[ Course ]
Monthly All-Access IT Training Subscription
3130 Hrs 38 Min16,066 Videos24,585 QuestionsCertificate of CompletionClosed Captions
CompTIA SecAI+ (CY0-001) : Module 1.0 : Basic AI Concepts Related to Cybersecurity
- 0.1 Course Intro
- 1.0 Module Overview
- 1.1 Types of AI
- 1.2 Demo – Generative AI vs Traditional Search
- 1.3 Module Training Techniques
- 1.4 Demo – Examining Machine Learning
- 1.5 Prompt Engineering
- 1.6 Demo – Examining Prompt Engineering Techniques
- 1.7 Data Processing Security in AI
- 1.8 Demo – Examining NLP and Language Models
- 1.9 Data Security in AI
- 1.10 Demo – Examining Fine-Tuning Concepts
- 1.11 Examining Security and the AI Lifecycle
- 1.12 Demo – Examining Data Cleansing with AI
- 1.13 Module Overview
CompTIA SecAI+ (CY0-001) : Module 2.0 : Securing AI Systems
- 2.0 Module Overview
- 2.1 Threat-Modeling AI Systems
- 2.2 Demo – Threat-Modeling AI Systems
- 2.3 Security Controls in AI Systems
- 2.4 Demo – Using Prompt Template for Security Control
- 2.5 Access Control in AI Systems
- 2.6 Data Security Controls in AI Systems
- 2.7 Demo – Data Minimization with Sensitive Information
- 2.8 Monitoring and Auditing for AI Systems
- 2.9 Attack Evidence in AI Systems
- 2.10 Demo – Model Poisoning in AI Systems
- 2.11 Compensating Controls in AI Systems
- 2.12 Demo – Implementing Compensating Controls in AI
- 2.13 – Module Summary
CompTIA SecAI+ (CY0-001) : Module 3.0 : AI Assisted Security
- 3.0 Module Overview
- 3.1 Examining AI-enabled Tools for Security
- 3.2 Demo – AI-Assisted Threat Categorization
- 3.3 AI Attack Vector Enablement
- 3.4 Demo – AI-Assisted Reconnaissance Acceleration
- 3.5 AI Security Automation
- 3.6 Demo – AI-Assisted Incident Report Summarization
- 3.7 Module Summary
CompTIA SecAI+ (CY0-001) : Module 4.0 : AI Governance, Risk, and Compliance
- 4.0 Module Overview
- 4.1 Organizational Governance Structures Supporting AI
- 4.2 Demo – AI Decision Authority Mapping
- 4.3 Examining AI-related risks
- 4.4 Demo – Internal Policy vs. External Law Conflict
- 4.5 Examining the Compliance Impact of AI
- 4.6 Demo – NIST AI RMF Lifecycle Mapping
- 4.7 Module Summary
- 4.8 Course Outro
CySA+ (CS0-004) : Module 1 : Security Operations
- 0.1 Course Intro
- 1.0 Module Overview
- 1.1 Logging Concepts
- 1.2 Demo – Logging in Windows Server
- 1.3 Demo – Logging in Linux
- 1.4 Operating System Concepts
- 1.5 Demo – File Analysis and Pattern Recognition
- 1.6 Infrastructure and System Architecture
- 1.7 Demo – Virtualization and the Cloud
- 1.8 Device Management and Network Architecture
- 1.9 Demo – Mobile Device Management
- 1.10 Identity and Access Management
- 1.11 Data Protection and Encryption
- 1.12 Critical Infrastructure
- 1.13 Examining Host-related Indicators
- 1.14 Examining Network-Related Indicators
- 1.15 Application-related Indicators
- 1.16 Cloud-related Indicators
- 1.17 Demo – Email Header Analysis
- 1.18 Demo – Using and Analyzing Cloud Logs
- 1.19 Identity-Related Indicators
- 1.20 Tools to Determine Malicious Activity
- 1.21 Demo – Examining Intrustion Detection using Snort
- 1.22 Demo – Decoding with CyberChef
- 1.23 Programming Languages and Tools
- 1.24 Demo – Examining Intrusion Detection using Suricata
- 1.25 Threat Actors and TTPs
- 1.26 Demo – Examining MITRE ATT&CK
- 1.27 Threat Intelligence Collection Methods and Sources
- 1.28 Demo – Examining Threat Intelligence with MISP
- 1.29 Indicators of Compromise
- 1.30 Demo – Domain and IP Reputation
- 1.31 Threat Modeling and Mapping
- 1.32 Demo – Examining a Threat Modeling Report
- 1.33 Process Improvement in Security Operations
- 1.34 AI in Security Operations
- 1.35 Module Summary
CySA+ (CS0-004) : Module 2 : Vulnerability Management
- 2.0 Module Overview
- 2.1 Planning Vulnerability Scanning
- 2.2 Vulnerability Scanning Types
- 2.3 Demo – Passive Scanning with tcpdump and Wireshark
- 2.4 Demo – Credentialed Scanning using Nessus
- 2.5 Vulnerability Scanning Tools
- 2.6 Demo – Metasploit Framework and Metasploitable
- 2.7 Demo – Active Scanning with nmap and masscan
- 2.8 Demo – Gathering OSINT using Maltego
- 2.9 Control Types
- 2.10 Risk Mitigation Strategies
- 2.11 Vulnerability Prioritization
- 2.12 Demo – Examining Vulnerability Prioritization
- 2.13 Application Security
- 2.14 Demo – Web Application Testing with Burp Suite
- 2.15 Vulnerability Mitigation Strategies
- 2.16 Module Summary
CySA+ (CS0-004) : Module 3 : Incident Response and Management
- 3.0 Module Overview
- 3.1 Attack Methodology Frameworks
- 3.2 Demo – Examining the Cyber Kill Chain Methodology
- 3.3 Incident Response Processes
- 3.4 Incident Response Techniques
- 3.5 Demo – Examining Chain of Custody Documentation
- 3.6 Module Summary
CySA+ (CS0-004) : Module 4 : Reporting and Communication
- 4.0 Module Overview
- 4.1 Vulnerability Reporting and Communication
- 4.2 Inhibitors to Remediation
- 4.3 Incident Response Communication Plan
- 4.4 Metrics and KPIs
- 4.5 Examining Vulnerability Trends with NVD
- 4.6 Module Summary
CySA+ (CS0-004) : Module 5 : The Exam
- 5.1 Identifying Exam Requirements
- 5.2 Taking the Exam
Module 1 – Introduction to the EU AI Act
- 1.1 Background and Legislative Context
- 1.2 Scope and Objectives of the EU AI Act
Module 2 – Risk-Based Classification of AI Systems
- 2.1 Four Risk Categories Explained
- 2.2 Real-World Examples of Each Risk Category
Module 3 – Obligations for High-Risk AI Systems
- 3.1 High-Risk AI Identification
- 3.2 Conformity Assessment Requirements
- 3.3 Post-Market Monitoring and Incident Reporting
Module 4 – Transparency and Information Requirements
- 4.1 Obligations for Limited-Risk AI Systems
- 4.2 User Information and Instructions
Module 5 – Governance and Enforcement
- 5.1 Roles and Responsibilities
- 5.2 Market Surveillance and Regulatory Authorities
- 5.3 Penalties and Sanctions
Module 6 – Interaction with Other Laws and Standards
- 6.1 Interaction with Other Laws and Standards
- 6.2 International Context
- 6.3 Voluntary Codes of Conduct and Standards
Module 7 – Strategies for Compliance and Future-Proofing AI Systems
- 7.1 Building a Compliance Framework
- 7.2 Documentation and Audit Readiness
- 7.3 Risk Management Lifecycle
- 7.4 Preparing for the Future
Module 1 : Server Hardware Installation and Management
- 1.0 Introduction to Server+
- 1.1 Server Rooms and Data Centers
- 1.2 Server Room Racking
- 1.2.1 ACTIVITY – Installing a Tool-less Rail in a Rack
- 1.3a Rack Power and Safety Part-1
- 1.3b Rack Power and Safety Part-2
- 1.4a Network Cabling and Components Part-1
- 1.4b Network Cabling and Components Part-2
- 1.4.1 ACTIVITY – Connecting Dissimilar Switchports in a Server Rack
- 1.4.2 ACTIVITY – Testing a Fiber Optic Cable
- 1.5 Server Components
- 1.5.1 ACTIVITY – Installing a PCIe Expansion Card
- 1.6a Data Storage Part-1
- 1.6b Data Storage Part-2
- 1.6.1 ACTIVITY – Creating a Software RAID on Windows Server
- 1.7 Innovations in Server Hardware
- 1.8a Server Hardware Maintenance Part-1
- 1.8b Server Hardware Maintenance Part-2
- 1.8.1 ACTIVITY – Servicing a Server in the Rack
- 1.9 ACTIVITY – Hardware Tips n Tricks
Module 2 : Server Administration
- 2.1 Install Server Operating Systems
- 2.1.1 ACTIVITY – Installing the Operating System
- 2.2a Server Network Infrastructure Services Part-1
- 2.2b Server Network Infrastructure Services Part-2
- 2.2.1 ACTIVITY – IP Subnetting for the Sysadmin
- 2.2.2 ACTIVITY – Protecting a Server with VLANs
- 2.2.3 ACTIVITY – Enabling VLAN Routing
- 2.2.4 ACTIVITY – Protecting a Server with Firewall Rules
- 2.3a Server Functions and Features Part-1
- 2.3b Server Functions and Features Part-2
- 2.3.1 ACTIVITY – Monitoring Linux
- 2.3.2 ACTIVITY – Installing Server Roles
- 2.4 Server High Availability
- 2.5 Virtualization
- 2.6 Scripting Basics for Server Administration
- 2.7 Asset Management and Documentation
- 2.8 Licensing Concepts
- 2.9 ACTIVITY – Server Administration Tips & Tricks Part-1
- 2.10 ACTIVITY – Server Administration Tips & Tricks Part-2
- 2.11 ACTIVITY – Server Administration Tips & Tricks Part-3
- 2.12 ACTIVITY – Server Administration Tips & Tricks Part-4
- 2.13 BONUS ACTIVITY – Linux Disk, Hardware and Networking Commands
Module 3 : Security and Disaster Recovery
- 3.1 Data Security Mechanisms
- 3.1.1 ACTIVITY – Exploring Symmetric Encryption
- 3.1.2 ACTIVITY – Examining Asymmetric Encryption
- 3.1.3 ACTIVITY – Hashing
- 3.2 Data Security Risks and Mitigation
- 3.3 Backups and Restores
- 3.4 Server Hardening Methods
- 3.4.1 Scanning Servers for Open Ports
- 3.5 IAM for Server Administration
- 3.5.1 ACTIVITY – Implementing NTFS Permissions
- 3.5.2 ACTIVITY – Configuring Multifactor Authentication
- 3.6 Server Decommissioning
- 3.7 Physical Security Concepts
- 3.7.1 ACTIVITY – Testing User Social Engineering Awareness
- 3.8a Disaster Recovery Part-1
- 3.8b Disaster Recovery Part-2
- 3.9 ACTIVITY – Security & DR Tips n Tricks Part-1
- 3.10 ACTIVITY – Security & DR Tips n Tricks Part-2
Module 4 : Troubleshooting
- 4.0 Server Troubleshooting
- 4.1 ACTIVITY – Troubleshooting Connectivity to the Server
- 4.2 ACTIVITY – Troubleshooting Tips n Tricks Part-1
- 4.3 ACTIVITY – Troubleshooting Tips n Tricks Part-2
- 4.4 Course Closeout
Module 1 : Preparing Infrastructure for Devices
- 0.0 Course Introduction
- 1.0 Module Overview
- 1.1 Choosing a Device Join Type
- 1.2 Joining Devices to Microsoft Entra ID
- 1.3 Registering Devices to Microsoft Entra ID
- 1.4 Groups for Devices in Microsoft Entra ID
- 1.5 Configuring Enrollment Settings
- 1.6 Configuring Automatic Enrollment for Windows
- 1.7 Configuring Bulk Enrollment for iOS and Android
- 1.8 Configuring Enrollment Profiles for Android Devices
- 1.9 Managing Roles in Intune
- 1.10 Implementing Compliance Policies using Intune
- 1.11 Implementing Conditional Access Policies
- 1.12 Configuring Windows Hello for Business
- 1.13 Implementing and Managing LAPS for Microsoft Entra ID
- 1.14 Managing Windows Local Groups using Intune
Module 2 : Managing and Maintaining Devices
- 2.0 Module Overview
- 2.1 Choosing Between Windows Autopilot and Provisioning Packages
- 2.2 Choosing a Windows Autopilot Deployment Mode
- 2.3 Applying a Device Name Templates
- 2.3.1 Demo – Device Name Templates
- 2.4 Implementing Deployments by using Windows Autopilot
- 2.5 Creating an Enrollment Status Page (ESP)
- 2.5.1 Demo – Enrollment Status Page
- 2.6 Planning and Implementing Provisioning Packages
- 2.7 Planning and Implementing Device Upgrades for Windows 11
- 2.8 Implementing a Windows 365 Cloud PC Deployment
- 2.9 Creating Device Configuration Profiles for Windows Devices
- 2.9.1 Demo – Device Configuration Profile for Windows
- 2.10 Creating Device Configuration Profiles for Android Devices
- 2.10.1 Demo – Device Configuration Profile for Android
- 2.11 Creating Device Configuration Profiles for iOS devices
- 2.11.1 Demo – Device Configuration Profile for iOS and iPadOS
- 2.12 Creating Device Configuration Profiles for Mac OS devices
- 2.12.1 Demo – Device Configuration Profiles for macOS
- 2.13 Creating Device Configuration Profiles for Enterprise Multi-session Devices
- 2.13.1 Demo – Device Configuration for Multisesson Devices
- 2.14 Targeting a Profile using Filters
- 2.14.1 Demo – Targeting Profiles using Filters
- 2.15 Configuring Endpoint Privilege Management
- 2.15.1 Demo – Endpoint Privilege Management
- 2.16 Managing Applications by using the Enterprise App Catalog
- 2.16.1 Demo – Enterprise App Catalog
- 2.17 Implementing Microsoft Intune Advanced Analytics
- 2.18 Configuring Microsoft Intune Remote Help
- 2.19 Identifying Use Cases for Cloud PKI
- 2.20 Examining Microsoft Tunnel for MAM
- 2.21 Performing Remote Actions in Microsoft Intune
- 2.22 Updating Windows Defender Security Intelligence
- 2.23 Rotating BitLocker Recovery Keys
- 2.24 Running a Device Query by Using KQL
Module 3 : Managing applications
- 3.0 Module Overview
- 3.1 Preparing Applications for Deployment by using Intune
- 3.2 Deploying Apps by using Intune
- 3.2.1 Demo – Deploying Apps in Intune
- 3.3 Deploying Microsoft 365 Apps by using Intune
- 3.3.1 Demo – Deploying Microsoft 365 Apps with Intune
- 3.4 Configuring Policies for Office Apps
- 3.4.1 Demo – Configuring Policies for Microsoft 365 Apps
- 3.5 Deploying MS365 Apps using ODT and OCT
- 3.5.1 – Demo – Using the ODT and OCT
- 3.6 Managing MS365 Apps using the Microsoft 365 Apps Admin Center
- 3.6.1 Demo – Examining the Microsoft 365 Apps Admin Center
- 3.7 Deploying Apps from Platform-specific App Stores using Intune
- 3.7.1 Demo – Deploying to Platform-specific App Stores
- 3.8 Planning and Implementing App Protection Policies
- 3.8.1 Demo – Implementing App Protection Policies
- 3.9 Implementing Conditional Access Policies for App Protection Policies
- 3.9.1 Demo – Conditional Access Policies for App Protection Policies
- 3.10 Planning and Implementing App Configuration Policies
- 3.10.1 Demo – Deploying App Configuration Policies
Module 4 : Protecting devices
- 4.0 Module Overview
- 4.1 Creating Antivirus Policies
- 4.1.1 Demo – Creating Endpoint AV Policies
- 4.2 Creating Disk Encryption Policies
- 4.2.1 Demo – Creating Disk Encryption Policies
- 4.3 Creating Firewall Policies
- 4.3.1 Demo – Creating Endpoint Firewall Policies
- 4.4 Configuring Attack Surface Reduction Policies
- 4.4.1 Demo – Creating Attack Surface Reduction Policies
- 4.5 Planning and Implementing Security Baselines
- 4.5.1 Demo – Creating Security Baselines
- 4.6 Integrating Intune with Microsoft Defender for Endpoint
- 4.6.1 Demo – Integrating Intune with MDE
- 4.7 Onboarding Devices into Microsoft Defender for Endpoint
- 4.7.1 Demo – Onboarding Devices into MDE
- 4.8 Planning for Device Updates
- 4.9 Creating and Manage Update Rings Using Intune
- 4.9.1 Demo – Creating Update Ring Policies
- 4.10 Creating and Manage Update Policies by using Intune
- 4.10.1 Demo – Creating Update Policies in Intune
- 4.11 Managing Android Updates using Configuration Profiles
- 4.12 Configuring Windows Client Delivery Optimization using Intune
- 4.13 Course Outro
Module 1: Introduction to Windows 11
- 1.1 Module 1 Introduction
- 1.2 Major Differences
- 1.3 System Requirements
- 1.4 How to check Compatibility
- 1.5 How to upgrade to Windows 11
- 1.6 Module 1 Conclusion
Module 2: Windows 11 Interface Basics
- 2.1 Windows 11 Interface Basics
- 2.2 Start Menu & Taskbar
- 2.3 Navigating The Desktop Environment
- 2.4 Using Windows Snap Layouts & Snap Groups
- 2.5 Notifications And Quick Settings
- 2.6 Module 2 Review
Module 3: File Management and Personalization
- 3.1 File Management and Personalization
- 3.2 Navigating File Explorer
- 3.3 One Drive
- 3.4 Search Functionality
- 3.5 Module 3 Review
Module 4: Personalizing Windows 11
- 4.1 Module 4 Introduction
- 4.2 Themes
- 4.3 Colors And Transparency
- 4.4 Dark Mode & Light Mode
- 4.5 Background Lock Screen Customization
- 4.6 Module 4 Review
Module 5: Installing and Managing Apps
- 5.1 Module 5 Introduction
- 5.2 Installing Applications
- 5.3 Managing App Permissions
- 5.4 Uninstalling Apps
- 5.5 Default Applications
- 5.6 Module 5 Review
Module 6: Productivity Tools
- 6.1 Module 6 Introduction
- 6.2 Office Applications
- 6.3 Configuring Microsoft Teams
- 6.4 Focus Assist
- 6.5 Virtual Desktops
- 6.6 Module 6 Review
Module 7: System Configuration
- 7.1 Module 7 Introduction
- 7.2 Settings Vs Control Panel
- 7.3 Power Management
- 7.4 Multiple Monitors
- 7.5 Audio & Notifications
- 7.6 Module 7 Review
Module 8: Performance Optimization
- 8.1 Module 8 Introduction
- 8.2 Task Manager
- 8.3 Startup Apps
- 8.4 Storage Sense
- 8.5 Windows Update Management
- 8.6 Module 8 Review
Module 9: Windows 11 Security Features
- 9.1 Module 9 Introduction
- 9.2 Windows Security
- 9.3 Virus and Threat Protection
- 9.4 Account Protection
- 9.5 Firewall and Network Protection
- 9.6 Privacy Settings
- 9.7 Module 9 Review
Module 10: Networking and Connectivity
- 10.1 Module 10 Introduction
- 10.2 Wifi & Ethernet Setup
- 10.3 Bluetooth and Management
- 10.4 Network Troubleshooting
- 10.5 Remote Desktop
- 10.6 Module 10 Review
Module 11: Advanced Windows 11 Features
- 11.1 Module 11 Introduction
- 11.2 Windows Sub System For Linux
- 11.3 Windows Terminal
- 11.4 Voice Typing
- 11.5 Accesibility Features
Module 12: Troubleshooting and Support
- 12.1 Module 12 Introduction
- 12.2 Startup Repair Options
- 12.3 Safe Mode & Recovery
- 12.4 System Restore & Reset
- 12.5 Windows Logs & Diagnostics
- 12.6 Systematic Troubleshooting and Conclusion
Module 13: Introducing Microsoft Copilot
- 13.1 – Introduction
- 13.2 What is Windows 11 Copilot
- 13.3 Accessing and Setting Up Copilot
- 13.4 Basic Copilot Usage and Interactions
- 13.5 Advanced copilot Features and Use Cases
- 13.6 Privacy, Security and Best Practices
- 13.7 Conclusion
Domain 1.0 – Cloud Architecture
- 0.1 – CompTIA Cloud+ (CV0-004) – Course Intro
- 1.0 – Module Overview
- 1.1 – Cloud Service Models
- 1.2 – Shared Responsibility Model
- 1.3 – Resource Availability
- 1.4 – Disaster Recovery (DR)
- 1.5 – Public and Private Connections
- 1.6 – Network Functions, Components and Services
- 1.7 – Cloud Storage Types
- 1.8 – Cloud Native Design Concepts
- 1.9 – Containerization Concepts
- 1.10 – Virtualization Concepts
- 1.11 – Cloud Cost Conisderations
- 1.12 – Database Concepts
- 1.13 – Workload Optimization
- 1.14 – Evolving Technologies
- Demo – Examining Cloud Cost
- Demo – Examining IaaS
- Demo – Examining Resource Availability
- Demo – Examining SaaS
Domain 2.0 – Deployment
- 2.0 – Module Overview
- 2.1 – Cloud Deployment Models
- 2.2 – Deployment Strategies
- 2.3 – Cloud Migrations
- 2.4 – Application Migration Strategies
- 2.5 – Using Code to Deploy and Configure Cloud Resources
- 2.6 – Scripting Logic
- 2.7 – Provisioning Cloud Resources
Domain 3.0 – Operations
- 3.0 – Module Overview
- 3.1 – Achieving Observability
- 3.2 – Scaling Approaches
- 3.3 – Backup and Recovery Methods
- 3.4 – Backup Types
- 3.5 – Cloud Resource Lifecycle Management
Domain 4.0 – Security
- 4.0 – Module Overview
- 4.1 – Vulnerability Management Concepts
- 4.2 – Compliance and Regulation
- 4.3 – Secure Cloud Access – Management and Resources
- 4.4 – Authentication Models
- 4.5 – Authorization Models
- 4.6 – Security Best Practices
- 4.7 – Cloud Security Controls
- 4.8 – Identifying Common Attacks
- Demo – Examining Management Access using a CLI
- Demo – Examining Compliance and Regulations in the Cloud
Domain 5.0 – DevOps Fundamentals
- 5.0 – Module Overview
- 5.1 – Source Control Concepts
- 5.2 – CI-CD Pipelines
- 5.3 – Systems Integration
- 5.4 – DevOps Tools
Domain 6.0 – Troubleshooting
- 6.0 – Module 6 – Overview
- 6.1 – Troubleshooting Deployment Issues
- 6.2 – Troubleshooting Network Issues
- 6.3 – Troubleshooting Network Service Issues
- 6.4 – Troubleshooting Security Issues
- 6.5 – CompTIA Cloud+ (CV0-004) – Course Outro
Module 1: The Role of AI in Cybersecurity
- 1.1 Understanding AI and ML in the Context of Cybersecurity
- 1.2 AI Use Cases Threat Detection, Automated Response, and Anomaly Detection
- 1.3 Benefits and Risks of Embedding AI into Cybersecurity Products
- 1.4 Emerging Challenges with GenAI Models in Production Environments
Module 2: Evolving Threat Landscape for AI and GenAI Systems
- 2.1 Unique Threat Vectors in GenAI Environments
- 2.2 Attack Surfaces in AI Pipelines and ML Model APIs
- 2.3 Real-World Examples: Exploiting LLMs and Adversarial Input Crafting
- 2.4 Considerations for Securing AI Model Endpoints
Module 3: AI-Powered Security Tools and Platforms
- 3.1 Intrusion Detection and Anomaly Detection Us
- 3.2 Threat Intelligence Platforms Powered by ML
- 3.3 AI in Malware Classification, Phishing Detectioni and Behavioral Analytics
- 3.4 Overview of Tools: Darktrace, Palo Alto Cortex XSIAM, Microsoft Defender XDR
Module 4: Securing the AI Lifecycle – From Training to Deployment
- 4.1 Risks in AI/ML Model Lifecycle Stages
- 4.2 Model Governance and Audit Trails
- 4.3 Version Control, Drift Detection, and Rollback Strategies
- 4.4 Safe Deployment Practices for LLMs and Neural Networks
Module 5: Identity, Access, and Data Protection in AI Systems
- 5.1 Role-Based Access Control and Zero Trust Architecture in AI Pipelines
- 5.2 Protecting Training and Inference Data
- 5.3 Identity Threats: Model Abuse, Impersonation Attacks, and Shadow AI
- 5.4 Integrating IAM into GenAI Workflows
Module 6: Specialized GenAI Cybersecurity Solutions
- 6.1 AI Firewalls: What They Are and How They Defend GenAI Endpoints
- 6.2 AI Security Posture Management (SPM) Tools
- 6.3 Example Solutions_ Protect AI, Robust Intelligence, HiddenLayer
- 6.4 Integrating Security Tools into Modern MLOps Workflows
Module 7: Governance, Privacy, and Compliance in AI Security
- 7.1 Compliance Concerns in AI Systems
- 7.2 Managing Bias, Fairness, and Explainability in AI Systems
- 7.3 Ethics and Responsible AI Development
- 7.4 Regulatory Landscape for GenAI and AI-Driven Decision-Making
Module 8: Looking Ahead – The Future of AI in Cybersecurity
- 8.1 The Rise of Autonomous Security Agents
- 8.2 AI vs. Adversarial AI: Red Teaming and Simulation
- 8.3 Building Secure-by-Design GenAI Applications
- 8.4 The Evolving Role of Security Engineers and AI Developers
Module 9: Operationalizing AI Cybersecurity in the Enterprise
- 9.1 Building an AI Security Roadmap
- 9.2 Creating an AI Security Governance Framework
- 9.3 Embedding AI Security in MLOps Pipelines
- 9.4 Vendor Evaluation and Procurement Guidelines
- 9.5 Building a Cross-Functional AI Security Team
- 9.6 Conducting an Internal AI Threat Modeling Workshop
- 9.7 Communicating AI Security Risks to Executives
- 9.8 Course Recap and What is Next
Module 1: Information Security and Ethical Hacking Overview
- 1.0 Introduction to CEH v13
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 ACTIVITY – Examining MITRE ATT&CK
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Using AI in Ethical Hacking
- 1.11 Information Security and Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 ACTIVITY – Finding Internet-Connected Devices with Shodan
- 2.2.2 ACTIVITY – Performing OSINT with theHarvester
- 2.3 Advanced Google Search
- 2.3.1 ACTIVITY – Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 ACTIVITY – Footprinting with WHOIS
- 2.5 DNS Footprinting
- 2.5.1 ACTIVITY – Enumerating DNS
- 2.6 Website Footprinting
- 2.7 Email Footprinting
- 2.8 Network Footprinting
- 2.8.1 ACTIVITY – Tracing a Network Path with Traceroute
- 2.9 Social Network Footprinting
- 2.10 Enhanced OSINT
- 2.11 Footprinting-and-Reconnaissance-Countermeasures
- 2.12 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.3 Port Scans
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.6 NMAP
- 3.6.1 ACTIVITY – Port Scanning and Fingerprinting with NMAP
- 3.7 Firewall and IDS Evasion
- 3.8 Proxies
- 3.9 AI Enhanced SCANNING Tools
- 3.10 Scanning counter-measures
- 3.11 Scanning Networks Review
Module 4: Enumeration
- 4.1 Enumeration Overview
- 4.2 SMB_NetBIOS_Enumeration
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.5 SNMP Enumeration
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 ACTIVITY – SMTP Enumeration
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 ACTIVITY – Enumerating Website Directories
- 4.11 Local User and Active Directory Enumeration
- 4.12 Other Enumeration Types
- 4.13 Enumeration Using AI
- 4.14 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 ACTIVITY – Vulnerability Scanning with OpenVAS
- 5.2 Vulnerability Assessment
- 5.3 AI Assisted Vulnerability Assessment
- 5.4 Vulnerability Analysis Review
Module 6: System Hacking
- 6.1 System Hacking Concepts
- 6.2 Common Operating System Exploits
- 6.3 Buffer Overflows
- 6.4 System Hacking Tools and Frameworks
- 6.5 Metasploit
- 6.5.1 ACTIVITY – Hacking with Metasploit
- 6.6 Meterpreter
- 6.6.1 ACTIVITY – Having Fun with Meterpreter
- 6.7 Keylogging_and_Spyware-
- 6.8 Netcat
- 6.8.1 ACTIVITY – Using Netcat
- 6.9 Windows Exploitation
- 6.10 Windows Post- Exploitation
- 6.10.1 ACTIVITY – Windows Post Exploitation with Eternal Blue
- 6.10.2 ACTIVITY – Escalating Privilege with Token Passing
- 6.11 Linux Exploitation
- 6.11.1 ACTIVITY – Pwn a Linux Target from Start to Finish
- 6.12 Linux Post-Exploitation
- 6.13 Password Attacks
- 6.13.1 ACTIVITY – Pass-the-Hash
- 6.13.2 ACTIVITY – Password Spraying with Hydra
- 6.14 Linux Password Cracking
- 6.14.1 ACTIVITY – Password Cracking with Hashcat
- 6.14.2 ACTIVITY – Brute Forcing with Medusa
- 6.15 Additional Password Attacks
- 6.16 Attacking Network Services
- 6.16.1 ACTIVITY – Cracking Linux Passwords with John-the-Ripper
- 6.17 Other Methods for Obtaining Passwords
- 6.18 Network Service Attacks
- 6.19 Lateral Movement
- 6.19.1 ACTIVITY – Preparing to Pivot
- 6.19.2 ACTIVITY – Lateral Movement through Pivoting
- 6.20 Persistence
- 6.20.1 ACTIVITY – Creating a Persistent Netcat Back Door
- 6.20.2 ACTIVITY – APT Persistence
- 6.21 Hiding Data
- 6.21.1 ACTIVITY – Hiding Data with Steganography
- 6.22 Covering Tracks
- 6.22.1 ACTIVITY – Cover Tracks with Log Tampering
- 6.23 Side-Channel-Attacks
- 6.24 AI-Powered Vulnerability Exploitation Tools
- 6.25 System Hacking Countermeasures
- 6.26 System Hacking Review
Module 7: Malware Threats
- 7.1 Malware Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.4 Rootkits
- 7.5 Other Malware
- 7.6 Advanced Malware Threats
- 7.7 Malware Makers
- 7.7.1 ACTIVITY – Creating a Malware Dropper and Handler
- 7.8 Malware Deployment
- 7.9 Malware Detection
- 7.10 Malware Analysis
- 7.10.1 ACTIVITY – Analyzing the SolarWinds Orion Hack
- 7.11 AI and Malware
- 7.12 Malware Countermeasures
- 7.13 Malware Threats Review
Module 8: Sniffing and Spoofing
- 8.1 Network Sniffing
- 8.2 Sniffing Tools
- 8.2.1 ACTIVITY – Intercepting Data with Wireshark
- 8.2.2 ACTIVITY – Capturing Files off the Network
- 8.3 MAC and ARP Attacks
- 8.3.1 ACTIVITY – Performing an MITM Attack with Ettercap
- 8.4 Name Resolution Attacks
- 8.4.1 ACTIVITY – Spoofing an Authentication Service with Responder
- 8.5 Other Layer 2 Attacks
- 8.6 Sniffing and Spoofing Countermeasures
- 8.7 Sniffing and Spoofing Review
Module 9: Social Engineering
- 9.1 Social Engineering Concepts
- 9.2 Social Engineering Techniques
- 9.3 Social Engineering Tools
- 9.3.1 ACTIVITY – Phishing for Credentials
- 9.3.2 ACTIVITY – OMG Cable Baiting
- 9.4 Social Media, Identity Theft, Insider Threats
- 9.5 Social Engineering and AI
- 9.6 Social Engineering Countermeasures
- 9.7 Social Engineering Review
Module 10: Denial-of-Service
- 10.1 DoS-DDoS Concepts
- 10.2 Volumetric Attacks
- 10.3 Fragmentation Attacks
- 10.4 State Exhaustion Attacks
- 10.5 Application Layer Attacks
- 10.5.1 ACTIVITY – Conducting a Slowloris DDoS Attack
- 10.6 Other Attacks
- 10.7 DoS Tools
- 10.7.1 ACTIVITY – Performing a HOIC DDoS Attack
- 10.8 DoS Countermeasures
- 10.9 DoS Review
Module 11: Session Hijacking
- 11.1 Session Hijacking
- 11.2 Compromising a Session Token
- 11.3 XSS
- 11.3.1 ACTIVITY – Web Session Hijacking with XSS
- 11.4 CSRF
- 11.5 Other Web Hijacking Attacks
- 11.6 Network-Level Session Hijacking
- 11.7 Session Hijacking Tools
- 11.8 Session Hijacking Countermeasures
- 11.9 Session Hijacking Review
Module12: Attack Detection and Prevention
- 12.1 Types of IDS
- 12.2 Snort
- 12.3 Logging and Monitoring
- 12.4 IDS Considerations
- 12.5 IDS Evasion
- 12.6 Firewalls
- 12.7 Packet Filtering Rules
- 12.8 Firewall Deployments
- 12.9 Split DNS
- 12.10 Firewall Product Types
- 12.11 Firewall Evasion
- 12.11.1 ACTIVITY – Busting the DOM for WAF Evasion
- 12.12 NAC and Endpoint Security
- 12.13 NAC and EDR Evasion
- 12.14 Honeypots
- 12.15 Evasion Countermeasures
- 12.16 Attack Detection and Prevention Review
Module 13: Hacking Web Servers
- 13.1 Web Server Operations
- 13.2 Hacking Web Servers
- 13.3 Common Web server Attacks
- 13.4 Webserver Attack Tools
- 13.5 AI and Webserver Attacks
- 13.6 Hacking Web Servers Countermeasures
- 13.7 Hacking Web Servers Review
Module 14: Hacking Web Applications
- 14.1 Web Application Concepts
- 14.2 Attacking Web Apps
- 14.3 A01 Broken Access Control
- 14.4 A02 Cryptographic Failures
- 14.5 A03 Injection
- 14.5.1 ACTIVITY – Command Injection
- 14.6 A04 Insecure Design
- 14.7 A05 Security Misconfiguration
- 14.8 A06 Vulnerable and Outdated Components
- 14.9 A07 Identification and Authentication Failures
- 14.10 A08 Software and Data integrity Failures
- 14.11 A09 Security Logging and Monitoring Failures
- 14.12 A10 Server-Side Request Forgery
- 14.13 XSS Attacks
- 14.14 CSRF
- 14.15 Parameter Tampering
- 14.15.1 ACTIVITY – Parameter Tampering with Burp Suite
- 14.16 Clickjacking
- 14.16.1 ACTIVITY – Clickjacking with XSS and iFrame Injection
- 14.17 SQL Injection
- 14.17.1 ACTIVITY – Using SQL Injection to Steal Sensitive Data
- 14.18 Insecure Deserialization Attacks
- 14.19 IDOR
- 14.19.1 ACTIVITY – IDOR Abuse with Burp Suite
- 14.20 Directory Traversal
- 14.20.1 ACTIVITY – Directory Traversal
- 14.21 Session Management Attacks
- 14.22 Response Splitting
- 14.23 Overflow Attacks
- 14.24 XXE Attacks
- 14.25 Web App DoS
- 14.26 Soap Attacks
- 14.27 AJAX Attacks
- 14.28 Web API Hacking
- 14.29 Webhooks and Web Shells
- 14.30 Web App Hacking Tools
- 14.31 AI and Web Application Attacks
- 14.32 Hacking Web Applications Countermeasures
- 14.33 Hacking Web Applications Review
Module 15: SQL Injection
- 15.1 SQL Injection Overview
- 15.2 Basic SQL Injection
- 15.3 Finding Vulnerable Websites
- 15.4 Error-based SQL Injection
- 15.5 Union SQL Injection
- 15.5.1 ACTIVITY – SQLi on a Live Website – Part 1
- 15.5.2 ACTIVITY – SQLi on a Live Website – Part 2
- 15.6 Blind SQL Injection
- 15.7 SQL Injection Tools
- 15.8 Evading Detection
- 15.9 Analyzing SQL Injection
- 15.10 SQL Injection Countermeasures
- 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
- 16.1 Wireless Concepts
- 16.2 Wireless Security Standards
- 16.3 WI-FI Discovery Tools
- 16.4 Common Wi-Fi Attacks
- 16.5 Wi-Fi Password Cracking
- 16.6 WEP Cracking
- 16.7 WPA,WPA2,WPA3 Cracking
- 16.7.1 ACTIVITY – WPA2 KRACK Attack
- 16.8 WPS Cracking
- 16.9 Bluetooth Hacking
- 16.10 Other Wireless Hacking
- 16.11 Wireless Security Tools
- 16.12 Wireless Hacking Countermeasures
- 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
- 17.1 Mobile Platform Overview
- 17.2 Mobile Device Attacks
- 17.3 Android Overview
- 17.4 Rooting Android
- 17.5 Android Exploits
- 17.5.1 ACTIVITY – Pwn a Mobile Device
- 17.6 Android-based Hacking Tools
- 17.7 Reverse Engineering an Android App
- 17.8 Securing Android
- 17.9 iOS Overview
- 17.10 Jailbreaking iOS
- 17.11 IOS Exploits
- 17.12 iOS-based Hacking Tools
- 17.13 Reverse Engineering an iOS App
- 17.14 Securing iOS
- 17.15 Mobile Device Management
- 17.16 Hacking Mobile Platforms Countermeasures
- 17.17 Hacking Mobile Platforms Review
Module 18: IoT Hacking & OT Hacking
- 18.1 IoT Overview
- 18.2 IoT Infrastructure
- 18.3 IoT Vulnerabilities and Threats
- 18.4 IoT Hacking Methodology and Tools
- 18.4.1 ACTIVITY – Card Cloning with Flipper Zero
- 18.5 IoT Hacking Countermeasures
- 18.6 OT Concepts
- 18.7 IT-OT Convergence
- 18.8 OT Components
- 18.9 OT Vulnerabilities
- 18.10 OT Attack Methodology and Tools
- 18.11 OT Hacking Countermeasures
- 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
- 19.1 Cloud Computing Concepts
- 19.2 Cloud Types
- 19.3 Cloud Benefits and Considerations
- 19.4 Cloud Risks and Vulnerabilities
- 19.5 AWS Hacking
- 19.5.1 ACTIVITY – AWS S3 Bucket Hacking
- 19.6 Azure Cloud Hacking
- 19.7 Google Cloud Hacking
- 19.8 Container Hacking
- 19.9 Cloud Threat Countermeasures
- 19.10 Cloud Computing Review
Module 20: Cryptography
- 20.1 Cryptography Concepts
- 20.2 Symmetric Encryption
- 20.2.1 ACTIVITY – Symmetric Encryption
- 20.3 Asymmetric Encryption
- 20.3.1 ACTIVITY – Asymmetric Encryption
- 20.4 Public Key Exchange
- 20.5 PKI
- 20.5.1 ACTIVITY – Generating and Using an Asymmetric Key Pair
- 20.6 Digital Signatures
- 20.7 Hashing
- 20.7.1 ACTIVITY – Calculating Hashes
- 20.8 Common Encryption Use Cases
- 20.9 Cryptography Tools
- 20.10 Cryptography Attacks
- 20.11 Cryptography Review
- 20.12 Course Conclusion
Module 21: Challenge Lab
- 21.1-ACTIVITY-Challenge-Lab-Introduction
- 21.2-ACTIVITY-Flag 1 – Port Authority, Please!
- 21.3-ACTIVITY-Flag 2 – Moo-ve Fast and Break Things
- 21.4-ACTIVITY-Flag 3 – Pixels, Packets & Patient X
- 21.5-ACTIVITY-Flag 4 – Hexes and Hashes
- 21.6-ACTIVITY-Flag 5 – APT & the PowerShell Symphony
- 21.7-ACTIVITY-Flag 6 – Script Kiddie's Revenge
- 21.8-ACTIVITY-Flag 7 – Oh Mannie, You Shouldn't Have!
- 21.9-ACTIVITY-Report
Module 1 – Introduction to Six Sigma for White Belts
- 1.1 What is Six Sigma
- 1.2 Why Six Sigma Matters (Especially in IT)
Module 2 – Key Concepts Every White Belt Should Know
- 2.1 Understanding Defects and Variation
- 2.2 Speaking the Languages of Six Sigma
Module 3 – Six Sigma in Daily Work
- 3.1 Your Role in a Six Sigma Team
- 3.2 Thinking Like a Problem-Solver
Module 4 – Simple Tools to Get Started
- 4.1 Visualizing and Understanding Processes
- 4.2 Applying It All to Real Life
Module 5 – Building Practical Skills for Process Awareness
- 5.1 Identifying Opportunities for Improvement
- 5.2 Data Awareness for Non-Data People
- 5.3 Everyday Quality Mindset
Module 6 – Moving Forward with Confidence
- 6.1 Your Next Steps
- 6.2 Six Sigma White Belt Course Closeout
Module 1 – Governance, Risk, & Compliance
- CompTIA Security (CAS-005) Course Intro
- 1.1 Security Program Management and Documentation
- 1.2 Governance Frameworks
- 1.3 Change and Configuration Management
- 1.4 Data Governance in Staging Environments
- 1.5 Risk Assessment and Management
- 1.6 Risk Considerations
- 1.7 Industry Information Security Standards
- 1.8 Security and Reporting Frameworks
- 1.9 Privacy Regulations
- 1.10 Cross-Jurisdictional Compliance Requirements
- 1.11 Threat Actors and Characteristics
- 1.12 Attack Frameworks and Models
- 1.13 Attack Surface Determination
- 1.14 Security Challenges with Artificial Intelligence
Module 2 – Security Architecture
- 2.1 Resilient System Design
- 2.2 Software and Hardware Assurance Methods
- 2.3 Continuous Integration-Continuous Deployment
- 2.4 Secure Architecture Design
- 2.5 Access Control Technologies
- 2.6 Access Control Models
- 2.7 Public Key Infrastructure
- 2.8 Implementing Secure Cloud Capabilities
- 2.9 Cloud Data Security Considerations
- 2.10 Cloud Shared Responsibility Model
- 2.11 Cloud Control Strategies
- 2.12 Integrating Zero Trust in Secure Architecture
Module 3 – Security Engineering
- 3.1 Subject Access Control
- 3.2 Secrets Management
- 3.3 Conditional Access
- 3.4 Identity and Access Management Components
- 3.5 Endpoint and Server Security
- 3.6 Network Infrastructure Security Issues
- 3.7 Network Misconfigurations
- 3.8 IDS and IPS Issues
- 3.9 Domain Name Security
- 3.10 Email Security
- 3.11 Hardware Security Technologies and Techniques
- 3.12 Securing Specialized and Legacy Systems
- 3.13 Using Automation to Implement Security in the Enterprise
- 3.14 Security Content Automation Protocol
- 3.15 Examining Advanced Cryptographic Concepts
- 3.16 Identifying Cryptographic Use Cases
- 3.17 Applying Cryptographic Techniques
Module 4 – Security Operations
- 4.1 Security Information and Event Management
- 4.2 Data Aggregation Analysis
- 4.3 Behavior Baselines and Analytics
- 4.4 Incorporating Data Sources
- 4.5 Alerting, Reporting and Metrics
- 4.6 Attacks and Vulnerabilities
- 4.7 Mitigating Attacks and Vulnerabilities
- 4.8 Threat-hunting and Threat Intelligence
- 4.9 Threat Intelligence Sources
- 4.10 Analyzing Data and Artifacts
- 4.11 Malware Analysis
- 4.12 CompTIA SecurityX (CAS-005) Course Outro
Module 1 – Foundations of Power Skills in IT
- 1.1 Introduction to IT-Focused Power Skills
- 1.2 Evolving Skills for IT Success
Module 2 – Personal Effectiveness and Energy Management in IT
- 2.1 Balancing Time and Energy in IT Projects
- 2.2 Mental and Physical Stamina for IT Success
- 2.3 Emotional and Professional Wellness in IT
Module 3 – Resiliency and Adaptability for IT Professionals
- 3.1 Resiliency in the Face of Rapid IT Changes
- 3.2 Adapting to New Technologies and Methodologies
- 3.3 Building a Resilient IT Career Path
Module 4 – Emotional Intelligence and Interpersonal Skills in IT
- 4.1 Self-Management for IT Problem Solving
- 4.2 Interpersonal Skills for Cross-Functional IT Work
- 4.3 Professional Communication in IT Teams
Module 5 – Collaboration and Team Dynamics in IT
- 5.1 Essentials of Collaboration in IT Projects
- 5.2 Communication and Conflict Resolution in IT
- 5.3 Leading IT Teams Effectively
Module 6 – Business Acumen and Customer-Centric Service in IT
- 6.1 Building IT Business Acumen
- 6.2 Service Orientation for IT Professionals
- 6.3 Applying Business Acumen for IT Efficiency
Module 7 – Strategic Decision Making and Problem Solving in IT
- 7.1 Developing Strategic IT Thinking
- 7.2 Decision-Making Frameworks for IT
- 7.3 Creative Problem Solving for IT Challenges
Module 8 – Building a Growth Mindset and Personal Branding in IT
- 8.1 Fostering a Growth Mindset for IT Learning
- 8.2 Personal Branding for IT Professionals
- 8.3 Assessing and Enhancing Your IT Brand
- 8.4 Reflecting on Power Skills for IT Success
Module 1: Transitioning from Technical Expert to Manager
- 1.1 Understanding the Shift to Management
- 1.2 Developing a Management Mindset
- 1.3 Self-Assessment and Goal Setting for New Managers
Module 2: Communication and Time Management Essentials
- 2.1 Communication and Stakeholder Management
- 2.2 Time and Priority Management
Module 3: Emotional Intelligence and Leadership Styles
- 3.1 Emotional Intelligence for IT Leaders
- 3.2 Leadership Styles and Adaptability
Module 4: Building and Leading Your Support Team
- 4.1 Recruiting and Hiring Technical Staff
- 4.2 Developing and Coaching Technical Support Teams
- 4.3 Motivation and Team Building
- 4.4 Managing Remote and Hybrid Teams
Module 5: Managing IT Support Operations
- 5.1 Essential Support Processes and Frameworks
- 5.2 Metrics, Reporting, and Continuous Improvement
- 5.3 Service Level Agreements (SLAs) and Escalation Paths
Module 6: Strategic Leadership in IT Support
- 6.1 Budgeting and Resource Planning
- 6.2 Navigating Organizational Change
- 6.3 Aligning IT Support with Business Objectives
Module 7: Advanced Scenarios for IT Support Leaders
- 7.1 Crisis and Incident Management
- 7.2 Vendor and Supplier Management
- 7.3 Legal, Compliance, and Security Considerations
Module 8: Capstone and Leadership Development Planning
- 8.1 Real-World Case Study Analysis
- 8.2 Creating Your Leadership Development Plan
Module 1 – Introduction to Generative AI
- 1.1 What Is Generative AI
- 1.2 – History and Evolution
- 1.3 – Where is Generative AI Being Used
- 1.4 – Ethical Considerations
Module 2 – Understanding the Foundations
- 2.1 Generative AI – Recap
- 2.2 Exploring Large Language Models (LLMs)
- 2.3 Accessing and Using LLMs
- 2.4 Prompt Engineering
- 2.5 – Embeddings and Fine-Tuning
Module 3 – Generative AI Tools
- 3.1 – Explore ChatGPT – Features & Capabilities
- 3.2 – Text Generation with ChatGPT
- 3.3 – Image and Art Generation with AI
- 3.4 – Fine-Tuning LLMs for Specific Needs
- 3.5 How to Fine-Tune a Large Language Model (LLM)
Module 4 – Generative AI in Context
- 4.1 Generative AI Applications in Software Development
- 4.2 Applications of Generative AI in Retail
- 4.3 Applications of Generative AI in Marketing
Module 5 – The Future of Generative AI
- 5.1 Trends and Innovations
- 5.2 Careers in Generative AI_ Opportunities and Pathways
- 5.3 Popular Generative AI Tools
- 5.4 Course Closing_ The Future is AI-Powered
Module 1: Foundations of Microsoft Licensing
- 1.1 Why Licensing Matters
- 1.2 Key Licensing Terminology Explained
Module 2: Microsoft Licensing Programs and Models
- 2.1 Volume Licensing Overview
- 2.2 Enterprise Agreement (EA) Model
- 2.3 Cloud Solution Provider (CSP) Program
Module 3: Office vs. Microsoft 365 – Choosing the Right Plan
- 3.1 Comparing Office Perpetual and Microsoft 365
- 3.2 Microsoft 365 Plans Demystified
Module 4: Licensing Optimization and Strategy
- 4.1 Common Pitfalls and How to Avoid Them
- 4.2 Rightsizing Your Licensing Portfolio
- 4.3 Tools and Resources for Licensing Management
Module 5: Compliance and Audit Readiness
- 5.1 Staying Compliant
- 5.2 Policies and Internal Governance
- 5.3 Microsoft Licensing Course Closeout, Next Steps and Recommedations
Module 1: Getting Started with Web Development
- 1.1 Introduction to Web Development
- 1.2 How the Web Works Clients, Servers, and HTTPHTTPS
- 1.3 Setting Up Your Development Environment (VS Code, Prettier)
- 1.4 Introduction to Git & Version Control
- 1.5 HTML, CSS, JavaScript The Big Picture
Module 2: HTML Foundations
- 2.1 HTML Basics: Structure, Tags, and Attributes
- 2.2 Text Formatting, Lists, and Headings
- 2.3 Links, Navigation, and Anchors
- 2.4 Working with Images and Multimedia
- 2.5 Forms and Input Types
- 2.6 Tables, Accessibility & Semantic HTML
- 2.7 Validating HTML with W3C Standards
- 2.8 Best Practices & Clean Code
Module 3: Styling with CSS
- 3.1 CSS Basics: Selectors, Properties, and Values
- 3.2 Box Model: Margins, Padding, Borders
- 3.3 Typography: Fonts, Colors, and Line Heights
- 3.4 Positioning: Static, Relative, Absolute, Fixed
- 3.5 Introduction to Flexbox for Layouts
- 3.6 CSS Grid for Advanced Layouts
- 3.7 Media Queries & Mobile-First Design
- 3.8 CSS Variables and Custom Properties
- 3.9 Pseudo-elements & Pseudo-classes
- 3.10 CSS Animations & Transitions
- 3.11 Writing Maintainable CSS (BEM, File Organization)
- 3.12 Performance Optimization: Lazy Loading & Best Practices
Module 4: Bootstrap, Fast and Efficient CSS
- 4.1 Introduction to Bootstrap and the Grid System
- 4.2 Bootstrap Components: Buttons, Cards, Forms, and Modals
- 4.3 Customizing Bootstrap with CSS
- 4.4 Using Bootstrap Utilities for Rapid Prototyping
- 4.5 Best Practices for Responsive Design with Bootstrap
- 4.6 Bootstrap vs. Custom CSS: When to Use Which?
Module 5: JavaScript Fundamentals
- 5.1 Introduction to JavaScript: Variables and Data Types
- 5.2 Operators, Expressions, and Type Coercion
- 5.3 Conditionals: if, else, switch
- 5.4 Loops: for, while, forEach, for…of
- 5.5 Functions: Regular, Arrow Functions, and Parameters
- 5.6 Working with Arrays & Objects (Methods, Iteration)
- 5.7 Scope and Closures: Understanding this
- 5.8 JavaScript Debugging and Console Methods
- 5.9 Writing Clean JavaScript Code (Best Practices)
- 5.10 ES6+ Features (Destructuring, Spread & Rest Operators)
Module 6: Interactive Web Pages with JavaScript & DOM
- 6.1 Understanding the DOM and How Browsers Render Pages
- 6.2 Selecting and Modifying Elements (querySelector, getElementById)
- 6.3 Event Handling (click, keydown, mouseover, input)
- 6.4 Creating and Removing Elements Dynamically
- 6.5 Form Handling and Validation
- 6.6 Local Storage & Session Storage
- 6.7 Real-World DOM Project: Interactive Form with Validation
Module 7: Working with APIs & AJAX
- 7.1 Introduction to APIs and AJAX
- 7.2 Fetch API: Making HTTP Requests
- 7.3 Handling JSON Data in JavaScript
- 7.4 Form Submissions with JavaScript
- 7.5 Error Handling and Debugging API Calls
- 7.6 Real-World API Project: Fetching & Displaying Data
Module 8: AI-Assisted Coding
- 8.1 Introduction to AI-Powered Coding (GitHub Copilot, ChatGPT)
- 8.2 Using AI to Generate HTML & CSS Code
- 8.3 Using AI to Optimize JavaScript
- 8.4 Best Practices for AI-Assisted Development
Module 9: Web Hosting & Deployment
- 9.1 What is Web Hosting? (Netlify)
- 9.2 Deploying a Website Using Netlify
- 9.3 Security Considerations for Deployed Websites
Module 10: Final Project : Building a Portfolio Website
- 10.1 Structuring the Portfolio with HTML & Bootstrap
- 10.2 Styling the Portfolio with CSS & Animations
- 10.3 Adding JavaScript for Interactivity
- 10.4 Implementing Form Handling & Validation
- 10.5 Publishing & Sharing Your Portfolio
Module 1: Introduction to Cloud Strategy and Microsoft CAF
- 1.1 Why Cloud Transformation Needs a Framework
- 1.2 Overview of the Microsoft Cloud Adoption Framework (CAF)
Module 2: Strategy – Defining Your Business Case
- 2.1 Establishing Business Justification
- 2.2 Building a Cloud Adoption Strategy
Module 3: Planning – Preparing for Success
- 3.1 Assembling the Right Teams
- 3.2 Skills Readiness and Organizational Alignment
- 3.3 Creating the Adoption Plan
Module 4: Ready – Preparing Your Cloud Environment
- 4.1 Landing Zones and Environment Design
- 4.2 Subscription and Resource Organization
Module 5: Adopt – Migration and Innovation
- 5.1 Cloud Migration Approaches
- 5.2 Cloud Innovation Opportunities
Module 6: Govern – Establishing Governance and Compliance
- 6.1 Creating a Cloud Governance Strategy
- 6.2 Risk Management and Compliance
Module 7: Manage – Operational Excellence in the Cloud
- 7.1 Operational Management Principles
- 7.2 Cost Management and Optimization
Module 8: Real-World Application and Transformation Leadership
- 8.1 Case Study Review
- 8.2 Leading Cloud Transformation as an IT Leader
- 8.3 Microsoft CAF Course Closeout_ Key Takeaways and Next Steps
Module 1: Understanding Emotional Intelligence
- 1.1 What Is Emotional Intelligence?
- 1.2 Why EQ Is Critical in IT Environments?
Module 2: Building Self-Awareness and Self-Regulation
- 2.1 Developing Self-Awareness
- 2.2 Practicing Self-Regulation
Module 3: Leading with Empathy and Social Skills
- 3.1 Understanding and Using Empathy
- 3.2 Improving Interpersonal Effectiveness
Module 4: Applying EQ in Real-World IT Scenarios
- 4.1 Managing Conflict with EQ
- 4.2 Leading Under Pressure
Module 5: Advancing EQ for Long-Term Leadership Growth
- 5.1 Emotional Intelligence in Remote & Hybrid Teams
- 5.2 Creating a Culture of EQ on Your Team
- 5.3 EQ and Career Advancement
- 5.4 Your EQ Growth Plan and Closeout
Module 1 – The Nature of Leadership in IT
- 1.1 What Makes Leadership in IT Unique
- 1.2 Leadership vs. Management in IT
Module 2 – The Transition From Peer to Manager
- 2.1 Making The Shift
- 2.2 New Responsibilities and Mindsets
Module 3 – Avoiding Early Leadership Mistakes
- 3.1 Common Mistakes New IT Leaders Make
- 3.2 Setting a Strong Foundation
Module 4 – Core Leadership Skills for Technical Teams
- 4.1 Communicating as a Technical Leader
- 4.2 Decision-Making in Complex Environments
- 4.3 Coaching and Developing Technical Talent
Module 5 – Leading with Influence and Organizational Awareness
- 5.1 Navigating Organizational Politics and Culture
- 5.2 Leading Through Change and Uncertainty
- 5.3 Building Cross-Functional Relationships
- 5.4 Course Wrap-Up and Practical Advice for IT Leaders
Module 1 – Foundations of Sprint Planning and Meetings
- 1.1 Understanding the Sprint Lifecycle
- 1.2 Roles and Responsibilities in Agile Meetings
Module 2 – Preparing for Sprint Planning
- 2.1 Setting Sprint Goals and Priorities
- 2.2 Backlog Grooming for Sprint Planning
Module 3 – Conducting Effective Sprint Planning Sessions
- 3.1 Structuring the Planning Meeting
- 3.2 Engaging the Team in Planning
Module 4 – Running Daily Standups and Sprint Meetings
- 4.1 Daily Standup Best Practices
- 4.2 Sprint Reviews and Retrospectives
Module 5 – Overcoming Challenges in Sprint Planning and Meetings
- 5.1 Addressing Anti-Patterns in Sprint Meetings
- 5.2 Adapting for Team Dynamics and Remote Work
Module 6 – Enhancing Collaboration and Communication
- 6.1 Effective Facilitation Techniques
- 6.2 Continuous Improvement in Agile Meetings
Module 7 – Real-World Application and Continuous Learning
- 7.1 Sprint Meeting Scenarios and Case Studies
- 7.2 Course Recap and Strategies for Ongoing Improvement
Module 1 – IT Compliance Introduction
- 1.1 Introduction to the IT Role in Compliance
- 1.2 Overview of Regulations
Module 2 – General Data Protection Regulation (GDPR)
- 2.1 Overview of GDPR
- 2.2 Ensuring and Implementing GDPR Comp
- 2.3 – Penalties and Repercussions for GDPR Non-Compliance
- 2.4 – GDPR Extra References
Module 3 – Health Insurance Portability and Accountability Act (HIPAA)
- 3.1 – Overview of HIPAA
- 3.2 – Ensuring and Implementing HIPAA Compliance
- 3.3 – Penalties and Repercussions for HIPAA Non-Compliance
- 3.4 – HIPAA Extra Resources
Module 4 – Federal Information Security Management Act (FISMA)
- 4.1 – Overview of FISMA
- 4.2 – Ensuring and Implementing FISMA Compliance
- 4.3 – Penalties and Repercussions of FISM Non-Compliance
- 4.4 – FISMA Extra Resources
Module 5 – Sarbanes-Oxley Act (SOX)
- 5.1 – Introduction to SOX
- 5.2 – Ensuring and Implementing SOX Compliance
- 5.3 – Penalties and Repercussions for SOX Non-Compliance
- 5.4 SOX Extra References
Module 6 – Payment Card Industry Data Security Standard (PCI DSS)
- 6.1 – Overview of PCI DSS
- 6.2 – Ensuring and Implementing PCI DSS Compliance
- 6.3 – Penalties and Repercussions for PCI DSS Non-Compliance
- 6.4 – PCI DSS Extra References
Module 7 – Cybersecurity Maturity Model Certification (CMMC)
- 7.1 Introduction to CMMC and Its Purpose
- 7.2 Ensuring and Implementing CMMC Compliance
- 7.3 Repercussions for CMMC Non-Compliance
- 7.4 CMMC Extra References
Module 8 – California Consumer Privacy Act (CCPA)
- 8.1 Overview of CCPA
- 8.2 Ensuring and Implementing CCPA Compliance
- 8.3 Penalties and Repercussions for CCPA Non-Compliance
- 8.4 CCPA Extra References
Module 9 – ISO/IEC 27001 Compliance
- 9.1 Overview of ISO/IEC 27001
- 9.2 Ensuring and Implementing ISO/IEC 27001 Compliance
- 9.3 Repercussions for ISO/IEC 27001 Non-Compliance
- 9.4 ISO/IEC 27001 Extra References
Module 10 – Children's Online Privacy Protection Act
- 10.1 Children's Online Privacy Protection Act (COPPA)
- 10.2 Ensuring and Implementing COPPA Compliance
- 10.3 Penalties and Repercussions for COPPA Non-Compliance
- 10.4 COPPA Extra References
Module 11 – NIST Cybersecurity Framework (CSF)
- 11.1 Overview of NIST CSF
- 11.2 Ensuring and Implementing NIST CSF Compliance
- 11.3 Repercussions for NIST CSF Non-Compliance
- 11.4 NIST CSF Extra References
Module 12 – Gramm-Leach-Bliley Act (GLBA)
- 12.1 Overview of GLBA
- 12.2 Ensuring and Implementing GLBA Compliance
- 12.3 Penalties and Repercussions for GLBA Non-Compliance
- 12.4 GLBA Extra References
Module 13 – ISO 22301 Business Continuity Management
- 13.1 Overview of ISO 22301
- 13.2 Ensuring and Implementing ISO 22301 Compliance
- 13.3 Repercussions for ISO 22301 Non-Compliance
- 13.4 BCM Extra References
Module 14 – Cloud Security Alliance (CSA) CCM
- 14.1 Overview of CSA CCM
- 14.2 Ensuring and Implementing CSA CCM Compliance
- 14.3 Repercussions for CSA CCM Non-Compliance
- 14.4 CSA Extra References
Module 15 – Family Educational Rights and Privacy Act
- 15.1 Overview of FERPA
- 15.2 Ensuring and Implementing FERPA Compliance
- 15.3 Penalties and Repercussions for FERPA Non-Compliance
- 15.4 FERPA Extra References
Module 16 – Digital Millennium Copyright Act (DMCA)
- 16.1 Overview of DMCA
- 16.2 Ensuring and Implementing DMCA Compliance
- 16.3 Penalties and Repercussions for DMCA Non-Compliance
- 16.4 DMCA Extra References
- 16.5 – IT Compliance Course Closeout
Module 1 – Mobile Devices
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Device Hardware and Components
- 1.2 Mobile Device Connections and Accessories
- 1.3 Mobile Device Operating Systems
- 1.4 Troubleshooting Mobile Devices
- 1.5 Mobile Device,OS and Application Issues
- 1.6 Mobile Device,OS and Application Security
- 1.7 Identifying Connection Settings in Android
- 1.8 Identifying Connection Settings in iOS
Module 2 – Networking
- 2.1 Network Architecture
- 2.2 Ports and Protocols
- 2.3 Wireless Networking
- 2.4 Network Hosts and Services
- 2.5 DNS and DHCP
- 2.5.1 Demo – Working with DNS and DHCP
- 2.6 VPNs and VLANs
- 2.7 Network Devices
- 2.8 Basic SOHO Configuration
- 2.9 Internet Connections and Network Types
- 2.10 Networking Tools
- 2.11 Networking in Windows
- 2.11.1 Demo – Configuring Networking in Windows
- 2.12 Networking Commands
- 2.12.1 Demo – Working with Networking Commands
- 2.13 Troubleshooting Network Issues
Module 3 – Hardware
- 3.1 Display Components and Attributes
- 3.2 Basic Cables and Connections
- 3.3 Network Cables and Connections
- 3.4 Storage Devices and Connections
- 3.5 Introduction to RAID
- 3.6 Motherboards and Form Factors
- 3.7 Motherboard Connections
- 3.8 BIOS and UEFI
- 3.9 CPUs and CPU Architecture
- 3.10 Expansion Cards
- 3.11 System Cooling
- 3.12 Power Supply Units
- 3.13 Printers and Multifunction Devices
- 3.14 Printer Maintenance
- 3.15 Troubleshooting Computer Components
- 3.16 Troubleshooting Storage and RAID Issues
- 3.17 Troubleshooting Video and Display Issues
- 3.18 Troubleshooting Printer Issues
Module 4 – Operating Systems
- 4.1 Workstation Operating Systems
- 4.2 Common File System Types
- 4.3 Operating System Installation Types
- 4.4 Operating System Boot Methods
- 4.5 Storage Partitioning
- 4.5.1 Demo – Working with Storage Partitions
- 4.6 Identifying Windows Editions
- 4.7 Windows Upgrades
- 4.8 Windows OS Installations
- 4.9 Using Windows Task Manager
- 4.9.1 Demo – Working with Windows Task Manager
- 4.10 MMC Snap-ins
- 4.10.1 Demo – Working with MMC Snap-ins
- 4.11 Windows Operating System Tools
- 4.12 Microsoft Command Line Tools
- 4.12.1 Demo – Working with Microsoft Command Prompt
- 4.13 Configuring Microsoft Windows Settings
- 4.14 Configuring Windows Power Options
- 4.14.1 Demo – Working with Windows Power Options
- 4.15 Windows File Explorer
- 4.15.1 Demo – Working with File Explorer
- 4.16 Windows Domains vs Workgroups
- 4.17 macOS System Configuration
- 4.17.1 Demo – macOS Features and Tools
- 4.18 Linux Components
- 4.19 Linux Tools
- 4.20 Common Application Installation
Module 5 – Virtualization and Cloud Computing
- 5.1 Virtualization Concepts
- 5.1.1 Demo – Working with Virtual Machines
- 5.2 Cloud Computing
- 5.2.1 Demo – Working with the Cloud
- 5.3 Cloud Productivity Tools
Module 6 – Security
- 6.1 Physical Security
- 6.2 Physical Access Security
- 6.3 Logical Security
- 6.4 Windows Security – Firewalls and Antivirus
- 6.4.1 Demo – Working with the Windows Firewalls and Antivirus
- 6.5 Windows Security Users and Groups
- 6.6 Windows Security – NTFS and Share Permissions
- 6.6.1 Demo – Working with NTFS and Share Permissions
- 6.7 Windows Security – Active Directory
- 6.8 Windows Security – Data Encryption
- 6.9 Wireless Security
- 6.10 Malware Types
- 6.11 Malware Detection and Prevention
- 6.12 Social Engineering
- 6.13 Security Threats
- 6.13.1 Demo – Security Vulnerabilities
- 6.14 Malware Removal Process
- 6.15 Workstation Security
- 6.16 Data Destruction Concepts
- 6.17 SOHO Network Security
- 6.18 Browser Security Settings
- 6.19 Troubleshooting PC Security Issues
Module 7 – Operational Procedures
- 7.1 Ticketing Systems
- 7.2 Asset Management
- 7.3 Document Types
- 7.4 Change Management
- 7.5 Workstation Backup and Recovery
- 7.6 Common Safety Procedures
- 7.7 Environmental Impact and Controls
- 7.8 Licensing and Policy Concepts
- 7.9 Communication and Professionalism
- 7.10 Basics of Scripting
- 7.11 Remote Access Technologies
- 7.12 Basics of Artificial Intelligence
- 7.13 Troubleshooting Methodology
- 7.14 CompTIA A+ Course Closeout
Module 1 – Understanding Agile Testing Fundamentals
- 1.1 What is Agile Testing
- 1.2 Agile Testing vs. Traditional Testing
Module 2 – Agile Methodologies: Scrum and Kanban for QA
- 2.1 Scrum Overview and Testing Integration
- 2.2 Kanban Overview and Testing Integration
Module 3 – Continuous Integration and Continuous Testing
- 3.1 Understanding Continuous Integration (CI)
- 3.2 Implementing Continuous Testing
Module 4 – Effective Collaboration in Agile Testing
- 4.1 Developer and QA Collaboration
- 4.2 Collaboration Techniques and Tools
Module 5 – Real-world Agile Testing Practices (Case Studies & Examples)
- 5.1 Agile Testing in Practice
- 5.2 Agile Testing Metrics and Improvement
- 5.3 Course Review and Next Steps
Module 1 – Introduction to IT Asset Management (ITAM)
- 1.1 What is IT Asset Management?
- 1.2 The Benefits of ITAM
- 1.3 ITAM Frameworks and Standards
Module 2 – Asset Lifecycle Management
- 2.1 IT Asset Lifecycle Management
- 2.2 Asset Procurement and Acquisition
- 2.3 IT Asset Deployment and Utilization
Module 3 – IT Asset Inventory Management
- 3.1 Building and Maintaining an IT Asset Inventory
- 3.2 Asset Tagging and Identification
- 3.3 Software Asset Management (SAM)
Module 4 – IT Asset Maintenance and Support
- 4.1 Asset Monitoring and Maintenance
- 4.2 IT Support and Service Desk Integration
- 4.3 Managing End-of-Life (EOL) Assets
Module 5 – IT Asset Financial Management
- 5.1 Financial Aspects of IT Asset Management
- 5.2 Cost Optimization in IT Asset Management
- 5.3 Asset Valuation and Reporting
Module 6 – IT Asset Compliance and Security
- 6.1 Compliance and ITAM
- 6.2 IT Asset Security
- 6.3 Auditing IT Assets
Module 7 – IT Asset Management Tools and Technologies
- 7.1 ITAM Tools and Platforms
- 7.2 Automation and Emerging Trends in ITAM
Module 8 – Best Practices and Continuous Improvement
- 8.1 Developing an ITAM Policy
- 8.2 ITAM Governance and Stakeholder Engagement
- 8.3 Continuous Improvement in ITAM
Module 1 – What is AI and How is It Used in IT Support?
- 1.1 What is AI and How is It Used in IT Support?
- 1.2 AI as an Enhancement, Not a Replacement
- 1.3 Essential AI Tools for IT Support Professionals
Module 2 – AI-Powered Tools That Improve IT Support Efficiency
- 2.1 AI Chatbots and Virtual Assistants for IT Help Desks
- 2.2 AI in Ticketing and Incident Management
- 2.3 AI-Driven Knowledge Bases for IT Support
- 2.4 AI for Remote IT Support and Preventative Maintenance
Module 3 – Integrating AI into Daily IT Support Workflows
- 3.1 Automating Routine IT Tasks with AI
- 3.2 AI in Proactive Issue Detection and Prevention
- 3.3 AI-Driven Security Monitoring for IT Support
Module 4 – Developing AI Skills for IT Support Specialists
- 4.1 Building AI Literacy for IT Support Roles
- 4.2 Working with AI-Enhanced IT Service Management (ITSM) Platforms
- 4.3 Communicating AI Insights to Users and Management
Module 5 – Applying AI in IT Support Teams
- 5.1 Practical AI Implementation for IT Support Teams
- 5.2 Career Growth Strategies for IT Support Specialists in an AI
Module 1 – Engagement Management
- 1.1 Pre Engagement Activities
- 1.2 Collaboration and Communication Activities
- 1.3 Testing Frameworks and Methodologies
- 1.3.1 Examining MITRE ATT&CK
- 1.4 Engagement Management Review
Module 2 – Reconnaissance and Enumeration
- 2.1 Passive Reconnaissance
- 2.1.1 Google Hacking
- 2.2 Active Reconnaissance
- 2.2.1 Port Scanning and Fingerprinting
- 2.2.2 Tracing a Network Path with Traceroute
- 2.2.3 Intercepting Data with Wireshark
- 2.2.4 Web Scraping
- 2.3 Enumeration Techniques
- 2.3.1 Directory Enumeration
- 2.3.2 Email Enumeration
- 2.4 Reconnaissance and Enumeration Scripts
- 2.4.1 Using Scripts
- 2.5 Reconnaissance and Enumeration Tools
- 2.5.1 Perform OSINT with Recon ng
- 2.5.2 Adding an API Key to Recon ng
- 2.5.3 Discovering IoT with Shodan
- 2.5.4 Performing WHOIS Lookups
- 2.5.5 Performing DNS Lookups
- 2.5.6 Using NMAP Scripts
- 2.5.7 Performing OSINT with theHarvester
- 2.6 Reconnaissance and Enumeration Review
Module 3 – Vulnerability Discovery and Analysis
- 3.1 Vulnerability Discovery
- 3.1.1 Performing a Vulnerability Scan with OpenVAS
- 3.1.2 Performing Static Code Analysis
- 3.2 Reconnaissance, Scanning and Enumeration Output Analysis
- 3.3 Physical Security
- 3.3.1 Cloning an RFID Badge
- 3.3.2 Cloning NFC with Flipper Zero
- 3.4 Vulnerability Discover and Analysis Review
Module 4 – Attacks and Exploits
- 4.1 Prioritize and Prepare Attacks
- 4.2 Network Attacks
- 4.2.1 Performing an On Path Attack
- 4.2.2 Executing a Network Attack with Metasploit
- 4.2.3 Migrating Meterpreter to Another Process
- 4.2.4 Creating a Malware Dropper with Msfvenom
- 4.2.5 Using Netcat
- 4.2.6 Capturing Files with Wireshark
- 4.3 Authentication Attacks
- 4.3.1 Brute Forcing with Medusa
- 4.3.2 Pass the Hash
- 4.3.3 Password Spraying with Hydra
- 4.3.4 Pass the Token Attack
- 4.3.5 Spoofing Authentication with Responder
- 4.3.6 Cracking Linux Passwords with John the Ripper
- 4.3.7 Hashcat Password Cracking
- 4.4 Host Based Attacks
- 4.4.1 Privilege Escalation with Eternal Blue
- 4.4.2 Log Tampering
- 4.4.3 Pwn a Linux Target from Start to Finish
- 4.5 Web Application Attacks
- 4.5.1 Performing Directory Traversal
- 4.5.2 Grabbing Passwords with SQL Injection
- 4.5.3 SQLi on a Live Website Part 1
- 4.5.4 SQLi on a Live Website Part 2
- 4.5.5 Command Injection
- 4.5.6 Injecting an iFrame with Stored XSS
- 4.5.7 Busting the DOM
- 4.5.8 IDOR Abuse with Burp Suite
- 4.5.9 Web Session Hijacking
- 4.5.10 Parameter Tampering with Burp Suite
- 4.6 Cloud Based Attacks
- 4.6.1 Hacking S3 Buckets
- 4.7 Wireless Attacks
- 4.7.1 WiFi Pumpkin Evil Twin
- 4.7.2 WPA2 Crack Attack
- 4.8 Social Engineering Attacks
- 4.8.1 Phishing for Credentials
- 4.8.2 OMG Cable Baiting
- 4.9 Specialized System Attacks
- 4.9.1 Pwn a Mobile Device
- 4.10 Automated Script Attacks
- 4.11 Attacks and Exploits Review
Module 5 – Post-exploitation and Lateral Movement
- 5.1 Establishing and Maintaining Persistence
- 5.1.1 Creating a Persistent Netcat Back Door
- 5.1.2 Exfiltrating Data with a Scheduled Task
- 5.2 Lateral Movement
- 5.2.1 Preparing to Pivot
- 5.2.2 Lateral Movement through Pivoting
- 5.3 Staging and Exfiltration
- 5.3.1 Hiding Data with Steganography
- 5.3.2 Automatically Exfiltrating Data
- 5.4 Cleanup and Restoration
- 5.5 Post-Exploitation and Lateral Movement Review
Module 6 – Deliverables
- 6.1 Penetration Test Report Components
- 6.2 Report Findings and Recommendations
- 6.2.1 Examining Pentest Reports
- 6.3 Deliverables Review
- 6.4 Course Conclusion
Module 1 – Preparing For and Taking the Exam
- 1.1 What's New for CAPM in V7
- 1.2 CAPM Certification Overview
- 1.3 CAPM Exam Overview
- 1.4 Mastering the CAPM 7th Edition Exam Tips for Success
- 1.5 Maintaining Your CAPM Certification A Practical Guide
Module 2 – Project Management Fundamentals and Core Concepts
- 2.1 Project Life Cycles and Processes
- 2.2 Project Management Planning Activities
- 2.3 Project Roles and Responsibilities
- 2.4 Following and Executing Planned Strategies and Frameworks
- 2.5 Common Problem-Solving Tools and Techniques
Module 3 – Predictive/Plan Based Methodologies
- 3.1 When to Use Predictive Approaches in Project Management
- 3.2 Understanding the Project Management Plan Schedule
- 3.3 Project Controls for Predictive Projects
Module 4 – Agile Frameworks and Methodologies
- 4.1 Suitability and Application of Adaptive Approaches
- 4.2 Planning Project Iterations
- 4.3 Project Controls for Adaptive Projects
- 4.4 Adaptive Methodologies and Their Components
- 4.5 Prioritization of Tasks in Adaptive Projects
Module 5 – Business Analysis Frameworks
- 5.1 Business Analyst Roles and Responsibilities
- 5.2 Stakeholder Communication
- 5.3 Gathering Requirements for CAPM Certification
- 5.4 Product Roadmaps
- 5.5 How Project Methodologies Influence Business Analysis Processes
- 5.6 Validating Project Requirements Through Product Delivery
- 5.7 Wrapping Up Your CAPM Journey
Module 1: Understanding Social Networking in the Workplace
- 1.1 – What is Social Networking
- 1.2 – Why Social Networking is an Employment and Labor Law Issue
Module 2: Social Networking and the Recruiting Process
- 2.1 – Social Networking in Recruitment
- 2.2 – Discrimination Risks in Social Networking-Based Recruitment
- 2.3 – Employer Strategies for Social Media Background Checks
Module 3: Employees' Social Networking Use, HR Concerns, and Potential Legal Issues
- 3.1 – On-Duty and Off-Duty Social Networking Behavior
- 3.2 – Handling Social Networking Issues Without Risking Discrimination
- 3.3 – Legal Consequences of Failing to Address Social Networking
Module 4: Regulatory Views, Employee Rights, and State Laws
- 4.1 – NLRB Guidance on Employees’ Social Networking
- 4.2 – Privacy Rights of Employees on Social Networking Sites
- 4.3 – Overview of State Laws on Employer Access to Social Networking
Module 5: Developing a Social Networking Policy
- 5.1 – Essentials of a Social Networking Policy
- 5.2 – Course Closeout, Key Takeaways and Final Thoughts
Module 1: Networking Concepts
- 1.1 Networking Overview
- 1.1.1-Activity-Creating a Network
- 1.2 OSI and DOD Model
- 1.2.1-Activity-Examining the OSI Layers
- 1.3 Networking Appliances, Applications and Functions
- 1.3.1-Activity-Using Online Proxies
- 1.4 Cloud Concepts and Connectivity
- 1.4.1-Activity-Creating Cloud Resources
- 1.5 Ports, Protocols, Services and Traffic Types
- 1.5.1-Activity-Examining ARP and ICMP
- 1.5.2-Activity-Examining DNS and Ports
- 1.6 Wireless Transmission Media
- 1.6.1-Activity-Configuring-WiFi
- 1.7 Wired Transmission Media and Transceivers
- 1.8 Network Topologies, Architectures and Types
- 1.9a IPv4 Network Addressing – Part 1
- 1.9b IPv4 Network Addressing – Part 2
- 1.9.1-Activity-Configuring Client IP Settings
- 1.9.2-Activity-Subnetting – Delta 128
- 1.9.3-Activity-Subnetting-Delta-64
- 1.9.4-Activity-Subnetting WAN Links
- 1.10a Modern Network Environments – Part 1
- 1.10b Modern Network Environments – Part 2
Module 2: Network Implementation
- 2.1 Implementing Routing Technologies
- 2.1.1-Activity-Setting Up Basic Routing
- 2.1.2-Activity-Adding Static Routes
- 2.1.3-Activity- Configuring Routing Protocols
- 2.1.4-Activity-Configuring Port Address Translation
- 2.2 Configuring Switching Technologies and Features
- 2.2.1-Activity-Connecting Devices with a Switch
- 2.2.2-Activity-Creating VLANs
- 2.2.3-Activity-Voice and Data VLANs
- 2.2.4-Activity-VLAN-Trunking
- 2.2.5-Activity-VLAN Routing
- 2.3 Selecting and Configuring Wireless Devices and Technologies
- 2.3.1-Activity-Creating a WLAN
- 2.4 Physical Installations
- 2.4.1-Activity-Managing Cable
- 2.4.2-Activity-Punching Down Twisted Pair
Module 3: Network Operations
- 3.1 Organizational Processes and Procedures
- 3.2 Network Monitoring Technologies
- 3.2.1-Activity-Exploring SNMP
- 3.3 Disaster Recovery (DR)
- 3.4 IPv4 and IPv6 Network Services
- 3.4.1-Activity-Implementing a DHCP Relay Agent-Part 1
- 3.4.2-Activity-Implementing a DHCP Relay Agent-Part 2
- 3.4.3-Activity-DNS-Part 1
- 3.4.4-Activity-DNS-Part 2
- 3.5 Network Access and Management
Module 4: Network Security
- 4.1a Network Security Concepts – Part 1
- 4.1b Network Security Concepts – Part 2
- 4.1.1-Activity-Exploring Encryption
- 4.1.2-Activity-Applying Authorization
- 4.1.3-Activity-Testing a Honeypot
- 4.2 Network Attacks
- 4.2.1-Activity-Launching a Denial of Service Attack
- 4.2.2-Activity-Phishing for Credentials
- 4.2.3-Activity-Deploying a Malicious Charging Cable
- 4.3 Network Defense
- 4.3.1-Activity-Implementing ACLs
Module 5: Network Troubleshooting
- 5.1 Troubleshooting Methodology
- 5.2 Common Cabling and Physical Interface Issues
- 5.2.1-Activity-Selecting the Right Cable
- 5.2.2-Activity-Crimping an RJ-45 End on a Cable
- 5.3 Network Service Issues
- 5.3.1-Activity-Troubleshooting a Routed Network
- 5.4 Performance Issues
- 5.5 Troubleshooting Tools and Protocols
- 5.5.1-Activity-Using Command Line Commands
- 5.5.2-Activity-Using NSLOOKUP and DIG
- 5.5.3-Activity-Using NMAP
- 5.5.4-Activity-Troubleshooting Using CDP and LLDP
- 5.5.5-Activity-Testing a cable
- 5.5.6-Activity-Toning a cable
- 5.5.7-Activity-Using a Spectrum Analyzer
- 5.5.8-Activity-Testing a Fiber Optic Cable
- 5.5.9-Activity-Using Network Device Commands
- 5.6 Course Closeout
Introduction – Certified Cloud Pre-Sales Cloud Solutions Architect (CCPSA)
- Course Introduction
- Instructor Introduction
- Why take the CCPSA Exam and Course
- Exam Objectives
- Discussion – The Importance of Sales & Solutions Engineering
CCPSA Module 1 – Domain 1 – Customer Management (Course 1)
- 1.1.1 Customer Management
- 1.1.2 Customer Management Fundamentals
- 1.1.3 What is Customer Management
- 1.1.4 Understanding Customer Acquisition
- 1.1.5 Enhancing Customer Engagement
- 1.1.6 Attending Customer Events
- 1.1.7 Understanding the Buyer
- 1.1.8 Conducting Discovery
- 1.1.9 Identifying and Qualify the Opportunity
- 1.1.10 Create That Win Win Situation
- 1.1.11 Solution Selling Mindset
- 1.2.1 Become a Trusted Advisor
- 1.2.2 What is a Trusted Advisor
- 1.2.3 Traits of a Trusted Advisor
- 1.2.4 Objection Handling
- 1.2.5 Presenting a Business Case
- 1.2.6 Creating Value Propositions (Uplift Metrics)
- 1.2.7 Importance of Expertise
- 1.2.8 Executive Messaging
- 1.2.9 Story Telling
- 1.2.10 SaaS Enablement Tools
- 1.2.11 Module Review
- 1.2.12 Module Review Questions
CCPSA Module 2 – Domain 2 – Sales Engineering Skills (Course 2)
- 2.1.1 Sales Engineering Skills
- 2.1.2 What is Pre Sales Engineering
- 2.1.3 What is Sales Engineering
- 2.1.4 Discussion – Presales vs Solutions Engineering
- 2.1.5 Cloud Fundamentals
- 2.1.6 Cloud Infrastructure
- 2.1.7 Cloud APIS
- 2.1.8 Cloud Considerations
- 2.2.1 Responding to Customer Procurement Requirements
- 2.2.2 Request for Proposals (RFP)
- 2.2.3 Proposals Response
- 2.2.4 Design Solutions Architectures
- 2.2.5 What is a Cloud Fit
- 2.2.6 Analytical Thinking
- 2.3.1 Handling US Federal Sector Requirements
- 2.3.2 Why the US Federal Sector is So Different
- 2.3.3 Proposal Teams
- 2.3.4 Subject Matter Experts (SME)
- 2.3.5 Searching for Opportunities
- 2.4.1 Handling Sales Engineering Activities
- 2.4.2 Closing a Solution Deal
- 2.4.3 Defining Expectations
- 2.4.4 Defining Customer Discussion Agenda
- 2.4.5 Pyramid Principle (Minto Pyramid)
- 2.4.6 Proof of Concepts (POC)
- 2.4.7 Demonstration – Performing Demonstrations
- 2.4.8 Whiteboarding Best Practices
- 2.4.9 Vendor Cost Optimization
- 2.4.10 Using Solutions Collateral
- 2.4.11 Module Review
- 2.4.12 Review Questions
CCPSA Module 3 – Domain 3 – Sales and Financial Skills (Course 3)
- 3.1.1 Sales and Financial Skills
- 3.1.2 The Sales Process
- 3.1.3 Creating Value in Sales Process
- 3.1.4 Leading the conversation
- 3.1.5 Asking the Right Questions
- 3.1.6 Identifying Client Needs and Goals
- 3.1.7 Highlighting Value Propositions
- 3.1.8 Impacts and Opportunities
- 3.2.1 Common Sales Team Organizational Structures
- 3.2.2 Sales Team Organization Mapping
- 3.2.3 SE-AE Ratio
- 3.2.4 Sales Territories
- 3.2.5 Proposal Team Structure
- 3.3.1 Understanding the Sales Cycle and Activities
- 3.3.2 Sales Cycles
- 3.3.3 Sales Pipelines
- 3.3.4 Inside Sales Leads
- 3.3.5 What is the Deals Desk
- 3.3.6 Selling into Specific Industries
- 3.4.1 Important Sales Financial Terminology
- 3.4.2 Estimating Return on Investments (ROI)
- 3.4.3 Estimating Total Cost of Ownership (TCO)
- 3.4.4 Cost of Customer Acquisition (COCA)
- 3.4.5 Understanding CAPEX and OPEX
- 3.4.6 Key Performance Indicators (KPI)
- 3.4.7 Sales Team Compensation Structure
- 3.4.8 Module Review
- 3.4.9 Module Review Questions
- 3.4.10 Course Closeout
Section 2: Advanced Capabilities
- 2.1 Advanced Capabilities
- 2.2 Deployment Options (node types, cluster options, etc.)
- 2.3 Multi-AZ deployment with Amazon Redshift
- 2.4 Backup and Recovery
- 2.5 Demo -Deploy Cluster
- 2.6 Demo – Resize Cluster
- 2.7 Networking and Security
- 2.8 Demo – Networking and Security
- 2.9 HOE – Setup IAM and Deploy Cluster
- 2.10 Whiteboard – Networking
- 2.11 Demo – Connect to Database
- 2.12 HOE – SQLWB
- 2.13 Excel Connections
- 2.14 Setting up and managing data ingestion with Amazon Redshift
- 2.15 HOE – AWS S3 Data Load
- 2.16 Monitoring Redshift
- 2.17 Demo – Monitor Redshift
- 2.18 HOE – Deploy an Amazon Redshift data warehouse cluster, load data into the cluster
- 2.19 Amazon Redshift Spectrum
- 2.20 Section Review
- 2.21 Review Questions
- 2.22 Resources
- 2.23 Course Closeout
Introduction – AWS Redshift Fundamentals
- Course Welcome
- Course Overview
- Course PreRequirements
Section 1: AWS Redshift Fundamentals
- 1.1 Fundamentals of data warehouses and Amazon Redshift
- 1.2 AWS Benefits and Limitations
- 1.3 AWS Redshift Pricing
- 1.4 Enterprise Use Cases
- 1.5 Node Types
- 1.6 Cluster Options
- 1.7 Demo – Free Tier- Startup Credits
- 1.8 Hands on Exercise 1 – Deploy a Cluster
- 1.9 Whiteboard- Redshift Architecture
- 1.10 Life of a Query
- 1.11 Query and Cost Optimization
- 1.12 Workload Management
- 1.13 Whiteboard- Redshift WLM
- 1.14 Redshift Performance Notes
- 1.15 Column Oreiented structures
- 1.16 Section Review
- 1.17 Review Questions
Module 1: Understanding Soft Skills
- 1.1 Course Overview
- 1.2 Instructor Overview
- 1.3 Understanding Soft Skills
- 1.4 What are Soft Skills
- 1.5 Why Soft Skills are important for Technical Roles
- 1.6 What is a Cultural Fit
- 1.7 Communication and Presentation Skills
- 1.8 Attention to Details
- 1.9 Critical Thinking and Problem-Solving Skills
- 1.10 Tolerance to Change and Uncertainty
- 1.11 Emotional Intelligence
- 1.12 Motivation
- 1.13 Compassion, Empathy and Humility
- 1.14 Social Skills
- 1.15 Leadership and Decision Making Skills
- 1.16 Inspiration and Improvement Attitude
- 1.17 Team Player
- 1.18 Desire to Learn
- 1.19 Open to Criticism and Feedback
- 1.20 Conflict Resolution
- 1.21 Work Ethics and Integrity
- 1.22 Discussion – Common Soft Skills for Tech Sales Professionals
- 1.23 Discussion – Common Soft Skills for Cloud Professionals
- 1.24 Discussion – Common Soft Skills for Software Engineers, Programmers and Developers
- 1.25 Module 1 Summary Review
- 1.26 Module 1 Review Questions
Module 2: Preparing for the Tech Interview
- 2.1 Preparing for the Tech Interview
- 2.2 Getting Ready for a Tech Interview
- 2.3 Showcase your Soft Skills
- 2.4 How to Showcase Technical Skills with Soft Skills!
- 2.5 Risk Assessment Used by Human Resources
- 2.6 Addressing Company Specific Questions
- 2.7 Topic Discussion Focus Common Soft Skills
- 2.8 Module 2 Summary Review
- 2.9 Module 2 Review Questions
- 2.10 Course Resources and Closeout
Module 1 – Intro To GPC Disaster Recovery (DR) For SQL
- 1.1 Introduction To Disaster Recovery (DR)
- 1.2 Key DR Terminology and Concepts
Module 2 -DR Strategies for Microsoft SQL Server on GCP
- 2.1 High Availability with Always On Availability Groups in GCP
- 2.2 Commit Modes and Backup Strategies
Module 3 – Disaster Recovery Architectures and Operations on Google Cloud
- 3.1 DR Deployment Architectures on GCP
- 3.2 Active and Standby Modes in DR
- 3.3 Executing Failover and Switchover Processes
- 3.4 Testing and Validating DR Plans
Module 4 – Backup and Restore DR Strategy
- 4.1 Integrating DR with Application Lifecycle
- 4.2 Monitoring and Maintenance of DR Solutions
- 4.3 Course Closing
Module 1: Crafting the Perfect Resume and Portfolio
- 1.1 Beating the Bots – How to Get Past Automated Resume Screeners
- 1.2 Understanding the IT Resume Essentials
- 1.3 Tailoring Your Resume for Specific Roles
- 1.4 Building an Impressive IT Portfolio
Module 2: Finding IT Job Opportunities
- 2.1 Navigating IT Job Boards and Platforms
- 2.2 Networking for IT Professionals
- 2.3 Exploring Freelancing and Contract Work
Module 3: Preparing for IT Job Interviews
- 3.1 Researching the Company and Role
- 3.2 Preparing Your Elevator Pitch
- 3.3 Building Confidence Through Mock Interviews
Module 4: Mastering Different Types of IT Interviews
- 4.1 Succeeding in Remote Interviews
- 4.2 Navigating In-Person Interviews
- 4.3 Excelling in Team and Panel Interviews
Module 5: Conquering Technical Questions
- 5.1 Tackling Common Technical Questions
- 5.2 Handling Questions You Don’t Know
Module 6: The Power of Soft Skills in IT Careers
- 6.1 Communication and Collaboration
- 6.2 Emotional Intelligence and Adaptability
- 6.3 Problem-Solving and Conflict Resolution
Module 7: Wrapping Up the Interview Process
- 7.1 Post-Interview Follow-Up
- 7.2 Negotiating Salary and Benefits
- 7.3 Preparing for Your New Role
- 7.4 Course Closeout
Module 1 – Foundations of Strategic Planning and Management in IT
- 1.1 Strategic Planning and Management for IT Leaders
- 1.2 Strategic Thinking for IT Leadership
Module 2 – Developing a Strategic Framework for IT
- 2.1 Establishing Vision, Mission, and Strategic Goals for IT
- 2.2 Assessing Internal and External Factors
- 2.3 Creating Actionable Initiatives
Module 3 – Aligning IT Projects with Strategic Goals
- 3.1 Bridging the Gap Between Strategy Design and Delivery
- 3.2 Integrating Project Management and IT Strategy
- 3.3 Prioritizing IT Projects in a Strategic Portfolio
Module 4 – Building Engagement and Buy-In for IT Strategy
- 4.1 Creating an Inclusive Strategic Planning Process
- 4.2 Communicating IT Strategy to Non-Technical Stakeholders
- 4.3 Strengthening Team Commitment to IT Strategy
Module 5 – Strategic Goal Setting and SMART Metrics for IT
- 5.1 Defining SMART Goals in an IT Context
- 5.2 Developing Key Performance Indicators (KPIs) for IT
- 5.3 Tracking and Adapting IT Goals Based on Performance
Module 6 – Managing IT Strategy Execution and Evaluation
- 6.1 Overseeing IT Project Execution for Strategic Success
- 6.2 Conducting Strategic Reviews and Assessments
- 6.3 Lessons Learned and Continuous Improvement in IT Strategy
Module 7 – Sustaining Long-Term IT Strategy Success
- 7.1 Managing and Updating IT Strategy for Long-Term Success
- 7.2 Moving Forward as Strategic IT Leaders
Introduction – Responsible Automated Intelligence Ethics
- Course Welcome
- Instructor Introduction
Module 1: Introduction to AI Ethics
- 1.1 Introduction to AI Ethics
- 1.2 Understanding AI Ethics
- 1.3 Ethical Frameworks and Principles in AI
- 1.4 Ethical Challenges
- 1.5 Whiteboard – Key Principles of Responsible AI
Module 2: Responsible AI Development
- 2.1 Responsible AI Development – Introduction
- 2.2 Responsible AI Development – Continued
- 2.3 Bias and Fairness in AI
- 2.4 Transparency in AI
- 2.5 Demonstration – Microsoft Responsible AI
- 2.6 Accountability and Governance in AI
Module 3: Privacy and Security with AI
- 3.1 Privacy and Security in AI
- 3.2 Data Collection and Usage
- 3.3 Risks and Mitigation Strategies
- 3.4 Ethical Data Management in AI
- 3.5 Demonstration – Examples of Privacy EUL
Module 4: Social and Ethical Impacts of AI
- 4.1 Social and Ethical Impacts of AI
- 4.2 Automation and Job Displacement
- 4.3 AI and Social Good
- 4.4 Demonstration – ChatGPT
- 4.5 Demonstration – Bard
Module 5: Policy Development
- 5.1 Policy Development
- 5.2 Ethical AI Leadership Culture
- 5.3 Ethical AI Policy Elements
- 5.4 Ethical AI in a Changing Landscape
- 5.5 Course Review
- 5.6 Course Closeout
Apache Kafka – Introduction
- Course Introduction
- Instructor Introduction
Module 1: Overview of Apache Kafka and Common Use Cases
- 1.1 Overview and Common Use Cases
- 1.2 What is Kafka
- 1.3 Kafka History
- 1.4 Kafka Use Cases
- 1.5 Kafka APIs
- 1.6 Kafka Pub Sub Patterns
- 1.7 Whiteboard Discussion- Use Case
Module 2: Kafka Core Concepts
- 2.1 Kafka Core Concepts
- 2.2 The Importance of Event Data Streams
- 2.3 Kafka Messaging, Topics, Partitions and Segments
- 2.4 Whiteboard – Kafka Components
- 2.5 Whiteboard – Brokers and Clusters
- 2.6 Kafka Streams and Patterns
- 2.7 Whiteboard – Zookeeper and Kraft
- 2.8 Demonstration – Kafka Connect
- 2.9 Whiteboard- – Architecture Deep Dive
- 2.10 Whiteboard – Kafka Design Patterns
Module 3: Installing and Deploying Kafka
- 3.1 Installing and Deploying Kafka
- 3.2 Demonstration – Kafka Resources and Licensing
- 3.3 Demonstration – Kafka Installation Options, Considerations and Requirements
- 3.4 Demonstration – Deployment and Environment
- 3.5 Demonstration – Starting Kafka
- 3.6 Demonstration – Terminating Kafka Environment
- 3.7 Whiteboard – Connections and Processing Events
- 3.8 Additional Resources
- 3.9 Putting it all together – Course Review
Cloud Interview ACE
- 1.1 Welcome to the Course
- 1.2 About Your Instructor
- 1.3 Course Objectives
- 1.4 Cloud Computing Roles
- 1.5 Top Reasons to Be a Cloud Professionals
- 1.6 Cloud Role Skill Mapping
- 1.7 Non Tech Role Transitions
- 1.8 Tech Role Transitions
- 1.9 Cloud Computing Career Growth
- 1.10 Cloud Computing Salary Range
- 1.11 Importance of Cloud Certifications
- 1.12 Cloud Computing Fundamentals Part 1
- 1.13 Cloud Benefits
- 1.14 Cloud FinOps
- 1.15 Cloud Cost Models
- 1.16 Cloud Architecture Part 1 Fundamentals
- 1.17 Cloud Architecture Part 2 Whiteboards
- 1.18 Why use one Cloud over another
- 1.19 Multi Cloud and Hybrid Cloud
- 1.20 Application Modernization
- 1.21 Whiteboarding Best Practices
- 1.22 Business Requirement Mapping
- 1.23 Free Tier and Credits
- 1.24 Cloud VMS
- 1.25 Serverless
- 1.26 Containers
- 1.27 Shared Responsibility Model
- 1.28 Cloud Compliance
- 1.29 Infrastructure as Code (IaC)
- 1.30 DevOps
- 1.31 Development Integration
- 1.32 Cloud Native
- 1.33 Coaching
- 1.34 Interview Questions Practice Exercise – Cloud Computing
- 1.35 Interview Questions Practice Exercise – Cloud Native
- 1.36 Interview Questions Practice Exercise – Cloud Architecture
- 1.37 Interview Preparation
- 1.38 Interview Preparation Exercise
- 1.39 Course Review Questions
- 1.40 Resources and Closeout
Module 1: Core Concepts of Leadership
- 1.1 – Understanding Leadership vs. Management
- 1.2 The Importance of Leadership in Administrative Roles
- 1.3 The Role of Influence Without Authority
Module 2: Developing Personal Leadership Skills
- 2.1 Self-Assessment with SWOT
- 2.2 Identifying and Leveraging Personal Strengths
- 2.3 Recognizing Weaknesses and Overcoming Threats
- 2.4 Enhancing Emotional Intelligence
Module 3 – Communication and Building Trust
- 3.1 Essential Communication Skills for Leaders
- 3.2 Building Credibility and Trust
- 3.3 Course Closeout
Module 1: Performing Basic Linux Tasks
- 1.1 Introduction to Linux XK0-005
- 1.2 Instructor Introduction
- 1.3 Course Introduction
- 1.4 Identify the Linux Design Philosophy
- 1.5 Enter Shell Commands
- 1.6 Shell Commands Activity
- 1.7 Get Help with Linux
Module 2: Managing Users and Groups
- 2.1 Assume Superuser Privileges
- 2.2 Create, Modify, and Delete Users
- 2.3 Create, Modify, and Delete Groups
- 2.4 Query Users and Groups
- 2.5 Configure Account Profiles
Module 3: Managing Permissions and Ownership
- 3.1 Modify File and Directory Permissions
- 3.2 Modify File and Directory Ownership
- 3.3 Configure Special Permissions and Attributes
- 3.4 Troubleshoot Permissions Issues
Module 4: Managing Storage
- 4.1 Create Partitions
- 4.2 Manage Logical Volumes
- 4.3 Mount File Systems
- 4.4 Manage File Systems
- 4.5 Navigate the Linux Directory Structure
- 4.6 Troubleshoot Storage Issues
- 4.7 Container Storage Management
- 4.8 Advanced Data Management and Security for Containers
Module 5: Managing Files and Directories
- 5.1 Create and Edit Text Files
- 5.2 Search for Files
- 5.3 Perform Operations on Files and Directories
- 5.4 Process Text Files
- 5.5 Manipulate File Output
Module 6: Managing Kernel Modules
- 6.1 Explore the Linux Kernel
- 6.2 Install and Configure Kernel Modules
- 6.3 Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- 7.1 Configure Linux Boot Components
- 7.2 Configure GRUB
Module 8: Managing System Components
- 8.1 Configure Localization Options
- 8.2 Configure GUIs
- 8.3 Manage Services
- 8.4 Troubleshoot Process Issues
- 8.5 Troubleshoot CPU and Memory Issues
- 8.6 – Troubleshooting With systemd
Module 9: Managing Devices
- 9.1 Identify the Types of Linux Devices
- 9.2 Configure Devices
- 9.3 Monitor Devices
- 9.4 Troubleshoot Hardware Issues
Module 10: Managing Networking
- 10.1 Identify TCP-IP Fundamentals
- 10.2 Identify Linux Server Roles
- 10.3 Connect to a Network
- 10.4 Configure DHCP and DNS Client Services
- 10.5 Configure Cloud and Virtualization Technologies
- 10.6 Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- 11.1 Identify Package Managers
- 11.2 Manage RPM Packages with YUM
- 11.3 Manage Debian Packages with APT
- 11.4 Configure Repositories
- 11.5 Acquire Software
- 11.6 Build Software from Source Code
- 11.7 Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- 12.1 Implement Cybersecurity Best Practices
- 12.2 Implement Identity and Access Management Methods
- 12.3 Configure SELinux or AppArmor
- 12.4 Configure Firewalls
- 12.5 Implement Logging Services
- 12.6 Back Up, Restore, and Verify Data
- 12.7 NFTables – Setting Up Advanced Firewalls
Module 13: Working with Bash Scripts
- 13.1 Customize the Bash Shell Environment
- 13.2 Identify Scripting and Programming Fundamentals
- 13.3 Write and Execute a Simple Bash Script
- 13.4 Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- 14.1 Schedule Jobs
- 14.2 Implement Version Control Using Git
- 14.3 Identify Orchestration Concepts
Module 15: Installing Linux
- 15.1 Prepare for Linux Installation
- 15.2 Perform the Installation
Module 16 – Working With Modern IT Infrastruture
- 16.1 – Infrastruture As Code (IAC)
- 16.2 – Containers, Cloud, and Orchestration Concepts
- 16.3 – Container Management
- 16.4 – Container and Cloud Networking Basics
Course Introduction – How to break into a Technology Career
- 01 Introduction to the Course
- 02 Instructor Introduction
Module 1: Tech Career Development Fundamentals
- 1.1 Tech Career Development Fundamentals
- 1.2 Understanding the Tech Industry
- 1.3 Discussion – Why Consider Tech as a Career
- 1.4 Exploring Tech Career Paths and Specializations
- 1.5 Creating a Career Roadmap
Module 2: Building a Strong Foundation
- 2.1 Building a Strong Foundation
- 2.2 Mastering Tech Tools and Technologies
- 2.3 Developing Proficiency in Programming Languages
- 2.4 Enhancing Problem-Solving Skills for Tech Professionals
Module 3: Personal Branding and Professional Presence
- 3.1 Personal Branding and Professional Presence
- 3.2 Crafting your Tech Personal Brand Story
- 3.3 Building an Impressive Tech Portfolio and Projects Showcase
- 3.4 Demonstration – GitHub
- 3.5 Leveraging Tech Networks and Communities for Career Growth
- 3.6 Demonstration – LinkedIn Profile
- 3.7 Discussion – Meetups
- 3.8 Demonstration – Stackoverflow
Module 4: Job Search and Application Strategies
- 4.1 Job Search and Application Strategies
- 4.2 Creating and Outstanding Tech Resume
- 4.3 Crafting Tailored Cover Letters for Tech Positions
- 4.4 Navigating Tech Job Boards and Industry Resources
- 4.5 Demonstration – Job Search LinkedIn
Module 5: Tech Interview Preparation and Techniques
- 5.1 Tech Interview Preparation and Techniques
- 5.2 Understanding Different Types of Tech Interviews
- 5.3 Preparing for Technical Interview Challenges
- 5.4 Mastering Behavioral Interviews using the STAR Technique
Module 6: Advancing Your Tech Career
- 6.1 Advancing Your Tech Career
- 6.2 Negotiating Job Offers and Tech Salary Packages
- 6.3 Excelling in the Tech Workplace- Communication and Collaboration
- 6.4 Creating a Personalized Tech Career Development Plan
- 6.5 Cloud InterviewACE
- 6.6 CCPSA
- 6.7 Resources
- 6.8 Course Closeout
Module 1 – Key Elements of The FinOps Framework
- 1.1 – Introduction to FinOps
- 1.2 – Overview of the FinOps Framework
- 1.3 – The FinOps Lifecycle Phases
- 1.4 – The FinOps Principles
- 1.5 – Collaboration and Accountability in FinOps
- 1.6 – FinOps Persona and Allied Personas
- 1.7 – FinOps Domains Overview
Module 2 – FinOps Domain: Cloud Usage & Cost
- 2.1 – Understand Cloud Usage & Cost Introduction
- 2.2 – Data Ingestion
- 2.3 – Cost Allocation
- 2.4 – Reporting & Analytics
- 2.5 – Anomaly Management
Module 3 – FinOps Domain: Quantify Business Value
- 3.1 – Introduction to the Quantify Business Value
- 3.2 – Planning & Estimating
- 3.3 – Forecasting
- 3.4 – Budgeting
- 3.5 – Benchmarking
Module 4 – FinOps Domain: Optimize Cloud Usage & Cost
- 4.1 – Optimizing Cloud Usage and Costs Introduction
- 4.2 – Architecting for the Cloud
- 4.3 – Rate Optimization
- 4.4 – Workload Optimization
- 4.5 – Cloud Sustainability
- 4.6 – Licensing and SaaS
Module 5 – FinOps Domain: Manage the FinOps Practice
- 5.1 – Manage the FinOps Practice Overview
- 5.2 – FinOps Practice Operations
- 5.3 – Cloud Policy & Governance
- 5.4 – FinOps Assessment
- 5.5 – FinOps Tools & Services
- 5.6 – FinOps Education and Enablement
- 5.7 – Invoicing and Chargeback
- 5.8 – Onboarding Workloads
- 5.9 – Intersecting Disciplines
Module 6 – FinOps FOCUS
- 6.1 – Introduction to FinOps FOCUS
- 6.2 – Implementing FinOps FOCUS for AWS, Google Cloud, and Microsoft Azure
Module 7 – FinOps Certifications and Course Closeout
- 7.1 – Exploring the FinOps Certifications
- 7.2 – Course Closeout and Next Steps
Course Introduction – AI in Talent Management
- 01 Course Introduction
- 02 Instructor Introduction
Module 1: Introduction to AI in Talent Management
- 1.1 Introduction to AI in Talent Management
- 1.2 Understanding AI in Talent Management
- 1.3 Leveraging AI for Candidate Sourcing
- 1.4 Ethical Considerations of AI in Hiring
Module 2: AI-Powered Sourcing and Screening
- 2.1 AI-Powered Sourcing and Screening
- 2.2 AI-driven Candidate Search Engines
- 2.3 Demonstration RecruiterGPT
- 2.4 Automated Resume Screening and Skills Assessment
- 2.5 Whiteboard – Workflow – How Resume Screening Works
- 2.6 Chatbots and Conversational AI in Recruitment
Module 3: AI-Enhanced Interviewing and Selection
- 3.1 AI-Enhanced Interviewing and Selection
- 3.2 Video Interviews and Behavioral Analytics
- 3.3 Predictive Analytics and Hiring Decisions
- 3.4 Explainable AI and Building Trust in Hiring
Module 4: AI-Powered Upskilling and Development
- 4.1 AI-powered Upskilling and Development
- 4.2 Identifying Skills Gaps and Upskilling Needs
- 4.3 Personalized Learning and AI-powered Learning Platforms
- 4.4 Microlearning and Adaptive Learning with AI
Module 5: Implementing AI in Your Talent Acquisition Strategy
- 5.1 Implementing AI in Your Talent Acquisition Strategy
- 5.2 Evaluating AI Solutions for Your Organization
- 5.3 Integrating AI with Existing Talent Acquisition Processes
- 5.4 Change Management and Building a Culture of AI in Recruitment
Module 6: The Future of AI in Talent Management
- 6.1 The Future of AI in Talent Acquisition
- 6.2 Emerging Trends and Innovations in AI-powered Talent Acquisition
- 6.3 Building a Sustainable Talent Pipeline with AI
- 6.4 The Enduring Role of Humans in Talent Management
- 6.5 Course Summary
- 6.6 Course Closeout
Module 1 – Overview of Privileged Access Management (PAM)
- 1.1 – Your Complete PAM Solution
- 1.2 – Overview of CyberArk
Module 2 – CyberArk Architecture and Componets
- 2.1 – CyberArk Architecture Overview
- 2.2 – CyberArk Deployment Models
Module 3 – Working With The CyberArk Vault
- 3.1 – The CyberArk Digital Vault
- 3.2 Managing Users and Permissions
Module 4 – Privileged Account Management
- 4.1 Add and Managing PAM Accounts
- 4.2 – Password Rotation and Policy Management
Module 5 – Monitoring and Session Management
- 5.1 – Using the Privileged Session Manager (PSM)
- 5.2 – Session Monitoring and Reporting
Module 6 – Security Best Practices
- 6.1 – CyberArk Hardening and Best Practices
- 6.2 – Incident Reponse With CyberArk
Module 7 – Use Cases, Certification & Closeout
- 7.1 – Real World Use Cases of CyberArk
- 7.2 – CyberArk Certification Paths
- 7.3 – CyberArk Fundamentals Course Closeout
Introduction To AI For Business Professionals
- 01 Course Welcome
- 02 Instructor Introduction
- 03 Download Course Resources
Module 1 – Introduction to AI in Business
- 1.1 Introduction to AI in Business
- 1.2 Understanding the Basics of AI
- 1.3 Exploring the Role of AI in Business
- 1.4 Identifying the Benefits of AI in Business
- 1.5 Whiteboard – How Does AI Actually Work?
- 1.6 Demonstration – Google Bard AI
Module 2 – Implementing AI in Business
- 2.1 Implementing AI in Business
- 2.2 Preparing Your Business for AI Integration
- 2.3 Whiteboard AI Strategy
- 2.4 Identifying the Best AI Tools for Your Business
Module 3 – AI for Marketing and Sales
- 3.1 Demonstration – Hacksocial AI
- 3.2 How AI Can Help Your Marketing and Sales Efforts
- 3.3 Exploring AI-Driven Customer Insights and Targeting
- 3.4 Examples AI Sales Tools in 2023
- 3.5 Optimizing Your Marketing and Sales Strategies with AI
- 3.6 Demonstration – RegieAI Sales Workflows
Module 4 – AI Applications in Human Resources
- 4.1 AI Applications in Human Resources
- 4.2 Using AI for Talent Acquisition and Recruitment
- 4.3 Optimizing Performance Management with AI
- 4.4 Enhancing Employee Engagement with AI
- 4.5 Whiteboard – Resume Filtering with AI
Module 5 – AI for Operations and Supply Chain Managemen
- 5.1 AI for Operations and Supply Chain Management
- 5.2 How AI Can Improve Your Operations and Supply Chain Management
- 5.3 Exploring AI-Driven Predictive Maintenance and Quality Control
- 5.4 Optimizing Your Operations and Supply Chain Strategies with AI
Module 6 – AI for Finance and Accounting
- 6.1 AI for Finance and Accounting
- 6.2 How AI Can Streamline Your Finance and Accounting Processes
- 6.3 Exploring AI-Driven Fraud Detection and Risk Management
- 6.4 Personal Finance AI Applications
- 6.5 Optimizing Your Finance and Accounting Strategies with AI
- 6.6 Demonstration – Using Bing AI Chatbot for Personal Finance
Module 7 – The Future of AI in Business
- 7.1 The Future of AI in Business
- 7.2 Latest Developments in AI Technology
- 7.3 Implications of AI for Business and Society
- 7.4 Discussion – Developing an AI Strategy
Module 8 – Course Closeout
- 8.1 Course Closeout
- 8.2 Course Review
- 8.3 Course Closeout
Introduction To CompTIA Data+
- Course Welcome
- Module Overview
- Instructor Introduction
- What is the CompTIA Data Plus Exam
- Roles that should consider the exam
- Exam Objectives
- Discussion – The Importance of Data
- US DOD Member Data Directives and 8570
Module 1 – Data Concepts and Environments
- 1.1 Module Overview
- 1.2 Understanding Data Schemes
- 1.3 Databases
- 1.4 Demonstration – Google Cloud SQL
- 1.5 Data Warehouses and Data Lakes
- 1.7 Comparing OLTP and OLAP Processing
- 1.8 Demonstration – AWS Redshift
- 1.9 Demonstration – Deploy SQL DemoBench
- 1.10 What is Column Database
- 1.11 Data Structures, Files and Types
- 1.12 Module Summary Review
- 1.13 Module Review Questions
Module 2 – Data Mining
- 2.1 Module 2 Overview
- 2.2 Data Acquisition and Integration
- 2.3 Demonstration – Data Integration Techniques
- 2.4 API Fundamentals
- 2.5 Demonstration – Google Vision API
- 2.6 Data Profiling and Cleansing
- 2.7 Data Collection Method Options
- 2.8 Data Outliers
- 2.9 Understanding ETL and ELT
- 2.10 Query Optimization
- 2.11 Understanding Data Manipulation Techniques
- 2.12 Module Summary Review
- 2.13 Module Review Questions
Module 3 – Data Analysis
- 3.1 Module Overview
- 3.2 Descriptive Statistical Methods
- 3.3 Measures of Tendency and Dispersion
- 3.4 Understanding Percentages
- 3.5 Inferential Statistical Methods
- 3.6 Hypothesis Testing with Excel
- 3.7 Whiteboard – Linear Regression and Correlation
- 3.8 Whiteboard – Analysis Testing
- 3.9 Module Summary Review
- 3.10 Module Review Questions
Module 4 – Data Visualization
- 4.10 Module Review Questions
- 4.1 Module Overview
- 4.2 Translate Business Requirements to Reports
- 4.3 Whiteboard – Translate Business Requirements
- 4.4 Dashboard Fundamentals
- 4.5 Demonstration – Dashboard Components
- 4.6 Data Sources and Attributes
- 4.7 Understanding Chart and Graphs
- 4.8 Reports Type and Elements
- 4.9 Module Summary Review
Module 5 – Data Governance, Quality and Controls
- 5.1 Module Overview
- 5.2 Introduction to Data Governance
- 5.3 The Data Lifecycle
- 5.4 Determining Data Classification
- 5.5 Data Ownership
- 5.6 Data Storage Access
- 5.7 Data Privacy and Frameworks
- 5.8 Information Rights Management (IRM) and Data Loss Prevention (DLP)
- 5.9 Setting Data Quality Control
- 5.10 Methods to Validate Quality
- 5.11 Data Transformation Tools
- 5.12 Data Security Fundamentals
- 5.13 Master Data Management (MDM)
- 5.14 Module Summary Review
- 5.15 Module Review Questions
Module 6 – Exam Preparation and Practice Exams
- 6.1 Module Overview
- 6.2 Course Summary Review
- 6.3 Data Plus Exam Experience
- 6.4 Certification CEU Requirements
- 6.5 Practice Exams-Additional Resources
- 6.6 Course Closeout
Module 1 – Introduction and Security Concepts
- Certification Overview
- Exam Objectives
- Instructor Introduction
- ISC CiC Course Intro
- 1.0 Module 1 Overview
- 1.1.5 Password Security
- 1.1.6 Whiteboard – Multifactor Authentication (MFA)
- 1.2 Understand the risk management process
- 1.2.1 Risk Management
- 1.2.2 Risk Identification assessment and treatment
- 1.3 Understand security controls
- 1.3.1 Technical Controls
- 1.3.2 Administrative Controls
- 1.3.3 Physical Controls
- 1.3.4 Whiteboard Discussion – Controls-
- 1.3.5 Demonstration – AWS Access Controls
- 1.4 – Understand ISC2 Code of Ethics
- 1.4.1 Professional Code of Ethics
- 1.5 Understand Governance processes
- 1.5.1 Standards, Regulations, etc
- 1.5.2 Security Policies
- 1.5.3 Module Summary Review
- 1.5.4 Module Review Questions
Module 2 – Incident Response, Business Continuity and Disaster Recovery Concepts
- 2.0 Module 2 Overview
- 2.1 Understand Business Continuity
- 2.1.1 Business Continuity
- 2.1.2 Components of a Business Continuity Plan
- 2.2.1 Disaster Recovery
- 2.2.2 RTO-RPO
- 2.3 Understand Business Response
- 2.3.1 Incident Response
- 2.3.2 Post Incident Review
- 2.3.3 Module Summary Review
- 2.3.4 Module Review Questions
Module 3 – Access Control Concepts
- 3.0 Module 3 Overview
- 3.1 Understand physical access controls
- 3.1.1 Defense In Depth
- 3.1.2 Compare Physical Control Types
- 3.1.3 Monitoring Controls
- 3.2 Describe logical access controls
- 3.2.1 Logical Access controls
- 3.2.2 Principle of least privilege
- 3.2.3 Segregation of duties
- 3.2.4 Whiteboard – Access Control
- 3.2.5 Demonstration – Cloud IAM Sequence 32
- 3.2.6 Module Summary Review
- 3.2.7 Module Review Questions
Module 4- Network Security
- 4.0 Module 4 Overview
- 4.1 Understanding computer networking
- 4.1.1 Network Security Design
- 4.1.2 Whiteboard – Networking Concepts
- 4.1.3 Networking protocols and ports
- 4.1.4 Demonstration – AWS VPC
- 4.2 Understand Network Threats
- 4.2.1 Types of network (cyber) threats and attacks
- 4.2.2 Threat Actors
- 4.2.3 Tools used to identify and prevent threats
- 4.2.4 Whiteboard Discussion – DDoS attacks
- 4.3 Network Security Infrastructure
- 4.3.1 On Premises Architecture
- 4.3.2 Data Center Design Discussion
- 4.3.3 Cloud Architecture Service and Deployment Models
- 4.3.4 Managed Service Providers
- 4.3.5 Service Level Agreements (SLA)
- 4.3.6 Shared Security Model
- 4.3.7 Zero Trust
- 4.3.8 Module Summary Review
- 4.3.9 Module Review Questions
Module 5 – Security Operations
- 5.0 Module 5 Overview
- 5.1 Understand Data Security
- 5.1.1 Data Security Fundamentals
- 5.1.2 Data Handling Best Practices
- 5.1.3 Encryption
- 5.1.4 Data Security Compliance
- 5.2 Understand System Hardening
- 5.2.1 System Hardening
- 5.2.2 Configuration Management
- 5.3 Understanding Best Practice Security Policies
- 5.3.1 Common Security Policies
- 5.3.2 Demonstration – AUP
- 5.3.3 Demonstration – Privacy Policy
- 5.4 Security Awareness Training
- 5.4.1 Importance of Security Awareness Training
- 5.4.2 Social Engineering
- 5.4.3 Module Summary Review
- 5.4.4 Module Review Questions
- 5.4.5 Next Steps and Course Closeout
Module 1 – Introduction To Windows Server 2022
- 1.1 – Windows Server 2022 Overview
- 1.2 – Preparing for Installation
Module 2 – Installation of Windows Server 2022
- 2.1 – Installation Methods for Windows Server 2022
- 2.2 – Performing A Clean Install
- 2.3 – Post-Installation Configurations
Module 3 – Server Roles and Features
- 3.1 – Server Roles and Features
- 3.2 – Installing Active Directory
- 3.3 – Verify and Update DNS Settings
- 3.4 – Installing DHCP
- 3.5 – Installing IIS
- 3.6 – Power of Hyper-V on Windows Server 2022
- 3.7 – Other Common Server Roles & Services
Module 4 – Deployment Tools
- 4.1 – Deployment Techniques
- 4.2 – Deploying Windows Server 2022 Using Windows Deployment Services (WDS)
- 4.3 – Using Microsoft Deployment Toolkit (MDT)
- 4.4 – SCCM Deployment
Module 5: Security and Maintenance
- 5.1 – Securing Windows Server 2022
- 5.2 – Managing Updates and Patches
- 5.3 – Monitoring and Performance Tuning
- 5.4 – Backup and Recovery
- 5.5 – Regular Maintenance Task
Module 6: Integrating Windows Server 2022 with Azure
- 6.1 – Integrating Windows Server 2022 with Azure
- 6.2 – Course Closeout
Module 1 – Understanding Cyber Threats
- 1.1 – Welcome to Essential Cybersecurity 101
- 1.2 – 5 Cyber Threats and How to Stay Safe
Module 2 – Defending Against Cyber Attacks
- 2.1 – Defending Against Ransomware
- 2.2 – Phishing Attack Awareness
Module 3 – Securing Your Digital Environment
- 3.1 – Securing Your Home Network
- 3.2 – Best Practices for Securing Work-from-Home Devices and Data
Module 4 – The Human Element of Cybersecurity
- 4.1 – Understanding Social Engineering
- 4.2 – Protecting Your Digital Identity
Module 5 – The Role of AI in Cybersecurity
- 5.1 – AI Powered Threat Detection and Prevention
- 5.2 – AI in Cybersecurity Incident Response and Fraud Detection
Module 1 – IT Concepts and Terminology
- 1.1 – Introduction to Tech+
- 1.2 – Understanding Notational Systems
- 1.3 – The Basics of Computing
- 1.4 – Comparing Units of Measure
- 1.5 – Troubleshooting Methodology, Cases and Tips
Module 2 – Infrastructure
- 2.1 – Introduction to Infrastructure
- 2.2 – Types of Computing Devices
- 2.3 – Internal Components of A Computer
- 2.4 – Types of Storage
- 2.5 – Peripheral Devices and Installation
- 2.6 – Virtualization and Cloud Technologies
- 2.7 – Common Internet Service Types
Module 3 – Networking Fundaments
- 3.1 – Introduction to Networking
- 3.2 – Core Principles of Computer Networking
- 3.3 – Network Ports
- 3.4 – Network Addresses and Identifiers
- 3.5 – Network Models and Types
- 3.6 – Networking Devices and Connectors
- 3.7 – Small Wireless Networks
Module 4 – Operating Systems
- 4.1 Introduction to Operating Systems (OS)
- 4.2 – What is an Operating System
- 4.3 – Drivers, Applications, Tasks and System Services
- 4.4 – File and Disk Management
- 4.5 – Backup and Recovery
Module 5 – Software and Applications
- 5.1 – Common Software Applications
- 5.2 – Productivity Software
- 5.3 – Business and Enterprise Software
- 5.4 – Manging Software
- 5.5 – Trusted Software Sources
Module 6 – Web Browsing, Configuration & Security
- 6.1 – Introduction To Web Browsing
- 6.2 – Browser Settings, Configuration and Maintenance
- 6.3 – Secure Web Browsing
- 6.4 – Protecting Your Privacy
Module 7 – Software Development Concepts
- 7.1 – Introduction to Programming
- 7.2 – Programming Tools
- 7.3 – Programming Organization and Logic Flows
- 7.4 – Understanding Programming Language Categories
- 7.5 – Code Maintenance, Version Control Systems and Branching
- 7.6 – Fundamental Data Types and Their Characteristics
Module 8 – Data and Database Fundamentals
- 8.1 – Introduction to Databases and the Value of Data
- 8.2 – Database Concepts and Structures
- 8.3 – Working with Relational Databases
- 8.4 – Database Operations and Access
- 8.5 – Database Backup and Recovery
Module 9 – Security: Keeping Things Safe
- 9.1 – Basic Security Concepts and Strategies
- 9.2 – Identifying Common Security Threats
- 9.3 – Securing Devices and Networks
- 9.4 – Security Tools and Software
- 9.5 – Encryption and Data Protection
Module 10 – AI Uses and Impact
- 10.1 – The Impact and Use of AI
- 10.2 – Course Closeout
Module 1: CCNA 200-301 v1.1 Network Fundamentals
- 1.1 Intro to Networking
- 1.2 OSI Model
- 1.3 TCP-IP
- 1.4 Network Components
- 1.5 Network Topology
- 1.6 Copper Cable Types
- 1.7 Fiber Optic Cable Types
- 1.8 Virtualization Fundamentals
- 1.9 Review
Module 2: CCNA 200-301 v1.1 Network Device Management
- 2.1 Connecting to a Cisco Device
- 2.1.1 ACTIVITY – Intro to Packet Tracer
- 2.2 Basic Cisco Commands
- 2.2.1 ACTIVITY – Navigating the CLI
- 2.3 Configuring for Connectivity
- 2.3.1 ACTIVITY – Configuring a Router Interface
- 2.3.2 ACTIVITY – Making a Remote Telnet Connection
- 2.3.3 ACT – Making a Remote SSH Connection
- 2.4 Neighbor Discovery
- 2.4.1 ACT – Discovering Neighbors
- 2.5 Basic Troubleshooting
- 2.6 Review
Module 3: CCNA 200-301 v1.1 Switching
- 3.1 Ethernet Basics
- 3.2 Switching Overview
- 3.2.1 ACTIVITY – Setting Up a Simple Switched Network
- 3.3 Spanning-Tree Protocol
- 3.4 Rapid PVST+
- 3.5 VLANs
- 3.6 VLAN Trunking Protocol
- 3.6.1 ACTIVITY – Creating Trunk Links
- 3.7 VLAN Trunking Protocol (VTP)
- 3.8 VLAN Routing
- 3.8.1 ACTIVITY – Configuring the VLAN 1 Interface on a Switch
- 3.8.2 ACTIVITY – Routing Between VLANs
- 3.9 Switchport Configuration
- 3.9.1 ACTIVITY – Configuring Voice and Data VLANs
- 3.10 EtherChannel
- 3.10.1 ACTIVITY – Bundling Links into an EtherChannel
- 3.11 Review
Module 4: CCNA 200-301 v1.1 Internet Protocol (IP)
- 4.1 IPv4 Basics
- 4.2 IP Packet and Interface Types
- 4.3 Binary Numbering System
- 4.4 Classful and Classless Addressing
- 4.5 IPv4 Subnetting
- 4.5.1 ACTIVITY – Moving the Subnet Mask
- 4.6 Subnetting in Other Octets
- 4.6.1 ACTIVITY – Subnetting
- 4.6.2 ACTIVITY – Subnetting by Host Requirements
- 4.6.3 ACTIVITY – Grouping Hosts into Subnets
- 4.7 Supernetting
- 4.7.1 ACTIVITY – Supernetting
- 4.8 IPv6
- 4.9 Review
Module 5: CCNA 200-301 v1.1 Routing
- 5.1 Introducing the Route
- 5.2 Routing Basics
- 5.3 Packet Delivery on the Same Network
- 5.4 IP Routing Across a Single Router
- 5.4.1 ACTIVITY – Configuring Basic Routing
- 5.5 IP Routing Across Multiple Routers
- 5.5.1 ACTIVITY – Configuring IPv4 Static Routes
- 5.5.2 ACTIVITY – Adding Special Static Routes
- 5.6 Routing Protocols Overview
- 5.7 Route Selection
- 5.8 Open Shortest Path First (OSPF)
- 5.8.1 ACTIVITY – Deploying Single Area OSPF
- 5.9 First Hop Redundancy Protocol (FHRP)
- 5.10 Network Address Translation (NAT)
- 5.10.1 ACTIVITY – Implementing Static NAT
- 5.10.2 ACTIVITY – Using a NAT Pool
- 5.10.3 ACTIVITY – Configuring PAT
- 5.11 Review
Module 6: CCNA 200-301 v1.1 IP Services
- 6.1 Remote Control
- 6.2 File Transfer
- 6.3 Monitoring
- 6.4 Infrastructure
- 6.4.1 ACTIVITY – Implementing a DHCP Relay
- 6.5 Quality of Service
- 6.6 Review
Module 7: CCNA 200-301 v1.1 Wireless
- 7.1 Wi-Fi Principles
- 7.2 Cisco Wireless Architectures
- 7.3 WLC Configuration
- 7.3.1 ACT – Configuring a WLAN
- 7.4 Review
Module 8: CCNA 200-301 v1.1 Security Fundamentals
- 8.1 Intro to Security
- 8.2 Local Device Access Control
- 8.3 Protecting Privileged EXEC Mode
- 8.4 Password Management
- 8.5 Local User
- 8.6 Password Recovery
- 8.6.1 ACTIVITY – Password Recovery
- 8.7 Remote Access
- 8.8 Access Control List (ACL)
- 8.8.1 ACTIVITY – Deploying a Standard ACL
- 8.8.2 ACTIVITY – Deploying an Extended ACL
- 8.9 DHCP Snooping
- 8.10 Dynamic ARP Inspection (DAI)
- 8.11 Layer 2 Port Security
- 8.11.1 ACTIVITY – Securing Layer 2 Ports
- 8.12 Authentication, Authorization and Accounting (AAA)
- 8.13 Wireless Security
- 8.14 Review
Module 9: CCNA 200-301 v1.1 Automation and Programmability
- 9.1 Network Automation Overview
- 9.2 Software Defined Networks
- 9.3 JSON
- 9.4 REST APIs
- 9.5 Management Mechanisms
- 9.6 AI in Network Operations
- 9.7 Review
Module 1: Preparing for and Taking the PMI PMP v7 Exam
- 1.1 Preparing to Take the PMP v7 Exam From PMI
- 1.2 PMI PMP v7 Exam Characteristics
Module 2: Process Domain – PMI – PMP v7
- 2.1 What’s New in PMBOK 7
- 2.1.1 Performance Domains
- 2.2 Process Domain and Framework defined
- 2.3 Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- 2.4 Framework Definitions
- 2.5 Project Manager Skills
- 2.6 Framework Key Points to Remember
- 2.6.1 Framework Key Points to Remember -Incorporating Agile
- 2.7 Framework Example Questions Review
- 2.8 Project Integration Management Knowledge Area Defined
- 2.9 Develop Project Charter and Develop Project Management Plan
- 2.10 Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- 2.11 Perform Integrated Change Control
- 2.12 Close Project or Phase
- 2.13 Integration Key Points to Remember
- 2.13.1 Integration Key Points to Remember – Incorporating Agile
- 2.14 Integration Example Questions Review
- 2.15 Project Scope Management Knowledge Area Defined
- 2.16 Plan Scope Management and Collect Requirements
- 2.17 Define Scope and Create WBS
- 2.18 Breakdown Structures used in WBS Dictionary
- 2.19 Validate Scope and Control Scope
- 2.20 Defining Requirements in Agile
- 2.21 Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- 2.22 Scope Key Points to Remember
- 2.22.1 Scope Key Points to Remember – Incorporating Agile
- 2.23 Scope Example Questions Review
- 2.24 Project Schedule Management Knowledge Area Defined
- 2.25 Plan Schedule Management, Define Activities, and Sequence Activities
- 2.26 Dependencies, Predecessors, Leads, and Lags
- 2.27 Estimate Activity Durations
- 2.28 Develop Schedule
- 2.29 Critical Path Method
- 2.30 Schedule Compression
- 2.31 Resource Leveling, Schedule Format, and Control Schedule
- 2.32 Agile Estimating
- 2.33 Agile Schedule Planning and Reporting
- 2.34 Schedule Key Points to Remember and Example Question review
- 2.35 Project Cost Management Knowledge Area Defined
- 2.36 Plan Cost Management and Estimate Cost
- 2.37 Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- 2.38 Life Cycle Costing, Status Reporting, and Determine Budget
- 2.39 Control Costs, and Earned Value Management
- 2.40 Earned Schedule, and Agile Cost Control
- 2.41 Cost Key Points to Remember
- 2.41.1 Cost Key Points to Remember – Incorporating Agile
- 2.42 Cost Example Questions Review
- 2.43 Project Quality Management Knowledge Area Defined
- 2.44 Plan Quality Management
- 2.45 Manage Quality
- 2.46 Control Quality
- 2.47 Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
- 2.48 Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
- 2.49 Quality Key Points to Remember
- 2.49.1 Quality Key Points to Remember – Incorporating Agile
- 2.50 Quality Example Questions Review
- 2.51 Project Risk Management Knowledge Area Defined
- 2.52 Risk Management Plan and Identify Risks
- 2.53 Risk Register and Issues Vs Risk
- 2.54 Perform Qualitative and Quantitative Risk Analysis
- 2.55 Plan Risk Responses
- 2.56 Implement Risk Responses and Monitor Risks
- 2.57 Agile Risk Tools and Risk Key Points to Remember
- 2.57.1 Agile Risk Tools and Risk Key Points to Remember – Incorporating Agile
- 2.58 Risk Example Questions Review
- 2.59 Project Procurement Management Knowledge Area Defined
- 2.60 Plan Procurement Management and Conduct Procurements
- 2.61 Contracts
- 2.62 Share and Point of Total Assumption
- 2.63 Procurement Documents
- 2.64 Non-Competitive Awards and Control Procurements
- 2.65 Agile Contracts
- 2.66 Procurement Key Points to Remember and Example Questions Review
- 2.66.1 Procurement Key Points to Remember – Incorporating Agile
Module 3: People Domain – PMI – PMP v7
- 3.1 People Domain and Project Communications Management Knowledge Area Defined
- 3.2 Plan Communications Management
- 3.3 Manage and Monitor Communications
- 3.4 Agile Communications
- 3.5 Communications Key Points to Remember
- 3.6 Communications Example Question Review
- 3.7 Project Stakeholder Management Knowledge Area Defined
- 3.8 Stakeholder Position Descriptions
- 3.9 Identify Stakeholders
- 3.9.1 Identify Stakeholders – Incorporating Agile
- 3.10 Plan Stakeholder Engagement and Manage Stakeholder Engagement
- 3.11 Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- 3.12 Stakeholder Management Key Points to Remember
- 3.12.1 Stakeholder Management Key Points to Remember – Incorporating Agile
- 3.13 Stakeholder Management Example Question Review
- 3.14 Resource Management Knowledge Area Defined
- 3.15 Plan Resource Management and Estimate Activity Resources
- 3.16 Acquire Resources and Develop Team
- 3.17 Manage Team
- 3.17.1 Manage Team – Focus on Servant Leadership
- 3.18 Control Resources and Agile Teaming Concepts
- 3.19 Other Agile Teaming Concepts
- 3.20 Agile team roles and challenges
- 3.21 Resources Key Points to Remember
- 3.22 Resources Example Question Review
Module 4: Business Environment Domain – PMI – PMP v7
- 4.1 Business Environment Domain Defined
- 4.1.1 Business Environment Domain Defined – Focus on Organization Chnge Management
- 4.2 Project Selection Tools
- 4.3 PMO, Organizational Structure, and Reports
- 4.3.1 PMO, Organizational Structure and Reports – Matching PMO's to PMBOK Terms
- 4.4 Agile in the Business Environment
- 4.5 Business Environment Key Points to Remember and Example Question Review
- 4.6 Test Taking Tips and Techniques for PMI PMP v7
- 4.6.1 Question Formats for PMI PMP v7
- 4.6.2 Post Certification Requirements for PMI PMP
- 4.7 Course Closing
Module 1 – Introduction to AI and Data Privacy
- 1.1 Introduction to AI and Data Privacy
- 1.2 The relationship Between AI and Data Privacy
Module 2 – How AI Technologies Handle and Protect Data
- 2.1 How AI Technology Handle and Protects Data
- 2.2 Real World Examples of AI Systems with Robust Privacy Measures
Module 3 – Understanding the Risks of AI and Data Privacy
- 3.1 Understanding the Risks of AI and Data Protection
- 3.2 Real World Cases Where AI Systems Mishandled Personal Data
Module 4 – Regulations & Best Practices for Ethical AI Data Privacy
- 4.1 Regulations and Legal Frameworks for AI and Data
- 4.2 Best Practices for Ethical AI Data Privacy
- 4.3 – Role of Governments and Organizations in E
- 4.4 – Recap and Course Closeout
Module 1 – Introduction to SDLC
- 1.1 – Definition and Purpose of SDLC
- 1.2 – Overview of the SDLC Process
Module 2 – Phases of the SDLC
- 2.1 – Requirement Gathering and Analysis
- 2.2 – Planning Phase
- 2.3 – Design Phase
- 2.4 – Development Phase
- 2.5 – Testing Phase
- 2.6 – Deployment Phase
- 2.7 – Maintenance Phase
Module 3 – SDLC Methodologies
- 3.1 – Waterfall Methodology
- 3.2 – Agile Methodology
- 3.3 – Lean Methodology
- 3.4 DevOps Methodology
- 3.5 – DevOps vs. Agile
- 3.6 – Which Methodology To Use
Module 4 – Role of QA in SDLC
- 4.1 – Importance of QA in the Software Development Process
- 4.2 – QA Methodologies and Tools
Module 5 – Best Practices for Effective SDLC Management
- 5.1 – Project Management and Communications
- 5.2 – Risk Management In the SDLC
- 5.3 – Continuous Improvement and Feedback Loops
- 5.4 – Course Closeout
Module 1 – AI and the Workforce Transformation
- 1.1 – The Future of Work with AI Intro
- 1.2 – The Evolution of Work
- 1.3 – AI's Impact on Job Roles
- 1.4 – Emerging Job Roles in the Age of AI
Module 2 – Skills for the AI-Driven Economy
- 2.1 – The Importance of Adaptability and Lifelong Learnin
- 2.2 – Technical Skills and AI Literacy
- 2.3 – Critical Soft Skills in the AI Era
- 2.4 – The Role of Data in AI-Driven Decision Making
Module 3 – Preparing for AI-Driven Changes in the Workplace
- 3.1 – Organizational Strategies for AI Integration
- 3.2 – Workforce Reskilling and Upskilling
- 3.3 – The Role of Leadership in AI Transition
- 3.4 – Ethical Considerations and Workforce Well-being
Module 4 – Case Studies and Course Wrap-Up
- 4.1 – Practical AI Case Studies
- 4.2 – Developing a Personal or Organizational AI-Readines
- 4.3 – In Closing, Embrace, Not Fear AI
Module 1 – Introduction to Change Management in IT
- 1.1 – Change Management Course Introduction
- 1.2 – Defining Change Management
- 1.3 – Types of Change
Module 2 – Strategies for Managing Resistance to Change
- 2.1 – Understanding Resistance to Change
- 2.2 – Proactive Strategies for Overcoming Resistance
- 2.3 – Building Resilience in IT Teams
Module 3 – Developing Communication Plans for Change Initiatives
- 3.1 – Role of Communication in Successful
- 3.2 – Crafting Clear and Consistent Messages
- 3.3 – Utilizing Various Communication Channels
Module 4 – Tools and Technologies for Supporting Change in IT Teams
- 4.1 – Digital Tools for Change Management
- 4.2 – Automation and Workflow Management
- 4.3 – Key Metrics for Tracking Change Management Success
Module 5 – Case Studies of Effective Change Management in IT
- 5.1 – Case Study 1: Changing To Agile
- 5.2 – Case Study 2: Cloud Migration
- 5.3 – Course Closeout
Module 1 – What Is OSWASP
- Module 1.1 – Introduction to OSWASP Top 10
Module 2 – Top 10 Web Application Security Risks
- Module 2.1 – Overview of Risks We Will Explore
- Module 2.2 – Injection
- Module 2.3 – Broken Authentication
- Module 2.4 – Sensitive Data Exposure
- Module 2.5 – XML External Entities (XXE)
- Module 2.6 – Broken Access Control
- Module 2.7 – Security Misconfiguration
- Module 2.8 – Cross-Site Scripting XSS
- Module 2.9 – Insecure Deserialization
- Module 2.10 – Using Vulnerable Components
- Module 2.11 – Insufficient Logging and Monitoring
- Module 2.12 – Course Conclusion
Module 1 – Security, Compliance, and Identity
- Module 1.1 – Course Introduction
- Module 1.2 – Core Concepts and Strategies
- Module 1.3 – Identity Concepts
Module 2 – Microsoft Entra ID Capabilities
- Module 2.1 – Microsoft Entra ID
- Module 2.2 – Entra ID Authentication
- Module 2.3 – Access Management Capabilities
- Module 2.4 – Entra ID Governance
- Module 2.5 – Entra ID Protection
Module 3 – Microsoft Security Solutions
- Module 3.1 – Exploring Core Infrastructure Services
- Module 3.2 – Security Management Capabilities
- Module 3.3 – Microsoft Sentinal
- Module 3.4 Microsoft Defender XDR
Module 4 – Microsoft Compliance Solutions
- Module 4.1 – Service Trust Portal and Privacy
- Module 4.2 – Microsoft Purview for Compliance
- Module 4.3 – Information Protection, Data Lifecycle Management, and Data Governance
- Module 4.4 – Insider Risk Capabilities
- Module 4.5 – eDiscovery and Audit
Module 1 – Course Introduction and Overview
- Module 1.1 – Welcome and Course Objectives
- Module 1.2 – Introduction to PMBOK 7 Principles
- Module 1.3 – Defining Project Managment & Your Role
Module 2 – Project Scope, Estimating and Planning
- Module 2.1 – Defining the Project Scope
- Module 2.2 – Project Estimating Techniques
- Module 2.3 – Project Planning – Techniques and Task Breakdown
- Module 2.4 – Scheduling and Resource Management
Module 3 -Effective Communication and Stakeholder Management
- Module 3.1 – Communication Planning
- Module 3.2 – Stakeholder Management
- Module 3.3 – Team Collaboration
Module 4 – Risk Management and Adaptability
- Module 4.1 – Introduction to Risk Management
- Module 4.2 – Risk Identification and Analysis
- Module 4.3 – Risk Response Planning
Module 5 – Project Execution and Control
- Module 5.1 – Project Execution and Control
- Module 5.2 – Monitoring and Controlling the Project
Module 6 – Project Tools and Techniques
- Module 6.1 – Using Project Management Tools
- Module 6.2 – Tools for Different Methodologies
Module 7 – Closing the Project
- Module 7.1 – Project Closure
- Module 7.2 – Post Project Evaluations
Module 1: Introduction to Cloud Concepts
- Module 1.1 – Course Introduction
- Module 1.2 – Introduction to Cloud Computing
- Module 1.3 – Microsoft SaaS, PaaS, IaaS Offerings
- Module 1.4 – Cloud, Hybrid, On-Premises Models – Benefits and Considerations
- Module 1.5 – Exploring Public, Private and Hybrid Cloud Models
- Module 1.6 – Cost Benefit of Cloud Solutions
- Module 1.7 – The Hybrid Work and Flexible Work Concept
- Module 1.8 – Introducing Microsoft Co-Pilot
- Module 1.9 – Microsoft 365 Tenant
Module 2: Microsoft 365 Apps and Services
- Module 2.1 – Core Productivity Solutions
- Module 2.2 – Work Management in Microsoft 365
- Module 2.3 – Collaboration Solutions
- Module 2.4 – Microsoft Teams and Teams Phone Deep Dive
- Module 2.5 – Extending Teams with Collaborative Apps
- Module 2.6 – Endpoint Management with Microsoft Intune
- Module 2.7 – Windows 365 vs. Azure Virtual Desktop
- Module 2.8 – Deployment and Update Channels for Microsoft 365
- Module 2.9 – Analytics in Microsoft 365
Module 3: Security, Compliance, Privacy, and Trust in Microsoft 365
- Module 3.1 – Identity and Access Management with Microsoft Entra
- Module 3.2 – Threat Protection – Defender Suite Overview
- Module 3.3 – Zero Trust Model and Compliance Solutions
- Module 3.4 – Information Protection and Data Residency
Module 4: Microsoft 365 Pricing, Licensing, and Support
- Module 4.1 – Understanding Microsoft 365 Pricing and Billing
- Module 4.2 – Licensing Options and Management
- Module 4.3 – Microsoft 365 Support, SLAs and Monitoring Service
- Module 4.4 – Microsoft 365 Fundamentals Course Closeout
Module 1 – Getting Started With AI
- Module 1.1 Introduction To AI
- Module 1.2 Understanding The Types of AI
Module 2 – Programming Lanaguages, Tools and Platforms For AI Solutions
- Module 2.1 AI and Programming Languages
- Module 2.2 AI, Machine Learning and Deep Learning
- Module 2.3 AI Models
- Module 2.4 AI Services in the Cloud
Module 3 – Data Science Fundamentals for AI
- Module 3.1 Introduction to Data Science
- Module 3.2 Data Preparation Techniques
- Module 3.3 Exploratory Data Analysis (EDA)
Module 4 – AI In the Modern Workplace
- Module 4.1 AI In The Workplace
- Module 4.2 Data Analysis and Business Intelligence AI Tools
- Module 4.3 Automation and Workflow Management Tools
- Module 4.4 Natural Language Processing (NLP) Tools
- Module 4.5 Virtual Assistants and Chatbots
Module 5 – Ethical AI and Future Trends
- Module 5.1 Understanding Bias, Fairness, Privacy, and Security
- Module 5.2 Impact of AI on Jobs and Society
- Module 5.3 Emerging Trends in AI
- Module 5.4 AI Governance and Regulation
Module 6 – Monumental Leaps Forward With AI
- Module 6.1 AI for Social Good
- Module 6.2 AI in Creative Industries
- Module 6.3 AI in Cybersecurity
- Module 6.4 AI in Smart Cities and Infrastructure
Module 7 – AI Project Lifecycle Management
- Module 7.1 AI Project Lifecycle Management
- Module 7.2 Development and Implementation
- Module 7.3 Maintenance, Evaluation, and Scaling
Module 8 – AI Fundamentals Course Closeout
- Module 8.1 Course Closeout
Module 1 – SY0-701 General Security Concepts
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY – Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY – Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY – Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY – Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
Module 2 – SY0-701 Threats, Vulnerabilities, and Mitigations
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY – O.MG Cable Baiting
- 2.2.2 O.MG-No Cable
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY – Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY – Abusing Unsanitized Input
- 2.6.2 ACTIVITY – Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY – Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY – Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY – Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY – Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY – Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY – Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
Module 3 – SY0-701 Security Architecture
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY – Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY – Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY – Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications – Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
Module 4 – SY0-701 Security Operations
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY – Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY – Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY – Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY – Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY – Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY – Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY – Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
Module 5 – SY0-701 Security Program Management and Oversight
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY – Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY – Conducting OSINT
- 5.5.2 ACTIVITY – Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
Module 1 – Data Threats & ID Theft
- Module 1.1 – Introduction
- Module 1.2 – Data Threats & Costs
Module 2 – Device Security
- Module 2.1 – Device Access
- Module 2.2 – Device Management
Module 3 – Preventing Inadvertant Disclosure
- Module 3.1 – Inadvertant Disclosure
- Module 3.2 – Removing PII
- Module 3.3 – Social Engineering
Module 4 – Physical & Technical Safeguards
- Module 4.1 – Physical Security
- Module 4.2 – Issues With Public Networds
- Module 4.3 – Data Encryption and Destruction
- Module 4.4 – Incident Reporting
- Module 4.5 – Course Conclusion
Module 1 – CompTIA CySA+ CS0-003 Basics
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certfication
Module 2 – CompTIA CySA+ CS0-003 Domain 1 – Security Operations
- 2.1 Domain 1 – Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion – Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration – IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
Module 3 – CompTIA CySA+ CS0-003 Domain 2 – Vulnerability Management
- 3.1 Domain 2 – Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
Module 4 – CompTIA CySA+ CS0-003 Domain 3 – Incident Response and Management
- 4.1 Domain 3 – Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Reponse
- 4.6 Detection and Analysis
- 4.7 Post Incident Activities
- 4.8 Containment, Eradication and Recovery
- 4.9 Module 4 Review
Module 5 – CompTIA CySA+ CS0-003 Domain 4 – Reporting and Communication
- 5.1 Domain 4 – Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPI's
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
Module 6 – CompTIA CySA+ CS0-003 – Course Closeout
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
Module 1 – Welcome and Course Introduction
- Module 1.0 – Introduction To Transitioning To The Cloud
- Module 1.1 – Who Is This Course For
- Module 1.2 – The Importance and Benefits Of Moving To The Cloud
- Module 1.3 – Module Recap
Module 2 – Understanding On-Site Infrastructure
- Module 2.1 – Defining On-Site Infrastructure
- Module 2.2 – Pros and Cons of On-Site Infrastructure
Module 3 – Types of Cloud Services
- Module 3.1 – What is Cloud Computing?
- Module 3.2 – Categories of Cloud Computing
- Module 3.3 – Key Advantages
- Module 3.4 – Key Considerations
- Module 3.5 – Recap
Module 4 – Why Transition To The Cloud?
- Module 4.1 – Cost-Efficiency
- Module 4.2 – Scalability
- Module 4.3 – Flexibility and Mobility
- Module 4.4 – Recap
Module 5 – Planning The Transition
- Module 5.1 – Assessing Current Infrastructure
- Module 5.2 – Choosing A Cloud Provider
- Module 5.3 – Budget and Timeline
- Module 5.4 – Recap
Module 6 – Key Steps in the Transition
- Module 6.1 – Data Migration
- Module 6.2 – Application Porting
- Module 6.3 – Employee Training
- Module 6.4 – Recap
Module 7 – Post-Transition Management
- Module 7.1 – Monitoring and Analytics
- Module 7.2 – Security Measures
- Module 7.3 – On-going Costs
- Module 7.4 – Recap
Combating Cyber Threats
- Chrys Thorsen – Webinar – Road To Zero
Module 1 – Azure Overview
- 1.0 Introduction to AZ-104
- 1.1 Cloud Computing
- 1.2 Cloud Services Benefits
- 1.3 Cloud Service Types
- 1.4 Azure Core Architectural Components
- 1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
- 1.5 Azure Compute Services
- 1.6 Azure Application Hosting Options
- 1.7 Azure Networking Services
- 1.8 Azure Storage Services
- 1.9 Azure Identity, Access, and Security
- 1.10 Azure Cost Management
- 1.10.1 ACTIVITY- Checking Your Azure Balance
- 1.11 Azure Governance and Compliance Tools
- 1.11.1 ACTIVITY- Assign an Azure Policy
Module 2 – Azure Tools
- 2.1 Azure Portal
- 2.1.1 ACTIVITY- Exploring the Azure Portal
- 2.2 Azure Monitoring Tools
- 2.3 Azure PowerShell
- 2.3.1 ACTIVITY- Using Azure PowerShell
- 2.4 Azure CLI
- 2.4.1 ACTIVITY- Using the Azure CLI
- 2.5 Azure Cloud Shell
- 2.6 ARM Templates
- 2.6.1 ACTIVITY- Using Templates to Deploy Resources
- 2.7 Azure Resource Manager
- 2.8 Hybrid Tools
Module 3 – Azure Identities and Governance
- 3.1 Azure AD Overview
- 3.1.1 ACTIVITY- Exploring Azure Active Directory
- 3.1.2 ACTIVITY- Adding a Custom Domain
- 3.2 Subscriptions
- 3.3 Users and Groups
- 3.3.1 ACTIVITY- Adding Azure Active Directory User
- 3.3.2 ACTIVITY- Bulk Inviting New Users
- 3.3.3 ACTIVITY- Creating Azure AD Groups
- 3.4 Authentication
- 3.5 SSPR
- 3.5.1 ACTIVITY- Implementing SSPR
- 3.6 Devices
- 3.7 Azure Roles
- 3.7.1 ACTIVITY- Assigning Azure Roles
- 3.8 Azure AD Roles
- 3.8.1 ACTIVITY- Assigning Azure AD Roles
- 3.9 Conditional Access
- 3.10 Authorization
- 3.10.1 ACTIVITY- Managing Licenses
- 3.11 Azure Policy
Module 4 – Azure Storage
- 4.1 Storage Accounts
- 4.1.1 ACTIVITY- Creating a Storage Account
- 4.2 Storage Types
- 4.2.1 ACTIVITY- Creating Storage Types
- 4.3 Azure Storage Tools
- 4.3.1 ACTIVITY- Azure Storage Explorer
- 4.4 Azure Files and File Sync
- 4.4.1 ACTIVITY- Deploying an Azure Files Share
- 4.5 Azure Storage Security
Module 5 – Azure Compute Resources
- 5.1 Virtual Machines
- 5.1.1 ACTIVITY- Create Virtual Machines
- 5.1.2 ACTIVITY- Delete a Virtual Machine
- 5.2 VM Availability
- 5.2.1 ACTIVITY- Increasing VM Availability
- 5.3 VM Extensions
- 5.4 Azure App Service
- 5.5 Azure Container Instances
- 5.6 Kubernetes
Module 6 – Azure Virtual Networks
- 6.1 Virtual Networks
- 6.1.1 ACTIVITY- Create a VNet
- 6.2 Network Security Groups-Part 1
- 6.2.1 Network Security Groups-Part 2
- 6.3 Azure Firewall
- 6.3.1 ACTIVITY- Deploying a Firewall
- 6.4 Azure DNS-Part 1
- 6.4.1 Azure DNS-Part 2
- 6.4.2 ACTIVITY- Implementing Azure DNS Zone6
- 6.5 Virtual Network Peering
- 6.5.1 ACTIVITY- VNet Peering
- 6.6 Azure VPN Gateway
- 6.7 ExpressRoute and Virtual WANs
- 6.8 Azure Load Balancer
- 6.9 Azure Application Gateway
- 6.10 Azure Routes
Module 7 – Azure Monitoring and Backup
- 7.1 Network Watcher
- 7.2 Azure Monitor
- 7.3 Azure Backup-Part 1
- 7.4 Azure Backup-Part 2
- 7.5 Azure Backup-Part 3
- 7.6 Conclusion to AZ-104
Module 1 – ChatGPT Fundamentals
- 1.1 Course Welcome
- 1.2 Instructor Introduction
- 1.3 Download Course Resources
- 1.4 ChatGPT Fundamentals
- 1.5 What is ChatGPT
- 1.6 Use Cases for ChatGPT
- 1.7 Role of ChatGPT
- 1.8 Future of ChatGPT
- 1.9 ChatGPT Statistics, Facts & Trends
- 1.10 Limitations
- 1.11 What is a Chatbot
- 1.12 Understanding AI-ML
- 1.13 Demonstration – Tools to Use with ChatGPT
- 1.14 Business Benefits
- 1.15 Whiteboard – How it all works
- 1.16 Demonstration – How to Get Started with ChatGPT
- 1.17 Demonstration – Example Prompts
- 1.18 Discussion – ChatGPT Performance Issues
- 1.19 Module Summary
Module 2 – ChatGPT Prompt Demonstrations
- 2.1 ChatGPT Prompt Demonstrations
- 2.2 What is a Prompt
- 2.3 Best Practices For Writing Prompts
- 2.4 Prompt Demonstration – Asking Questions
- 2.5 Prompt Demonstration – Top Ten Lists
- 2.6 Prompt Demonstration – Long Form Docs
- 2.7 Prompt Demonstration – Complex Form and Code
- 2.8 Prompt Demonstration – Feedback
- 2.9 Prompt Demonstration – Content Modification
- 2.10 Prompt Demonstration – Instruction Generation
- 2.11 Prompt Demonstration – Information Extraction
- 2.12 Prompt Demonstration – Writing Computer Code
- 2.13 Prompt Demonstration – Solving Math Problems
- 2.14 Prompt Demonstration – Create YT Video Outline
- 2.15 Prompt Demonstration – Write a Blog Article
- 2.16 Prompt Demonstration – SEO Keywords
- 2.17 Comparing Google Bard vs ChatGPT
- 2.18 Module Summary
- 2.19 Course Closeout
Module 1 – Introduction To Ethical Hacking
- 1.0 Introduction to CEH v12
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 Activity – Researching the MITRE ATTACK Framework
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Introduction to Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 Activity – Conduct OSINT with OSR Framework
- 2.2.2 Activity – OSINT with theHarvester
- 2.2.3 Activity – Add API Keys to theHarvester
- 2.2.4 Activity – Extract Document Metadata with FOCA
- 2.2.5 Activity – Extract Document Metadata with FOCA
- 2.3 Advanced Google Search
- 2.3.1 Activity – Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 Activity – Conducting Whois Research
- 2.5 DNS Footprinting
- 2.5.1 Activity – Query DNS with NSLOOKUP
- 2.6 Website Footprinting
- 2.6.1 Activity – Fingerprint a Webserver with ID Serve
- 2.6.2 Activity – Extract Data from Websites
- 2.6.3 Activity – Mirror a Website with HTTrack
- 2.7 Email Footprinting
- 2.7.1 Activity – Trace a Suspicious Email
- 2.8 Network Footprinting
- 2.9 Social Network Footprinting
- 2.10 Footprinting and Reconnaissance Countermeasures
- 2.11 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.2.1 Activity – ICMP ECHO and ARP Pings
- 3.2.2 Activity – Host Discovery with Angry IP Scanner
- 3.3 Port Scans
- 3.3.1 Activity – Port Scan with Angry IP Scanner
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.5.1 Activity – Hping3 Packet Crafting
- 3.5.2 Activity – Fingerprinting with Zenmap
- 3.6 NMAP
- 3.6.1 Activity – Nmap Basic Scans
- 3.6.2 Activity – Host Discovery with Nmap
- 3.6.3 – Activity – Nmap Version Detection
- 3.6.4 Activity – Nmap Idle (Zombie) Scan
- 3.6.5 Activity – Nmap FTP Bounce Scan
- 3.6.6 – Activity – NMAP Scripts
- 3.7 Firewall and IDS Evasion
- 3.7.1 Activity – Nmap Advanced Scans
- 3.8 Proxies
- 3.9 Scanning Countermeasures
- 3.10 Scanning Networks Review
Module 4: Enumeration
- 4.1 Enumeration Overview
- 4.2 SMB_NetBIOS_Enumeration
- 4.2.1 Activity – Enumerate NetBIOS Information with Hyena
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.4.1 – Activity – Enumerating WMI with Hyena
- 4.5 SNMP Enumeration
- 4.5.1 Activity – Enumerate WMI, SNMP and Other Information Using SoftPerfect
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 Activity – Enumerate Email Users with SMTP
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 Activity – Enumerate a Website with DirBuster
- 4.11 Other Enumeration Types
- 4.12 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 Vulnerability Scanning with OpenVAS
- 5.2 Vulnerability Assessment
- 5.3 Vulnerability Analysis Review
Module 6: System Hacking
- 6.1 System Hacking Concepts
- 6.2 Common OS Exploits
- 6.3 Buffer Overflows
- 6.3.1 Activity – Performing a Buffer Overflow
- 6.4 System Hacking Tools and Frameworks
- 6.4.1 Activity – Hack a Linux Target from Start to Finish
- 6.5 Metasploit
- 6.5.1 Activity – Get Started with Metasploit
- 6.6 Meterpreter
- 6.7 Keylogging and Spyware
- 6.7.1 Activity – Keylogging with Meterpreter
- 6.8 Netcat
- 6.8.1 Activity – Using Netcat
- 6.9 Hacking Windows
- 6.9.1 Activity – Hacking Windows with Eternal Blue
- 6.10 Hacking Linux
- 6.11 Password Attacks
- 6.11.1 Activity – Pass the Hash
- 6.11.2 Activity – Password Spraying
- 6.12 Password Cracking Tools
- 6.13 Windows Password Cracking
- 6.13.1 Activity – Cracking Windows Passwords
- 6.13.2 Activity – Cracking Password Hashes with Hashcat
- 6.14 Linux Password Cracking
- 6.15 Other Methods for Obtaining Passwords
- 6.16 Network Service Attacks
- 6.16.1 Activity – Brute Forcing a Network Service with Medusa
- 6.17 Post Exploitation
- 6.18 Pivoting
- 6.18.1 & 6.18.2 Activity – Pivoting Setup and Attack
- 6.19 Maintaining Access
- 6.19.1 Activity – Persistence
- 6.20 Hiding Data
- 6.20.1 Activity – Hiding Data Using Least Significant Bit Steganography
- 6.21 Covering Tracks
- 6.21.1 Activity – Clearing Tracks in Windows
- 6.21.2 Activity – View and Clear Audit Policies with Auditpol
- 6.22 System Hacking Countermeasures
- 6.23 System Hacking Review
Module 7: Malware Threats
- 7.1 Malware Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.3.1 Activity – Deploying a RAT
- 7.4 Rootkits
- 7.5 Other Malware
- 7.6 Advanced Persistent Threat
- 7.7 Malware Makers
- 7.7.1 Activity – Creating a Malware Dropper and Handler
- 7.8 Malware Detection
- 7.9 Malware Analysis
- 7.9.1 Activity – Performing a Static Code Review
- 7.9.2 Activity – Analyzing the SolarWinds Orion Hack
- 7.10 Malware Countermeasures
- 7.11 Malware Threats Review
Module 8: Sniffing
- 8.1 Network Sniffing
- 8.2 Sniffing Tools
- 8.2.1 Activity- Sniffing HTTP with Wireshark
- 8.2.2 Activity – Capturing Files from SMB
- 8.3 ARP and MAC Attacks
- 8.3.1 Activity – Performing an MITM Attack with Ettercap
- 8.4 Name Resolution Attacks
- 8.4.1 Activity – Spoofing Responses with Responder
- 8.5 Other Layer 2 Attacks
- 8.6 Sniffing Countermeasures
- 8.7 Sniffing Review
Module 9: Social Engineering
- 9.1 Social Engineering Concepts
- 9.2 Social Engineering Techniques
- 9.2.1 Activity – Deploying a Baited USB Stick
- 9.2.2 Activity – Using an O.MG Lightning Cable
- 9.3 Social Engineering Tools
- 9.3.1 Activity – Phishing for Credentials
- 9.4 Social Media, Identity Theft, Insider Threats
- 9.5 Social Engineering Countermeasures
- 9.6 Social Engineering Review
Module 10: Denial-of-Service
- 10.1 DoS-DDoS Concepts
- 10.2 Volumetric Attacks
- 10.3 Fragmentation Attacks
- 10.4 State Exhaustion Attacks
- 10.5 Application Layer Attacks
- 10.5.1 Activity – Performing a LOIC Attack
- 10.5.2 Activity – Performing a HOIC Attack
- 10.5.3 Activity – Conducting a Slowloris Attack
- 10.6 Other Attacks
- 10.7 DoS Tools
- 10.8 DoS Countermeasures
- 10.9 DoS Review
Module 11: Session Hijacking
- 11.1 Session Hijacking
- 11.2 Compromising a Session Token
- 11.3 XSS
- 11.4 CSRF
- 11.5 Other Web Hijacking Attacks
- 11.6 Network-Level Session Hijacking
- 11.6.1 Activity – Hijack a Telnet Session
- 11.7 Session Hijacking Tools
- 11.8 Session Hijacking Countermeasures
- 11.9 Session Hijacking Review
Module 12: Evading IDS, Firewalls, and Honeypots
- 12.1 Types of IDS
- 12.2 Snort
- 12.3 System Logs
- 12.4 IDS Considerations
- 12.5 IDS Evasion
- 12.5.1 Activity – Fly Below IDS Radar
- 12.6 Firewalls
- 12.7 Packet Filtering Rules
- 12.8 Firewall Deployments
- 12.9 Split DNS
- 12.10 Firewall Product Types
- 12.11 Firewall Evasion
- 12.11.1 Activity – Use Social Engineering to Bypass a Windows Firewall
- 12.11.2 Activity – Busting the DOM for WAF Evasion
- 12.12 Honeypots
- 12.13 Honeypot Detection and Evasion
- 12.13.1 Activity – Test and Analyze a Honey Pot
- 12.14 Evading IDS, Firewalls, and Honeypots Review
Module 13: Hacking Web Servers
- 13.1 Web Server Operations
- 13.2 Hacking Web Servers
- 13.3 Common Web Server Attacks
- 13.3.1 Activity – Defacing a Website
- 13.4 Web Server Attack Tools
- 13.5 Hacking Web Servers Countermeasures
- 13.6 Hacking Web Servers Review
Module 14: Hacking Web Applications
- 14.1 Web Application Concepts
- 14.2 Attacking Web Apps
- 14.3 A01 Broken Access Control
- 14.4 A02 Cryptographic Failures
- 14.5 A03 Injection
- 14.5.1 Activity – Command Injection
- 14.6 A04 Insecure Design
- 14.7 A05 Security Misconfiguration
- 14.8 A06 Vulnerable and Outdated Components
- 14.9 A07 Identification and Authentication Failures
- 14.10 A08 Software and Data integrity Failures
- 14.11 A09 Security Logging and Monitoring Failures
- 14.12 A10 Server-Side Request Forgery
- 14.13 XSS Attacks
- 14.13.1 Activity – XSS Walkthrough
- 14.13.2 Activity – Inject a Malicious iFrame with XXS
- 14.14 CSRF
- 14.15 Parameter Tampering
- 14.15.1 Activity – Parameter Tampering with Burp
- 14.16 Clickjacking
- 14.17 SQL Injection
- 14.18 Insecure Deserialization Attacks
- 14.19 IDOR
- 14.19.1 Activity – Hacking with IDOR
- 14.20 Directory Traversal
- 14.21 Session Management Attacks
- 14.22 Response Splitting
- 14.23 Overflow Attacks
- 14.24 XXE Attacks
- 14.25 Web App DoS
- 14.26 Soap Attacks
- 14.27 AJAX Attacks
- 14.28 Web API Hacking
- 14.29 Webhooks and Web Shells
- 14.30 Web App Hacking Tools
- 14.31 Hacking Web Applications Countermeasures
- 14.32 Hacking Web Applications Review
Module 15: SQL Injection
- 15.1 SQL Injection Overview
- 15.2 Basic SQL Injection
- 15.3 Finding Vulnerable Websites
- 15.4 Error-based SQL Injection
- 15.5 Union SQL Injection
- 15.5.1 Activity – Testing SQLi on a Live Website – Part 1
- 15.5.2 Activity – Testing SQLi on a Live Website – Part 2
- 15.6 Blind SQL Injection
- 15.7 SQL Injection Tools
- 15.7.1 Activity – SQL Injection Using SQLmap
- 15.8 Evading Detection
- 15.9 Analyzing SQL Injection
- 15.10 SQL Injection Countermeasures
- 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
- 16.1 Wireless Concepts
- 16.2 Wireless Security Standards
- 16.3 WI-FI Discovery Tools
- 16.4 Common Wi-Fi Attacks
- 16.5 Wi-Fi Password Cracking
- 16.6 WEP Cracking
- 16.6.1 Activity – Cracking WEP
- 16.7 WPA,WPA2,WPA3 Cracking
- 16.7.1 Activity – WPA KRACK Attack
- 16.8 WPS Cracking
- 16.9 Bluetooth Hacking
- 16.10 Other Wireless Hacking
- 16.10.1 Activity – Cloning an RFID badge
- 16.10.2 Activity – Hacking with a Flipper Zero
- 16.11 Wireless Security Tools
- 16.12 Wireless Hacking Countermeasures
- 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
- 17.1 Mobile Device Overview
- 17.2 Mobile Device Attacks
- 17.3 Android Vulnerabilities
- 17.4 Rooting Android
- 17.5 Android Exploits
- 17.5.1 Activity – Hacking Android
- 17.5.2 Activity – Using a Mobile Device in a DDoS Campaign
- 17.6 Android-based Hacking Tools
- 17.7 Reverse Engineering an Android App
- 17.8 Securing Android
- 17.9 iOS Overview
- 17.10 Jailbreaking iOS
- 17.11 iOS Exploits
- 17.12 iOS-based Hacking Tools
- 17.13 Reverse Engineering an iOS App
- 17.14 Securing iOS
- 17.15 Mobile Device Management
- 17.16 Hacking Mobile Platforms Countermeasures
- 17.17 Hacking Mobile Platforms Review
Module 18: IoT AND OT Hacking
- 18.1 IoT Overview
- 18.2 IoT Infrastructure
- 18.3 IoT Vulnerabilities and Threats
- 18.3.1 Activity – Searching for Vulnerable IoT Devices
- 18.4 IoT Hacking Methodology and Tools
- 18.5 IoT Hacking Countermeasures
- 18.6 OT Concepts
- 18.7 IT-OT Convergence
- 18.8 OT Components
- 18.9 OT Vulnerabilities
- 18.10 OT Attack Methodology and Tools
- 18.11 OT Hacking Countermeasures
- 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
- 19.1 Cloud Computing Concepts
- 19.2 Cloud Types
- 19.3 Cloud Benefits and Considerations
- 19.4 Cloud Risks and Vulnerabilities
- 19.5 Cloud Threats and Countermeasures
- 19.5.1 Activity – Hacking S3 Buckets
- 19.6 Cloud Security Tools And Best Practices
- 19.7 Cloud Computing Review
Module 20: Cryptography
- 20.1 Cryptography Concepts
- 20.2 Symmetric Encryption
- 20.2.1 Activity – Symmetric Encryption
- 20.3 Asymmetric Encryption
- 20.3.1 Activity – Asymmetric Encryption
- 20.4 Public Key Exchange
- 20.5 PKI
- 20.5.1 Activity – Generating and Using an Asymmetric Key Pair
- 20.6 Digital Signatures
- 20.7 Hashing
- 20.7.1 Activity – Calculating Hashes
- 20.8 Common Cryptography Use Cases
- 20.9 Cryptography Tools
- 20.10 Cryptography Attacks
- 20.11 Cryptography Review
- 20.12 Course Conclusion
Module 1 – CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud + Exam
- 1.3 Cloud + Domain Obectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
Module 2 – General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration – AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration – Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration – AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration -AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
Module 3 – Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDSIPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration – Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion – CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
Module 4 – Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration – Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard – Design a Resilent AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration – Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration – AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to The Cloud
- 4.20 Network Protocols
- 4.21 VPNS, VPC and Connectivity
- 4.22 Whiteboard – AWS VPC Connectivity
- 4.23 Demonstration – AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
Module 5 – Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration – SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration or Automation
- 5.13 DevOps, IaC and CICD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
Module 6 – Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLS
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion Site Connectivity Issues
- 6.9 Discussion – Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration – GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
Module 7 – Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
Module 1 – Google Cloud Digital Leader Course Overview
- 1.0 About Google Cloud Digital Leader
- 1.1 Course and Instructor Intro
- 1.2 Course PreReqs
- 1.3 GCP Certification Overview
- 1.4 GCP Digital Leader Exam Objectives
Module 2 – General Cloud Knowledge
- 2.0 General Cloud Knowledge
- 2.1 Domain Objectives
- 2.2 Intro to Cloud Computing
- 2.3 Essential Characteristics of Cloud Computing
- 2.4 Service Models
- 2.5 Deployment Models
- 2.6 Multitenancy
- 2.7 Resilency
- 2.8 Replication
- 2.9 Automation and Orchestration
- 2.10 Chargeback
- 2.11 Vendor Lockin
- 2.12 Cloud Standards
- 2.13 OpEx, CapEx
- 2.14 TCO-ROI
- 2.15 Business Enablers
- 2.16 Section Summary
- 2.17 Review Questions
Module 3 – General Google Cloud Knowledge
- 3.0 General GCP Knowledge
- 3.1 Domain Objectives
- 3.2 GCP Overview
- 3.3 Cloud Infrastructure
- 3.4 Cloud Hierarchy
- 3.5 Project Demo
- 3.6 Whiteboard Hierarchy and Projects
- 3.7 Service Options
- 3.8 Demo – Services Overview
- 3.9 Pricing Calculator
- 3.10 Demo – Pricing Calculator
- 3.11 Billing models and Discounts
- 3.12 Demo Billing
- 3.13 Compliance Resources
- 3.14 Demo – Compliance Reports Manager
- 3.15 Support Options
- 3.16 Service Level Agreement (SLA)
- 3.17 Google Cloud Framework and Maturity Model
- 3.18 Demo – Maturity Assessment
- 3.19 Access to GCP
- 3.20 Demo – GCP ACCESS
- 3.21 Section Summary
- 3.22 Review Questions
Module 4 – Google Cloud Products and Services
- 4.0 Google Cloud Products and Services
- 4.1 Domain Objectives
- 4.2 Core Services
- 4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal
- 4.4 Compute Storage and Disk Options
- 4.5 App Engine, Google Cloud Functions, and Cloud Run
- 4.6 Google Kubernetes Engine
- 4.7 Demo Compute Services
- 4.8 Container registry
- 4.9 Cost and Performance Tradeoffs of Scale To Zero
- 4.10 Database Options – Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
- 4.11 Demo – Database Offerings
- 4.12 Vision API, AI Platform, TPUs
- 4.13 Pre Trained Models
- 4.14 Data Pipeline Offerings
- 4.15 Data Ingestion Options
- 4.16 Software Development Life Cycle (SDLC)
- 4.17 Visibility and Alerting Offerings
- 4.18 Identify Data Migration Options
- 4.19 Compute VM Migration
- 4.20 Whiteboard – Migrations
- 4.21 Application Modernization
- 4.22 Define Software-Defined WAN (SD-WAN)
- 4.23 Connectivity Options
- 4.24 Whiteboard – Connectivity
- 4.25 IAM and Security
- 4.26 Whiteboard Cloud Architecture
- 4.27 Section Summary
- 4.28 Review Questions
Module 5 – Google Cloud Digital Leader Course Closeout
- 5.0 Google Cloud Digital Leader Course Closeout
- 5.1 Course Review
- 5.2 Resources
- 5.3 Exam Overview
- 5.4 Course Closeout
Module 1 – Google Analytics 4 – Course Overview
- 1.0 About Google Analytics 4
- 1.1 Course Intro Welcome
- 1.2 Instructor Intro
Module 2 – Fundamentals of Google Analytics
- 2.1 What is a Digital Product
- 2.2 Google Market Platform
- 2.3 Google Analytics Overview
- 2.4 Google Analytics 4 Overview
- 2.5 Whiteboad Discussion-How Does GA Work
- 2.6 Comparing GA3 to GA4
- 2.7 Whiteboard Compare Data Models
- 2.8 Demo- GA Console Walkthru
- 2.9 Admin Panel
- 2.10 Demo Admin Panel
- 2.11 Tag Manager
- 2.12 Demo Tag Manager
- 2.13 Segment Review
- 2.14 Segment Review Questions
Module 3 – Advanced Topics with Google Analytics
- 3.1 Upgrading and Running Parallel
- 3.2 Whiteboard Discussion – Parallel
- 3.3 Demo Console Parallel
- 3.4 Hands on Demo – Install GA4 on a Live Site
- 3.5 Understand Reporting Options, Lifecycle Collections
- 3.6 Hands on Demo – Exploring reports
- 3.7 Hands on Demo – Set up GA4 Custom Eventsmp4
- 3.8 Hands on Demo – Conversions, Audiences, DebugView
- 3.9 Hands on Demo – Advertising
- 3.10 Hands on Demo – Explorations:Insights
- 3.11 Hands on Demo – Lifecycle and Users
- 3.12 Google Big Query Connections
- 3.13 Demo – BigQuery Data Integrations
- 3.14 Google Ads
- 3.15 Demo – Google Ads
- 3.16 Google Signals
- 3.17 Demo – Google Signals
- 3.18 Certification Options
- 3.19 Segment Summary
- 3.20 Review Questions
- 3.21 Resources
- 3.22 Course Closeout
Module 1 – Devices, Setups, and Installs
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Appropriate Safety Procedures
- 1.3 PC Components
- 1.4 Guidlines for PC Disassembly
- 1.5 Motherboards
- 1.6 CPU Sockets
- 1.7 PCI Bus
- 1.8 Storage Bus (SATA and IDE)
- 1.9 Discussing PC Components
- 1.10 Common Connection Interfaces
- 1.11 Wired and Wireless Connection Standards
- 1.12 Install Peripheral Devices
- 1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 – Displays and Multimedia Devices
- 2.1 Displays and Multimedia
- 2.2 Display Device Connections and Cables
- 2.3 Discussing Display Device Installation and Configuration
- 2.4 Troubleshoot Display Devices
- 2.5 Guidelines for Troubleshooting Display Devices
- 2.6 Discussing Display Device Troubleshooting
- 2.7 Install and Configure Multimedia Devices
- 2.8 Discussing Multimedia Device Installation and Configuration
Module 3 – Supporting Multiple Drive Types
- 3.1 Supporting Multiple Drive Types and Memory
- 3.2 Memory Types
- 3.3 RAM Types
- 3.4 Memory Modules
- 3.5 DIMM and SO-DIMM Technologies
- 3.6 Parity and ECC RAM
- 3.7 Memory Compatibility Issues
- 3.8 Discussing System Memory Installation
- 3.9 Install and Configure Mass Storage Devices
- 3.10 Storage Adapters and Cables
- 3.11 Solid State Drives
- 3.12 Guidlines for Installing Mass Storage Devices
- 3.13 Discussing Mass Storage Device Installation and Configuration
- 3.14 Install and Configure Removable Storage
- 3.15 Discussing Removable Storage Device Istallation and Configuration
- 3.16 Configure RAID
- 3.17 RAID Configuration Options
- 3.18 Discussing RAID Configuration
- 3.19 Troubleshoot Storage Devices
- 3.20 Boot Failures
- 3.21 Discussing Storage Device Troubleshooting
Module 4 – Accounting for CPUs and Internal Components
- 4.1 Install Upgrade CPUs
- 4.2 Multiprocessing and Multicore Processors
- 4.3 Discussing CPU Upgrades
- 4.4 Configure and Update BIOS UEFI
- 4.5 Discussing BOIS-UEFI Configuration and Updates
- 4.6 Install Power Supplies
- 4.7 Discussing Power Supply Installation
- 4.8 Troubleshoot Internal System Components
- 4.9 POST and Boot Problems
- 4.10 Boot Troubleshooting and Log Entries
- 4.11 Motherboard Component Problems
- 4.12 Discussing System Component Troubleshooting
Module 5 – All About Network Theories
- 5.1 Wired Networks
- 5.2 Common Ethernet Network Implementations
- 5.3 Taps and Mirrors
- 5.4 Discussing Wired Networks
- 5.5 Network Hardware Devices
- 5.6 Switches
- 5.7 Power Over Ethernet
- 5.8 Discussing Network Hardware Devices
- 5.9 Wireless Networks
- 5.10 Access Points and Wireless Network Modes
- 5.11 Discussing Wireless Networks
- 5.12 Internet Connection Types
- 5.13 Wireless Internet Service Providers WISP
- 5.14 Discussing Internet Connection Types
- 5.15 Network Configuration Concepts
- 5.16 The TCIP-IP Protocol Suite
- 5.17 Internet Protocol and IP Addressing
- 5.18 Public and Private IP Addresses
- 5.19 IPv6
- 5.20 Discussing Network Configuration Concepts
- 5.21 Network Services
- 5.22 DNS
- 5.23 Dynamic and Static IP Configurations
- 5.24 DNS Records MX and A
- 5.25 Web Servers and HTTP-HTTPS
- 5.26 Discussing Network Services
Module 6 – Network Operations and Diagnostics
- 6.1 Configuring and Troubleshooting Networks
- 6.2 Network Connections in Windows
- 6.3 Install and Configure SOHO Networks
- 6.4 Configure SOHO Network Security
- 6.5 Firewalls
- 6.6 Port Fowarding and Port Triggering
- 6.7 Windows Firewall
- 6.8 Network Security and Embedded Appliances
- 6.9 Configure Remote Access
- 6.10 Discussing Remote Access Configuration
- 6.11 Troubleshoot Network Connections
- 6.12 IP Configuration Issues
- 6.13 Routing Issues
- 6.14 Discussing Network Connection Troubleshooting
Module 7 – Cloud and Virtualization Computing
- 7.1 Configure Client-Side Virtulaization
- 7.2 Hypervisors
- 7.3 Processor Support and Resource Requirements
- 7.4 Virtual Networks
- 7.5 Client-Side Virtualization
- 7.6 Cloud Computing Concepts
- 7.7 Internal and External Shared Resources
- 7.8 Cloud Service Options
- 7.9 Virtual Desktops
- 7.10 Software-Defined Networking (SDN)
- 7.11 Discussing Cloud Computing Concepts
Module 8 – Laptop Features and Troubleshooting
- 8.1 Use Laptop Features
- 8.2 Expansion Options
- 8.3 Discussing Laptop Features
- 8.4 Install and Configure Laptop Hardware
- 8.5 Discussing Laptop Hardware Installation and Configuration
- 8.6 Troubleshoot Common Laptop Issues
- 8.7 Discussing Troubleshooting Common laptop Issues
Module 9 – Syncing and Setup of Mobile Devices
- 9.1 Syncing and Setup of Mobile Devices
- 9.2 Connect and Configure Mobile Devices
- 9.3 Configure Mobile Device Network Connectivity
- 9.4 Mobile VPN Configuration
- 9.5 Email Configuration Options
- 9.6 Discussing Mobile Device Network Connectivity Configuration
- 9.7 Support Mobile Apps
- 9.8 Discussing Mobile App Support
Module 10 – All Things Printing
- 10.1 All Things Printing
- 10.2 Discussing Laser Printer Maintenance
- 10.3 Maintain Inkjet Printers
- 10.4 Discussing Inkjet Printer Maintenance
- 10.5 Maintain Impact, Thermal, and 3D Printers
- 10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
- 10.7 Install and Configure Printers
- 10.8 Discussing Printer Installation and Configuration
- 10.9 Troubleshoot Print Device Issues
- 10.10 Install and Configure Imaging Devices
- 10.11 Discussing Device Installation and Configuration
Module 11 – Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Module 1 – Operating System Management
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Identify Common Operating Systems
- 1.3 Microsoft Windows
- 1.4 Work and Education Features
- 1.5 Windows System Limits
- 1.6 Apple Operating Systems
- 1.7 Linux Disk and File Management
- 1.8 Discussing OS Types
- 1.9 Use Windows Features and Tools
- 1.10 Administrative Tools
- 1.11 Manage Files in Windows
- 1.12 System Hierarchies
- 1.13 File Attributes
- 1.14 Discussing Windows Features and Tools
- 1.15 Manage Disks in Windows
- 1.16 Discussing File Management in Windows
- 1.17 The Windows Disk Management Console
- 1.18 Discussing Windows Disk Management
- 1.19 Manage Devices in Windows
- 1.20 Device Manager
- 1.21 Discussing Windows Device Manager
Module 2 – Configuring and installing the OS
- 2.1 Configuring and Installing the OS
- 2.2 Installation Boot Methods
- 2.3 Disk Formatting and Partitioning
- 2.4 Networking Considerations
- 2.5 Post Installation Tasks
- 2.6 OS Installation Types
- 2.7 Unattended Installations
- 2.8 Maintain OSs
- 2.9 OS Updates
- 2.10 Anti-Malware Updates
- 2.11 Scheduled Backups
- 2.12 Task Schedulers part 1
- 2.13 Task Schedulers part 2
- 2.14 Install Windows 10 Demonstration
- 2.15 Discussing OS Maintenance
Module 3 – Tools to Troubleshoot and Maintain the OS
- 3.1 Install and Manage Windows Applications
- 3.2 Windows OS Tools
- 3.3 Application and Print Services
- 3.4 Task Manager
- 3.5 Manage Windows Performance
- 3.6 Windows Performance Management Tools
- 3.7 Troubleshoot Windows
- 3.8 Event Viewer
- 3.9 The System Configuration Utility
- 3.10 Troubleshooting Tips Boot Process
- 3.11 Troubleshooting Tips for Windows System Issues
- 3.12 Blue Screens and Spontaneous Shutdowns
- 3.13 Troubleshooting Tips for File and Memory Corruption
- 3.14 Safe Boot
- 3.15 System Repair Disc
- 3.16 System Restore
- 3.17 Guidelines for Troubleshooting Windows Issues
Module 4 – Network Management Tools
- 4.1 Network Management Tools
- 4.2 Network Connectivity
- 4.3 IP Addressing and Connection Types
- 4.4 Proxy Settings
- 4.5 Windows Client Configuration
- 4.6 Location Services
- 4.7 Firewalls
- 4.8 Network Troubleshooting
- 4.9 Remote Desktop Tools
- 4.10 Desktop Management and Remote Monitoring Tools
- 4.11 Disscussion Topics
Module 5 – Sharing Resources and Wrights Management
- 5.1 Sharing Resources and Wrights Management
- 5.2 User Group Accounts
- 5.3 Local Secutity Policy
- 5.4 SSO and Credential Manager
- 5.5 Workgroups and Homegroups
- 5.6 Network and Sharing Center
- 5.7 Network Share Configuration
- 5.8 NTSF File and Folder Permissions
- 5.9 Configure Active Directory Accounts and Policies
- 5.10 Domain Membership and Group Policy Objects
- 5.11 Basic AD Functions
- 5.12 Account Locks and Password Resets
Module 6 – Threats and Security Measures
- 6.1 Threats and Security Measures
- 6.2 Logical Security Concepts
- 6.3 Encryption
- 6.4 PKI and Certificates
- 6.5 Execution Control
- 6.6 NAC
- 6.7 Discussing Logical Decurity Concepts
- 6.8 Threats and Vulnerablilities
- 6.9 Types of Password Attacks
- 6.10 Discussing Threats and Vulnerabilities
- 6.11 Physical Security Controls
- 6.12 Discussing Physical Security Measures
Module 7 – Policies to Protect Data
- 7.1 Policies to Protect Data
- 7.2 Implement Security Best Practices
- 7.3 Guidlines for Implementing Security Best Practices
- 7.4 Discussing Security Best Practices Implementation
- 7.5 Implement Data Protection Policies
- 7.6 ACLs and Directory Permissions
- 7.7 Full Disk Encryption
- 7.8 Guildlines for Implementing Data Protection Policies
- 7.9 Discussing Data Protection Policies
- 7.10 Protect Data During Incident Response
- 7.11 Discussing Data Protection During Incident Response
Module 8 – Prevent Malware and Security Threats
- 8.1 Prevent Malware and Security Threats
- 8.2 Detect, Remove, and Prevent Malware
- 8.3 Trojan Horses and Spyware
- 8.4 Sources of Malware Infection
- 8.5 Best Practices for Malware Removal
- 8.6 Discussing Detecting, Removing, and Preventing Malware Infections
- 8.7 Troubleshoot Common Workstation Security Issues
- 8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 – Supporting and Troubleshooting Mobile Devices
- 9.1 Supporting and Troubleshooting Mobile Devices
- 9.2 Secure Mobile Devices
- 9.3 IOT Internet of Things
- 9.4 Discussing Mobile Device Security
- 9.5 Troubleshoot Mobile Device Issues
- 9.6 Mobile Device Security Troubleshooting
- 9.7 Discussing Troubleshooting Mobile Devices
Module 10 – Implementing Operational Procedures
- 10.1 Implementing Operational Procedures
- 10.2 Environmental Impacts and Controls
- 10.3 Discussing Environmental Impact and Controls
- 10.4 Create and Maintain Documentation
- 10.5 Discussing Documentation Creation and Maintenance
- 10.6 Use Basic Change Management Best Practices
- 10.7 Discussing Change Management Best Practices
- 10.8 Implement Disaster Prevention and Recovery Methods
- 10.9 Discussing Implement Disaster Prevention and Recovery Methods
- 10.10 Basic Scripting Concepts
- 10.11 Discussing Scripting
- 10.12 Professionalism and Communication
- 10.13 Discussing Professionalism and Communication Skills
Module 11 – Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Module 61 – CEH v11 Advanced Ethical Hacker Course Intro
- 61.1 About This Course: Advanced Ethical Hacker
- 61.2 About the Instructor
Module 62 – CEH v11 Session Hjacking
- 62.1 Session Hijacking Concepts
- 62.2 Token-based Authentication
- 62.3 Compromising a Session Token
- 62.4 XSS
- 62.5 CSRF
- 62.6 Other Attacks
Module 63 – CEH v11 Defending Against Hijacking
- 63.1 Network Level Hijacking
- 63.2 Session Hijacking Tools
- 63.3 Session Hijacking Countermeasures
- 63.4 Session Penetration Hijacking
- 63.5 Review
Module 64 – CEH v11 Implementing Intrusion Detection
- 64.1 IDS-IPS
- 64.2 Snort
- 64.3 Snort Rules
- 64.4 Syslog
Module 65 – CEH v11 Testing Intrusion Detection
- 65.1 WIPS
- 65.2 IDS Considerations
- 65.3 IDS Tools
- 65.4 IDS Evasion
- 65.5 IDS-Firewall Evasion Tools
- 65.6 IDS Scenerios
Module 66 – CEH v11 Implementing Firewalls
- 66.1 Firewalls
- 66.2 Packet Filtering Rules
- 66.3 Firewall Deployments
- 66.4 Traffic Flow through Firewalls
- 66.5 Split DNS
Module 67 – CEH v11 Testing Firewallls
- 67.1 Firewall Tools
- 67.2 Firewall Evasion
- 67.3 Firewall Scenarios
Module 68 – CEH v11 Implementing Honeypots
- 68.1 Honeypots
- 68.2 Honeypot Detection
- 68.3 IDS-Firewall Evasion Countermeasures
- 68.4 IDS-Firewall Honeypot Penetration Testing
- 68.5 Review
Module 69 – CEH v11 Attacker Webserver
- 69.1 Webserver Security Overview
- 69.2 Common Webservers
- 69.3 Webserver Attacks
- 69.4 Misconfiguration Attack Examples
Module 70 – CEH v11 Webserver Defense
- 70.1 Webserver Attack Tools
- 70.2 Attack Countermeasures
- 70.3 Webserver Penetration Testing
- 70.4 Review
Module 71 – CEH v11 Intro To Web Apps
- 71.1 Web Application Concepts
- 71.2 Attacking Web Apps
Module 72 – CEH v11 OWASP Top 5 Web App Vulnerabilities
- 72.1 A01 – Broken Access Control
- 72.2 A02 – Cryptographic Failures
- 72.3 A03 – Injection
- 72.4 A04 – Insecure Design
- 72.5 A05 – Security Misconfiguration
Module 73 – CEH v11 OWASP Additional Web App Vulnerabilities
- 73.1 A06 – Vulnerable and Outdated Components
- 73.2 A07 – Identification and Authentication Failures
- 73.3 A08 – Software and Data Integrity Failures
- 73.4 A09 – Security Logging and Monitoring
- 73.5 A10 – Server Side Request Forgery
Module 74 – CEH v11 Common Web App Attacks
- 74.1 XSS Attacks
- 74.2 CSRF
- 74.3 Parameter Tampering
- 74.4 Clickjacking
- 74.5 SQL Injection
Module 75 – CEH v11 Unauthorized Access Through Web Apps
- 75.1 Insecure Deserialization Attacks
- 75.2 IDOR
- 75.3 Directory Traversal
- 75.4 Session Management Attacks
- 75.5 Response Splitting
Module 76 – CEH v11 Web App Overflow Attacks
- 76.1 Denial of Service
- 76.2 Overflow Attacks
- 76.3 XXE Attacks
- 76.4 Soap Attacks
- 76.5 Ajax Attacks
Module 77 – CEH v11 Defending Web Apps
- 77.1 Web App Hacking Tools
- 77.2 Web Hacking Countermeasures
- 77.3 Web Application Penetration Testing
- 77.4 Review
Module 78 – CEH v11 Intro To SQL Injection
- 78.1 SQL Overview
- 78.2 SQL Injection Concepts
- 78.3 Basic SQL Injection
Module 79 – CEH v11 Performing SQL Injection
- 79.1 Finding Vulnerable Websites
- 79.2 Error-based SQL Injection
- 79.3 Union SQL Injection
- 79.4 Blind SQL Injection
- 79.5 SQL Injection Scenarios
- 79.6 Evading Detection
Module 80 – CEH v11 Defending Against SQL Injection
- 80.1 SQL Injection Tools
- 80.2 SQL Injection Countermeasures
- 80.3 Safe Coding Examples
- 80.4 SQL Wildcards
- 80.5 SQL Injection Penetration Testing
- 80.6 Review
Module 81 – CEH v11 Wireless Networking Overview
- 81.1 Wireless Concepts
- 81.2 Wireless Signal Encoding
- 81.3 Wi-Fi Standards
- 81.4 Wi-Fi Antennas
- 81.5 Wireless Authentication
Module 82 – CEH v11 Wi-Fi Security
- 82.1 Wi-Fi Security Standards
- 82.2 Wireless Network Troubleshooting Tools
- 82.3 Wi-Fi Discovery Tools
- 82.4 Sniffing Wi-Fi
Module 83 – CEH v11 Hacking Wi-Fi
- 83.1 Wi-Fi Attack Types
- 83.2 Wi-Fi Rogue Access Point Attacks
- 83.3 Wi-Fi Denial of Service Attacks
- 83.4 Wi-Fi Password Cracking Attacks
- 83.5 WEP Cracking
Module 84 – CEH v11 Advanced Wireless Attacks
- 84.1 WPA-WPA2 Cracking
- 84.2 WPA3 Attacks
- 84.3 WPS Cracking
- 84.4 Wi-Fi Attack Tools for Mobile Devices
- 84.5 Bluetooth Hacking
- 84.6 Other Wireless Hacking
Module 85 – CEH v11 Defending Wireless Networks
- 85.1 Wireless Hacking Countermeasures
- 85.2 Wireless Security Tools
- 85.3 Wireless Penetration Testing
- 85.4 Review
Module 86 – CEH v11 Mobile Platform Overview
- 86.1 Mobile Platform Overview
- 86.2 Mobile Device Vulnerabilities
- 86.3 Mobile Device Attacks
Module 87 – CEH v11 Hacking Android
- 87.1 Android
- 87.2 Android Vulnerabilities
- 87.3 Rooting Android
- 87.4 Android Exploits
- 87.5 Android Hacking Tools
- 87.6 Reverse Engineering an Android App
- 87.7 Securing Android
Module 88 – CEH v11 Hacking iOS
- 88.1 iOS
- 88.2 iOS Vulnerabilities
- 88.3 Jailbreaking iOS
- 88.4 iOS Exploits
- 88.5 iOS Hacking Tools
- 88.6 Securing iOS
Module 89 – CEH v11 Mobile Platform Defense
- 89.1 Mobile Device Management
- 89.2 BYOD
- 89.3 Mobile Security Guidelines and Tools
- 89.4 Mobile Device Penetration Testing
- 89.5 Review
Module 90 – CEH v11 IoT Hacking
- 90.1 loT Concepts
- 90.2 loT Infrastructure
- 90.3 Fog Computing
- 90.4 loT Vulnerabilities
- 90.5 loT Threats
Module 91 – CEH v11 IoT Defense
- 91.1 IoT Hacking Methodologies and Tools
- 91.2 IoT Hacking Methodolgies and Tools Part 2
- 91.3 Hacking Countermeasures
- 91.4 IoT Penetration Testing
- 91.5 OT Concepts
- 91.6 Industrial IoT
Module 92 – CEH v11 Operational Technology Overview
- 92.1 IT-OT Convergence
- 92.2 ICS
- 92.3 SCADA
- 92.4 DCS
- 92.5 RTU
- 92.6 PLC
- 92.7 Addition OT Components
Module 93 – CEH v11 Hacking OT
- 93.1 OT Variables
- 93.2 Well-known OT attacks
- 93.3 OT Attack Methodology and Basic Tools
- 93.4 OT Reconnaissance
- 93.5 OT Penetration and Control
Module 94 – CEH v11 Defending OT
- 94.1 OT Attack Tools
- 94.2 OT Hacking Countermeasures
- 94.3 OT Penetration Testing
- 94.4 Review
Module 95 – CEH v11 Attacking The Cloud
- 95.1 Cloud Computing Concepts
- 95.2 Virtualization
- 95.3 Cloud Types
- 95.4 Cloud Benefits and Considerations
- 95.5 Cloud Risks and Vulnerablilities
Module 96 – CEH v11 Cloud Defense
- 96.1 Cloud Threats and Countermeasures
- 96.2 Cloud Security Tools
- 96.3 Cloud Security Best Practices
- 96.4 Cloud Penetration Testing
- 96.5 Review
Module 97 – CEH v11 Cryptography Overview
- 97.1 Cryptography Concepts
- 97.2 Symetric Encryption
- 97.3 Asymmetric Encryption
- 97.4 Public Key Exchange
- 97.5 PKI
Module 98 – CEH v11 Protecting Data With Crytography
- 98.1 Digital Certificates
- 98.2 Digital Signatures
- 98.3 Hashing
- 98.4 Email Encryption
- 98.5 Network Communication Encryption
Module 99 – CEH v11 Protecting Data at Home and in Transit
- 99.1 Disk Encryption
- 99.2 VPN Encryption
- 99.3 Cryptography Tools
Module 100 – CEH v11 Pentesting Cryptography
- 100.1 Cryptography Attacks
- 100.2 Cryptography Penetration Testing
- 100.3 Review
- 100.4 Conclusion
Module 21 – CEH v11 Ethical Hacker Course Intro
- 21.1 About this course – Ethical Hacker
- 21.2 About the Instructor
Module 22 – CEH v11 Intro to Footprinting
- 22.1 Footprinting Concepts
- 22.2 Footprinting Methodology
- 22.3 OSINT Tools
- 22.4 Advanced Google Search
- 22.5 Whois Footprinting
- 22.6 Activity – Performing a Whois Lookup
Module 23 – CEH v11 Footprinting Network Services
- 23.1 DNS Footprinting
- 23.2 Website Footprinting
- 23.3 Email Footprinting
- 23.4 Network Footprinting
- 23.5 Footprinting through Social Networking Sites
Module 24 – CEH v11 Defend Against Footprinting
- 24.1 Competitive Intelligence Gathering
- 24.2 Footprinting Countermeasures
- 24.3 Footprinting Penetration Testing
- 24.4 Review
Module 25 – CEH v11 Intro to Scanning
- 25.1 Scanning Concepts
- 25.2 ICMP Discovery Scans
- 25.3 Other Discovery Scans
Module 26 – CEH v11 Port Scanning
- 26.1 Ports
- 26.2 TCP Flags and Handshakes
- 26.3 TCP Scan Types
- 26.4 Other Scanning Techniques
Module 27 – CEH v11 Vulnerability Scanning
- 27.1 Banner Grabbing
- 27.2 Vulnerability Scanning
- 27.3 SSDP Scanning
Module 28 – CEH v11 NMAP
- 28.1 Nmap
- 28.2 Common Nmap Scans
- 28.3 Nmap Options
- 28.4 Nmap Stealth Scans
- 28.5 Hping and Other Scanners
Module 29 – CEH v11 Firewalls and Intrusion Detection
- 29.1 Firewall Types
- 29.2 Firewall Features
- 29.3 Firewall Features Part 2
- 29.4 Firewall Configurations
- 29.5 Intrusion Detection and Prevention
Module 30 – CEH v11 Evading Detection
- 30.1 Firewall and IDS Evasion
- 30.2 Firewall and IDS Evasion Part 2
- 30.3 Firewalking
- 30.4 Probing a Firewall
- 30.5 Probing a Firewall Part 2
Module 31 – CEH v11 Proxies and VPNs
- 31.1 Proxies
- 31.2 VPNs
- 31.3 Tor
- 31.4 Scanning Countermeasures
- 31.5 Scanning Penetration Testing
- 31.6 Review
Module 32 – CEH v11 Accessing Vulnerability
- 32.1 Vulnerability Assessment Overview
- 32.2 Vulnerability Scoring Systems
- 32.3 Vulnerability Assessment Tools
Module 33 – CEH v11 Vulnerability Research
- 33.1 Scanner Output and Reports
- 33.2 Vulnerability Research
- 33.3 Review
Module 34 – CEH v11 Intro to Enumeration
- 34.1 Enumeration Concepts
- 34.2 Enumeration Techniques and Tools
- 34.3 Service and Application Enumeration
- 34.4 SMB and NetBIOS Enumeration
Module 35 – CEH v11 Service Enumeration
- 35.1 SNMP Enumeration
- 35.2 LDAP Enumeration
- 35.3 DNS Enumeration
- 35.4 SMTP Enumeration
- 35.5 NTP Enumeration
Module 36 – CEH v11 Advanced Enumeration
- 36.1 Remote Connection Enumeration
- 36.2 File Transfer Enumeration
- 36.3 VoIP Enumeration
- 36.4 IPSEC Enumeration
- 36.5 IPv6 Enumeration
- 36.6 BGP Enumeration
Module 37 – CEH v11 Command Line Enumeration
- 37.1 Windows Command Line Enumeration
- 37.2 Linux Command Line Enumeration
- 37.3 Linux Command Line Enumeration Part 2
Module 38 – CEH v11 Defending Against Enumeration
- 38.1 Enumeration Countermeasures
- 38.2 Enumeration Countermeasures Part 2
- 38.3 Enumeration Penetration Testing
- 38.4 Review
Module 39 – CEH v11 Intro to System Hacking
- 39.1 System Hacking Concepts
- 39.2 System Hacking Tools and Frameworks
- 39.3 Searchsploit
- 39.4 Compiling and Running Exploits
Module 40 – CEH v11 System Hacking with Metasploit
- 40.1 Metasploit
- 40.2 Metasploit Search
- 40.3 Metasploit Exploits and Payloads
- 40.4 Metasploit Meterpreter
- 40.5 Metasploit Connectivity
- 40.6 Metasploit Impersonation and Migration
Module 41 – CEH v11 Further Attacking a Compromised System
- 41.1 Netcat
- 41.2 Pivoting
- 41.3 Netcat Relays
- 41.4 Metasploit Post Exploitation Modules
- 41.5 Common Operating System Exploits
Module 42 – CEH v11 Hacking an Operating System
- 42.1 Hacking Windows
- 42.2 Hacking Linux
- 42.3 Network Service Exploits
- 42.4 Password Attacks
Module 43 – CEH v11 Password Cracking Overview
- 43.1 Dictionary Attack
- 43.2 Brute Force Attack
- 43.3 Password Spraying
- 43.4 Rainbow Tables
Module 44 – CEH v11 Performing Password Attacks
- 44.1 Network Service Password Attacks
- 44.2 Password Cracking Tools
- 44.3 Online Password Cracking Sites
- 44.4 Windows Password Cracking
- 44.5 Linux Password Cracking
- 44.6 Other Methods for Obtaining Passwords
Module 45 – CEH v11 Using Exploits
- 45.1 Keylogging
- 45.2 Spyware
- 45.3 Rootkits
- 45.4 Buffer Overflows
- 45.5 Privilege Escalation
- 45.6 Hiding Files
Module 46 – CEH v11 Hiding Information
- 46.1 Alternate Data Streams
- 46.2 Steganography
- 46.3 Creating and Maintaining Remote Access
- 46.4 Hiding Evidence
Module 47 – CEH v11 Covering Tracks
- 47.1 Covering Tracks in Windows
- 47.2 Covering Tracks in Linux
- 47.3 System Hacking Counter-Measures
- 47.4 System Hacking Penetration Testing
- 47.5 Review
Module 48 – CEH v11 Malware Overview
- 48.1 Intro to Malware
- 48.2 Virus Overview
- 48.3 Virus Types
- 48.4 Self-Hiding Viruses
- 48.5 Worms
- 48.6 Trojans
- 48.7 Trojan Types
- 48.8 RATS
Module 49 – CEH v11 Hacking With Malware
- 49.1 Ransomware
- 49.2 Botnets
- 49.3 Covert Channel Trojans
- 49.4 Banking Trojans
- 49.5 Rootkits
Module 50 – CEH v11 Creating Malware
- 50.1 Other Malware
- 50.2 Malware Makers
- 50.3 Dropper and Stage Creation
- 50.4 Exploit Kits
Module 51 – CEH v11 Detecting Malware
- 51.1 Malware Detection
- 51.2 Malware Detection Part 2
- 51.3 Malware Analysis
Module 52 – CEH v11 Defending Against Malware
- 52.1 Malware Reverse Engineering
- 52.2 Malware Countermeasures
- 52.3 Malware Penetration Testing
- 52.4 Review
Module 53 – CEH v11 Sniffing
- 53.1 Sniffing Concepts
- 53.2 Types of Sniffing
- 53.3 Sniffing Protocols
- 53.4 Sniffing Tools
Module 54 – CEH v11 Spoofing and MITM
- 54.1 ARP
- 54.2 ARP Spoofing
- 54.3 MITM
- 54.4 MAC Attacks
- 54.5 MAC Spoofing
- 54.6 DHCP Attacks
Module 55 – CEH v11 Defending Against Poisoning and Sniffing
- 55.1 Name Resolution Poisoning
- 55.2 VLAN Hopping
- 55.3 Sniffing Counter Measures
- 55.4 Sniffing Penetration Testing
- 55.5 Review
Module 56 – CEH v11 Social Engineering
- 56.1 Social Engineering Concepts
- 56.2 Social Engineering Techniques
- 56.3 Social Engineering Examples
- 56.4 Social Engineering Tools
Module 57 – CEH v11 Defending Against Social Engineering
- 57.1 Social Media
- 57.2 Identity Theft
- 57.3 Insider Threats
- 57.4 Social Engineering Countermeasures
- 57.5 Social Engineering Penetration Testing
- 57.6 Review
Module 58 – CEH v11 Denial-of-Service
- 58.1 DoS-DDoS Concepts
- 58.2 Volumetric Attacks
- 58.3 Fragmentation Attacks
- 58.4 State Exhaustion Attacks
- 58.5 Application Layer Attacks
Module 59 – CEH v11 Advanced DoS Attacks
- 59.1 Protocol Attacks
- 59.2 Other Attacks
- 59.3 Botnets
Module 60 – CEH v11 Defending Against Denial-of-Service
- 60.1 DoS-DDoS Attack Tools
- 60.2 DoS-DDoS Countermeasures
- 60.3 Dos Penetration Testing
- 60.4 Review
Module 1 – HTML5-CSS3 Introduction
- 1.1 Introduction to the Course
Module 2 – The Internet and World Wide Web
- 2.1 The Internet and World Wide Web
Module 3 – HTML Fundamentals
- 3.1 Web Development Tools
- 3.2 HTML Skeletons
- 3.3 Paragraph Elements
- 3.4 Phrase Elements
- 3.5 HTML Comments
- 3.6 HTML Entities
Module 4 – CSS Fundamentals
- 4.1 CSS Fundamentals
- 4.2 Inline Styles
- 4.3 Embedded Style Sheets
- 4.4 External Style Sheets
- 4.5. Selector Types
- 4.6 Decendent Selectors
- 4.7 CSS Colors
- 4.8 ID Versus Class
- 4.9 CSS Text Properties
- 4.10 CSS Box Model
Module 5 – Images and Links
- 5.1 Images and Links
- 5.2 Image Elements
- 5.3 Images with Hyperlinks
- 5.4 Open Links in New Tab
- 5.5 Telephone and Email Links
- 5.6 Validate and Debug
Module 6 – Responsive Design
- 6.1 Responsive Design
- 6.2 Fixed Layouts
- 6.3 Viewport Meta Element
- 6.4 Usefull CSS Styles
Module 7 – Media Queries
- 7.1 More About Responsive Design
- 7.2 Global Changes
- 7.3 Mobile Devices
- 7.4 Manipulate Logo
Module 8 – Layouts
- 8.1 Layouts
- 8.2 Tablets Part 1
- 8.3 Tablets Part 2
- 8.4 Styling Part 1
- 8.5 Styling Part 2
- 8.6 Styling Part 3
- 8.7 Styling Part 4
- 8.8 Styling Part 5
- 8.9 Styling Part 6
Module 9 – Tables
- 9.1 Tables Part 1
- 9.2 Tables Part 2
Module 10 – Multimedia
- 10.1 Multimedia
- 10.2 Multimedia Part 2
- 10.3 Multimedia Part 3
Module 11 – Forms and JavaScript
- 11.1 Forms and JavaScript
- 11.2 jQuery
- 11.3 Styling Tables
Module 12 – The Web Server
- 12.1 The Web Server
Module 13 – Programming and JavaScript
- 13.1 Data Types
- 13.2 Global Methods
- 13.3 Variables
- 13.4 Conditional Statements
- 13.5 Loops
- 13.6 Operators
Module 14 – The Calculator
- 14.1 Calculator Part 1
- 14.2 Calculator Part 2
- 14.3 Calculator Part 3
- 14.4 Calculator Part 4
- 14.5 Calculator Part 5
- 14.6 Calculator Part 6
- 14.7 Calculator Part 7
Module 1 – Introduction to Security
- 1.1 Introduction to Security
Module 2 – Malware and Social Engineering Attacks
- 2.1 Malware and Social Engineering Attacks
Module 3 – Basic Cryptography
- 3.1 Basic Cryptography
Module 4 – Advanced Cryptography and PKI
- 4.1 Advanced Cryptography and PKI
Module 5 – Networking and Server Attacks
- 5.1 Networking and Server Attacks
Module 6 – Network Security Devices, Designs and Technology
- 6.1 Network Security Devices, Designs and Technology
Module 7 – Administering a Secure Network
- 7.1 Administering a Secure Network
Module 8 – Wireless Network Security
- 8.1 Wireless Network Security
Module 9 – Client and Application Security
- 9.1 Client and Application Security
Module 10 – Mobile and Embedded Device Security
- 10.1 Mobile and Embedded Device Security
Module 11 – Authentication and Account Management
- 11.1 Authentication and Account Management
Module 12 – Access Management
- 12.1 Access Management
Module 13 – Vulnerability Assessment and Data Security
- 13.1 Vulnerability Assessment and Data Security
Module 14 – Business Continuity
- 14.1 Business Continuity
Module 15 – Risk Mitigation
- 15.1 Risk Mitigation
Module 16 – Security Plus Summary and Review
- 16.1 – Security Plus Summary and Review
Module 17 – Hands-On Training
- 17.1 Hands-On Scanning Part 1
- 17.2 Hands-On Scanning Part 2
- 17.3 Hands-On Advanced Scanning
- 17.4 Hands-On MetaSploit
- 17.5 Hands-On BurpSuite
- 17.6 Hands-On Exploitation Tools Part 1
- 17.7 Hands-On Exploitation Tools Part 2
- 17.8 Hands-On Invisibility Tools
- 17.9 Hands-On Connect to Tor
Module 1 – CEH v11 Foundations Course Introduction
- 1.1 About this course: CEH Foundations
- 1.2 About the Instructor
Module 2 – CEH v11 Introduction To Networking
- 2.1 Networking Overview
- 2.2 Network Scope
- 2.3 Network Addressing
- 2.4 Activity – Examining Network Addressing
Module 3 – CEH v11 Lan Components
- 3.1 Protocols, Ports, Sockets
- 3.2 Network Topologies
- 3.3 LAN Devices
- 3.4 LAN Devices Part 2
- 3.5 VLANs
- 3.6 Activity – Examining Ports and Sockets
- 3.7 Activity – Examining Switches and VLANs
Module 4 – CEH v11 Routing and Network Access
- 4.1 Routers
- 4.2 Layer 3 Switches
- 4.3 Modems and Remote Access
- 4.4 Firewalls and Proxies
- 4.5 Activity – Examining Routing
- 4.6 Activity – Examining VLAN Routing
- 4.7 Activity – Examining Firewall Rules
Module 5 – CEH v11 Intrusion Detection and Network Layers
- 5.1 IDS and IPS
- 5.2 OSI Model
- 5.3 TCP-IP
- 5.4 Activity – Examining Network Layers
Module 6 – CEH v11 Networking Protocols and Addressing
- 6.1 Layer 4 Protocols
- 6.2 Layer 3 Protocols
- 6.3 Layer 2 Protocols
- 6.4 IP Addressing
- 6.5 Subnetting
- 6.6 DHCP
- 6.7 Activity – Examining TCP
- 6.8 Activity – Examining UDP
- 6.9 Activity – Examining IP
- 6.10 Activity – Examining ICMP
- 6.11 Activity – Examining ARP
Module 7 – CEH v11 Network Services
- 7.1 DNS
- 7.2 DNS Records
- 7.3 NTP
- 7.4 Authentication
- 7.5 Biometrics
- 7.6 Activity – Examining DNS
- 7.7 Activity – Examining DNS Records
Module 8 – CEH v11 Access Control
- 8.1 Local Authentication
- 8.2 Directory Service Authentication
- 8.3 Extending Authentication
- 8.4 Authorization
- 8.5 Activity – Testing Access Control
Module 9 – CEH v11 Intro to Linux
- 9.1 Linux Overview
- 9.2 Linux File System
- 9.3 Linux Core Commands
- 9.4 Linux Search and Read Commands
- 9.5 Activity – Exploring Linux
- 9.6 Activity – Using Linux Core Commands
- 9.7 Activity – Using Linux Search Commands
- 9.8 Activity – Using Linux Read Commands
Module 10 – CEH v11 Configuring Linux
- 10.1 Linux File Permissions
- 10.2 Linux Special Permissions
- 10.3 Linux Configuration
- 10.4 Linux Packages
- 10.5 Linux User Management
Module 11 – CEH v11 Practicing Linux Configuration
- 11.1 Activity – Setting Linux Permissions
- 11.2 Activity – Setting Linux Special Permissions
- 11.3 Activity – Managing Packages in Kali Linux
- 11.4 Activity – Managing Users and Groups in Linux
Module 12 – CEH v11 Managing Linux
- 12.1 Linux Job Scheduling
- 12.2 Linux File, Directory, and Download Commands
- 12.3 Linux System Commands
- 12.4 Linux Network Management
- 12.5 Linux Firewall
Module 13 – CEH v11 Practicing Linux Management
- 13.1 Activity – Scheduling Tasks in Linux
- 13.2 Activity – Using Linux File, Directory, and Download Commands
- 13.3 Activity – Using Linux Edit and Archive Commands
- 13.4 Activity – Compiling Malicious Code
- 13.5 Activity – Using Linux Process and System Commands
- 13.6 Activity – Using Linux Disk, Hardware, and Network Commands
Module 14 – CEH v11 Intro to Windows
- 14.1 Windows Overview
- 14.2 Windows Registry
- 14.3 Windows Security
Module 15 – CEH v11 Windows Commands
- 15.1 Windows Commands
- 15.2 Windows Admin Commands
- 15.3 Windows Network Commands
- 15.4 Windows Run Line Commands
- 15.5 Windows PowerShell
Module 16 – CEH v11 Practicing Windows Commands
- 16.1 Activity – Using Windows Built-in Commands
- 16.2 Activity – Using Windows Task Commands
- 16.3 Activity – Using Windows Admin Commands
- 16.4 Activity – Using Windows Network Commands
- 16.5 Activity – Using Windows PowerShell
- 16.6 Networking and OS Penetration Testing
- 16.7 Review
Module 17 – CEH v11 Intro to Hacking
- 17.1 Information Security Overview
- 17.2 Hacking Concepts
- 17.3 Ethical Hacking Concepts
- 17.4 Penetration Testing
- 17.5 Penetration Testing Part 2
- 17.6 Activity – Performing a Static Code Review
Module 18 – CEH v11 Information Security
- 18.1 Cyber Kill Chain Concepts
- 18.2 Activity – Performing Weaponization
- 18.3 Information Security
- 18.4 Security Policies
- 18.5 Security Controls
- 18.6 Access Control
Module 19 – CEH v11 Protecting Data
- 19.1 Data Protection
- 19.2 Backup Sites
- 19.3 Vulnerability Management
- 19.4 SIEM
- 19.5 Risks
Module 20 – CEH v11 Managing Risk
- 20.1 Risk Management
- 20.2 Incident Handling
- 20.3 Information Security Laws and Standards
- 20.4 Activity – Assessing Risk
- 20.5 Ethical Hacking Penetration Testing
- 20.6 Review
- 20.7 Conclusion
Module 1 – Welcome to ENARSI
- 1.1 Welcome to ENARSI
- 1.2 A Few Things Before We Start
Module 2 – EIGRP (Enhanced Interior Gateway Protocol)
- 2.1 EIGRP Features
- 2.2 EIGRP Operations
- 2.3 EIGRP Exchange of Routing Information
- 2.4 EIGRP Metrics
- 2.5 EIGRP Queries
- 2.6 EIGRP Obtaining a Default Route
- 2.7 EIGRP Load Balancing
- 2.8 EIGRP Authentication
- 2.9 Troubleshooting EIGRP Part 1
- 2.10 Troubleshooting EIGRP Part 2
- 2.11 Troubleshooting EIGRP Part 3
- 2.12 Troubleshooting EIGRP Part 4
Module 3 – OSPF (Open Shortest Path First)
- 3.1 Implementing OSPF Part 1
- 3.2 Implementing OSPF Part 2
- 3.3 Implementing OSPF Part 3 DR BDR Election
- 3.4 Implementing OSPF Part 4 LSA Types
- 3.5 Implementing OSPF Part 5 OSPF States
- 3.6 Optimizing OSPF Summarization
- 3.7 Optimizing OSPF Default Routing
- 3.8 Optimizing OSPF Authentication
- 3.9 Optimizing OSPF Virtual Links
Module 4 – Route Redistribution
- 4.1 Route Redistribution Introduction
- 4.2 Route Redistribution Implementation
- 4.3 Route Redistribution OSPF E1 or E2
- 4.4 Route Redistribution Types
- 4.5 Route Redistribution Manipulation & Filtering
- 4.6 Route Redistribution Prefix-Lists
- 4.7 Route Redistribution Route-Maps
Module 5 – Implementing Path Control
- 5.1 Implementing Path Control
- 5.2 Implementing Path Control Implementation
Module 6 – BGP (Border Gateway Protocol)
- 6.1 BGP Fundamentals
- 6.2 BGP Attributes
- 6.3 BGP Path Selection Criteria
- 6.4 BGP Transit AS
- 6.5 BGP Split Horizon
- 6.6 BGP Weight Attribute
- 6.7 BGP Local Preference Attribute
- 6.8 BGP MED Attribute
- 6.9 BGP Route Filtering
- 6.10 BGP Peer Groups
- 6.11 BGP Route Reflectors
- 6.12 BGP Authentication
- 6.13 BGP Troubleshooting Part 1
- 6.14 BGP Troubleshooting Part 2
Module 7 – Implementing VRF (Virtual Routing and Forwarding)
- 7.1 Implementing VRF-Lite
Module 8 – Implementing DHCP
- 8.1 Implementing DHCP
- 8.2 Implementing DHCP Relay Manual Binding and Options
- 8.3 Implementing DHCP SLAAC and DHCPv6
- 8.4 Troubleshooting DHCP
Module 9 – Securing Cisco Routers (Control Plane)
- 9.1 Securing Cisco Routers Control Plane Security CoPP
- 9.2 Securing Cisco Routers Control Plane Security CoPP Implementation
Module 10 – Infrastructure Services
- 10.1 Infrasctucture Services AAA
- 10.2 Infrastructure Services SNMP
- 10.3 Infrastructure Services SYSLOG
- 10.4 Infrastructure Services SSH
- 10.5 Infrastructure Services HTTP FTP SCP
- 10.6 Infrastructure Services NetFlow
Module 1 – Welcome to Adobe XD 2022
- 1.1 Welcome to Adobe XD 2022
- 1.2 What is Adobe XD 2022
Module 2 – Adobe XD 2022 Overview
- 2.1 Adobe XD 2022 Overview
Module 3 – Designing in a Project with Adobe XD 2022
- 3.1 Adobe XD 2022 Project Overview
- 3.2 Designing Your First Screen in Adobe XD 2022
Module 4 – Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022
- 4.1 Assets and Reusable Styles in Adobe XD 2022
- 4.2 Responsive Resize in Adobe XD 2022
Module 5 – Images and Visual Effects in Adobe XD 2022
- 5.1 Imports, Images, and Masks in Adobe XD 2022
- 5.2 Special Visual Effects in Adobe XD 2022
Module 6 – Making Interactive Buttons in Adobe XD 2022
- 6.1 Plugins in Adobe XD 2022
- 6.2 Stacks in Adobe XD 2022
- 6.3 Components in Adobe XD 2022
- 6.4 Repeat Grid in Adobe XD 2022
Module 7 – Grouped Imports and Scroll Groups in Adobe XD 2022
- 7.1 Grouped imports in Adobe XD 2022
- 7.2 Scroll Groups in Adobe XD 2022
Module 8 – Prototyping and Animations in Adobe XD 2022
- 8.1 Prototyping with Adobe XD 2022
- 8.2 Animations in Adobe XD 2022
Module 9 – Exporting and Sharing with Adobe XD 2022
- 9.1 Exports in Adobe XD 2022
- 9.2 Adobe XD 2022 Conclusion
Module 1 – Introduction To Adobe Indesign
- 1.1 Intro-InDesign
- 1.2 What is InDesign
Module 2 – Getting Started With Adobe InDesign
- 2.1 Creating a New Document
- 2.2 Importing Images and Understanding Links
- 2.3 Embedding
- 2.4 Navigating the Interface
- 2.5 Manipulating Graphics
- 2.6 Creating simple shapes
- 2.7 Basic Tools
- 2.8 Properties Panel
- 2.9 Working with Layers
- 2.10 Elements of Design
Module 3 – Understanding and Applying Colors
- 3.1 Color Theory
- 3.2 Color Swatches RGB vs Lab vs CMYK
- 3.3 Understanding and Applying Gradients
Module 4 – Pages
- 4.1 Pages Panel
- 4.2 Parent Pages
Module 5 – Typography
- 5.1 Typography
- 5.2 Creating Text
- 5.3 Character and Paragraph Formatting
- 5.4 Character and Paragraph Styles
- 5.5 Chaining Text Boxes Together
- 5.6 OpenType
- 5.7 Creating Outlines
- 5.8 Working with Tables
Module 6 – Packaging and Exporting for Web and Print
- 6.1 Preflight
- 6.2 Packaging Your Document
- 6.3 Exporting a PDF
- 6.4 Exporting an Image Sequence
Module 7 – Principles of Design
- 7.1 Principles of Design
Module 8 – Designing for Your Output
- 8.1 Letterheads
- 8.2 Business Cards
- 8.3 Resume
- 8.4 Brochures
- 8.5 Types of Binding
- 8.6 Impose
Module 9 – Advanced Techniques in InDesign
- 9.1 Clipping Mask
- 9.2 Step and Repeat
- 9.3 GREP
- 9.4 Layer Effects
- 9.5 Page Tool
- 9.6 Scripts
Module 10 – Interactivity in InDesign
- 10.1 Interactivity
- 10.2 Importing Media
- 10.3 Using Multiple Pages in Interactivity
- 10.4 Crating an Interactive Project
- 10.5 Animation
- 10.6 InDesign Conclusion
Module 1 – Introduction to Adobe Illustrator 2022
- 1.1 Instructor Bio
- 1.2 Course Introduction
Module 2 – Getting Started with Adobe Illustrator 2022
- 2.1 What are Vectors
- 2.2 Creating a New Document
- 2.3 Navigating the Interface
Module 3 – Drawing
- 3.1 Drawing and Manipulating Primitive Shapes
- 3.2 Drawing Custom Shapes
- 3.3 Importing Images
- 3.4 Understanding Layers and Sublayers
- 3.5 Additional Drawing and Manipulation Tools
Module 4 – Colors and Gradients
- 4.1 Color Theory
- 4.2 In-depth dive into Color Palette-
- 4.3 Creating Color Swatches
- 4.3.2 Gradient Mesh
Module 5 – Intermediate Illustration
- 5.1 Appearance Palette
- 5.2 Pathfinder Palette
- 5.3.1 Recreating an Existing Logo
- 5.3.2 Creating an icon from a Sketch
- 5.3.3 Creating a vector illustration from a sketch
- 5.3.4 Blending Modes
Module 6 – Typography
- 6.1 Introduction to Typography
- 6.2 Type Tools in Illustrator
- 6.3 Envelope Warp and Mesh
- 6.4 Breaking Text into Outlines
- 6.5 Caligramme Demo
Module 7 – Live Trace, Paintbrush and Blob Brush
- 7.1 Live Trace
- 7.2 Paint Brush
Module 8 – Advanced Illustration
- 8.1 Illustrating a face from a photo
- 8.2 Illustrating the body
- 8.3 Hair and emulating texture
- 8.4 Adding a background
- 8.5 Shadows and highlights
Module 9 – Exporting
- 9.1 Differences Between File Formats
- Conclusion
Module 0 – Course introduction
- 0.1 Instructor Intro
- 0.2 Course Overview
Module 1 – Networking Fundamentals
- 1.1 Intro to Networking
- 1.1.1 Activity: Creating a Network
- 1.2 Common Terminology
- 1.2.1 Activity: Examining Ports and Sockets
- 1.3 OSI Model
- 1.4 DoD Model
- 1.4.1 Activity: Examining Network Layers
- 1.5 TCP, UDP, IP
- 1.5.1 Activity: Examining TCP
- 1.5.2 Activity: Examining UDP
- 1.5.3 Activity: Examining IP
- 1.6 ICMP, IGMP, ARP
- 1.6.1 Activity: Examining ICMP
- 1.6.2 Activity: Examining ARP
- 1.6.3 Activity: Examining IGMP
- 1.7 Network Topologies
- 1.8 Network Types
- 1.9 Part 1: Network Characteristics
- 1.9 Part 2: Network Characteristics
- 1.10 Module 1 outro
Module 2 – Cables and Connectors
- 2.1 Ethernet Standards
- 2.2 Copper Cable Types
- 2.3 Fiber Optic Cable Types
- 2.4 Connector Types
- 2.4.1 Activity: Selecting the Right Cable
- 2.5 Media Converters and Transceivers
- 2.6 Cable Management
- 2.7 Module 2 Outro
Module 3 – Internet Protocol (IP)
- 3.1 IPv4 Basics
- 3.2 IP Packet and Interface Types
- 3.2.1 Activity: Configuring Client IP Settings
- 3.3 Binary Numbering System
- 3.4 Classful and Classless Addressing
- 3.5 Understanding CIDR Notation
- 3.6 IPv4 Subnetting Method
- 3.7 Verifying with Binary
- 3.8 Finding Subnet IDs
- 3.8.1 Activity: Subnetting a Class C Network
- 3.9 The Delta in Action
- 3.9.1 Activity: Subnetting With the Delta
- 3.10 Subnetting Based on Hosts
- 3.11 Subnetting in Other Octets
- 3.12 Supernetting
- 3.12.1 Activity: Supernetting
- 3.13 IPv6
- 3.14 IPv4 – IPv6 Transition Mechanisms
- 3.15 Module 3 Outro
Module 4 – Layer 7 Protocols
- 4.1 Remote Control Protocols
- 4.2 File Sharing Protocols
- 4.3 Web Protcols
- 4.4 Email Protocols
- 4.5 Database Protocols
- 4.6 Voice Protocols
- 4.7 Security Protocols
- 4.8 Management Protocols
- 4.9 Module 4 Outro
Module 5 – Network Services
- 5.1 DHCP
- 5.1.1 Activity: Configuring DHCP
- 5.1.2 Activity: Configuring a DHCP Relay Agent
- 5.2 DNS
- 5.2.1 Activity: Configuring DNS – Part 1
- 5.2.2 Activity: Configuring DNS – Part 2
- 5.3 NTP
- 5.4 Corporate and Datacenter Network Architecture
- 5.5 Cloud Concepts and Connectivity Options
- 5.6 Module 5 Outro
Module 6 – Networking Devices
- 6.1 Introductory Concepts
- 6.2 Repeaters and Hubs
- 6.2.1 Activity: Connecting Devices with a Hub
- 6.3 Bridges and Switches
- 6.3.1 Activity: Connecting Devices with a Switch
- 6.4 Routers and Multilayer Switches
- 6.5 Security Devices
- 6.6 Modems
- 6.7 Module 6 Outro
Module 7 – Networked Devices
- 7.1 IP Devices
- 7.2 IoT
- 7.2.1 Activity – Programming IoT Devices
- 7.3 ICS/SCADA
- 7.4 Module 7 Outro
Module 8 – Routing and Bandwidth Management
- 8.1 Routing Basics
- 8.1.1 Activity: Configuring Static Routes
- 8.2 Packet Delivery on the Same Network
- 8.3 IP Routing Across a Single Router
- 8.4 IP Routing Across Multiple Hops
- 8.4.1 Activity: Static Routes – CHALLENGE
- 8.5 Route Selection
- 8.6 RIP
- 8.6.1 Activity: Configuring RIP – CHALLENGE
- 8.7 OSPF
- 8.8 EIGRP
- 8.9 BGP
- 8.10 NAT/PAT
- 8.11 Bandwidth Management (with Module 8 Outro)
Module 9 – Ethernet Switching
- 9.1 Ethernet Basics
- 9.2 Switching Overview
- 9.2.1 Activity: Examining a MAC Table
- 9.3 VLANs
- 9.3.1 Activity: Creating VLANs
- 9.4 VLAN Trunking
- 9.4.1 Activity: Configuring VLAN Trunking
- 9.5 VLAN Routing
- 9.5.1 Activity: Configuring VLAN Routing
- 9.6 Contention Management
- 9.7 Switchport Configuration (with Module 9 Outro)
Module 10 – Wireless Technologies
- 10.1 Wireless Overview
- 10.2 Radio Basics
- 10.3 Modulation
- 10.4 Wi-Fi Standards
- 10.5 Antennas
- 10.6 Wi-Fi Service Sets
- 10.7 Wi-Fi Security
- 10.8 Cellular
Module 11 Network Performance
- 11.1 Monitoring Performance
- 11.2 Common Metrics
- 11.2.1 Activity: Examining Interface Statistics
- 11.3 SNMP
- 11.4 Netflow
- 11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
- 12.1 HA and DR Concepts
- 12.2 High Availability Mechanisms
- 12.3 Disaster Recovery Mechanisms
- 12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
- 13.1 Plans and Procedures
- 13.2 Security Policies
- 13.3 Loss Prevention
- 13.4 Common Agreements
- 13.5 Common Documentation
- 13.6 Structured Cabling – MDF and IDF
- 13.7 Horizontal and Vertical Cabling
- 13.7.1 Activity – Implementing Cable Management
- 13.8 Labeling
- 13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
- 14.1 Common Security Concepts
- 14.2 Common Attack Types
- 14.3 Spoofing-based Attacks
- 14.4 Hijacking and MITM
- 14.5 Social Engineering
- 14.6 Network Segmentation
- 14.7 Private VLANs
- 14.8 Single Organization Authentication
- 14.9 Extending Authentication
- 14.10 Authorization
- 14.11 Network Device Hardening
- 14.12 Wireless Security
- 14.13 Remote Access Security
- 14.14 IoT Security
- 14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
- 15.1 Troubleshooting Methodology
- 15.2 Physical Connectivity Issues
- 15.3 Hardware Testing Tools
- 15.3.1 Activity – Testing an Ethernet Cable
- 15.3.2 Activity – Crimping on an RJ-45 Connector
- 15.3.3 Activity – Punching Down Twisted Pair
- 15.3.4 Activity – Using a Telephone Toner
- 15.4 Understanding Electricity
- 15.4.1 Activity – Checking Cable Continuity
- 15.4.2 Activity – Testing DC Voltage
- 15.4.3 Activity – Testing AC Voltage
- 15.5 Twisted Pair Pinout Problems
- 15.6 Twisted Pair Termination Problems
- 15.7 Repairing Damaged Twisted Pair Cable
- 15.8 Fiber Optic Connectivity Issues
- 15.8.1 Activity – Testing a Fiber Optic Cable
- 15.9 Common Port Problems
- 15.9.1 Working with Ports and Their Devices
- 15.10 Common Software Testing Tools
- 15.10.1 Activity – Scanning for Open Ports
- 15.11 Common Command Line Utilities
- 15.12 Troubleshooting Basic IP Networking Issues
- 15.13 Common Switching Issues
- 15.14 Switching Test Tools and Techniques
- 15.15 Common IP Routing Issues
- 15.16 Wi-Fi Access Point Issues
- 15.17 Wirelss Interference
- 15.17.1 Activity – Using a Spectrum Analyzer
- 15.18 Wireless Antenna Issues
- 15.18.1 Activity – Configuring a Wi-Fi Router
- 15.19 WAP Placement Strategies
- 15.20 Infrastructure Service Issues (DHCP)
- 15.21 Infrastructure Service Issues (DNS)
- 15.22 Infrastructure Service Issues (NTP)
- 15.23 Fireall / ACL Issues
- 15.24 VPN Issues
- 15.25 Additional Network Security Troubleshooting and Tips
- 15.26 Advanced Networking Issues
- 15.27 Troubleshooting Server Services (with Module 15 Outro)
- CompTIA Network+ N10-008 Course Outro
Module 1: Getting Started
- 1.1 Course Introduction
- 1.2 Keyboard Shortcuts
- 1.3 Keyboard Tips
- 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
- 2.1 General Interface and Starting a Project
- 2.2 Basic Title Animation Using Keyframes
- 2.3 Keyframe Interpolation and Keyframe Assistan
- 2.4 Renaming a Composition
- 2.5 Soloing a Layer for Individual Edits
- 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
- 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
- 3.1 Importing Files from Bridge and Creating a New Composition
- 3.2 Horizontal Type Tool and Guides
- 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
- 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
- 4.2 Preview and Apply Text Animation Presets and Use Keyframes
- 4.3 Animate Layers Using Parenting
- 4.4 Editing and Animating Imported Photoshop Text
- 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
- 5.1 Create and Customize a Shape with Shape Tool
- 5.2 Self Animating Shape with a Wiggle Path (green marker)
- 5.3 Create and Customize a Shape with Pen Tool
- 5.4 Snap Layers
- 5.5 Animating Shape Layers with Path Operations
- 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
- 6.1 Animate Multiple Layers Using Parenting
- 6.2 Precomposing Layers
- 6.3 Keyframing a Motion Path
- 6.4 Animating a Character to Create Movement
- 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
- 7.1 Animating Change in Light
- 7.2 Animating Birds Flying with a Track Mat
- 7.3 Animating Shadows and Using Corner Pin
- 7.4 Adding a Lens Flare Effect
- 7.5 Render Composition and Retime
- 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
- 8.1 Setup a Basic Mask
- 8.2 Refine and Apply Mask
- 8.3 Creating a Reflection with a Mask and Blending Modes
- 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
- 9.1 Puppet Position Pen Tool
- 9.2 Starch Pins
- 9.3 Manually Animate with Puppet Tool
- 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
- 10.1 Extract Foreground Object from Background and Create a Mat
- 10.2 Touch Up a Mat with the Refine Edge Tool
- 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
- 11.1 Set up Composition and Use Levels to Start Balancing the Color
- 11.2 Basic Color Grading with Lumetri Color Effects
- 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
- 11.4 Use an Adjustment Layer to Create a Global Color Effect
- 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
- 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
- 12.2 Using Adjustment Layers to Apply a Specific Effect
- 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
- 12.4 Create Checkboxes to Toggle Visibility of a Background Image
- 12.5 Protect Portions of a Project from Time Stretching and Export Template
Module 1: Security and Risk Management
- Intro
- Security and Risk Management pt.1
- Security and Risk Management pt.2
- Security and Risk Management pt.3
- Security and Risk Management Summary
- Security and Risk Management Test Prep pt.1
- Security and Risk Management Test Prep pt.2
- Security and Risk Management Test Prep pt.3
- Security and Risk Management Test Prep pt.4
Module 2: Asset Security
- Asset Secutity pt.1
- Asset Security pt.2
- Asset Security Summary
- Asset Security Test Prep
Module 3: Security Architecture and Engineering
- Security Architecture and Engineering pt.1
- Security Architecture and Engineering pt.2
- Security Architecture and Engineering pt.3
- Security Architecture and Engineering Summary
- Security Architecture and Engineering Test Prep pt.1
- Security Architecture and Engineering Test Prep pt.2
- Security Architecture and Engineering Test Prep pt.3
Module 4: Communication and Network Security
- Communication and Network Security pt.1
- Communication and Network Security pt.2
- Communication and Network Security Summary
- Communication and Network Security Test Prep
Module 5: Identity and Access Management (IAM)
- Identity and Access Management (IAM)
- Identity and Access Management (IAM) Summary
- Identity and Access Management (IAM) Test Prep pt.1
- Identity and Access Management (IAM) Test Prep pt.2
- Identity and Access Management (IAM) Test Prep pt.3
- Identity and Access Management (IAM) Test Prep pt.4
Module 6: Security Assessment and Testing
- Security Assessment and Testing
- Security Assessment and Testing Summary
- Security Assessment and Testing Test Prep
Module 7: Security Operations
- Security Operations pt.1
- Security Operations pt.2
- Security Operations pt.3
- Security Operations pt.4
- Security Operations Summary
- Security Operations Test Prep
Module 8: Software Development Security
- Software Development Security pt.1
- Software Development Security pt.2
- Software Development Security pt.3
- Software Development Security pt.4
- Software Development Security pt.5
- Software Development Security Summary
- Software Development Security Test Prep
- Outro
Module 1: Deploy and Update Operating Systems
- 1.1 Instructor and Course Introduction
- 1.2 Exam Information
- 1.3 Deploy and Update Operating Systems Introduction
- 1.4 Plan and Implement Windows 10 by Using Dynamic Deployment
- 1.5 Plan and Implement Windows 10 by Using Windows Autopilot
- 1.6 Upgrade Devices to Windows 10
- 1.7 Manage Updates
- 1.8 Manage Device Authentication
- 1.9 Install VMware Workstation 15 in Windows 10 Demo
- 1.10 Performing a Clean Install of Windows 10 Demo
- 1.11 Upgrading Windows 8.1 to Windows 10 Demo
- 1.12 Configuring Locales Demo
- 1.13 Troubleshooting Failed Installation with Setup Logs Demo
- 1.14 Installing Windows 16 Server Demo
- 1.15 Installing Microsoft Deployment Toolkits (MDT) Part 1 Demo
- 1.16 Installing Microsoft Deployment Toolkits (MDT) Part 2 Demo
- 1.17 Setting Up an On-Site Domain Controller Demo
- 1.18 Joining Windows 10 Client Machine to an On-Site Domain Controller Demo
- 1.19 Getting Started with Free Azure Subscription Demo
- 1.20 Getting Familiarized with Azure Portal Options Demo
- 1.21 Create a Virtual Machine Demo
Module 2: Manage Policies and Profiles
- 2.1 Managing Policies and Profiles Introduction
- 2.2 Plan and Implement Co-Management
- 2.3 Implement Conditional Access and Compliance Policies
- 2.4 Configure Device Profiles
- 2.5 Manage User Profiles
- 2.6 Deploy Azure Container Instances Demo
- 2.7 Manage Access with RBAC Demo
- 2.8 Secure Network Traffic Demo
- 2.9 Installing OneDrive Demo
Module 3: Manage and Protect Devices
- 3.1 Manage and Protect Devices Introduction
- 3.2 Manage Windows Defender
- 3.3 Manage Intune Device Enrollment and Inventory
- 3.4 Monitor Devices
- 3.5 Windows Defender Security Center Overview Demo
- 3.6 Installing Windows Defender Application Guard Demo
- 3.7 Creating a New Inbound Rule Demo
Module 4: Manage Apps and Data
- 4.1 Manage Apps and Data Introduction
- 4.2 Deploy and Update Applications
- 4.3 Implement Mobile Application Management
- 4.4 Setting up a Microsoft Intune Account Demo
- 4.5 Create a New Group Demo
- 4.6 Confirm the Version of Windows Demo
Module 1 – Query Tools
- 1.1 Course Introduction
- 1.2 Intro to Management Studio
- 1.3 Intro to command-line query tools
Module 2 – Introduction to T-SQL Querying
- 2.1 Introducing T-SQL
- 2.2 Understanding Sets
- 2.3 Understanding the Logical Order of Operations in SELECT statements
Module 3 – Basic SELECT Queries
- 3.1 Writing Simple SELECT Statements
- 3.2 Eliminate Duplicates with DISTINCT
- 3.3 Using Column and Table Aliases
- 3.4 Write Simple CASE Expressions
Module 4 – Querying Multiple Tables
- 4.1 Understanding Joins
- 4.2 Querying with Inner Joins
- 4.3 Querying with Outer Joins
- 4.4 Querying with Cross Joins and Self Joins
Module 5 – Sorting and Filtering Data
- 5.1 Sorting Data
- 5.2 Filtering Data with Predicates
- 5.3 Filtering with the TOP and OFFSET-FETCH
- 5.4 Working with Unknown Values
Module 6 – Introduction to Business Intelligence and Data Modeling
- 6.1 Introduction to Business Intelligence
- 6.2 The Microsoft Business Intelligence Platform
- 6.3 Exploring a Data Warehouse
- 6.4 Exploring a Data Model
Module 7 – Prepare Data
- 7.1 Introduction to Power BI
- 7.2 Get data from various data sources
- 7.3 Preview source data
Module 8 – Clean, Transform, and Load Data
- 8.1 Data Transformation Intro
- 8.2 Transformation Example 1
- 8.3 Transformation Example 2
- 8.4 Transformation Example 3
- 8.5 Transformation Example 4
- 8.6 Transformation Example 5
- 8.7 Transformation Example 6
Module 9 – Design a Data Model
- 9.1 Introduction to Data Modeling
- 9.2 Model Relationships
- 9.3 Table Configuration
- 9.4 Model interface
- 9.5 Quick Measures
- 9.6 Many-to-many relationships
- 9.7 Row-level security
Module 10 – Create Model Calculations using DAX
- 10.1 DAX context
- 10.2 Calculated Tables
- 10.3 Calculated Columns
- 10.4 Managing Date Tables
- 10.5 Measures
- 10.6 Filter Manipulation
- 10.7 Time Intelligence
Module 11 – Create Reports
- 11.1 Basic Report Creation
- 11.2 Example Page 1
- 11.3 Example Page 2
- 11.4 Example Page 3
- 11.5 Report Publishing
- 11.6 Enhancing Reports
- 11.7 Drill-Through Pages
- 11.8 Conditional Formatting
- 11.9 Buttons and Bookmarks
Module 12 – Create Dashboards
- 12.1 Dashboard Basics
- 12.2 Real Time Dashboards
- 12.3 Enhanced Dashboards
Module 13 – Create Paginated Reports
- 13.1 Introduction to Power BI Report Builder
- 13.2 Report Layouts
- 13.3 Report Data
- 13.4 Report Tables
Module 14 – Perform Advanced Analytics
- 14.1 Introduction to Advanced Analytics
- 14.2 Scatter Chart
- 14.3 Forecast
- 14.4 Decomposition Tree
- 14.5 Key Influencers
Module 15 – Create and Manage Workspaces
- 15.1 Introduction to Workspaces
- 15.2 Working with Workspaces and the Portal
Module 16 – Create Power App Visuals
- 16.1 Introduction to Power Apps Visual
- 16.2 Creating the App
- 16.3 Basic Power Apps Concepts
- 16.4 Refreshing the Report
Module 17 – Analysis Services and Power BI
- 17.1 Introduction to Analysis Services
- 17.2 Connecting with Multidimensional Models
- 17.3 Premium Workspaces and Analysis Services
- 17.4 Course Wrap Up
Module 1 – Query Tools
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Intro to Management Studio
- 1.4 Intro to command-line query tools
Module 2 – Introduction to T-SQL Querying
- 2.1 Module 2 Introduction
- 2.2 Introducing T-SQL
- 2.3 Understanding Sets
- 2.4 Understanding the Logical Order of Operations in SELECT statements
Module 3 – Basic SELECT Queries
- 3.1 Module 3 Introduction
- 3.2 Writing Simple SELECT Statements
- 3.3 Eliminate Duplicates with DISTINCT
- 3.4 Using Column and Table Aliases
- 3.5 Write Simple CASE Expressions
Module 4 – Querying Multiple Tables
- 4.1 Module 4 Introduction
- 4.2 Understanding Joins
- 4.3 Querying with Inner Joins
- 4.4 Querying with Outer Joins
- 4.5 Querying with Cross Joins and Self Joins
Module 5 – Sorting and Filtering Data
- 5.1 Module 5 Introduction
- 5.2 Sorting Data
- 5.3 Filtering Data with Predicates
- 5.4 Filtering with the TOP and OFFSET-FETCH
- 5.5 Working with Unknown Values
Module 6 – Working with SQL Server Data Types
- 6.1 Module 6 Introduction
- 6.2 Writing Queries that return Date and Time Data
- 6.3 Writing Queries that use Date and Time Functions
- 6.4 Writing Queries that return Character Data
- 6.5 Writing Queries that use Character Functions
Module 7 – Using DML to Modify Data
- 7.1 Module 7 Introduction
- 7.2 Inserting Records with DML
- 7.3 Updating Records Using DML
- 7.4 Deleting Records Using DML
Module 8 – Using Built-In Functions
- 8.1 Module 8 Introduction
- 8.2 Writing Queries with Built-In Functions
- 8.3 Using Conversion Functions
- 8.4 Using Logical Functions
- 8.5 Using Functions to Work with NULL
Module 9 – Grouping and Aggregating Data
- 9.1 Module 9 Introduction
- 9.2 Using Aggregate Functions
- 9.3 Using the GROUP BY Clause
- 9.4 Filtering Groups with HAVING
Module 10 – Using Subqueries
- 10.1 Module 10 Introduction
- 10.2 Writing Self-Contained Subqueries
- 10.3 Writing Correlated Subqueries
- 10.4 Using the EXISTS Predicate with Subqueries
Module 11 – Using Table Expressions
- 11.1 Module 11 Introduction
- 11.2 Using Views
- 11.3 Using Inline Table-Valued Functions
- 11.4 Using Derived Tables
- 11.5 Using Common Table Expressions
Module 12 – Using Set Operators
- 12.1 Module 12 Introduction
- 12.2 Writing Queries with the UNION operator
- 12.3 Using EXCEPT and INTERSECT
- 12.4 Using APPLY
Module 13 – Using Window Ranking, Offset, and Aggregate Functions
- 13.1 Module 13 Introduction
- 13.2 Creating Windows with OVER
- 13.3 Exploring Window Functions
Module 14 – Pivoting and Grouping Sets
- 14.1 Module 14 Introduction
- 14.2 Writing Queries with PIVOT and UNPIVOT
- 14.3 Working with Grouping Sets
Module 15 – Implementing Error Handling
- 15.1 Module Introduction
- 15.2 Implementing T-SQL error handling
- 15.3 Implementing structured exception handling
Module 16 – Managing Transactions
- 16.1 Module 16 Introduction
- 16.2 Transactions and the Database Engine
- 16.3 Controlling Transactions
- 16.4 Course Wrap Up
Module 1 – Designing and Building Tables
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Database Design
- 1.4 Creating Tables
- 1.5 Data Types
- 1.6 Schemas
- 1.7 Altering Tables
Module 2 – Enforcing Data Integrity
- 2.1 Module 2 Introduction
- 2.2 Introduction to Data Integrity
- 2.3 Data Domain Integrity
- 2.4 Implementing Data Domain Integrity
- 2.5 Implementing Entity and Referential Integrity
Module 3 – Indexing
- 3.1 Module 3 Introduction
- 3.2 Core Indexing Concepts
- 3.3 Heaps, Clustered, and Nonclustered Indexes
- 3.4 Data Types and Indexes
- 3.5 Single Column and Composite Indexes
Module 4 – Stored Procedures, Functions, and Triggers
- 4.1 Module 4 Introduction
- 4.2 Introduction to Database Programming
- 4.3 Creating Stored Procedures
- 4.4 Creating User-Defined Functions
- 4.5 Creating Triggers
Module 5 – Blob and Filestream Data
- 5.1 Module 5 Introduction
- 5.2 Introduction to Binary Data
- 5.3 Considerations for BLOB data
- 5.4 FILESTREAM Example
- 5.5 File Table Example
Module 6 – Full-Text Search
- 6.1 Module 6 Introduction
- 6.2 Introduction to Full-Text Search
- 6.3 Full-Text Catalogs
- 6.4 Full-Text Indexes
- 6.5 Full-Text Queries
Module 7 – Azure vs On-Prem
- 7.1 Module 7 Introduction
- 7.2 SQL Server on Azure VM
- 7.3 Azure Managed SQL Instance
- 7.4 Azure SQL Database
- 7.5 Course Wrap Up
Module 1: Certified Blockchain Developer Hyperledger Overview
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Audience for the Certification
- 1.4 What is a CBDH
- 1.5 Exam Objectives
- 1.6 Exam Overview
Module 2: Hyperledger Framework
- 2.1 Module 2 Introduction
- 2.2 Hyperledger Project Overview
- 2.3 Hyperledger Frameworks
- 2.4 Hyperledger Fabric
- 2.5 Hyperledger Fabric Use Cases
Module 3: Hyperledger Fabric Blockchain
- 3.1 Module 3 Introduction
- 3.2 Hyperledger Fabric Design Overview
- 3.3 Hyperledger Fabric WhiteboardÂ
- 3.4 Hyperledger Fabric Consensus
- 3.5 Hyperledger Fabric Transactions
- 3.6 Transactions Whiteboard
- 3.7 Hyperledger Fabric Ledger
- 3.8 Ledger Whiteboard
- 3.9 Hyperledger Fabric Versions
- 3.10 Hyperledger Fabric Membership Services
- 3.11 Node Types and Roles
- 3.12 Nodes and Peers Whiteboard
- 3.13 Channels
- 3.14 Channels Whiteboard
Module 4: Access Controls and Secure Chaincode
- 4.1 Module 4 Introduction
- 4.2 Access Controls Lists (.acl)
- 4.3 Certificates and Certificate Authority
- 4.4 Organizations and Participants
- 4.5 Endorsement Policies
- 4.6 Rest APIs
Module 5: Plan and Prepare Apps for Deployment
- 5.1 Module 5 Introduction
- 5.2 Development Whiteboard
- 5.3 Installation Considerations
- 5.4 Composer
- 5.5 Composer Demo
Module 6: Hyperledger Fabric Explorer
- 6.1 Module 6 Introduction
- 6.2 Hyperledger Fabric Explorer Basics
- 6.3 Installation Requirements of Hyperledger Explorer
Module 7: Chaincode and Development
- 7.1 Module 7 Introduction
- 7.2 What is Chaincode
- 7.3 Writing Chaincode Considerations
- 7.4 Development Language
- 7.5 Client App Considerations
- 7.6 BNA Files
- 7.7 Service Discovery
Module 8: Course Wrap Up
- 8.1 Module 8 Introduction
- 8.2 Course Review
- 8.3 Top 10 Things to know for the exam
- 8.4 Taking the Exam
- 8.5 Course Closeout
Module 1: Certified Blockchain Solutions Architect Overview
- 1.1 Module 1 Introduction
- 1.2 What is a CBSA
- 1.3 Exam Questions
- 1.4 Exam Objectives
Module 2: Blockchain 101 Terminology and Components
- 2.1 Module 2 Introduction
- 2.2 What is a Blockchain
- 2.3 Blockchain Terminology
- 2.4 Blockchain Key Components
Module 3: Exam Objectives
- 3.1 Module 3 Introduction
- 3.2 Proof of Work, Proof of Stake, Other Proof Systems
- 3.3 Why Cryptocurrency is Needed
- 3.4 Public, Private, and Permissioned Blockchains
- 3.5 How Blocks are Written to a Blockchain
- 3.6 Block Activity Demo
- 3.7 Transactions Whiteboard
- 3.8 Cryptography
- 3.9 LTC Wallet Demo
- 3.10 Database or Blockchain
- 3.11 Public Blockchain Common Uses
- 3.12 Private & Permissioned Blockchain Common Uses
- 3.13 Launching Your Own Blockchain
- 3.14 Segwits and Forks
- 3.15 Mining
- 3.16 Byzantine Fault Tolerance
- 3.17 Consensus Among Blockchains
- 3.18 Hasing
- 3.19 Anders Hashing Demo
- 3.20 Security in Blockchain
- 3.21 Smart Contracts and dApps
- 3.22 History of Blockchain
- 3.23 Blockchain Programming Languages
- 3.24 Common Testing and Deployment Practices
- 3.25 Metamask Demo
- 3.26 Value Creation
- 3.27 Blockchain Architecture
- 3.28 Corda Blockchain Architecture Whiteboard
- 3.29 Enterprise Blockchains
- 3.30 Bitcoin Improvement Protocols
Module 4: Hyperledger
- 4.1 Module 4 Introduction
- 4.2 Hyperledger Project
- 4.3 Hyperledger Fabric
- 4.4 Hyperledger Chaincode
- 4.5 Hyperledger Fabric Whiteboard
- 4.6 Hyperledger Fabric on AWS Demo
Module 5: Ethereum
- 5.1 Module 5 Introduction
- 5.2 Ethereum Overview
- 5.3 Ethereum EVM
- 5.4 Ethereum Browsers
- 5.5 Ethereum Development
- 5.6 Etherscan Demo
Module 6: Course Closeout
- 6.1 Module 6 Introduction
- 6.2 Summary Review
- 6.3 Taking the CBSA Exam
- 6.4 Practice Question
Module 1: Course Overview
- 1.1 Course Introduction
- 1.2 Course Target Audience
- 1.3 Course Pre-Requirements
Module 2: Pre-Sales Activities
- 2.1 Module 2 Introduction
- 2.2 Request for Proposals
- 2.3 Request for Proposals Fintech
- 2.4 Proof of Concepts
- 2.5 Return on Investment
- 2.6 Value Creation
- 2.7 Cost Modeling
- 2.8 Cost Considerations
- 2.9 Enterprise Integration
- 2.10 TPS
- 2.11 Whiteboard Discussion
Module 3: Blockchain Fundamentals
- 3.1 Module 3 Introduction
- 3.2 What is a Blockchain
- 3.3 Blockchain Components
- 3.4 Blockchain Terminology
- 3.5 Enterprise Blockchains
- 3.6 Consensus and Mining
- 3.7 Ledgers
- 3.8 Permissioned vs Permissionless Blockchains
- 3.9 Trust and Blockchain
- 3.10 Advantages of Transparency
- 3.11 Development Expertise
- 3.12 Dapps
- 3.13 BaaS
- 3.14 AWS BaaS Whiteboard Discussion
- 3.15 Understanding Blockchain Architecture
Module 4: Enterprise Blockchains
- 4.1 Module 4 Introduction
- 4.2 Hyperledger
- 4.3 Ethereum
- 4.4 Quorum
- 4.5 R3 Corda
- 4.6 Corda Demobench Demo
- 4.7 Ripple
- 4.8 IBM BaaS
- 4.9 AWS BaaS Demo
Module 5: Use Cases
- 5.1 Module 5 Introduction
- 5.2 Ripple Use Cases
- 5.3 Dubai Use Cases
Module 6: Course Closeout
- 6.1 Module 6 Introduction
- 6.2 Course Review
- 6.3 Blockchain Roles
Module 1 – Introduction to Business Intelligence and Data Modeling
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Business Intelligence
- 1.4 The Microsoft Business Intelligence Platform
- 1.5 Exploring a Data Warehouse
- 1.6 Exploring a Data Model
Module 2 – Multidimensional Databases
- 2.1 Module 2 Introduction
- 2.2 Introduction to Multidimensional Analysis
- 2.3 Overview of Cube Security
- 2.4 Creating and Configuring a Cube
- 2.5 Data Sources
- 2.6 Data Source Views
- 2.7 Adding a Dimension to a Cube
Module 3 – Cubes and Dimensions
- 3.1 Module 3 Introduction
- 3.2 Dimensions
- 3.3 Attribute Hierarchies and Relationships
- 3.4 Sorting and Grouping Attributes
- 3.5 Slowly Changing Dimensions
Module 4 – Measures and Measure Groups
- 4.1 Module 4 Introduction
- 4.2 Measures
- 4.3 Measure Groups and Relationships
- 4.4 Measure Group Storage
Module 5 – Introduction to MDX
- 5.1 Module 5 Introduction
- 5.2 MDX Fundamentals
- 5.3 Adding Calculations to a Cube
- 5.4 Querying a cube using MDX
Module 6 – Customizing Cube Functionality
- 6.1 Module 6 Introduction
- 6.2 Key Performance Indicators
- 6.3 Actions
- 6.4 Perspectives
- 6.5 Translations
Module 7 – Tabular Data Models
- 7.1 Module 7 Introduction
- 7.2 Introduction to Tabular Data Models
- 7.3 Creating a Tabular Data Model
- 7.4 Configure Relationships and Attributes
- 7.5 Configuring Data Model for an Enterprise BI Solution
Module 8 – Data Analysis Expressions (DAX)
- 8.1 Module 8 Introduction
- 8.2 DAX Fundamentals
- 8.3 Calculated Columns
- 8.4 Relationships
- 8.5 Measures
- 8.6 Time Intelligence
- 8.7 KPI
- 8.8 Parent – Child Hierarchies
Module 9 – Data Mining
- 9.1 Module 9 Introduction
- 9.2 Overview of Data Mining
- 9.3 Custom Data Mining Solutions
- 9.4 Validating a Data Mining Model
- 9.5 Consuming a Data Mining Model
- 9.6 Course Wrap Up
Module 1 – Prepare Data
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Power BI
- 1.4 Get data from various data sources
- 1.5 Preview source data
Module 2 – Clean, Transform, and Load Data
- 2.1 Module 2 Introduction
- 2.2 DimEmployee Example
- 2.3 DimEmployeeSalesTerritory Example
- 2.4 DimReseller Example
- 2.5 FactResellersSales Example
- 2.6 ResellerSalesTargets Example
- 2.7 Color Formats Example
Module 3 – Design a Data Model
- 3.1 Module 3 Introduction
- 3.2 Introduction to Data Modeling
- 3.3 Model Relationships
- 3.4 Table Configuration
- 3.5 Model interface
- 3.6 Quick Measures
- 3.7 Many-to-many relationships
- 3.8 Row-level security
Module 4 – Create Model Calculations using DAX
- 4.1 Module 4 Introduction
- 4.2 DAX context
- 4.3 Calculated Tables
- 4.4 Calculated Columns
- 4.5 Managing Date Tables
- 4.6 Measures
- 4.7 Filter Manipulation
- 4.8 Time Intelligence
Module 5 – Create Reports
- 5.1 Module 5 Introduction
- 5.2 Basic Report Creation
- 5.3 Example Page 1
- 5.4 Example Page 2
- 5.5 Example Page 3
- 5.6 Report Publishing
- 5.7 Enhancing Reports
- 5.8 Drill-Through Pages
- 5.9 Conditional Formatting
- 5.10 Buttons and Bookmarks
Module 6 – Create Dashboards
- 6.1 Module 6 Introduction
- 6.2 Dashboard Basics
- 6.3 Real Time Dashboards
- 6.4 Enhanced Dashboards
Module 7 – Create Paginated Reports
- 7.1 Module 7 Introduction
- 7.2 Introduction to Power BI Report Builder
- 7.3 Report Layouts
- 7.4 Report Data
- 7.5 Report Tables
Module 8 – Perform Advanced Analytics
- 8.1 Module 8 Introduction
- 8.2 Introduction to Advanced Analytics
- 8.3 Scatter Chart
- 8.4 Forecast
- 8.5 Decomposition Tree
- 8.6 Key Influencers
Module 9 – Create and Manage Workspaces
- 9.1 Introduction to Workspaces
- 9.2 Working with Workspaces and the Portal
Module 10 – Create Power App Visuals
- 10.1 Module 10 Introduction
- 10.2 Introduction to Power Apps Visual
- 10.3 Creating the App
- 10.4 Basic Power Apps Concepts
- 10.5 Refreshing the Report
Module 11 – Analysis Services and Power BI
- 11.1 Module 11 Introduction
- 11.2 Introduction to Analysis Services
- 11.3 Connecting with Multidimensional Models
- 11.4 Premium Workspaces and Analysis Services
- 11.5 Course Wrap Up
Module 1: Course Overview
- 1.1 Course Overview
- 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
- 2.1 Core Concepts
- 2.2 What is the CKA Exam
- 2.3 Why Get Certified
- 2.4 CKA Exam Domains
- 2.5 What is Kubernetes
- 2.6 What is a Container
- 2.7 What is Docker
- 2.8 Kubernetes Terminology
- 2.9 Kubernetes Components
- 2.10 Kubernetes Documentation
- 2.11 Whiteboard – Kubernetes Overview
Module 3: Kubernetes Installation
- 3.1 Kubernetes Installation
- 3.2 Installation Options
- 3.3 MiniKube
- 3.4 Demo – Install Minikube
- 3.5 Demo – Clusters
- 3.6 Kubectl Basics
- 3.7 Demo – Install Kubectl
Module 4: Working with Kubernetes Clusters and Nodes
- 4.1 Working with Kubernetes Clusters and Nodes
- 4.2 Understanding the Architecture
- 4.3 Understanding the nodes
- 4.4 Core Objects
- 4.5 API
- 4.6 Create a Cluster
- 4.7 Demo – Create a Cluster
- 4.8 Demo – YAML
- 4.9 Demo – Nodes
- 4.10 Demo – Kubectl Client Config
Module 5: API Access and Commands
- 5.1 API Access and Commands
- 5.2 About the API
- 5.3 Accessing the APIs
- 5.4 Demo – Exploring APIS
- 5.5 Kubectl
- 5.6 Using YAML for API Objects
- 5.7 Using Curl
- 5.8 Labels and Annotations
Module 6: Running Pods and Deployments
- 6.1 Running Pods and Deployments
- 6.2 Pods and Deployments
- 6.3 What is a Namespace
- 6.4 Scalability Options
- 6.5 Rolling Updates
- 6.6 Apply Changes to a Pod
- 6.7 Stateful Sets
- 6.8 Demo – Manage Deployments
Module 7: Configuring Storage
- 7.1 Configuring Storage
- 7.2 Storage options with Kubernetes
- 7.3 Configure Pod Volumes
- 7.4 Configure Persistent Volumes
- 7.5 Storage Classes
- 7.6 Whiteboard – Persistent Volumes
- 7.7 Demo – Configure Storage
Module 8: Kubernetes Networking
- 8.1 Kubernetes Networking
- 8.2 Understanding Networking
- 8.3 Services
- 8.4 Network Plugins
- 8.5 DNS
- 8.6 Network Policies
- 8.7 Namespaces
- 8.8 Demo – Networking
- 8.9 Manage High Availability
Module 9: Managing Security
- 9.1 Managing Security
- 9.2 Kubernetes Security
- 9.3 Container and Pod Security
- 9.4 Certificates
- 9.5 API Security
- 9.6 Configmaps and Secrets
- 9.7 Secure Images
- 9.8 Security Context
- 9.9 RBAC
Module 10: Managing Kubernetes In the Enterprise
- 10.1 Managing Kubernetes In the Enterprise
- 10.2 Cluster Management and Maintenance
- 10.3 Demo – Scale Deployment
- 10.4 Demo – Restart Cluster
- 10.5 Demo – Add or Remove Nodes
- 10.6 Demo – Create a Pod in the Background
- 10.7 Kubelet Restarts and Drains
- 10.8 UI Dashboard
- 10.9 Demo – Describe Resources
- 10.10 Kube-scheduler
- 10.11 Demo – Set-Up Alias
Module 11: Kubernetes Monitoring and Troubleshooting
- 11.1 Kubernetes Monitoring and Troubleshooting
- 11.2 Monitoring Resources
- 11.3 Monitoring Pods
- 11.4 Demo – Monitoring Pods
- 11.5 Logging
- 11.6 Demo – Logging
- 11.7 Troubleshooting
- 11.8 Affinity and Taints
Module 12: CKA Practice Exams
- 12.1 CKA Practice Exams
- 12.2 Exam Preparation Must Know
- 12.3 Question 1 – Create a Cluster, Deploy Pods and a Deployment
- 12.4 Question 2 – Create a Pod and Verify
- 12.5 Question 3 – Create a Pod with a Secret
- 12.6 Question 4 – Get Logs on a Pod and Send to File
- 12.7 Question 5 – Liveness Probe
- 12.8 Question 6 – Use Labels
- 12.9 Additional Questions
Module 13: Course Closeout
- 13.1 Course Closeout
- 13.2 Course Review
- 13.3 Kubernetes Certifications
- 13.4 Additional Resources
- 13.5 Exam Readiness
- 13.6 Course Closeout
Module 1: Course Overview
- 1.1 Course Overview
- 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
- 2.1 Core Concepts
- 2.2 What is the CKAD Exam
- 2.3 Why Get Certified
- 2.4 CKAD Exam Domains
- 2.5 APIs
- 2.6 Demo – Explore APIS
- 2.7 Pods
- 2.8 Whiteboard – Pod Creation Workflow
- 2.9 Create a Pod
- 2.10 Lifecycle Status
- 2.11 Inspecting Pods
- 2.12 Demo – Create a Pod and Inspect
Module 3: Configuration
- 3.1 Configuration
- 3.2 Understand Configmaps
- 3.3 Understand Security Contexts
- 3.4 Demo – Create a Security Context
- 3.5 Create and Consume Secrets
- 3.6 Understand Service Accounts
- 3.7 Demo – Create a Pod to Use a Secret
- 3.8 Demo – Define a Service Account
Module 4: Multi Container Pods
- 4.1 Multi Container Pods
- 4.2 Multi Container Pods Design and Patterns
- 4.3 Ambassador Containers
- 4.4 Connecting to Pods
- 4.5 Side Cars
- 4.6 Demo – Create an Init Container
Module 5: Observability
- 5.1 Observability
- 5.2 Container Health
- 5.3 Probes
- 5.4 Logging
- 5.5 Monitor Resources and Apps
- 5.6 Monitoring Pods
- 5.7 Demo – Monitoring and Logging
Module 6: Pod Design
- 6.1 Pod Design
- 6.2 Deployments
- 6.3 Rolling Updates
- 6.4 Pod Changes
- 6.5 Jobs and Crons
- 6.6 Labels and Annotations
- 6.7 Demo – Define and Query Labels
- 6.8 Scalability Options
Module 7: Services and Networking
- 7.1 Services and Networking
- 7.2 Understanding Networking, Routing and Services
- 7.3 Network Policies
- 7.4 Namespaces
- 7.5 Demo – Networking
Module 8: State Persistence
- 8.1 State Persistence
- 8.2 Storage Options
- 8.3 Volume Storage
- 8.4 Configure Pod Volumes
- 8.5 Configure Persistent Volumes
- 8.6 Whiteboard – Persistent Volumes
Module 9: CKA Practice Exams
- 9.1 CKAD Practice Preparation
- 9.2 Exam Prep Need to Know
- 9.3 Question 1 – Create a Pod and Inspect
- 9.4 Question 2 – Define a Pods Readiness
- 9.5 Question 3 – Create a Pod with a Secret
- 9.6 Question 4 – View Pods logs in Real Time
- 9.7 Question 5 – Define and query labels
- 9.8 Additional Questions
Module 10: Course Closeout
- 10.1 Course Closeout
- 10.2 Course Summary Review
- 10.3 Kubernetes Certifications
- 10.4 Additional Resources
- 10.5 Exam Review
- 10.6 Course Closeout
Cisco 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) (CCNP) Course Content
Module 1: Architecture
- 1.1 About Your Instructor
- 1.2 Course Introduction
- 1.3 Welcome to the Architecture Domain
- 1.4 Classic 3 and 2 Tier Models
- 1.5 2 Tier Spine Leaf
- 1.6 Fabric Capacity Planning
- 1.7 High Availability
- 1.8 Designing a WLAN Deployment
- 1.9 Cloud vs On-Prem
- 1.10 The Cisco SD-WAN
- 1.11 Cisco SD-Access
- 1.12 QoS
- 1.13 Hardware vs Software Switching
Module 2: Virtualization
- 2.1 Welcome to the Virtualization Domain
- 2.2 Device Virtualization Technologies
- 2.3 Data Path Virtualization
- 2.4 Network Virtualization Concepts
Module 3: Infrastructure
- 3.1 Welcome to the Infrastructure Domain
- 3.2 Trunking – VTP – EtherChannel
- 3.3 RSTP and MST
- 3.4 EIGRP vs OSPF
- 3.4 OSPF
- 3.5 eBGP
- 3.6 eBGP Part 2
- 3.7 WLANs
- 3.8 NTP NAT PAT
- 3.9 HSRP VRRP GLBP
- 3.10 Multicast
Module 4: Network Assurance
- 4.1 Welcome to the Network Assurance Module
- 4.2 Diagnose Network Issues
- 4.3 NetFlow
- 4.4 SPAN
- 4.5 IP SLA
- 4.6 DNA Center
Module 5: Security
- 5.1 Welcome to the Security Module
- 5.2 Device Access Control
- 5.3 ACLs and CoPP
- 5.4 Wireless Security
- 5.5 Components in Security Design
Module 6: Automation
- 6.1 Welcome to the Automation Module
- 6.2 Python
- 6.3 JSON
- 6.4 YANG
- 6.5 NETCONF-RESTCONF
- 6.6 APIs
- 6.7 EEM
- 6.8 Orchestration Tools
Module 1: What are Big Data Clusters?
- 1.1 Introduction
- 1.2 Linux, PolyBase, and Active Directory
- 1.3 Scenarios
Module 2: Big Data Cluster Architecture
- 2.1 Introduction
- 2.2 Docker
- 2.3 Kubernetes
- 2.4 Hadoop and Spark
- 2.5 Components
- 2.6 Endpoints
Module 3: Deployment of Big Data Clusters
- 3.1 Introduction
- 3.2 Install Prerequisites
- 3.3 Deploy Kubernetes
- 3.4 Deploy BDC
- 3.5 Monitor and Verify Deployment
Module 4: Loading and Querying Data in Big Data Clusters
- 4.1 Introduction
- 4.2 HDFS with Curl
- 4.3 Loading Data with T-SQL
- 4.4 Virtualizing Data
- 4.5 Restoring a Database
Module 5: Working with Spark in Big Data Clusters
- 5.1 Introduction
- 5.2 What is Spark
- 5.3 Submitting Spark Jobs
- 5.4 Running Spark Jobs via Notebooks
- 5.5 Transforming CSV
- 5.6 Spark-SQL
- 5.7 Spark to SQL ETL
Module 6: Machine Learning on Big Data Clusters
- 6.1 Introduction
- 6.2 Machine Learning Services
- 6.3 Using MLeap
- 6.4 Using Python
- 6.5 Using R
Module 7: Create and Consume Big Data Cluster Apps
- 7.1 Introduction
- 7.2 Deploying, Running, Consuming, and Monitoring an App
- 7.3 Python Example – Deploy with azdata and Monitoring
- 7.4 R Example – Deploy with VS Code and Consume with Postman
- 7.5 MLeap Example – Create a yaml file
- 7.6 SSIS Example – Implement scheduled execution of a DB backup
Module 8: Maintenance of Big Data Clusters
- 8.1 Introduction
- 8.2 Monitoring
- 8.3 Managing and Automation
- 8.4 Course Wrap Up
Module 1: Introduction and Deploy Windows
- 1.1 Instructor and Course Introduction
- 1.2 Exam Overview
- 1.3 Deploy Windows Intro
- 1.4 Deploy Windows 10
- 1.5 Deploy Windows 10 Pt 2
- 1.6 Preparing Virtual Lab Setup for the Client 1
- 1.7 Installation of Windows 10 Enterprise
- 1.8 Troubleshooting Failed Installations with Setup Logs
- 1.9 Configuring Locales
- 1.10 Perform Post-Installation Configuration
- 1.11 Navigating Microsoft Edge
- 1.12 Modifying Microsoft Edge Settings
- 1.13 Customizing Your Computer Setting
Module 2: Manage Devices and Data
- 2.1 Manage devices and data intro
- 2.2 Manage local users, groups, and devices
- 2.3 Configure data access and protection
- 2.4 Adding and accessing local users and groups
- 2.5 Managing NTFS permissions in Windows 10
- 2.6 Configure devices by using local policies
- 2.7 Configuring Audit Policies on Windows 10
- 2.8 Manage Windows security
- 2.9 How to change user account settings
Module 3: Configure Connectivity
- 3.1 Configure connectivity intro
- 3.2 Configure networking
- 3.3 Configuring network adapter advanced properties
- 3.4 Configuring a static TCP/IP address
- 3.5 Viewing the networking connection details
- 3.6 Setting up a VPN connection
- 3.7 Configure remote connectivity
- 3.8 Configure remote management
Module 4: Maintain Windows
- 4.1 Maintain Windows intro
- 4.2 Configure system and data recovery
- 4.3 Backing up files in Windows 10
- 4.4 Using the recycle bin
- 4.5 Manage updates
- 4.6 Check for updates in Windows 10
- 4.7 Configuring hardware in Windows 10
- 4.8 Monitor and manage Windows
- 4.9 Configuring Windows 20 desktop options
- 4.10 Installing new features
Module 1: Course Overview
- Course Overview
- Course Pre Reqs
Module 2: The Basics
- The Basics
- What is DevOps
- DevOps Building Blocks
- DevOps Best Practices
- Why Containers
- What is a Pipeline
- Continuous Integration and Continous Delivery
- Continuous Deployment
- Pipelines – Whiteboard
Module 3: Development
- Development Basics
- CICD Strategy
- Source Control Management
- Demo – Build Management
Module 4: Infrastructure
- Release and Deployments
- Release Management
- Demo – Release Management
- Reliability Engineering
- DevOps Tools
- Infrastructure as Code
- Automation
- Demo – (IaaC) CloudFormation
- Demo – Jenkins
- Demo – GitHub
Module 5: Key Performance Indicators (KPIs)
- Key Performance Indicators (KPI)
- KPI Metrics
- KPI Tools
- Monitoring Applications
- Demo – AWS CloudWatch
Module 6: Course Closeout
- Course Closeout
- Summary Review
- Additional Resources
- DevOps Job Outlook
- Course Closeout
Module 1: Course Overview
- Course Overview
- Course PreReqs
Module 2: Basics of Kubernetes
- Basics of Kubernetes
- What is Kubernetes
- Business Value of Kubernetes
- What is a Container
- What is Docker
- Kubernetes History
- Kuberntes Terminology
- Kubernetes Components
- Whiteboard – Kubernetes Overview
Module 3: Kubernetes Design and Architecture
- Kubernetes Design and Architecture
- Kubernetes Design Fundamentals
- Whiteboard – Kubernetes Architecture
- Deployment – Nodes, Pods, and Clusters
- Etcd
- Kubectl
- Demo – Install Kubectl
- Demo – Kubernetes Commands
- Demo – Kubernetes Commands
Module 4: Deployments
- Deployments
- Options for Deployment
- Deploying a Containerized Application
- What is Minikube
- Demo – Deploy MiniKube
- Demo – Deploy Cluster Deployment
- Demo – Deploy Services
- Demo – Manage Application
Module 5: Course Closeout
- Course Closeout
- Course Review
- Kubernetes Certifications
- Additional Resources
- Kubernetes Job Outlook
- Course Closeout
Module 1: Course Overview
- Course Overview
- Course PreReqs
Module 2: DevOps Basics
- DevOps Fundamentals
- What is DevOps
- What are Pipelines
- Continuous Integration and Delivery
- Continuous Deployment
- Whiteboard Build Services
- Demo – DevOps Services on GCP
Module 3: App Engine PaaS
- App Engine
- App Engine Basics
- App Engine Demo
- App Engine Security Scanner Demo
- App Engine or Kubenetes Engine
Module 4: Kubenetes Engine Overview
- Kubenetes Engine
- Kubernetes Basics
- What is Kubenetes Engine
- Demo – Kubenetes Engine Clusters Demo
- Kubenetes Engine Application Demo
- Kubenetes Engine Whiteboard
Module 5: DevOps Developer Tools
- DevOps Services & Tools
- Demo – Cloud SDK
- Demo – Cloud Shell
- Demo – Cloud Build
- Demo – Container Registry
- Demo – Cloud Source Repositories
- Demo – Private Catalog
- Demo – Artifact Registry
Module 6: Microservices
- Microservices
- Demo – Cloud Watch
- Cloud Functions-Cloud Run
- Demo – Cloud Functions
- Demo – Cloud Run
Module 7: Management of your DevOps Services
- Management and Monitoring
- Cloud Operations
- Demo – Cloud Operations
- Service Accounts
- Cloud Endpoints and Apigee
- Demo – Workflows and Cloud Tasks
- Demo – Recommendation Engine
- Infrastructure as Code (IaaC)
- Deployment Manager
- Demo – Deployment Manager
- Demo – Cloud Marketplace
Module 8: Resources and Closeout
- Resources and Closeout
- Course Summary
- DevOps Roles and Salary Demand
- Additional Resources
- Google Cloud Platform Certification
- Course Closeout
Module 1: Installation
- SQL Admin Intro
- Installation
Module 2: Data Storage
- Introduction to Data Storage with SQL Server
- Managing Storage for System Databases
- Managing Storage for User Databases
- Moving Database Files
Module 3: Data Recover
- Intro to Data Recovery
- Understanding SQL Server Recovery Models
- Planning a Backup Strategy
- Backing up Databases and Transaction Logs
- Using SSMS For Backup
- Understanding the Restore Process
- How to Restore a Database
- Using SSMS For Restore
- T-SQL Backup and Restore
- Advanced Restore Scenarios
- Introduction to Transferring Data
- Importing and Exporting Table Data
- Copying or Moving a Database
Module 4: Monitoring
- Introduction to Monitoring SQL Server
- Dynamic Management Views and Functions
- Server Reports
- System Performance Monitor
- Tracing SQL Server Workload Activity
- Extended Events
- Database Tuning Advisor
Module 5: Security
- Introduction to SQL Server Security
- Managing Server-Level Security
- Managing Database-Level Security
- Row Level Security (RLS) Using Policies
- Database Security Tools
- Contained Database
- Auditing Data Access in SQL Server
- Implementing Transparent Data Encryption
Module 6: Maintenance
- Introduction to Maintenance
- Ensuring Database Integrity
- Maintaining Indexes
- Automating Routine Database Maintenance
- Automating SQL Server Management
- Monitoring SQL Server Errors
- Configuring Database Mai
Module 1: Introduction
- Instructor Introduction
- Course Introduction
- Exam Overview
Module 2: Information Security Governance
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
- Module Overview
- Alignment and Resource Management – Task and Knowledge
- Key Relationships
- Standards Awareness and Training – Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices – Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
Module 5: Information Security Incident Management
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment – Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
Module 6: Exam Prep
- Case Study – Security On a Shoestring Budget
- Case Study – APT In Action
- Summary
- Exam Prep
Module 1: Preparing for and Taking the Exam
- Preparing to Take the Exam and Instructor Introduction
- Getting Certified to take the Examination
- Examination Characteristics
- Test Taking Tips and Techniques
- Question Formats
- Post Certification Requirements
Module 2: Process Domain
- Process Domain and Framework defined
- Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- Framework Definitions
- Project Manager Skills
- Framework Key Points to Remember
- Framework Example Questions Review
- Project Integration Management Knowledge Area Defined
- Knowledge Area Process Mapping and Definitions
- Develop Project Charter and Develop Project Management Plan
- Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- Perform Integrated Change Control
- Close Project or Phase
- Integration Key Points to Remember
- Integration Example Questions Review
- Project Scope Management Knowledge Area Defined
- Plan Scope Management and Collect Requirements
- Nominal Group Technique (Delphi-Opinion Technique)
- Define Scope and Create WBS
- Breakdown Structures used in WBS Dictionary
- Validate Scope and Control Scope
- Defining Requirements in Agile
- Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- Scope Key Points to Remember
- Scope Example Questions Review
- Project Schedule Management Knowledge Area Defined
- Plan Schedule Management, Define Activities, and Sequence Activities
- Dependencies, Predecessors, Leads, and Lags
- Estimate Activity Durations
- Develop Schedule
- Critical Path Method
- Schedule Compression
- Resource Leveling, Schedule Format, and Control Schedule
- Agile Estimating
- Agile Schedule Planning and Reporting
- Schedule Key Points to Remember and Example Question review
- Project Cost Management Knowledge Area Defined
- Plan Cost Management and Estimate Cost
- Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- Life Cycle Costing, Status Reporting, and Determine Budget
- Control Costs, and Earned Value Management
- Earned Schedule, and Agile Cost Control
- Cost Key Points to Remember
- Cost Example Questions Review
- Project Quality Management Knowledge Area Defined
- Plan Quality Management
- Manage Quality
- Control Quality
- Continuous Improvement in Agile-Adaptive Life Cycles – Kaizen and Process Analysis
- Continuous Improvement in Agile-Adaptive Life Cycles – Retrospectives
- Quality Key Points to Remember
- Quality Example Questions Review
- Project Risk Management Knowledge Area Defined
- Risk Management Plan and Identify Risks
- Risk Register and Issues Vs Risk
- Perform Qualitative and Quantitative Risk Analysis
- Plan Risk Responses
- Implement Risk Responses and Monitor Risks
- Agile Risk Tools and Risk Key Points to Remember
- Risk Example Questions Review
- Project Procurement Management Knowledge Area Defined
- Plan Procurement Management and Conduct Procurements
- Contracts
- Share and Point of Total Assumption
- Procurement Documents
- Non-Competitive Awards and Control Procurements
- Agile Contracts
- Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
- People Domain and Project Communications Management Knowledge Area Defined
- Plan Communications Management
- Manage and Monitor Communications
- Agile Communications
- Communications Key Points to Remember
- Communications Example Question Review
- Project Stakeholder Management Knowledge Area Defined
- Stakeholder Position Descriptions
- Identify Stakeholders
- Plan Stakeholder Engagement and Manage Stakeholder Engagement
- Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- Stakeholder Management Key Points to Remember
- Stakeholder Management Example Question Review
- Resource Management Knowledge Area Defined
- Plan Resource Management and Estimate Activity Resources
- Acquire Resources and Develop Team
- Manage Team
- Control Resources and Agile Teaming Concepts
- Other Agile Teaming Concepts
- Agile Team Roles and Troubleshooting Agile team issues
- Resources Key Points to Remember
- Resources Example Question Review
Module 4: Business Environment Domain
- Business Environment Domain Defined
- Project Selection Tools
- PMO, Organizational Structure, and Reports
- Agile in the Business Environment
- Business Environment Key Points to Remember and Example Question Review
- Course Closing
Module 1: Introduction to Cloud Computing
- Welcome
- Why Cloud Computing
- What is Cloud Computing
- Cloud Computing Deployment Models
- Cloud Computing Types
- AWS Cloud Overview
- AWS Management Console Walk-Through
- AWS Shared Responsibility
- Summary
Module 2: Identity and Access Management IAM
- IAM Overview
- IAM Users & Groups Hands-On
- IAM Policies Hands-On
- MFA Overview
- MFA Hands-On
- AWS CLI
- AWS CLI Installation Hands-On
- AWS CLI Hands-On
- IAM Roles
- IAM Roles Hands-On
- IAM Security Tools
- IAM Security Tools Hands-On
- IAM Best Practices
- Shared Responsibility Model for IAM
- IAM Summary
Module 3: Elastic Cloud Computing EC2
- Budget Setup
- EC2 Overview
- EC2 Instance Hands-On
- Security Groups
- Security Groups Hands-On
- SSH Overview
- SSH Using Putty-Windows
- SSH Using CMD-Windows
- EC2 Instance Connect
- EC2 Instance Roles
- EC2 Launch Types
- Shared Responsibility Model for EC2
- EC2 Summary
Module 4: EC2 Storage
- Intro to EC2 Instance Storage
- EBS Volume Overview
- EBS Volume Hands-On
- EBS Snapshots
- EBS Snapshots Hands-On
- AMI Overview
- AMI Hands-On
- EC2 Instance Store
- EC2 Instance Store Hands-On
- Elastic File System – EFS
- Shared responsibility Model for EC2 Storage
- Section Cleanup
- EC2 Instance Storage Summary
Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
- Introduction to Scalability & High-Availability
- High Availability, Scalability and Elasticity
- ELB Overview
- ELB Hands-On
- ASG Overview
- ASG Hands-On
- Section Cleanup
- Summary
Module 6: Amazon S3
- S3 Introduction
- S3 Overview
- S3 Hands-On
- S3 Security
- S3 Bucket Policies Hands-On
- S3 Websites
- S3 Website Hands-On
- S3 Versioning
- S3 Versioning Hands-On
- S3 Access Logs
- S3 Access Logs Hands-On
- S3 Replication
- S3 Replication Hands-On
- S3 Storage Classes
- Snowball, Snowball Edge and SnowMobile
- S3 Summary
Module 7: Database and Analytics
- Database Introduction
- RDS & Aurora Overview
- RDS Database Hands-On
- ElastiCache Overview
- DynamoDB Overview
- DynamoDB Hands-On
- RedShift Overview
- Amazon EMR Overview
- Athena Overview
- AWS Glue
- DMS Overview
- Database & Analytics Summary
Module 8: Other Services
- Other Compute Introduction
- ECS-Fargate-ECR Overview
- What is Serverless
- AWS Lambda
- AWS Lambda Hands-On
- AWS Batch
- AWS LightSail
- AWS LightSail Hands-On
- Other Compute Summary
Module 9: Scaling Your Infrastructure
- CloudFormation Overview
- Cloud Formation Hands-On
- Elastic Beanstalk Overview
- Elastic Beanstalk Hands-On
- AWS CodeDeploy
- AWS SSM
- AWS OpsWorks
- Infrastructure at Scale Summary
Module 10: Global Applications
- Why Global Application
- Route 53
- Route 53 Hands-On
- CloudFront
- CloudFront Hands-On
- S3 Transfer Acceleration
- AWS Global Aceelerator
- Global Application Summary
Module 11: Cloud Integration
- Cloud Integration Introduction
- SQS Service
- SQS Service Hands-On
- SNS Service
- SNS Service Hands-On
- Cloud Integration Summary
Module 12: Cloud Monitoring
- CloudWatch Metrics and Alarms
- CloudWatch Metrics and Alarms Hands-On
- CloudWatch Logs
- CloudWatch Events and EventBridge
- CloudWatch Events and EventBridge Hands-On
- CloudTrail
- X-Ray
- Service Health Dashboard
- Personal Health Dashboard
- Monitoring Summary
Module 13: Virtual Private Network
- Settings the Expectations
- VPC and subnets, Internet Gateway and NAT Gateways
- VPC and subnets, Internet Gateway and NAT Gateways-Hands-On
- NACL and Security Groups
- NACL and Security Groups Hands-On
- VPC Flow Logs
- VPC Peering
- VPC Flow Logs and VPC Peering Hands-On
- VPC Endpoints
- VPC Endpoints Hands-On
- Site-to-Site VPNs and Direct Connect
- Transit Gateway
- VPC Summary
Module 14: Security and Compliance
- Introduction to Security and Compliance
- DDoS Mitigration
- Penetration Testing
- KMS and CloudHSM
- Secrets Manager
- AWS Artifact
- GuardDuty
- Inspector
- AWS Config
- AWS Macie
- Security and Compliance Summary
Module 15: Machine Learning
- Amazon Rekognition
- Amazon Transcribe
- Amazon Polly
- Amazon Translate
- Amazon Lex and Connect
- Amazon Comprehend
- Amazon SageMaker
- Machine Learning Summary
Module 16: Advanced Identity
- Amazon Cognito
- Directory Services
- Single Sign-On (SSO)
- Advanced Identity Summary
Module 17: Are You Well Architected?
- Are You Well Architected
- Operational Excellence
- Security
- Reliability
- Performance Efficiency
- Cost Optimization
- Trusted Advisor
Module 18: Congratulations & Exam Preparation
- Exam Tips & Congratulations
Module 1: Introduction
- Instructor Introduction
- Course Overview
- Expectations
Module 2: Cloud Fundamentals
- What is the Cloud
- Basic Terms
- Types of cloud computing
- Cloud Service Models
Module 3: Azure’s Architecture
- Regions and Availability
- Resource Groups and Management
- Azure Marketplace
- Demo- Azure Console Exploration
Module 4: Compute
- Virtual Machines
- Containers
- Demo – Containers
- Functions
- Demo – Functions
- Windows Virtual Desktop and App Services
Module 5: Networking and CDN
- Virtual Networks
- Load Balancers
- Gateways
- Content Delivery Network
- Network Security
- Demo – Connecting two VMs
Module 6: Storage
- Storage
- Big Data and Analytics
- Databases
- Demo – SQL Database
- Database Migration
Module 7: Azure Solutions
- IoT
- Demo – IoT Hub
- AI
- Serverless Computing
Module 8: Administration
- Security
- Identity and Access Management
- Demo – Adding Users and Groups
- Governance
- Demo – Resource Locks
- Privacy and Compliance
Module 9: Pricing and Service Level Agreements
- Managing Costs
- Demo – Pricing Calculator
- Service Level Agreements and Service Lifecycles
Module 10: Exam Preparation
- Exam Layout
- Best Practices and Study Tips
- Overview and Conclusion
Module 11: Review Questions
- Module 11 pt 1
- Module 11 pt 2
- Module 11 pt 3
- Module 11 pt 4
Module 1: Intro & Performing Basic Linux Tasks
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
Module 2: Managing Users and Groups
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
Module 3: Managing Permissions and Ownership
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
Module 4: Managing Storage
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
Module 5: Managing Files and Directories
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
Module 6: Managing Kernel Modules
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- Configure Linux Boot Components
- Configure GRUB
Module 8: Managing System Components
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
Module 9: Managing Devices
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
Module 10: Managing Networking
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- Implement Cybersecurity Best Practices
- Implement Identity and Access Management Methods
- Configure SELinux or AppArmor
- Configure Firewalls
- Implement Logging Services
- Back Up, Restore, and Verify Data
Module 13: Working with Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
Module 15: Installing Linux
- Prepare for Linux Installation
- Perform the Installation
Module 1: Threat and Vulnerability Management
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Flashcards
- Scatter
- Explain software assurance best practices
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
Module 3: Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
Module 4: Incident Response
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
- Recap
- Review Questions
- Before the Exam
Module 1: The Basics
- The Basics
Module 2: Construction and Facility
- Construction and Facility
Module 3: MSDS Sheets
- MSDS Sheets
Module 4: OSHA in Healthcare
- OSHA in Healthcare
Module 5: Other Risk Areas
- Other Risk Areas
Module 1: HIPAA and Privacy
- HIPAA and Privacy
- Security, Safeguards, and Controls
- Examples and Cases
Module 2: Fraud, Waste, and Abuse
- Fraud, Waste, and Abuse
- Case Examples and Law
Module 3: Compliance and Prevention
- Compliance and Prevention
Module 1: Basic Protections
- Basic Protections
Module 2: Sexual Harassment
- Sexual Harassment
Module 3: Other Harassment
- Other Harassment
Module 4: Laws and Cases
- Laws
- Cases
Module 5: Recognize and Prevention
- Recognize and Prevention
Module 1: Understanding Cloud Computing Concepts
- Course Intro
- Understand Basic Cloud Concepts and Terms Pt 1
- Understand Basic Cloud Concepts and Terms Pt 2
- Understand Basic Cloud Concepts and Terms Activity
- Identify Cloud Network and Cloud Storage Technologies
- Identify Cloud Network and Cloud Storage Technologies Activity
- Recognize Cloud Design Aspects
- Recognize Cloud Design Aspects Activity
Module 2: Applying Cloud Business Principles
- Relate Cloud Concepts to Business Principles
- Relate Cloud Concepts to Business Principles Activity
- Establish Cloud Vendor Relations
- Establish Cloud Vendor Relations Activity
- Distinguish the Financial Aspects of Engaging a Cloud Service Provider
- Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity
- Report Financial Expenditures
- Report Financial Expenditures Activity
Module 3: Advising a Cloud Design and Migration
- Relate Cloud Concepts to Cloud Design and Migration
- Relate Cloud Concepts to Cloud Design and Migration Activity
- Use Cloud Assessments
- Use Cloud Assessments Activity
- Manage Cloud Design
- Manage Cloud Design Activity
- Compare Cloud Migration Approaches
- Compare Cloud Migration Approaches Activity
- Identity Benefits and Solutions of Cloud Services
- Identity Benefits and Solutions of Cloud Services Activity
Module 4: Operating in the Cloud
- Relate Cloud Concepts to Technical Operations
- Relate Cloud Concepts to Technical Operations Activity
- Identify the Technical Aspects of Cloud Operations
- Identify the Technical Aspects of Cloud Operations Activity
- Understand DevOps in the Cloud
- Understand DevOps in the Cloud Activity
- Explain Cloud Security Concerns, Measures, and Concepts Part 1
- Explain Cloud Security Concerns, Measures, and Concepts Part 2
- Explain Cloud Security Concerns, Measures, and Concepts Activity
Module 5: Managing Cloud Governance
- Relate Cloud Concepts to Governance
- Relate Cloud Concepts to Governance Activity
- Apply Risk Management Concepts
- Apply Risk Management Concepts Activity
- Understand Compliance and the Cloud
- Understand Compliance and the Cloud Activity
- Manage Policies and Procedures for Cloud Services
- Manage Policies and Procedures for Cloud Services Activity
Module 6: Exam Information, Review and Summary
- Exam Information
- Exam Review Pt 1
- Exam Review Pt 2
- Exam Review Pt 3
- Exam Review Pt 4
Module 7: Activities
- Apply Risk Management Concepts Activity
- Compare Cloud Migration Approaches Activity
- Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity
- Establish Cloud Vendor Relations Activity
- Explain Cloud Security Concerns, Measures, and Concepts Activity
- Identify Cloud Network and Cloud Storage Technologies Activity
- Identify the Technical Aspects of Cloud Operations Activity
- Identity Benefits and Solutions of Cloud Services Activity
- Manage Cloud Design Activity
- Manage Policies and Procedures for Cloud Services Activity
- Recognize Cloud Design Aspects Activity
- Relate Cloud Concepts to Business Principles Activity
- Relate Cloud Concepts to Cloud Design and Migration Activity
- Relate Cloud Concepts to Governance Activity
- Relate Cloud Concepts to Technical Operations Activity
- Report Financial Expenditures Activity
- Understand Basic Cloud Concepts and Terms Activity
- Understand Compliance and the Cloud Activity
- Understand DevOps in the Cloud Activity
- Use Cloud Assessments Activity
Module 8: Tools and Resources
- AWS Tools and Resources
- Azure Tools and Resources
- GCP Tools and Resources
Module 1: Preparing to Deploy Cloud Solutions
- Course Introduction
- Instructor Intro
- Describe Interaction of Cloud Components and Services
- Activity Scenario Introduction
- Describe Interaction of Cloud Components and Services Activity
- Describe Interaction of Non-cloud Components and Services
- Describe Interaction of Non-cloud Components and Services Activity
- Evaluate Existing Components and Services for Cloud Deployment
- Evaluate Existing Components and Services for Cloud Deployment Activity
- Evaluate Automation and Orchestration Options
- Evaluate Automation and Orchestration Options Activity
- Prepare for Cloud Deployment
- Prepare for Cloud Deployment Activity
Module 2: Deploying a Pilot Project
- Manage Change in a Pilot Project
- Manage Change in a Pilot Project Activity
- Execute Cloud Deployment Workflow
- Execute Cloud Deployment Workflow Activity
- Complete Post-Deployment Configuration
- Complete Post-Deployment Configuration Activity
Module 3: Testing Pilot Project Deployments
- Identify Cloud Service Components for Testing
- Identify Cloud Service Components for Testing Activity
- Test for High Availability and Accessibility
- Test for High Availability and Accessibility Activity
- Perform Deployment Load Testing
- Perform Deployment Load Testing Activity
- Analyze Test Results
- Analyze Test Results Activity
Module 4: Designing a Secure and Compliant Cloud Infrastructure
- Design Cloud Infrastructure for Security
- Design Cloud Infrastructure for Security Activity
- Determine Organizational Compliance Needs
- Determine Organizational Compliance Needs Activity
Module 5: Designing and Implementing a Secure Cloud Environment
- Design Virtual Network for Cloud Deployment
- Design Virtual Network for Cloud Deployment Activity
- Determine Network Access Requirements
- Determine Network Access Requirements Activity
- Secure Networks for Cloud Interaction
- Secure Networks for Cloud Interaction Activity
- Manage Cloud Component Security
- Implement Security Technologies
- Implement Security Technologies Activity
Module 6: Planning Identity and Access Management for Cloud Deployments
- Determine Identity Management and Authentication Technologies
- Determine Identity Management and Authentication Technologies Activity
- Plan Account Management Policies for the Network and Systems
- Plan Account Management Policies for the Network and Systems Activity
- Control Access to Cloud Objects
- Control Access to Cloud Objects Activity
- Provision Accounts
- Provision Accounts Activity
Module 7: Determing CPU and Memory Sizing for Cloud Deployments
- Determine CPU Size for Cloud Deployment
- Determine CPU Size for Cloud Deployment Activity
- Determine Memory Size for Cloud Deployment
Module 8: Determing Storage Requirements for Cloud Deployments
- Determine Storage Technology Requirements
- Determine Storage Technology Requirements Activity
- Select Storage Options for Deployment
- Select Storage Options for Deployment Activity
- Determine Storage Access and Provisioning Requirements
- Determine Storage Access and Provisioning Requirements Activity
- Determine Storage Security Options
- Determine Storage Security Options Activity
Module 9: Analyzing Workload Characteristics to Ensure Successful Migration
- Determine the Type of Cloud Deployment to Perform
- Determine the Type of Cloud Deployment to Perform Activity
- Manage Virtual Machine and Container Migration
- Manage Virtual Machine and Container Migration Activity
- Manage Network, Storage, and Data Migration
- Manage Network, Storage, and Data Migration Activity
Module 10: Maintaining Cloud Systems
- Patch Cloud Systems
- Patch Cloud Systems Activity
- Design and Implement Automation and Orchestration for Maintenance
- Design and Implement Automation and Orchestration for Maintenance Activity
Module 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures
- Back Up and Restore Cloud Data
- Back Up and Restore Cloud Data Activity
- Implement Disaster Recovery Plans
- Implement Disaster Recovery Plans Activity
- Implement Business Continuity Plans
- Implement Business Continuity Plans Activity
Module 12: Analyzing Cloud Systems for Performance
- Monitor Cloud Systems to Measure Performance
- Monitor Cloud Systems to Measure Performance Activity
- Optimize Cloud Systems to Meet Performance Criteria
- Optimize Cloud Systems to Meet Performance Criteria Activity
Module 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting
- Monitor for Anomalies and Resource Needs
- Monitor for Anomalies and Resource Needs Activity
- Plan for Capacity
- Plan for Capacity Activity
- Create Reports on Cloud System Metrics
- Create Reports on Cloud System Metrics Activity
Module 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues
- Troubleshoot Deployment Issues
- Troubleshoot Deployment Issues Activity
- Troubleshoot Capacity Issues
- Troubleshoot Capacity Issues Activity
- Troubleshoot Automation and Orchestration Issues
- Troubleshoot Automation and Orchestration Issues Activity
Module 15: Troubleshooting Connectivity Issues
- Identify Connectivity Issues
- Identify Connectivity Issues Activity
- Troubleshoot Connectivity Issues
- Troubleshoot Connectivity Issues Activity
Module 16: Troubleshooting Security Issues
- Troubleshoot Identity and Access Issues
- Troubleshoot Identity and Access Issues Activity
- Troubleshoot Attacks
- Troubleshoot Attacks Activity
- Troubleshoot Other Security Issues
- Troubleshoot Other Security Issues Activity
Module 17: Exam Information, Review, and Summary
- Exam Information
- Course Review
Module 18: Activities
- Activity Scenario Introduction
- Describe Interaction of Cloud Components and Services Activity
- Describe Interaction of Non-cloud Components and Services Activity
- Evaluate Existing Components and Services for Cloud Deployment Activity
- Evaluate Automation and Orchestration Options Activity
- Prepare for Cloud Deployment Activity
- Manage Change in a Pilot Project Activity
- Execute Cloud Deployment Workflow Activity
- Complete Post-Deployment Configuration Activity
- Identify Cloud Service Components for Testing Activity
- Test for High Availability and Accessibility Activity
- Perform Deployment Load Testing Activity
- Analyze Test Results Activity
- Design Cloud Infrastructure for Security Activity
- Determine Organizational Compliance Needs Activity
- Design Virtual Network for Cloud Deployment Activity
- Determine Network Access Requirements Activity
- Secure Networks for Cloud Interaction Activity
- Implement Security Technologies Activity
- Determine Identity Management and Authentication Technologies Activity
- Plan Account Management Policies for the Network and Systems Activity
- Control Access to Cloud Objects Activity
- Provision Accounts Activity
- Determine CPU Size for Cloud Deployment Activity
- Determine Storage Technology Requirements Activity
- Select Storage Options for Deployment Activity
- Determine Storage Access and Provisioning Requirements Activity
- Determine Storage Security Options Activity
- Determine the Type of Cloud Deployment to Perform Activity
- Manage Virtual Machine and Container Migration Activity
- Manage Network, Storage, and Data Migration Activity
- Patch Cloud Systems Activity
- Design and Implement Automation and Orchestration for Maintenance Activity
- Back Up and Restore Cloud Data Activity
- Implement Disaster Recovery Plans Activity
- Implement Business Continuity Plans Activity
- Monitor Cloud Systems to Measure Performance Activity
- Optimize Cloud Systems to Meet Performance Criteria Activity
- Monitor for Anomalies and Resource Needs Activity
- Plan for Capacity Activity
- Create Reports on Cloud System Metrics Activity
- Troubleshoot Deployment Issues Activity
- Troubleshoot Capacity Issues Activity
- Troubleshoot Automation and Orchestration Issues Activity
- Identify Connectivity Issues Activity
- Troubleshoot Connectivity Issues Activity
- Troubleshoot Identity and Access Issues Activity
- Troubleshoot Attacks Activity
- Troubleshoot Other Security Issues Activity
Module 1: Risk Management Fundamentals
- Instructor Intro
- Course Intro
- Risk Management Fundamentals Pt 1
- Risk Management Fundamentals Pt 2
Module 2: Test Requirements
- Test Requirements
Module 3: Test Domains
- Test Domains Pt 1
- Test Domains Pt 2
Module 4: Risk Strategy and Planning
- Risk Strategy and Planning Pt 1
- Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
- Stakeholder Engagement Pt 1
- Stakeholder Engagement Pt 2
- Stakeholder Engagement Pt 3
- Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
- Risk Process Facilitation Pt1
- Risk Process Facilitation Pt2
- Risk Process Facilitation Pt3
Module 7: Risk Monitoring and Reporting
- Risk Monitoring and Reporting Pt 1
- Risk Monitoring and Reporting Pt 2
- Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
- Specialized Risk Analyses Pt 1
- Specialized Risk Analyses Pt 2
- Specialized Risk Analyses Pt 3
Module 9: RMP Recap
- RMP Recap
Module 10: RMP Review Questions
- RMP Review Questions Pt 1
- RMP Review Questions Pt 2
- RMP Review Questions Pt 3
- RMP Review Questions Pt 4
- RMP Review Questions Pt 5
Module 1: Course Orientation, Internet & Web
- Instructor Intro
- Course Intro
- Internet and the Web
Module 2: HTML Basics
- HTML Overview and Your First Webpage
- Create a Template
- Heading Element
- Paragraph Element
- Line Break Elemen
- Blockquote Element
- Phrase Elements
- Ordered List and Unordered Lists
- Description List
- Special Characters
- Structural Elements
- Anchor Elements
- HTML Validation
Module 3: Color & Text, CSS
- Overview of Cascading Style Sheets
- Using Color on Web Pages
- Inline CSS with the Style Attribute
- Embedded CSS with the Style Element
- Configuring Text with CSS
- CSS Class, ID, and Descendant Selectors
- Span Element
- Using External Style Sheets
- Center HTML Elements with CSS
- The Cascade
- CSS Validation
Module 4: Visual Elements & Graphics
- Visual Elements and Graphics
- Types of Graphics
- Image Element
- Image Hyperlinks
- HTML5 Visual Elements
- HTML5 Visual Elements Continued
- Meter and Progress Element
- Background Images
- More About Images
- Sources and Guidelines for Graphics
- CSS3 Visual Effects Pt 1
- CSS3 Visual Effects Pt 2
Module 5: Web Design
- Web Design
Module 6: Page Layout
- Page Layout Pt 1
- Page Layout Pt 2
- Hyperlinks in an Unordered List
- Practice with CSS Two-column Layout
- Header Text Image Replacement
- Practice with an Image Gallery
- Positioning with CSS
- CSS Debugging Techniques
- More HTML5 Structured Elements
Module 7: Links, Layout, & Mobile
- Links, Layout, & Mobile
- Fragment Identifiers
- The Target Attribute
- CSS Sprites
- Three-column CSS Page Layout Pt 1
- Three-column CSS Page Layout Pt 2
- Three-column CSS Page Layout Pt 3
- Three-column CSS Page Layout Pt 4
- Three-column CSS Page Layout Pt 5
- Three-column CSS Page Layout Pt 6
- CSS Styling for Print
- Designing for the Mobile Web
- Viewport Meta Tag & CSS Media Queries
- Responsive Images
- Testing Mobile Display
- Flexible Box Layout
- CSS Grid Layout
Module 8: Tables
- Tables Pt 1
- Tables Pt 2
Module 9: Forms
- Overview of Forms
- Input Element Form Controls Pt 1
- Input Element Form Controls Pt 2
- HTML5 Form Controls
Module 10: Web Development
- Web Development Pt 1
- Web Development Pt 2
Module 11: Web Multimedia and Interactvity
- Web Multimedia and Interactivity
- Getting Started with Audio and Video
- HTML5 Audio and Video Elements
- CSS3 and Interactivity Pt 1
- CSS3 and Interactivity Pt 2
- CSS3 Transform Property and Transition Property Pt 1
- CSS3 Transform Property and Transition Property Pt 2
- CSS3 Transform Property and Transition Property Pt 3
- HTML5 Details and Summary Elements
- Java, JavaScript, Ajax, and jQuery Programming Languages
- HTML5 APIs
Module 12: JavaScript and jQuery
- JavaScript and jQuery
- Debugging
- Document Object Model
- Events and Event Handlers
- Variables
- Programming Concepts
- Form Handling
- jQuery
- jQuery Selectors and jQuery Methods
- jQuery Image Gallery Pt 1
- jQuery Image Gallery Pt 2
- jQuery Plugins Pt 1
- jQuery Plugins Pt 2
Module 13: Course Summary
- Course Summary
Cloud Concepts, Architecture and Design
- Course Intro
- Cloud Concepts, Architecture and Design – Part 1
- Cloud Concepts, Architecture and Design – Part 2
- Cloud Concepts, Architecture and Design – Part 3
- Cloud Concepts, Architecture and Design – Part 4
- Cloud Concepts, Architecture and Design – Part 5
- Cloud Concepts, Architecture and Design – Part 6
- Cloud Concepts, Architecture and Design – Part 7
- Cloud Concepts, Architecture and Design – Part 8
- Cloud Concepts, Architecture and Design – Part 9
Legal, Risk and Compliance
- Legal, Risk and Compliance Part 1
- Legal, Risk and Compliance Part 2
- Legal, Risk and Compliance Part 3
- Legal, Risk and Compliance Part 4
- Legal, Risk and Compliance Part 5
- Legal, Risk and Compliance Part 6
- Legal, Risk and Compliance Part 7
Cloud Data Security
- Cloud Data Security – Part 1
- Cloud Data Security – Part 2
- Cloud Data Security – Part 3
- Cloud Data Security – Part 4
- Cloud Data Security – Part 5
- Cloud Data Security – Part 6
- Cloud Data Security – Part 7
Cloud Platform and Infrastructure Security
- Cloud Platform and Infrastructure Security – Part 1
- Cloud Platform and Infrastructure Security – Part 2
- Cloud Platform and Infrastructure Security – Part 3
- Cloud Platform and Infrastructure Security – Part 4
- Cloud Platform and Infrastructure Security – Part 5
- Cloud Platform and Infrastructure Security – Part 6
- Cloud Platform and Infrastructure Security – Part 7
- Cloud Platform and Infrastructure Security – Part 8
Cloud Application Security
- Cloud Application Security – Part 1
- Cloud Application Security – Part 2
- Cloud Application Security – Part 3
- Cloud Application Security – Part 4
- Cloud Application Security – Part 5
- Cloud Application Security – Part 6
- Cloud Application Security – Part 7
- Cloud Application Security – Part 8
- Cloud Application Security – Part 9
Cloud Security Operations
- Cloud Security Operations – Part 1
- Cloud Security Operations – Part 2
- Cloud Security Operations – Part 3
- Cloud Security Operations – Part 4
- Cloud Security Operations – Part 5
- Cloud Security Operations – Part 6
- Cloud Security Operations – Part 7
- Cloud Security Operations – Part 8
- Cloud Security Operations – Part 9
- Cloud Security Operations – Part 10
- Cloud Security Operations – Part 11
- Course Outro
Module 1: Exploring the Functions of Networking
- Course Introduction
- Instructor Introduction
- Exploring the Functions of Networking Pt 1
- Exploring the Functions of Networking Pt 2
Module 2: Introducing the Host-To-Host Communications Model
- Introducing the Host-To-Host Communications Model Pt 1
- Introducing the Host-To-Host Communications Model Pt 2
Module 3: Introducing LANs
- Introducing LANs
- Get Started with CLI Demo Pt 1
- Get Started with CLI Pt Demo 2
- Adding Descriptions to Interfaces Demo
- Configure Gateway on a Switch Demo
- Visualize Interfaces and Statistics Demo
- Show Version Command Demo
- CDP Demo
Module 4: Exploring the TCP/IP Link Layer
- Exploring the TCP-IP Link Layer Pt 1
- Exploring the TCP-IP Link Layer Pt 2
Module 5: Subnetting
- Subnetting Pt 1
- Subnetting Pt 2
- Subnetting Pt 3
- Subnetting Pt 4
- Subnetting Pt 5
- Subnetting Pt 6
Module 6: Explaining the TCP/IP Transport Layer and Application Layer
- Explaining the TCP-IP Transport Layer and Application Layer Pt 1
- Explaining the TCP-IP Transport Layer and Application Layer Pt 2
- Explaining the TCP-IP Transport Layer and Application Layer Pt 3
Module 7: Exploring the Functions of Routing
- Exploring the Functions of Routing Pt 1
- Exploring the Functions of Routing Pt 2
- Exploring the Functions of Routing Pt 3
- Configuring RIP Demo
- EIGRP Demo Pt 1
- EIGRP Demo Pt 2
Module 8: Exploring the Packet Delivery Process
- Exploring the Packet Delivery Process
Module 9: Troubleshooting a Simple Network
- Troubleshooting a Simple Network
Module 10: Introducing Basic IPv6
- Introducing Basic IPv6 Pt 1
- Introducing Basic IPv6 Pt 2
- Introducing Basic IPv6 Pt 3
- Introducing Basic IPv6 Pt 4
- Introducing Basic IPv6 Pt 5
- Introducing Basic IPv6 Pt 6
- Introducing Basic IPv6 Pt 7
- Introducing Basic IPv6 Pt 8
- IPV6 Basic Configuration and SLAAC Demo Pt 1
- IPV6 Basic Configuration and SLAAC Demo Pt 2
- IPV6 Routing Demo Pt 1
- IPV6 Routing Demo Pt 2
- IPV6 Static Routes Demo
Module 11: Configuring Static Routing
- Configuring Static Routing
- Static Routes Demo
Module 12: Implementing VLANs and Trunks
- Implementing VLANs and Trunks Pt 1
- Implementing VLANs and Trunks Pt 2
- Implementing VLANs and Trunks Pt 3
- Implementing VLANs and Trunks Pt 4
- Spanning-tree Protocol Demo Pt 1
- Spanning-tree Protocol Demo Pt 2
- Spanning-tree Protocol Demo Pt 3
Module 13: Routing Between VLANs
- Routing Between VLANs
- Inter VLAN Routing Demo
Module 14: Introducing OSPF
- Introducing OSPF Pt 1
- Introducing OSPF Pt 2
- Introducing OSPF Pt 3
- Introducing OSPF Pt 4
- OSPF Single Area Demo Pt 1
- OSPF Single Area Demo Pt 2
- OSPF Multiple Area Demo Pt 1
- OSPF Multiple Area Demo Pt 2
Module 15: Building Redundant Switched Topologies
- Building Redundant Switched Topologies Pt 1
- Building Redundant Switched Topologies Pt 2
Module 16: Improving Redundant Switched Topologies with EtherChannel
- Improving Redundant Switched Topologies with Ether Channel Pt 1
- Improving Redundant Switched Topologies with Ether Channel Pt 2
- Configuring Ether Channel Demo
Module 17: Exploring Layer 3 Redundancy
- Exploring Layer 3 Redundancy
Module 18: Introducing WAN Technologies
- Introducing WAN Technologies Pt 1
- Introducing WAN Technologies Pt 2
- Introducing WAN Technologies Pt 3
- Introducing WAN Technologies Pt 4
- Introducing WAN Technologies Pt 5
- Introducing WAN Technologies Pt 6
Module 19: Explaining Basics of ACL
- Explaining Basics of ACL Pt 1
- Explaining Basics of ACL Pt 2
- Explaining Basics of ACL Pt 3
Module 20: Enabling Internet Connectivity
- Enabling Internet Connectivity
- DHCP Demo
- Static NAT Demo
- PAT Using Specific IP Demo
- PAT Using IP of Interface Demo
Module 21: Introducing QoS
- Introducing QoS Pt 1
- Introducing QoS Pt 2
- Introducing QoS Pt 3
- Introducing QoS Pt 4
- Introducing QoS Pt 5
Module 22: Introducing Architectures and Virtualization
- Introducing Architectures and Virtualization Pt 1
- Introducing Architectures and Virtualization Pt 2
- Introducing Architectures and Virtualization Pt 3
- Introducing Architectures and Virtualization Pt 4
Module 23: Introducing System Monitoring
- Introducing System Monitoring Pt 1
- Introducing System Monitoring Pt 2
- Introducing System Monitoring Pt 3
Module 24: Managing Cisco Devices
- Managing Cisco Devices Pt 1
- Managing Cisco Devices Pt 2
- NTP Demo
- Syslog Demo
Module 25: Examining the Security Threat Landscape
- Examining the Security Threat Landscape Pt 1
- Examining the Security Threat Landscape Pt 2
Module 26: Implementing Threat Defense Technologies
- Implementing Threat Defense Technologies Pt 1
- Implementing Threat Defense Technologies Pt 2
- Implementing Threat Defense Technologies Pt 3
- Implementing Threat Defense Technologies Pt 4
- Implementing Threat Defense Technologies Pt 5
- Authentication Protocols Demo Pt 1
- Authentication Protocols Demo Pt 2
- Device Hardening Demo Pt 1
- Device Hardening Demo Pt 2
- Device Hardening Demo Pt 3
- Port Security Demo
Module 27: Exam Preparation
- Exam Prep Tips
Module 28: Practice Demos
- Get Started with CLI Demo Pt 1
- Get Started with CLI Pt Demo 2
- Adding Descriptions to Interfaces Demo
- Configure Gateway on a Switch Demo
- Visualize Interfaces and Statistics Demo
- Show Version Command Demo
- CDP Demo
- Static Routes Demo
- DHCP Demo
- Static NAT Demo
- PAT Using Specific IP Demo
- PAT Using IP of Interface Demo
- Configuring RIP Demo
- Configuring Ether Channel Demo
- Inter VLAN Routing Demo
- Spanning-tree Protocol Demo Pt 1
- Spanning-tree Protocol Demo Pt 2
- Spanning-tree Protocol Demo Pt 3
- EIGRP Demo Pt 1
- EIGRP Demo Pt 2
- Authentication Protocols Demo Pt 1
- Authentication Protocols Demo Pt 2
- NTP Demo
- Syslog Demo
- Device Hardening Demo Pt 1
- Device Hardening Demo Pt 2
- Device Hardening Demo Pt 3
- Port Security Demo
- OSPF Single Area Demo Pt 1
- OSPF Single Area Demo Pt 2
- OSPF Multiple Area Demo Pt 1
- OSPF Multiple Area Demo Pt 2
- IPV6 Basic Configuration and SLAAC Demo Pt 1
- IPV6 Basic Configuration and SLAAC Demo Pt 2
- IPV6 Routing Demo Pt 1
- IPV6 Routing Demo Pt 2
- IPV6 Static Routes Demo
Module 1: Setup and Maintenance
- Module 1 Notes
- Course Introduction
- Knowing Which Account is Right for You
- Getting Started
- User Setup
- Access Rights
- User Setup Completion
- Adding Employees to Payroll
- Inviting Your Accountant
- Dashboard and 3 Ways to Navigate QBO
- Commonly Used Forms
- Module 1 Summary
Module 2: List Management
- Module 2 Notes
- Defining Lists
- Importing Lists
- Employees vs 1099
- Adding and Removing Entries
- Updating Entries
- Editing and Managing List Elements Demo
- Merging Items (entries)
- Form Requirements
- Module 2 Summary
Module 3: Sales (Money-In)
- Module 3 Notes
- Product and Service Setup
- Customer Setup Demo
- Invoicing Workflows
- Recording Sales
- Customer Statements
- Tracking Audit History Demo
- Sales Reciept Workflow
- Undeposited Funds Account
- Accounts Receivable Impact
- Impact of Connecting Your Bank Account to QBO
- Billable Expense Invoicing
- Recording a Customer Credit
- Delayed Charges
- Estimates
- Module 3 Summary
Module 4: Purchased (Money-Out)
- Module 4 Notes
- Product and Service Setup on Purchase Forms
- Vendor Setup
- Purchase Order Transactions
- Entering and Paying Bills
- Recording Checks
- Recording Credit and Debit Card Transactions
- Recording EFTs, Online Payments, and Wire Transfers
- Recording Vendor Credits
- Voiding vs Deleting Checks
- Vendor Page and Report Insights
- Module 4 Summary
Module 5: Accounting
- Module 5 Notes
- Basic financial statements (Balance sheet, income statement, and statement of cash flows)
- Financial Statements Expanded
- Cash and Accrual Accounting Differences
- Difference Between Cash and Accrual Reporting
- Setting a Closing Date
- Balancing Your Books aka Reconciling Demo
- Journal Entries
- Audit Log Insights
- Project Profitability Demo
- Module 5 Summary
Module 6: Reports
- Module 6 Notes
- Customized Reports
- Commonly Used Reports Demo
- Setup Automatic Report Emails
- Collapse and Expand Report Function
- Exporting and Importing Reports
- Module 6 Summary
Module 7: Customizations and Time Savers
- Module 7 Notes
- Tracking Income and Expenses for Multiple Locations
- Organizing your Chart of Accounts
- Custom Fields on Invoices
- Recurring Transactions
- Customizing a Sales Form
- Keyboard Shortcuts
- QBO Mobile App Preview
- Connecting Third Party Apps to QBO
- Module 7 Summary
Module 8: Extra
- Module 8 Notes
- Common Mistakes QBO Users Make
- Final Note on Bookkeeping Best Practices
- Why QBO is Awesome
- Course Outro
- Defining Terms and Sample Quiz Questions
Module 1: Social Media Marketing
- Course Intro
- How to Utilize Social Media
- Client Briefs
- Target Markets
- Personas Pt 1
- Personas Pt 2
- Personas Pt 3
- Competitive Analysis Pt 1
- Competitive Analysis Pt 2
- Competitive Analysis Pt 3
Module 2: Social Media Marketing
- What is the Right Content for You
- Images Pt 1
- Images Pt 2
- Images Pt 3
- Images Pt 4
- Images Pt 5
- Video Pt 1
- Video Pt 2
- Video Pt 3
- Video Pt 4
- Live Videos and Engagement Pt 1
- Live Videos and Engagement Pt 2
Module 3: Social Media Marketing
- What are Analytics and How to Use Them
- Free Analytic Tools Available
- Paid Services to Consider Pt 1
- Paid Services to Consider Pt 2
- Finding the Right Hashtags
- What is Automation
- How to Best Use Automation
- Course Outro
Module 1: Online Learning
- Module 1 Notes
- Course Introduction
- History of Online Learning
- What is Online Learning and Different Types
- Introduction to Synchronous and Asynchronous Learning
- Introduction to Bringing Your Class Online
- Synchronous and Asynchronous Formats
- Hybrid and Enhanced Formats
- Tips for Any Format Part 1
- Tips for Any Format Part 2
- Community of Inquiry Learning Model
- Popular Learning Management Systems
- LMS Discussion Forums
- LMS Announcements
- LMS Content Management and Uploading
- LMS Grading and Feedback
- LMS Integration with Outside Applications
- Moving to Online Teaching
- Segmentation within Online Courses
- Time Limitations in Traditional Teaching vs Online
- Discussions and Engagement In-person vs Online
- Changes and Variances in Online Teaching vs Traditional Teaching
- Attendance in Online Courses
- Deadlines in Online Courses
- Feedback Online
- Tips and Best Practices for Online Teaching
Module 2: Online Learning
- Module 2 Notes
- Creating Structure with Modules
- Example of Module Course Structure within Canvas
- Types of Resources
- Zoom
- Flipgrid
- Slack
- Ziteboard
- Screencastify
- Microsoft Teams
- Google Classroom
- Otter
- edpuzzle
- Best Tips and Practices for Lecturing Online Pt 1
- Best Tips and Practices for Lecturing Online Pt 2
- Best Tips and Practices for Grading Online Pt 1
- Best Tips and Practices for Grading Online Pt 2
- Best Tips and Practices for Online Office Hours and Feedback
- Best Tips and Practices for Online Testing and Study Guides Pt 1
- Best Tips and Practices for Online Testing and Study Guides Pt 2
- Course Outro
Module 1: Getting Started
- 1.1 Instructor Introduction
- 1.2 Course Introduction
Module 2: Getting to Know Adobe Audition
- 2.1 Setting Up Your Workspace and Using Shortcuts
Module 3: The Interface
- 3.1 Setting Up and Adjusting Your Workspace
- 3.3 Navigating the Media Browser
- 3.4 Create a Short Cut to Media and Basic Dive into the Editor Panel
Module 4: Waveform Editing
- 4.1 Opening Audio and Video Files
- 4.2 Making a Basic Adjustment in the HUD
- 4.3 Skipping and Deleting Unwanted Portions of Audio
- 4.4 Quickly Insert Silence into an Audio Track
- 4.5 Using the Zero Crossing Tool to Remove Pops in Audio
- 4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards
- 4.7 Merge Sections of Audio with Mix Paste
- 4.8 Create a Loop
- 4.9 Add an Audio Fade
Module 5: Effects
- 5.1 Working With Effects
- 5.2 Gain Staging
- 5.3 Applying the Effect
- 5.4 Amplitude and Compression
- 5.5 Delay and Echo Effects
- 5.6 Filter and EQ Effects
- 5.7 Modulation Effects
- 5.8 Reverb Effects
- 5.9 Special Effects
- 5.10 Stereo Imagery Effects
- 5.11 Time and Pitch Effects
- 5.12 Audio Plugin Manager and Effects Menu vs Effects Rack
- 5.13 Invert, Reverse, Silence and Generate Effects
- 5.14 Match Loudness and Additional Effects
- 5.15 Create Effect Presets and Favorites
Module 6: Audio Restoration
- 6.1 Hiss Reduction
- 6.2 Crackle, Pop and Click Reduction
- 6.3 Broadband Noise Reduction
- 6.4 Hum Reduction
- 6.5 Removing Artifacts Manually
- 6.6 Automated Sound Removal
Module 7: Mastering
- 7.1 Parametric Equalizer and Equalization
- 7.2 Multi Band Compressor and Dynamic Processing
- 7.3 Reverb and Ambience
- 7.4 Stereo Imaging
- 7.5 Diagnostic Tools and Metering
Module 8: Sound Design
- 8.1 Generate Noise and Tones
- 8.2 Generate Speech Based on Text
- 8.3 Use a Sound File to Create Various Sound Effects Pt 1
- 8.4 Use a Sound File to Create Various Sound Effects Pt 2
- 8.5 Extracting Frequency Bands with the Frequency Band Splitter
Module 9: Creating and Recording Files
- 9.1 Create a Project and Record Into the Waveform Editor
- 9.2 Recording Into the MultiTrack Editor
- 9.3 Check Remaining Free Space for Recording on Hard Drive
- 9.4 Dragging Files Into Audition Directly From a Computer
- 9.5 Import Tracks from a CD
Module 10: Multitrack Sessions
- 10.1 Create a Multitrack session and Template
- 10.2 Multitrack and Waveform Editor Integration
- 10.3 Change Track Colors and Tracks Panel
- 10.4 Track Controls and Creating Busses
- 10.5 Channel Mapping in the Multitrack Editor
- 10.6 Multitrack Editor Effects Rack
Module 11: Multitrack Session Editing
- 11.1 Create a Session, Add Clips and Adjust Timing
- 11.2 Mix Down Session Into a New Audio Track
- 11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time
- 11.4 Clip Editing Techniques and Effects
Module 12: Additional Features and Summary
- 12.1 Advanced Features to Consider and Conclusion
Module 1: Getting Started
- 1.1 Course Introduction
- 1.2 Keyboard Shortcuts
- 1.3 Keyboard Tips
- 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
- Practice Files 1
- Practice Files 2
- 2.1 General Interface and Starting a Project
- 2.2 Basic Title Animation Using Keyframes
- 2.3 Keyframe Interpolation and Keyframe Assistan
- 2.4 Renaming a Composition
- 2.5 Soloing a Layer for Individual Edits
- 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
- 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
- Practice Files 3
- 3.1 Importing Files from Bridge and Creating a New Composition
- 3.2 Horizontal Type Tool and Guides
- 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
- Practice Files 4
- 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
- 4.2 Preview and Apply Text Animation Presets and Use Keyframes
- 4.3 Animate Layers Using Parenting
- 4.4 Editing and Animating Imported Photoshop Text
- 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
- Practice Files 5
- 5.1 Create and Customize a Shape with Shape Tool
- 5.2 Self Animating Shape with a Wiggle Path (green marker)
- 5.3 Create and Customize a Shape with Pen Tool
- 5.4 Snap Layers
- 5.5 Animating Shape Layers with Path Operations
- 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
- Practice Files 6
- 6.1 Animate Multiple Layers Using Parenting
- 6.2 Precomposing Layers
- 6.3 Keyframing a Motion Path
- 6.4 Animating a Character to Create Movement
- 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
- Practice Files 7
- 7.1 Animating Change in Light
- 7.2 Animating Birds Flying with a Track Mat
- 7.3 Animating Shadows and Using Corner Pin
- 7.4 Adding a Lens Flare Effect
- 7.5 Render Composition and Retime
- 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
- Practice Files 8
- 8.1 Setup a Basic Mask
- 8.2 Refine and Apply Mask
- 8.3 Creating a Reflection with a Mask and Blending Modes
- 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
- Practice Files 9
- 9.1 Puppet Position Pen Tool
- 9.2 Starch Pins
- 9.3 Manually Animate with Puppet Tool
- 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
- Practice Files 10
- 10.1 Extract Foreground Object from Background and Create a Mat
- 10.2 Touch Up a Mat with the Refine Edge Tool
- 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
- Practice Files 11
- 11.1 Set up Composition and Use Levels to Start Balancing the Color
- 11.2 Basic Color Grading with Lumetri Color Effects
- 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
- 11.4 Use an Adjustment Layer to Create a Global Color Effect
- 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
- Practice Files 12.1
- Practice Files 12.2
- Practice Files 12.3
- Practice Files 12.4
- 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
- 12.2 Using Adjustment Layers to Apply a Specific Effect
- 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
- 12.4 Create Checkboxes to Toggle Visibility of a Background Image
- 12.5 Protect Portions of a Project from Time Stretching and Export Template
Adobe XD: Module 1
- Instructor Into
- What is XD
- UI and UX Design
- Prototype Forms and Wireframes
- Starting a New Design in XD
- Assets and Character Styles
Adobe XD: Module 2
- Importing Content
- Responsive Resize and Changing Formats
- Adding Interactivity
- Animating Elements
- Sharing and Exporting
Adobe Spark: Module 1
- Instructor Intro
- Course Intro
- Web Based vs Mobile Device
- How to Access Spark
- Branding in Spark
Adobe Spark: Module 2
- Using Spark Post
- Uploading Content from Post for Exporting
- Using Spark Video
- Exporting Finished Videos
- Using Spark Page
- Putting Spark Pages on the Web
Adobe Premiere Rush: Module 1
- Instructor Intro
- Course Intro
- How Does Rush Differ
- Starting a New Project
- Video Resolution and Creating Content
- Finding and Importing Content
- Timeline Controls
- Importing Audio
Adobe Premiere Rush: Module 2
- Gernal Editing
- Advanced Editing
- Color Grading
- Adding Titles
- Principles of Typography in Video
- Fixing Audio
- Video and Audio Transitions
- Exporting Finished Projects
Adobe Dreamweaver: Module 1
- Instructor Intro
- Course Intro
- Getting Images Ready for the Web
- Setting Up Your Workspace
- Creating a New Site
Adobe Dreamweaver: Module 2
- Building Your First Web Pages pt.1
- Building Your First Web Pages pt.2
- Linking Your Web Pages
- Adding Colors and Style
- Creating a Page Visually in Photoshop
- Importing Into Dreamweaver
- Export Site to Web
Module 1 – Adobe Stock
- Instructor Info
- Course Info
- Interface and Features
- Images
- Videos and Licensing
- Templaes and Premium
- Contributing Content
- Best Practices when Contributing
Module 1 – Adobe Portfolio Website Editor
- Instructor Introduction
- Getting Started With Adobe Portfolio
- Creating A Website To Showcase Your Work
- Importing And Syncing From Adobe Lightroom
- Customizing Your Landing Page
Module 1 – Adobe Fonts
- Instructor Intro
- Course Intro
- Navigating the Interface
- Activating and Deactivating Fonts
- Font Packs
- Type Kit Web Fonts
- Course Conclusion
Get Creative With Adobe Behance
- Instructor Introduction
- Adobe Behance Course Introduction
- Adobe Behance – A Creative, Collaborative Application
- Using The Profile page
- Creating A Project
- Exploring The Jobs Section
Module 1: Introduction to AWS Basics
- 1.1 Instructor Intro
- 1.2 AWS Basic Intro
- 1.3 What Is AWS
- 1.4 Advantages of cloud computing
- 1.5 Types of cloud computing
Module 2: AWS Web Services and Cloud Platform Services
- 2.1 Console
- 2.2 CLI
- 2.3 Compute/EC2
- 2.4 Database-RDS
- 2.5 Networking and content delivery
- 2.6 Analytics
- 2.7 SQS-SNS
- 2.8 Workmail
- 2.9 SES
- 2.10 Systems manager
- 2.11 CloudTrail
- 2.12 Route53
- 2.13 Elastic Load Balancing (ELB)
- 2.14 Certificate manager
- 2.15 Directory service
- 2.16 Amazon Simple Storage Service (S3)
- 2.17 Identity and Access Management (IAM)
Module 3: AWS Basic Summary
- 3.1 AWS Basic Summary
Module 4: Introduction to AWS Deep Dive
- 4.1 AWS Deep Dive Intro
Module 5: AWS Management of Services and Features Deep Dive
- 5.1 VPC and Endpoint services pt 1
- 5.1 VPC and Endpoint services pt 2
- 5.2 DNS (Route 53)
- 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 1
- 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 2
- 5.4 Compute-EC2 Stand alone and SA with AR pt 1
- 5.4 Compute-EC2 Stand alone and SA with AR pt 2
- 5.5 ASG and Suspended ASG processes pt 1
- 5.5 ASG and Suspended ASG processes pt 2
- 5.6 Code deploy pt 1
- 5.6 Code deploy pt 2
- 5.7 Backups-Recovery of EC2 pt 1
- 5.7 Backups-Recovery of EC2 pt 2
- 5.7 Backups-Recovery of EC2 pt 3
- 5.8 RDS pt 1
- 5.8 RDS pt 2
- 5.8 RDS pt 3
- 5.9 Directory service
- 5.10 Identity and Access Management (IAM) pt 1
- 5.10 Identity and Access Management (IAM) pt 2
- 5.11 Amazon Simple Storage Service (S3)
- 5.12 SES
- 5.13 Cloudwatch
- 5.14 Cloudtrail
Module 6: AWS Deep Dive Summary
- 6.1 AWS Deep Dive Summary
Module 1
- 1.1 Instructor Bio
- 1.2 Course Intro
Module 2
- 2.1 Creating a New Document
- 2.2 Importing Images and Understanding Links
- 2.3 Basic Tools and Navigating the Interface
- 2.4 Properties Panel
- 2.5 Creating Your Own Graphics within InDesign-
- 2.6 Working with Layers
Module 3
- 3.1 Color Theory
- 3.2 Adding and Altering Fills, Strokes, Colors and Gradients
Module 4
- 4.1 Pages Panel
- 4.2 Master Pages
Module 5
- 5.1 Typography Terms and Definitions
- 5.2 Creating Text + Character and Paragraph Formatting
- 5.3 Character and Paragraph Styles
- 5.4 Wrapping Text Around an Image
- 5.5 Working with Tables
Module 6
- 6.1 Saving, Preflight and Packaging Your Document
- 6.2 Exporting a PDF
Module 7
- 7.1 Principles of Design
Module 8
- 8.1 Letterheads
- 8.2 Business Card
- 8.3 Brochure
- 8.4 Multi-Page Binded Document
- 8.5 Print Booklet
Module 9
- 9.1 Creating a Template in InDesign
- 9.2 Using Step and Repeat
- 9.3 Grouping Objects
- 9.4 Island Spread & Page Tool-
- 9.5 Scripts
- 9.6 Object Styles
- 9.7 Content Collector & Content Placer
- 9.8 Gap Tool
- 9.9 Pathfinder Pallet
Module 10
- 10.1 Considerations When Working with Interactive Documents
- 10.2 Web Docs, Hyperlinks, Buttons and Rollovers
- 10.3 Creating Your Own Path
- 10.4 Exporting
Module 11
- 11.1 Outro
Module 1: Introduction
- 1.1 Instructor Intro
- 1.2 Course Intro
Module 2: Getting Started
- 2.1 What are Vectors
- 2.2 Creating a New Document
- 2.3 Navigating the Interface
Module 3: Drawing
- 3.1 Drawing and Manipulating Primitive Shapes
- 3.2 Drawing Custom Shapes Part 1
- 3.2 Drawing Custom Shapes Part 2
- 3.2 Drawing Custom Shapes Part 3
- 3.3 Importing Images
- 3.4 Understanding Layers and Sublayers
- 3.5 Additional Drawing and Manipulation Tools
Module 4: Colors and Gradients
- 4.1 Color Theory
- 4.2 In-depth dive into Color Palette-
- 4.3 Creating Color Swatches
- 4.4 Creating and Manipulating Gradients Part 1
- 4.4 Creating and Manipulating Gradients part 2
- 4.4 Creating and Manipulating Gradients Part 3
Module 5: Intermediate Illustration
- 5.1 Appearance Palette
- 5.2 Pathfinder Palette
- 5.3 Drawing with Intent part 1
- 5.3 Drawing with Intent Part 2
- 5.4 Blending Modes & FX Part 1
- 5.4 Blending Modes & FX Part 2
Module 6: Typography
- 6.1. Introduction to Typography
- 6.2. Type Tools in Illustrator
- 6.3 Envelope Warp and Mesh
- 6.4 Breaking Text into Outlines
Module 7: Live Trace, Paint Brush and Blob Brush
- 7.1 Live Trace
- 7.2 Paint and Blob Brush
Module 8: Exporting
- 8.1 Difference Between File Formats and Exporting
- 8.2 Course Conclusion
Module 1: Beginner
- 1.0 Intro
- 1.1 The Ribbon
- 1.2 Saving Files
- 1.3 Entering and Formatting Data
- 1.4 Printing from Excel & Using Page Layout View
- 1.5 Formulas Explained
- 1.6 Working with Formulas and Absolute References
- 1.7 Specifying and Using Named Range
- 1.8 Correct a Formula Error
- 1.9 What is a Function
- 1.10 Insert Function & Formula Builder
- 1.11 How to Use a Function- AUTOSUM, COUNT, AVERAGE
- 1.12 Create and Customize Charts
Module 2: Intermediate
- 2.0 Recap
- 2.1 Navigating and editing in two or more worksheets
- 2.2 View options – Split screen, view multiple windows
- 2.3 Moving or copying worksheets to another workbook
- 2.4 Create a link between two worksheets and workbooks
- 2.5 Creating summary worksheets
- 2.6 Freezing Cells
- 2.7 Add a hyperlink to another document
- 2.8 Filters
- 2.9 Grouping and ungrouping data
- 2.10 Creating and customizing all different kinds of charts
- 2.11 Adding graphics and using page layout to create visually appealing pages
- 2.12 Using Sparkline formatting
- 2.13 Converting tabular data to an Excel table
- 2.14 Using Structured References
- 2.15 Applying Data Validation to cells
- 2.16 Comments – Add, review, edit
- 2.17 Locating errors
Module 3: Advanced
- 3.1 Recap
- 3.2 Conditional (IF) functions
- 3.3 Nested condition formulas
- 3.4 Date and Time functions
- 3.5 Logical functions
- 3.6 Informational functions
- 3.7 VLOOKUP & HLOOKUP
- 3.8 Custom drop down lists
- 3.9 Create outline of data
- 3.10 Convert text to columns
- 3.11 Protecting the integrity of the data
- 3.12 What is it, how we use it and how to create a new rule
- 3.13 Clear conditional formatting & Themes
- 3.14 What is a Pivot Table and why do we want one
- 3.15 Create and modify data in a Pivot Table
- 3.16 Formatting and deleting a Pivot Table
- 3.17 Create and modify Pivot Charts
- 3.18 Customize Pivot Charts
- 3.19 Pivot Charts and Data Analysis
- 3.20 What is it and what do we use it for
- 3.21 Scenarios
- 3.22 Goal Seek
- 3.23 Running preinstalled Macros
- 3.24 Recording and assigning a new Macro
- 3.25 Save a Workbook to be Macro enabled
- 3.26 Create a simple Macro with Visual Basics for Applications (VBA)
- 3.27 Outro
Module 1: Beginner
- 1.01 Instructor Intro
- 1.02 Course Intro
- 1.1 Explaining the Ribbon
- 1.2 Creating a Document
- 1.3 Saving Files
- 1.4 Page Views
- 1.5 Formatting Text
- 1.6 Ruler, Margins and Tab Stops
- 1.7 Moving and Duplicating Text
- 1.8 Line Spacing and Paragraph Formatting
- 1.9 Basic Editing
- 1.10 Insert a Basic Table and Graphics
- 1.11 Working with Styles
Module 2: Intermediate
- 2.1 Intermediate Intro
- 2.2 Collaboration & Co-Authorship
- 2.3 Tracking and Viewing Changes
- 2.4 Commenting
- 2.5 Templates & Layouts
- 2.6 Layout Functions on the Ribbon
- 2.7 Customize, Format and Convert Tables and Use as a Page Layout
- 2.8 Insert and Edit a Cover Page
- 2.9 Insert and Customize Headers and Footers
- 2.10 Insert and Customize Endnotes and Footnotes
- 2.11 Creating Sections in a Long Document
- 2.12 Using Sections to Format a Document
- 2.13 Deleting a Section
- 2.14 Reviewing, Inserting and Updating TOC
- 2.15 Creating a Data Source and Linking a Mailing List
- 2.16 Print Settings for Mail Merge
Module 3: Advanced
- 3.1 Adding the Developer Tab
- 3.2 Functionality Among Microsoft Office Products
- 3.3 Using Formulas in Word
- 3.4 Citing Sources in Word
- 3.5 Reviewing and Merging Versions of the Same Document
- 3.6 Creating a Master Document
- 3.7 Creating Sub Documents and Editing Master and Sub Docs
- 3.8 Controlling Editable Content
- 3.9 Form Creation Using the Developer Tab
- 3.10 Macros
Module 1: Getting Started
- 1.0 Course Intro
- 1.1 Touring Adobe PP
- 1.1 Touring Adobe PP pt.2
- 1.2 Setting Up a Project
- 1.3 Importing Media
- 1.4 Organizing Media
- 1.5 Mastering the Essentials of Video Editing
- 1.6 Working with Clips and Markers
- 1.7 Adding Transitions
- 1.8 Multicamera Editing
- 1.9 Advanced Editing Techniques
Module 2: Motion, Sound, and More
- 2.1 Putting Clips in Motion
- 2.2 Editing and Mixing Audio
- 2.3 Sweetening Sound
- 2.4 Adding Video Effects
- 2.5 Basic Color Correction
- 2.6 Compositing Techniques
- 2.7 Creating Graphics
- 2.8 Exporting Frames, Clips and Sequences
Module 1: Getting Started
- 1.1 Instructor Intro
- 1.1 Course Intro
- 1.2 Open Images
- 1.3 Get Familiar with Work Space
- 1.4 Zoom and Pan
- 1.5 Undo and Save Pt 1
- 1.5 Undo and Save Pt 2
- 1.6 Resize and Resolution
- 1.7 Crop and Straighten
- 1.8 Expand the Canvas
- 1.9 Basic Image Corrections
Module 2: Layers and More
- 2.1 Layer Basics
- 2.2 Resizing Layers
- 2.3 Adding Text and Images
- 2.4 Layer Styles
- 2.5 Photo Merge and Panoramic Images
- 2.6 Camera Raw
- 2.7 Camera Raw Continued and Adjustment Layers
- 2.8 Selection Basics
Module 3: Editing, Techniques and More
- 3.1 Raw File XMP
- 3.2 Masks
- 3.3 Puppet Warp and Alpha Channel
- 3.4 Typography
- 3.5 Vector Drawing Techniques
- 3.6 Advanced Compositing
Module 1: Anatomy
- Module 1 Workbook
- 1.1 Introduction
- 1.2 Human Body
- 1.3 Skin
- 1.4 Bones, Muscles and Joints
- 1.5 Heart and Blood Vessels
- 1.6 Lungs
- 1.7 Stomach, Intestines and Colon
- 1.8 Kidney, Bladder, Prostate and More
- 1.9 Uterus, Ovaries and Female Parts
- 1.10 Eye
- 1.11 Glands
- 1.12 Ear, Nose and Throat
- 1.13 Blood
- 1.14 Immune
- 1.15 Brain and Spinal Cord
Module 2: Diagnosis Coding
- Module 2 Workbook
- 2.1 Overview of ICD
- 2.2 Outpatient Guidelines
- 2.3 Infectious and Parasitic
- 2.4 Neoplasms
- 2.5 Diseases of the Blood and Blood Organs
- 2.6 Endocrine, Nutritional and Metabolic Diseases
- 2.7 Mental and Behaviroal Health
- 2.8 Pregnancy, Childbirth and the Puerperium
- 2.9 Conditions Originating in Perinatal Period
- 2.10 Symptoms, Signs and Abnormal Clinical and Laboratory Findings
- 2.11 Injury, Poisoning and Certain Other External Causes
- 2.12 Diseases of the Skin and Subcutaneous Tissue
- 2.13 External Causes of Morbidity
- 2.14 Factors Influencing Health
- 2.15 Circulatory System
- 2.16 Eye
- 2.17 Respiratory
- 2.18 Digestive
Module 3: Procedure Coding
- Module 3 Workbook
- 3.1 Evaluation and Management part 1
- 3.1 Evaluation and Management part 2
- 3.1 Evaluation and Management part 3
- 3.1 Evaluation and Management part 4
- 3.2 Anesthesia
- 3.3 Modifiers
- 3.4 Surgery part 1
- 3.4 Surgery part 2
- 3.4 Surgery part 3
- 3.5 Radiology
- 3.6 Pathology
- 3.7 OB/GYN
- 3.8 Physical Medicine part 1
- 3.8 Physical Medicine part 2
- 3.9 HCPCS
- 3.10 Diving Into Coding part 1
- 3.10 Diving Into Coding part 2
- 3.10 Diving Into Coding part 3
- 3.11 NCCI, MUE and GME
- 3.12 CAT Codes
Module 4: Billing Guidelines and Practices
- Module 4 Workbook
- 4.1 HIPAA, Compliance and Reimbursement part 1
- 4.1 HIPAA, Compliance and Reimbursement part 2
- 4.1 HIPAA, Compliance and Reimbursement part 3
- 4.1 HIPAA, Compliance and Reimbursement part 4
- 4.2 The Next Steps
Module 1: Implement VM Solutions
- Intro
- Implement VM Solutions Pt 1
- Implement VM Solutions Pt 2
- Implement VM Solutions Pt 3
- Implement VM Solutions Pt 4
- Implement Batch Jobs Using AZ Batch Services
- Create Containerized Solutions Pt 1
- Create Containerized Solutions Pt 2
Module 2: Develop Azure Platform as a Service
- Develop Azure Platform as a Service (PaaS) Pt 1
- Develop Azure Platform as a Service (PaaS) Pt 2
- Develop Azure Platform as a Service (PaaS) Pt 3
- Develop Azure Platform as a Service (PaaS) Demo Pt 1
- Develop Azure Platform as a Service (PaaS) Demo Pt 2
- Create Azure App Service Mobile Apps
- Create Azure App Service API Apps
- Implement Azure Functions Pt 1
- Implement Azure Functions Pt 2
Module 3: Develop for Azure Storage
- Develop for Azure Storage Pt 1
- Develop for Azure Storage Pt 2
- Develop for Azure Storage Pt 3
- Develop Solutions that use Azure Cosmos DB Pt 1
- Develop Solutions that use Azure Cosmos DB Pt 2
- Develop Solutions that use Relational Database Pt 1
- Develop Solutions that use Relational Database Pt 2
- Develop Solutions that use Microsoft Blob Storage
Module 4: Implement Azure Security
- Implement Azure Security Pt 1
- Implement Azure Security Pt 2
- Implement Azure Security Pt 3
- Implementing Access Control Pt 1
- Implementing Access Control Pt 2
- Implementing Secure Data Solutions
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
- Develop for Code Scalability
- Instrument Solutions to Support Monitoring and Logging
- Integrate Caching and Content Delivery Pt 1
- Integrate Caching and Content Delivery Pt 2
Module 6: Connect to and Consume Azure and Third Party Services
- Connect to and Consume Azure and Third Party Services Pt 1
- Connect to and Consume Azure and Third Party Services Pt 2
- Working with Azure Search
- Azure API Management
- Develop Event Based Solutions Pt 1
- Develop Event Based Solutions Pt 2
- Develop Message Based Solutions Pt 1
- Develop Message Based Solutions Pt 2
- Outro
Module 1: Adobe Lightroom Overview
- Instructor Introduction
- Preparing To Use Adobe Lightroom
Module 2: Adobe Lightroom Use Case
- Non-Destructive Photo Editor
Module 3: Lightroom Library and Organization
- Lightroom Library And Organization Part 1
- Lightroom Library And Organization Part 2
- Lightroom Library And Organization Part 3
- Lightroom Library And Organization Part 4
Module 4: Editing Your Photo – Global Adjustments
- Edit Your Photo – Global Adjustments Part 1
- Edit Your Photo – Global Adjustments Part 2
- Edit Your Photo – Global Adjustments Part 3
- Edit Your Photo – Global Adjustments Part 4
- Edit Your Photo – Global Adjustments Part 5
- Edit Your Photo – Global Adjustments Part 6
- Edit Your Photo – Global Adjustments Part 7
- Edit Your Photo – Global Adjustments Part 8
- Edit Your Photo – Global Adjustments Part 9
- Edit Your Photo – Global Adjustments Part 10
- Edit Your Photo – Global Adjustments Part 11
Module 5: Edit Your Photo – Local Adjustments
- Edit Your Photo – Local Adjustments Part 1
- Edit Your Photo – Local Adjustments Part 2
- Edit Your Photo – Local Adjustments Part 3
- Edit Your Photo – Local Adjustments Part 4
- Edit Your Photo – Local Adjustments Part 5
- Edit Your Photo – Local Adjustments Part 6
Module 6: Saving and Exporting Your Photo In Lightroom Classic
- Exploring All Saving And Exporting Options
Module 7: Lightroom CC – A Cloud Based Version
- How to Launch And Work Within Lightroom CC
Module 8: Course Closeout
- Instructor Course Wrap Up
Module 1: Intro
- Intro
Module 2: Camera Anatomy
- Camera Anatomy
- Camera Anatomy 2
Module 3: Scene Camera Modes
- Scene Camera Modules
Module 4: Achieve Exposure
- Achieve Exposure
- Achieve Exposure 2
Module 5: Filetypes
- Filetypes
Module 6: Sensor
- Sensor
Module 7: Resolution
- Resolution
Module 8: White Balance
- White Balance
- White Balance 2
Module 9: Color Theory
- Color Theory
Module 10: Depth of Field
- Depth of Field
Module 11: Focusing
- Focusing
Module 12: Lighting
- Lighting
- Lighting 2
Module 13: Metering
- Metering
Module 14: Composition
- Composition
Chapter 1: Course Introduction and Methodology
- 1.1
- 1.2
- 1.3
Chapter 2: Virtualization Overview
- 2.1
- 2.2
Chapter 3: Planning and Installing ESXi
- 3.1
- 3.2
- 3.3
- 3.4
- 3.5
- 3.6
- 3.7
Chapter 4: Using tools to Administer a VMware Environment
- 4.1
- 4.2
- 4.3
Chapter 5: vCenter and Licensing
- 5.1
- 5.2
- 5.3
- 5.4
- 5.5
- 5.6
- 5.7
Chapter 6: Configuring Networking
- 6.1
- 6.2
- 6.3
Chapter 7: Configuring Storage
- 7.1
- 7.2
- 7.3
- 7.4
- 7.5
- 7.6
Chapter 8: VM Creation, Configuration, and Snapshots
- 8.1
- 8.2
- 8.3
- 8.4
- 8.5
- 8.6
- 8.7
- 8.8
- 8.9
Chapter 9: Security and Permissions
- 9.1a
- 9.1b
- 9.1c
- 9.2
- 9.3
- 9.4
Chapter 10: Host and VM Monitoring
- 10.1
- 10.2a
- 10.2b
- 10.3
- 10.4
- 10.5
- 10.6
Chapter 11: Advanced ESXi and vCenter Server Management
- 11.1
- 11.2
- 11.3
- 11.4
- 11.5
- 11.6
Chapter 12: Patching and Upgrading ESXi
- 12.1a
- 12.1b
- 12.2a
- 12.2b
Chapter 13: Disaster Recovery and Backup
- 13.1
- 13.2
- 13.3
- 13.4
Module 1: Getting Started with Python
- Module 1 File
- Intro to Course and Instructor
- Getting Started with Python
Module 2: Working with Primitive Data Types
- Module 2 File
- Working with Primitive Data Types
- Working with Primitive Data Types Part 2
- Working with Primitive Data Types Part 3
- Working with Primitive Data Types Part4
- Working with Primitive Data Types Part4 Answers
Module 3: Working with Multiple Assignments Statements
- Module 3 File
- Working with Multiple Assignments Statements
Module 4: Convert Types in Python
- Module 4 File
- Convert Types in Python
Module 5: Creating Lists
- Module 5 File
- Creating Lists
Module 6: Modifying Lists
- Module 6 Notes
- Modifying Lists
Module 7: Sorting and Reversing Lists
- Module 7 File
- Sorting and Reversing Lists
Module 8: Slicing Lists
- Module 8 File
- Slicing Lists
Module 9: Working With Operators
- Module 9 File
- Working With Operators
- Working With Operators Part2
- Working With Operators Part3
Module 10: Determining Operator Precedence
- Module 10 File
- Determining Operator Precedence
Module 11: Working with IF Statements
- Module 11 File
- Working with IF Statements
Module 12: Working With For Loops
- Module 12 File
- Working With For Loops
Module 13: Working With While Loops
- Module 13 File
- Working With While Loops
Module 14: Nesting for Loops
- Module 14 File
- Nesting for Loops
Module 15: Reading Files
- Module 15 File
- Reading Files Part1
- Reading Files Part2
Module 16: More on Files
- Module 16 File
- More on Files
Module 17: Merging Emails
- Module 17 File
- Merging Emails
Module 18: Reading Console Inputs and Formatting Outputs
- Module 18 File
- Reading Console Inputs and Formatting Outputs
Module 19: Reading Command Line Argument
- Module 19 File
- Reading Command Line Argument
Module 20: Defining Functions
- Module 20 File
- Defining Functions
Module 21: Using Default Argument
- Module 21 File
- Using Default Argument
Module 22: Using Keyword and Positional Arguments
- Module 22 File
- Using Keyword and Positional Arguments
Module 23: Handling Exceptions
- Module 23 File
- Handling Exceptions
Module 24: Using Math and Random Modules
- Module 24 File
- Using Math and Random Modules
Module 25: Displaying Daytime Working Directory and File Metadata
- Module 25 File
- Displaying Daytime Working Directory and File Metadata
Module 1 – IT Concepts and Terminology
- Module 1 Notes
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
Module 2 – Infrastructure
- Module 2 Notes
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 – Applications and Software
- Module 3 Notes
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
Module 4 – Software Development
- Module 4 Notes
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
Module 5 – Database Fundamentals
- Module 5 Notes
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 – Security
- Module 6 Notes
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
Module 1 Introducing Windows Server 2016
- Module 1 Notes
- 1. Windows Server 2016 Fundamentals Intro
- 2. Mod 1 Introducing Windows Server 2016
- 3. Mod 1a Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
- Module 2 Notes
- 4. Mod 2 Managing Windows Server 2016
- 5. Mod 2a Managing Windows Server 2016
Module 3 Managing Storage
- Module 3 Notes
- 6. Mod 3 Managing Storage
- 7. Mod 3a Managing Storage
Module 4 Monitoring and Troubleshooting Servers
- Module 4 Notes
- 8. Mod 4 Monitoring and Troubleshooting Servers
- 9. Mod 4a Monitoring and Troubleshooting Servers
Module 5 Essential Services
- Module 5 Notes
- 10. Mod 5 Essential Services
- 11. Mod 5a Essential Services
Module 6 Understanding File and Print Services
- Module 6 Notes
- 12. Mod 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
- Module 7 Notes
- 13. Mod 7 Windows Network Services and Applications-
- 14. Mod 7a Windows Network Services and Applications-
Mod 8 Key Takeaways
- Key Takeaway Notes
- 15. Key takeaways Intro
- 16. Key takeaways – Module 1 Introducing Windows Server 2016
- 17. Key takeaways – Module 2 Managing Windows Server 2016
- 18 Key takeaways – Module 3 Storing Data in Windows Server 2016
- 19. Key takeaways – Module 4 Monitoring and Troubleshooting Servers
- 20. Key takeaways – Module 5 Essential Services
- 21. Key takeaways – Module 6 Understanding File and Print Services
- 22. Key takeaways – Module 7 Windows Network Services and Applications
Mod 9 Terms to Know
- Terms to Know Notes
- 23. Terms to Know Intro
- 24. Terms to Know – Module 1 Introducing Windows Server 2016
- 25. Terms to Know – Module 2 Managing Windows Server 2016
- 26 Terms to Know – Module 3 Storing Data in Windows Server 2016
- 27. Terms to Know – Module 4 Monitoring and Troubleshooting Servers
- 28. Terms to Know – Module 5 Essential Services
- 29. Terms to Know – Module 6 Understanding File and Print Services
- 30. Terms to Know – Module 7 Windows Network Services and Applications
Mod 10 Hands on Labs
- Hands on Labs Setup Notes
- 01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
- 02 Step by Step Install VMware Player 15 in Windows 10 1
- 03 Installing and Configuring DC1 Virtual Machine
- 04 Installing and Configuring SRV-1 Virtual Machine
- 05 Installing and Configuring Client 1 Virtual Machine
- 06 Installing and Configuring the Router Virtual Machine
- 07 Creating and Configuring SRV-2 Virtual Machine
- 08 Working with Windows Server 2016 Desktop Experience
- 09 Managing Organizational Units and Groups in AD DS
Module 1 Understanding Security Layers
- Module 1 Notes
- 1.0 Security Fundamentals Instructor
- 1.1 Security Fundamentals Intro
- 1.2 Understanding Security Layers Part1
- 1.3 Understanding Security Layers Part2
Module 2 Authentication, Authorization, and Accounting
- Module 2 Notes
- 2.0 Authentication, Authorization & Accounting Part1
- 2.1 Authentication, Authorization & Accounting Part2
- 2.2 Authentication, Authorization & Accounting Demo
Module 3 Understanding Security Policies
- Module 3 Notes
- 3.0 Understanding Security Policies
Module 4 Understanding Network Security
- Module 4 Notes
- 4.0 Understanding Network Security Part1
- 4.1 Understanding Network Security Part2
Module 5 Locking Down Server and Client
- Module 5 Notes
- 5.0 Locking Down the Server and Client
- 5.1 Locking Down the Server and Client Part2
Module 6 Key Takeaways
- Key Takeaway Notes
- 6.0 Key Take Aways Intro
- 6.1 Understanding Security Layers
- 6.2 Authentication Authorization and Accounting
- 6.3 Understanding Security Policies
- 6.4 Understanding Network Security
- 6.5 Security Fundamentals Part 2
Module 7 Terms to Know
- Terms to Know Notes
- 7.0 Terms to Know Intro
- 7.1 Understanding Security Layers Terms
- 7.2 Authentication Authorization and Accounting Terms
- 7.3 Understanding Security Policies Terms
- 7.4 Understanding Network Security Terms
- 7.5 Locking Down Server and Client Terms
Module 1 Understanding Local Area Networking
- Module 1 Notes
- 1.0 Intro to Networking Fundamentals
- 1.1 Exam Overview
- 1.1 Examining Local Network Devices and Data Transfers 1a
- 1.1 Examining Local Network Devices and Data Transfers 1b
- 1.1 Examining Local Network Devices and Data Transfers 1c
- 1.1 Examining Local Network Devices and Data Transfers 1d
- 1.1 Examining Local Network Devices and Data Transfers 1e
- 1.1 Examining Local Network Devices and Data Transfers 1f
- 1.2 Examining Local Network Devices and Data Transfers Part 2a
- 1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
- Module 2 Notes
- 2.1 Defining Networks with OSI Model Part 1a
- 2.2 Defining Networks with OSI Model Part 1b
- 2.3 Defining Networks with OSI Model Part 1c
- 2.4 Defining Networks with OSI Model Part 1d
- 2.5 Defining Networks with OSI Model Part 1e
- 2.6 Defining Networks with OSI Model Part 1f
- 2.7 Defining Networks with OSI Model Part 1g
- 2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
- Module 3 Notes
- 3.1 Understand Wired and Wireless Networks Part1
- 3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
- Module 4 Notes
- 4.1 Understanding Internet Protocol Part1
- 4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
- Module 5 Notes
- 5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
- Module 6 Notes
- 6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
- Module 7 Notes
- 7.1 Understanding Wide Area Network Part1
- 7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
- Module 8 Notes
- 8.1 Defining Network Infrastructure & Network Security Part1
- 8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
- Key Takeaway Notes
- 1. Key Take Aways of Networking Fundamentals
- 2. Key Take Aways Mod1
- 3. Key Take Aways Mod2
- 4. Key Take Aways Mod3
- 5. Key Take Aways Mod4
- 6. Key Take Aways Mod5
- 7. Key Take Aways Mod6
- 8. Key Take Aways Mod7
Module 10 Terms to Know
- Terms to Know Notes
- 1. Terms to Know Networking Fundamentals
- 2. Terms to Know Mod1
- 3. Terms to Know Mod2
- 4. Terms to Know Mod3
- 5. Terms to Know Mod4
- 6. Terms to Know Mod5
- 7. Terms to Know Mod6
- 8. Terms to Know Mod7
- 9. Terms to Know Mod8
Module 1 – Operating Systems
- Module 1 Workbook
- 0.1 Intro to A+ Core2 Instructor
- 1.0 Intro to A+ Core2
- 1.1 Operating Systems Part1
- 1.1 Operating Systems Part2
- 1.2 Compare and Contrast features of Microsoft Windows Versions
- 1.3 Summarize General OS Installation Considerations Upgrade Methods
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
- 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
- 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
- 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
- 1.5 Microsoft Operating System and Tools Part1
- 1.5 Microsoft Operating System and Tools Part1 Demo
- 1.5 Microsoft Operating System and Tools Part2
- 1.5 Microsoft Operating System and Tools Part2 Demo
- 1.5 Microsoft Operating System and Tools Part3
- 1.5 Microsoft Operating System and Tools Part3 Demo
- 1.5 Microsoft Operating System and Tools Part4
- 1.5 Microsoft Operating System and Tools Part4 Demo
- 1.6 Microsoft Windows Control Panel Utilities
- 1.6 Microsoft Windows Control Panel Utilities Demo
- 1.7 Summerize Application Installation and Configuration Concepts
- 1.8 Configure Windows Networking on a Client Desktop
- 1.8 Configure Windows Networking on a Client Desktop Demo
- 1.9 Features and Tools of MAC OS and Linux Client Desktop
Module 2 – Security
- Module 2 Workbook
- 2.1 Security – Physical Security Measures
- 2.2 Explain Logical Security Concepts
- 2.2 Explain Logical Security Concepts Part2
- 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
- 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
- 2.6 Compare Contrast the different Microsoft Windows Security Settings
- 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
- 2.7 Implement Security Best Practices to Secure a Workstation
- 2.7 Implement Security Best Practices to Secure a Workstation Part2
- 2.8 Implement Methods for Securing Mobile Devices
- 2.9 Implement Appropriate Data Destruction & Disposal Methods
- 2.10 Configure Security on SOHO Wireless and Wired Networks
- 2.10 Configure Security on SOHO Wireless and Wired Networks Demo
Module 3 – Software Troubleshooting
- Module 3 Workbook
- 3.1 Software Troubleshooting Part1
- 3.1 Software Troubleshooting Part2
- 3.1 Software Troubleshooting Demo
- 3.2 Troubleshoot and Resolve PC Security Issues
- 3.2 Troubleshoot and Resolve PC Security Issues Part2
- 3.2 Troubleshoot and Resolve PC Security Issues Demo
- 3.3 Best Practice Procedures for Malware Removal
- 3.4 Troubleshoot Mobile OS and Application
- 3.5 Troubleshoot Mobile OS and Application Security Issue
Module 4 – Operational Procedures
- Module 4 Workbook
- 4.1 Operational Procedures
- 4.2 Implement Basic Change Management Best Practices
- 4.3 Implement Basic Disaster Prevention and Recovery Methods
- 4.4 Explain Common Safety Procedures
- 4.5 Explain Environmental Impacts and Appropriate Controls
- 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
- 4.7 Using Proper Communication Techniques and Professionalism
- 4.8 Identify the Basic of Scripting
- 4.8 Identify the Basic of Scripting Demo
- 4.9 Use Remote Access Technologies
Module 1 – Mobile Devices
- Module 1 Workbook
- 0.1 Intro to A+ Core1 Instructor
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Devices Part 1
- 1.1 Mobile Devices Part 2
- 1.1 Mobile Devices Part 3
- 1.2 Installing Components in Laptop
- 1.3 Laptop Features Part 1
- 1.3 Laptop Features Part 2
- 1.4 Compare and Contrast Types of Mobile Devices
- 1.5 Accessories and Ports of Other Mobile Devices Part 1
- 1.5 Accessories and Ports of Other Mobile Devices Part 2
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
- 1.7 Use Methods to Perform Mobile Device Synchronization
- 1.8 Laptop Disassemble and Assemble
Module 2 – Networking
- Module 2 Workbook
- 2.1 Networking Part 1
- 2.1 Networking Part 2
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
- 2.3 Setting Up a Wireless Router
- 2.4 Compare and Contrast Wireless Networking Protocols
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
- 2.6 Explain Common Network Configuration Concepts Part 1
- 2.6 Explain Common Network Configuration Concepts Part 2
- 2.7 Compare and Contrast Internet Connection Types Network Types and Features
- 2.8 Given a Scenario Using Appropriate Networking Tools
Module 3 – Hardware
- Module 3 Workbook
- 3.1 Hardware Part 1
- 3.1 Hardware Part 2
- 3.1 Hardware Part 3
- 3.2 Identify Common Connector Types
- 3.3 Scenario Install RAM Types
- 3.4 Scenario Select Install and Configure Storage Devices
- 3.4 Scenario Select Install and Configure Storage Devices Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
- 3.5 Install Disassemble and Assemble a Desktop
- 3.6 Purposes for Peripherals and Types
- 3.7 Summarize Power Supplies
- 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
- 3.9 Scenario Installand Configure Common Devices
- 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
- 3.11 Scenario Install and Maintain Various Print Technologies Part 1
- 3.11 Scenario Install and Maintain Various Print Technologies Part 2
- 3.11 Scenario Install and Maintain Various Print Technologies Part 3
Module 4 – Virtualization and Cloud Computing
- Module 4 Workbook
- 4.1 Virtualization Part 1
- 4.1 Virtualization Part 2
- 4.2 Scenario Setup and Configure Client-side Virtualization
Module 5 – Hardware and Network Troubleshooting
- Module 5 Workbook
- 5.1 Hardware and Networking Troubleshooting
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
- 5.3 Troubleshoot Hard Drives and RAID Arrays
- 5.4 Troubleshoot Video and Display Issues
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
- 5.6 Troubleshoot Printers
- 5.7 Troubleshoot Common Wired and Wireless Network Problems
Module 1 : Agile Principles and Mindset
- Agile Introduction XP
- Agile Core Principles XP
- Lean Product Development XP
- Agile Leadership Tasks XP
- Agile Communications XP
Module 2 : Value Driven Delivery
- Value Driven Delivery XP
- Value Driven Delivery XP Part2
Module 3 : Stakeholder Engagement
- Stakeholder Engagement XP
- Facilitation Tools XP
Module 4 : Team Performance
- Team Performance XP
- Digital Tools for Distibuted Teams XP
Module 5 : Adaptive Planning
- Adaptive Planning XP
- Adaptive Planning Part2 XP
Module 6 : Problem Detection and Resolution
- Problem Detection and Resolution XP
Module 7 : Continuous Improvement
- Continuous Improvement XP
Module 1 : Agile Principles and Mindset
- Agile Introduction Scrum
- Agile Core Principles Scrum
- Lean Product Development Scrum
- Agile Leadership Tasks Scrum
- Agile Communications Scrum
Module 2 : Value Driven Delivery
- Value Driven Delivery Scrum
- Value Driven Delivery Scrum Part2
Module 3 : Stakeholder Engagement
- Stakeholder Engagement Scrum
- Facilitation Tools Scrum
Module 4 : Team Performance
- Team Performance Scrum
- Digital Tools for Distibuted Teams Scrum
Module 5 : Adaptive Planning
- Adaptive Planning Scrum
- Adaptive Planning Scrum Part2
Module 6 : Problem Detection and Resolution
- Problem Detection and Resolution Scrum
Module 7 : Continuous Improvement
- Continuous Improvement Scrum
Module 1 : Prepare for installation requirements
- Module 1 Workbook
- Prep for Installation Windows 10
- Clean Install or Upgrade Windows 10
- Editions of Windows 10
- What Features Do You Want
- Installation Media
- Looking at MS Application Compatibility Toolkit (ACT)
Module 2 : Install Windows
- Module 2 Workbook
- Installing Windows
- Clean installation of Windows 10-Demo
- Upgrade using Installation Media
- Configure Native Boot and VHD
- Migrating to Windows 10
- Chp2 Booting from VHD
- Creating a VHD-Demo
- Installing Windows 10 to a VHD-Demo
- Installing on Bootable USB
- Using USMT User State Migration Tool-Demo
- Additional Windows Features
- Create an MBR-Partitioned VHD-Demo
- Additional Regional and Language Support
- Putting Win 10 on a VHD with DISM-Demo
Module 3 : Configure devices and device drivers
- Module 3 Workbook
- Configure Devices and Device Drivers
- Resolve Driver Issues
- Configuring Driver Settings
- Manage Driver Packages
- Download and Import Driver Packages
- Using DISM
- Installing o Updating Drivers using Device Manager-Demo
- Roll Back Drivers-Demo
- Using Sigverif-Demo
- More on Device Manager-Demo
Module 4 : Perform post-installation configuration
- Module 4 Workbook
- Perform Post Installation Configuration
- Configure Accessibilty Options
- Configure Cortana
- Configure Microsoft Edge
- Configure Internet Explorer
- Configure Client Hyper-V
- Configure Power Settings
- Customizing the Start Menu-Demo
- Start Tiles-Demo
- Desktop Customization-Demo
- Action Center and Notifications-Demo
- Hyper V-Demo
- Power Settings-Demo
Module 5 : Implement Windows in an enterprise environment
- Module 5 Workbook
- Implement Windows in an Enterprise Enviornment
- Implementing Active Directory
- Implement Volume Activation Using a Key Mgmt Service
- Query and Configure Activation State using Command line
- Configure Active Directory Including Group Policies
- Configure and Optimize User Account Control UAC
- Using Software Licensing Manager; slmgr.vbs -dli-Demo
- Taking a look at UAC-Demo
Module 6 : Configure networking
- Module 6 Workbook
- Configuring Networking
- Configuring Name Resolution
- Connect to a Network
- Configure Network Locations
- Configure Windows Firewall
- Configure Windows Firewall with Advance Security
- Configure Network Discovery
- Configuring Wi-Fi Settings
- Troubleshoot Network Issues
- Configure VPNs
- Configure IPsec
- Configure DirectAccess
- Configure IP Addresses Manually-Demo
- DNS Settings-Demo
- Looking at Network Locations and where to make Chpanges-Demo
- Windows Firewall – Basic Settings-Demo
- Windows Firewall – Advanced Settings-Demo
- Troubleshooting Tools-Demo
- Create a VPN Connection-Demo
Module 7 : Configure storage
- Configure Storage
- Create and Configure VHD
- Configure Removable Devices
- Create and Configure Storage Spaces
- Troubleshoot Storage and Removable Device Issue
- Steps to create a simple volume-Demo
- Create VHD with Hyper-V Manager-Demo
- Create VHD with PowerShell-Demo
- Bitlocker to Go-Demo
Module 8 : Configure data access and usage
- Module 8 Workbook
- Configure Data Access and Usage File-Printer
- Configure File System Permissions
- Configure File Share Public Folders and OneDrive
- Configure OneDrive usage including Files On Demand
- Troubleshoot Data Access and Usage
- File Sharing-Demo
- Printer Sharing-Demo
- Set Printer Security-Demo
- File system permissions-Demo
- Public Folder Sharing-Demo
- OneDrive-Demo
- Storage Sense-Demo
- Disk Quotas-Demo
Module 9 : Implement Apps
- Module 9 Workbook
- Implement Apps
- Configure Startup Options
- Configure Windows Features
- Configure Windows Stores
- Implementing Windows Store Apps
- Implement Windows Store for Business and Education
- Provison Packages
- Create Packages
- Chpange Default Apps-Demo
- Application Startup Options-Demo
- Looking at Windows Features-Demo
- Windows Store-Demo
- Windows Imaging and Configuration Designer Tool ICD-Demo
Module 10 : Configure remote management
- Module 10 Workbook
- Configuring Remote Management
- Configure Remote Management Settings
- Configure Remote Desktop
- Configure Remote Assistance
- Modifying Using MMC or PS
- Configure Remote PowerShell
- Remote Management Settings-Demo
- Allow through Windows Firewall-Demo
- Remote Desktop-Demo
- Remote Assistance-Demo
- Remote with MMC-Demo
- Windows PowerShell Remoting-Demo
Module 11 : Configure Updates
- Module 11 Workbook
- Configure Update Windows 10
- Manage Update History
- Roll Back Updates
- Implement Insider Preview CB CBB and LTSB
- Update Windows Store Apps
- Windows Update Options-Demo
- Update History-Demo
- Rolling Back Updates-Demo
- Update Windows Store apps-Demo
Module 12 : Monitor Windows
- Module 12 Workbook
- Monitor Windows
- Configure Event Subscriptions
- Monitor Performance Using Task Manager
- Monitor System
- Monitor and Manage Printers
- Monitor Performance Using Performance Monitor Data Collectors
- Monitor and Manage Printers
- Configure Indexing Options
- Manage Client Security by Using Windows Defender
- Evaluate System Stability by Using Reliaability Monitor
- Troubleshoot Performance Issues
- Manage Security Using Windows Defender Security Center
- Configure Windows Defender Advanced Threat Detection
- Event Viewer-Demo
- Creating Event Subscriptions-Demo
- Task Manager-Demo
- Performance Monitor-Demo
- Resource Monitor-Demo
- Managing the Printers with Print Management-Demo
- Indexing-Demo
- Windows Defender-Demo
- Reliability Monitor-Demo
Module 13 : Configure System and Data Recovery
- Module 13 Workbook
- Configure System and Data Recovery
- Configure System Restore
- Configure Restore Points
- Peform a Refresh or Recycle
- Restore Previous Versions of Files and Folders
- Configure File History
- Recover Files from OneDrive
- Use Windows Backup and Restore
- Perform a Backup and Restore with WBAdmin
- Perform Recovery Operations Windows Recovery
- Configure a Recovery Drive-Demo
- Configure System Restore-Demo
- Configure Restore Points-Demo
- Performing a Refresh or Recycle-Demo
- Configure File History-Demo
- Use Windows Backup & Restore-Demo
Module 14 : Configure Authorization and Authentication
- Module 14 Workbook
- Configure Authorization and Authentication
- Configure Pictures Passwords and Biometrics
- Configure Workgroups
- Configure Domain Settings
- Configue Homegroup Settings
- Configure Credential Manager
- Configure Local Accounts
- Configure Microsoft Accounts
- Configure Device Registration
- Configure Windows Hello for Business
- Configure Device Guard
- Credential Guard
- Configure Device Health Attestation
- Configure UAC Behavior
- Configure Dynamic Look
- Picture Passwords-Demo
- Workgroups-Demo
- Domains-Demo
- Credential Manager-Demo
- Configure Local Accounts-Demo
- Dynamic Lock-Demo
Module 15 : Configure Advanced Management Tools
- Module 15 Workbook
- Configure Advanced Management Tools
- Configure Device Manager
- Configure and use the MMC
- Configure Task Schedule
- Configure Automation of Mgmt Task Using Windows PowerShell
- Convert Group Policy Objects to MDM Policies using the MDM
- Services-Demo
- Using the MMC-Demo
- Task Scheduler-Demo
- Opening PowerShell and the Integrated Scripting Environment-Demo
Module 1: Intro and what will this course cover?
- Managing Different Personalities Intro
Module 2: My Story and background
- My Story
Module 3: Let's get on the same page
- Let's Start Together on the Same Page
Module 4: Two personality types
- Two Types of Personalities
Module 5: A Good vs Bad Manager
- Good vs Bad Manager
Module 6: What are the best ways to manage your team?
- What is the Best Way to Manage Your Team
Module 7: Mentalities to avoid
- Mentalities to Avoid
- Can You Be Your Employee's Friend
- Trying To Make Everyone Happy
- Talking Down to Your Team
Module 8: How to approach a problem with an employee?
- How To Approach a Problem with an Employee
Module 9: Diversity in your team
- There is A lot of Diversity Out There
Module 10: My personal difficulty with careless employees
- My Personal Difficulties
Module 11: Discipline
- Discipline
- Best Practices During Discipline
Module 12: Angry employees
- What To Do with Angry Employees
- Is It Ok To Yell at Your Employees
Module 13: When it is time to say goodbye
- When It Is Time to Say Goodbye
Module 14: Disrespect from your team
- Disrespect from Your Team
- How to Build Respect from Your Team
Module 15: Common management mistakes
- Common Mangement Mistakes
Module 16: How do I become a better manager?
- How Do I Become a Better Manager
Module 17: How to manage if you aren't the big, big boss
- How To Manage a Team if You're a Middle Manager
Module 18: Dealing with other managers
- Dealing with other Managers
Module 19: Conclusion and summary of course
- Summary
Module 1 – The Pen Test Engagement
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
Module 2 – Passive Reconnaissance
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
Module 3 – Active Reconnaissance
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 – Physical Security
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
Module 5 – Social Engineering
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
Module 6 – Vulnerability Scan Analysis
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
Module 7 – Password Cracking
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
Module 8 – Penetrating Wired Networks
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
Module 9 – Penetrating Wireless Networks
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
Module 10 – Windows Exploits
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
Module 11 – Linux Exploits
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
Module 12 – Mobile Devices
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
Module 13 – Specialized Systems
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
Module 14 – Scripts
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
Module 15 – Application Testing
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
Module 16 – Web App Exploits
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking – SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
Module 17 – Lateral Movement
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
Module 18 – Persistence
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
Module 19 – Cover Your Tracks
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks – Timestomp Files Act
- 19.3 Cover Your Tracks – Frame the Administrator Act
- 19.4 Cover Your Tracks – Clear the Event Log Act
- 19.5 Cover Your Tracks Review
Module 20 – The Report
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
Module 21 – Post Engagement Cleanup
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion.mp4
Module 1 : Getting Certified to take the Examination
- Intro
Module 2 : Techniques for Preparing for and Taking the Examination
- Getting Certified to take the Exam
- Techniques for Preparing for the Exam
Module 3 : Project Management Framework
- PMBOK Framework prt1
- PMBOK Framework prt2
- PMBOK Framework prt3
Module 4 : Project Integration Management
- Project Integration Mgmt
- Project Integration Mgmt prt2
- Integration Questions
Module 5 : Project Scope Management
- Project Scope Mgmt
- Project Scope Mgmt prt2
- Scope Questions
Module 6 : Project Schedule Management
- Project Schedule Mgmt
- Project Schedule Mgmt prt2
- Project Schedule Mgmt prt3
- Schedule Knowledge Questions
Module 7 : Project Cost Management
- Project Cost Mgmt
- Earned Value Mgmt
- Trend Analysis
- Cost Questions
Module 8 : Project Quality Management
- Project Quality Mgmt
- Quality Zero Defects
- Control Quality
- Quality Questions
Module 9 : Project Resource Management
- Project Resource Mgmt
- Estimate Activity Resources
- Manage Team
- Resource Histogram
- Resource Questions
Module 10 : Project Communications Management
- Project Communication Mgmt
- Communication Methods
- Communications
- Communication Questions
Module 11 : Project Risk Management
- Project Risk Mgmt
- Identify Risk
- Quantitive Risk Analysis
- Plan Risk Responses
- Risk Questions
Module 12 : Project Procurement Management
- Project Procurement
- Make or Buy
- Share
- Procurement Documents
- Negotiations
- Procurement Questions
Module 13 : Project Stakeholder Management
- Project Stakeholder Mgmt
- Plan Stakeholder Engagement
- Project Stakeholder Questions
- CAPM Conclusion
Module 1 – Risk Management
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
Module 2 – Enterprise Security Architecture
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 – Enterprise Security Operations
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
Module 4 – Technical Integration of Enterprise Security
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
Module 5 – Research, Development and Collaboration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
Module 1 Online Lead Generation
- Intro to Social Media Digital Marketing
- Online Lead Generation prt1
- Online Lead Generation prt2
- Lead Examples
- Live Streaming Video for Leads
- Lead Generation
- Using Your Customers
- Be Ready
Module 2 Facebook, LinkedIn, and YouTube 101
- Create a Facebook Business Page
- Facebook Setup
- Marketing in Facebook Groups
- Messenger Bots
- More on Messenger
- Facebook Video using InShot
- Repurposing
- Setting Up LinkedIn Pro le
- Benefits of YouTube
Module 3 List Building & Email Marketing
- Email List prt1
- Email List prt2
- MailChimp prt1
- MailChimp prt2
- Email Content Ideas
- Email summary
Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps
- Canva Image Creation
- Making a video with your phone
- InShot video
- Purpose Video Marketing
- Transcribing Video
- Word Swag
- Ripl
- Instagram prt1
- Instagram prt2
- Instagram prt3
Module 5 Sales Funnels
- Click Funnel prt1
- Click Funnel prt2
- Funnel Building prt1
- Funnel Building prt2
Module 6 Apps & Tools Review
- Social Media apps
- Podcasting
- Customer Value Letter
- Tips and Tricks
- Fiverr
- Outro
Module 1
- Introduction
- Photography Basics
- Photography Basics prt 2
- Questions and Answers
- Questions and Answers prt 2
- Questions and Answers prt 3
- Basic Accessories
- Basic Accessories prt 2
- Lenses
- DSLR vs DSLM
- Studio shoot
- Studio shoot with model prt 1
- Studio shoot with model prt 2
- Studio green-screen shoot
- Common Questions
- Common Questions prt 2
- Basic Editing
- Levitation and Transferring Images to Your PC
- Levitation and Importing into PhotoShop
- Logo and Watermark
- Deleting Backgrounds
- Product Photography
- Website
- Website Images prt 2
- Real Estate Photography
- Branding
- Camera phone
- Accessories for Mobile Phones and GoPro
- Conclusion
Starting Your Own YouTube Channel
- Welcome to the course
- What Will Your Channel Be About?
- Recording Device
- Your Competition
- Your Normal Video Formula
- Your Apprearance
- Your Personality On Camera
- Beware of Copy-written Content
- Elements To Make Your Channel and Videos Better Part 1
- Elements To Make Your Channel and Videos Better Part 2
- Sound Quality
- Post Schedule
- Doing Too Much
- Community Interaction
- Trolls and Negative Comments
- Fancy Equipment Or Not
- Patience
- Conclusion
Module 1: Deploy a Microsoft Azure SQL Database
- Introduction
- Introducing the Azure SQL Database Part 1
- Introducing the Azure SQL Database Part 2
- Setting Up Azure Lab
- Chose a Service Tier Part 1
- Chose a Service Tier Part 2
- Create Servers and Databases Part 1
- Creating a Azure SQL Server and Database Lab
- Create Servers and Databases Part 2
- Create Servers and Databases Part 3
- Connecting SSMS to Azure SQL Lab Part 1
- Connecting SSMS to Azure SQL Lab Part 2
- Create a Sysadmin Account
- Creating Azure SQL Logins and Users Lab
- Congure Elastic Pools
- Creating and Conguring an Elastic Pool Lab
Module 2: Plan for SQL Server Installation
- Plan for an IaaS or On-Premises Deployment Part 1
- Plan for an IaaS or On-Premises Deployment Part 2
- Select the Appropriate Size for a Virtual Machine
- Plan Storage Pools Based on Performance Requirements Part 1
- Plan Storage Pools Based on Performance Requirements Part 2
- Evaluate Best Practices for Installation
- Design a Storage Layout for a SQL Server Virtual Machine
Module 3: Deploy SQL Server Instances
- Deploy a SQL Server Instance in IaaS and On-Premises
- Restoring AdventureWorks 2016 Database Lab
- Provision an Azure Virtual Machine to Host a SQL Server Instance
- Provisioning an Azure Virtual Machine to Host a SQL Server Lab
- Manually Install SQL Server on an Azure Virtual Machine
- Installing SQL 2016 Lab Part 1
- Installing SQL 2016 Lab Part 2
- Automate the Deployment of SQL Server Databases
- Exploring Azure SQL Database Automation Lab
- Deploy SQL Server by Using Templates
- Managing JSON Templates Lab
Module 4: Deploy SQL Server Databases to Azure Virtual Machines
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 1
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 2
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 3
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 4
- Generate Benchmark Data for Performance Needs
- Generating Benchmark Data Lab Part 1
- Generating Benchmark Data Lab Part 2
- Perform Performance Tuning on Azure IaaS
- Perform Performance Tuning on Azure IaaS Lab Part 1
- Perform Performance Tuning on Azure IaaS Lab Part 2
- Support Availability Sets in Azure Part 1
- Support Availability Sets in Azure Part 2
- Manage High Availability Lab Part 1
- Manage High Availability Lab Part 2
- Manage High Availability Lab Part 3
- Manage High Availability Lab Part 4
- Manage High Availability Lab Part 5
Module 5: Configure Secure Access to Microsoft Azure SQL Databases
- Configure Firewall Rules
- Creating Firewall Rules Lab
- Configure Always Encrypted for Azure SQL Database
- Implementing Always Encrypted Lab
- Configure Cell-Level Encryption
- Cell-Level Encryption Lab
- Configure Dynamic Data Masking
- Dynamic Data Masking Lab
- Configure Transparent Data Encryption (TDE)
- Transparent Data Encryption (TDE) Lab
Module 6: Configure SQL Server performance settings
- Configure SQL Performance Settings
- Configuring SQL Performance Settings Lab
- Configure Max Server Memory
- Configuring SQL Memory Lab
- Configure Database Performance Settings
- Configure Database Performance Settings Lab
- Configure Operators and Alerts
- Configure alerts in Azure and On-Premise SQL Server Lab
Module 7: Manage SQL Server instances
- Create Databases
- Creating Databases Lab
- Manage Files and File Groups
- Managing Files and File Groups Lab
- Manage System Database Files
- Manage System Database Files Lab
- Configure tempdb
- Configure tempdb Lab
Module 8: Manage SQL Storage
- Manage SMB File Shares
- Manage SMB File Shares Lab
- Manage Stretch Databases
- Configure Azure Storage
- Change Service Tiers
- Change Service Tiers Lab Part 1
- Review Wait Statistics
- Manage Storage Pools
- Recover from Failed Storage
- Managing Storage Lab Part 1
- Managing Storage Lab Part 2
Module 9: Perform Database Maintenance
- Monitoring Tools
- Using Monitoring Tools Lab Part 1
- Using Monitoring Tools Lab Part 2
- Azure Performance Tuning
- Automate Maintenance Tasks
- Update Statistics and Indexes
- Update Statistics and Indexes Lab Part 1
- Update Statistics and Indexes Lab Part 2
- Verify Database Integrity
- Verify Database Integrity Lab
- Recover from Database Corruption
- Recover from Database Corruption Lab
- Conclusion
Module 1: Configure Encryption
- Introduction
- Exam Objectives and Lab Setup
- Restoring AdventureWorks 2016 Database Lab Part 1
- Restoring AdventureWorks 2016 Database Lab Part 2
- Restoring AdventureWorks 2016 Database Lab Part 3
- Configure Encryption
- Cell-Level Encryption Part 1
- Cell-Level Encryption Part 2
- Cell-Level Encryption Lab Part 1
- Cell-Level Encryption Lab Part 2
- Transparent Data Encryption
- Transparent Data Encryption Lab
- Always Encrypted
- Always Encrypted Lab
- Backup Encryption
- Backup Encryption Lab
- Connection Encryption
- Encryption Troubleshooting
Module 2: Configure Data Access and Permissions
- Create and Maintain Users
- Create and Maintain Users Lab Part 1
- Create and Maintain Users Lab Part 2
- Configure and Maintain Custom Roles
- Configure and Maintain Custom Roles Lab
- Manage Database Object Permissions Part 1
- Manage Database Object Permissions Part 2
- Manage Database Object Permissions Lab Part 1
- Manage Database Object Permissions Lab Part 2
- Configure User Options for Azure SQL Database
- Configure Row-Level Security
- Configure Dynamic Data Masking
- Configure Dynamic Data Masking Lab
Module 3: Configure Auditing
- Manage a SQL Server Audit
- Manage a SQL Server Audit Lab
- Query the SQL Server Audit Log
- Manage an Azure SQL Server Audit
Module 4: Develop a Backup Strategy
- Backup Types Part 1
- Backup Types Part 2
- Manage, Backup, and Restore Databases Lab Part 1
- Manage, Backup, and Restore Databases Lab Part 2
- Backup Very Large Databases Part 1
- Backup Very Large Databases Part 2
- Backup Very Large Databases Part 3
- Backup Very Large Databases Part 4
- 4.9 Managing Very Large Databases Lab Part 1
- 4.10 Managing Very Large Databases Lab Part 2
- 4.11 Managing Very Large Databases Lab Part 3
- Configure Alerting for Failed Backups
- Configure Alerting for Failed Backups Lab Part 1
- Configure Alerting for Failed Backups Lab Part 2
- Back up Databases to Azure
- Manage Transaction Log Backups
- Configure Database Recovery Models
- Set Database Recovery Model Lab
- Configure Backup Automation
- Configure Backup Automation Lab
Module 5: Restore Databases
- Perform Piecemeal Restores
- Restore Databases Lab Part 1
- Restore Databases Lab Part 2
- Restore Databases Lab Part 3
- Perform Page Recovery
- Perform Point-in-Time Recovery
- Perform Point-in-Time Recovery Lab
- Restore File Groups
- Develop a Plan to Automate and Test Restores
Module 6: Manage Database Integrity
- Implement Database Consistency Checks
- Implement Database Consistency Checks Lab
- Identify Database Corruption
- Recover From Database Corruption
Module 7: Monitor Database Activity
- Monitor Current Sessions
- Monitor Current Sessions Lab
- Identify Sessions that Cause Blocking Activity
- Identify Sessions that Consume tempdb Resources
- Configure the Data Collector
Module 8: Monitor Queries
- Manage the Query Store
- Manage the Query Store Lab
- Configure Extended Events and Trace Events
- Identify Problematic Execution Plans
Module 9: Manage Indexes
- Identify and Repair Index Fragmentation
- Identify and Create Missing Indexes
- Identify and Drop Underutilized Indexes
- Manage Existing Columnstore Indexes Part 1
- Manage Existing Columnstore Indexes Part 2
- Partitioned Tables
Module 10: Monitor SQL Server Instances
- Create and Manage Operators
- Create and Manage SQL Agent Alerts
- Configure Policy-Based Management
- Configure Policy-Based Management Lab
- Identify Available Space on Data Volumes
- Identify the Cause of- Manage Performance Degradation
- Identify the Cause of- Manage Performance Degradation Lab Part 1
- Identify the Cause of- Manage Performance Degradation Lab Part 2
Module 11: Implement Log Shipping
- Configure and Monitor Log Shipping
- Configure and Monitor Log Shipping Lab Part 1
- Configure and Monitor Log Shipping Lab Part 2
Module 12: Implement Failover Cluster Instances
- Windows Server Failover Cluster
- Manage Shared Disks
- Configure Cluster Shared Volumes
- Configuring WSFC Lab
Module 13: Implement Always On Availability Groups
- Database Mirroring
- Create an Availability Group
- Manage Failover
- Configure Read-Only Routing
- Create Distributed Availability Groups
- Configuring Always On Availability Group Lab Part 1
- Configuring Always On Availability Group Lab Part 2
- Conclusion
Module 1
- 1.1 Introduction
- 1.2 What is Flash Animate
- 1.3 Creating A New Document in Flash and Exploring the Interface
- 1.4 Drawing in Flash Part 1
- 1.5 Drawing in Flash Part 2
- 1.6 Frame by Frame Animating in Flash Part 1
- 1.7 Frame by Frame Animating in Flash Part 2
- 1.8 Saving, Rendering, and Exporting
- 1.9 Animating with Symbols Part 1
- 1.10 Animating with Symbols Part 2
- 1.11 Animating with Symbols Part 3
- 1.12 Different Types of Tweening Part 1
- 1.13 Different Types of Tweening Part 2
- 1.14 Nesting Symbols
- 1.15 Importing Graphics Part 1
- 1.16 Importing Graphics Part 2
- 1.17 Masking Part 1
- 1.18 Masking Part 2
- 1.19 Camera and Parallax Scrolling Part 1
- 1.20 Camera and Parallax Scrolling Part 2
- 1.21 Camera and Parallax Scrolling Part 3
- 1.22 Rotoscoping Part 1
- 1.23 Rotoscoping Part 2
- 1.24 Rotoscoping Part 3
- 1.25 Rotoscoping Part 4
- 1.26 Rotoscoping Part 5
- 1.27 Rotoscoping Part 6
- 1.28 Rotoscoping Part 7
- 1.29 Creating a Puppet Part 1
- 1.30 Creating a Puppet Part 2
- 1.31 Creating a Puppet Part 3
- 1.32 Creating a Puppet Part 4
- 1.33 Creating a Puppet Part 5
- 1.34 Creating a Puppet Part 6
- 1.35 Animating a Puppet Part 1
- 1.36 Animating a Puppet Part 2
- 1.37 Animating a Puppet Part 3
- 1.38 Animating a Puppet Part 4
- 1.39 Cycles
- 1.40 Interchangeable Parts
- 1.41 Interactivity
- 1.42 Text Part 1
- 1.43 Text Part 2
- 1.44 Animating with Code
- 1.45 Dialog Part 1
- 1.46 Dialog Part 2
- 1.47 Dialog Part 3
- 1.48 Dialog Part 4
- 1.49 Controlling the Timeline Part 1
- 1.50 Controlling the Timeline Part 1
- 1.51 Putting Together an Interactive eCard Part 1
- 1.52 Putting Together an Interactive eCard Part 2
- 1.53 Putting Together an Interactive eCard Part 3
- 1.54 Putting Together an Interactive eCard Part 4
- 1.55 Putting Together an Interactive eCard Part 5
- 1.56 Bone Tool
- 1.57 Conclusion
Module 1: Installing and Configuring Domain Controllers
- Introduction
- Overview of Identity Management Concepts Part 1
- Overview of Identity Management Concepts Part 2
- Active Directory Domain Services Components Part 1
- Active Directory Domain Services Components Part 2
- Active Directory Domain Services Components Part 3
- Overview of ADDS Domain Services Part 1
- Overview of ADDS Domain Services Part 2
- Deploying Domain Controllers Part 1
- Deploying Domain Controllers Part 2
- Deploying Domain Controllers Part 3
Module 2: Managing AD DS Objects
- Overview of Object Management Part 1
- Overview of Object Management Part 2
- Managing User Accounts Part 1
- Managing User Accounts Part 2
- Managing User Accounts Part 3
- Managing User Accounts Part 4
- Managing User Accounts Part 5
- Managing Groups Part 1
- Managing Groups Part 2
- Managing Groups Part 3
- Managing Computer Accounts Part 1
- Managing Computer Accounts Part 2
- Managing Organizational Units Part 1
- Managing Organizational Units Part 2
Module 3: Securing Active Directory Domain Services
- Managing Organizational Units Part 1
- Managing Organizational Units Part 2
- Implementing Account Security Part 1
- Implementing Account Security Part 2
- Auditing AD DS
- Configuring Managed Service Accounts
Module 4: Working with Complex AD Infrastructures
- Overview of Advanced AD DS Deployments
- Deploying a Distributed AD DS Environment Part 1
- Deploying a Distributed AD DS Environment Part 2
- Deploying a Distributed AD DS Environment Part 3
- Overview of AD DS Replication
- Configuring AD DS Services Part 1
- Configuring AD DS Services Part 2
- Configuring AD DS Services Part 3
Module 5: Implementing Group Policy
- Overview of Group Policy Part 1
- Overview of Group Policy Part 2
- Overview of Group Policy Part 3
- Creating and Configuring GPOs Part 1
- Creating and Configuring GPOs Part 2
- Monitoring and Troubleshooting Group Policy
- Managing Security Options for Computers using Group Policy Part 1
- Managing Security Options for Computers using Group Policy Part 2
- Managing User Environments Part 1
- Managing User Environments Part 2
- Managing User Environments Part 3
Module 6: Understanding Microsoft Azure AD and Directory Synchronization
- Planning Directory Synchronization Part 1
- Planning Directory Synchronization Part 2
- Implementing Azure AD Connect Part 1
- Implementing Azure AD Connect Part 2
- Managing Identities with Directory Synchronization
Module 7: Monitoring and Recovering AD DS
- Monitoring AD DS Part 1
- Monitoring AD DS Part 2
- Monitoring AD DS Part 3
- Database Management
- ackup and Recovery in AD DS Part 1
- Backup and Recovery in AD DS Part 2
Module 8: Implementing Active Directory Certificate Services
- Overview of Public Key Infrastructure and AD CS Part 1
- Overview of Public Key Infrastructure and AD CS Part 2
- Deploying Certificate Authority Hierarchy
- Administering Certificate Authorities
- Deploying and Managing Certificates Part 1
- Deploying and Managing Certificates Part 2
- Managing Revocation and Distribution
- Configuring Certificate Recovery
Module 9: Implementing Active Directory Federation Services
- Overview of AD FS
- Planning and Deploying AD FS
- Overview of Web Application Proxy
Module 10: Implementing Active Directory Rights Management Services
- Overview of AD RMS
- Deploying AD RMS
- Protecting with AD RMS
- Conclusion
Module 1: Plan and Implement IPv4 and IPv6 Networks
- Introduction
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
- Configuring IPv4 Hosts Part 1
- Configuring IPv4 Hosts Part 2
- Managing and Troubleshooting IPv4 Connectivity Part 1
- Managing and Troubleshooting IPv4 Connectivity Part 2
- Managing and Troubleshooting IPv4 Connectivity Part 3
- Implementing IPV6 for Network Hosts Part 1
- Implementing IPV6 for Network Hosts Part 2
- Implementing IPV6 for Network Hosts Part 3
- Implementing IPv6 Transitioning and Coexistence
Module 2: Installing and Configuring DHCP
- Overview of DHCP Server Role Part 1
- Overview of DHCP Server Role Part 2
- Deploying DHCP Part 1
- Deploying DHCP Part 2
- Deploying DHCP Part 3
- Deploying DHCP Part 4
- Deploying DHCP Part 5
- Managing and Troubleshooting DHCP Part 1
- Managing and Troubleshooting DHCP Part 2
- Managing and Troubleshooting DHCP Part 3
- Managing and Troubleshooting DHCP Part 4
- Managing and Troubleshooting DHCP Part 5
Module 3: Installing and Configuring DNS
- Implementing DNS Servers Part 1
- Implementing DNS Servers Part 2
- Implementing DNS Servers Part 3
- Creating and Configuring DNS Zones Part 1
- Creating and Configuring DNS Zones Part 2
- Creating and Configuring DNS Zones Part 3
- Creating and Configuring DNS Zones Part 4
- Understanding Active Directory Integration Part 1
- Configuring Advanced DNS Settings Part 1
- Configuring Advanced DNS Settings Part 2
- Configuring Advanced DNS Settings Part 3
- Troubleshooting DNS Name Resolution Part 1
- Troubleshooting DNS Name Resolution Part 2
Module 4: Implementing and Managing IP Address Management
- Overview of IPAM Part 1
- Overview of IPAM Part 2
- IPAM Deployment and Administration Part 1
- IPAM Deployment and Administration Part 2
- IPAM Deployment and Administration Part 3
- Managing IP Address Spaces by Using IPAM
Module 5: Implementing Remote Access
- Remote Access Overview Part 1
- Remote Access Overview Part 2
- Remote Access Overview Part 3
- Implementing the Web Application Proxy
- Planning and Implementing Virtual Private Networks Part 1
- Planning and Implementing Virtual Private Networks Part 2
- Planning and Implementing Virtual Private Networks Part 3
- Planning and Implementing Virtual Private Networks Part 4
- Planning and Implementing Virtual Private Networks Part 5
- Overview of Direct Access Part 1
- Overview of Direct Access Part 2
- Implementing Direct Access Part 1
- Implementing Direct Access Part 2
- Implementing Direct Access Part 3
Module 8: Securing the Network Infrastructure
- Using the Windows Firewall with Advanced Security Part 1
- Using the Windows Firewall with Advanced Security Part 2
- Utilizing IP Security Part 1
- Utilizing IP Security Part 2
- Conclusion
Module 1: What is Animation and the Basics
- 1.1 Introduction
- 1.2 What is Animation – Part1
- 1.3 What is Animation – Part2
- 1.4 Bouncy Ball Demo – Part1
- 1.5 Bouncy Ball Demo – Part2
- 1.6 Bouncy Ball Demo – Part3
- 1.7 Pendulum Demo – Part1
- 1.8 Pendulum Demo – Part2
- 1.9 Platform Pendulum Demo – Part1
- 1.10 Platform Pendulum Demo – Part2
- 1.11 Principles of Animation – Part1
- 1.12 Principles of Animation – Part2
- 1.13 Bouncy Ball in Perspective Demo – Part1
- 1.14 Bouncy Ball in Perspective Demo – Part2
- 1.15 Flag Wave Demo – Part1
Module 2: Intermediate Animation Techniques
- 2.1 Weight Demo – Part1
- 2.2 Weight Demo – Part2
- 2.3 Weight Demo- Part3
- 2.4 Breaking a Character Down Into Basic Shapes – Part1
- 2.5 Breaking a Character Down Into Basic Shapes – Part2
- 2.6 Breaking a Character Down Into Basic Shapes – Part3
- 2.7 Boil Demo – Part1
- 2.8 Boil Demo – Part2
- 2.9 A Take Demo – Part1
- 2.10 A Take Demo – Part2
- 2.11 Staggering Demo – Part1
- 2.12 Staggering Demo – Part2
- 2.13 Staggering Demo – Part3
- 2.15 Head Turn Demo – Part1
- 2.16 Head Turn Demo – Part2
- 2.17 Head Turn Demo – Part3
- 2.18 Head Turn Demo – Part4
- 2.19 Walk Cycles Demo – Part1
- 2.20 Walk Cycles Demo – Part2
- 2.21 Walk Cycles Demo – Part3
- 2.22 Run Cycles Demo
- 2.23 Dialogue Demo – Part1
- 2.24 Dialogue Demo – Part2
- 2.25 Dialogue Demo – Part3
- 2.26 Dialogue Demo – Part4
- 2.27 Conclusion
Module 1: Introduction to Premiere and Getting Started on an Editing Project
- 1.1 Course Introduction
- 1.2 Introduction to Premiere Pro CC
- 1.3 Creating a New Project
- 1.4 Workspace Layout
- 1.5 Importing Media
- 1.6 Organizing Media
- 1.7 Monitoring Footage
- 1.8 Navigating the Source Monitor
- 1.9 Creating a Sequence
- 1.10 Editing Video Part 1
- 1.11 Editing Video Part 2
- 1.12 Editing with Multi Source Sequence Part 1
- 1.13 Editing with Multi Source Sequence Part 2
- 1.14 Editing with Multi Source Sequence Part 3
- 1.15 Adding Titles
Module 2: More Editing Techniques and Completing a Project
- 2.1 Editing Using Program Monitor
- 2.2 Advanced Editing Techniques
- 2.3 Inserting Graphics
- 2.4 Adding Music
- 2.5 Adjusting Audio
- 2.6 Using The Tools In Tool Panel
- 2.7 Trimming Using The Program Monitor
- 2.8 Track Monitoring And Algorithm
- 2.9 Transitions
- 2.10 Basic Effects
- 2.11 Manipulate Clip Speed
- 2.12 Color Correction
- 2.14 Exporting A Project
- 2.15 Conclusion
Module 1: Tools and Effects in Photoshop
- 1.1 Introduction
- 1.2 Exploring the Tools and Work Area – Part1
- 1.3 Exploring the Tools and Work Area – Part2
- 1.4 Exploring the Tools and Work Area – Part3
- 1.5 Exploring the Tools and Work Area – Part4
- 1.6 Layers in Photoshop – Part1
- 1.7 Layers in Photoshop – Part2
- 1.8 Layers in Photoshop – Part3
- 1.9 Crop and Transform
- 1.10 Working with Text – Part1
- 1.11 Working with Text – Part2
- 1.12 Filters in Photoshop
- 1.13 Layer Styles
- 1.14 Adjustment Layers – Part1
- 1.15 Adjustment Layers – Part2
Module 2: Creating Projects in Photoshop
- 2.1 Photo Retouching Methods – Part1
- 2.2 Photo Retouching Methods – Part2
- 2.3 Creating a Poster Design – Part1
- 2.4 Creating a Poster Design – Part2
- 2.5 Creating a Poster Design – Part3
- 2.6 Creating a Poster Design – Part4
- 2.7 Coloring Digital Art – Part1
- 2.8 Coloring Digital Art – Part2
- 2.9 Coloring Digital Art – Part2
- 2.10 Colorizing a Black and White Photo – Part1
- 2.11 Colorizing a Black and White Photo – Part2
- 2.12 Creating a Website Design – Part1
- 2.13 Creating a Website Design – Part2
- 2.14 Creating a Website Design – Part3
- 2.15 Exporting in Photoshop
- 2.16 Conclusion
Module 1
- 1.1 Introduction
- 1.2 What is InDesign
- 1.3 Creating a New Document
- 1.4 Importing Images – Part1
- 1.5 Importing Images – Part2
- 1.6 Vector vs. Pixels
- 1.7 Exploring the InDesign Work Area
- 1.8 Master Pages
Module 2
- 2.1 Typography – Part1
- 2.2 Typography – Part2
- 2.3 Creating Tables
- 2.4 Packaging
- 2.5 Principle of Design
- 2.6 Knowing Your Output
- 2.7 Advanced Techniques in InDesign
- 2.8 Using InDesign for Ineractivity
- 2.9 Scripts
- 2.10 Exporting
- 2.11 Conclusion
Module 1: Tools and Effects in Illustrator
- 1.1 Course Introduction
- 1.2 Introduction to Adobe Illustrator
- 1.3 Basic Tools in Illustrator
- 1.4 Working with Shapes
- 1.5 Fills and Strokes
- 1.6 Pencil Tool
- 1.7 Pen Tool
- 1.8 Brush Tool
- 1.9 Compound Path
- 1.10 Gradients
- 1.11 Layers and Grooves
- 1.12 Transparency and Graphic Style
- 1.13 Transforming, Moving and Rotating Objects
- 1.14 Type Tool
- 1.15 Blending Shapes and Colors
- 1.16 Basic Effects in Illustrator
- 1.17 Image Trace Tool
Module 2: Creating Projects in Illustrator
- 2.1 Creating a Caricature Part 1
- 2.2 Creating a Caricature Part 2
- 2.3 Creating a Caricature Part 3
- 2.4 Creating a Caricature Part 4
- 2.5 Recreating a Wonka Bar Logo Part 1
- 2.6 Recreating a Wonka Bar Logo Part 2
- 2.7 Creating a Logo
- 2.8 Recreating a Pablo Picasso Painting Part 1
- 2.9 Recreating a Pablo Picasso Painting Part 2
- 2.10 Recreating a Pablo Picasso Painting Part 3
- 2.11 Recreating a Pablo Picasso Painting Part 4
- 2.12 Recreating a Pablo Picasso Painting Part 5
- 2.13 Recreating a Pablo Picasso Painting Part 6
- 2.14 Exporting
- 2.15 Conclusion
Module 1: Introduction to After Effects
- 1.1 Introduction
- 1.2 What is After Effects?
- 1.3 Creating a New Project in After Effects
- 1.4 Creating and Animating Primitive Shapes Demo – Part1
- 1.5 Creating and Animating Primitive Shapes Demo -Part2
- 1.6 Simply Bouncing Ball Demo -Part1
- 1.7 Simply Bouncy Ball Demo – Part2
- 1.8 Complex Bouncy Ball Demo – Part1
- 1.9 Complex Bouncing Ball Demo – Part2
- 1.10 Exporting from After Effects
- 1.11 Curves Editor Demo
- 1.12 Importing Footage – Part1
- 1.13 Importing Footage – Part2
- 1.14 Parenting – Part1
- 1.15 Parenting – Part2
Module 2: Intermediate Effects and Techniques in After Effects
- 2.1 3D Layers and Cameras Demo – Part1
- 2.2 3D Layers and Cameras Demo – Part2
- 2.3 Animating Text Demo – Part1
- 2.4 Animating Text Demo – Part2
- 2.5 Animating Text Demo – Part3
- 2.6 Animating Text Demo – Part4
- 2.7 Importing and Syncing Audio
- 2.8 Particles Demo – Part1
- 2.9 Particles Demo – Part2
- 2.10 Lights Demo
- 2.11 Common Effects in After Effects
Module 3: More Advanced Effects and Techniques in After Effects
- 3.1 Puppet Building Demo – Part1
- 3.2 Puppet Building Demo – Part2
- 3.3 Puppet Building Demo – Part3
Module 1: Installing Windows Server 2016 in Host and Compute Environments
- Course Introduction
- Determining Windows Server 2016-Part1
- Determining Windows Server 2016-Part2
- Determining Windows Server 2016-Part3
- Determining Windows Server 2016-Part4
- Determining Windows Server 2016-Part5
- Installing Windows 2016-Part1
- Installing Windows 2016-Part2
- Installing Windows 2016-Part3
- Installing Windows 2016-Part4
- Installing Windows 2016-Part5
- Managing Windows Installation With Windows PowerShell
- Creating Managing And Maintaining Windows Images For Deployment-Part1
- Creating Managing And Maintaining Windows Images For Deployment-Part2
- Creating Managing And Maintaining Windows Images For Deployment-Part3
- Creating Managing And Maintaining Windows Images For Deployment-Part4
Module 2: Configuring Active Directory Networks for Host and Compute Environments
- Overview Of Active Directory Domain Services-Part1
- Overview Of Active Directory Domain Services-Part2
- Overview Of Active Directory Domain Services-Part3
- Overview Of ADDS Domain Controllers-Part1
- Overview Of ADDS Domain Controllers-Part2
- Deploying Domain Controllers-Part1
- Deploying Domain Controllers-Part2
- Overview Of Group Policy Purpose Components And Processes-Part1
- Overview Of Group Policy Purpose Components And Processes-Part2
- Overview Of Group Policy Purpose Components And Processes-Part3
- Creating And Configuring GPOs-Part1
- Creating And Configuring GPOs-Part2
- Security Management Using Group Policy-Part1
- Security Management Using Group Policy-Part2
- Security Management Using Group Policy-Part3
Module 3: Implementing Local and Enterprise Storage Solutions
- Managing Disk And Volumes In Windows Server 2016-Part1
- Managing Disk And Volumes In Windows Server 2016-Part2
- Managing Disk And Volumes In Windows Server 2016-Part3
- Managing Disk And Volumes In Windows Server 2016-Part4
- Implementing And Managing Storage Spaces-Part1
- Implementing And Managing Storage Spaces-Part2
- Implementing And Managing Storage Spaces-Part3
- Configuring Data Duplication-Part1
- Configuring Data Duplication-Part2
- Understanding Various Types Of Storage
- Comparing SAN Options-Part1
- Comparing SAN Options-Part2
- Understanding ISNS DCB And MPIO
- Configuring File And Folder Sharing In Windows Server-Part1
- Configuring File And Folder Sharing In Windows Server-Part2
- Configuring File And Folder Sharing In Windows Server-Part3
- Configuring Advanced File Services With FSRM-Part1
- Configuring Advanced File Services With FSRM-Part2
- Configuring Advanced File Services With FSRM-Part3
Module 4: Implementing Hyper-V Virtualization and Containers
- Installing Hyper-V Virtualization
- Configuring Storage And Networking In Hyper-VHosts-Part1
- Configuring Storage And Networking In Hyper-VHosts-Part2
- Configuring And Managing Virtual Machines-Part1
- Configuring And Managing Virtual Machines-Part2
- Understanding Windows Server And Hyper-VContainers
- Deploying Windows Server And Hyper-VContainers
- Using Docker To Install Configure And Manage Containers
Module 5: Implementing High Availability
- Overview Of High Availability And Disaster Recovery-Part1
- Overview Of High Availability And Disaster Recovery-Part2
- Implementing Network Load Balancing-Part1
- Implementing Network Load Balancing-Part2
- Planning And Configuring Failover Clustering-Part1
- Planning And Configuring Failover Clustering-Part2
- Planning And Configuring Failover Clustering-Part3
- Managing A Failover Cluster
- Integrating Failover Clustering And Hyper-V-Part1
- Integrating Failover Clustering And Hyper-V-Part2
- Configuring Site Availability
Module 6: Maintaining and Monitoring Windows Server 2016
- Windows Server Update Services-Part1
- Windows Server Update Services-Part2
- Windows PowerShell Desired State Configuration
- Windows Server 2016 Monitoring Tools-Part1
- Windows Server 2016 Monitoring Tools-Part2
- Conclusion
Module 1: What Is Agile
- Course And Instructor Introduction
- What Is Agile – Part1
- What Is Agile Part2 – Agile Manifesto Principles 1-6
- What Is Agile Part3 – Agile Manifesto Principles 7-12
- What Is Agile Part4 – Agile Manifesto Values
- What Is Agile Part5 – Why Agile?
- What Is Agile – Part6 – Misconceptions about Agile
- What Is Agile Part7 – Agile Lifecycle
- What Is Agile Part8 – Key Definitions
- What Is Agile – Part9
Module 2: Projects And Projects Management In An Agile World
- Projects And Project Management In An Agile World Part 1 – Historical Information
- Projects And Project Management In An Agile World Part 2 – Organizational Projects
- Projects And Project Management In An Agile World Part 3 – Traditional Projects
- Projects And Project Management In An Agile World Part 4 – Roles
- Projects And Project Management In An Agile World Part 5 – Roles 2
Module 3: Agile and Scrum
- Agile And Scrum Part1 – In Depth
- Agile And Scrum Part2 – Major Activities
- Agile And Scrum Part3 – 3 Questions
- Agile And Scrum Part4 – Sprints
Module 4: Common Scrum Terminology
- Common Scrum Terminology-Part1
- Common Scrum Terminology-Part2
Module 5: Other Iterative Methods
- Other Iterative Methods
Module 6: Communication Skills In Agile World
- Communication Skills In Agile World Part1 – Model
- Communication Skills In Agile World Part2 – Verbal vs. Nonverbal
- Communication Skills In Agile World Part3 – Learned Patterns
- Communication Skills In Agile World Part4 – Key Skills
- Communication Skills In Agile World Part5 – Key Skills
- Communication Skills In Agile World Part6 – Conflict Resolution
- Communication Skills In Agile World Part7 – Tuckman's 5 Stages
Module 7: Using Agile Outside Software Development
- Using Agile Outside Software Development-Part1
- Using Agile Outside Software Development-Part2
Module 8: Case Studies Of Transitioning to Agile
- Case Studies Of Transitioning To Agile-Part1
- Case Studies Of Transitioning To Agile Part2 – Procurement
- Case Studies Of Transitioning To Agile Part3 – In an Agile World
- Case Studies Of Transitioning To Agile Part4 – Measurements
Module 9: Critique Of Agile
- Critique Of Agile-Part1
- Critique Of Agile-Part2
Module 10: Review Of Agile
- Review Of Agile-Part1
- Review Of Agile-Part2
- Review Of Agile-Part3
- Course Conclusion
Module 1: Configuring Ethernet LANs
- Introduction
- Ethernet LAN Fundamentals- Part 1
- Ethernet LAN Fundamentals- Part 2
- Implementing Virtual LANs- Part 1
- Implementing Virtual LANs- Part 2
- Using VLAN Trunking- Part 1
- Using VLAN Trunking- Part 2
- Understanding Spanning Tree Protocol- Part 1
- Understanding Spanning Tree Protocol- Part 2
- Understanding Spanning Tree Protocol- Part 3
- Spanning Tree Implementation- Part 1
- Spanning Tree Implementation- Part 2
- Spanning Tree Implementation- Part 3
- Security Management- Part 1
- Security Management- Part 2
- Security Management- Part 3
- Security Management- Part 4
Module 2: Configuring IPv4 Routing Protocols
- Understanding OSPF- Part 1
- Understanding OSPF- Part 2
- Understanding OSPF- Part 3
- Implementing OSPF- Part 1
- Implementing OSPF- Part 2
- Implementing OSPF- Part 3
- Implementing OSPF- Part 4
- Understanding EIGRP- Part 1
- Understanding EIGRP- Part 2
- Understanding EIGRP- Part 3
- Implementing EIGRP- Part 1
- Implementing EIGRP- Part 2
- Troubleshooting IPv4- Part 1
- Troubleshooting IPv4- Part 2
- Troubleshooting IPv4- Part 3
Module 3: Wide Area Networks
- Implementing Point-To-Point WANs- Part 1
- Implementing Point-To-Point WANs- Part 2
- Implementing Point-To-Point WANs- Part 3
- Private WANs With Ethernet And MPLS- Part 1
- Private WANs With Ethernet And MPLS- Part 2
- Private WANs With Ethernet And MPLS- Part 3
- Private WANs With Internet VPNs- Part 1
- Private WANs With Internet VPNs- Part 2
- Private WANs With Internet VPNs- Part 3
Module 4: IPv4 Services
- Basic Access Control Lists- Part 1
- Basic Access Control Lists- Part 2
- Advanced Access Control Lists- Part 1
- Advanced Access Control Lists- Part 2
- Quality Of Service- Part 1
- Quality Of Service- Part 2
Module 5: IPv4 Routing And Troubleshooting
- IPv4 Routing In The LAN- Part 1
- IPv4 Routing In The LAN- Part 2
- Implementing HSRP- Part 1
- Implementing HSRP- Part 2
- Troubleshooting IPv4 Routing- Part 1
- Troubleshooting IPv4 Routing- Part 2
Module 6: IPv6 Routing
- IPv6 Implementation And Routing Basics- Part 1
- IPv6 Implementation And Routing Basics- Part 2
- IPv6 Implementation And Routing Basics- Part 3
- IPv6 Implementation And Routing Basics- Part 4
- Implementing OSPF For IPv6- Part 1
- Implementing OSPF For IPv6- Part 2
- Implementing EIGRP For IPv6- Part 1
- Implementing EIGRP For IPv6- Part 2
- IPv6 Access Control Lists- Part 1
- IPv6 Access Control Lists- Part 2
Module 7: Cloud Based Networking
- Overview Of Cloud Computing- Part 1
- Overview Of Cloud Computing- Part 2
- Conclusion
Module 1: Networking Fundamentals
- Introduction
- Introduction To TCPIP Networking- Part 1
- Introduction To TCPIP Networking- Part 2
- Introduction To TCPIP Networking- Part 3
- Introduction To TCPIP Networking- Part 4
- Ethernet LAN Fundamentals- Part 1
- Ethernet LAN Fundamentals- Part 2
- Ethernet LAN Fundamentals- Part 3
- Wide Area Networks- Part 1
- Wide Area Networks- Part 2
- IPv4 Addressing And Routing Fundamentals- Part 1
- IPv4 Addressing And Routing Fundamentals- Part 2
- IPv4 Addressing And Routing Fundamentals- Part 3
- TCPIP Transport And Applications- Part 1
- TCPIP Transport And Applications- Part 2
Module 2: Basic Ethernet LAN Implementation
- Command Line Essentials- Part 1
- Command Line Essentials- Part 2
- Command Line Essentials- Part 3
- Ethernet LAN Switching
- Managing Ethernet Switches- Part 1
- Managing Ethernet Switches- Part 2
- Configuring Switch Interfaces
Module 3: Designing Ethernet LANS
- Understanding LAN Design Options- Part 1
- Understanding LAN Design Options- Part 2
- Understanding LAN Design Options- Part 3
- Implementing And Configuring Ethernet VLANS- Part 1
- Implementing And Configuring Ethernet VLANS- Part 2
Module 4: Understanding IPv4
- IPv4 Subnetting- Part 1
- IPv4 Subnetting- Part 2
- IPv4 Subnetting- Part 3
- IPv4 Subnetting- Part 4
- Analyzing Classful IPv4 Networks- Part 1
- Analyzing Classful IPv4 Networks- Part 2
- Analyzing Classful IPv4 Networks- Part 3
- Analyzing Subnet Masks- Part 1
- Analyzing Subnet Masks- Part 2
- Analyzing Existing Subnets
Module 5: Working With Cisco Routers
- Implementing IPv4- Part 1
- Implementing IPv4- Part 2
- Configuring IPv4 Address And Static Routes- Part 1
- Configuring IPv4 Address And Static Routes- Part 2
- Configuring IPv4 Address And Static Routes- Part 3
- Using Dynamic Routing Protocols- Part 1
- Using Dynamic Routing Protocols- Part 2
- Configuring IPv4 Hosts- Part 1
- Configuring IPv4 Hosts- Part 2
Module 6: IPv4 Design And Troubleshooting
- Designing IP Subnets- Part 1
- Designing IP Subnets- Part 2
- Using VLAN- Part 1
- Using VLAN- Part 2
- Troubleshooting IPv4
Module 7: IPv4 Services
- Access Control Lists- Part 1
- Access Control Lists- Part 2
- Access Control Lists- Part 3
- Access Control Lists- Part 4
- Network Address Translation- Part 1
- Network Address Translation- Part 2
Module 8: Implementing IPv6
- IPv6 Fundamentals- Part 1
- IPv6 Fundamentals- Part 2
- IPv6 Fundamentals- Part 3
- IPv6 Fundamentals- Part 4
- IPv6 Addressing And Subnetting- Part 1
- IPv6 Addressing And Subnetting- Part 2
- Implementing IPv6- Part 1
- Implementing IPv6- Part 2
- Implementing IPv6- Part 3
- Implementing IPv6- Part 4
- Course Conclusion
Module 1: Introducing Cisco Collaboration Architecture
- Course Introduction
- Introducing Cisco Collaboration Architecture Part 1
- Introducing Cisco Collaboration Architecture Part 2
- Small To Mid-Size Business Part 1
- Small To Mid-Size Business Part 2
- Small To Mid-Size Business Part 3
- Cisco Unified Communications Manager Part 1
- Cisco Unified Communications Manager Part 2
- Cisco Unified Communications Manager Part 3
- Cisco Unified Connection
- Lab Introduction
Module 2: Telephony And Call Routing
- Telephony 101 Part 1
- Telephony 101 Part 2
- Telephony 101 Part 3
- Telephony 101 Part 4
- Telephony 101 Part 5
- Telephony 101 Part 6
- Call Routing 101 Part 1
- Call Routing 101 Part 2
- VoIP Call Routing 101
- Call Routing With DNS
- Deployment Scenarios Part 1
- Deployment Scenarios Part 2
- Deployment Scenarios Part 3
- Gateway Call Routing Basics Part 1
- Gateway Call Routing Basics Part 2
- Gateway Call Routing Basics Part 3
- Gateway Call Routing Basics Part 4
- Configuring The Gateway Lab Part 1
- Configuring The Gateway Lab Part 2
Module 3: Preparing The Network And Phone Behavior
- Preparing The Network For Voices Part 1
- Preparing The Network For Voices Part 2
- IP Phone Behavior
- Configuring The LAN Lab
- Standing Up The Platform Lab
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7
- Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1
- Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2
Module 4: CUCM Administration Interfaces
- CUCM Administration Interfaces Part 1
- CUCM Administration Interfaces Part 2
- CUCM Stand Up
- CUCM Stand Up Lab
- End User Interfaces
- End User Configuration Lab
- AD Integration Lab
- End Point Implementation Part 1
- End Point Implementation Part 2
- IMP Integration Lab
- CUC Integration Lab Part 1
- CUC Integration Lab Part 2
- IP Communicator Lab
- Profiles And Templates Lab
- CUCME Phone Configuration
- Configuring CUCME Lab Part 1
- Configuring CUCME Lab Part 2
- CUCM End-User Portal Lab
- Configuring CUCM Phones From Scratch
- Configuring Cisco SX20 Codec Part 1
- Configuring Cisco SX20 Codec Part 2
Module 5: Call Configuration
- Advanced Call Coverage Part 1
- Advanced Call Coverage Part 2
- Advanced Call Coverage Part 3
- Call Coverage Lab Part 1
- Call Coverage Lab Part 2
- Call Coverage Lab Part 3
- Call Coverage Lab Part 4
- Call Coverage Lab Part 5
- Calling Constrictions And COS Part 1
- Calling Constrictions And COS Part 2
- Implementing Class Of Control Lab Part 1
- Implementing Class Of Control Lab Part 2
- Connecting To The PSTN Part 1
- Configuring Voice Gateway Features Lab Part 1
- Configuring Voice Gateway Features Lab Part 2
- Configuring Voice Gateway Features Lab Part 3
- Connecting To The PSTN Part 2
- PSTN Calling And Digit Manipulation Lab Part 1
- PSTN Calling And Digit Manipulation Lab Part 2
- PSTN Dial Plan Configuration Lab Part 1
- PSTN Dial Plan Configuration Lab Part 2
- Course Conclusion
Module 1: Foundations (Beginner)
- Introduction
- History Of Computer Programming
- Categories Of Programming Languages
- Condensed History Of Java
- Software Life Cycle
Module 2: Terms and Tools (Beginner)
- Programming General Terms
- Downloading And Installing Java
- Programmer Editors And Integrated Development Environments Part 1
- Programmer Editors And Integrated Development Environments Part 2
- Installing Eclipse
Module 3: Identifiers, Variables, and Data Types (Beginner)
- Understanding Identifiers
- Unicode And Java Syntax
- Variables Constants And Literals
- Field Member And Variable Components
- Primitive Data Types Part 1
- Primitive Data Types Part 2
- Primitive Data Types Part 3
- Operators Part 1
- Operators Part 2
- Escape Characters
- Type Conversions And Type Casting
- Java Reserved Words
- Commenting
- Abstract Data Types
Module 4: Object-Orientated Programming (Intermediate)
- Object Oriented Programming
- What Is An Object?
- Eclipse Lab
Module 5: Predefined Classes (Intermediate)
- String Class Part 1
- String Class Part 2
- String Class Part 3
- Date Class
- Simple Date Format Class
- Scanner Class Part 1
- Scanner Class Part 2
- Decimal Format Class Part 1
- Decimal Format Class Part 2
- JFrame Class
- Container Class Part 1
- Container Class Part 2
Module 6: Methods Part 1 (Intermediate)
- Methods
- Naming Methods
- Implementation Method Hiding
- Method Variables And Literals
- Invoking A Method
Module 7: Methods Part 2 (Advanced)
- Methods And Multiple Arguments
- Methods Lab
- Method Overloading
Module 8: Constructors (Advanced)
- Creating Objects
- Constructor Declarations
- Overloading And Default Constructors
Module 9: Control of Flow (Advanced)
- While Loop
- While Statement
- For Loop
Module 10: Arrays and Exceptions (Advanced)
- Array Structures
- Constants And Array Sizes Part 1
- Constants And Array Sizes Part 2
- Exceptions And The Try Catch Block
- Conclusion
Module 1: Pre-Course Chapter 1
- Course Introduction
- Civnd Intro Part 1
- Civnd Intro Part 2
- The Big Picture
Module 2: Pre-Course Chapter 2
- All About Video Part 1
- All About Video Part 2
- All About Video Part 3
- All About Video Part 4
Module 3: Cisco Video And Content Delivery
- Cisco Video And Content Delivery Part 1
- Cisco Video And Content Delivery Part 2
- Cisco Video And Content Delivery Part 3
Module 4: Cisco Video Surveillance
- Cisco Video Surveillance Part 1
- Cisco Video Surveillance Part 2
Module 5: Cisco Collaboration
- Cisco Collaboration Part 1
- Cisco Collaboration Part 2
- Cisco Collaboration Part 3
Module 6: Central Collaboration Endpoint Control
- Central Collaboration Endpoint Control
Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber
- Unified IP Phones Desk Endpoints And Cisco Jabber
Module 8: Configuring Unified IP Phones And Cisco Jabber
- Configuring Unified IP Phones And Cisco Jabber Part 1
- Configuring Unified IP Phones And Cisco Jabber Part 2
Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3
Module 10: Cisco Telepresence Endpoints Installation And Characteristics
- Cisco Telepresence Endpoints Installation And Characteristics Part 1
- Cisco Telepresence Endpoints Installation And Characteristics Part 2
- Cisco Telepresence Endpoints Installation And Characteristics Part 3
- Cisco Telepresence Endpoints Installation And Characteristics Part 4
Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints
- Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1
- Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2
Module 12: Configuring Cisco Telepresence TC Endpoints
- Configuring Cisco Telepresence TC Endpoints Part 1
- Configuring Cisco Telepresence TC Endpoints Part 2
- Configuring Cisco Telepresence TC Endpoints Part 3
- Configuring Cisco Telepresence TC Endpoints Part 4
- Configuring Cisco Telepresence TC Endpoints Part 5
- Configuring Cisco Telepresence TC Endpoints Part 6
Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 1
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 2
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 3
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 4
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 5
Module 14: Cisco Multipoint Conferencing Solutions
- Cisco Multipoint Conferencing Solutions Part 1
- Cisco Multipoint Conferencing Solutions Part 2
- Cisco Multipoint Conferencing Solutions Part 3
Module 15: Configuring And Monitoring Cisco Multipoint
- Configuring And Monitoring Cisco Multipoint Part 1
- Configuring And Monitoring Cisco Multipoint Part 2
Module 16: Cisco DMP Characteristics And Installation
- Cisco DMP Characteristics And Installation Part 1
- Cisco DMP Characteristics And Installation Part 2
Module 17: Configuring Cisco DMPs
- Configuring Cisco DMP's
Module 18: Managing Cisco Edge 340 DMPs
- Managing Cisco Edge340 DMPs
- Course Conclusion
Module 19: Labs
- Basic Switch Port Configuration
- Dashboard Options Part 1
- Dashboard Options Part 2
- Preparations For Endpoints Part 1
- Preparations For Endpoints Part 2
- Preparations For Endpoints Part 3
- Preparations For Endpoints Part 4
- Basic Troubleshooting
- Setup TC Endpoint Part 1
- Setup TC Endpoint Part 2
- Setup TC Endpoint Part 3
- Setup TC Endpoint Part 4
Word 2016 Basic
- Introduction To Word Interface Part1
- Introduction To Word Interface Part2
- Introduction To Word Interface Part3
- View
- Typing Part1
- Typing Part2
- Typing Part3
- Typing Part4
- Resume Part1
- Resume Part2
- Bullet List
Word 2016 Intermediate
- Menus And Keyboard Shortcuts Part1
- Menus And Keyboard Shortcuts Part2
- Tabs
- Tables Part1
- Tables Part2
- Tables Part3
- Styles Part1
- Styles Part2
- Styles Part3
- Page Formatting Part1
- Page Formatting Part2
- Page Formatting Part3
Word 2016 Advanced
- Creating An Outline
- Inserting Images Part1
- Inserting Images Part2
- Tracking Changes
- Mail Merge Part1
- Mail Merge Part2
- Large Documents Part1
- Large Documents Part2
- Other Word Functions Part1
- Other Word Functions Part2
- Document Comparison
Basic Microsoft PowerPoint 2016
- What Is PowerPoint Part 1
- What Is PowerPoint Part 2
- New Presentation
- Viewing Presentation
- Inserting Transitions
- More Visual Designs Part 1
- More Visual Designs Part 2
- More Visual Designs Part 3
- More Visual Designs Part 4
- Notes
Intermediate Microsoft PowerPoint 2016
- Visual Designs With Logos And Animation Part1
- Visual Designs With Logos And Animation Part2
- Visual Designs With Logos And Animation Part3
- Visual Designs With Logos And Animation Part4
- Visual Designs With Logos And Animation Part5
- Exit Animation Part1
- Exit Animation Part2
- Exit Animation Part3
- Navigation Buttons
- Layout Options Part1
- Layout Options Part2
Advanced Microsoft PowerPoint 2016
- Master Pages Part1
- Master Pages Part2
- Software Simulation Part1
- Software Simulation Part2
- Setting Pictures To Music
- Advanced Animation Techniques
- Triggers
- Motion Path Animation
- Video In PowerPoint
- PowerPoint Review Part1
- PowerPoint Review Part2
- Additional Options
Outlook 2016 Basic
- Introduction Part 1
- Introduction Part 2
- Options For Displaying Email Messages
- Create And Send An Email
- Receive An Email
- Calendar Part 1
- Calendar Part 2
- Contacts Part 1
- Contacts Part 2
- Tasks
Outlook 2016 Intermediate
- Folder Structure Part
- Folder Structure Part 2
- Multiple Email Accounts Part 1
- Multiple Email Accounts Part 2
- Create A New Email Part 1
- Create A New Email Part 2
- Signatures
- Calendars Part 1
- Calendars Part 2
- Contacts
- Outlook Settings Part 1
- Outlook Settings Part 2
Outlook 2016 Advanced
- One Note Introduction Part 1
- One Note Introduction Part 2
- One Note And PowerPoint
- One Note And Word
- One Note And Outlook
- Sharing Information
- OneNote And Mobile Devices
- Additional Elements Part 1
- Additional Elements Part 2
Excel 2016 Basic
- Tabs And Ribbons Part1
- Tabs And Ribbons Part2
- Cells Part1
- Cells Part2
- Cells Part3
- Cells Part4
- Calculations Part1
- Calculations Part2
- Calculations Part3
- Printing Part1
- Printing Part2
Excel 2016 Intermediate
- Menus And Keyboard Shortcuts Part1
- Menus And Keyboard Shortcuts Part2
- Menus And Keyboard Shortcuts Part3
- Tabs Part1
- Tabs Part2
- Formulas And Calculations Part1
- Formulas And Calculations Part2
- Formulas And Calculations Part3
- Formulas And Calculations Part4
- Importing Data Part1
- Importing Data Part2
- Invoices
Excel 2016 Advanced
- Advanced Invoice Part1
- Advanced Invoice Part2
- Advanced Invoice Part3
- Advanced Invoice Part4
- Number Crunching
- Creating A Pivot Table From Scratch
- Smaller Excel Components Part1
- Smaller Excel Components Part2
- Smaller Excel Components Part3
Access 2016 Basic
- Introduction Part1
- Introduction Part2
- Elements Part1
- Elements Part2
- Reviewing Data
- Queries Part1
- Queries Part2
- Tracking Time Part1
- Tracking Time Part2
- Tracking Time Part3
- Design Work With Forms
Access 2016 Intermediate
- Relationships Part1
- Relationships Part2
- Changing Information
- Loading Tables
- Relating Invoices Part1
- Relating Invoices Part2
- Relating Invoices Part3
- Relating Invoices Part4
- Time Entry Form
Access 2016 Advanced
- Queries Part1
- Queries Part2
- Queries Part3
- Queries Part4
- Reports Based On Queries
- Adding Additional Information
- Update Query Part1
- Update Query Part2
- Creating A Report From Scratch Part1
- Creating A Report From Scratch Part2
- Creating A Report From Scratch Part3
Module 1: Network Review
- Course Introduction
- Network Review Part 1
- Network Review Part 2
- Network Review Part 3
- Network Review Part 4
Module 2: Terminology And Fundamentals
- Terminology And Fundamentals Part 1
- Terminology And Fundamentals Part 2
- Terminology And Fundamentals Part 3
- Terminology And Fundamentals Part 4
- Terminology And Fundamentals Part 5
- Terminology And Fundamentals Part 6
- Terminology And Fundamentals Part 7
Module 3: PKI And Cryptography
- Pki And Cryptography Part 1
- Pki And Cryptography Part 2
Module 4: AAA
- AAA Part 1
- AAA Part 2
- AAA Part 3
Module 5: Bring Your Own Device
- Bring Your Own Device Part 1
- Bring Your Own Device Part 2
- Bring Your Own Device Part 3
Module 6: Secure Access
- Secure Access Part 1
- Secure Access Part 2
- Secure Access Part 3
- Secure Access Demo
Module 7: VPNs
- VPN Concepts Part 1
- VPN Concepts Part 2
- Remote Access VPNs Part 1
- Remote Access VPNs Part 2
- Site To Site VPNs
Module 8: Secure Routing And Switching
- Secure Routing And Switching Part 1
- Secure Routing And Switching Part 2
- Secure Routing And Switching Demo 1
- Secure Routing And Switching Demo 2
- Layer2 Attacks Part 1
- Layer2 Attacks Part 2
- Layer2 Attacks Part 3
- Mitigation Part 1
- Mitigation Part 2
Module 9: Firewalls
- Firewall Technologies Part 1
- Firewall Technologies Part 2
- Implementing Nat Part 1
- Implementing Nat Part 2
- Zone Based Firewall
- Firewall Features On The ASA Part 1
- Firewall Features On The ASA Part 2
- Firewall Features On The ASA Part 3
Module 10: Intrusion Protection System (IPS)
- Intrusion Protection System Part 1
- Intrusion Protection System Part 2
Module 11: Content And Endpoint Security
- Content And Endpoint Security Part 1
- Content And Endpoint Security Part 2
- Course Conclusion
Module 1: Wireless Basics
- Course And Instructor Introduction
- Wireless Basics Part 1
- Wireless Basics Part 2
- Wireless Basics Part 3
- Wireless Basics Part 4
- Wireless Basics Part 5
- Wireless Basics Part 6
Module 2: Wireless Standards
- Wireless Standards Part 1
- Wireless Standards Part 2
- Wireless Standards Part 3
- Wireless Standards Part 4
- Wireless Standards Part 5
Module 3: Wireless Signals
- Wireless Signals Part 1
- Wireless Signals Part 2
Module 4: Antennas
- Antennas Part 1
- Antennas Part 2
- Antennas Part 3
Module 5: Topologies
- Topologies Part 1
- Topologies Part 2
Module 6: Frame Types
- Frame Types Part 1
- Frame Types Part 2
- Frame Types Part 3
Module 7: Planning Coverage
- Planning Coverage Part 1
- Planning Coverage Part 2
- Planning Coverage Part 3
Module 8: Architectures
- Architectures Part 1
- Architectures Part 2
- Architectures Part 3
Module 9: Stand Alone And Cloud Deployments
- Stand Alone And Cloud Deployments Part 1
- Stand Alone And Cloud Deployments Part 2
Module 10: Controller Based Deployment
- Controller Based Deployment Part 1
- Controller Based Deployment Part 2
- Controller Based Deployment Part 3
Module 11: Controller Discovery
- Controller Discovery Part 1
- Controller Discovery Part 2
- Controller Discovery Part 3
Module 12: Roaming
- Roaming Part 1
- Roaming Part 2
Module 13: Radio Resource Management
- Radio Resource Management Part 1
- Radio Resource Management Part 2
- Radio Resource Management Part 3
Module 14: Wireless Security
- Wireless Security Part 1
- Wireless Security Part 2
- Wireless Security Part 3
Module 15: WLAN Configuration
- WLAN Configuration
Module 16: Guest Networks
- Guest Networks
Module 17: Client Connectivity
- Client Connectivity Part 1
- Client Connectivity Part 2
Module 18: Managing Wireless
- Managing Wireless Part 1
- Managing Wireless Part 2
Module 19: Interference
- Interference Part 1
- Interference Part 2
Module 20: Troubleshooting
- Troubleshooting Part 1
- Troubleshooting Part 2
- Course Conclusion
Module 1: Overview of SharePoint Development
- Course Introduction
- Introduction To SharePoint Development Part1
- Introduction To SharePoint Development Part2
- Introduction To SharePoint Development Part3
- Choosing A Development Approach Part1
- Choosing A Development Approach Part2
- SharePoint 2013 Deployment And Execution Models Part1
- SharePoint 2013 Deployment And Execution Models Part2
- SharePoint 2013 Deployment And Execution Models Part3
Module 2: Working With Objects, List, And Libraries
- Introduction To The SharePoint Object Hierarchy Part1
- Introduction To The SharePoint Object Hierarchy Part2
- Working With Sites And Webs Part1
- Working With Sites And Webs Part2
- Working With Sites And Webs Part3
- Working With Sites And Webs Part4
- Managing Execution Contexts Part1
- Managing Execution Contexts Part2
- Using Lists And Library Objects Part1
- Using Lists And Library Objects Part2
- Querying And Retrieving Data From Lists Part1
- Querying And Retrieving Data From Lists Part2
- Querying And Retrieving Data From Lists Part3
- Working With Large Lists Part1
- Working With Large Lists Part2
Module 3: Working With Features and Solutions
- Introduction To Features
- Introduction To Solutions
- Creating And Configuring Features And Solutions Part1
- Creating And Configuring Features And Solutions Part2
- Creating And Configuring Features And Solutions Part3
- Creating And Configuring Features And Solutions Part4
- Using Sandboxed Solutions
Module 4: Developing Server Side Code
- Web Parts
- Event Receivers Part1
- Event Receivers Part2
- Timer Jobs
- Storing Configuration Data Part1
- Storing Configuration Data Part2
Module 5: Managing Authentication And Authorization
- Introduction To Identity Management
- Managing Permissions
- Configuring Forms Based Authentication
- Working With Custom Authentication Part1
- Working With Custom Authentication Part2
- Working With Custom Authentication Part3
Module 6: Client Side SharePoint Development
- Using The CSOM For Managed Code Part1
- Using The CSOM For Managed Code Part2
- Using The CSOM For Managed Code Part3
- Using The CSOM For JavaScript
- Using The Rest API With JavaScript Part1
- Using The Rest API With JavaScript Part2
Module 7: Developing And Managing Apps
- Overview Of Apps For SharePoint Part1
- Overview Of Apps For SharePoint Part2
- Developing Apps For SharePoint
- Overview Of Remote Hosted Apps
- Configuring Remote Hosted Apps
- Developing Remote Hosted Apps Part1
- Developing Remote Hosted Apps Part2
- Publishing And Distributing Apps Part1
- Publishing And Distributing Apps Part2
- Publishing And Distributing Apps Part3
Module 8: Using Workflows To Automate Business Processes
- Overview Of Workflows In SharePoint 2013
- Building Workflows Part1
- Building Workflows Part2
- Developing Workflows Part1
- Developing Workflows Part2
Module 9: Customizing SharePoint Interfaces
- Working With Custom Actions
- Using Client-Side Interface Components
- Customizing The SharePoint List User Interface
- Course Conclusion
Module 1: Introduction To Creating Efficient Apps For Sharepoint
- Course And Instructor Introduction
- Apps For SharePoint Part1
- Apps For SharePoint Part2
- Communication From Apps To SharePoint Part1
- Communication From Apps To SharePoint Part2
- Authentication And Authorization Part1
- Authentication And Authorization Part2
- Designing Apps For Performance Part1
- Designing Apps For Performance Part2
- Designing Apps For Performance Part3
Module 2: Working With Managed Metadata Solutions
- Overview Of Managed Metadata Part1
- Overview Of Managed Metadata Part2
- Configuring Managed Metadata Term Sets Part1
- Configuring Managed Metadata Term Sets Part2
- Configuring Managed Metadata Term Sets Part3
- Configuring Managed Metadata Term Sets Part4
- Working With Managed Metadata Fields Part1
- Working With Managed Metadata Fields Part2
Module 3: Working With The Search Service
- Overview Of The SharePoint 2013 Search Service Part1
- Overview Of The SharePoint 2013 Search Service Part2
- Overview Of The SharePoint 2013 Search Service Part3
- Building Search Queries
- Using Code To Execute Search Queries Part1
- Using Code To Execute Search Queries Part2
- Customizing Query Processing Part1
- Customizing Query Processing Part2
- Customizing Search Results Part1
- Customizing Search Results Part2
- Customizing Content Processing Part1
- Customizing Content Processing Part2
Module 4: Implementing Enterprise Content Management
- Working With eDiscovery Part1
- Working With eDiscovery Part2
- Working With Content Management Part1
- Working With Content Management Part2
- Handling Automated Records Management Part1
- Handling Automated Records Management Part2
- Handling Automated Records Management Part3
Module 5: Developing Publishing Sites
- Introduction To Developing Publishing Solutions
- Developing Page Components For Web Content Publishing Part1
- Developing Page Components For Web Content Publishing Part2
- Developing Page Components For Web Content Publishing Part3
- Website Structure And Navigation Part1
- Website Structure And Navigation Part2
- Website Structure And Navigation Part3
- Publishing Content
- Publishing To Mobile Devices
- Optimizing For Search Engines Part1
- Optimizing For Search Engines Part2
- Optimizing Performance And Availability Part1
- Optimizing Performance And Availability Part2
Module 6: Interacting With Business Connectivity Services
- Overview Of Business Connectivity Services
- Creating BDC Models
- Creating An App Scoped External Content Type
- Conclusion
Module 1: Service Operation Introduction
- Introduction
- Syllabus Exam Overview And Testing Tips
- Service Operation Introduction Part 1
- Service Operation Introduction Part 2
- Service Operation Introduction Part 3
- Service Operation Introduction Part 4
- Service Operation Introduction Part 5
Module 2: Service Management As a Practice
- Service Management As A Practice Part 1
- Service Management As A Practice Part 2
- Service Management As A Practice Part 3
Module 3: Service Operation Principles
- Service Operation Principles Part 1
- Service Operation Principles Part 2
- Service Operation Principles Part 3
- Service Operation Principles Part 4
Module 4: Service Operation Process
- Service Operation Process Part 1
- Service Operation Process Part 2
- Service Operation Process Part 3
- Incident Management Part 1
- Incident Management Part 2
- Problem Management
- Request Fulfillment
- Access Management
Module 5: Common Service Operation Activities
- Common Service Operation Activities Part 1
- Common Service Operation Activities Part 2
- Common Service Operation Activities Part 3
- Common Service Operation Activities Part 4
Module 6: Organizing For Service Operation
- Organizing For Service Operation Part 1
- Organizing For Service Operation Part 2
- Organizing For Service Operation Part 3
- Roles Part 1
- Roles Part 2
Module 7: Technology Considerations
- Technology Considerations
Module 8: Service Operation
- Implementation Of Service Operation
- Challenges Risks And Critical Success Factors
- Conclusion
Module 1: Introduction to CSS3
- Introduction
- The Advantages Of Style Sheets
- Discovering Cascading Style Sheets
- CSS Structure And Syntax Part1
- CSS Structure And Syntax Part2
- CSS Structure And Syntax Part3
- Using Different Kinds Of Style Sheets
Module 2: Understanding The CSS Box Model
- What Is The Box Model
- Height And Width
- Margin And Padding
- Working With Borders
Module 3: Working With Page Layouts
- Positioning Elements
- Floating Elements
- Controlling Display And Visibility
Module 4: Using Colors And Backgrounds
- Working With Colors
- Working With Backgrounds
Module 5: Web Typography
- Understanding Fonts
- Working With Text Properties
- Text And Shadow Effects Part1
- Text And Shadow Effects Part2
Module 6: Links, Lists, And Tables
- Working With Lists
- Using Navigation Bars
- Working With Tables Part1
- Working With Tables Part2
Module 7: Dynamic CSS3 Properties
- Using Transforms Part1
- Using Transforms Part2
- Using Transitions
- Using Animations
- CSS Project Part1
- CSS Project Part2
- Course Conclusion
Module 1: Introduction To Javascript
- Introduction
- Java Script From The Dawn Of The Web Part 1
- Java Script From The Dawn Of The Web Part 2
- Getting The Right Tools
- Creating Your First JavaScript Program Part 1
- Creating Your First JavaScript Program Part 2
Module 2: Core Concepts And Syntax
- The Structure And Content Part 1
- The Structure And Content Part 2
- Naming And Casing Best Practices
- Understanding Variables Part 1
- Understanding Variables Part 2
- Understanding Variables Part 3
- Working With Operators Part 1
- Working With Operators Part 2
- Working With Loops Part 1
- Working With Loops Part 2
- Creating Functions Part 1
- Creating Functions Part 2
- Understanding Types And Objects Part 1
- Understanding Types And Objects Part 2
- Understanding Types And Objects Part 3
- Understanding Types And Objects Part 4
- Understanding Types And Objects Part 5
Module 3: Getting A Handle On The DOM
- Introduction To The HTML Document Object Model
- Accessing DOM Elements
- Changing DOM Elements
- Creating DOM Elements
- Responding To Events Part 1
- Responding To Events Part 2
Module 4: Working With Libraries
- Introduction To Libraries
- Installing And Using jQuery Part 1
- Installing And Using jQuery Part 2
- Modifying Web Pages Using jQuery Part 1
- Modifying Web Pages Using jQuery Part 2
- Conclusion
Module 1: What Is HTML?
- Introduction
- What Is HTML
- HTML Resources
- Choosing A Code Editor
- The Relationship Of HTML, CSS And JavaScript
Module 2: The Structure And Components
- The HTML Document
- DOCTYPE Declaration
- The Head
- The Body
- The Footer
Module 3: Formatting The Page
- Using Headings
- Creating Paragraphs
- Emphasizing Text
- Controlling Line Breaks And Whitespace
- Creating Lists
- Working With Tables
Module 4: Structuring Content
- Why Structure Matters
- Controlling Document Outlines
- Structure Elements Part 1
- Structure Elements Part 2
Module 5: Adding Links, Images And Other Media
- Working With Links Part 1
- Working With Links Part 2
- Working With Images Part 1
- Working With Images Part 2
Module 6: Styling Web Pages
- HTML And CSS
- Creating Inline Styles
- Controlling Typography
- Adding Color
- Externalizing Styles
Module 7: Creating Your Own Website
- Creating A Website Part 1
- Creating A Website Part 2
- Conclusion
Module 1: Cyber Security Awareness and Prevention
- Course Introduction
- Where We Are Today
- Areas Of Protection
- The Connection – Part 1
- The Connection – Part 2
- Network Protection
- Browsing Blunders – Part 1
- Browsing Blunders – Part 2
- Settings – Part 1
- Settings – Part 2
- Settings – Part 3
- Settings – Part 4
- Cookies
- Browsing Tips And Tricks
- Email Can't Hurt You Right – Part 1
- Email Can't Hurt You Right – Part 2
- Viruses – Part 1
- Viruses – Part 2
- Viruses – Part 3
Module 2: Managing Mobile Device Security
- Managing Mobile Device Security-Part1
- Managing Mobile Device Security-Part2
- Secure Access
- Secure Access iPhone Demo
- Secure Access Android Demo
- Protect The Digital
- Protect The Digital Android Demo
- Protect The Digital iPhone Demo
- Manage App Access
- Manage App Access iPhone Demo
- Manage App Access Android Demo
- Stay Up To Date
- Stay Up To Date Android Demo
- Stay Up To Date iPhone Demo
- Use Other Tools To Help
- Prepare For The Worst
- Prepare For The Worst-Android Demo
- Prepare For The Worst-iPhone Demo
- Best Practices
- Course Conclusion
Module 1: Introduction to Web Development
- Course And Instructor Introduction
- ASP.Net Using Visual Studio
- ASP.Net Tools In Visual Studio
- ASP.Net Data Validation-Part1
- ASP.Net Data Validation-Part2
- ASP.Net Web User Control
- ASP.Net Creating Web Service
- ASP.Net Web Service Explained
- Classes Defined
Module 2: C Sharp
- Intro To C Sharp
- Functions In C Sharp
- If Statements In C Sharp
- Static Variables In C Sharp
- Loops In C Sharp
- Debugging In C Sharp
- Introduction To Windows Forms In C Sharp
- More Windows Forms In C Sharp
- Windows Forms Controls In C Sharp
- Object Oriented Programming In C Sharp
- Constructors And Destructors In C Sharp
- Members Of A Class In C Sharp
- Class Inheritance In C Sharp
- Abstract Classes In C Sharp
- Enumerations In C Sharp
- Exception Handling In C Sharp
- Creating XML Documents In C Sharp
- Putting It All Together In A File In C Sharp
Module 3: HTML and CSS Comprehensive Review
- Intro To HTML
- HTML Markup
- Lists In HTML
- Links In HTML
- Tables In HTML
- Forms In HTML
- Intro To CSS
- CSS Color Properties
Module 4: Intro to SQL Server
- Databases Defined
- Tables Defined
- Basic Query Optimization
- Defining And Using Store Procedures
- Creating Stored Procedure
- Executing Store Procedure From C Sharp
- Executing Store Procedure From ASP.Net
- Changing ASP.Net Interface To Retrieve Data-Part1
- Changing ASP.Net Interface To Retrieve Data-Part2
Module 5: Java Script A Comprehensive Introduction
- Intro To JavaScript
- Using JavaScript For Data Validation
- Using JavaScript To Manipulate Documents
- Variables In JavaScript
- If Statements In JavaScript
- Logical Operators In JavaScript
- If Else Statements In JavaScript
- Switch Statements In JavaScript
- For Loops In JavaScript
- For And While Loops In JavaScript
Module 6: Object Based Java Script
- Working With String Object
- More On String Object
- The Math Object
- Creating Your Own Objects
- String Manipulation In JavaScript
- Programming The Browser In JavaScript
- Browser Versions In JavaScript
- Working With Forms In JavaScript
Module 7: Model View and Controller
- MVC Mindset
- MVC Defined
- Create An MVC Project
- MVC Project Initial Walkthrough
- MVC Building Routes
- MVC Approach
- Controllers
- Controllers From Scratch
- MVC Routing
- MVC Routing Constraints
- Routing Constraint Attributes
- MVC Attribute Routing
Module 8: A Comprehensive Introduction to jQuery
- What Is jQuery
- jQuery Effects
- Get And Set Elements In jQuery
- Add And Remove Elements In jQuery
- CSS In jQuery
- Ancestors And Descendants
Module 9: Course Review
- MVC Best Practices
- Testing The Application
- Writing For Production
- Review Web Development
- Review C Sharp
- Review HTML And CSS
- Review SQL Server
- Review JavaScript
- Review Software Development Lifecycle
- Review Design Patterns
- Review jQuery
- Conclusion
Module 1: Accessing Data
- Introduction To 70 – 487 Developing Microsoft Azure And Web Services
- Overview Of Service And Cloud Technologies
- Accessing Data Using ADO Dot NET Part1
- Accessing Data Using ADO Dot NET Part2
- Accessing Data From Web Service
- SQL Server Database In Azure
- Read And Write XML Data
- Implementing Azure Storage
- Managing Azure PowerShell
- WCF Data Services Part1
- WCF Data Services Part2
- WCF With Client
Module 2: Designing And Implementing WCF Services
- Create WCF Service And Client From Scratch Part1
- Create WCF Service And Client From Scratch Part2
- WCF Configuration Settings Part1
- WCF Configuration Settings Part2
- WCF And Azure SQL Database Part1
- WCF And Azure SQL Database Part2
- WCF And Azure SQL Database Part3
- WCF Services And Azure Review
Module 3: Querying And Manipulating Data Using Entity Framework
- Design And Implement An ERD
- Introduction To Entity Framework
- Introduction To LINQ
- LINQ To SQL
- LINQ To Entities
- Introduction To Lambda Expressions
- Introduction To Entity SQL
- Profiling Queries Created By Entity Framework
- Query Projections
- Query With Navigation Properties
- Bringing It All Together Part1
- Bringing It All Together Part2
- Using Entity Framework From Scratch
- Entity Framework Review
Module 4: Creating And Consuming Web API Based Services
- Introduction To Web API
- First Web API App
- Web API App Enhanced
- Web API App Extended
- Web API Using Standard Conventions
- Debugging Our Web API App
- Getting Data From Database In Web API App
- Web API Standards
- More On Web API Standards
- Simple Web API CRUD App
- Web API Example In Depth
- Summarizing Web API
Module 5: Deploying Web Applications And Services
- Introduction To Application Deployment Strategies Part1
- Introduction To Application Deployment Strategies Part2
- Introduction To Application Deployment Strategies Part3
- Introduction To Application Deployment Strategies Part4
- Deploying Web Applications ToIIs
- Deploying Web Applications To Azure
- Deployment Considerations
- Deployment Design
- Deployment Configurations
Module 6: Course Review
- Accessing Data
- Web Front End Options
- Course Conclusion
Module 1: Data Breaches And ID Theft
- Course Introduction
- Treat And Cost
Module 2: Device Security Basics
- Device Access
- Device Management
Module 3: Avoiding Inadvertent Disclosure
- No More Oops Part1
- No More Oops Part2
Module 4: Physical And Technical Safeguards
- The DO Of Security Part1
- The DO Of Security Part2
- Course Conclusion
Module 1: What is a Resume?
- Course Introduction
- What Is A Resume
- When Or Why Do You Need A Resume
- Plan Then Do
- Objective
- Skills And Accomplishments
- Backing It Up
- Types Of Resume
- Structure
- Collecting Information-Part 1
- Collecting Information-Part 2
- Expanding And Expounding
- Putting It On Paper
Module 2: Tips and Tricks
- Word Processor Tips And Tricks-Part 1
- Word Processor Tips And Tricks-Part 2
- Word Processor Tips And Tricks-Part 3
- Word Processor Tips And Tricks-Part 4
- Word Processor Tips And Tricks-Part 5
- Word Processor Tips And Tricks-Part 6
- Word Processor Tips And Tricks-Part 7
- Word Processor Tips And Tricks-Part 8
- Word Processor Tips And Tricks-Part 9
- Word Processor Tips And Tricks-Part 10
- Word Processor Tips And Tricks-Part 11
- Word Processor Tips And Tricks-Part 12
- Course Outro
Module 1: Intro to SalesForce Automation
- Course And Instructor Introduction
- What Is Salesforce Automation
- Sales Force Automation System Overview
- Why Salesforce
Module 2: Working With The SalesForce System
- Creating Accounts And Contacts
- Creating Leads And Opportunities
- Sales Process-Part 1
- Sales Process-Part 2
- Sales Process-Part 3
- Sales Process-Part 4
- Leads Through Social Channels
Module 3: SalesForce Solution
- Core Problems
- Managing Accounts
- Badges And Campaigns
- Custom Apps
Module 4: SalesForce Admin
- Introduction To RDBMS
- Introduction To The Cloud
- Introduction To Virtual Machines-Part1
- Introduction To Virtual Machines-Part2
- Salesforce Development
- Introduction To Building In The Cloud
- Salesforce Set Up
Module 5: Migrating To SalesForce
- Tasks To Complete Before Migration-Part 1
- Tasks To Complete Before Migration-Part 2
- Frequently Asked Questions-Part 1
- Frequently Asked Questions-Part 2
- Frequently Asked Questions-Part 3
- Frequently Asked Questions-Part 4
- Frequently Asked Questions-Part 5
- Frequently Asked Questions-Part 6
- Frequently Asked Questions-Part 7
- Frequently Asked Questions-Part 8
- Frequently Asked Questions-Part 9
Module 6: Course Conclusion
- The Salesforce Solution
- Conclusion
Module 1: Getting Started With Windows 10
- Introduction
- First Steps
- Navigating The Desktop
- Using Cortana To Search
Module 2: Using File Explorer
- File Explorer
- Understanding File And Folder Basics
- Work With Libraries
- Creating A Home Group
Module 3: Using Windows Applications
- Opening And Using Applications
- Installing New Applications From The Windows Store
- Using Default Applications
Module 4: Browsing the Web With Microsoft Edge
- Examining The Edge Window
- Searching The Web With Edge
- Bookmarking Important Sites
- Using The Reading List
- Marking A Page With Web Notes
- Conclusion
Module 5: Customizing Windows
- Introduction
- Customizing The Display
- Customizing File Explorer
- Configuring Cortanas Notebook Feature
- Customizing Privacy Settings
- Customizing Microsoft Edge
Module 6: Connecting Devices And Devices
- Connecting Printers
- Connecting And Using A Flash Drive
- Connect A Phone
Module 7: Managing User Accounts
- Create Additional Users
- Understanding User Profiles
- Sharing Data Between Profiles
Module 8: Backing Up Important Data
- Using File History
- Using Windows Backup
- Using System Restore
Module 9: Maintaining Windows
- Windows Updates
- Working With The Action Center
- Using Disk Defragmenter
- Managing Storage And Apps Using Settings
- Conclusion
Module 10: Protecting Windows
- Introduction
- Using Windows Defender
- Using Windows Firewall
- Using Bit Locker
- Windows Hello
Module 11: Monitoring Performance
- Using Task Manager
- Using Resource Monitor
Module 12: Working With Control Panel And Settings
- Control Panel Part 1
- Control Panel Part 2
- Settings App
- Using Device Manager
- Using Remote Desktop
- Conclusion
Module 1: Introducing Windows 10
- Course Introduction
- What Makes Windows 10 Different
- Overview Of Windows 10 Features
- Navigating And Using Windows 10-Part 1
- Navigating And Using Windows 10-Part 2
Module 2: Installing Windows 10
- Preparing For Installation
- Installation Options
- Upgrading And Migrating-Part 1
- Upgrading And Migrating-Part 2
Module 3: Configuring Devices
- Overview Of Configuration Tools
- Common Configuration Options
- Managing User Accounts-Part 1
- Managing User Accounts-Part 2
- Using Control Panel
- Using Windows Administration Tools-Part 1
- Using Windows Administration Tools-Part 2
- Using Windows PowerShell-Part 1
- Using Windows PowerShell-Part 2
Module 4: Configuring Network Connectivity
- TCP IP Network Connectivity-Part 1
- TCP IP Network Connectivity-Part 2
- TCP IP Network Connectivity-Part 3
- Name Resolution
- Wireless
- Remote Access Overview-Part 1
- Remote Access Overview-Part 2
- Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
- Managing Hard Disks-Part 1
- Managing Hard Disks-Part 2
- Managing Hard Disks-Part 3
- Creating And Managing Storage Spaces
- Overview Of Data Access
- Configuring And Managing File Access
- Managing Shared Folder
- Understanding Work Folder
- Managing Printers
Module 6: Managing Apps
- Installing And Configuring Applications
- Managing Apps From The Windows Store
- Managing Microsoft Edge Web Browser
Module 7: Managing Device Security
- Configuring Network Security-Part 1
- Configuring Network Security-Part 2
- Configuring Local Security
- Configuring Data Security-Part 1
- Configuring Data Security-Part 2
- Configuring Device Security
Module 8: Maintaining Windows 10
- Updating Windows 10
- Monitoring And Optimizing Windows 10-Part 1
- Monitoring And Optimizing Windows 10-Part 2
Module 9: Troubleshooting And Recovery
- Managing Devices And Drives
- Recovery Files
- Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
- Overview Of Image Based Deployment
- Automating Installations
- Windows Activation
Module 11: Managing User Profiles And User State Virtualization
- Managing User Profiles-Part 1
- Managing User Profiles-Part 2
- User State Virtualization
- User Profile Migration
Module 12: Managing Desktop And Application Settings Using Group policy
- Using Group Policy To Manage Windows 10 Devices Part 1
- Using Group Policy To Manage Windows 10 Devices-Part 2
- Using Group Policy To Manage Windows 10 Devices-Part 3
- Using Group Policy To Manage Windows 10 Devices-Part 4
- Using Group Policy To Manage Applications-Part 1
- Using Group Policy To Manage Applications-Part 2
Module 13: Configuring And Managing Client Hyper-V
- Introduction To Client Hyper-V
- Creating Virtual Machines
- Managing Virtual Machine Storage And Snapshot
- Conclusion
Module 14: Configuring Windows Devices – December, 2017 Update – Part1
- Module 14 Workbook
- Flashcards (Updated)
- 1. Intro to Windows 10 Update 70-697-1D
- 2. Mod 1 Win 10 Update
- 3. Mod 1 Installing Windows 10
- 4. Mod 1 Examining Windows 10 Act
- 5. Mod 3 Configuring Devices
- 6. Mod 3 Examining GPOs Act
- 7. Mod 3.3 Display Options
- 8. Mod 3 Examining One Drive Act
- 9. Mod 4 Configuring Network Connectivity
- 10. Mod 4 Powershell Networking Commands Act
- 11. Mod 4.1 Network Mgmt Tools
- 12. Mod 4.1 Command Prompt Networkiing Tools Act
- 13. Mod 4.1 Network Mgmt Tools Part2
- 14. Mod 4.2 DNS
- 15. Mod 4.2 Name Resolution Act
- 16. Mod 4.3 Direct Access
- 17. Mod 5 Managing Storage
- 18. Mod 5 Server Based Storage
- 19. Mod 5 Storage Act
- 20. Mod 5.5 Diskpart
- 21. Mod 5.6 Powershell Disk Mgmt
- 22. Mod 5.7 Storage Mgmt
- 23. Mod 5 Storage Mgmt Act
- 24. Mod 6 Managing Files and Printers
- 25. Mod 6 CMD and PS Files System Commands Act
- 26. Mod 6.2 Permissions Inheritance
- 27. Mod 6.2 NTFS and Sharing Permissions Act
- 28. Mod 6.3 Type 4 Printer Drivers
- 29. Mod 6 Printing Mgmt Act
- 30. Mod 7 Managing Apps
- 31. Mod 7 Internet Explorer 11 Act
- 32. Mod 8 Managing Device Security
- 33. Mod 8.1 Security Compliance Toolkit
- 34. Mod 9 Maintaining Windows 10
- 35. Mod 9 Windows Update Settings Act
- 36. Mod 10 Startup and Recovery
- 37. Mod 10 Startup and Recovery settings Act
- 38. Mod 11 Additional Skills
- Windows Intro Update 70-697-2C
Module 15: Configuring Windows Devices – December, 2017 Update – Part2
- Module 15 Workbook
- Flashcards (Updated)
- 1. Mod 1 Developing Mgmt Win 10
- 2. Mod 1 Windows Defender Act
- 3. Mod 1.1 Developing Part2
- 4. Mod 1 Applocker Act2
- 5. Mod1.2 Managing a Mobile Workforce
- 6. Mod 1 Remote Access Act2
- 7. Mod 1.2 Managing a Mobile Workforce Part2
- 8. Mod 1.3 Overview
- 9. Mod 1 Microsoft Azure Act2
- 10. Mod 2 Managing Win 10 Sign-in
- 11. Mod 2 Microsoft Account Act2
- 12. Mod 2.2 Overview of Azure AD
- 13. Mod 2 Microsoft Azure AD Act2
- 14. Mod 3 Managing User Profiles and User
- 15. Mod 4 Managing Desktop and Apps
- 16. Mod 5 Managing Devices in MS365
- 17. Mod 5 Office 365 Act2
- 18. Mod 6 Managing PCs Devices using Intune
- 19. Mod 6 Intune Act2
- 20. Mod 6.3 Intune App Mgmt
- 21. Mod 6.4 Working with WIP
- 22. Mod 7 Configuring and Using MS Store
- 23. Mod 7 Microsoft Store for Business Act2
- 24. Mod 7.2 Deploy Win 10 Auto-pilot
- 25. Mod 8 Managing Data Access Windows
- 26. Mod 8.4 Publishing and Using RemoteApp
- 27. Mod 9 Configuring and Managing Client Hyper-V
- 28. Mod 10 Additional Skills
- 29. Outr to Windows 10 Update 70-697
Wine Making
- Course Instructor Introduction
- Supplies And Ingredients Needed
- Cleaning And Prepping Equipment
- Chemicals Processing Aids And Oaks-Part 1
- Chemicals Processing Aids And Oaks-Part 2
- Wine Kits And Making Watermelon White Merlot
- Making Watermelon White Merlot-Part 2
- Making Amarone
- Apple Cider Wine
- Degassing Wine-Part 1
- Degassing Wine-Part 2
- Degassing Wine-Part 3
- Adding More Ingredients To You Wine
- Gentle Punch Down And Degassing Of Amarone
- Reracking The Amarone
Wine Mixing And Food Pairing
- Different Wine Varietals-Part 1
- Different Wine Varietals-Part 2
- Hydrometer
- Wine Yeast
- Wine Blending And Food Pairing-Part 1
- Wine Blending And Food Pairing-Part 2
- Bottling The Apple Cider Wine
- Conclusion
Module 1: Installing and Deploying Windows 8.1
- Course Introduction
- Introduction To Windows
- Preparing To Install Windows 8.1
- Understanding Deployment Options Part 1
- Understanding Deployment Options Part 2
- Upgrading To Windows 8.1
- Migrating To Windows 8.1
- Automating Installations Part 1
- Automating Installations Part 2
- Automating Installations Part 3
- Windows Activation
Module 2: Enterprise Management in Windows 8.1
- Local And Management Tools Part 1
- Local And Management Tools Part 2
- Using Windows PowerShell To Manage Windows 8.1 Part 1
- Using Windows PowerShell To Manage Windows 8.1 Part 2
- Using Windows PowerShell To Manage Windows 8.1 Part 3
- Using Group Policy To Manage Windows 8.1
Module 3: Managing User Settings
- Managing User Profiles
- User State Virtualization
- User Profile Migration
Module 4: Configuring Hardware Access
- Managing And Maintaining HardDisk Drives Part 1
- Managing And Maintaining HardDisk Drives Part 2
- Working With Device Drivers
Module 5: Configuring Networking
- Configuring IPv4 Part 1
- Configuring IPv4 Part 2
- Configuring IPv4 Part 3
- Configuring IPv6
- Managing Name Resolution
- Configuring Wireless Connections
- Troubleshooting Network Connections
Module 6: Configuring Resource Access
- Configuring Network Access
- Managing File Access With NTFS
- Managing Shared Folders
- Configure And Manage Printers
- Providing Access To Non-Domain Devices
- Planning To Use One Drive
Module 7: Configuring Applications
- Installing And Configuring Applications
- Managing Apps From The Windows Store
- Controlling Desktop Applications
- Manage Internet Explorer
- Using Virtualisation To Support Applications
Module 8: Managing Security in Windows 8.1
- Overview Of Network Security
- Managing The Windows Firewall
- Malware Protection
- Configuring Data Security
- User Account Control
Module 9: Optimizing and Recovering Windows 8.1
- Performance Monitoring And Optimization
- Managing And Troubleshooting Reliability
- Troubleshooting With Event Viewer
- Managing Windows Updates
- Backing Up Data
- Recovery Options
Module 10: Mobile Computing With Windows 8.1
- Configuring Mobile Computer Settings
- Configuring VPNs
- Overview Of Direct Access
- Conclusion
Module 1: Introduction To Office 365
- Course Introduction
- Introduction To Office 365 – Part 1
- Introduction To Office 365 – Part 2
- Planning A Pilot Implementation – Part 1
- Planning A Pilot Implementation – Part 2
- Planning A Pilot Implementation – Part 3
- Planning A Pilot Implementation – Part 4
- Provisioning Tenant Accounts – Part 1
- Configuring A Test Lab
- Provisioning Tenant Accounts – Part 2
Module 2: Administration In Office 365
- Introduction To Administration In Office 365 – Part 1
- Introduction To Administration In Office 365 – Part 2
- Introduction To Administration In Office 365 – Part 3
- Introduction To Administration In Office 365 – Part 4
- Introduction To Administration In Office 365 – Part 5
- Managing Users And Licenses – Part 1
- Managing Users And Licenses – Part 2
- Managing Users And Licenses – Part 3
- Managing Security And Distribution Groups – Part 1
- Managing Security And Distribution Groups – Part 2
Module 3: Managing Clients
- Planning For Office Clients – Part 1
- Planning For Office Clients – Part 2
- Planning For Office Clients – Part 3
- Managing User – Driver Client Deployments
- IT Managed Deployments – Part 1
- IT Managed Deployments – Part 2
- IT Managed Deployments – Part 3
- Office Telemetry And Reporting
Module 4: Planning DNS And Exchange Migrations
- Working With Custom Domains – Part 1
- Working With Custom Domains – Part 2
- Working With Custom Domains – Part 3
- Working With Custom Domains – Part 4
- Planning To Migrate Mailboxes
- Choosing A Migration Method – Part 1
- Choosing A Migration Method – Part 2
- Choosing A Migration Method – Part 3
Module 5: Planning And Configuring Exchange Online
- Planning For Exchange Online – Part 1
- Planning For Exchange Online – Part 2
- Planning For Exchange Online – Part 3
- Planning For Exchange Online – Part 4
- Planning For Exchange Online – Part 5
- Planning For Exchange Online – Part 6
- Planning For Exchange Online – Part 7
- Managing Recipients – Part 1
- Managing Recipients – Part 2
- Managing Recipients – Part 3
- Managing Recipients – Part 4
- Managing Anti-Malware And Anti-Spam
- Managing Message Retention Recovery – Part 1
- Managing Message Retention Recovery – Part 2
Module 6: Configuring Sharepoint Online
- Managing Site Collections – Part 1
- Managing Site Collections – Part 2
- Configuring Sharing With External Users
- Planning For Users Collaboration
Module 7: Configuring Lync Online
- Plan For Lync Online
- Configuring Lync Online Settings
Module 8: Implementing Coexistence Technologies
- Implementing Directory Synchorization – Part 1
- Implementing Directory Synchorization – Part 2
- Implementing Directory Synchorization – Part 3
- Implementing Organizational Federation
- Course Outro
Module 1: Installing,Upgrading and Migrating Windows 7
- Course And Instructor Introduction
- Introducing Windows 7-Part1
- Introducing Windows 7-Part2
- Pre Installation Requirements-Part1
- Pre Installation Requirements-Part2
- Installing Windows 7-Part1
- Installing Windows 7-Part2
- Upgrading Windows 7
- Migrating Windows 7
Module 2: Deploying Windows 7 in the Enterprise
- Overview Of Image Based Installations-Part1
- Overview Of Image Based Installations-Part2
- Overview Of Image Based Installations Demo
- Capturing System Images-Part1
- Capturing System Images-Part2
- Capturing System Images-Part3
- Preparing Images For Deployment-Part1
- Preparing Images For Deployment-Part2
- Working With User State
- Working With Virtual Drives
- Activating Windows 7
Module 3: Enterprise Management in Windows 7
- Automating Management Using Group Policy-Part1
- Automating Management Using Group Policy-Part2
- Automating Management Using Group Policy-Part3
- Using Windows Powershell 2.0-Part1
- Using Windows Powershell 2.0-Part2
- Using Windows Powershell 2.0-Part3
Module 4: Configuring Hardware and Applications
- Working With Device Drivers-Part1
- Working With Device Drivers-Part2
- Working With Hard Disks-Part1
- Working With Hard Disks-Part2
- Configuring Application Compatibility
- Configuring Internet Explorer-Part1
- Configuring Internet Explorer-Part2
- Configuring Application Restrictions
Module 5: Configuring Network Connectivity
- Configuring TCPIP-Part1
- Configuring TCPIP-Part2
- Configuring TCPIP-Part3
- IP Address Assignment-Part1
- IP Address Assignment-Part2
- Name Resolution Services-Part1
- Name Resolution Services-Part2
- Wireless Networking-Part1
- Wireless Networking-Part2
- Remote Management
- Troubleshooting Connectivity Issues
Module 6: Configuring Access to Resources
- Authentication And Authorization-Part1
- Authentication And Authorization-Part2
- Managing Access To Files Using NTFS
- Managing Sharing
- Managing Shared Printers
- Configuring Branch Cache
Module 7: Configuring Mobile Computing
- Configuring Mobile Computer And Device Settings-Part1
- Configuring Mobile Computer And Device Settings-Part2
- Configuring Remote Access-Part1
- Configuring Remote Access-Part2
Module 8: Configuring Security Options
- User Account Control
- Encrypting File Systems
- Bit Locker Drive Encryption-Part1
- Bit Locker Drive Encryption-Part2
- Network Access Protection
- Windows Firewall With Advanced Security
- Configuring Anti-Malware
- Auditing Network Access
Module 9: Monitoring And Maintaining Systems
- Configuring Windows Updates
- Event Monitoring
- Performance Monitoring
Module 10: Configuring Backup and Recovery Options
- Troubleshooting Startup Issues
- Using Windows Backup
- Using System Restore
- Course Conclusion
Module 1: Technology Review
- Introduction
- Active Directory Install And Configure
- PowerShell Primer
- Microsoft Exchange Server Install And Configure – Part 1
- Microsoft Exchange Server Install And Configure – Part 2
- Review Cloud Computing – Part 1
- Review Cloud Computing – Part 2
- Review Virtualization And The Cloud – Part 1
- Review Virtualization And The Cloud – Part 2
- Review Virtualization And The Cloud – Part 3
Module 2: Device Management
- Client Devices
- Demo Client Device Setup – Part 1
- Demo Client Device Setup – Part 2
- Office 365 Client Deployment
- Office 365 Components
- Office 365 Deployment Methods
- Office 365 Cloud Deployment Methods
- Office 365 Deployment Prerequisites
- Office 365 Deployment Readiness
- Office 365 Deployment Network Environment
Module 3: Office 365 Deployment Plan
- Network Planning
- Internet Network Usage Planning
- Network Device Planning
- Account Management Planning – Part 1
- Account Management Planning – Part 2
- Migration And Coexistence Options
- Single Sign On Architecture
- Demo Server 2012 Core With Active Directory Role
Module 4: Windows Azure
- SharePoint 2013 Using Windows Azure – Part 1
- SharePoint 2013 Using Windows Azure – Part 2
- SharePoint 2013 Capabilities
Module 5: PowerShell
- Scripting And PowerShell – Part 1
- Scripting And PowerShell – Part 2
- PowerShell Scripting Techniques – Part 1
- PowerShell Scripting Techniques – Part 2
- Enterprise Ready Scripts – Part 1
- Enterprise Ready Scripts – Part 2
- PowerShell Scripting Syntax – Part 1
- PowerShell Scripting Syntax – Part 2
- PowerShell Scripting Active Directory – Part 1
- PowerShell Scripting Active Directory – Part 2
- PowerShell Remoting
- PowerShell Adding Bulk Users In AD
Module 6: SQL Server
- Introduction To SQL Queries
- SQL Queries – Part 1
- SQL Queries – Part 2
- DML And DDL – Part 1
- DML And DDL – Part 2
- DDL
- SQL Server And PowerShell
- SQL Server PowerShell And AD
- Logging Data In SQL Server Using PowerShell
Module 7: Azure Lync and SharePoint
- Azure Active Directory Fundamentals – Part 1
- Azure Active Directory Fundamentals – Part 2
- Deploying Lync Server – Part 1
- Deploying Lync Server – Part 2
- Deploying Lync Server – Part 3
- SharePoint Designer
- Backup And Restore Share Point
- Windows PowerShell And SharePoint
- Identity Service With Active Directory
- Setup And Deploy Exchange
Module 8: Course Review
- Review Virtualization
- Review Cloud
- Review Automation Using PowerShell
- Review Desktop Applications
- Move To Office 365
- Conclusion
Module 1: Introduction to Web Development Technologies
- Intro To Software Development
- Introduction To HTML5-Part1
- Introduction To HTML5-Part2
- Introduction To CSS3
- Overview Of HTML CSS And JavaScript-Part1
- Overview Of HTML CSS And JavaScript-Part2
- Introduction To JavaScript-Part1
- Introduction To JavaScript-Part2
- Demo JavaScript
Module 2: HTML
- Demonstrating Formatting Quotations And Citations
- Tables Lists Blocks Classes And Layout-Part1
- Tables Lists Blocks Classes And Layout-Part2
- Page Design Frames And Colors
- Form Elements-Part1
- Form Elements-Part2
Module 3: CSS
- Comprehensive Introduction To CSS
- Styles With CSS-Part1
- Styles With CSS-Part2
- Selectors Content And Classes
Module 4: JavaScript
- Demo JavaScript Syntax-Part1
- Demo JavaScript Syntax-Part2
- Demo String Methods
- Demo Scope Events And Numbers-Part1
- Demo Scope Events And Numbers-Part2
- Demo Dates And Arrays-Part1
- Demo Dates And Arrays-Part2
- Demo Dates And Arrays-Part3
- Demo Comparisons Conditions And Loops
- Demo Breaks Conversion And Regular Expression-Part1
- Demo Breaks Conversion And Regular Expression-Part2
- Demo Errors And Debugging
Module 5: jQuery
- Intro To jQuery
- Demo Using jQuery
Module 6: HTML5
- HTML5
- Input Validation In HTML5
- Demo Password Validation
- Demo Using Regular Expressions To Validate Password
- Demo Validate A Checkbox
- Demo Validate Date And Time-Part1
- Demo Validate Date And Time-Part2
Module 7: CSS3
- Demo CSS3 Selectors-Part1
- Demo CSS3 Selectors-Part2
- Demo CSS3 Effects
Module 8: Course Review
- Review Of HTML5 CSS3 And JavaScript-Part1
- Review Of HTML5 CSS3 And JavaScript-Part2
- Comprehensive Walk through Of Visual Studio
- Cloud Computing Overview Using Azure-Part1
- Cloud Computing Overview Using Azure-Part2
- Cloud Computing Overview Using Azure-Part3
- Code Review HTML5 CSS3 And JavaScript
- Web Design Best Practices
- Review jQuery
- Course Conclusion
Module 1: Plan And Design
- Course And Instructor Introduction
- Planning For Complex Network-Part1
- Planning For Complex Network-Part2
- Intro To Cisco Enterprise Architecture And CAM-Part1
- Intro To Cisco Enterprise Architecture And CAM-Part2
- Review Networking Topology-Part1
- Review Networking Topology-Part2
- Review OSI Model
- Review SLA
- Network Discovery
- NTP Explained-Part1
- NTP Explained-Part2
- Network Security-Part1
- Network Security-Part2
Module 2: Switch Configuration
- VLAN And Trunking-Part1
- VLAN And Trunking-Part2
- VTP Intro And Config
- Ether Channel Configuration And Load Balancing
- More Ether Channel Configuration-Part1
- More Ether Channel Configuration-Part2
- Port Security
- Root Guard
- Configuring MST
Module 3: IP Configuration
- DHCP Intro And Config-Part1
- DHCP Intro And Config-Part2
- IPV6 Intro And Config-Part1
- IPV6 Intro And Config-Part2
- Configure DHCP
- Configure DHCPV6
- Configure IPSLA
- NTP Configuration
- Network Monitoring Using IPSLA-Part1
- Network Monitoring Using IPSLA-Part2
- Network Monitoring Using IPSLA-Part3
Module 4: STP And RTP
- Config Routing Between VLANs With A Router
- Improves STP Config-Part1
- Improve STP Config-Part2
- Improve STP Config-Part3
- Improve STP Config-Part4
- Implement RSTP
- Intro And Config MST
Module 5: Routing
- Config Routing Between VLANs With A Router
- Routing On A Multi Layer Switch
- Routing With An External Router
- Further Routing On Multilayer Switch
Module 6: HSRP, VRRP, GLBP
- Configure And Tune HSRP
- Configure HSRP With Load Balancing
- HSRP For IPv6
- Configure VRRP
- Configure VRRP With Load Balancing
- Implement GLBP
- Configure GLBP
Module 7: Course Review
- Designing Complex Networks
- Review Demo CAM
- Review Demo VLANs And Trunking
- Review Demo VTP Configure
- Review Demo Ether Channel And Load Balancing
- Review Demo RSTP
- Review Demo Routing Between VLANs With A Router
- Course Outro
Module 1: Database Concepts And Tools
- Instructor And Course Introduction
- Database Concepts And Tools – Part 1
- Database Concepts And Tools – Part 2
Module 2: Memory Structure
- Memory Structure – Part 1
- Memory Structure – Part 2
Module 3: Tables
- Tables – Part 1
- Tables – Part 2
Module 4: Indexes
- Indexes – Part 1
- Indexes – Part 2
Module 5: Constraints And Triggers
- Constraints And Triggers – Part 1
- Constraints And Triggers – Part 2
Module 6: Users
- Users
- Profiles
- Privileges
- Roles
Module 7: Internal Structures
- Storage Structures – Part 1
- Storage Structures – Part 2
- Internal Memory Structures – Part 1
- Internal Memory Structures – Part 2
- Background Processes – Part 1
- Background Processes – Part 2
Module 8: Starting Up and Shutting Down Database
- Starting And Stopping DataBase – Part 1
- Starting And Stopping DataBase – Part 2
Module 9: Critical Storage Files
- Critical Storage Files – Part 1
- Critical Storage Files – Part 2
Module 10: Data Manipulation Language
- DML Atomicity – Part 1
- DML Atomicity – Part 2
- DML Insert
- DML Update – Part 1
- DML Update – Part 2
- DML Delete And Review Of DML Statements – Part 1
- DML Delete And Review Of DML Statements – Part 2
Module 11: Data Concurrency
- Data Concurrency – Part 1
- Data Concurrency – Part 2
Module 12: BackUp And Recovery
- Back Up – Part 1
- Back Up – Part 2
- Back Up – Part 3
- RMAN Catalog
- RMAN BackUps – Part 1
- RMAN BackUps – Part 2
- Disaster Preparedness
- Recovery
- Flashback Recovery
Module 13: Installation
- Installation – Part 1
- Installation – Part 2
Module 14: Course Review
- Course Review – Part 1
- Course Review – Part 2
- Course Review – Part 3
- Course Review – Part 4
- Course Review – Part 5
- Course Outro
Module 1: Configuring Advanced DNS Services
- Introduction
- DNSSEC
- Socket Pool And Cache Locking
- Advanced DNS Settings
- Questions
Module 2: Advanced DHCP Services
- DHCP Scopes
- High Availability
- Policy-Based Assignments
- DHCPv6
- Questions
Module 3: Active Directory Forest Configuration
- Active Directory Forests
- Active Directory Sites
- Active Directory Trusts
- Active Directory Read Only Domain Controllers
- Active Directory Replication
Module 4: Active Directory Certificate Services
- ADCS Overview
- ADCS Management
Module 5: ISCSI And ISNS
- ISCSI And ISNS
- ISCSI And ISNS Demo
- Questions
Module 6: Configuring IPAM
- Install And Configure IPAM
- IPAM Demo
- Questions
Module 7: Network Balancing
- Install And Configure NLB
- NLB Demo
- Questions
Module 8: Failover Clusters
- Cluster Overview
- Cluster Aware Updating
- Failover Clusters Demo
- Questions
Module 9: Configuring Hyper_V Virtual Machines
- Create VM Replicas In Hyper-V And Migrate VMs
- Hyper V Virtual Machines Demo
- Questions
Module 10: Dynamic Access Control
- DAC Overview And Configure
- DAC Demo
- Questions
Module 11: Active Directory Rights Management Services
- Install ADRMS
- Manage ADRMS
- ADRMS Demo
- Questions
Module 12: Active Directory Federation Services
- Configure And Manage ADFS
- ADFS Demo
- Questions
Module 13: Disaster Recovery
- Configure And Restore Windows Server Backup
- Configure And Restore Windows Server Backup Demo
- Questions
Module 14: Configuring Additional Services
- Configuring Additional Services
- Configuring Additional Services Demo-Part1
- Configuring Additional Services Demo-Part2
- Questions
- Conclusion
Module 1: Managing User and Service Accounts
- Introduction
- User Accounts-Part 1
- User Accounts-Part 2
- User Accounts-Part 3
- Service Accounts-Part 1
- Service Accounts-Part 2
- Questions
Module 2: Administer Group Policy
- Group Policy
- User Configuration-Part 1
- User Configuration-Part 2
- User Configuration-Part 3
- Computer Configurations
- Group Policy Management-Part 1
- Group Policy Management-Part 2
- Group Policy Management-Part 3
- Questions
Module 3: Managing Network File Services
- File System Resource Manager
- Distributed File System
- Encrypting File System
- Auditing Resources
- Questions
Module 4: Domain Name System
- DNS Functionality-Part 1
- DNS Functionality-Part 2
- DNS and Active Directory
- DNS Server Configuration-Part 1
- DNS Server Configuration-Part 2
- Questions
Module 5: Windows Deployment Services
- WDS Overview
- Creating Images
Module 6: Windows Server Update Services
- WSUS-Part 1
- WSUS-Part 2
Module 7: Remote Access
- Implement Remote Access-Part 1
- Implement Remote Access-Part 2
- Implement Remote Access-Part 3
- Offline Domain Join
- Implement Network Policy Server-Part 1
- Implement Network Policy Server-Part 2
- Implement Network Policy Server-Part 3
Module 8: Monitoring System
- Monitoring System Resources-Part 1
- Monitoring System Resources-Part 2
Module 9: Managing Active Directory Services
- Managing Active Directory Services-Part 1
- Managing Active Directory Services-Part 2
- Managing Active Directory Services-Part 3
- Conclusion
Module 1: Introduction To Oracle 12c SQL Fundamentals
- Introduction
- Intro To Oracle 12c-SQL Fundamentals
- Structure Of SQL
- Basic Select Statements
- Basic Select Statements Demo
Module 2: Retrieving Data
- Modifying Reported Output
- The Where Clause
- The Order By Clause
- Left And Right Outer Joins
- The Where Clause Demo
- Multi-Table Selection Demo
Module 3: SQL Functions
- Single Row Functions
- Aggregate Functions
- Single Row Functions Demo
- Muiltrow Functions Demo
- Group By
- Grouping Demo
- Conversion Functions
- Conversion Functions Demo
- Datetime Functions
- Datetime Functions Demo
Module 4: Subqueries
- Single-Row Subqueries
- Single-Row Subqueries Demo
- Multi-Row Subqueries
- Multi-Row Subqueries Demo
- Other Subquery Types
- Other Subquery Types Demo
Module 5: Data Manipulation Language
- Adding Data
- Changing Data
- Deleting Data
- DML Demo
Module 6: Data Control Language
- Security
- Object Privileges
- DCL Demo
Module 7: Data Definition Language
- Creating Objects In The Database
- Creating Objects In The Database Demo
- Sequences
- Sequenced Demo
- Indexes
- Views
Module 8: Combining Queries
- Combining Queries
Module 9: Oracle 12C SQL Fundamentals Review
- Oracle 12c SQL Fundamentals Review – Part 1
- Oracle 12c SQL Fundamentals Review – Part 2
- Oracle 12c SQL Fundamentals Review – Part 3
- Conclusion
Module 1: Installing And Configuring Windows Server 2012 R2
- Course And Instructor Introduction
- Overview-Part1
- Overview-Part2
- Overview-Part3
- Management-Part1
- Management-Part2
- Management-Part3
- Management-Part4
- Management-Part5
- Installation-Part1
- Installation-Part2
- Installation-Part3
- Questions-Part1
- Questions-Part2
Module 2: Installing and Configuring an Active Directory Domaine Control
- Active Directory Design-Part1
- Active Directory Design-Part2
- Active Directory Design-Part3
- Installing Active Directory Domain Services-Part1
- Installing Active Directory Domain Services-Part2
- Installing Active Directory Domain Services-Part3
- Installing Active Directory Domain Services-Part4
- Questions
Module 3: Administering Active Directory Objects
- Design And Create An Active Directory Hierarchy-Part1
- Design And Create An Active Directory Hierarchy-Part2
- Manage Users-Part1
- Manage Users-Part2
- Manage Users-Part3
- Manage Computers-Part1
- Manage Computers-Part2
- Manage Computers-Part3
- Questions
Module 4: Automating Administration Tasks
- Powershell Overview And Object Command-Part1
- Powershell Overview And Object Command-Part2
- Powershell Overview And Object Command-Part3
- Command Line Object Management And Bulk Operations-Part1
- Command Line Object Management And Bulk Operations-Part2
- Questions
Module 5: Configuring IPv4
- TCP IP Overview
- IPv4 Addressing-Part1
- IPv4 Addressing-Part2
- Subnetting And Supernetting
- Configure And Troubleshoot IPv4-Part1
- Configure And Troubleshoot IPv4-Part2
- Questions-Part1
- Questions-Part2
Module 6: Configuring IPv6
- Configuring IPV6-Part1
- Configuring IPV6-Part2
- Questions
Module 7: Installing and Configuring DHCP
- DHCP Overview Database Security-Part1
- DHCP Overview Database Security-Part2
- Questions
Module 8: Installing and Configuring DNS
- Installing And Configuring DNS-Part1
- Installing And Configuring DNS-Part2
- Installing And Configuring DNS-Part3
- Installing And Configuring DNS-Part4
- Installing And Configuring DNS-Part5
- Questions
Module 9: Configuring Storage Spaces And File And Print Services
- Design And Implement Storage Spaces-Part1
- Design And Implement Storage Spaces-Part2
- Design And Implement Storage Spaces-Part3
- Secure Files And Folders Configure Offline Files And Shadow Copies
- Implement Network Printing
- Questions
Module 10: Configuring Group Policy
- Create Group Policy Objects
- Configure Group Policy Settings-Part1
- Configure Group Policy Settings-Part2
- Implement A Central Store And Questions
Module 11: Securing Windows Servers
- Securing Windows Servers-Part1
- Securing Windows Servers-Part2
- Questions
Module 12: Installing and Configuring Virtual Servers and Clients
- Virtualization Solution
- Hyper V-Part1
- Hyper V-Part2
- Network Virtualization And Questions-Part1
- Network Virtualization And Questions-Part2
- Conclusion
Module 1: Introduction to Cisco Troubleshooting
- Introduction
- Troubleshooting And Maintenance
- IOS Troubleshooting Commands
- Remote Data Gathering
- Introduction To Graphical Troubleshooting Tools And Review
Module 2: Troubleshooting Switches
- Troubleshoot Catalyst Switches
- Troubleshoot TCAM
Module 3: Troubleshooting VLANS and Trunking
- Troubleshooting VLANs And Trunking-Part1
- Troubleshooting VLANs And Trunking-Part2
- Troubleshooting VLANs And Trunking-Part3
- Trouble Ticket 1 VLANS
Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel
- Spanning Tree Protocol
- STP Port Configuration
- Ether Channel
- Trouble Ticket 2-Trunking
Module 5: Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
- Troubleshooting Inter-VLAN Routing
- Troubleshooting Layer 3 Ether Channel
Module 6: Troubleshooting Switch Security Features
- Troubleshoot Switch Security-Part1
- Troubleshoot Switch Security-Part2
- Trouble Ticket 3-Switch Security-Part1
- Trouble Ticket 3-Switch Security-Part2
Module 7: Troubleshooting FirstHop Redundancy Protocols
- HSRP
- VRRP
- Questions
- Trouble Ticket 4
Module 8: Troubleshooting IPv4 and IPv4 Addressing
- IPv4 Addressing DHCPNAT-Part1
- IPv4 Addressing DHCPNAT-Part2
- Trouble Ticket 5
- Trouble Ticket 6
Module 9: IPv6 Addressing and Addressing Technologies
- IPv6 Addressing Options
Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
- IPv4 ACLs
- Prefixlists IPv6 ACLs
- Trouble Ticket Access Control List1
- Trouble Ticket Access Control List2
Module 11: Troubleshooting GRE and Basic Routing Tunnels
- IPv4 Routing-Part1
- IPv4 Routing-Part2
- IPv6 Routing
- GRE Tunnels
Module 12: Troubleshooting RIPv2 and RIPng
- RIPv2
- RIPng
Module 13: Troubleshooting EIGRP
- EIGRP
- EIGRP For IPv6
- Trouble Ticket 1
- Trouble Ticket 2
Module 14: OSPF and OSPFv3
- OSPF-Part1
- OSPF-Part2
- OSPFv3
- Trouble Ticket 1
- Trouble Ticket 2
- Trouble Ticket 3
Module 15: Troubleshooting Route Maps and Policy Based Routing
- Route Maps And Policy Based Routing
Module 16: Troubleshooting Redistribution
- Verifying Redistribution Configuration
- Troubleshooting Redistribution With Route Maps
Module 17: Troubleshooting BGP
- BGP Overview
- BGP Configuration-Part1
- BGP Configuration-Part2
- Trouble Ticket 1
- Trouble Ticket 2
Module 18: Troubleshooting Management Protocols and Tools
- Troubleshooting Management Protocols And Tools
- SPAN And RSPAN
Module 19: Troubleshooting Management Access
- Management Access Troubleshooting
- Conclusion
Module 1: Introduction and White Wines
- White Wines
Module 2: Glassware, Temperature, Storage and Ratings
- Temperature Glassware Storage And Ratings
Module 3: Red Wines
- Red Wines
Module 4: Regions
- Europe
- Europe Continued
- North America
- South America Australia New Zealand
- Conclusion
Module 1: Plan And Design
- Introduction
- Review Routing Fundamentals
- Review Route Selection
- Review Switching Versus Routing
- Review IP Subnetting
- Review How To Subnet
- Review IP Address Classes
Module 2: EIGRP Enhanced Interior Gateway Routing Protocol
- Plan And Design-Part1
- Plan And Design-Part2
- EIGRP Config
- Configuring RIPng
- Building EIGRP Topology Table
- EIGRP Stub Routing
- EIGRP Summarization
- EIGRP Load Balancing
- Discovering Main EIGRP Configuration
- Implementing EIGRP Through Name Config
- Configure EIGRP Authentication
- Configure Authentication For EIGRP Routes
Module 3: IPv6
- Introduction To IPv6-Part1
- Introduction To IPv6-Part2
- IPv6 Addressing
- Basic IPv6 Configuration
- EIGRP For IPv6
- Configure And Optimize EIRGP For IPv6
Module 4: OSPF
- lntroduction To OSPF-Part1
- lntroduction To OSPF-Part2
- lntroduction To OSPF-Part3
- Configure OSPF
- Building The Link State Database
- OSPF Path Selection
- OSPF Route Summarization
- OSPF Stub Areas
- Implement OSPF
- Optimize OSPF
- OSPF Authentication Configuration
- Configure OSPFV3
- Basic Redistribution
Module 5: Border Gateway Protocol BGP
- Introduction To BGP
- BGP Specifics
- Basic BGP
- BGP Path Selection
- Configure BGP Authentication
- Configure BGP
Module 6: Course Review
- Configure Basic EIGRP
- Basic OSPF Configuration
- Summary Of-EIGRP-OSPF-IPv6-BGP
- Conclusion
Module 1: Introduction To Application Virtualization
- Course Introduction
- Introduction To Virtualization
- Introduction To Desktop Virtualization
- Introduction To Application Virtualization
- The XenApp Blue Print
- Building The Lab Environment
Module 2: XenApp Server Setup
- Configure XenApp Server After Initial Install
- Configuration Updates And Virtual Delivery Agent Install
- Build Master Image For Machine Catalog
- Complete Master Image Build
- Setup Delivery Group
- Test XenApp Application Delivery
Module 3: Plan For High Availability
- High Availability Explained-Part1
- High Availability Explained-Part2
- Windows Failover Cluster-Part1
- Windows Failover Cluster-Part2
- Complete Failover Cluster Configuration
- Complete Basic Cluster Configuration-Part1
- Complete Basic Cluster Configuration-Part2
- High Availability Explained-Part1
- High Availability Explained-Part2
- Windows Failover Cluster-Part1
- Windows Failover Cluster-Part2
- Complete Failover Cluster Configuration
- Complete Basic Cluster Configuration-Part1
- Complete Basic Cluster Configuration-Part2
Module 4: Scripting Primer
- Windows Batch Files-Part1
- Windows Batch Files-Part2
- Windows Batch Files-Part3
- Power Shell Scripts-Part1
- Power Shell Scripts-Part2
- Error Handling In PowerShell Scripts
- Scripts Explained
Module 5: Using VMware vSphere
- Introduction To VMware
- Configuring Windows 7 And Installing VMware Tools
- Power CLI Scripting In VMware
Module 6: Virtualization Using Microsoft Hyper-V
- Introduction To Hyper-V
- Introduction To Hyper-V Continued
- Windows Server Core Install And Configure-Part1
- Windows Server Core Install And Configure-Part2
- Install And Configure DHCP Server
- Hyper-V Virtual Networking
Module 7: Course Review
- Active Directory Fundamentals
- Permissions In Active Directory
- Logon Scripts In Windows
- Review Virtualization
- Review Application Virtualization
- Review High Availability
- Review Scripting
- Review XenApp Blue Print
- Course Conclusion
Module 1: Introducing The Cloud Model
- Course And Instructor Introduction
- Overview Of Cloud Computing
- Dissecting Hybrid Cloud Environments
- Requirements For Cloud Implementation
- Using System Center To Operate The Cloud – Part 1
- Using System Center To Operate The Cloud – Part 2
- Using System Center To Operate The Cloud – Part 3
- Ongoing Cloud Maintenance
- System Center Component Integration
- Verifying The Cloud Infrastructure Demo
Module 2: Configuring The Private Cloud Environment
- Overview Of Virtual Machine Manager
- Managing Virtual Environments
- Creating Private Cloud
- Configuring And Optimizing The Private Cloud
Module 3: Deploying Services For The Private Cloud
- Understanding Service Templates
- Configuring Profiles – Part 1
- Configuring Profiles – Part 2
- Using Web Deploy Packages
- Configuring Server App-V
- Using Data Tier Applications
- Using App Controller To Deploy Services
- Deploying Cloud Services Demo
Module 4: Monitoring Cloud Based Applications
- Overview Of Operations Manager
- Deploying Monitoring Agents
- Customizing Monitoring Solutions
- Monitoring The Network Infrastructure
- Distributed Application Monitoring
- Application Performance Monitoring – Part 1
- Application Performance Monitoring – Part 2
- Application Performance Monitoring – Part 3
- Application Performance Monitoring – Part 4
- Application Performance Monitoring – Part 5
Module 5: Service Management For The New Cloud
- Configuring Service Manager – Part 1
- Configuring Service Manager – Part 2
- Configuring Service Manager – Part 3
- Configuring Service Manager – Part 4
- Automating Service Management – Part 1
- Automating Service Management – Part 2
- Automating Service Management – Part 3
- Managing Incidents And Problems
Module 6: High Availability And Disaster Recovery For The Private Cloud
- High Availability For The Private Cloud – Part 1
- High Availability For The Private Cloud – Part 2
- High Availability For The Private Cloud – Part 3
- High Availability For The Private Cloud – Part 4
- Protecting Data In The Private Cloud – Part 1
- Protecting Data In The Private Cloud – Part 2
- Recovering Data In The Private Cloud – Part 1
- Recovering Data In The Private Cloud – Part 2
Module 7: Optimizing The Private Cloud Infrastructure
- Applying Infrastructure Updates
- Applying Updates To Virtual Machines
- Extending The Private Cloud Infrastructure
- Optimizing The Cloud Infrastructure With System Center Advisor
- Using PRO-Tips To Optimize The Cloud
Module 8: Configuring MultiTenant SelfService Using Windows Azure Pack
- Understanding Windows Azure Pack
- Windows Azure Pack Administration
- Windows Azure Pack Providers
Module 9: Configuring And Monitoring The Private Cloud Review
- Configuring And Monitoring The Private Cloud Review
- Conclusion
Microsoft 70-409: Server Virtualization with Windows Server Hyper-V and System Center Course Content
Module 1: Understanding Microsoft Applications
- Introduction To Exam 70-409
- Introduction To Microsoft Virtualization-Part1
- Introduction To Microsoft Virtualization-Part2
- Introduction To System Center 2012 R2 Components
- Evaluate The Existing Environment For Virtualization
- Module 1 Review Questions
Module 2: Installing And Configuring The Hyper-V Role
- Install The Hyper-V Role
- Manage Hyper-V
- Configure Hyper-V Settings
- Introduction To Hyper-V Host Storage And Networking
- Module 2 Review Questions
- Installing Hyper-V-Demo
Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual Machine Checkpoints
- Create And Configure Virtual Hard Disks
- Create And Configure Virtual Machines
- Install And Import Virtual Machines
- Manage Virtual Machine Checkpoints
- Monitor Hyper-V
- Design Virtual Machines For Server Roles-Services
- Module 3 Review Questions
- Creating A Virtual Machine-Demo
Module 4: Producing And Configuring Virtual Machine Networks
- Generate And Utilize Hyper-V Virtual Switches-Part1
- Generate And Utilize Hyper-V Virtual Switches-Part2
- Introduction To Advanced Hyper-V Networking Features
- Configure And Utilize Hyper-V Network Virtualization
- Module 4 Review Questions
- ControllingThe VM Demo
Module 5: Virtual Machine Movement And Hyper-V Replicas
- Deliver High Availability And Redundancy For Virtualization
- Implement Virtual Machine Movement
- Implement And Manage Hyper-V Replica
- Module 5 Review Questions
Module 6: Implementing Failover Clustering Using Hyper-V
- Introduction To Failover Clustering-Part1
- Introduction To Failover Clustering-Part2
- Configure And Utilize Shared Storage
- Implement And Manage Failover Clustering Using Hyper-V
- Module 6 Review Questions
- Exploring Clustering-Demo
Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual Machine Manager
- Integrated System Center And Server Virtualization
- Virtual Machine Manager
- Install VMM And Add Hosts And Manage Host Groups
- Module 7 Review Questions
- Exploring SCVMM
Module 8: Managing The Network And Storage Infrastructure In Microsoft System Center 2012 R2 Virtual Machine Manager
- Managing Networking Infrastructure
- Managing Storage Infrastructure And Infrastructure Updates
- Module 8 Review Questions
Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager
- Introduction To Virtual Machine Management Tasks In VMM
- Create Clone And Convert Virtual Machines
- Introduction To Virtual Machine Updating
- Module 9 Review Questions
Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library
- Introduction To The Virtual Machine Manager Library
- Working With Profiles And Templates
- Module 10 Review Questions
Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine Manager
- Introduction To The Cloud
- Produce And Manage A Cloud And User Role Utilization In VMM
- Module 11 Review Questions
Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual Machine Manager And Application Controller
- Managing Service In MSC 2012 R2 VMM And Application Controller-Part1
- Managing Service In MSC 2012 R2 VMM And Application Controller-Part2
- Module 12 Review Questions
Module 13: Protecting And Monitoring Virtualization Infrastructure
- Introduction To Backup And Restore Options For Virtual Machines
- Protecting Virtualization Infrastructure By Using DPM-Part1
- Protecting Virtualization Infrastructure By Using DPM-Part2
- Utilize Operations Manager For Monitoring And Reporting
- Integrate VMM With Operations Manager
- Module 13 Review Questions
- Exploring DPM-Demo
Module 14: Hyper-V And SCVMM Review
- Hyper-V And SCVMM Review-Part1
- Hyper-V And SCVMM Review-Part2
- Hyper-V And SCVMM Review-Part3
- Hyper-V And SCVMM Review-Part4
- Exam 70-409 Conclusion
Module 1: Intro To XenServer And Virtualization
- Intro To Virtual Computing
- Hypervisors-Part1
- Hypervisors-Part2
- Installing Your First VM
- Creating An Active Directory Domain In The VM
- Adding VM And Host To Domain
- Virtual Networks Explained
Module 2: Comprehensive Introduction To Linux
- Intro And Demo Of Linux
- Configuring Linux VM
- Network Configuration
- Linux Scripting And File Permissions
- Advanced Linux Permissions
- Linux DHCP And Disks Explained
- Install And Configure DHCP
Module 3: Hosts, Storage, And Networking
- Storage Access And Configuration
- iCSI Configuration And Access
- Storage Repository
- Subnets Explained
- Subnets Example
- More Subnetting
- Building A Linux Based VM Router
Module 4: Comprehensive Introduction To Powershell
- Why Powershell
- Using Powershell
- Pipelines And WMI
- More WMI And Scripting Using Powershell
- Advanced Powershell Scripting
Module 5: XenServer Components And Features
- Critical Components
- VM Templates
- Virtual Networking
- Automation Explained
- Automation Using XenServer CLI Demo
- Automation Using Powershell Demo
- Powershell Script Completion And Execution
- Protecting Your Virtual Environment Explained
- Protecting Your Virtual Environment Demo
- XenCenter Comprehensive Walk Through
Module 6: Problem Resolution
- Troubleshooting Explained
- VM Migration
Module 7: Review
- XenServer Exam Objectives
- PXE Server Explained
- PXE Server Demo
- XenServer Product Review
- AD Using Command Line And PowerShell
- Conclusion
Module 1: Handling Design And Architecture For Microsoft Lync Server 2013
- Course And Instructor Introduction
- Introduction To Lync Server 2013 Architecture – Part 1
- Introduction To Lync Server 2013 Architecture – Part 2
- Introduction To Lync Server 2013 Architecture – Part 3
- Introduction To Lync Server 2013 Architecture – Part 4
- Introduction To Lync Server 2013 Architecture – Part 5
- Introduction To Lync Server 2013 Architecture – Part 6
- Introduction To Lync Server 2013 Core Capabilites
- Introduction To Lync Server 2013 Design Process
- Evaluate Infrastructure Requirements And Update The Design
- Plan For All Phases Of Microsoft Solutions Framework – Part 1
- Plan For All Phases Of Microsoft Solutions Framework – Part 2
- Plan For All Phases Of Microsoft Solutions Framework – Part 3
- Module 1 Questions
Module 2: Designing A Lync Server 2013
- Plan Infrastructure Requirements For Lync Server 2013 – Part 1
- Plan Infrastructure Requirements For Lync Server 2013 – Part 2
- Use The Lync Server 2013 Planning Tool
- Use The Topology Builder – Part 1
- Use The Topology Builder – Part 2
- Plan The Server Infrastructure
- Design Documentation With The Use Of Microsoft Office – Part 1
- Design Documentation With The Use Of Microsoft Office – Part 2 And Module 2 Questions
Module 3: Installing Lync
- Prepare For Installation
- Install Lync – Part 1
- Install Lync – Part 2
Module 4: Using Management Tools And RBAC
- Using Management Tools – Part 1
- Using Management Tools – Part 2
- Using Management Tools – Part 3
- Using Management Tools – Part 4
- Using Management Tools – Part 5
- Using Management Tools – Part 6
- Introduction To Role-Based Access Control
- Module 4 Questions
Module 5: Deploying And Managing Clients And Devices
- Prepare For Client Deployment
- Deploy And Manage Lync 2013 Clients
- Prepare For Device Deployment And Module 5 Questions
Module 6: Conferencing In Lync Server 2013
- Introduction To Conference In Lync Server 2013 – Part 1
- Introduction To Conference In Lync Server 2013 – Part 2
- Design For Web And Audio-Video Conferencing
- Introduction To Dial-In Conferencing In Lync Server 2013
- Manage And Administer Conferencing And Module 6 Questions
Module 7: Designing And Deploying External Access
- Introduction To Lync 2013 External Capabilities – Part 1
- Introduction To Lync 2013 External Capabilities – Part 2
- Plan For IM And Presence Federation
- Design Edge Requirements – Part 1
- Design Edge Requirements – Part 2
- Module 7 Questions
Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat
- Introduction To Persistent Chat Architecture And Design Considerations In Lync Server 2013
- Deploy And Configure Lync Server 2013 Persistent Chat And Module 8 Questions
Module 9: Archiving And Monitoring
- Introduction To The Archiving And Monitoring Services
- Configure Archiving And Monitoring And Module 9 Questions
Module 10: Administering And Maintaining Lync Server 2013
- Administering And Maintaining Lync Server 2013 – Part 1
- Administering And Maintaining Lync Server 2013 – Part 2
Module 11: Configuring And Managing High Availability In Lync Server 2013
- Introduction To High Availability In Lync Server 2013
- Design Load Balancing – Part 1
- Design Load Balancing – Part 2
Module 12: Understanding Disaster Recover In Lync Server 2013
- Understanding Disaster Recover In Lync Server 2013 – Part 1
- Understanding Disaster Recover In Lync Server 2013 – Part 2
- Module 12 Real World Scenarios And Questions
Module 13: Planning a Migration to Lync Server 2013
- Introduction To Coexistence And Migration – Part 1
- Introduction To Coexistence And Migration – Part 2
- Introduction To Coexistence And Migration – Part 3
- Introduction To Migration Steps – Part 1
- Introduction To Migration Steps – Part 2
- Plan For Clients And Devices And Design Client Migration And Device Migration Strategy
- Course Outro
Module 1: Understanding Voice Architecture
- Course Introduction
- Introduction To Architecture And Server Roles – Part 1
- Introduction To Architecture And Server Roles – Part 2
- Introduction To Architecture And Server Roles – Part 3
- Introduction To Architecture And Server Roles – Part 4
- Introduction To Architecture And Server Roles – Part 5
Module 2: Configuring Key Enterprise Voice Functionality
- Introduction To Lync Voice Routing
- Configure Enterprise Voice – Part 1
- Configure Enterprise Voice – Part 2
- Configure Enterprise Voice – Part 3
- Define Voice Policies – Part 1
- Define Voice Policies – Part 2
Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with Lync Server 2013
- Introduction To Exchange 2013 Unified Messaging – Part 1
- Introduction To Exchange 2013 Unified Messaging – Part 2
- Configure Exchange UM To Work With Lync 2013 – Part 1
- Configure Exchange UM To Work With Lync 2013 – Part 2
- Configure Exchange UM To Work With Lync 2013 – Part 3
- Configure Exchange UM To Work With Lync 2013 – Part 4
- Configuring Exchange And Lync Feature Integration – Part 1
- Configuring Exchange And Lync Feature Integration – Part 2
- Configuring Exchange And Lync Feature Integration – Part 3
- Configuring Exchange And Lync Feature Integration – Part 4
- Configuring Exchange And Lync Feature Integration – Part 5
Module 4: Understanding Voice Applications
- Introduction To Response Group Services – Part 1
- Introduction To Response Group Services – Part 2
- Introduction To Response Group Services – Part 3
- Introduction To Response Group Services – Part 4
Module 5: Configuring and Deploying Emergency Calling
- Introduction To Location Information Server – Part 1
- Introduction To Location Information Server – Part 2
- Introduction To Set Up And Call Flow – Part 1
- Introduction To Set Up And Call Flow – Part 2
- E911 User Experience
Module 6: Integrating the PSTN
- Connect To The PSTN – Part 1
- Connect To The PSTN – Part 2
- Connect To The PSTN – Part 3
- Connect To The Existing PBX
- Intro To M-N Interworking Routing
- Introduction To Call Routing Reliability
Module 7: Understanding Lync Server 2013 and Networking
- Plan For Media Requirements – Part 1
- Plan For Media Requirements – Part 2
- Plan For Call Admission Control – Part 1
- Plan For Call Admission Control – Part 2
- Introduction To Media Bypass
Module 8: Understanding Phones and Devices
- Introduction To Phones And Devices Deploy Device – Part 1
- Introduction To Phones And Devices Deploy Device – Part 2
- Introduction To Phones And Devices Deploy Device – Part 3
- Lync Server 2013 Phones Management – Part 1
- Lync Server 2013 Phones Management – Part 2
Module 9: Configuring And Migrating Lync Online
- Introduction To Office 365 Architecture
- Deploy Lync Online
- Introduction To Lyncy brid Scenerios
Module 10: Monitoring
- Introduction To Voice Quality Concepts
- Explore Lync Monitoring Server Components
- Explore Lync Monitoring Server Reports
Module 11: Understanding Lync Server2013 Voice Resiliency
- Introduction To Voice Resilience
- Introduction Lync Pool Resilience
- Introduction Branch Office Resilience
- Course Outro
Module 1: Intro To Business Intelligence
- Introduction
- The Business Intelligence Solution
- Overview Of Business Intelligence
- BI And Power Pivot Demo
- ETL Intro
- Designing Data Warehouses
- Design For Speed
- BI Semantic Model
Module 2: Database Essentials
- Basic Database Objects Demo
- Stored Procedures And Triggers Demo
- Database Clusters Demo
- SQL Server Management
- Table Triggers
- DB Config Options
- DB Backup
- DB Files And Restore
Module 3: Business Intelligence Development
- Using SQL Server Data Tools Demo
- Building An IS Integration Services Package Demo
- Loading Data From Remote Sources Demo
Module 4: Business Intelligence Results
- Report Building Intro Setup Demo
- Using Report Builder Demo
- Processing Data From Web Service Demo
- Reporting From Multiple Tables Demo
- Report Function And Matrix Demo
- Interactive Reports Demo
- Sorting Report Data Demo
Module 5: Advanced Reporting And Development
- Drill Through Reports
- Data Visualization
- Creating Store Procedure From Scratch
- Memory Optimize Table
Module 6: SQL Server Integration Services (SSIS)
- Building Our First Integration Project
- Data Transformation
- Introduction To Big Data
- Transformation Using Store Procedure
- Transformation Using SSIS
- Building Fact Table Using Store Procedure
- Building Fact Table Using SSIS
Module 7: SQL Server 2014 New Features
- Backup Enhancements
- Index Enhancements
- Online DB Enhancements
- BackUp To The Cloud
- Partition Data
Module 8: Course Review And Exam Prep
- BI Review
- SharePoint Overview
- SharePoint Demo
- Exam Prep
- Before You Take The Exam
- Conclusion
Module 1: Introduction To Virtualization
- Introduction
- Intro To Virtualization-Part1
- Virtualization Demo-Part1
- Virtualization Demo-Part2
- Intro To Virtualization-Part2
Module 2: Introduction To Desktop Virtualization
- Into To Desktop Virtualization
Module 3: XenDesktop 7.6 Requirements and Implementations
- Intro To Xen Desktop Concepts And Components
- Xen Desktop Implementations-Part1
- Xen Desktop Implementations-Part2
Module 4: Plan and Design XenDesktop Infrastructure
- Intro To Plan And Design-Part1
- Intro To Plan And Design-Part2
- Active Directory Permissions Demo
- Customize The Desktop Demo
- Customize Environment Demo
- Folder Redirection Demo
- Custom Scripts Demo
- Dynamic VM Demo
- Network Design Considerations
- VM From Scratch Demo
- Access And Optimize
- Cloud Considerations Demo
- Design Monitoring
Module 5: Data And Network Redundancy
- Intro To Network Redundancy
- Intro To Data Redundancy
- VM Availability Demo-Part1
- VM Availability Demo-Part2
- VM Availability Demo-Part3
- Citrix Linux VM And Citrix Xendesktop Site Configuration Demo
Module 6: Automating Using Powershell
- Intro To Powershell-Part1
- Intro To Powershell-Part2
- Powershell Scripting Demo
- Creating Functions In Powershell
Module 7: Virtualizing Using Hyper-V
- Introduction To Hyper-V Installtion
- Introduction To Hyper-V VM Build
- Automating Admin In Hyper-V
Module 8: Build Test And Deploy VM To Xen Desktop
- Customize Client OS Demo
- Customize User Profiles Demo
- Installing XenDesktop Client Components For Pooled Desktops Demo
- Installing XenDesktop Client Components For Remote Desktops Demo
- Deploy XenDesktop Client After VDA Install Demo
- Test Client Deployment Demo
Module 9: Internet Information Services
- Intro And Install Of Information Services-Part1
- Intro And Install Of Information Services-Part2
- Creating Websites And Managing Application Pools
- Backup And Restore WebServer
Module 10: Course Review
- Active Directory Domain
- Windows Permissions And Configurations
- Configure Citrix XenDesktop Studio
- Failover Cluster Demo
- Citrix Authentication And Troubleshooting
- XenDesktop Technical Overview
- SQL Server Database Overview Demo
- SQL Server DBA Tasks
- Conclusion
Module 1: Beginner
- Beginner
Module 2: Intermediate
- Intermediate
Module 3: Advanced
- Advanced
How to Become a Personal Trainer
- Intro
- Requirements
- Skills For A Successful Personal Trainer
- Questions To Consider
- Certifications
- Job Opportunities
- Salary For Personal Trainer
- First Aid And CPR
- Time Needed To Become A Personal Trainer
- Know Your Clients
- Interesting And Fun
- Common Mistakes
- Retaining Your Clients
- Insurance
- Summary
Module 1: Organization – Wide Planning and Deployment
- Introduction
- Wide Planning And Deployment-Part 1
- Wide Planning And Deployment-Part 2
- Wide Planning And Deployment-Part 3
Module 2: Leadership
- Leadership-Part 1
- Leadership-Part 2
Module 3: Organizational Process Measures and Management
- Organizational Process Measures And Management-Part 1
- Organizational Process Measures And Management-Part 2
Module 4: Team Management
- Team Management-Part 1
- Team Management-Part 2
- Team Management-Part 3
- Team Management-Part 4
Module 5: Define Phase – Overview of the Define Phase and the Voice of the Customer
- Overview Of The Define Phase And The Voice Of The Customer-Part 1
- Overview Of The Define Phase And The Voice Of The Customer-Part 2
- Overview Of The Define Phase And The Voice Of The Customer-Part 3
Module 6: Define Phase – Business Case and Project Charter
- Business Case And Project Charter-Part 1
- Business Case And Project Charter-Part 2
Module 7: Define Phase – Analytical Tools
- Analytical Tools
Module 8: Measure Phase – Process Analysis and Documentation
- Process Analysis And Documentation-Part 1
- Process Analysis And Documentation-Part 2
- Process Analysis And Documentation-Part 3
Module 9: Measure Phase – Data Collection
- Data Collection
Module 10: Measure Phase – Measurement Systems
- Measurement Systems-Part 1
- Measurement Systems-Part 2
Module 11: Measure Phase – Basic Statistics
- Basic Statistics-Part 1
- Basic Statistics-Part 2
Module 12: Measure Phase – Probability
- Probability
Module 13: Measure Phase – Process Capability
- Process Capability
Module 14: Analyze Phase – Measuring and Modeling Relationships
- Measuring And Modeling Relationships
Module 15: Analyze Phase – Hypothesis Testing
- Hypothesis Testing
Module 16: Analyze Phase – FEMA and Additional Analysis Methods
- FMEA And Additional Analysis Methods-Part 1
- FMEA And Additional Analysis Methods-Part 2
- FMEA And Additional Analysis Methods-Part 3
- FMEA And Additional Analysis Methods-Part 4
Module 17: Improve Phase – Design of Experiments (DOE)
- Design Of Experiments-Part 1
- Design Of Experiments-Part 2
Module 18: Improve Phase – Lean Method
- Lean Method-Part 1
- Lean Method-Part 2
- Lean Method-Part 3
Module 19: Improve Phase - Implementation
- Implementation
Module 20: Control Phase – Statistical Process Control (SPC)
- Statistical Process Control
Module 21: Control Phase – Other Controls
- Other Controls
Module 22: Control Phase – Maintain Controls and Sustain Improvements
- Maintain Controls And Sustain Improvements
Module 23: DFSS
- DFSS
Module 24: Exam Review – Prep and Key Concepts
- Prep And Key Concepts-Part 1
- Prep And Key Concepts-Part 2
- Prep And Key Concepts-Part 3
- Prep And Key Concepts-Part 4
- Prep And Key Concepts-Part 5
- Conclusion
Module 1: Six Sigma And The Organization
- Introduction
- Six Sigma And The Organization Goals-Part 1
- Six Sigma And The Organization Goals-Part 2
- Lean Principles In The Organization
- Design For Six Sigma
Module 2: Define PhaseProject Identification
- Define Phase-Project Identification-Part 1
- Define Phase-Project Identification-Part 2
- Define Phase-Project Identification-Part 3
Module 3: Define PhaseVoice Of The Customer
- Define Phase-Voice Of The Customer-Part 1
- Define Phase-Voice Of The Customer-Part 2
Module 4: Define Phase Project Management Basics on Six Sigma Green Belt
- Define Phase-Project Management Basics-Part 1
- Define Phase-Project Management Basics-Part 2
Module 5: Define PhaseManagement And Planning Tools
- Define Phase-Management And Planning Tools-Part 1
- Define Phase-Management And Planning Tools-Part 2
Module 6: Define PhaseBusiness Results For Projects
- Define Phase-Business Results For Projects-Part 1
- Define Phase-Business Results For Projects-Part 2
Module 7: Define PhaseTeam Dynamics And Define Phase Summary Review Questions
- Define Phase-Team Dynamics And Review Questions
- Define Phase-Summary And Review Questions
Module 8: Measure PhaseProcess Analysis And Documentation
- Measure Phase-Process Analysis And Documentation
Module 9: Measure PhaseProbability And Statistics
- Measure Phase-Probability And Statistics
Module 10: Measure PhaseStatistical Distributions
- Measure Phase-Statistical Distributions
Module 11: Measure PhaseCollecting And Summarizing Data
- Measure Phase-Collecting And Summarizing Data-Part 1
- Measure Phase-Collecting And Summarizing Data-Part 2
Module 12: Measure PhaseMeasurements System Analysis (MSA)
- Measure Phase-Measurements System Analysis(MSA)
Module 13: Measure PhaseProcess And Performance Capability And Measure Phase Summary And Review
- Measure Phase-Process And Performance Capability And Measure Phase Summary And Review
Module 14: Analyze PhaseExploratory Data Analysis And Hypothesis Testing
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part1
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part2
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part3
Module 15: Analyze Phase Process Drivers
- Analyze Phase-Process Drivers-Part 1
- Analyze Phase-Process Drivers-Part 2
- Analyze Phase-Process Drivers-Part 3
- Analyze Phase-Process Drivers-Part 4
- Analyze Phase-Process Drivers-Part 5
Module 16: Improve PhaseDesign Of Experiment (DOE)
- Improve Phase-Design Of Experiment(DOE)-Part 1
- Improve Phase-Design Of Experiment(DOE)-Part 2
Module 17: Improve PhaseRoot Cause Analysis
- Improve Phase-Root Cause Analysis-Part 1
- Improve Phase-Root Cause Analysis-Part 2
- Improve Phase-Root Cause Analysis-Demo
Module 18: Improve PhaseLean Tools
- Improve Phase-Lean Tools-Part 1
- Improve Phase-Lean Tools-Part 2
- Improve Phase-Lean Tools-Part 3
- Improve Phase-Lean Tools-Part 4
Module 19: Control Phase Statistical Process Control
- Control Phase-Statistical Process Control
Module 20: Control PhaseLean Tools For Process Control
- Control Phase-Lean Tools For Process Control-Part 1
- Control Phase-Lean Tools For Process Control-Part 2
- Control Phase-Lean Tools For Process Control-Part 3
Module 21: Review ExamPrep And Key Concepts
- Exam Review And Key Concepts-Part 1
- Exam Review And Key Concepts-Part 2
- Exam Review And Key Concepts-Part 3
- Exam Review And Key Concepts-Part 4
- Exam Review And Key Concepts-Part 5
- Exam Review And Key Concepts-Part 6
- Exam Review And Key Concepts-Part 7
- Exam Review-Flash Cards
- Conclusion
Module 1: Designing For The Cloud
- Introduction
- Designing The Cloud
- Reason For Using The Cloud
- Choosing The Right Cloud Model
- Designing Private Clouds
- Overview Of Virtualization Components
- Windows Server 2012 R2 And Hyper-V
- System Center 2012 R2 – Part 1
- System Center 2012 R2 – Part 2
- Deploying Highly Available Hyper-V Hosts
Module 2: Using System Center Virtual Machine Manager R2
- Overview Of Virtual Machine – Part 1
- Overview Of Virtual Machine – Part 2
- Deploying VMM
- Configuring Role Based Access Control
- Managing Hosts
- Configuring Networking – Part 1
- Configuring Networking – Part 2
- Configuring Storage
Module 3: Deploying And Maintaining Fabric Resources
- Extending And Maintaining The Cloud Infrastructure
- Deploying Hyper-V Host Servers – Part 1
- Deploying Hyper-V Host Servers – Part 2
- Providing Patch Management For Fabric Resources – Part 1
- Providing Patch Management For Fabric Resources – Part 2
Module 4: Building The Private Cloud
- Creating Building Blocks For The Private Cloud – Part 1
- Creating Building Blocks For The Private Cloud – Part 2
- Creating Virtual Machine Templates
- Creating A Private Cloud
- Creating And Deploying Applications – Part 1
- Creating And Deploying Applications – Part 2
- Creating And Deploying Applications – Part 3
- Creating And Configuring Services – Part 1
- Creating And Configuring Services – Part 2
- Configuring Access To The Private Cloud
Module 5: Monitoring And Optimizing The Private Cloud
- Overview Of Operations Manager
- Installing Operations Manager
- Deploying Monitoring Agents
- Configuring Access To Operations Manager
- Creating And Configuring Management Packs
- Configuring System Center Integration
- Extending And Optimizing Monitoring – Part 1
- Extending And Optimizing Monitoring – Part 2
Module 6: Planning And Deploying Service Management
- Overview Of Service Manager
- Deploying Service Manager
- Service Manager Work Items – Part 1
- Service Manager Work Items – Part 2
- Service Manager Work Items – Part 3
- Service Manager Notifications
- System Center Integration – Part 1
- System Center Integration – Part 2
Module 7: Automating And Standardizing The Private Cloud
- Overview Of Orchestrator
- Deploying Automation Using Orchestrator
- Configuring Integration Packs
- Configuring And Managing Runbooks
Module 8: Disaster Recovery And High Availability For The Private Cloud
- Overview Of Data Protection Manager
- Planning For Data Protection Manager
- Deploying Data Protection Manager
- Configuring Protection For The Private Cloud
- Configuring Protection For Applications – Part 1
- Configuring Protection For Applications – Part 2
- Hyper-V Recovery Manager
Module 9: Implementing SelfService MultiTenant Private Clouds
- Implementing The Cloud Services Process Pack – Part 1
- Implementing The Cloud Services Process Pack – Part 2
- Service Provider Foundation
- Configuring The Windows Azure Pack
- Conclusion
Weight Loss
- Introduction
- Emotional Eating And Digestion
- Metabolism And Improving Digestion
- Food Mood And Steps For Weight Loss
- Portion Size
- Calorie Intake
- Supplements And Heart rate
Module 1: Introduction
- Intro To Exam 70-688
- Implementing A Methodology For Troubleshooting-Part1
- Implementing A Methodology For Troubleshooting-Part2
- Implementing A Methodology For Troubleshooting-Demo
Module 2: Troubleshooting Start Up Issues
- Troubleshooting Start Up Issues-Part1
- Troubleshooting Start Up Issues-Part2
- Troubleshooting Start Up Issues-Part3
- Troubleshooting Start Up Issues-Part4
- Troubleshooting Start Up Issues-Demo
Module 3: ​Managing Drivers And Hardware
- Managing Drivers And Hardware-Part1
- Managing Drivers And Hardware-Part2
- Managing Drivers And Hardware-Part3
- Managing Drivers And Hardware-Demo
Module 4: Troubleshooting Remote Computers
- Troubleshooting Remote Computers-Part1
- Troubleshooting Remote Computers-Part2
- Troubleshooting Remote Computers-Part3
Module 5: Resolving Problems With Network Connectivity
- Resolving Problems With Network Connectivity-Part1
- Resolving Problems With Network Connectivity-Part2
- Resolving Problems With Network Connectivity-Part3
- Resolving Problems With Network Connectivity-Part4
- Resolving Problems With Network Connectivity-Part5
Module 6: Troubleshooting Group Policy
- Troubleshooting Group Policy-Part1
- Troubleshooting Group Policy-Part2
- Troubleshooting Group Policy-Part3
- Troubleshooting Group Policy-Part4
Module 7: Troubleshooting User Settings
- Troubleshooting User Settings-Part1
- Troubleshooting User Settings-Part2
- Troubleshooting User Settings-Part3
Module 8: Configuring And Troubleshooting Remote Connectivity
- Configuring And Troubleshooting Remote Connectivity-Part1
- Configuring And Troubleshooting Remote Connectivity-Part2
- Configuring And Troubleshooting Remote Connectivity-Part3
- Configuring And Troubleshooting Remote Connectivity Demo-Part1
- Configuring And Troubleshooting Remote Connectivity Demo-Part2
- Configuring And Troubleshooting Remote Connectivity Demo-Part3
Module 9: ​Troubleshooting Resource Access In A Domain
- Troubleshooting Resource Access In A Domain-Part1
- Troubleshooting Resource Access In A Domain-Part2
- Troubleshooting Resource Access In A Domain-Part3
- Troubleshooting Resource Access In A Domain-Demo
Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo
Module 11: Troubleshooting Applications
- Troubleshooting Applications-Part1
- Troubleshooting Applications-Part2
- Troubleshooting Applications-Part3
- Troubleshooting Applications-Part4
- Troubleshooting Applications-Demo
Module 12: Maintaining Windows 8.1
- Maintaining Windows 8.1-Part1
- Maintaining Windows 8.1-Part2
- Maintaining Windows 8.1-Part3
- Maintaining Windows 8.1-Part4
- Maintaining Windows 8.1-Demo
Module 13: Recovering Windows 8.1
- Recovering Windows 8.1
- Conclusion
Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment
- Introduction
- Developing A Strategy-Part1
- Developing A Strategy-Part2
- Developing A Strategy-Part3
- Developing A Strategy-Part4
- Developing A Strategy Demo-Part1
- Developing A Strategy Demo-Part2
Module 2: Evaluating Application Compatibility in Windows® 7
- Evaluating Application Compatibility-Part1
- Evaluating Application Compatibility-Part2
- Evaluating Application Compatibility-Demo
Module 3: Assessing Deployment Methods for Windows® 7
- Assessing Deployment Methods-Part1
- Assessing Deployment Methods-Part2
- Assessing Deployment Methods-Demo
Module 4: Designing Standard Images for Windows® 7
- Designing Standard Images-Part1
- Designing Standard Images-Part2
- Designing Standard Images-Part3
- Designing Standard Images-Demo
Module 5: Deploying Windows® 7 with Windows AIK
- Deploying Windows With Windows AIK
- Deploying Windows With Windows AIK-Demo
Module 6: Using Windows Deployment Services to Deploy Windows® 7
- Using Windows Deployment Services-Part1
- Using Windows Deployment Services-Part2
- Using Windows Deployment Services-Demo
Module 7: Deploying Windows® 7 Using Lite Touch Installation
- Deploying Windows 7 Using Lite Touch Installation
- Deploying Windows 7 Using Lite Touch Installation-Demo
Module 8: Deploying Windows® 7 Using Zero Touch Installation
- Deploying Windows 7 Using Zero Touch Installation
- Deploying Windows 7 Using Zero Touch Installation-Demo
Module 9: Migrating User State Using USMT 4.0 and WET
- Migrating User State Using USMT 4.0 And WET-Part1
- Migrating User State Using USMT 4.0 And WET-Part2
Module 10: Planning, Configuring, and Managing the Client Environment
- Planning Configuring And Managing The Client Environment-Part1
- Planning Configuring And Managing The Client Environment-Part2
- Planning Configuring And Managing The Client Environment-Part3
- Planning Configuring And Managing The Client Environment-Part4
- Planning Configuring And Managing The Client Environment-Demo
Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part1
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part2
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part3
- Planning And Deploying Applications And Updates To Windows 7 Clients-Demo
Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Introduction
- Installing Part 1
- Installing Part 2
- Installing Part 2 Demo 1
- Installing Part 2 Demo 2
Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Getting Familiar With SQL Part 1
- Getting Familiar With SQL Part 1 Demo
- Getting Familiar With SQL Part 2
- Getting Familiar With SQL Part 2 Demo
- Getting Familiar With SQL Part 3
- Getting Familiar With SQL Part 3 Demo
Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Data Types
- Data Types Demo
Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Databases Part 1
- Databases Part 1 Demo
- Databases Part 2
- Databases Part 2 Demo
- Databases Part 3
Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Tables
- Tables Demo
Module 6: Looking at Views
- Views Part 1
- Views Part 1 Demo
- Views Part 2
- Views Part 2 Demo
- Views Part 3
Module 7: About Constraints
- Constraints Part 1
- Constraints Part 1 Demo
- Constraints Part 2
Module 8: Looking at Stored Procedures
- Stored Procedures Part 1
- Stored Procedures Part 1 Demo
- Stored Procedures Part 2
Module 9: Functions
- Functions
- Functions Demo
Modules 10: About Service Broker
- Service Broker Part 1
- Service Broker Part 2
Modules 11: Integrity
- Data Integrity Part 1
- Data Integrity Part 2
Modules 12: Permissions in SQL
- Permissions Part 1
- Permissions Part 1 Demo
- Permissions Part 2
Modules 13: Accounts
- Logins Roles And Credentials
- Logins Roles And Credentials Demo
Modules 14: Security
- Additional Security Tools
- Additional Security Tools Demo
Modules 15: Backups/Restores
- Backing Up And Restoring Databases Part 1
- Backing Up And Restoring Databases Part 2
- Backing Up And Restoring Databases Demo
Modules 16: Endpoints
- Endpoints
Modules 17: Servers working together
- Linking Servers
Modules 18: Triggers in SQL
- Triggers
Modules 19: Replication between servers
- Replication Part 1
- Replication Part 2
Modules 20: Indexes
- Performing Indexing And Full Text Searching
Modules 21: Transactions in SQL
- Transaction And Locks
Modules 22: Data moves
- Moving Data
Modules 23: Data specialties in SQL
- Handling Specialty Data
Modules 24: Fault Tolerance
- High-Availability Methods Part 1
- High-Availability Methods Part 2
Modules 25: SQL Management
- Maintaining And Automating SQL Server
Modules 26: SQL Management Monitoring
- Monitoring And Optimizing SQL Server
- Monitoring And Optimizing SQL Server Demo
Modules 27: SQL Management tools
- SQL Server Management Tools
Module 28: Troubleshooting
- Troubleshooting Techniques
- Troubleshooting Techniques Demo
Module 29: Course Review
- Course Review Part 1
- Course Review Part 2
- Course Review Part 3
- Course Review Part 4
- Course Review Part 5
Module 30: Common Questions
- Common Student Questions Part 1
- Common Student Questions Part 2
Module 31: Real World Scenarios
- Real World Scenarios Part 1
- Real World Scenarios Part 2
Day 1
- Intro
- History
- Sanitation
- Cleaning
- Extract Batch Equipment
- Air Locks
- Extract Batch Ingredients
- Extract Batch Recipe
- Heating
- First Hop Addition
- Second Hop Addition
- Filtering
- Measuring Density
Day 2
- Mixed Batch Intro
- Adding Malt
- Removing Malt
- Adding Extract
- Adding 1st Hops
- 2nd Hops Addition
- 3rd Hops Addition
- Final Hop Adition
- Add Yeast Part 1
- Add Yeast Part 2
- All Grains Part 1
- All Grains Part 2
- All Ingredients
Day 3
- All Grains Intro
- CU of Fermentation Bubbling
- Adding Grain
- Adding Grain Insert
- Sparging Part 1
- Sparging Part 2
- Sparging Mid Process
- Boiling
- 2nd Hop Addition
- Colling Wort
- Adding Yeast
- Alternative Methods
Day 4
- Post Brewing Overview
- Siphoning
- Bottling
- Capping
- Bottling Alternatives
- Kegs Part 1
- Kegs Part 2
- Natural Carbonation
- Forced Carbonation
- Kegerator
- Finished Product
- Outro
Day 1
- Intro
- Glassware
- Tools
- Alcohol Types
Day 2
- Martini
- Martini continued
- Flavored Martini
- Section Tool
- Long Island
- Sour Drinks
- Popular Drinks Part 1
- Popular Drinks Part 2
- Popular Drinks Part 3
- Popular Drinks Part 4
- Ruthie Martini
- Ruthie Martini Continued
- Flavored Martinis
- More Sour Drinks
Day 3
- Recap Drinks
- Muddlers
- Popular Drinks
- Popular Drinks 2
- Tropical Drinks
- Shooters Part 1
- Shooters Part 2
- Shooters Part 3
- Shots
- Shooters Conclusion
- Beer
- Greetings Customers
Day 4
- Recap-Drinks
- Layered Shots
- Wines
- Counterfeit Money
- Organizing Your Bar Part 1
- Organizing Your Bar Part 2
- Valid ID
- Tools and Accessories
- Common Issues
Day 5
- Review Intro
- Review Characters
- Review Tools
- Review Pour
- Review Glass
- Review Martinis
- Review Muddler
- Review Drinks
- Review Lit
- Review Sour Drinks
- Review Types of Liquor
- Review More Drinks
- Review Tropical Drinks
- Review Shooters
- Review Beer
- Review Layered Shots
- Review Money
- Review ID
- Conclusion
How to Handle Stress in the Workplace
- Introduction
- What is Stress
- What Does Stress Lead To
- Stress And Food
- Chronic Stress And Cortisol-Part 1
- Chronic Stress And Cortisol-Part 2
- Client Stress Stories
- Stress In The Workplace
- Strategies For Managing Stress
- Planning Ahead
- Money
- Sleep
- Breathing
- Learn To Say No
- Stress Relief At Your Desk
- Stretching
- Conclusion
Module 1: Development Methods
- Introduction To Scrum Master
- Development Methods
Module 2: Agile Manifesto Principles
- Agile Manifesto Principles
Module 3: Scrum
- Scrum
- Scrum Summary
Module 4: Why Scrum
- Why Scrum?
Module 5: Scrum-Roles Overview
- Scrum – Roles Overview
Module 6: Product Owner
- Product Owner
Module 7: Scrum Master
- Scrum Master
Module 8: Scrum Team
- Scrum Team
Module 9: Scrum Process
- Scrum Process
Module 10: Scrum Project Phase
- Scrum Project Phase
Module 11: Plan and Estimate
- Plan And Estimate
Module 12: Implement
- Implement
Module 13: Review and Retrospect
- Review And Retrospect
Module 14: Release
- Release
Module 15: Project Vision
- Project Vision
Module 16: Scrum Master and Stake Holder(s)
- Scrum Master And Stake Holders
Module 17: Form Scrum Team
- Form Scrum Team
Module 18: Develop Epics
- Develop Epics
Module 19: User Stories
- User Stories
Module 20: Justifications and Sample Change(s)
- Justifications And Sample Changes
Module 21: Creating a Prioritized Backlog
- Creating A Prioritized Backlog
Module 22: Conduct Release Planning
- Conduct Release Planning
Module 23: Sprints
- Sprints
Module 24: Scrum Framework
- Scrum Framework – Part 1 Roles
- Scrum Framework – Part 2 Ceremonies
- Scrum Framework – Part 3 Artifacts
Module 25: Scrum of Scrums
- Scrum Of Scrums
Module 26: Scrum Demo
- Scrum Demo
Module 27: Review
- Review
- Outro
Module 1: Introduction To Business Intelligence And Data Modeling
- Introduction To Business Intelligence and Data Modeling Part1
- Introduction To Business Intelligence and Data Modeling Part2
- The Microsoft Business Intelligence Platform Part 1
- The Microsoft Business Intelligence Platform Part 2
- The Microsoft Business Intelligence Platform Part 3
- The Microsoft Business Intelligence Platform Part 4
Module 2: Implementing Reports The SQL Server Reporting Services
- Implementing Reports the SQL Server Reporting Services Part 1
- Implementing Reports the SQL Server Reporting Services Part 2
- Implementing Reports the SQL Server Reporting Services Part 3
- Implementing Reports the SQL Server Reporting Services Part 4
- Implementing Reports the SQL Server Reporting Services Part 5
- Implementing Reports the SQL Server Reporting Services Part 6
- Implementing Reports the SQL Server Reporting Services Part 7
- Implementing Reports the SQL Server Reporting Services Part 8
Module 3: Supporting Self Service Reporting
- Supporting Self Service Reporting Part 1
- Supporting Self Service Reporting Part 2
Module 4: Managing Report Execution And Delivery
- Managing Report Execution And Delivery
- Managing Report Execution
- Subscriptions And Data Alerts
Module 5: Creating Multidimensional Databases
- Creating Multidimensional Databases
- Creating Data Sources And Data Source Views
- Creating And Browsing a Cube
Module 6: Working With Cubes And Dimensions
- Working with Cubes And Dimensions
- Sorting And Grouping Attributes
Module 7: Working With Measures And Measure Groups
- Working With Measures and Measure Groups
Module 8: Introduction To MDX
- Introduction To MDX
- Adding Calculations To A Cube
Module 9: Customizing Cube Functionality
- Customizing Cube Functionality Part 1
- Customizing Cube Functionality Part 2
- Customizing Cube Functionality Part 3
Module 10: Implementing A Tabular Data Model
- Implementing A Tabular Data Model Part 1
- Implementing A Tabular Data Model Part 2
Module 11: Introduction To DAX
- Introduction to DAX
- Demonstration Making A Tabular Model Part 1
- Demonstration Making A Tabular Model Part 2
- Using DAX
Module 12: Implementing An Analysis Services Tabular Data Model
- Implementing An Analysis Services Tabular Data Model Part 1
- Implementing An Analysis Services Tabular Data Model Part 2
- Deploying A Tabular Data Model
Module 13: SQL Analysis Services
- SQL Analysis Services Part 1
- SQL Analysis Services Part 2
Module 14: Creating Data Visualizations With Power View
- Creating Data Visualizations With Power View
Module 15: Supporting Self Service Reporting
- Supporting Self Service Reporting
Module 16: Performing Predictive Analysis With Data Mining
- Performing Predictive Analysis With Data Mining
- Using The Data Mining Wizard
Module 17: Predictive Analytics
- Predictive Analytics Part 1
- Predictive Analytics Part 2
Module 1
- Introduction
- Models-Part 1
- Models-Part 2
- Service And Delivery Models
- Terms And Characteristics
- Objects Storage Concepts
Module 2
- Virtualization
- Install Configure Manage VM And Devices
- Backups
- Virtual Disks
- Virtual Switches
- Virtual Resource Migration
- Benefits Of Virtualization In A Cloud Environment
- Compare And Contrast Virtua lEnvironment
Module 3
- Infrastructure
- Different Access Protocols
- Explain Storage Configuration
- File Systems Types
- Executing Storage Provisioning
- Network Share Demo
- Implement Appropriate Network Configurations
- Importance Of Network Optimization
- Troubleshoot Basic Network Configuration-Part 1
- Troubleshoot Basic Network Configuration-Part 2
- Troubleshoot Commands-Part 1
- Troubleshoot Commands-Part 2
- Troubleshoot Commands-Part 3
- Explain Common Network Protocols
- Common Hardware Resources
Module 4
- Resource Management-Part 1
- Resource Management-Part 2
- Establishing Baselines And Thresholds
- Appropriately Allocate Physical Host Resources-Part 1
- Appropriately Allocate Physical Host Resources-Part 2
- Appropriately Allocate Virtual Guest Resources-Part 1
- Appropriately Allocate Virtual Guest Resources-Part 2
- Use Appropriate Tools For Remote Access
Module 5
- Security-Part 1
- Security-Part 2
- Storage Security Concepts And Methods
- Different Encryption Technologies
- Identify Access Control Methods
Module 6
- Systems Management-Part 1
- Systems Management-Part 2
- Diagnose Remediate And Optimize-Part 1
- Diagnose Remediate And Optimize-Part 2
- Common Performance Concepts-Part 1
- Common Performance Concepts-Part 2
- Testing Techniques
Module 7
- Business Continuity In Cloud-Part 1
- Business Continuity In Cloud-Part 2
- Solutions To Meet Availability Requirements
- Conclusion
Module 1: Installing, Upgrading, and Migrating to Windows 7
- Introduction To Exam 685 Windows 7 Enterprise Desktop Support Technician
- Introduction To Installing Upgrading And Migrating To Windows 7
- Windows 7 Pre-Installation Requirements
- Installing Windows 7-Part1
- Installing Windows 7-Part2
- Installing Windows 7-Part3
- Overview Of Image Based Installations-Part1
- Overview Of Image Based Installations-Part2
- Overview Of Image Based Installations-Part3
- Configuring Application Compatibility
- Chapter 1 Summary
Module 2: Configuring Disks And Device Drivers
- Introduction To Configuring Disks And Device Drivers
- Managing And Maintaining Disks-Part1
- Managing And Maintaining Disks-Part2
- Managing And Maintaining Disks-Part3
- Installing And Configuring Device Drivers
- Chapter 2 Summary
Module 3: Configuring File Access And Printers
- Introduction To Configuring File Access And Printers
- Overview Of Authentication And Authorization
- Managing File Access-Part1
- Managing File Access-Part2
- Managing Shared Folders-Part1
- Managing Shared Folders-Part2
- Configuring File Compression
- Managing Printing
- Chapter 3 Summary
Module 4: Indentifying And Resolving Log on Problems
- Introduction To Identifying And Resolving Logon Problems
- Understanding Authentication
- Managing Computer Accounts
- Additional Network Services-Part1
- Additional Network Services-Part2
- Troubleshooting User Properties
- Resolving Logon Issues
- Chapter 4 Summary
Module 5: Configuring Network Connectivity
- Introduction To Configuring Network Connectivity
- Configuring TCPIP Connectivity-Part1
- Configuring TCPIP Connectivity-Part2
- Configuring TCPIP Connectivity-Part3
- Automatic IP Address Allocation
- Name Resolution
- Wireless Networking-Part1
- Wireless Networking-Part2
- Wireless Networking-Part3
- Chapter 5 Summary
Module 6: Troubleshooting Network Issues
- Introduction To Troubleshooting Network Issues
- Troubleshooting Network Connectivity-Part1
- Troubleshooting Network Connectivity-Part2
- Troubleshooting Network Connectivity-Part3
- Troubleshooting Name Resolution-Part1
- Troubleshooting Name Resolution-Part2
- Troubleshooting Name Resolution-Part3
- Troubleshooting Network Printing-Part1
- Troubleshooting Network Printing-Part2
- Troubleshooting Network Printing-Part3
- Chapter 6 Summary
Module 7: Mobile Computing And Remote Access
- Introduction To Mobile Computing And Remote Access
- Configuring Mobile Computer And Device Settings
- Using Remote Control Tools
- Configuring And Troubleshooting Remote Access-Part1
- Configuring And Troubleshooting Remote Access-Part2
- Configuring And Troubleshooting Remote Access-Part3
- Configuring And Troubleshooting Remote Access-Part4
- Configuring Branch Cache Managing Computer Accounts
- Chapter 7 Summary
Module 8: Securing Windows 7 Desktops
- Introduction To Securing Windows 7 Desktops
- Overview Of Security Management-Part1
- Overview Of Security Management-Part2
- Overview Of Security Management-Part3
- User Account Control
- Application Restrictions-Part1
- Application Restrictions-Part2
- Configuring The Windows Firewall-Part1
- Configuring The Windows Firewall-Part2
- Configuring The Windows Firewall-Part3
- Configuring The Windows Firewall-Part4
- Securing And Troubleshooting Internet Explorer-Part1
- Securing And Troubleshooting Internet Explorer-Part2
- Securing And Troubleshooting Internet Explorer-Part3
- Chapter 8 Summary
Module 9: Optimizing And Troubleshooting Performance And Reliabilty
- Introduction To Optimizing And Troubleshooting Performance And Reliability
- Overview Of Performance And Reliability Tools-Part1
- Overview Of Performance And Reliability Tools-Part2
- Optimizing Performance-Part1
- Optimizing Performance-Part2
- Dealing With Hardware Failure
- Chapter 9 Summary
Module 10: Maintaining Windows 7 Desktops
- Introduction To Maintaining Windows 7 Desktops
- Troubleshooting Utilities-Part1
- Troubleshooting Utilities-Part2
- Troubleshooting Utilities-Part3
- Troubleshooting Utilities-Part4
- Backing Up And Restoring Data
- Using System Restore
- Configuring Windows Update
- Chapter 10 Summary
- Conclusion
Module 1: Designing A Database Server Infrastructure
- Introduction
- Designing A Database Server Infrastructure-Part1
- Designing A Database Server Infrastructure-Part2
- Designing A Database Server Infrastructure-Part3
- Designing A Database Server Infrastructure-Part4
- Considerations For Database Server Consolidation
- Managing Server Resources
Module 2: Designing A Logical Database Scheme
- Designing A Logical Database Scheme-Part1
- Designing A Logical Database Scheme-Part2
- Designing A Logical Database Scheme-Part3
- Designing A Logical Database Scheme-Part4
- Designing A Logical Database Scheme-Part5
Module 3: Designing A Physical Database Implementation
- Designing A Physical Database Implementation-Part1
- Designing A Physical Database Implementation-Part2
- Designing A Physical Database Implementation-Part3
Module 4: Incorporating Data Files Into the Database
- Incorporating Data Files Into The Database-Part1
- Incorporating Data Files Into The Database-Part2
- Incorporating Data Files Into The Database-Part3
- Incorporating Data Files Into The Database Demo
- Searching Data Files
- Searching Data Files Demo
Module 5: Tuning Database Performance
- Tuning Database Performance-Part1
- Tuning Database Performance-Part2
- Tuning Database Performance-Part3
- Working With Query Plans-Part1
- Working With Query Plans-Part2
- Working With Query Plans-Part3
- Working With Query Plans-Part4
Module 6: Designing Database Security
- Designing Database Security-Part1
- Designing Database Security-Part2
- Contained Databases
- Protecting Data With Encryption
Module 7: Policy Based Management
- Policy Based Management
- Policy Based Management Demo
Module 8: Monitoring Server Health
- Monitoring Server Health
- Monitoring Server Health Demo
Module 9: Designing Database Backup Solution
- Designing Database Backup Solution-Part1
- Designing Database Backup Solution-Part2
- Designing Database Backup Solution-Part3
- Designing Database Backup Solution-Part4
- Disaster Recovery Plan-Part1
- Disaster Recovery Plan-Part2
Module 10: Automating Multi Server Maintenance
- Automating Multi Server Maintenance
- Managing Multiple Servers
Module 11: Managing SQL Server With Windows Powershell
- Managing SQL Server WIth Windows Powershell
- Windows Powershell Lab
Module 12: Replicating Data
- Replicating Data-Part1
- Replicating Data-Part2
- Replicating Data-Part3
Module 13: Planning High Availability
- Planning High Availability-Part1
- Planning High Availability-Part2
Module 14: Review of SQL Statements
- Review Of SQL Statements-Part1
- Review Of SQL Statements-Part2
- Review Of SQL Statements-Part3
Module 15: Eleven Rules of Database Design
- Eleven Rules Of Database Design
- Conclusion
Module 1: SQL 2012 And The 464 Test
- Introduction
- Intro To SQL Server 2012-Part1
- Intro To SQL Server 2012-Part2
- Management Studio Demo-Part1
- Management Studio Demo-Part2
- Management Studio Demo-Part3
- Other SQL Server Tools
Module 2: Working With Data Types
- Working With Data Types-Part1
- Working With Data Types-Part2
- Working With Data Types-Part3
- Other Data Types
Module 3: Tables
- Tables
- Creating Tables
Module 4: Data Constraints
- Data Constraints-Part1
- Data Constraints-Part2
Module 5: Planning In Indexing
- Planning In Indexing-Part1
- Planning In Indexing-Part2
- Planning In Indexing-Part3
- Planning In Indexing-Part4
Module 6: Table Structures
- Table Structures
- Working With Clustered Indexes
- Clustered Indexes
- Designing Effective Clustered Indexes
Module 7: Improving Performance with Non-Clustered Indexes
- Improving Performance With Non-Clustered Indexes-Part1
- Improving Performance With Non-Clustered Indexes-Part2
- Improving Performance With Non-Clustered Indexes-Part3
Module 8: Using Indexes And Execution Plans
- Using Indexes
- Execution Plans-Part1
- Execution Plans Demo
- Execution Plans-Part2
Module 9: Working with Views
- Working With Views-Part1
- Working With Views-Part2
Module 10: Designing and Implementing Stored Procedures
- Designing And Implementing Stored Procedures-Part1
- Designing And Implementing Stored Procedures-Part2
- Designing And Implementing Stored Procedures-Part3
Module 11: Merging Data and Passing Tables
- Merging Data And Passing Tables-Part1
- Merging Data And Passing Tables-Part2
- Merging Data And Passing Tables-Part3
Module 12: Designing and Implementing User Functions
- Designing And Implementing User Functions
Module 13: Creating Highly Concurrent SQL Server Applications
- Creating Highly Concurrent SQL Server Applications-Part1
- Creating Highly Concurrent SQL Server Applications-Part2
- Creating Highly Concurrent SQL Server Applications-Part3
Module 14: Handling Errors in T-SQL
- Handling Error InT-SQL-Part1
- Handling Error InT-SQL-Part2
Module 15: Triggers
- Triggers
Module 16: Implementing Managed Code
- Implementing Managed Code-Part1
- Implementing Managed Code-Part2
- Implementing Managed Code-Part3
- Implementing Managed Code-Part4
Module 17: Storing XML in SQL
- Storing XML In SQL-Part1
- Storing XML In SQL-Part2
Module 18: Querying XML
- Querying XML-Part1
- Querying XML-Part2
Module 19: Working with the Spatial Data
- Working With Spatial Data-Part1
- Working With Spatial Data-Part2
- Working With Spatial Data-Part3
Module 20: Working With Full-Text Indexes and Queries
- Working With Full-Text Indexes And Queries-Part1
- Working With Full-Text Indexes And Queries-Part2
- Working With Full-Text Indexes And Queries-Part3
Module 1: What Is Microsoft 365
- Introduction To 365
- A Little Background On MS Office
- Office 365 Versions And Features-Part1
- Office 365 Versions And Features-Part2
- Online Sign Up
Module 2: Word Online
- Word Online Overview
- Starting A Document In Word Online
- Word Saved To One Drive
- Navigating Word
- Tools And Features
- Fonts Attributes-Part1
- Fonts Attributes-Part2
- Lines And Paragraphs-Part1
- Lines And Paragraphs-Part2
- Bullets Numbering And Styles-Part1
- Bullets Numbering And Styles-Part2
- Inserts Pictures And Tools-Part1
- Inserts Pictures And Tools-Part2
- Tables And Formatting-Part1
- Tables And Formatting-Part2
- Sharing And Templates-Part1
- Sharing And Templates-Part2
Module 3: Excel Online
- Excel Online Overview
- Getting Started With Excel
- Data Entry And Navigation
- Data Entry-Part1
- Data Entry-Part2
- Data Entry And Formatting-Part1
- Data Entry And Formatting-Part2
- Intro To Formulas
- Formulas-Part1
- Formulas-Part2
- Formulas-Part3
- Intermediate Formula And Table Format-Part1
- Intermediate Formula And Table Format-Part 2
- Surveys
- More Formula And Charts-Part1
- More Formula And Charts-Part2
- Charts
- Sheets And Templates
Module 4: Powerpoint Online
- What Is Powerpoint
- Screen Layout
- Entering And Formatting Text
- Layouts And Designs Part 1
- Layouts And Designs Part 2
- Inserting Objects
- Objects And Transitions
- Animations
- Smart Art
- Notes Printing And Templates
Module 5: Outlook Online
- Intro To Outlook Online
- Intro To Email Accounts Screen Layout
- Configuring Outlook Online
- Sending Emails Outlook Online
- Organization Outlook Online
- Mail Rules In Outlook Online
- Additional Mail Options In Outlook Online
- Spam And Junk Outlook Online
Module 6: One Note Online
- What Is OneNote
- OneNote Screen Overview
- OneNote Desktop
- Drawing Tools With OneNote
- Send To OneNote
- Media With OneNote
Outlook 2013 Basic
- Introduction To Outlook
- Understanding Email Setting Outlook
- Configuring Interface-Part1
- Configuring Interface-Part2
- Email Window-Part1
- Email Window-Part2
- Managing The Inbox
- Using The Calendar-Part1
- Using The Calendar-Part2
- Contacts-Part1
- Contacts-Part2
- Task List
Outlook 2013 Intermediate
- Adding An Account From Scratch
- Multiple Email Accounts In One Window
- Searching For Mail
- Managing The Folders Views In Inbox
- Using Priority And Receipts
- Calendars
- Contacts-Part1
- Contacts-Part2
Outlook 2013 Advanced
- Mail Part 1 Auto-Replies
- Mail Part 2 Signatures
- Views and Options Part 1
- Views and Options Part 2
- Calendar Part 1
- Calendar Part 2
- Calendar Options
- Contacts
- Contacts Options
- Advanced Options Part 1
- Advanced Options Part 2
Word 2013 Basic
- Intro To Word
- Screen Layout
- Page Setup And Text Entry
- Auto-correct Text Formatting
- More Font Formatting
- Fonts-Part 3
- Font Attributes Using Right Click
- Paragraph Attributes
- Customizing Bullets And Numbers
- Reveal Codes Putting It All Together And Saving
- Viewing Rulers
- Formatting Images
- Inserting Images
- Tabs
- Window Views And Putting It All Together-Part 1
- Window Views And Putting It All Together-Part 2
Word 2013 Intermediate
- Intro To Word 2013 Intermediate
- Review Introduction To Styles
- Headers And Footers
- Section Breaks Section Footers
- More Objects Word Intermediate
- Tables In Word Intermediate
- Inserting Text Boxes Word Intermediate
- Additional Page Attributes Word Intermediate
- Intro To Customizing Attributes
- Continuing Auto-correct Options
- View Options In Navigation Pane
- Mail Merge-Part 1
- Mail Merge-Part 2
- Mail Merge-Part 3
- Table Of Contents
- Columns
- Working With Outlines
Word 2013 Advanced
- Word Advanced Introduction
- End Notes Foot Notes
- Captions
- Citations
- Table Of Authorities
- Reference Page Index Table
- Track Changes
- Compare
- Advance Mail Merge-Part 1
- Advance Mail Merge-Part 2
- Advance Smart Art
- Templates
- Custom Configuration
Powerpoint 2013 Basic
- What Is PowerPoint
- Screen Elements
- Starting A New Presentation
- Layouts
- Objects-Part1
- Objects-Part2
- Objects-Part3
- Slide Design
- Slide Transitions
- Animations-Part1
- Animations-Part2
- View And Slideshow
Powerpoint 2013 Intermediate
- Understanding Slide Masters
- Slide Masters
- Animations-Part1
- Animations-Part2
- Hotspots And Actions
- Views
- Printing Options
Powerpoint 2013 Advanced
- Introduction To Advanced And Inserting Charts
- Setting Up Slide Shows-Part1
- Setting Up Slide Shows-Part2
- Advanced Animations
- Templates Vs Shows
- Reviewing Information And Compare
- Copy And Paste Across Presentations
- Customizing Powerpoint
- Adding Media Video
- Adding Media Audio-Part1
- Adding Media Audio-Part2
Excel 2013 Basic
- Intro To Excel Overview Of Screen
- Ribbon Elements
- Entering Data And Editing Font Attributes
- Number Formats
- Formatting Cells
- Printing
- Formulas – Part 1
- Formulas – Part 2
- Rearranging Data
- More Formulas – Part 1
- More Formulas – Part 2 Review And Sort
- More Formulas – Part 3 Concatenate
- Chart – Part 1
- Chart – Part 2
- Chart – Part 3
- Summary
Excel 2013 Intermediate
- Introduction
- Review
- Formulas Across Worksheets – Part 1
- Formulas Across Worksheets – Part 2
- Conditional Formatting
- Data Validation
- Names Ranges
- CSV Files
- Text To Column
- Grouping Data
- More Charts Beyond Building Blocks
- Working With Windows – Part 1
- Working With Windows – Part 2
- Headers Footers And Protecting Data
Excel 2013 Advanced
- Pivot Tables – Part 1
- Pivot Tables – Part 2
- Sparklines
- Trancing Formulas
- What If Scenario
- External Data Sources
- Customizing Menus And Options – Part 1
- Customizing Menus And Options – Part 2
- Macros
Access 2013 Introduction
- Access 2013 Introduction
- What Are Databases
- The Interface Window
- Setting Up The Database-Part1
- Setting Up The Database-Part2
- Creating Forms
- Understanding Table Relationships
- Introduction To Queries
- Introduction To Reports
Access 2013 Intermediate
- Introduction to Table Tools Part 1
- Table Tools-Part2
- Table Tools-Part3
- Forms And Design Intermediate-Part1
- Forms And Design Intermediate-Part2
- Forms Data Entry-Part1
- Forms Data Entry-Part2
- Queries
- Reports From Queries-Part1
- Reports From Queries-Part2
- Reports From Queries-Part3
- Specialized Form
Access 2013 Advanced
- Advance Introduction And Sub-forms
- Sub-forms
- Additional Types Of Queries
- Form And Macros-Part1
- Form And Macros-Part2
- Advance Forms
- Reports Advance-Part1
- Reports Advance-Part2
- Updating Reports
- Customization And Conclusion
Module 1: Planning Configuration Manager Infrastructure
- Intro
- Planning Configuration Manager Infrastructure – Part 1
- Planning Configuration Manager Infrastructure – Part 2
- Planning Configuration Manager Infrastructure – Part 3
- Planning Configuration Manager Infrastructure – Part 4
- Planning Configuration Manager Infrastructure – Part 5
Module 2: Migrating To Configuration Manager 2012
- Migrating To Configuration Manager 2012
Module 3: Installations and Site Role Configuration
- Installation And Site Role Configuration – Part 1
- Installation And Site Role Configuration – Part 2
- Installation And Site Role Configuration – Lab 1
- Installation And Site Role Configuration – Lab 2
Module 4: Cloud Integration
- Cloud Integration
Module 5: Installing The Client
- Installing The Client – Part 1
- Installing The Client – Part 2
- Installing The Client – Part 3
- Installing The Client Lab
Module 6: Client Health
- Client Health
Module 7: Application Deployment
- Application Deployment
- Application Deployment Lab
Module 8: Software Updates
- Software Updates – Part 1
- Software Updates – Part 2
- Software Updates Lab
Module 9: Operating System Deployment
- Operating System Deployment – Part 1
- Operating System Deployment – Part 2
- Operating System Deployment – Part 3
Module 10: Inventory and Software Metering
- Inventory And Software Metering
- Inventory And Software Metering Lab
Module 11: Asset Intelligence
- Asset Intelligence
Module 12: Reporting
- Reporting
- Reporting Lab
Module 13: Compliance Settings
- Compliance Settings
Module 14: Endpoint Protection
- Endpoint Protection
Module 15: Mobile Device Management
- Mobile Device Management – Part 1
- Mobile Device Management – Part 2
Module 16: Role-Based Administration
- Role Based Administration
Module 17: Disaster Recovery
- Disaster Recovery
Module 18: Troubleshooting
- Troubleshooting
- Outro
Module 1: Intro
- Introduction
Module 2: Wonton
- Wonton
Module 3: Tomato Basil
- Tomato Basil
Module 4: Ricotta Gnocchi
- Ricotta Nyoki
Module 5: Potato Gnocchi
- Potato Nyoki
Module 6: Pizza Tart
- Pizza Tart
Module 7: Pesto
- Pesto
Module 8: Potato Pancakes
- Potato Pancakes
Module 9: Crostini
- Crostini
Module 10: Fish Chowder
- Fish Chowder
Module 11: Fritters
- Fritters
Module 12: Risotto
- Risotto
Module 13: Risotto Cakes
- Risotto Cakes
Module 14: Spanakopita
- Spanakopita
Module 15: Vegetable Puree Soup
- Vegetable Puree Soup
Module 16: Corn Chowder
- Corn Chowder
Module 17: Tempura
- Tempura
Module 18: Panko Crusted Chicken
- Panko Crusted Chicken
Module 19: Pork Tenderloin
- Pork Tenderloin
Module 20: Potato Crusted Salmon
- Potato Crusted Salmon
Module 21: Grilled Veggies
- Grilled Veggies-Part1
- Grilled Veggies-Part2
- Grilled Veggies-Part3
Module 22: Veggie Risotto
- Veggie Risotto-Part1
- Veggie Risotto-Part2
- Veggie Risotto-Part3
Module 23: Outro
- Conclusion
Module 1: Introduction to Course and Tools
- Introduction To The DIY Home Improvement Basics
- Hand Tools
- Power Tools
Module 2: Drywall Repair
- Wall Preparation And Compound Application
- Sanding And Primer Application
- Painting
Module 3: Shelving
- How To Install Basic Shelf
Module 4: Window Safety Locks
- How To Install Basic Window Safety Locks
Module 5: Window Blinds
- Removing Existing Blinds
- Installing New Blinds
Module 6: Door Stop
- How To Install Basic Door Stop
Module 7: Bi-Fold Closet Doors
- How To Replace Bi-Fold Closet Doors
Module 8: Interior Doorknob
- How To Replace An Interior Door Knob
Module 9: Exterior Doorknob and Deadbolt
- Introduction To Exterior Doorknob And Deadbolt
- Replacing The Deadbolt And Door Knob
- Replacing The Strike Plates
Module 10: Door Weather Stripping
- How To Replace Weather Stripping On An Exterior Door
Module 11: Light Fixture
- How To Replace A Light Fixture
Module 12: Ceiling fan
- Removing An Existing Ceiling Fan
- Installing A New Ceiling Fan
- Installing A Light On The Ceiling Fan
Module 13: Light Switch
- How To Replace A Basic Light Switch
Module 14: Unclogging a Sink Drain
- Introduction To Unclogging A Sink Drain
- How To Remove Or Replace The Under-Sink Plumbing Trap
Module 15: Garbage Disposal
- Removing The Exisiting Garbage Disposal
- Replacing The Sink Flange And Mounting Hardware
- Wiring
- Attaching The New Garbage Disposal
Module 16: Bathroom Faucet
- Introduction To Bathroom Faucets
- Installing A New Bathroom Faucet
- Connecting The Water Supply To Faucet
Module 17: Toilet
- Preparing The Toilet Flange
- Setting The New Toilet In Place
- Connecting The Water Supply To Toilet
Module 18: Laminate Flooring
- Introduction To Laminate Flooring
- Removing The Existing Flooring
- Preparing The Door Jambs
- Transition Molding Layout
- Underlayment-Part1
- Underlayment-Part2
- Laminate Flooring Layout
- Cutting The Floor
- Installing The Flooring-Part1
- Cutting Around The Door Jambs
- Installing Around Doorways
- Marketing Transition Molding
- Installing The Flooring-Part2
- Final Row Installation
- Installing The Transition Molding
- Installing Quarter-Round Trim
Module 19: Conclusion
- Conclusion
Module 1: SSIS Packages
- Introduction
- Creating SSIS Packages
- Creating A New Package Lab
- Data Sources Lab
- Connections Lab
- Control Flow
- Creating And Editing Control Flow Lab
- Data Flow
- Data Flow Transformations
- Data Flow Lab
Module 2: Debugging and Error Handling in SSIS
- Debugging And Error Handling in SSIS-Part1
- Enable Transactions And Observe Trans Rollback Lab
- Set Checkpoints In A Package Lab
- Debugging And Error Handling in SSIS-Part2
- Setting Up Constraints Lab
- Turn On Logging Lab
- Debugging And Error Handling in SSIS-Part3
- Identifying Data Flow Errors Lab
Module 3: Deploying and Configuring SSIS Packages
- Lesson1-Part1 Deploying
- Lesson1-Part2 Sharing Ordering And Configuring
- Create An XML Configuration Lab
- Create A SQL Server Configuration Lab
- Use A Property Expression To Update A Connection Lab
- Deploying An SSIS Package
- Create And Deploy An Installer Kit Lab
Module 4: Securing and Executing SSIS Packages; Service Administration
- Lesson1-Part1 Securing And Executing SSIS Packages
- Lesson1-Part2 SSIS Package Security
- Turn On Package Encryption Lab
- Change Security Roles Lab
- Lesson2 Executing And Administration
- Create And Execute A Command-Line Statement Lab
- Execute A Package Through SQL Server Agent Lab
Module 5: Data Analysis
- Lesson1 SSAS Cube Development
- Create SSAS Project Lab
- Create A Data Source Lab
- Create A Data Source View Lab
- Lesson2 Creating And Modifying SSAS Cube
- Creating A Cube Lab
- Using Cube Designer To Edit A Cube Structure Lab
- Lesson3 Creating A Dimension
- Create A New Dimension Lab
- Lesson4 Creating Measure Groups And Measures
- Add Measure Groups Lab
- Configure Measure Groups And Measures Lab
Module 6: Extending SSAS Cubes
- Lesson1 Extending SSAS Cubes-Part1
- Define Attribute Relationships Lab
- Define User Hierarchy Lab
- Lesson2 Extending SSAS Cube-Part3
- Implement The Reseller Sales KPI Lab
- Lesson3 Extending SSAS Cube-Part3
- Turn On Proactive Caching Lab
Module 7: Extending SSAS Cubes
- Lesson1-Part1 SSAS Storage Processing And Deployment
- Lesson1-Part2 Aggregating And Enabling Proactive Caching
- Turning On Proactive Caching Lab
- Lesson2 SSAS Deployment
- Deploy Database With Deployment Wizard Lab
- Lesson3 Processing
- Processing Scripts Using SQL Server Agent Lab
Module 8: Securing and Administering SSAS
- Lesson1 SSAS Security
- Create A Role And Set Security Lab
- Lesson2 Backing Up SSAS
- Backing Up And Maintain Management Studio Lab
- Lesson3 Managing SSAS Turning And Logging
- Turning On Query Logging Lab
- Lesson4 SSAS Administering
- Turn On And Use SQL Server Profiler Lab
- Monitor SSAS Performance Lab
Module 9: Working With SSAS Data Mining
- Lesson1-Part1 Prepare And Creating Data Mining Structures
- Lesson1-Part2 Data Mining Algorithms And Usage
- Data Mining Wizard Lab
- Lesson2 Mapping Mining Structure Attributes To Source Columns
- Create A Model From A Cube Lab
- Lesson3 Predictive Models
- Lesson4 Data Mining Security
- Managing Permissions Lab
Module 10: Developing SSAS Reports
- Lesson1 Understanding SSRS Reports
- Creating Reports Lab
- Lesson2 Creating A New Report Database
- Generate More Reports Lab
- Lesson3 Advanced Report Object Properties-Part1
- Lesson4 Advanced Report Object Properties-Part2
Module 11: Extending and Deploying SSRS Reports
- Lesson1 SSRS Report Parameters
- Create A Report Without Using Wizard Lab
- Lesson2 Extending SSRS Reports
- Lesson3 Deploying SSRS Reports
Module 12: Scheduling Deployed Reports and Data Sources
- Lesson1 Scheduling Reports And Subscriptions
- Creating A New Role For SSRS Lab
- Lesson2 SSRS And Data Sources
- Set Up Shared Schedule Lab
Module 13: Configuring And Administering the SSRS Server
- Installing And Configuring SSRS Server
- Changing Settings In Configuration Manager Lab
- Lesson2 Administering The SSES Server And Command-Line Utilities
- Backing Up And Restoring Encryption Keys Lab
- Conclusion
Module 1: Over-The-Air Technologies
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
Module 2: Network Infrastructure
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
Module 3: Mobile Device Manager
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
Module 4: Security
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
Module 5: Troubleshooting
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
Module 1: Overview
- Intro
- Overview Of Advanced Solutions – Part 1
- Overview Of Advanced Solutions – Part 2
- Test Connectivity Demo
- Web Based Outlook Demo – Part 1
- Web Based Outlook Demo – Part 2
Module 2: Beginning Powershell
- Beginning Powershell
- New Mail Contact Demo
- New Mail Contacts Powershell Demo
Module 3: Exhange Control Panel
- Exchange Control Panel
Module 4: Create A New Mailbox with Powershell
- Create A New Mailbox With Powershell
- New Mailbox With Powershell Demo – Part 1
- New Mailbox With Powershell Demo – Part 2
Module 5: Mailbox Statistics With Powershell
- Mailbox Statistics With Powershell
- Get Mailbox Statistics Demo
Module 6: Intermediate Powershell
- Intermediate Powershell
- Wrap Up Of Intermediate Powershell
- Creating A New Accepted Domain Demo – Part 1
- Creating A New Accepted Domain Demo – Part 2
Module 7: Unified Messaging
- Unified Messaging – Part 1
- Unified Messaging – Part 2
- UM Dial Plan Demo
- UM Dial Plan Powershell Demo
Module 8: Installation and Configuration
- Installation And Configuration – Part 1
- Installation And Configuration – Part 2
- Build Exchange From Scratch Demo – Part 1
- Build Exchange From Scratch Demo – Part 2
- Build Exchange From Scratch Demo – Part 3
- Build Exchange From Scratch Demo – Part 4
- Build Exchange From Scratch Demo – Part 5
- Build Exchange From Scratch Demo – Part 6
- Confirming Installation Demo
- Scheme Changes – Part 1
- Scheme Changes – Part 2
- Required Software For Exchange
- Powershell Add Features – Part 1
- Powershell Add Features – Part 2
- Installation – Part 1
- Installation – Part 2
- Installation – Part 3
Module 9: Exchange Online
- Exchange Online – Part 1
- Exchange Online – Part 2
- Exchange Online Demo
Module 10: Advanced Design
- Advanced Design – Part 1
- Advanced Design – Part 2
- Advanced Design – Part 3
- Deployment Assistant Demo
- Ports And Protocols For Exchange Demo
- Outro
Module 1: Methodologies Used To Design A Network
- Introduction
- Developing Business Trends
- P P D I O O- Part 1
- P P D I O O- Part 2
- 3 Layer Campus Design
- Modular Network Design
- Cisco Eight Step Design Methodology
- Cisco I I N
Module 2: Network Structure And Modularity
- Network Design Fundamentals
- Design Methods And Methodologies- Part 1
- Design Methods And Methodologies- Part 2
- Enterprise Campus Design- Part 1
- Enterprise Campus Design- Part 2
Module 3: Basic Enterprise Campus Networks
- Campus Design Considerations- Part 1
- Campus Design Considerations- Part 2
- Cisco S O N A
Module 4: Enterprise Edge And Remote Network Modules
- WAN Technologies And VPN- Part 1
- WAN Technologies And VPN- Part 2
- WAN Technologies- Part 1
- WAN Technologies- Part 2
- VPN Technologies- Part 1
- VPN Technologies- Part 2
- VPN Technologies- Part 3
Module 5: IP Addressing And Routing Protocols
- Routing Protocol Operation And Design- Part 1
- Routing Protocol Operation And Design- Part 2
- Routing Protocol Operation And Design- Part 3
- Routing Protocol Operation And Design- Part 4
- EIGRP – Part 1
- EIGRP – Part 2
Module 6: Enterprise Switching I
- Enterprise Switching
- Inter VLAN Routing
- Multilayer Switch
- Enterprise Switch Features And Design
- VSS
- Best Practices
Module 7: Enterprise Switching II
- Switch Macros And Smart Ports
- Private VLANs
- Etherchannel
Module 8: Subnetting
- IP v4
- Subnetting- Part 1
- Subnetting- Part 2
- Subnetting- Part 3
- Subnetting- Part 4
- IP v6
Module 9: Designing Advanced Services
- Designing Advanced Services
- GLBP
- Access Points
- Radio Frequencies
- Wireless Signals
- Wireless LAN To VLAN Mapping
- Conclusion
Module 1: Overview
- Introduction
- Overview Of Exchanger Server 2013 – Part 1
- Overview Of Exchanger Server 2013 – Part 2
- Overview Of Exchanger Server 2013 – Part 3
- Overview Of Exchanger Server 2013 – Part 4
- Overview Of Exchanger Server 2013 – Part 5
- Overview Of Exam – Part 1
- Overview Of Exam – Part 2
Module 2: Exchange Server 2013 Administration
- Exchange Server 2013 Administration – Part 1
- Exchange Server 2013 Administration – Part 2
- Exchange Server 2013 Administration – Part 3
- Exchange Server 2013 Administration – Part 4
- Exchange Server 2013 Administration – Demo 1
- Exchange Server 2013 Administration – Demo 2
- Exchange Server 2013 Administration – Demo 3
Module 3: Fundamentals of Exchange Administration
- Fundamentals Of Exchange Administration – Part 1
- Fundamentals Of Exchange Administration – Demo
Module 4: Archive Mailboxes
- Archive Mailboxes – Part 1
- Archive Mailboxes – Part 2
- Archive Mailboxes – Part 3
- Archive Mailboxes – Demo
Module 5: Properties of User Mailboxes
- Properties Of User Mailboxes
- Properties Of User Mailboxes – Demo
Module 6: Distribution Groups
- Distribution Groups
- Distribution Groups – Demo
Module 7: Outlook and Outlook Web Apps
- Outlook And Outlook Web Apps – Part 1
- Outlook And Outlook Web Apps – Part 2
- Outlook And Outlook Web Apps – Demo
Module 8: Preparation Prerequisites
- Preparation Prerequisites – Part 1
- Preparation Prerequisites – Part 2
- Preparation Prerequisites – Part 3
- Preparation Prerequisites Demo – Part 1
- Preparation Prerequisites Demo – Part 2
- Preparation Prerequisites Demo – Part 3
Module 9: Installation of Exchange 2013
- Installation Of Exchange 2013
- Installation Of Exchange 2013 – Demo
Module 10: Exchange 2013 Design
- Exchange 2013 Design – Part 1
- Exchange 2013 Design – Part 2
- Exchange 2013 Design – Part 3
- Exchange 2013 Design Demo – Part 1
- Exchange 2013 Design Demo – Part 2
- Exchange 2013 Design Demo – Part 3
- Exchange 2013 Design Demo – Part 4
- Exchange 2013 Design Demo – Part 5
- Exchange 2013 Design Demo – Part 6
Module 11: Labs and Demos
- Building Home Lab (setup)
- Creating A Win Server Virtual Machine
- Signing On To Server
- Configuration (Joining Domain)
- Installing Domain Controller – Part 1
- Installing Domain Controller – Part 2
- Checking The Domain Controller
- Setting Up DNS For Exchange
- Schema Updates
- Prerequisite For Exchange 2013
- Installing Exchange
- Confirmation Of Exchange
- How Exchange Is Installed
- Setting Up A Send Connector
- Outro
Module 1: Planning Server Deployment
- Introduction
- Overview Of Windows Server 2008 Deployment-Part1
- Overview Of Windows Server 2008 Deployment-Part2
- Overview Of Windows Server 2008 Deployment-Part3
- Overview Of Windows Server 2008 Deployment-Part4
- Identifying Windows Server 2008 Compatibility Issues
- Developing A Deployment Plan-Part1
- Developing A Deployment Plan-Part2
- Planning The Server Decommissioning
- Commissioning Windows 2008 Server
- Planning Server Deployment Summary
Module 2: Automating Server Deployment
- Understanding Deployment Options-Part1
- Understanding Deployment Options-Part2
- Windows Automated Installation Kit-Part1
- Windows Automated Installation Kit-Part2
- Windows Automated Installation Kit-Part3
- Working With Images
- Using Windows Deployment Services-Part1
- Using Windows Deployment Services-Part2
- Using Windows Deployment Services-Part3
- Using Windows Deployment Services-Part4
- Automating Server Activation
- Automating Server Deployment Summary
Module 3: Planning for Server Management
- Introduction To Server Management
- Remote Server Management-Part1
- Remote Server Management-Part2
- Remote Server Management-Part3
- Decentralizing Server Management-Part1
- Decentralizing Server Management-Part2
- Planning For Server Management Summary
Module 4: Planning the Network Infrastructure
- Planning An IPv4 Addressing Scheme-Part1
- Planning An IPv4 Addressing Scheme-Part2
- Planning An IPv4 Addressing Scheme-Part3
- Planning An IPv6 Transition
- Planning The DHCP Infrastructure-Part1
- Planning The DHCP Infrastructure-Part2
- Planning DHCP Configuration
- Planning The Network Infrastructure Summary
Module 5: Planning Name Resolution Services
- Gathering Information For The Name Resolution Design-Part1
- Gathering Information For The Name Resolution Design-Part2
- Designing A DNS Server Strategy-Part1
- Designing A DNS Server Strategy-Part2
- Designing DNS Zone Implementations-Part1
- Designing DNS Zone Implementations-Part2
- Optimizing DNS Servers
- Designing DNS For High Availability And Security
- Designing A WINS Name Resolution Strategy
- Planning Name Resolution Services Summary
Module 6: Planning File and Print Services
- Planning File Services-Part1
- Planning File Services-Part2
- Planning File Services-Part3
- Planning File Services-Part4
- Planning File Services-Part5
- Planning For Storage Management
- Planning Print Services-Part1
- Planning Print Services-Part2
- Planning Print Services-Part3
- Planning File And Print Services Summary
Module 7: Planning Active Directory Domain Services
- Planning ADDS Forests
- Planning ADDS Domains
- Planning ADDS Physical Structure-Part1
- Planning ADDS Physical Structure-Part2
- Planning Administrative Structures
- Planning ADDS Maintenance Strategies
- Planning Group Policy Implementations-Part1
- Planning Group Policy Implementations-Part2
- Planning Group Policy Implementations-Part3
- Planning Group Policy Implementations-Part4
- Planning ADDS Summary
Module 8: Planning Active Directory Certificate Services
- Overview Of PublicKey Infrastructure And ADCS-Part1
- Overview Of PublicKey Infrastructure And ADCS-Part2
- Designing Certificate Authority Hierarchy
- Design Certificate Template
- Designing Certificate Distribution And Revocation
- Planning AD Certificate Servers
Module 9: Planning High Availability
- Overview Of High Availability
- Planning Network Load Balancing
- Planning Failover Clustering-Part1
- Planning Failover Clustering-Part2
- Planning High Availability Summary
Module 10: Planning Backups For Windows Server
- Planning Backups For Windows Server-Part1
- Planning Backups For Windows Server-Part2
- Planning A Backup Policy
- Planning Restore Policies For Windows Server 2008
- Planning Business Continuity Summary
Module 11: Planning Server Monitoring and Maintenance
- Planning Server Monitoring-Part1
- Planning Server Monitoring-Part2
- Planning Server Maintenance
- Planning Server Monitoring And Maintenance Summary
- Conclusion
Module 1: Installing and Configuring Windows Services
- Introduction
- Installing Windows Servers-Part1
- Installing Windows Servers-Part2
- Installing Windows Servers-Part3
- Managing Server Roles And Features-Part1
- Managing Server Roles And Features-Part2
- Windows Server 2008 Server Care Installations-Part1
- Windows Server 2008 Server Care Installations-Part2
- Installing And Configuring Windows Services Summary
Module 2: TCP/IP Protocol Suite
- Overview Of TCP IP-Part1
- Overview Of TCP IP-Part2
- TCP IP Addressing-Part1
- TCP IP Addressing-Part2
- Communication Types
- Name Resolution-Part1
- Name Resolution-Part2
- Name Resolution-Part3
- Name Resolution-Part4
- Dynamic IP Addressing
- TCP IP Tools
- TCP IP Protocol Suite Summary
Module 3: Configuring IPv4 Addressing
- Overview Of IPv4 Communication-Part1
- Overview Of IPv4 Communication-Part2
- Subnetting IPv4 Networks-Part1
- Subnetting IPv4 Networks-Part2
- Subnetting IPv4 Networks-Part3
- Configuring IPv4 Addressing Summary
Module 4: Configuring IP Address Assignment Services
- Overview Of DHC-Part1
- Overview Of DHC-Part2
- Configuring DHCP Scopes And Options-Part1
- Configuring DHCP Scopes And Options-Part2
- Configuring DHCP Scopes And Options-Part3
- Managing The DHCP Database
- Monitoring And Troubleshooting DHCP-Part1
- Monitoring And Troubleshooting DHCP-Part2
- Configuring IP Address Assignment Services Summary
Module 5: Configuring IPv6 Addressing
- Introduction To IPv6-Part1
- Introduction To IPv6-Part2
- Unicast IPv6 Addresses
- Configuring IPv6-Part1
- Configuring IPv6-Part2
- Configuring IPv6 Addressing Summary
Module 6: Configuring Name Resolution Services
- Overview Of DNS-Part1
- Overview Of DNS-Part2
- Configuring The DNS Server Role-Part1
- Configuring The DNS Server Role-Part2
- Configuring The DNS Server Role-Part3
- Configuring The DNS Server Role-Part4
- Configuring The DNS Server Role-Part5
- Manage And Troubleshooting DNS
- Migrating From WIN To DNS
- Configuring Name Resolution Services Summary
Module 7: Configuring File and Print Services
- Introduction To File Services
- Controlling Access To File Services-Part1
- Controlling Access To File Services-Part2
- Controlling Access To File Services-Part3
- Storage Management With File Server Resource Manager-Part1
- Storage Management With File Server Resource Manager-Part2
- Storage Management With File Server Resource Manager-Part3
- Storage Management With File Server Resource Manager-Part4
- Storage Management With File Server Resource Manager-Part5
- Configuring And Managing Distributed File Systems-Part1
- Configuring And Managing Distributed File Systems-Part2
- Configuring And Managing Distributed File Systems-Part3
- Configuring And Managing Distributed File Systems-Part4
- Optimizing Access For Branch Offices
- Configuring Printing-Part1
- Configuring Printing-Part2
- Configuring Printing-Part3
- Configuring Printing-Part4
- Configuring Printing-Part5
- Configuring File And Print Service Summary
Module 8: Securing Windows Servers and Network Communications
- Configuring Server Security Group-Part1
- Configuring Server Security Group-Part2
- Configuring Server Security Group-Part3
- Configuring Server Security Group-Part4
- Configuring Server Security Group-Part5
- Configuring Server Security Group-Part6
- Configuring Server Security Group-Part7
- Storage Security-Part1
- Storage Security-Part2
- Windows Firewall With Advanced Security-Part1
- Windows Firewall With Advanced Security-Part2
- Configuring And Troubleshooting IP Sec-Part1
- Configuring And Troubleshooting IP Sec-Part2
- Configuring And Troubleshooting IP Sec-Part3
- Configuring And Troubleshooting IP Sec-Part4
- SecuringWindows Servers And Network Communications Summary
Module 9: Configuring Routing and Remote Access
- Remote Access Overview
- Configuring Remote Access-Part1
- Configuring Remote Access-Part2
- Configuring Remote Access-Part3
- Configuring Remote Access-Part4
- Overview Of Network Routing-Part1
- Overview Of Network Routing-Part2
- Overview Of Network Routing-Part3
- Configuring Routing And Remote Access Summary
Module 10: Configuring Network Policy Services
- Overview Of Network Policy And Access Services-Part1
- Overview Of Network Policy And Access Services-Part2
- Understanding Network Policies
- Centralizing Authentication And Authorization-Part1
- Centralizing Authentication And Authorization-Part2
- Centralizing Authentication And Authorization-Part3
- Configuring Network Policy Services Summary
Module 11: Configuring Network Access Protection
- Overview Of Network Access Protection
- NAP Architecture
- NAP Enforcement
- NAP Policies-Part1
- NAP Policies-Part2
- Configuring NAP Summary
Module 12: Maintaining and Recovering Windows Server
- Disaster Recovery For Windows Servers-Part1
- Disaster Recovery For Windows Servers-Part2
- Disaster Recovery For Windows Servers-Part3
- Disaster Recovery For Windows Servers-Part4
- Disaster Recovery For Windows Servers-Part5
- Disaster Recovery For Windows Servers-Part6
- Configuring Update Management-Part1
- Configuring Update Management-Part2
- Configuring Update Management-Part3
- Configuring Update Management-Part4
- Maintaining And Recovering Windows Server Summary
- Conclusion
Module 1: Plan and Deploy Infrastructure
- Introduction
- Plan And Deploy Infrastructure-Part 1
- Plan And Deploy Infrastructure-Part 2
- Plan And Deploy Infrastructure-Part 3
Module 2: Planning and Implementing
- Planning And Implementing-Part 1
- Multicast Deployment Wizard Demo
- Planning And Implementing-Part 2
- Pre-staging Clients Demo
- Planning And Implementing-Part 3
- Configuring Windows Deployment Services Demo
- Planning And Implementing-Part 4
Module 3: Planning and Implementing Server Upgrade and Migration
- Planning And Implementing Server Upgrade And Migration-Part 1
- Planning And Implementing Server Upgrade And Migration-Part 2
- Planning And Implementing Server Upgrade And Migration-Part 3
Module 4: Planning and Deploying Virtual Machine Manager Resources
- Planning And Deploying Virtual Machine Manager Resources-Part 1
- Planning And Deploying Virtual Machine Manager Resources-Part 2
- Planning And Deploying Virtual Machine Manager Resources-Part 3
- Planning And Deploying Virtual Machine Manager Resources-Part 4
Module 5: Planning and Implementing File and Storage Services
- PlanningAnd Implementing File And Storage Services-Part 1
- Planning And Implementing File And Storage Services-Part 2
- Configuring The iSCSI Target Server Demo
- Planning And Implementing File And Storage Services-Part 3
- Configuring Internet Storage Name Server Demo
- Planning And Implementing File And Storage Services-Part 4
Module 6: Design and Implement Network Infrastructure Services
- Design And Implement Network Infrastructure Services
Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 1
- Configuring Split Scope In DHCP Demo
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 2
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 3
Module 8: Design a Name Resolution Solution Strategy
- Design A Name Resolution Solution Strategy-Part 1
- Design A Name Resolution Solution Strategy-Part 2
- Configuring Global Names Zone Demo
- Design A Name Resolution Solution Strategy-Part 3
Module 9: Design and Manage an IP Address Management Solution
- Design And Manage An IP Address Management Solution-Part 1
- Design And Manage An IP Address Management Solution-Part 2
Module 10: Design and Implement Network Access Services
- Design And Implement Network Access Services
Module 11: Design a VPN Solution
- Design A VPN Solution-Part 1
- Design A VPN Solution-Part 2
Module 12: Design a DirectAccess Solution
- Design A Direct Access Solution-Part 1
- Design A Direct Access Solution-Part 2
Module 13: Implement a Scalable Remote Access Solution
- Implement A Scalable Remote Access Solution-Part 1
- Implementing Packet Tracing Demo
- Implement A Scalable Remote Access Solution-Part 2
- Implement A Scalable Remote Access Solution-Part 3
- Looking At Setting In Direct Access Demo
- Implement A Scalable Remote Access Solution-Part 4
Module 14: Design and Implement a Network Protection Solution
- Design And Implement A Network Protection Solution-Part 1
- Design And Implement A Network Protection Solution-Part 2
- Design And Implement A Network Protection Solution-Part 3
- Looking At Multiple RADIUS Servers Demo
- Design And Implement A Network Protection Solution-Part 4
- Taking A Look At IP Sec Policy Enforcement Demo
- Showing 802.1X Policy Enforcement Demo
- Design And Implement A Network Protection Solution-Part 5
Module 15: Design and Implement an Active Directory Infrastructure
- Design And Implement An Active Directory Infrastructure
Module 16: Design a Forest and Domain Infrastructure
- Design A Forest And Domain Infrastructure
Module 17: Implement a Forest and Domain Infrastructure
- Implement A Forest And Domain Infrastructure-Part 1
- Steps To Perform A Realm Trust Demo
- Implement A Forest And Domain Infrastructure-Part 2
Module 18: Design a Group Policy Strategy
- Design A Group Policy Strategy
Module 19: Design an Active Directory Permission Model
- Design An Active Directory Permission Model-Part 1
- Taking A Look At The Security Tab Or Lack Of Demo
- Design An Active Directory Permission Model-Part 2
- Taking A Look At The Delegation Or Control Wizard Demo
- Design An Active Directory Permission Model-Part 3
- Taking A Look At Kerberos Delegation Demo
- Design An Active Directory Permission Model-Part 4
Module 20: Design and Implement an Active Directory Infrastructure (Physical)
- Design And Implement An Active Directory Infrastructure Physical
Module 21: Design an Active Directory Site Topology
- Design An Active Directory Site Topology
Module 22: Design an Active Directory Site Topology
- Design A Domain Controller Strategy
Module 23: Design and Implement a Branch Office Infrastructure
- Design And Implement A Branch Office Infrastructure-Part 1
- Design And Implement A Branch Office Infrastructure-Part 2
- Taking A Look At Password Replication Policy Tab Demo
- Design And Implement A Branch Office Infrastructure-Part 3
- Conclusion
Module 1: Manage and Maintain a Server Infrastructure
- Introduction
- Manage And Maintain A Server Infrastructure-Part1
- Manage And Maintain A Server Infrastructure-Part2
- Design A Monitoring Strategy-Part1
- Design A Monitoring Strategy-Part2
- Plan And Implement Automated Remediation-Part1
- Plan And Implement Automated Remediation-Part2
- Plan And Implement Automated Remediation-Part3
Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
- Plan And Implement A Highly Available Enterprise Infrastructure-Part1
- Plan And Implement A Highly Available Enterprise Infrastructure-Part2
- Highly Available Network Services-Part1
- Highly Available Network Services-Part2
- Plan And Implement Highly Available Storage Solutions-Part1
- Plan And Implement Highly Available Storage Solutions-Part2
- Plan And Implement Highly Available Roles-Part1
- Plan And Implement Highly Available Roles-Part2
- Business Continuity And Disaster Recovery Solution
Module 3: Plan and Implement a Server Virtualization Infrastructure
- Plan And Implement Virtual Hosts – Part 1
- Plan And Implement Virtual Hosts-Part2
- Plan And Implement Virtual Machines
- Plan And Implement Virtualization Networking-Part1
- Plan And Implement Virtualization Networking-Part2
- Plan And Implement Virtualization Storage
- Plan And Implement Virtual Machine Movement
- Manage And Maintain A Server Virtualization Infrastructure
Module 4: Design and Implement Identity and Access Solutions
- Design And Implement Identity And Access Solutions-Part1
- Design And Implement Identity And Access Solutions-Part2
- Implement And Manage Certificates
- Design And Implement A Federated Identity Solution
- Design And Implement AD Rights Management Services
- Conclusion
Module 1: Active Directory – An Identity And Access Solution
- Introduction
- Understanding The Purpose Of Identity And Access Control
- Active Directory Server Roles For IDA Management-Part 1
- Active Directory Server Roles For IDA Management-Part 2
- Active Directory Server Roles That Support IDA Solutions
- Active Directory Summary
Module 2: Introduction To Active Directory Domain Services
- Overview Of Active Directory Identity And Access-Part 1
- Overview Of Active Directory Identity And Access-Part 2
- Overview Of Active Directory Identity And Access-Part 3
- Active Directory Components And Concepts-Part 1
- Active Directory Components And Concepts-Part 2
- Active Directory Components And Concepts-Part 3
- Active Directory Components And Concepts-Part 4
- Active Directory Components And Concepts-Part 5
- Implementing Active Directory-Part 1
- Implementing Active Directory-Part 2
- Implementing Active Directory-Part 3
- Implementing Active Directory-Part 4
- Implementing Active Directory-Part 5
- Implementing Active Directory-Part 6
- Implementing Active Directory-Part 7
- Implementing Active Directory-Part 8
- Overview Of Active Directory-Part1
- Overview Of Active Directory-Part2
- Overview Of Active Directory-Part3
- Summary
Module 3: Configuring DNS To Support Active Directory Domain Services
- Overview Of Active Directory And DNS Integration-Part 1
- Overview Of Active Directory And DNS Integration-Part 2
- Configure Active Directory Integrated Zones-Part 1
- Configure Active Directory Integrated Zones-Part 2
- Configure Dynamic Updates
- Configure Read-Only Zones
Module 4: Active Directory Object Management
- Overview Of Active Directory Objects
- Configuring User And Computer Accounts-Part 1
- Configuring User And Computer Accounts-Part 2
- Configuring User And Computer Accounts-Part 3
- Configuring Groups-Part1
- Configuring Groups-Part2
- Configuring Groups-Part3
- Configuring Groups-Part4
- Configuring Groups-Part5
- Automating Object Management-Part1
- Automating Object Management-Part2
- Automating Object Management-Part3
- Automating Object Management-Part4
- Automating Object Management-Part5
- Delegation Of Administrative Control-Part1
- Delegation Of Administrative Control-Part2
- Summary
Module 5: Managing Active Directory Replication Using Sites
- Configuring Sites And Subnets-Part 1
- Configuring Sites And Subnets-Part 2
- Configuring Replication-Part 1
- Configuring Replication-Part 2
- Configuring Replication-Part 3
- Configuring Replication-Part 4
- Summary
Module 6: Configuration Management Using Group Policy
- Understanding Group Policy-Part 1
- Understanding Group Policy-Part 2
- Understanding Group Policy-Part 3
- Understanding Group Policy-Part 4
- Understanding Group Policy-Part 5
- Understanding Group Policy-Part 6
- Working With GPOs-Part 1
- Working With GPOs-Part 2
- Working With GPOs-Part 3
- Working With GPOs-Part 4
- Troubleshooting Application Of GPO
- Delegating Administrative Control Of Group Policy
- Summary
Module 7: Desktop Environmental And Security Management
- Configure Scripts And Folder Redirection-Part 1
- Configure Scripts And Folder Redirection-Part 2
- Deploying Software-Part 1
- Deploying Software-Part 2
- Deploying Software-Part 3
- Delegating Computer Support
- Managing Security Settings-Part 1
- Managing Security Settings-Part 2
- Managing Security Settings-Part 3
- Managing Security Settings-Part 4
- Managing Security Settings-Part 5
- Utilizing Auditing-Part 1
- Utilizing Auditing-Part 2
- Summary
Module 8: Maintaining Active Directory
- Monitoring Active Directory-Part 1
- Monitoring Active Directory-Part 2
- Monitoring Active Directory-Part 3
- Monitoring Active Directory-Part 4
- Managing The Active Directory Database
- Disaster Recovery For Active Directory-Part 1
- Disaster Recovery For Active Directory-Part 2
- Disaster Recovery For Active Directory-Part 3
- Disaster Recovery For Active Directory-Part 4
- Maintaining Active Directory Domain Services Summary
Module 9: Deploy and Manage a Public Key Infrastructure
- Overview Of Public Key Infrastructure And ADCS-Part 1
- Overview Of Public Key Infrastructure And ADCS-Part 2
- Overview Of Public Key Infrastructure And ADCS-Part 3
- Deploying A Certificate Authority Hierarchy
- Installing ADCS-Part 1
- Installing ADCS-Part 2
- Installing ADCS-Part 3
- Installing ADCS-Part 4
- Deploying And Managing Certificates-Part 1
- Deploying And Managing Certificates-Part 2
- Deploying And Managing Certificates-Part 3
- Deploying And Managing Certificates-Part 4
- Managing Revocation And Distribution-Part 1
- Managing Revocation And Distribution-Part 2
- Configuring Certificate Recovery-Part 1
- Configuring Certificate Recovery-Part 2
- Deploy And Manage A Public Key Infrastructure Summary
Module 10: Supporting Applications with AD LDS
- ADLDS Overview-Part 1
- ADLDS Overview-Part 2
- Configuring ADLDS Instances
- Configuring Replication
- Understanding Integration With ADLDS
- Supporting Applications With ADLDS Summary
Module 11: Deploying Active Directory Federated Services
- ADFS Overview
- ADFS Deployment Scenarios
- Deploying ADFS-Part 1
- Deploying ADFS-Part 2
- Deploying ADFS-Part 3
- Deploying Active Directory Federated Services Summary
Module 12: Deploying Active Directory Rights Management Services
- ADRMS Overview
- Understanding ADRMS
- Managing ADRMS-Part 1
- Managing ADRMS-Part 2
- Managing ADRMS-Part 3
- Managing ADRMS-Part 4
- Deployment Active Directory Rights Management Services Summary
- Active Directory Conclusion
Module 1: Introduction
- Intro Part 1
- Intro Part 2
- Intro Part 3
- Intro Part 4
- Intro Part 5
- Intro Part 6
- Intro Part 7
Module 2: Telephony
- Telephony Part 1
- Telephony Part 2
- Telephony Part 3
- Telephony Part 4
Module 3: Basic Call Routing
- Basic Call Routing Part 1
- Basic Call Routing Part 2
- Basic Call Routing Part 3
Module 4: VOIP Call Routing
- VOIP Call Routing Part 1
- VOIP Call Routing Part2
- VOIP Call Routing Part 3
- VOIP Call Routing Part 4
- VOIP Call Routing Part 5
Module 5: CUCME Call Routing Basics
- CUCME Call Routing Basics Part 1
- CUCME Call Routing Basics Part 2
- CUCME Call Routing Basics Part 3
- CUCME Call Routing Basics Part 4
- CUCME Call Routing Basics Part 5
- CUCME Call Routing Basics Part 6
- CUCME Call Routing Basics Part 7
- CUCME Call Routing Basics Part 8
- CUCME Call Routing Basics Part 9
- CUCME Call Routing Basics Part 10
- CUCME Call Routing Basics Part 11
Module 6: Preparing Network For Voice
- Preparing Network For Voice Part 1
- Preparing Network For Voice Part 2
- Preparing Network For Voice Part 3
- Preparing Network For Voice Part 4
- Preparing Network For Voice Part 5
- Preparing Network For Voice Part 6
Module 7: IP Phone Behavior
- IP Phone Behavior
Module 8: CUCME Administration Basics
- CUCME Administration Basics Part 1
- CUCME Administration Basics Part 2
- CUCME Administration Basics Part 3
- CUCME Administration Basics Part 4
Module 9: CUCME StandUp
- CUCME Stand Up Part 1
- CUCME Stand Up Part 2
- CUCME Stand Up Part 3
- CUCME Stand Up Part 4
- CUCME Stand Up Part 5
Module 10: CUCME StandUp Part 2
- CUCME Stand Up2 Part 1
- CUCME Stand Up2 Part 2
Module 11: CUCME StandUp CUCME
- CUCME Stand Up CUCME Part 1
- CUCME Stand Up CUCME Part 2
- CUCME Stand Up CUCME Part 3
Module 12: End Users and End User Interfaces
- End Users And End User Interfaces Part 1
- End Users And End User Interfaces Part 2
- End Users And End User Interfaces Part 3
Module 13: Endpoint Implementation
- Endpoint Implementation Part 1
- Endpoint Implementation Part 2
- Endpoint Implementation Part 3
- Endpoint Implementation Part 4
Module 14: Call Coverage
- Call Coverage Part 1
- Call Coverage Part 2
- Call Coverage Part 3
- Call Coverage Part 4
- Call Coverage Part 5
- Call Coverage Part 6
- Call Coverage Part 7
- Call Coverage Part 8
- Call Coverage Part 9
Module 15: Calling Restrictions and Routing
- Calling Restrictions And Routing Part 1
- Calling Restrictions And Routing Part 2
- Calling Restrictions And Routing Part 3
- Calling Restrictions And Routing Part 4
- Calling Restrictions And Routing Part 5
- Calling Restrictions And Routing Part 6
Module 16: CUCME Advance Call Coverage
- CUCME Advance Call Coverage Part 1
- CUCME Advance Call Coverage Part 2
Module 17: Implementing Unity Connection
- Implementing Unity Connection Part 1
- Implementing Unity Connection Part 2
- Implementing Unity Connection Part 3
- Implementing Unity Connection Part 4
- Implementing Unity Connection Part 5
- Implementing Unity Connection Part 6
- Implementing Unity Connection Part 7
- Implementing Unity Connection Part 8
- Outro
Module 1: Virtual Box
- Virtual Box-Part 1
- Virtual Box-Part 2
- Virtual Box-Part 3
- Virtual Box-Part 4
- Virtual Box-Part 5
- Virtual Box-Part 6
Module 2: Basic Commands
- Basic Commands-Part 1
- Basic Commands-Part 2
- Basic Commands-Part 3
- Basic Commands-Part 4
- Basic Commands-Part 5
- Basic Commands-Part 6
- Basic Commands-Part 7
- Basic Commands-Part 8
- Basic Commands-Part 9
- Basic Commands-Part 10
Module 3: Special Characters
- Special Characters-Part 1
- Special Characters-Part 2
- Special Characters-Part 3
Module 4: File Editing
- File Editing-Part 1
- File Editing-Part 2
- File Editing-Part 3
- File Editing-Part 4
- File Editing-Part 5
- File Editing-Part 6
- File Editing-Part 7
Module 5: File System Structure
- File System Structure-Part 1
- File System Structure-Part 2
- File System Structure-Part 3
- File System Structure-Part 4
Module 6: Finding Files
- Finding Files-Part 1
- Finding Files-Part 2
- Finding Files-Part 3
Module 7: Shell Special Characters
- Shell Special Characters-Part 1
- Shell Special Characters-Part 2
- Shell Special Characters-Part 3
Module 8: Regular Expressions
- Regular Expressions-Part 1
- Regular Expressions-Part 2
- Regular Expressions-Part 3
- Regular Expressions-Part 4
- Regular Expressions-Part 5
- Regular Expressions-Part 6
Module 9: Process Management
- Process Management-Part 1
- Process Management-Part 2
- Process Management-Part 3
- Process Management-Part 4
- Process Management-Part 5
- Process Management-Part 6
- Process Management-Part 7
- Process Management-Part 8
Module 10: Job Scheduling
- Job Scheduling-Part 1
- Job Scheduling-Part 2
- Job Scheduling-Part 3
- Job Scheduling-Part 4
- Job Scheduling-Part 5
- Job Scheduling-Part 6
Module 11: Customizing Your Account
- Customizing Your Account-Part 1
- Customizing Your Account-Part 2
- Customizing Your Account-Part 3
- Customizing Your Account-Part 4
- Customizing Your Account-Part 5
- Customizing Your Account-Part 6
Module 12: Unix Printing
- Unix Printing-Part 1
- Unix Printing-Part 2
- Unix Printing-Part 3
- Unix Printing-Part 4
Module 13: Networking
- Networking-Part 1
- Networking-Part 2
- Networking-Part 3
- Networking-Part 4
- Networking-Part 5
- Networking-Part 6
- Networking-Part 7
- Networking-Part 8
- Networking-Part 9
- Networking-Part 10
Module 14: X Windows
- X Windows-Part 1
- X Windows-Part 2
- X Windows-Part 3
- X Windows-Part 4
- X Windows-Part 5
Module 15: Back Up And Compression
- Back Up And Compression-Part 1
- Back Up And Compression-Part 2
- Back Up And Compression-Part 3
- Back Up And Compression-Part 4
Module 16: Text Utility
- Text Utility-Part 1
- Text Utility-Part 2
- Text Utility-Part 3
- Text Utility-Part 4
- Text Utility-Part 5
Module 17: Shell Scripting
- Shell Scripting-Part 1
- Shell Scripting-Part 2
- Shell Scripting-Part 3
- Shell Scripting-Part 4
- Shell Scripting-Part 5
- Shell Scripting-Part 6
- Shell Scripting-Part 7
- Shell Scripting-Part 8
- Shell Scripting-Part 9
- Shell Scripting-Part 10
- Shell Scripting-Part 11
Module 18: System Administration Basics
- System Administration Basics-Part 1
- System Administration Basics-Part 2
- System Administration Basics-Part 3
- System Administration Basics-Part 4
- System Administration Basics-Part 5
Module 1: The ITIL Qualification Scheme
- Intro
- About Scheme
- Levels Of Qualifications
- Qualification Bodies
- The ITIL Foundation Certification Stubble
Module 2: Introduction to Service Management
- Service And Service Management- Part 1
- Service And Service Management- Part2
- Service Management Processes- Part 1
- Service Management Processes- Part 2
- Service Management Best Practices And Summary
Module 3: ITIL and the Service Lifecycle
- Service Management Practices
- Why ITIL
- The Service Lifecycle
Module 4: Service Strategy
- Service Strategy Purpose And Objectives
- Service Strategy Scope
- Business Value Stubble
- Key Principles- Part1
- Key Principles- Part2
- Service Stragey Processes
Module 5: Service Design
- Service Design Purpose And Objectives
- Scope Of Service Design
- Business Value Service Design
- Service Design Key Principles
- Service Design Processes- Part 1
- Service Design Processes- Part 2
- Service Design Processes- Part 3
- Service Design Processes- Part 4
Module 6: Service Transition
- Service Transition Purpose And Objectives
- Service Transition Scope And Business Value
- Service Transition Key Principles
- Service Transition Processes- Part 1
- Service Transition Processes- Part 2
- Service Transition Processes- Part 3
- Service Transition Processes- Part 4
Module 7: Service Operation
- Intro To Service Operation
- Service Operation Basic Concepts
- Service Operation Processes-Part 1
- Service Operation Processes-Part 2
- Service Operation Access Management
- Service Operation Functions
Module 8: Continual Service Improvement
- Continual Service Improvement Purpose Objectives And Scope
- Continual Service Improvement Key Principles
- Continual Service Improvement Processes
Module 9: Service Management Technology
- SMT
- SMT Service Automation
- SMT Service Analytics
Module 10: How it all Fits Together
- How It All Fits Together
- Outro
Module 11: Bonus Material
- Lifecycle Stages Flow-Part 1
- Lifecycle Stages Flow-Part 2
- Lifecycle Stages Breakdown-Part 1
- Lifecycle Stages Breakdown-Part 2
- Lifecycle Stages Breakdown-Part 3
- Function Reviews-Part 1
- Function Reviews-Part 2
- Service Support Function
- Service Delivery Function-Part 1
- Service Delivery Function-Part 2
- Test Taking Tips
- Practice Questions
Module 1: Instructions
- Introduction
- Introduction To Building Labs
- Things You Need To Do
- Install Demo Virtual Box
- Navigation
- Commands With LabDemo
- Internal And External Commands
- Overview Of Shell Commands Tricks
- Exploring Shell Configuration
- Stream Redirection
- Overview Of Processing Text Using Filters
- Overview File-Viewing Commands
- Overview Using Grep
- Sed Syntax And Summary
- Overview Of Exam Essentials
Module 2: Managing Software
- Managing Software
- Managing Software
- Overview Using RPM
- RPM-Part 2
- Overview Using Cpio
- Overview Using Debian And Apt Cache
- Using Apt-get
- Debian Tools
- Managing Shared Libraries
- Overview Locating Library Files
- Foreground and Background Processes
- Managing Software Summary
Module 3: Configuring Hardware
- Configuring Hardware
- Configuring Devices
- Configuring USB
- Configuring Hard Disk
- Designing Hard Disk Layout
- Logical Volume Management
- Overview Using Fdisk
- Overview Common File System Types
- Creating Filesystem
- Overview Maintaining File System Health
- Configuring Hardware Summary
Module 4: Managing Files
- Managing Files
- File Archiving Commands
- Managing Files Ownership
- Managing Disk Quotas
- Directories And Content
- Overview Tools For Locating Files
- Overview Of Exam Essentials
Module 5: Booting Files
- Booting Linux And Editing Files
- Boot And Reboot
- Understanding The Boot Process
- Run Levels Process
- Managing Run Level Services
- Editing With Vi
- Booting Summary
Module 6: X
- X Windows Systems
- X Configuration Options
- X Configuration Options-Part 2
- Untitled Media
- Configuring X Featuring Fonts
- Overview Managing GUI Logins
- Using X For Remote Access
- X Accessibility
- Addition Assistive Technologies
- Configuring Localization And Internationalization
- Querying And Setting Your Locale
- Configuring Printing-Part 1
- Configuring Printing-Part 2
- Using Web-Based CUPS Utilities
Module 7: Admin
- Administering
- Directly Modifying Account Configuration
- Components Of Account
- Adding Groups
- Tuning User And System Environments
- Reviewing Log File Contents
- Maintaining System Time
- Admin Summary
Module 8: Basic Networking
- Basic Networking
- Network Addressing-Part 1
- Network Addressing-Part 2
- DNS Data Flow Zone And Resolution
- Network Ports
- Connections
- Testing Connectivity
- Wireshark Demo
- Basic Networking Summary
Module 9: Scripts
- Scripts E-mail And Databases
- Writing Scripts-Part 1
- Writing Scripts-Part 2
- Managing E-mail
- Managing Data With SQL
- Advantages Of Database
- Scripts Summary
Module 10: Security
- Security
- Configuring Xinetd
- Uninstalling Or Reconfiguring Servers
- Tools For Managing Passwords
- Configuring SSH
- SSH Keys
- Controlling SSH Access
- Using GPG
- Security Summary
Lesson 3 – Medical Terminology
- Medical Terminology
Lesson 2 – Anatomy Physiology
- Anatomy
- Anatomic Organ Systems
Lesson 4 – Introduction to ICD-9-cm
- Introduction To ICD-9-Part 1
- Introduction To ICD-9-Part 2
- Introduction To ICD-9-Part 3
- Introduction To ICD-9-Part 4
- Introduction To ICD-9-Part 5
- Introduction To ICD-9-Part 6
- Introduction To ICD-9-Part 7
- Diagnostic Procedures
- Coding And Reporting Guidelines-Part 1
- Coding And Reporting Guidelines-Part 2
- Coding And Reporting Guidelines-Part 3
Lesson 5 – Application of ICD-9-cm (Ch 1-9)
- Application Of ICD-9-CM
- Caution
- Neoplasms
- Other Metabolic And Immunity Disorders Section
- Hypertensive Heart And Chronic Kidney Disease
Lesson 7 – Introduction to ICD-10-CM
- Overview Of ICD-10-CM
Lesson 1 – Introduction to CPT and HCPCS
- Introduction To CPT And Level II National Codes-HCPCS
- CMS-1500 Form
- Categorized By
- Category I Codes
- Format
Lesson 2 – Evaluation and Management (E/M)
- Evaluation And Management-Part 1
- Evaluation And Management-Part 2
- Nature Of Evaluation And Management Services
- Example Of HPI
- Review Of Systems
- E And M Documentation Guidelines
- E And M Exam-Part 1
- E And M Exam-Part 2
- Exam
- Medical Decision Making
- Number Of Diagnoses Or Treatment Options
- Amount And Or Complexity Of Data Reviewed
- Nature Of Presenting Problem
- E And M Documentation-Level Based On TIme
- Hospital E And M Codes
- Subsequent Visits
- InitialInpatient Services
- ProlongedServices
- Modifiers
Lesson 3 – Surgery, Integumentary system, Anesthesia & Modifiers
- Anesthesia
- Physical Status Modifiers
- Medicare Policy
- Surgical Guidelines
- 58 Staged Or Related Procedure
- Modifier 52-Reduced Services
- Ancillary Modifiers
- Integumentary System
- Morphology
- Integumentary-Nails
- Integumentary-Introduction
- Clinical Scenario
- Mohs Micrographic Surgury
Lesson 4 – Musculoskeletal
- Musculoskeletal System
- Rheumatism
- Endoscopy And Arthroscopy
Lesson 5 – Respiratory and Cardio
- Respiratory System
- Endoscopy
- Mediastinum And Diaphragm
- Circulatory Systems
- Associated Diagnosis
- Pacemaker Or Pacing Cardioverter-Defibrillator
- CABG
- Bypass Grafts
- Selective Catheterization
- Endovascular Revascularization
- Coronary Therapeutic Services And Procedures
- Intracardiac Electrophysiological Procedures And Studies
Lesson 6 – Female Genital System, Maternity Care and General Surgery
- Hemic And Lymphatic Systems
- Female Genitourinary And Maternity Care
- Ultrasound
- Male Genitourinary
- Bladder
- Eyes
- Ears
- Digestive System Terms
- Digestive Procedures
- Endocrine And Nervous System
- Nervous System-Part 1
- Nervous System-Part 2
- Nervous System-Part 3
Lesson 9 – Medicine
- Medicine
- Chemotherapy
- Category III Codes
- Conclusion
Lesson 1 – Introduction to Reimbursement
- Intro
- Medicare-PartB
- Fraud And Abuse
Lesson 7 – Radiology
- Radiology
- Modifiers
- Diagnostic Ultrasound
- Radiation Treatment Management
Lesson 8 – Pathology
- Regulatory Terms
- Urinalysis
Lesson 6 – Application of ICD-9-cm (Ch 10-19)
- Diseases Of The Genitourinary System
- Diabetes Mellitus In Pregnancy
- Diseases Of Musculoskeletal SystemAnd Connective Tissue
- Burns
- Adverse Effects Poisoning And Toxic Effects
Module 1: Certain Infectious and Parasitic Diseases
- Intro
- Certain Infectious And Parasitic Diseases
Module 2: Neoplasm
- Neoplasm
Module 3: Diseases of the Blood and Blood Forming Organs
- Diseases Of The Blood And Blood Forming Organs
Module 4: Endocrine, Nutritional and Metabolic Diseases
- Endocrine Nutritional And Metabolic Diseases
Module 5: Mental Disorders
- Mental Disorders
Module 6: Diseases of the Nervous System
- Disesases Of The Nervous System
Module 7: Diseases of the Eye and Adnexa
- Diseases Of The Eye And Adnexa
Module 8: Diseases of the Ear and Mastoid Process
- Diseases Of The Ear And Mastoid
Module 9: Diseases of the Circulatory System
- Diseases Of The Circulatory System
Module 10: Diseases of the Respiratory System
- Diseases Of The Respiratory System
Module 11: Diseases of the Digestive System
- Diseases Of The Digestive System
- Specific Coding Exercises
Module 12: Diseases of the Skin and Subcutaneous Tissue
- Diseases Of The Skin And Subcutaneous Tissue
Module 13: Diseases of the Musculoskeletal System and Connective Tissue
- Diseases Of The Musculoskeletal System And Connective Tissue
Module 14: Diseases of the Genitourinary System
- Diseases Of The Genitourinary System
Module 15: Pregnancy, Childbirth, and the Puerperium
- Pregnancy Childbirth And The Puerperium
Module 16: Newborn (Perinatal) Guidelines
- Newborn Perinatal Guidelines
Module 17: Congenital Malformations, Deformations and Chromosomal Abnormalities
- Congenital Malformations Deformations And Chromosomal Abnormalities
Module 18: Symptoms, Signs and Abnormal Clinical and Laboratory Findings
- Symptoms Signs And Abnormal Clinical And Laboratory Findings
Module 19: Injury, Poisoning and Certain Other Consequences of the External Causes
- Injury Poisoning And Certain Other Consequences Of The External Causes
- Specific Coding Questions
Module 20: External Causes of Morbidity
- External Causes Of Morbidity
Module 21: Factors Influencing Health Status
- Factors Influencing Health Status
- Case Study 1 And 2
- Outro
Marketing Tools and Tips for Success
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed Part 1
- Stay Informed Part 2
- Bitly
- Woobox Part 1
- Woobox Part 2
- HootSuite Part 1
- HootSuite Part 2
- Storify
- Social Media Rules And Tips
- Social Media Conclusion
- Tweetdeck-Boolean Search
Marketing with Google and YouTube
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Videos
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
Basics of Marketing with Social Media
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
Module 1: Introduction to Google Analytics
- Intro Definitions-Part 1
- Intro Definitions-Part 2
- How Google Analytics Works
Module 2: Fundamentals of Google Analytics
- Build Analytics Infrastructure
- Setting Up Conversion Data
- Setting Up E-Commerce And Goal Tracking
- Cross Domain Tracking
- Input New Users
- Examine Data Points
Module 3: Basics of Google Anayltics
- Basic Features
- Dashboard
- Shortcuts
- Adding A Dashboard
- Sharing Reports
- Alerts
- Realtime Analytics
- Standard Reports
- Views
Module 4: Reports in Google Analytics
- Acquisitions Intro
- All Traffic Acquisitions
- Acquisitions Overview
- Acquisitions Channels
- All Referrals
- Campaign
- Keywords
- Social
- Webmaster Tools
Module 5: Behavioral Reports
- Behavioral Reports Intro
- Dimensions
- Content Drilldown
- Landing Pages
- Exit Pages
- Event Flow Report
- Working With Events
- Site Search Report-Part 1
- Site Search Report-Part 2
- Site Search Report-Part 3
- Site Search Report-Part 4
- Behavior Flow Report
- Site Speed
- Using Site Speed Search
- Page Timings
- Speed Suggestions
- User Timing Adsense
- Experiments
- Inpage Analytics
Module 6: Audience
- Audience Reports
- Location Report
- Language
- Behavior
- Frequency Recency
- Engagement Report
- Technology Reports
- Mobile Reporting
- Demographic Report
- Interests
- Visitor Flow Chart
Module 7: Conversions
- Intro To Module 7
- Funnel Visualization
- Goal Flow Report
- Reverse Goal Path
- Goal URLs
- E-commerce Reports
- Product Performance Reports
- Transactions Report
- Time To Purchase Report
- Multi-Channels Funnels Report
- Assisted Conversion Report
- Top Conversion Paths Report
- Time Log And Path Length Report
- Attribution Report And Model Comparison Tool
- Conclusion
Accounting and Business Basics
- Introduction
- Business Entities
- Beginning Your Business
- Financial Basics Part 1
- Financial Basics Part 2
- Employees Payroll
- Getting Your Business Out There
- SEO
- Other Topics
- Closing
Module 1: Creating and Setting Up Your Point of Sale Company File
- Intro To Point Of Sale
- Creating And Setting Up Point Of Sale
Module 2: Installing your System
- Determining Your Point Of Sale Additions
Module 3: Navigating and Customizing the Home Page
- Navigating And Customizing The Homepage
Module 4: Company Preferences
- Company Preferences
Module 5: Financial- Setting up QuickBooks Connection
- Setting Up Quickbooks Connection
Module 6: Setting up Sales Tax
- Setting Up Sales Tax
Module 7: Workstation Preferences
- Workstation Preferences
Module 8: Additional Features
- Additional Features
Module 9: Employees and Security
- Employees And Security
Module 10: Customers
- Customers
Module 11: Rewards Program
- Reward Programs
Module 12: Vendors
- Vendors
Module 13: Setting Up Your Inventory
- Setting Up Inventory
Module 14: Item Styles, Assemblies, and Group
- Adding Styles Assemblies And Groups
Module 15: Working with Inventory
- Working With Inventory
Module 16: Sales
- Sales
Module 17: Working with Price Levels and Discounts
- Working With Price Level And Discounts
Module 18: Collecting Sales Tax
- Collecting Sales Tax
Module 19: Adding Shipping Information (Pro/MS)
- Adding Shipping Info
Module 20: Tracking Sales Commissions
- Tracking Sales And Commission
Module 21: Taking Payment and Giving Change
- Taking Payments And Giving Change
Module 22: Recording Tips
- Recording Tip
Module 23: Handling Tricky Sales Returns
- Handling Tricky Sales And Returns
Module 24: Working with Sales Orders, Work Orders, and Layaways
- Working With Sales And Work Orders
Module 25: Purchasing Merchandise
- Purchasing Merchandise
Module 26: Receiving from a PO
- Receiving Purchase Orders
Module 27: Managing Inventory
- Managing Inventory
Module 28: Reporting
- Reporting Point Of Sales
Module 29: QuickBooks Financial
- Quickbooks Financial
Module 30: Multi-Store
- Multi-Store
Module 31: Protect your data
- Protecting Your Data
Module 32: Adding Third Party Applications
- Adding 3rd Party Apps
- Summary of Point of Sale
Module 1: The Phone
- Introduction
- Buttons
Module 2: The Screen
- Gestures
Module 3: The Keyboard
- Keypad
Module 4: Contacts
- Contacts
- Groups
Module 5: Phone Calls
- Phone
- Call Customization
Module 6: Messaging
- Messages-Part 1
- Messages – Part 2
- Messages – Part 3
- Messages – Part 4
- Customizing Messages
Module 7: Internet
- Internet – Part 1
- Internet – Part 2
- Internet Settings
Module 8: Email
- Email-Part1
- Email-Part 2
- Setup Email
Module 9: Music
- Music
Module 10: Android Specifics
- Google Voice
- Customization
- Lock Screen
- Stylus
Module 11: Photos & Video
- Camera-Part1
- Camera-Part2
- Taking Photos-Part1
- Taking Photos-Part2
- Editing Photos
- Capturing Video
Module 12: Conclusion
- Wrap Up
Module 1: iPhone Basics
- Iphone Intro
- Iphone The Basics
Module 2: The Screen
- 2.1 The Screen Pt. 1
- 2.2 The Screen Pt. 2
- 2.3 The Screen Pt. 3
- 2.4 The Screen Pt. 4
Module 3: The Keyboard
- Basic Keyboard
- Advanced Keyboard
Module 4: Basic Calls and Settings
- Making A Call
- Settings-Part 1
- Settings-Part 2
Module 5: Contacts
- Contacts-Part 2
- Contacts-Part 2
Module 6: Phone Calls
- Phone Calls-Part 1
- Phone Calls-Part 2
- Phone Calls-Part 3
- Advanced Phone Calls
Module 7: Messaging
- Texting-Part 1
- Texting-Part 2
- Advanced Texting-Part 1
- Advanced Texting-Part 2
- Message Settings
Module 8: Web
- Web-Part 1
- Web-Part 2
- Web-Part 3
Module 9: Email
- Email-Part 1
- Email-Part 2
- Multiple Email Accounts
- Email Settings
Module 10: Siri
- SIRI
Module 11: Music
- Music-Part 1
- Music-Part 2
Module 12: Photos and Video
- Camera Functions
- Photography Settings
- Edit Photos
- Share Photos
- Video Functions
Module 13: Maps
- Apple Maps
Module 14: Conclusion
- Application Management
- Misc-Part 1
- Misc-Part 2
- Conclusion
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
- Introduction
- Identify Components of a Personal Computer
- Sign in to Windows 8
- Navigate the Desktop
Lesson 2: Using the Modern Apps and Navigation Features
- Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
- Navigate the Desktop
Lesson 4: Using Internet Explorer 10
- Navigate Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
- Multitasking With Apps
- Use the Control Panel and Task Manager-Part1
- Use the Control Panel and Task Manager-Part2
Lesson 6: Using Windows 8 Security Features
- Customizing the Windows 8 Environment
- Security Features
- Using Other Windows 8 Features-Part1
- Using Other Windows 8 Features-Part2
- Using Other Windows 8 Features-Part3
Module 1: Architecture
- Cloud Security Overview-Part1
- Cloud Security Overview-Part2
- Cloud Diagrams
- Cloud Services
Module 2: Governance and Enterprise Risk
- Risk Management
- Corporate Governance
- Enterprise Risk Management
- Risk Management Balance Process Supply Chain Security
- ERM Incidents Recommendations-Part1
- ERM Incidents Recommendations-Part2
- ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
- Cloud Legal Issues-Part1
- Cloud Legal Issues-Part2
- Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
- Audits
- Compliance And Audit
- Audit Recommendations
- Audit Requirements
Module 5: Information Management and Data Security
- Information And Security
- Storage
- Information Governance Classification
- Data Security
- Protecting Data Moving
- Client Database Encryption
- PaaS Encryption
Module 6: Interoperability and Portability
- Interoperability And Portability
- Interoperability Recommendations
- Portability Recommendations
- Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- Business Continuity And Disaster Recovery
- Assessing CSP Security
- Equipment Maintenance
- Recommendations
Module 8: Data Center Operations
- Data Center Operations
Module 9: Incident Response
- Incident Response
- Testing
- IaaS
- C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
- Application Security
- Security Testing
- Audit Compliance
- Security Assurance Recommendations
Module 11: Encryption and Key Management
- Encryption And Key Management
- Content Aware Encryption
- Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
- Building Access Control
- Intro To Identity
- Entitlement Process
- Trust With Identity
- Recommendations For Identity Management
Module 13: Virtualization
- Virtualization
- Hypervisor And Virtual Machine
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
- Security As A Service
- Security Offerings
- Intrusion Detection Prevention
- Business Continuity And Disaster Recovery
- European CCSK
- Top Security Benefits
- European Legal Based Issues
Module 1 – The Audit Process
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self-Assessment
Module 2 – Audit Governance and Compliance
- IT Governance
- Governance & Security Policies
- Outsourcing & Governance
- Outsourcing & Globalization
- Organizational Compliance
- IT Strategy
- IT Performance
Module 3 – System Infrastructure, Project Management, and Testing
- System & Infrastructure
- Requirements
- Project Management Tools – Part 1
- Project Management Tools – Part 2
- Applications
- Agile Development
- Monitoring & Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
Module 4 – Media Disposal, Reviews, and System Maintenance
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
Module 5 – IT Service Level Management
- IT Service Delivery and Support
- How to Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language (SQL)
- Monitoring Performance
- Source Code and Perfomance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
Module 6 – Auditor Technical Overview
- IS Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds of Attacks
- Access Controls
- Identification and Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices and Network Components
- Network Address Translation
- Virtual Private Networks (VPNs)
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- HoneyPot
- Risks to Portable and Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
Module 7 – Business Continuity and Disaster Recovery
- Business Continuity and Disaster Recovery
- Fault Tolerance
- Business Continuity and Disaster Recovery Regulations
Domain 1 – Characteristics of Cloud Services from a Business Perspect
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
Domain 2 – Cloud Computing and Business Value
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
Domain 3 – Technical Perspectives/Cloud Types
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
Domain 4 – Steps to Successful Adoption of Cloud
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
- Information Security Management System-Part1
- Information Security Management System-Part2
Domain 6 – Risks and Consequences of Cloud Computing
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
Module 1: Computer Forensics Introduction
- Intro To Course-Part1
- Intro To Course-Part2
- Intro To Course-Part3
- Intro To Course-Part4
- Intro To Course-Part5
- Intro To Forensics-Part1
- Intro To Forensics-Part2
- Intro To Forensics-Part3
- Intro To Forensics-Part4
- Intro To Forensics-Part5
- Intro To Forensics-Part6
- Intro To Forensics-Part7
- Intro To Forensics-Part8
Module 2: Forensics Investigation Process
- Forensics Investigation Process-Part1
- Forensics Investigation Process-Part2
- Forensics Investigation Process-Part3
- Forensics Investigation Process-Part4
- Forensics Investigation Process-Part5
- Forensics Investigation Process-Part6
- Forensics Investigation Process-Part7
- Forensics Investigation Process-Part8
- Forensics Investigation Process-Part9
- Forensics Investigation Process-Part10
Module 3: Searching and Seizing
- Searching And Seizing-Part1
- Searching And Seizing-Part2
- Searching And Seizing-Part3
- Searching And Seizing-Part4
- Searching And Seizing-Part5
Module 4: Digital Evidence
- Digital Evidence-Part1
- Digital Evidence-Part2
- Digital Evidence-Part3
- Digital Evidence-Part4
- Digital Evidence-Part5
- Digital Evidence-Part6
- Digital Evidence-Part7
Module 5: First Responder Procedures
- First Responder Procedures-Part1
- First Responder Procedures-Part2
- First Responder Procedures-Part3
- First Responder Procedures-Part4
- First Responder Procedures-Part5
- First Responder Procedures-Part6
- First Responder Procedures-Part7
- First Responder Procedures-Part8
Module 6: Forensics Lab
- Forensic Lab-Part1
- Forensic Lab-Part2
- Forensic Lab-Part3
- Forensic Lab-Part4
- Forensic Lab-Part5
Module 7: Hard Disks and File Systems
- Hard Disks And File Systems-Part1
- Hard Disks And File Systems-Part2
- Hard Disks And File Systems-Part3
- Hard Disks And File Systems-Part4
- Hard Disks And File Systems-Part5
- Hard Disks And File Systems-Part6
- Hard Disks And File Systems-Part7
- Hard Disks And File Systems-Part8
- Hard Disks And File Systems-Part9
- Hard Disks And File Systems-Part10
Module 8: Windows Forensics
- Windows Forensics-Part1
- Windows Forensics-Part2
- Windows Forensics-Part3
- Windows Forensics-Part4
- Windows Forensics-Part5
- Windows Forensics-Part6
- Windows Forensics-Part7
- Windows Forensics-Part8
- Windows Forensics-Part9
- Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
- Data Acquisition And Duplication-Part1
- Data Acquisition And Duplication-Part2
- Data Acquisition And Duplication-Part3
- Data Acquisition And Duplication-Part4
- Data Acquisition And Duplication-Part5
- Data Acquisition And Duplication-Part6
- Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
- Recovering Deleted Files And Partitions-Part1
- Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
- Using Access Data FTK And Special Steps-Part1
- Using Access Data FTK And Special Steps-Part2
- Using Access Data FTK And Special Steps-Part3
- Using Access Data FTK And Special Steps-Part4
- Using Access Data FTK And Special Steps-Part5
- Using Access Data FTK And Special Steps-Part6
- Using Access Data FTK And Special Steps-Part7
- Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
- EnCase-Part1
- EnCase-Part2
- EnCase-Part3
Module 13: Steganography
- Stenography-Part1
- Stenography-Part2
- Stenography-Part3
- Stenography-Part4
Module 14: Password Crackers
- Passwords-Part1
- Passwords-Part2
- Passwords-Part3
- Passwords-Part4
Module 15: Log Correlation
- Log Correlation-Part1
- Log Correlation-Part2
- Log Correlation-Part3
- Log Correlation-Part4
- Log Correlation-Part5
- Log Correlation-Part6
Module 16: Network Forensics
- Network Forensics-Part1
- Network Forensics-Part2
- Network Forensics-Part3
- Network Forensics-Part4
Module 17: Wireless Attacks
- Wireless Attacks-Part1
- Wireless Attacks-Part2
- Wireless Attacks-Part3
Module 18: Web Attacks
- Web Attacks-Part1
- Web Attacks-Part2
- Web Attacks-Part3
- Web Attacks-Part4
- Web Attacks-Part5
- Web Attacks-Part6
- Web Attacks-Part7
- Web Attacks-Part8
Module 19: Email Crimes
- Email Crimes-Part1
- Email Crimes-Part2
- Email Crimes-Part3
- Email Crimes-Part4
Module 20: Mobile Investigation
- Mobile Investigation-Part1
- Mobile Investigation-Part2
- Mobile Investigation-Part3
- Mobile Investigation-Part4
- Mobile Investigation-Part5
Module 21: Investigative Reports
- Investigation Reports-Part1
- Investigation Reports-Part2
- Investigation Reports-Part3
- Investigation Reports-Part4
Module 22: Expert Witness
- Expert Witness-Part1
- Expert Witness-Part2
- Expert Witness-Part3
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
Module 1
- Introduction and Developing in HTML5 with Javascript and CSS3
- Intro to HTML 5
- Examples of Browsers Using Codes
- Using HTML5 Codes and Utilizing Virtual Studio – Part 1
- Using HTML5 Codes and Utilizing Virtual Studio – Part 2
- Using HTML5 Codes and Utilizing Virtual Studio – Part 3
- Using HTML5 Codes and Utilizing Virtual Studio – Part 4
Module 2
- HTML5 Code Walk through – Part 1
- HTML5 Code Walk through – Part 2
- HTML5 Code Walk through – Part 3
- CSS3 Selectors and Style Properties – Part 1
- CSS3 Selectors and Style Properties – Part 2
- CSS3 Selectors and Style Properties – Part 3
- CSS3 Selectors and Style Properties – Part 4
- CSS3 Selectors and Style Properties – Part 5
- CSS3 Selectors and Style Properties – Part 6
Module 3
- Developer Tool Support
- Browse-Specific Feature Detection
- HTML Form Examples – Part 1
- HTML Form Examples – Part 2
- HTML Form Examples – Part 3
- HTML Form Examples – Part 4
Module 4
- HTML Form Enhancements – Part 1
- HTML Form Enhancements – Part 2
- HTML Form Enhancements – Part 3
- HTML Form Enhancements – Part 4
- HTML Form Enhancements – Part 5
- HTML Form Enhancements – Part 6
Module 5
- Building Websites – Part 1
- Building Websites – Part 2
- Building Websites – Part 3
- Building Websites – Part 4
Module 6
- More HTML5
- More HTML5 – Information Tags
- More HTML5 – Codes
- More HTML5 – Java Script
- Course Outro
Module 1: Comprehensive Introduction to Sharepoint
- Course Intro
- Social Media
- Moblie Access
- Business Intelligence – Part 1
- Business Intelligence – Part 2
- Sharepoint Licensing Overview
- Organize Info
- Share Your Insights
- Minimal Download Strategy
- Enhances Social and Collaboration Features
- Enhanced Search
- Workflow
- Enterprise Content Management
- Web Content Management
Module 2: Installing SharePoint
- What We Will Cover – Part 1
- What We Will Cover – Part 2
- What We Will Cover – Part 3
- What We Will Cover – Part 4
- What We Will Cover – Part 5
- What We Will Cover – Part 6
- What We Will Cover – Part 7
- What We Will Cover – Part 8
- What We Will Cover – Part 9
- Software Requirements
- Service and Accounts
Module 3: SharePoint Architecture, Logical & Physical
- Physical Architecture
- Physical Architecture – Traditional Topologies
- Physical Architecture – Streamlined Topologies
- Physical Architecture – Search Architectures
- Physical Architecture – Enterprise Search Architecture
- Physical Architecture – Multi – Farm
- Logical Architecture
- Logical Architecture – Host Names Based Sites
- Logical Architecture – Path – Based
- Logical Architecture – Extranet
- Logical Architecture – Mobile
- Logical Architecture – Single Farm Deployment
- Databasis
- Summary
Module 4: Web Applications and Site Collections
- Web Applications and Site Collections Intro
- Logical Structure and Web Applications
- Demo
- Site Collections
- Demo – Part 1
- Demo – Part 2
- Application Pools and Summary
Module 5: Configure Service Applications
- Intro
- Service Applications
- Demo of Configuring Excel Services
- Sharepoint Management Shell Demo
- Summary
Module 6: Permissions
- Intro
- Site Permissions
- Terms
- Demo
- Authentication Modes
- O Auth
- Summary
Module 7: Search
- Intro
- Intro to Search
- Search Logical Architecture
- Crawling the Content
- Conent Processing
- Analytics Processing Component
- Summary
Module 8: User Profiles
- Intro
- User Profile Service
- User Profile Demo
- Profile Synchronization Goals
- Profile Synchronization Demo
- Sync Performance Changes
- Sync Performance Changes Demo
- Profile Import Options
Module 9: Ongoing Support and Maintenance
- Intro
- What To Look For
Module 1: Business Continuity
- Course Intro
- Intro to Plan Business Continuity Management – Part 1
- Intro to Plan Business Continuity Management – Part 2
- Describe High Availability
- Degraded Availability
- Qualifying Downtime
- Qualifying Downtime Demo – Part 1
- Qualifying Downtime Demo – Part 2
- Qualifying Downtime Demo – Part 3
- Qualifying Downtime Demo – Part 4
- Qualifying Downtime Demo – Part 5
- Qualifying Downtime Demo – Part 6
- Disaster Recovery Plan (DRP) – Part 1
- Disaster Recovery Plan (DRP) – Part 2
- Measure Availability – Part 1
- Measure Availability (Demo) – Part 2
- Measure Availability – Part 3
- Downtime Metrics – Part 1
- Downtime Metrics – Part 2
- Performance to Availability Relationship
- Costs of HA
- HA Supports in a Farm
- Fault Tolerant in your HA Solution
- Backup and Recovery in SharePoint 2013
- Summary
Module 2: Model, Design, and Test
- Intro
- Plan for Success
- Model – Part 1
- Model – Part 2
- Model – Part 3
- Model – Part 4
- Model – Part 5
- Model – Part 6
- Model – Part 7
- Model – Part 8
- Design – Part 1
- Design – Part 2
- Design – Part 3
- Design – Part 4
- Design – Part 5
- Design – Part 6
- Design – Part 7
- Test – Part 1
- Test – Part 2
- Test – Part 3
- Test – Part 4
- Test – Part 5
- Test – Part 6
- Test – Part 7
- Deploy
- Monitor and Maintain
Module 3: Upgrade and Migrate
- Intro to Upgrade and Migrate to SharePoint 2013
- Upgrading to SharePoint 2013 – Part 1
- Upgrading to SharePoint 2013 – Part 2
- Upgrading to SharePoint 2013 – Part 3
- Upgrading to SharePoint 2013 – Part 4
- Upgrading to SharePoint 2013 – Part 5
- Upgrading to SharePoint 2013 – Part 6
- Upgrading to SharePoint 2013 – Part 7
Module 4: Create and Configure Service Applications
- Intro to Create and Configure Service Applications
- Create and Configure Service Applications
- Create and Configure Service Applications Demo
- Create and Configure Service Applications Summary
Module 5: SharePoint Management
- Intro to Manage SharePoint Solution, BI, and System Integration
- Manage SP Solutions, BI, and System Integration
Lesson 1: Getting Started with SQL Server 2012
- Course Introduction
Lesson 2: Working with T-SQL
- Creating Queries-Part 1
- Creating Queries-Part 2
- Creating Queries-Part 3
- Creating Queries-Part 4
- Creating Queries-Part 5
- Constraints-Part 1
- Constraints-Part 2
- Constraints-Part 3
- Constraints-Part 4
- Constraints-Part 5
Lesson 3: Writing SELECT Queries
- Select Statement-Part 1
- Select Statement-Part 2
- Select Statement-Part 3
- Select Statement-Part 4
Lesson 4: Working with SQL Data Types
- Data Types-Part 1
- Data Types-Part 2
- Data Types-Part 3
- Data Types-Part 4
- Data Types-Part 5
- Data Types-Part 6
- Data Types-Part 7
- Data Types-Part 8
- Data Types-Part 9
- Data Types-Part 10
Lesson 5: Sorting and Filtering Data
- Sorting Results-Part 1
- Sorting Results-Part 2
- Sorting Results-Part 3
- Sorting Results-Part 4
- Sorting Results-Part 5
- Sorting Results-Part 6
Lesson 6: Querying Data from Multiple Tables
- Tables Part 1
- Tables Part 2
- Tables Part 3
- Tables Part 4
- Tables Part 5
- Tables Part 6
Lesson 7: Modifying Data
- Inserting Data-Part 1
- Inserting Data-Part 2
- Inserting Data-Part 3
- Inserting Data-Part 4
- Inserting Data-Part 5
- Inserting Data-Part 6
Lesson 8: Working with SQL Server Built-in Functions
- Functions
- Parse
- Logical Functions
- Group By
Lesson 9: Programming in T-SQL
- Programming-Part 1
- Programming-Part 2
- Programming-Part 3
- Programming-Part 4
- Programming-Part 5
- Programming-Part 6
Lesson 10: Implementing Stored Procedures
- Storage Procedures-Part 1
- Storage Procedures-Part 2
- Dynamic SQL-Part 1
- Dynamic SQL-Part 2
Lesson 11: Working with Subqueries and Table Expressions
- Sub-Queries And Table Expressions-Part 1
- Sub-Queries And Table Expressions-Part 2
- Sub-Queries And Table Expressions-Part 3
- Sub-Queries And Table Expressions-Part 4
Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions
- Set Operators-Part 1
- Set Operators-Part 2
- Window Functions-Part 1
- Window Functions-Part 2
- User Defined Functions-Part 1
- User Defined Functions-Part 2
- Advanced Analytical Functions
Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets
- Pivot
- Grouping Sets
Lesson 14: Managing Error Handling and Transactions
- Error Handling-Part 1
- Error Handling-Part 2
- Manage Transactions-Part 1
- Manage Transactions-Part 2
- Manage Transactions-Part 3
Lesson 15: Querying SQL Server System
- System Databases-Part 1
- System Databases-Part 2
- System Databases-Part 3
- System Databases-Part 4
Lesson 16: Optimizing Query Performance
- Query Planning-Part 1
- Query Planning-Part 2
- Index-Part 1
- Index-Part 2
- Index-Part 3
Lesson 1: Identifying the SQL Server Platform
- Overview
- DataStorage-Part 1
- DataStorage-Part 2
Lesson 2: Deploying SQL Server
- Install-Part 1
- Install-Part 2
Lesson 3: Configuring SQL Server
- Configuring-Part 1
- Configuring-Part 2
- Changing Memory-Part 1
- Changing Memory-Part 2
- Email-Part 1
- Email-Part 2
Lesson 4: Managing Databases in SQL Server 2012
- User Databases-Part 1
- User Databases-Part 2
- User Databases-Part 3
- User Databases-Part 4
- User Databases-Part 5
Lesson 5: Managing SQL Server Security
- Setting Security-Part 1
- Setting Security-Part 2
- Server Roles-Part 1
- Server Roles-Part 2
- Setting Permissions-Part 1
- Setting Permissions-Part 2
Lesson 6: Implementing Advanced Security Settings
- Querying Data From Multiple Tables-Part 1
- Querying Data From Multiple Tables-Part 2
- Querying Data From Multiple Tables-Part 3
- Querying Data From Multiple Tables-Part 4
- Querying Data From Multiple Tables-Part 5
Lesson 7: Applying Encryption and Compression
- Encrypting And Compressing-Part 1
- Encrypting And Compressing-Part 2
- Encrypting And Compressing-Part 3
Lesson 8: Working with Indexes and Log Files
- Functions-Part 1
- Functions-Part 2
- Functions-Part 3
- Functions-Part 4
- Functions-Part 5
- Functions-Part 6
Lesson 9: Working with Backup and Restore
- Managing Backups-Part 1
- Managing Backups-Part 2
- Managing Backups-Part 3
- Managing Backups-Part 4
- Managing Backups-Part 5
- Managing Backups-Part 6
- Managing Backups-Part 7
Lesson 10: Implementing High Availability
- Stored Procedures-Part 1
- Stored Procedures-Part 2
- Stored Procedures-Part 3
- Stored Procedures-Part 4
Lesson 11: Optimizing Server Performance
- Managing SQL Performance-Part 1
- Managing SQL Performance-Part 2
- Managing SQL Performance-Part 3
- Managing SQL Performance-Part 4
- Managing SQL Performance-Part 5
- Managing SQL Performance-Part 6
- Managing SQL Performance-Part 7
Lesson 12: Troubleshooting Issues and Recovering Databases
- Set Operators-Part 1
- Set Operators-Part 2
- Set Operators-Part 3
- Set Operators-Part 4
- Set Operators-Part 5
Lesson 13: Performing Advanced Database Management Tasks
- Managing Database Infrastructures-Part 1
- Managing Database Infrastructures-Part 2
- Managing Database Infrastructures-Part 3
Lesson 1: Introduction to Data Warehouse
- Introduction
- Introduction To Data Warehouse-Part1
- Introduction To Data Warehouse-Part2
- Introduction To Data Warehouse-Part3
- Introduction To Data Warehouse-Part4
- Introduction To Data Warehouse-Part5
- Introduction To Data Warehouse-Part6
Lesson 2: Creating Dimensions and Changing Granularity of Dimensions
- Creating Dimensions And Changing Granularity Of Dimensions-Part1
- Creating Dimensions And Changing Granularity Of Dimensions-Part2
- Creating Dimensions And Changing Granularity Of Dimensions-Part3
- Creating Dimensions And Changing Granularity Of Dimensions-Part4
- Creating Dimensions And Changing Granularity Of Dimensions-Part5
- Creating Dimensions And Changing Granularity Of Dimensions-Part6
Lesson 3: Creating Fact Tables and ColumnStore Indexes
- Creating Fact Tables And Column Store Indexes-Part1
- Creating Fact Tables And Column Store Indexes-Part2
- Creating Fact Tables And Column Store Indexes-Part3
- Creating Fact Tables And Column Store Indexes-Part4
- Creating Fact Tables And Column Store Indexes-Part5
Lesson 4: Implementing Data Warehouse in SQL Server 2012
- Implementing Data Warehouse-Part1
- Implementing Data Warehouse-Part2
- Implementing Data Warehouse-Part3
- Implementing Data Warehouse-Part4
Lesson 5: Working with Integration Services
- Working With Integration Services-Part1
- Working With Integration Services-Part2
- Working With Integration Services-Part3
- Working With Integration Services-Part4
- Working With Integration Services-Part5
- Working With Integration Services-Part6
Lesson 6: Managing Control Flow
- Managing Control Flow-Part1
- Managing Control Flow-Part2
- Managing Control Flow-Part3
- Managing Control Flow-Part4
- Managing Control Flow-Part5
Lesson 7: Working with Dynamic Variables
- Working With Dynamic Variables-Part1
- Working With Dynamic Variables-Part2
- Working With Dynamic Variables-Part3
- Working With Dynamic Variables-Part4
- Working With Dynamic Variables-Part5
- Working With Dynamic Variables-Part6
- Working With Dynamic Variables-Part7
- Working With Dynamic Variables-Part8
Lesson 8: Implementing Data Flow
- Implementing DataFlow-Part1
- Implementing DataFlow-Part2
- Implementing DataFlow-Part3
- Implementing DataFlow-Part4
- Implementing DataFlow-Part5
- Implementing DataFlow-Part6
- Implementing DataFlow-Part7
- Implementing DataFlow-Part8
Lesson 9: Managing Data Flow
- Managing DataFlow-Part1
- Managing DataFlow-Part2
- Managing DataFlow-Part3
- Managing DataFlow-Part4
Lesson 10: Managing SSIS Package Execution
- Managing SSIS Package Execution-Part1
- Managing SSIS Package Execution-Part2
- Managing SSIS Package Execution-Part3
- Managing SSIS Package Execution-Part4
- Managing SSIS Package Execution-Part5
- Managing SSIS Package Execution-Part6
Lesson 11: Debugging and Troubleshooting
- Debugging And Troubleshooting-Part1
- Debugging And Troubleshooting-Part2
- Debugging And Troubleshooting-Part3
- Debugging And Troubleshooting-Part4
Lesson 12: Deploying Packages
- Deploying Packages-Part1
- Deploying Packages-Part2
- Deploying Packages-Part3
Lesson 13: Securing Packages and Databases
- Securing Packages And Databases-Part1
- Securing Packages And Databases-Part2
Lesson 14: Working with MDS and Windows
- Working With MDS And Windows Azure
Module 1
- Exploring ASP Dot NET MVC 4 – Part 1
- Exploring ASP Dot NET MVC 4 – Part 2
- Exploring ASP Dot NET MVC 4 – Part 3
- Exploring ASP Dot NET MVC 4 – Part 4
Module 2
- Designing Web Applications – Part 1
- Designing Web Applications – Part 2
- Designing Web Applications – Part 3
- Designing Web Applications – Part 4
- Designing Web Applications – Part 5
Module 3
- Developing ASP Dot NET MVC 4 Models – Part 1
- Developing ASP Dot NET MVC 4 Models – Part 2
- Developing ASP Dot NET MVC 4 Models – Part 3
Module 4
- Developing ASP Dot NET MVC 4 Controllers – Part 1
- Developing ASP Dot NET MVC 4 Controllers – Part 2
- Developing ASP Dot NET MVC 4 Controllers – Part 3
- Developing ASP Dot NET MVC 4 Controllers – Part 4
Module 5
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 1
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 2
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 3
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 4
- Applying Styles to ASP Dot NET MVC 4 Web Applications – Part 5
Module 6
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 1
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 2
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 3
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 4
- Testing and Debugging ASP Dot NET MVC 4 Web Applications – Part 5
Module 7
- Structuring ASP Dot NET MVC 4 Web Applications – Part 1
- Structuring ASP Dot NET MVC 4 Web Applications – Part 2
- Structuring ASP Dot NET MVC 4 Web Applications – Part 3
Module 8
- Troubleshooting ASP Dot NET MVC 4 Web Applications
Excel 2010 Basic
- Intro to Excel Basic
- Interface and Functions
- Cells
- Entering Data Into Cells
- Basic Formatting in Excel
- Creating a Worksheet
- The Intelligence Of Excel
- Customizing Rows and Columns
- Creating Formulas
- Summary Pages and Moving Workbook to Workbook
- The Function Builder
- Conditional Formatting
- Sorting and Filtering Data
- Printing with Excel
- Conclusion
- Excel Basic Flashcards
Excel 2010 Intermediate
- Intro to Excel Intermediate
- Charts
- Headers Footers and Layout Options
- What If
- Basic Tables in Excel
- Pivot Tables
- Manipulating Data Within the Pivot Tables
- Pivot Table Charts
- Data Validation
- Conclusion
- Excel Intermediate Flashcards
Excel 2010 Advanced
- Intro to Excel Advanced
- Customizing the Ribbon and Cells
- Creating and Managing Ranges
- More Formulas
- Data Analysis
- Data From an Outside Source
- Spark Lines
- Macros
- Conclusion
- Excel Advanced Flashcards
Outlook 2010 Basic
- Intro To Outlook Basic
- Interface
- Customizing Interface
- E-mail 101
- Organizing Inbound E-mails
- Calendar Function
- Task Lists
- Contact List
- Multiple Accounts
- Conclusion
Outlook 2010 Intermediate
- Intro To Outlook Intermediate
- Message Functions
- Calendar
- More In-Depth Contact Functions
- Email Message Options
- Mail Rules
- Customizing Options
- Conclusion
Outlook 2010 Advanced
- Intro To Outlook Advanced
- Send And Receive
- Account Settings
- Calendars
- Quick Actions Within Messages
- Quick Steps
- Conclusion
Powerpoint 2010 Basic
- Powerpoint Basic Flashcards
- Intro To PowerPoint Basic
- The PowerPoint Interface
- Creating A New Presentation With Templates
- Slide Layout
- Visually Appealing Presentations
- Preview Mode And Page Setup
- Transitions
- Creating Custom Slides
- Animating Text
- Animating Objects
- Animation Timing
- Conclusion
Powerpoint 2010 Intermediate
- Powerpoint Intermediate Flashcards
- Introduction To PowerPoint Intermediate
- Sections And Organizing Slides
- Adding Autoshapes
- Inserting And Editing Pictures
- Inserting And Editing Video
- Inserting And Editing Tables
- SmartArt
- Animating Smart Art And Inserting Audio
- Headers And Footers In PowerPoint
- Setup Slideshow And Rehearsal Timing
- Conclusion
Powerpoint 2010 Advanced
- Powerpoint Advanced Flashcards
- Intro To PowerPoint Advanced
- Master Slides
- Styles
- More Functions With Video In PowerPoint
- Transitions And Action Buttons
- Customizing The Show
- Printing In PowerPoint
- Conclusion
Word 2010 Basic
- Flashcards
- Intro to the Word Interface
- Working with Templates
- Creating a New Blank Document
- Formatting a Document
- More Formatting Options
- Adding Shapes, Clipart, & Pictures
- Page Layout
- Conclusion
Word 2010 Intermediate
- Flashcards
- Introduction
- Tracking Changes in a Document
- Customizing the Interface
- Working with Styles
- Tables in Word
- Endnotes, Footnotes, & Captions
- Cover Pages, Headers, & Footers
- Working with Sections
- Headers & Footers
- Cover Sheet & Table of Contents
- Cover Letters & Mail Merge
- Conclusion
Word 2010 Advanced
- Flashcards
- Introduction to the Word Interface
- Customizing the Ribbon
- Embedding Non-Word Documents
- Working with Formulas
- Citations
- Comparing Documents
- Forms & Content Controls
- Master Documents & Subdocuments
- Conclusion
Module 1: Database Admininstration
- Intro to Oracle
- Database Administration
- Installing Oracle – Part 1
- Installing Oracle – Part 2
- Post Setup Overview – Part 1
- Post Setup Overview – Part 2
- SQLplus – Part 1
- SQLplus – Part 2
- SQLplus Demo – Part 1
- SQLplus Demo – Part 2
- SQLplus Demo – Part 3
- Startup and Shutdown – Part 1
- Startup and Shutdown – Part 2
Module 2: Oracle Architecture
- Oracle Architecture
- Schema Objects
- Data Access
- Architecture
Module 3: Database Schema
- Database Schema
- Create Table & Tablespace – Part 1
- Create Table & Tablespace – Part 2
- Create View
- Create Index
- Create Sequence
Module 4: Recovery Manager
- Recovery Manager
- What is RMAN
- RMAN Demo
- Restore – Part 1
- Restore – Part 2
Module 5: Introduction to SQL
- SQL – Part 1
- SQL – Part 2
- Parts of SQL Statement
- Select Statement
Module 6: Filtering and Sorting Data
- Build ERD – Part 1
- Build ERD – Part 2
- Build ERD – Part 3
Module 7: Functions
- Functions
- More Functions
- Group Functions
- Custom Functions
Module 8: SET Operators and Subqueries
- SET Operations
- Subqueries
Module 9: Regular Expressions and SQL Loader
- Regular Expressions
- SQL Loader
Access 2010 Basic
- Access Basic Flashcards
- Introduction
- Databases And The Access Interface
- Spreadsheets And Tables
- Entering Data In A Table
- Relationships Between Tables
- Editing A Form
- Queries
- Across The Tables
- Creating Forms
- Conclusion
Access 2010 Intermediate
- Access Intermediate Flashcards
- Introduction
- Primary Key
- Multiple Table Query
- Creating Forms
- Validation Within Forms
- Adding Related Fields
- Forms Created With Design View
- Find Functionality
- Creating Report
- Conclusion
Access 2010 Advanced
- Access Advanced Flashcards
- Introduction
- Customizing Access With Back Stage Options
- Mailing Labels
- Macros-Part1
- Macros-Part2
- Queries-Part1
- Queries-Part2
- Joining In Sequel
- Navigation
- Adding Chart With Specific Data
- Action Query
- Security
- Conclusion
Module 1: Sage 50 2013
- Course Overview-Part1
- Course Overview-Part2
- Course Overview-Part3
- Course Overview-Part4
- New Features-Part1
- New Features-Part2
- New Features-Part3
- Quick Tab Menu Overview
- Business Status-Part1
- Business Status-Part2
- Customer And Sales
- Vendors And Purchases
- Inventory And Services
- Employees And Services
- Banking
- System-Part 1
- System-Part2
- Quick Tab Menu Review
- Sage 50 Menu Overview-Part1
- Sage 50 Menu Overview-Part 2
- Sage 50 Menu Overview-Part3
- Sage 50 Menu Overview-Part 4
- Sage 50 Menu Overview-Part5
- Sage 50 Menu Overview-Part6
- Sage 50 Menu Overview-Part7
Module 2: Sage 50 Basics
- Sage 50 Available Products
- Accounts Payable Features
- Vendors And Purchases-Part 1
- Vendors And Purchases-Part 2
- Vendors And Purchases-Part 3
- Vendors And Purchases-Part 4
- Vendors And Purchases-Part 5
- Vendors And Purchases-Part 6
- Accounts Payable Review
- Accounts Receivable Review
- Customer And Sales Menu
- Customers
- Jobs
- Sales Taxes
- Quotes And Proposals
- Sales Orders
- Invoices
- Finance Charges Basics
- Receive Money
- Bank Accounts
- Printing Statements
- Credits And Returns
- Accounts Receivable Report
- Basics Review
Module 3: Inventory
- Inventory And Services Overview
- Inventory Items-Part 1
- Inventory Items-Part 2
- Company Services
- Assemblies and Prices
- Purchase Orders
- Receiving Inventory Shipping And Tracking
- Inventory Count And Adjustments
- Inventory Reports
- Inventory Review
Module 4: Employee
- Employees And Payroll Overview
- Employees And Users-Part 1
- Employees And Users-Part 2
- 1099's
- Payroll Setup
- Time And Expense Tickets
- Direct Deposit And Printing Payroll Checks
- Forms And Void Checks
- Employees Module Review
Module 5: Banking
- Banking Features Overview
- Write Checks
- Account Register
- Analysis Tools-Part 1
- Analysis Tools-Part 2
- Chart Of Accounts
- Receive Money And Bank Deposits-Part 1
- Receive Money And Bank Deposits-Part 2
- Enter Bills Pay Bills And Electronic Bill Pay
- Reconcile Accounts
- General Journal Entries
- Void Checks And Reports
- Banking Module Review
Module 6: Maintenance
- Automatic Backup
- BackUp Data-Part 1
- BackUp Data-Part 2
- Automatic Backup
- Restore Data
- Data Maintenance
- System Checks
- Company Maintenance
- Data Integrity
- Maintenance Review
Module 7: File Handling
- Attaching Documents
- Attaching And Managing Documents
- File Handling Review
Module 8: Manager
- Analysis Managers
- Cash Flow Manager-Part 1
- Cash Flow Manager-Part 2
- Cash Flow Manager-Part 3
- Collection Manager
- Payment Manager
- Financial Manager
- Manager Review
Module 9: Jobs
- MaintainingJobs
- CreatingJobs-Part 1
- Creating Jobs-Part 2
- Managing Jobs
- Jobs Review
Module 10: Budgets
- Maintain Budgets
- Creating And Managing Budgets-Part 1
- Creating And Managing Budgets-Part 2
- Budgets Module Review
Module 11: Charts of Accounts
- Maintain Chart Of Accounts
- Creating Accounts
- Accounts List-Part 1
- Accounts List-Part 2
- Chart Of Accounts Review
Module 12: Accounts Management
- Maintain Customers And Prospects
- Adding Customers And Prospects
- Accounts Aging
- Payment Methods
- Managing A Customer Account
- Accounts Management Review
Module 13: Customer Setup
- Customer Setup Guide
- Customer Setup-Part 1
- Customer Setup-Part 2
- Customer Setup-Part 3
- Customer Beginning Balance
- Customer Account Defaults
- Sales Tax
- Statement And Invoice Defaults
- Customer Setup Review
Module 14: Jobs Setup
- Jobs Setup Guide
- Jobs Setup
- Jobs Change Order
- Job Ledger
- Job Profitability Report-Part 1
- Job Profitability Report-Part 2
- Job Defaults
- Jobs Beginning Balances
- Jobs Setup Review
Module 15: Vendor Setup
- Vendors Setup Guide
- Vendor Setup-Part 1
- Vendor Setup-Part 2
- Vendor Setup-Part 3
- Vendor Setup-Part 4
- Vendor Beginning Balances
- Vendor Default
- Vendor Setup Review
Module 16: Inventory Setup
- Inventory And Services Items Setup
- Adding And Managing Inventory And Service Items-Part 1
- Adding And Managing Inventory And Service Items-Part 2
- Adding And Managing Inventory And Service Items-Part 3
- Adding And Managing Inventory And Service Items-Part 4
- Quantities On Hand
- Inventory And Service Items Default Setup
- Inventory Setup Review
Module 17: Employee Setup
- Employees Setup Guide
- Employee Payroll Settings
- Payroll Options Settings
- Company Information Setting
- Benefits Settings-Part 1
- Benefits Settings-Part 2
- Payroll Taxes And Place Order Settings
- Employee Setup
- Salary History Setup
- Employees Default Setup
- Employee Setup Review
Module 18: Security Setup
- Security Setup Guide
- Setup Security
- Set Up Users
- User Security Setup
- User List Rights And Permissions
- Setup Guide Next Steps
- Security Review
Module 19: ACTI Link
- Sage 50 ACT
- Sage ACT Link
- ACT Accounting Link Setup
- Creating And Editing Contact Links-Part 1
- Creating And Editing Contact Links-Part 2
- Creating And Editing Contact Links-Part 3
- Contact Link Updates Options
- ACT! Link Review
Module 20: Task Overview
- Tasks Menu
- Quotes Sales Orders And Proposals-Part 1
- Quotes Sales Orders And Proposals-Part 2
- Quotes Sales Orders And Proposals-Part 3
- Sales Invoicing And Time Expenses
- Shipments
- Receipts
- Finance Charges
- Select For Deposit
- Credit Memos
- Select For Purchase Orders-Part 1
- Select For Purchase Orders-Part 2
- Bills And Payments-Part 1
- Bills And Payments-Part 2
- Account Register
- Time And Expense
- Select For Payroll Entry
- General Journal Entry
- Asemblies
- Account Reconciliation And Void Checks
- Write Letters And Action Items
- System Tasks
- Tasks Overview Review
Module 21: Forms, Reports, and Recap
- Reports And Forms
- Form Types And Sample Forms-Part 1
- Form Types And Sample Forms-Part 2
- Form Types And Sample Forms-Part 3
- Reports-Part 1
- Reports-Part 2
- Reports-Part 3
- Reports-Part 4
- Reports-Part 5
- Services
- Program Review
Module 1
- Wellness Intro-Part 1
- Wellness Intro-Part 2
- Wellness Intro-Part 3
Module 2
- Role Of Carbohydrates-Part 1
- Role Of Carbohydrates-Part 2
Module 3
- Role Of Fiber-Part 1
- Role Of Fiber-Part 2
Module 4
- Glycemic Index-Part 1
- Glycemic Index-Part 2
Module 5
- Impact Of Carbs
Module 6
- Gluten
Module 7
- Role Of Fat-Part 1
- Role Of Fat-Part 2
- How And Why We Gain Fat
- Role Of Protein
Module 8
- Digestion
Module 9
- Calories-Part 1
- Calories-Part 2
Module 10
- Organic Vs Inorganic
Module 11
- Roles Of Vitamins And Minerals-Part 1
- Roles Of Vitamins And Minerals-Part 2
- Roles Of Vitamins And Minerals-Part 3
Module 12
- Role of Water
Module 13
- Supplements-Part 1
- Supplements-Part 2
- Supplements-Part 3
- Supplements-Part 4
- Supplements-Part 5
- Supplements-Part 6
- Supplements-Part 7
- Supplements-Part 8
Module 14
- Artificial Sweeteners-Part 1
- Artificial Sweeteners-Part 2
- Artificial Sweeteners-Part 3
- Artificial Sweeteners-Part 4
- Artificial Sweeteners-Part 5
Module 15
- The Effects Of Caffeine
- Alcohol Does It Make You Fat
Module 16
- Sleep
- Stress
Module 17
- Fad Diets
- Raw Food Diet
- Cabbage Soup Diet
- Blood Group Diet
- Types Of Vegetarians
- Fad Diets And Genetics
Module 18
- Weight Loss Tips
- Setting Goals That Work For You
- Cancer
- Outro
Module 1: Intro and Setup
- Intro To Quickbooks
- Setup Quickbooks
Module 2: Tools
- Tools-Part 1
- Tools-Part 2
- Tools-Part 3
Module 3: Preferences
- Preferences
- Email Preferences
Module 4: Security & Users
- Security And Users
Module 5: Estimates
- Estimates
Module 6: Sales Orders
- Sales And Orders
Module 7: Receiving Money
- Account Receivable
- Batch Invoicing
- Customer Deposits
Module 8: Bounced Checks
- Bounced Checks
Module 9: Specific Tracking
- Vehicle Mileage
- Class Tracking Transactions
Module 10: Receiving and Depositing
- Receiving Payments
- Making Deposits
Module 11: Credit Cards and Bank Accounts
- Credit Cards
- Bank Accounts
Module 12: Payroll
- Payroll Preferences
- Employee Setup
- Processing Payroll
- Payroll Tax Forms
- Job Costing With Payroll
- Payroll Setup Advance
- Workers Compensation
Module 13: Transactions
- Special Transactions
- Memorized Transactions
Module 14: Accounts and Reports
- Other Account Types
- Quickbooks Reporting
- Advance Reporting
- Budgets And Forecast
Module 15: Integrating with Word
- Writing Letters In Microsoft Word
Module 16: Data Types
- Converting Importing And Exporting
- Quickooks Backup Data Integrity
- Multi-Currencies
Module 17: Conclusion
- Advance Features
- Update Or Upgrade
- Summary Of Quickbooks
Module 1.0 Introduction
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
Module 2.0 Adjusting Your Facebook Settings
- Adjusting Your Settings-Part1
- Adjusting Your Settings-Part2
- Adjusting Your Settings-Part3
- Updating Your Page Info-Part1
- Updating Your Page Info-Part2
- Tips For Getting 25 Likes
- Using Facebook As Your Business Page
Module 3.0 Posting on Facebook
- What Kind Of Person Would Your Business Be
- How To Post To Facebook
- What To Post
- Sharing Posts
- Sharing Links
- Pinning And Highlighting With Posts
- Tips For GeneratingTraffic
- Getting Notifications And Staying In Clients News Feed
- Comment Moderation
- The Activity Log-Where Do Hidden Posts Go
- Scheduling Posts
Module 7.0 Twitter
- Limiting the Number Of Actions
- Setting Your Twitter Preferences
- Finish Setting Up Your Profile
- Twitter Widgets
- Who To Follow
- Connect
- Bringing Followers From Facebook
- Intro To Hashtags
- Examples Of Hashtags
- Monitoring Whats Going On
- Using Twitter For Social Listening
- Social Media Tips
- Hashtags Across Social Media
Module 8.0 Pinterest
- Overview Of Pinterest
- How Does Pinterest Relate To Your Business
- Industry Specific Sites
- The Uses of Pinterest
- Conclusion Of Pinterest
Module 9.0 Reddit
- Introduction To Reddit
- The Rules Of Reddit
Module 11.0 LinkedIn
- Introduction To LinkedIn
- Overview Of The Interface And Settings
- Open Link Settings
- LinkedIn Groups
- Adding And Removing Applications
- Basic Account Settings
- Updating Your Public Profile
- LinkedIn Connections Groups And Pages
- LinkedIn Channels And Today
- Advertising On LinkedIn
Module 12.0 Google+ and Youtube
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Video
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
Module 14.0 Additional Tools
- Bitly
- Woobox-Part1
- Woobox-Part2
- Hoot Suite-Part1
- Hoot Suite-Part2
- Storify
- Social Media Rules And Tips
- Tweet deck-Boolean Search
- Social Media Conclusion
Module 4.0 Facebook Advertising
- Intro To Facebook Advertising
- Setup Advertising Account
- Types Of Advertising On Facebook
- Ad Testing
- Choosing Our Audience-Location
- Choosing Our Audience-Age And Gender
- Choosing Our Audience-Precise Interests
- Choosing Our Audience-Broad Categories
- Choosing Our Audience-Connections
- Choosing Our Audience-Advanced Targeting Options
- Choosing Our Audience-Campaign And Budget
- Other Types Of Ads-Part1
- Other Types Of Ads-Part2
- Ad Campaign Manager-Part1
- Ad Campaign Manager-Part2
- Outside URLs
- Building Ad Text
- News Feed Format And Creating Your Audience
- Campaign Pricing And Schedule
- Ad Campaign Tracker
Module 5.0 Facebook Insights
- Facebook Insights-Overview Intro
- Analyzing Page Posts
- Engaged Users
- Talking About This
- Virality
- Likes
- Reach
- Reach And Frequency
- Page Visits
- Talking About This
- Conclusion
Module 6.0 Facebook Analytics
- 6.0 New Facebook Analytics Overview
- 6.1 Page Likes
- 6.2 Post Reach
- 6.3 Page Visits
- 6.4 Posts
- 6.5 People
- New Facebook Analytics Overview
- Page Likes
- Post Reach
- Page Visits
- Posts
- People
Module 10.0 Tumblr
- Tumblr Introduction
- Setting Up A Tumblr
- Dashboard
- Posting To Tumblr
- Testing Your Post
- URL Post
- Chat Post
- Audio On Tumblr
- Video On Tumblr
- Tumblr Conclusion
Module 13.0 Best Practices
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed-Part1
- Stay Informed-Part2
This course is included in all of our team and individual training plans. Choose the option that works best for you.
[ Team Training ]
Enroll My Team.
Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.
[ Individual Plans ]
Choose a Plan.
Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.