lesson 3: Creating Fact Tables and ColumnStore Indexes
  • Creating Fact Tables And Column Store Indexes-Part1
  • Creating Fact Tables And Column Store Indexes-Part2
  • Creating Fact Tables And Column Store Indexes-Part3
  • Creating Fact Tables And Column Store Indexes-Part4
  • Creating Fact Tables And Column Store Indexes-Part5
Lesson 4: Implementing Data Warehouse in SQL Server 2012
  • Implementing Data Warehouse-Part1
  • Implementing Data Warehouse-Part2
  • Implementing Data Warehouse-Part3
  • Implementing Data Warehouse-Part4
Lesson 5: Working with Integration Services
  • Working With Integration Services-Part1
  • Working With Integration Services-Part2
  • Working With Integration Services-Part3
  • Working With Integration Services-Part4
  • Working With Integration Services-Part5
  • Working With Integration Services-Part6
Lesson 6: Managing Control Flow
  • Managing Control Flow-Part1
  • Managing Control Flow-Part2
  • Managing Control Flow-Part3
  • Managing Control Flow-Part4
  • Managing Control Flow-Part5
Lesson 7: Working with Dynamic Variables
  • Working With Dynamic Variables-Part1
  • Working With Dynamic Variables-Part2
  • Working With Dynamic Variables-Part3
  • Working With Dynamic Variables-Part4
  • Working With Dynamic Variables-Part5
  • Working With Dynamic Variables-Part6
  • Working With Dynamic Variables-Part7
  • Working With Dynamic Variables-Part8
Lesson 8: Implementing Data Flow
  • Implementing DataFlow-Part1
  • Implementing DataFlow-Part2
  • Implementing DataFlow-Part3
  • Implementing DataFlow-Part4
  • Implementing DataFlow-Part5
  • Implementing DataFlow-Part6
  • Implementing DataFlow-Part7
  • Implementing DataFlow-Part8
Lesson 9: Managing Data Flow
  • Managing DataFlow-Part1
  • Managing DataFlow-Part2
  • Managing DataFlow-Part3
  • Managing DataFlow-Part4
Lesson 10: Managing SSIS Package Execution
  • Managing SSIS Package Execution-Part1
  • Managing SSIS Package Execution-Part2
  • Managing SSIS Package Execution-Part3
  • Managing SSIS Package Execution-Part4
  • Managing SSIS Package Execution-Part5
  • Managing SSIS Package Execution-Part6
Lesson 11: Debugging and Troubleshooting
  • Debugging And Troubleshooting-Part1
  • Debugging And Troubleshooting-Part2
  • Debugging And Troubleshooting-Part3
  • Debugging And Troubleshooting-Part4
Lesson 12: Deploying Packages
  • Deploying Packages-Part1
  • Deploying Packages-Part2
  • Deploying Packages-Part3
Lesson 13: Securing Packages and Databases
  • Securing Packages And Databases-Part1
  • Securing Packages And Databases-Part2
Lesson 14: Working with MDS and Windows
  • Working With MDS And Windows Azure
Module 1
  • Exploring ASP Dot NET MVC 4 – Part 1
  • Exploring ASP Dot NET MVC 4 – Part 2
  • Exploring ASP Dot NET MVC 4 – Part 3
  • Exploring ASP Dot NET MVC 4 – Part 4
Module 2
  • Designing Web Applications – Part 1
  • Designing Web Applications – Part 2
  • Designing Web Applications – Part 3
  • Designing Web Applications – Part 4
  • Designing Web Applications – Part 5
Module 3
  • Developing ASP Dot NET MVC 4 Models – Part 1
  • Developing ASP Dot NET MVC 4 Models – Part 2
  • Developing ASP Dot NET MVC 4 Models – Part 3
Module 4
  • Developing ASP Dot NET MVC 4 Controllers – Part 1
  • Developing ASP Dot NET MVC 4 Controllers – Part 2
  • Developing ASP Dot NET MVC 4 Controllers – Part 3
  • Developing ASP Dot NET MVC 4 Controllers – Part 4
Module 5
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 1
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 2
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 3
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 4
  • Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 5
Module 6
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 1
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 2
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 3
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 4
  • Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 5
Module 7
  • Structuring ASP Dot NET MVC 4 Web Applications – Part 1
  • Structuring ASP Dot NET MVC 4 Web Applications – Part 2
  • Structuring ASP Dot NET MVC 4 Web Applications – Part 3
Module 8
  • Troubleshooting ASP Dot NET MVC 4 Web Applications
Excel 2010 Basic
  • Intro to Excel Basic
  • Interface and Functions
  • Cells
  • Entering Data Into Cells
  • Basic Formatting in Excel
  • Creating a Worksheet
  • The Intelligence Of Excel
  • Customizing Rows and Columns
  • Creating Formulas
  • Summary Pages and Moving Workbook to Workbook
  • The Function Builder
  • Conditional Formatting
  • Sorting and Filtering Data
  • Printing with Excel
  • Conclusion
  • Excel Basic Flashcards
Excel 2010 Intermediate
  • Intro to Excel Intermediate
  • Charts
  • Headers Footers and Layout Options
  • What If
  • Basic Tables in Excel
  • Pivot Tables
  • Manipulating Data Within the Pivot Tables
  • Pivot Table Charts
  • Data Validation
  • Conclusion
  • Excel Intermediate Flashcards
Excel 2010 Advanced
  • Intro to Excel Advanced
  • Customizing the Ribbon and Cells
  • Creating and Managing Ranges
  • More Formulas
  • Data Analysis
  • Data From an Outside Source
  • Spark Lines
  • Macros
  • Conclusion
  • Excel Advanced Flashcards
Outlook 2010 Basic
  • Intro To Outlook Basic
  • Interface
  • Customizing Interface
  • E-mail 101
  • Organizing Inbound E-mails
  • Calendar Function
  • Task Lists
  • Contact List
  • Multiple Accounts
  • Conclusion
Outlook 2010 Intermediate
  • Intro To Outlook Intermediate
  • Message Functions
  • Calendar
  • More In-Depth Contact Functions
  • Email Message Options
  • Mail Rules
  • Customizing Options
  • Conclusion
Outlook 2010 Advanced
  • Intro To Outlook Advanced
  • Send And Receive
  • Account Settings
  • Calendars
  • Quick Actions Within Messages
  • Quick Steps
  • Conclusion
Powerpoint 2010 Basic
  • Powerpoint Basic Flashcards
  • Intro To PowerPoint Basic
  • The PowerPoint Interface
  • Creating A New Presentation With Templates
  • Slide Layout
  • Visually Appealing Presentations
  • Preview Mode And Page Setup
  • Transitions
  • Creating Custom Slides
  • Animating Text
  • Animating Objects
  • Animation Timing
  • Conclusion
Powerpoint 2010 Intermediate
  • Powerpoint Intermediate Flashcards
  • Introduction To PowerPoint Intermediate
  • Sections And Organizing Slides
  • Adding Autoshapes
  • Inserting And Editing Pictures
  • Inserting And Editing Video
  • Inserting And Editing Tables
  • SmartArt
  • Animating Smart Art And Inserting Audio
  • Headers And Footers In PowerPoint
  • Setup Slideshow And Rehearsal Timing
  • Conclusion
Powerpoint 2010 Advanced
  • Powerpoint Advanced Flashcards
  • Intro To PowerPoint Advanced
  • Master Slides
  • Styles
  • More Functions With Video In PowerPoint
  • Transitions And Action Buttons
  • Customizing The Show
  • Printing In PowerPoint
  • Conclusion
Word 2010 Basic
  • Flashcards
  • Intro to the Word Interface
  • Working with Templates
  • Creating a New Blank Document
  • Formatting a Document
  • More Formatting Options
  • Adding Shapes, Clipart, & Pictures
  • Page Layout
  • Conclusion
Word 2010 Intermediate
  • Flashcards
  • Introduction
  • Tracking Changes in a Document
  • Customizing the Interface
  • Working with Styles
  • Tables in Word
  • Endnotes, Footnotes, & Captions
  • Cover Pages, Headers, & Footers
  • Working with Sections
  • Headers & Footers
  • Cover Sheet & Table of Contents
  • Cover Letters & Mail Merge
  • Conclusion
Word 2010 Advanced
  • Flashcards
  • Introduction to the Word Interface
  • Customizing the Ribbon
  • Embedding Non-Word Documents
  • Working with Formulas
  • Citations
  • Comparing Documents
  • Forms & Content Controls
  • Master Documents & Subdocuments
  • Conclusion
Module 1: Database Admininstration
  • Intro to Oracle
  • Database Administration
  • Installing Oracle – Part 1
  • Installing Oracle – Part 2
  • Post Setup Overview – Part 1
  • Post Setup Overview – Part 2
  • SQLplus – Part 1
  • SQLplus – Part 2
  • SQLplus Demo – Part 1
  • SQLplus Demo – Part 2
  • SQLplus Demo – Part 3
  • Startup and Shutdown – Part 1
  • Startup and Shutdown – Part 2
Module 2: Oracle Architecture
  • Oracle Architecture
  • Schema Objects
  • Data Access
  • Architecture
Module 3: Database Schema
  • Database Schema
  • Create Table & Tablespace – Part 1
  • Create Table & Tablespace – Part 2
  • Create View
  • Create Index
  • Create Sequence
Module 4: Recovery Manager
  • Recovery Manager
  • What is RMAN
  • RMAN Demo
  • Restore – Part 1
  • Restore – Part 2
Module 5: Introduction to SQL
  • SQL – Part 1
  • SQL – Part 2
  • Parts of SQL Statement
  • Select Statement
Module 6: Filtering and Sorting Data
  • Build ERD – Part 1
  • Build ERD – Part 2
  • Build ERD – Part 3
Module 7: Functions
  • Functions
  • More Functions
  • Group Functions
  • Custom Functions
Module 8: SET Operators and Subqueries
  • SET Operations
  • Subqueries
Module 9: Regular Expressions and SQL Loader
  • Regular Expressions
  • SQL Loader
Access 2010 Basic
  • Access Basic Flashcards
  • Introduction
  • Databases And The Access Interface
  • Spreadsheets And Tables
  • Entering Data In A Table
  • Relationships Between Tables
  • Editing A Form
  • Queries
  • Across The Tables
  • Creating Forms
  • Conclusion
Access 2010 Intermediate
  • Access Intermediate Flashcards
  • Introduction
  • Primary Key
  • Multiple Table Query
  • Creating Forms
  • Validation Within Forms
  • Adding Related Fields
  • Forms Created With Design View
  • Find Functionality
  • Creating Report
  • Conclusion
Access 2010 Advanced
  • Access Advanced Flashcards
  • Introduction
  • Customizing Access With Back Stage Options
  • Mailing Labels
  • Macros-Part1
  • Macros-Part2
  • Queries-Part1
  • Queries-Part2
  • Joining In Sequel
  • Navigation
  • Adding Chart With Specific Data
  • Action Query
  • Security
  • Conclusion
Module 1: Sage 50 2013
  • Course Overview-Part1
  • Course Overview-Part2
  • Course Overview-Part3
  • Course Overview-Part4
  • New Features-Part1
  • New Features-Part2
  • New Features-Part3
  • Quick Tab Menu Overview
  • Business Status-Part1
  • Business Status-Part2
  • Customer And Sales
  • Vendors And Purchases
  • Inventory And Services
  • Employees And Services
  • Banking
  • System-Part 1
  • System-Part2
  • Quick Tab Menu Review
  • Sage 50 Menu Overview-Part1
  • Sage 50 Menu Overview-Part 2
  • Sage 50 Menu Overview-Part3
  • Sage 50 Menu Overview-Part 4
  • Sage 50 Menu Overview-Part5
  • Sage 50 Menu Overview-Part6
  • Sage 50 Menu Overview-Part7
Module 2: Sage 50 Basics
  • Sage 50 Available Products
  • Accounts Payable Features
  • Vendors And Purchases-Part 1
  • Vendors And Purchases-Part 2
  • Vendors And Purchases-Part 3
  • Vendors And Purchases-Part 4
  • Vendors And Purchases-Part 5
  • Vendors And Purchases-Part 6
  • Accounts Payable Review
  • Accounts Receivable Review
  • Customer And Sales Menu
  • Customers
  • Jobs
  • Sales Taxes
  • Quotes And Proposals
  • Sales Orders
  • Invoices
  • Finance Charges Basics
  • Receive Money
  • Bank Accounts
  • Printing Statements
  • Credits And Returns
  • Accounts Receivable Report
  • Basics Review
Module 3: Inventory
  • Inventory And Services Overview
  • Inventory Items-Part 1
  • Inventory Items-Part 2
  • Company Services
  • Assemblies and Prices
  • Purchase Orders
  • Receiving Inventory Shipping And Tracking
  • Inventory Count And Adjustments
  • Inventory Reports
  • Inventory Review
Module 4: Employee
  • Employees And Payroll Overview
  • Employees And Users-Part 1
  • Employees And Users-Part 2
  • 1099's
  • Payroll Setup
  • Time And Expense Tickets
  • Direct Deposit And Printing Payroll Checks
  • Forms And Void Checks
  • Employees Module Review
Module 5: Banking
  • Banking Features Overview
  • Write Checks
  • Account Register
  • Analysis Tools-Part 1
  • Analysis Tools-Part 2
  • Chart Of Accounts
  • Receive Money And Bank Deposits-Part 1
  • Receive Money And Bank Deposits-Part 2
  • Enter Bills Pay Bills And Electronic Bill Pay
  • Reconcile Accounts
  • General Journal Entries
  • Void Checks And Reports
  • Banking Module Review
Module 6: Maintenance
  • Automatic Backup
  • BackUp Data-Part 1
  • BackUp Data-Part 2
  • Automatic Backup
  • Restore Data
  • Data Maintenance
  • System Checks
  • Company Maintenance
  • Data Integrity
  • Maintenance Review
Module 7: File Handling
  • Attaching Documents
  • Attaching And Managing Documents
  • File Handling Review
Module 8: Manager
  • Analysis Managers
  • Cash Flow Manager-Part 1
  • Cash Flow Manager-Part 2
  • Cash Flow Manager-Part 3
  • Collection Manager
  • Payment Manager
  • Financial Manager
  • Manager Review
Module 9: Jobs
  • MaintainingJobs
  • CreatingJobs-Part 1
  • Creating Jobs-Part 2
  • Managing Jobs
  • Jobs Review
Module 10: Budgets
  • Maintain Budgets
  • Creating And Managing Budgets-Part 1
  • Creating And Managing Budgets-Part 2
  • Budgets Module Review
Module 11: Charts of Accounts
  • Maintain Chart Of Accounts
  • Creating Accounts
  • Accounts List-Part 1
  • Accounts List-Part 2
  • Chart Of Accounts Review
Module 12: Accounts Management
  • Maintain Customers And Prospects
  • Adding Customers And Prospects
  • Accounts Aging
  • Payment Methods
  • Managing A Customer Account
  • Accounts Management Review
Module 13: Customer Setup
  • Customer Setup Guide
  • Customer Setup-Part 1
  • Customer Setup-Part 2
  • Customer Setup-Part 3
  • Customer Beginning Balance
  • Customer Account Defaults
  • Sales Tax
  • Statement And Invoice Defaults
  • Customer Setup Review
Module 14: Jobs Setup
  • Jobs Setup Guide
  • Jobs Setup
  • Jobs Change Order
  • Job Ledger
  • Job Profitability Report-Part 1
  • Job Profitability Report-Part 2
  • Job Defaults
  • Jobs Beginning Balances
  • Jobs Setup Review
Module 15: Vendor Setup
  • Vendors Setup Guide
  • Vendor Setup-Part 1
  • Vendor Setup-Part 2
  • Vendor Setup-Part 3
  • Vendor Setup-Part 4
  • Vendor Beginning Balances
  • Vendor Default
  • Vendor Setup Review
Module 16: Inventory Setup
  • Inventory And Services Items Setup
  • Adding And Managing Inventory And Service Items-Part 1
  • Adding And Managing Inventory And Service Items-Part 2
  • Adding And Managing Inventory And Service Items-Part 3
  • Adding And Managing Inventory And Service Items-Part 4
  • Quantities On Hand
  • Inventory And Service Items Default Setup
  • Inventory Setup Review
Module 17: Employee Setup
  • Employees Setup Guide
  • Employee Payroll Settings
  • Payroll Options Settings
  • Company Information Setting
  • Benefits Settings-Part 1
  • Benefits Settings-Part 2
  • Payroll Taxes And Place Order Settings
  • Employee Setup
  • Salary History Setup
  • Employees Default Setup
  • Employee Setup Review
Module 18: Security Setup
  • Security Setup Guide
  • Setup Security
  • Set Up Users
  • User Security Setup
  • User List Rights And Permissions
  • Setup Guide Next Steps
  • Security Review
Module 19: ACTI Link
  • Sage 50 ACT
  • Sage ACT Link
  • ACT Accounting Link Setup
  • Creating And Editing Contact Links-Part 1
  • Creating And Editing Contact Links-Part 2
  • Creating And Editing Contact Links-Part 3
  • Contact Link Updates Options
  • ACT! Link Review
Module 20: Task Overview
  • Tasks Menu
  • Quotes Sales Orders And Proposals-Part 1
  • Quotes Sales Orders And Proposals-Part 2
  • Quotes Sales Orders And Proposals-Part 3
  • Sales Invoicing And Time Expenses
  • Shipments
  • Receipts
  • Finance Charges
  • Select For Deposit
  • Credit Memos
  • Select For Purchase Orders-Part 1
  • Select For Purchase Orders-Part 2
  • Bills And Payments-Part 1
  • Bills And Payments-Part 2
  • Account Register
  • Time And Expense
  • Select For Payroll Entry
  • General Journal Entry
  • Asemblies
  • Account Reconciliation And Void Checks
  • Write Letters And Action Items
  • System Tasks
  • Tasks Overview Review
Module 21: Forms, Reports, and Recap
  • Reports And Forms
  • Form Types And Sample Forms-Part 1
  • Form Types And Sample Forms-Part 2
  • Form Types And Sample Forms-Part 3
  • Reports-Part 1
  • Reports-Part 2
  • Reports-Part 3
  • Reports-Part 4
  • Reports-Part 5
  • Services
  • Program Review
Module 1
  • Wellness Intro-Part 1
  • Wellness Intro-Part 2
  • Wellness Intro-Part 3
Module 2
  • Role Of Carbohydrates-Part 1
  • Role Of Carbohydrates-Part 2
Module 3
  • Role Of Fiber-Part 1
  • Role Of Fiber-Part 2
Module 4
  • Glycemic Index-Part 1
  • Glycemic Index-Part 2
Module 5
  • Impact Of Carbs
Module 6
  • Gluten
Module 7
  • Role Of Fat-Part 1
  • Role Of Fat-Part 2
  • How And Why We Gain Fat
  • Role Of Protein
Module 8
  • Digestion
Module 9
  • Calories-Part 1
  • Calories-Part 2
Module 10
  • Organic Vs Inorganic
Module 11
  • Roles Of Vitamins And Minerals-Part 1
  • Roles Of Vitamins And Minerals-Part 2
  • Roles Of Vitamins And Minerals-Part 3
Module 12
  • Role of Water
Module 13
  • Supplements-Part 1
  • Supplements-Part 2
  • Supplements-Part 3
  • Supplements-Part 4
  • Supplements-Part 5
  • Supplements-Part 6
  • Supplements-Part 7
  • Supplements-Part 8
Module 14
  • Artificial Sweeteners-Part 1
  • Artificial Sweeteners-Part 2
  • Artificial Sweeteners-Part 3
  • Artificial Sweeteners-Part 4
  • Artificial Sweeteners-Part 5
Module 15
  • The Effects Of Caffeine
  • Alcohol Does It Make You Fat
Module 16
  • Sleep
  • Stress
Module 17
  • Fad Diets
  • Raw Food Diet
  • Cabbage Soup Diet
  • Blood Group Diet
  • Types Of Vegetarians
  • Fad Diets And Genetics
Module 18
  • Weight Loss Tips
  • Setting Goals That Work For You
  • Cancer
  • Outro
Module 1: Intro and Setup
  • Intro To Quickbooks
  • Setup Quickbooks
Module 2: Tools
  • Tools-Part 1
  • Tools-Part 2
  • Tools-Part 3
Module 3: Preferences
  • Preferences
  • Email Preferences
Module 4: Security & Users
  • Security And Users
Module 5: Estimates
  • Estimates
Module 6: Sales Orders
  • Sales And Orders
Module 7: Receiving Money
  • Account Receivable
  • Batch Invoicing
  • Customer Deposits
Module 8: Bounced Checks
  • Bounced Checks
Module 9: Specific Tracking
  • Vehicle Mileage
  • Class Tracking Transactions
Module 10: Receiving and Depositing
  • Receiving Payments
  • Making Deposits
Module 11: Credit Cards and Bank Accounts
  • Credit Cards
  • Bank Accounts
Module 12: Payroll
  • Payroll Preferences
  • Employee Setup
  • Processing Payroll
  • Payroll Tax Forms
  • Job Costing With Payroll
  • Payroll Setup Advance
  • Workers Compensation
Module 13: Transactions
  • Special Transactions
  • Memorized Transactions
Module 14: Accounts and Reports
  • Other Account Types
  • Quickbooks Reporting
  • Advance Reporting
  • Budgets And Forecast
Module 15: Integrating with Word
  • Writing Letters In Microsoft Word
Module 16: Data Types
  • Converting Importing And Exporting
  • Quickooks Backup Data Integrity
  • Multi-Currencies
Module 17: Conclusion
  • Advance Features
  • Update Or Upgrade
  • Summary Of Quickbooks
Module 1.0 Introduction
  • Social Media Introduction
  • Creating A Google Account
  • Setting Up Your Twitter Account
  • Getting Your Twitter House In Order
  • Why Facebook For Your Business
  • Using Facebook As A Business
  • Setting Up Your Business Page
  • Setting Your Cover Photo
  • Tying It All Together
  • Tip-Adding Admins In Facebook
Module 2.0 Adjusting Your Facebook Settings
  • Adjusting Your Settings-Part1
  • Adjusting Your Settings-Part2
  • Adjusting Your Settings-Part3
  • Updating Your Page Info-Part1
  • Updating Your Page Info-Part2
  • Tips For Getting 25 Likes
  • Using Facebook As Your Business Page
Module 3.0 Posting on Facebook
  • What Kind Of Person Would Your Business Be
  • How To Post To Facebook
  • What To Post
  • Sharing Posts
  • Sharing Links
  • Pinning And Highlighting With Posts
  • Tips For GeneratingTraffic
  • Getting Notifications And Staying In Clients News Feed
  • Comment Moderation
  • The Activity Log-Where Do Hidden Posts Go
  • Scheduling Posts
Module 7.0 Twitter
  • Limiting the Number Of Actions
  • Setting Your Twitter Preferences
  • Finish Setting Up Your Profile
  • Twitter Widgets
  • Who To Follow
  • Connect
  • Bringing Followers From Facebook
  • Intro To Hashtags
  • Examples Of Hashtags
  • Monitoring Whats Going On
  • Using Twitter For Social Listening
  • Social Media Tips
  • Hashtags Across Social Media
Module 8.0 Pinterest
  • Overview Of Pinterest
  • How Does Pinterest Relate To Your Business
  • Industry Specific Sites
  • The Uses of Pinterest
  • Conclusion Of Pinterest
Module 9.0 Reddit
  • Introduction To Reddit
  • The Rules Of Reddit
Module 11.0 LinkedIn
  • Introduction To LinkedIn
  • Overview Of The Interface And Settings
  • Open Link Settings
  • LinkedIn Groups
  • Adding And Removing Applications
  • Basic Account Settings
  • Updating Your Public Profile
  • LinkedIn Connections Groups And Pages
  • LinkedIn Channels And Today
  • Advertising On LinkedIn
Module 12.0 Google+ and Youtube
  • Introduction To Google Plus
  • Overview Of The Interface
  • Setting Up A Google Plus Page
  • Linking Your Other Social Networks
  • Linking Your Website To Your Google Plus Page
  • Review Of Your Google Plus Dashboard
  • Notification Settings For Google Plus
  • Photo Settings In Google Plus
  • Google Plus And YouTube
  • YouTube Advanced Settings
  • Interface For Uploaded Video
  • Sharing Videos Across Your Social Network
  • Updating Your About Section
  • Quick Recap Of Everything Covered So Far
Module 14.0 Additional Tools
  • Bitly
  • Woobox-Part1
  • Woobox-Part2
  • Hoot Suite-Part1
  • Hoot Suite-Part2
  • Storify
  • Social Media Rules And Tips
  • Tweet deck-Boolean Search
  • Social Media Conclusion
Module 4.0 Facebook Advertising
  • Intro To Facebook Advertising
  • Setup Advertising Account
  • Types Of Advertising On Facebook
  • Ad Testing
  • Choosing Our Audience-Location
  • Choosing Our Audience-Age And Gender
  • Choosing Our Audience-Precise Interests
  • Choosing Our Audience-Broad Categories
  • Choosing Our Audience-Connections
  • Choosing Our Audience-Advanced Targeting Options
  • Choosing Our Audience-Campaign And Budget
  • Other Types Of Ads-Part1
  • Other Types Of Ads-Part2
  • Ad Campaign Manager-Part1
  • Ad Campaign Manager-Part2
  • Outside URLs
  • Building Ad Text
  • News Feed Format And Creating Your Audience
  • Campaign Pricing And Schedule
  • Ad Campaign Tracker
Module 5.0 Facebook Insights
  • Facebook Insights-Overview Intro
  • Analyzing Page Posts
  • Engaged Users
  • Talking About This
  • Virality
  • Likes
  • Reach
  • Reach And Frequency
  • Page Visits
  • Talking About This
  • Conclusion
Module 6.0 Facebook Analytics
  • 6.0 New Facebook Analytics Overview
  • 6.1 Page Likes
  • 6.2 Post Reach
  • 6.3 Page Visits
  • 6.4 Posts
  • 6.5 People
  • New Facebook Analytics Overview
  • Page Likes
  • Post Reach
  • Page Visits
  • Posts
  • People
Module 10.0 Tumblr
  • Tumblr Introduction
  • Setting Up A Tumblr
  • Dashboard
  • Posting To Tumblr
  • Testing Your Post
  • URL Post
  • Chat Post
  • Audio On Tumblr
  • Video On Tumblr
  • Tumblr Conclusion
Module 13.0 Best Practices
  • Determine Your Goals
  • Create Your Persona Or Voice
  • Decide On Your Platforms
  • Establishing A Social Media Manager
  • Coordinate With Customer Service
  • Create A Predetermined Crisis Management Plan
  • Stick To The Script
  • Building Relationships With The Media
  • Find Your Evangelist
  • Stay Informed-Part1
  • Stay Informed-Part2

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

Ready to start learning? Individual Plans →Team Plans →