Infrastructure/Cloud Admin Bundle - ITU Online

Infrastructure/Cloud Admin Bundle

As the demand for infrastructure management shifts, so does our approach. Companies are now venturing into server virtualization and cloud-based infrastructures to stay current with trends. This training bundle provides students a plethora of options and information regarding managing both server virtualization and/or cloud-based infrastructures. This invaluable collection contains 7 courses that ensure you’ll have all the resources needed to be successful in this field.

Included In This Course

CompTIA Network Vulnerability Assessment Professional (CNVP)
91 Hrs 25 Min
Videos
403 On-demand Videos
Closed Captions

Closed Captions

Course Topics
59  Topics
Question & Answers
606 Prep Questions
Certificate of Completion

Certificate of Completion

Managing infrastructure has taken on a new approach over the years. Companies are moving more and more into server virtualization and cloud infrastructure. This training bundle provides students with a wide array of options and information related to managing server virtualization and/or cloud-based infrastructures. The following 7 courses are included in this training bundle.
  • Microsoft AZ-203: Developing Solutions for Microsoft Azure
  • VMWare vSphere 6.7 Fundamentals
  • CompTIA Cloud+ CV0-001
  • Cloud Computing Security Knowlege (CCSK)
  • CompTIA Cloud Overview
  • Exin Cloud Computing
  • Microsoft 70-347: Enabling Office 365 Service
This bundle includes more 75 hours of on-demand training and includes test quizzes to help student ensure they are retaining the knowledge being provided in the course content.

Proudly Display
Your Achievement

Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.
Example Certificate

Microsoft AZ-203: Developing Solutions for Microsoft Azure Course Content

Module 1: Implement VM Solutions

  •    Intro
  •    Implement VM Solutions Pt 1
  •    Implement VM Solutions Pt 2
  •    Implement VM Solutions Pt 3
  •    Implement VM Solutions Pt 4
  •    Implement Batch Jobs Using AZ Batch Services
  •    Create Containerized Solutions Pt 1
  •    Create Containerized Solutions Pt 2

Module 2: Develop Azure Platform as a Service

  •    Develop Azure Platform as a Service (PaaS) Pt 1
  •    Develop Azure Platform as a Service (PaaS) Pt 2
  •    Develop Azure Platform as a Service (PaaS) Pt 3
  •    Develop Azure Platform as a Service (PaaS) Demo Pt 1
  •    Develop Azure Platform as a Service (PaaS) Demo Pt 2
  •    Create Azure App Service Mobile Apps
  •    Create Azure App Service API Apps
  •    Implement Azure Functions Pt 1
  •    Implement Azure Functions Pt 2

Module 3: Develop for Azure Storage

  •    Develop for Azure Storage Pt 1
  •    Develop for Azure Storage Pt 2
  •    Develop for Azure Storage Pt 3
  •    Develop Solutions that use Azure Cosmos DB Pt 1
  •    Develop Solutions that use Azure Cosmos DB Pt 2
  •    Develop Solutions that use Relational Database Pt 1
  •    Develop Solutions that use Relational Database Pt 2
  •    Develop Solutions that use Microsoft Blob Storage

Module 4: Implement Azure Security

  •    Implement Azure Security Pt 1
  •    Implement Azure Security Pt 2
  •    Implement Azure Security Pt 3
  •    Implementing Access Control Pt 1
  •    Implementing Access Control Pt 2
  •    Implementing Secure Data Solutions

Module 5: Monitor, Troubleshoot and Optimize Azure Solutions

  •    Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
  •    Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
  •    Develop for Code Scalability
  •    Instrument Solutions to Support Monitoring and Logging
  •    Integrate Caching and Content Delivery Pt 1
  •    Integrate Caching and Content Delivery Pt 2

Module 6: Connect to and Consume Azure and Third Party Services

  •    Connect to and Consume Azure and Third Party Services Pt 1
  •    Connect to and Consume Azure and Third Party Services Pt 2
  •    Working with Azure Search
  •    Azure API Management
  •    Develop Event Based Solutions Pt 1
  •    Develop Event Based Solutions Pt 2
  •    Develop Message Based Solutions Pt 1
  •    Develop Message Based Solutions Pt 2
  •    Outro

VMWare vSphere 6.7 Fundamentals Course Content

Chapter 1: Course Introduction and Methodology

  •    1.1
  •    1.2
  •    1.3

Chapter 2: Virtualization Overview

  •    2.1
  •    2.2

Chapter 3: Planning and Installing ESXi

  •    3.1
  •    3.2
  •    3.3
  •    3.4
  •    3.5
  •    3.6
  •    3.7

Chapter 4: Using tools to Administer a VMware Environment

  •    4.1
  •    4.2
  •    4.3

Chapter 5: vCenter and Licensing

  •    5.1
  •    5.2
  •    5.3
  •    5.4
  •    5.5
  •    5.6
  •    5.7

Chapter 6: Configuring Networking

  •    6.1
  •    6.2
  •    6.3

Chapter 7: Configuring Storage

  •    7.1
  •    7.2
  •    7.3
  •    7.4
  •    7.5
  •    7.6

Chapter 8: VM Creation, Configuration, and Snapshots

  •    8.1
  •    8.2
  •    8.3
  •    8.4
  •    8.5
  •    8.6
  •    8.7
  •    8.8
  •    8.9

Chapter 9: Security and Permissions

  •    9.1a
  •    9.1b
  •    9.1c
  •    9.2
  •    9.3
  •    9.4

Chapter 10: Host and VM Monitoring

  •    10.1
  •    10.2a
  •    10.2b
  •    10.3
  •    10.4
  •    10.5
  •    10.6

Chapter 11: Advanced ESXi and vCenter Server Management

  •    11.1
  •    11.2
  •    11.3
  •    11.4
  •    11.5
  •    11.6

Chapter 12: Patching and Upgrading ESXi

  •    12.1a
  •    12.1b
  •    12.2a
  •    12.2b

Chapter 13: Disaster Recovery and Backup

  •    13.1
  •    13.2
  •    13.3
  •    13.4

Microsoft 70-347: Enabling Office 365 Services Course Content

Module 1: Technology Review

  •    Introduction
  •    Active Directory Install And Configure
  •    PowerShell Primer
  •    Microsoft Exchange Server Install And Configure - Part 1
  •    Microsoft Exchange Server Install And Configure - Part 2
  •    Review Cloud Computing - Part 1
  •    Review Cloud Computing - Part 2
  •    Review Virtualization And The Cloud - Part 1
  •    Review Virtualization And The Cloud - Part 2
  •    Review Virtualization And The Cloud - Part 3

Module 2: Device Management

  •    Client Devices
  •    Demo Client Device Setup - Part 1
  •    Demo Client Device Setup - Part 2
  •    Office 365 Client Deployment
  •    Office 365 Components
  •    Office 365 Deployment Methods
  •    Office 365 Cloud Deployment Methods
  •    Office 365 Deployment Prerequisites
  •    Office 365 Deployment Readiness
  •    Office 365 Deployment Network Environment

Module 3: Office 365 Deployment Plan

  •    Network Planning
  •    Internet Network Usage Planning
  •    Network Device Planning
  •    Account Management Planning - Part 1
  •    Account Management Planning - Part 2
  •    Migration And Coexistence Options
  •    Single Sign On Architecture
  •    Demo Server 2012 Core With Active Directory Role

Module 4: Windows Azure

  •    SharePoint 2013 Using Windows Azure - Part 1
  •    SharePoint 2013 Using Windows Azure - Part 2
  •    SharePoint 2013 Capabilities

Module 5: PowerShell

  •    Scripting And PowerShell - Part 1
  •    Scripting And PowerShell - Part 2
  •    PowerShell Scripting Techniques - Part 1
  •    PowerShell Scripting Techniques - Part 2
  •    Enterprise Ready Scripts - Part 1
  •    Enterprise Ready Scripts - Part 2
  •    PowerShell Scripting Syntax - Part 1
  •    PowerShell Scripting Syntax - Part 2
  •    PowerShell Scripting Active Directory - Part 1
  •    PowerShell Scripting Active Directory - Part 2
  •    PowerShell Remoting
  •    PowerShell Adding Bulk Users In AD

Module 6: SQL Server

  •    Introduction To SQL Queries
  •    SQL Queries - Part 1
  •    SQL Queries - Part 2
  •    DML And DDL - Part 1
  •    DML And DDL - Part 2
  •    DDL
  •    SQL Server And PowerShell
  •    SQL Server PowerShell And AD
  •    Logging Data In SQL Server Using PowerShell

Module 7: Azure Lync and SharePoint

  •    Azure Active Directory Fundamentals - Part 1
  •    Azure Active Directory Fundamentals - Part 2
  •    Deploying Lync Server - Part 1
  •    Deploying Lync Server - Part 2
  •    Deploying Lync Server - Part 3
  •    SharePoint Designer
  •    Backup And Restore Share Point
  •    Windows PowerShell And SharePoint
  •    Identity Service With Active Directory
  •    Setup And Deploy Exchange

Module 8: Course Review

  •    Review Virtualization
  •    Review Cloud
  •    Review Automation Using PowerShell
  •    Review Desktop Applications
  •    Move To Office 365
  •    Conclusion

CompTIA CV0-001: CompTIA Cloud + Course Content

Module 1

  •    Introduction
  •    Models-Part 1
  •    Models-Part 2
  •    Service And Delivery Models
  •    Terms And Characteristics
  •    Objects Storage Concepts

Module 2

  •    Virtualization
  •    Install Configure Manage VM And Devices
  •    Backups
  •    Virtual Disks
  •    Virtual Switches
  •    Virtual Resource Migration
  •    Benefits Of Virtualization In A Cloud Environment
  •    Compare And Contrast Virtua lEnvironment

Module 3

  •    Infrastructure
  •    Different Access Protocols
  •    Explain Storage Configuration
  •    File Systems Types
  •    Executing Storage Provisioning
  •    Network Share Demo
  •    Implement Appropriate Network Configurations
  •    Importance Of Network Optimization
  •    Troubleshoot Basic Network Configuration-Part 1
  •    Troubleshoot Basic Network Configuration-Part 2
  •    Troubleshoot Commands-Part 1
  •    Troubleshoot Commands-Part 2
  •    Troubleshoot Commands-Part 3
  •    Explain Common Network Protocols
  •    Common Hardware Resources

Module 4

  •    Resource Management-Part 1
  •    Resource Management-Part 2
  •    Establishing Baselines And Thresholds
  •    Appropriately Allocate Physical Host Resources-Part 1
  •    Appropriately Allocate Physical Host Resources-Part 2
  •    Appropriately Allocate Virtual Guest Resources-Part 1
  •    Appropriately Allocate Virtual Guest Resources-Part 2
  •    Use Appropriate Tools For Remote Access

Module 5

  •    Security-Part 1
  •    Security-Part 2
  •    Storage Security Concepts And Methods
  •    Different Encryption Technologies
  •    Identify Access Control Methods

Module 6

  •    Systems Management-Part 1
  •    Systems Management-Part 2
  •    Diagnose Remediate And Optimize-Part 1
  •    Diagnose Remediate And Optimize-Part 2
  •    Common Performance Concepts-Part 1
  •    Common Performance Concepts-Part 2
  •    Testing Techniques

Module 7

  •    Business Continuity In Cloud-Part 1
  •    Business Continuity In Cloud-Part 2
  •    Solutions To Meet Availability Requirements
  •    Conclusion

Cloud Computing Security Knowledge (CCSK) Course Content

Module 1: Architecture

  •    Cloud Security Overview-Part1
  •    Cloud Security Overview-Part2
  •    Cloud Diagrams
  •    Cloud Services

Module 2: Governance and Enterprise Risk

  •    Risk Management
  •    Corporate Governance
  •    Enterprise Risk Management
  •    Risk Management Balance Process Supply Chain Security
  •    ERM Incidents Recommendations-Part1
  •    ERM Incidents Recommendations-Part2
  •    ERM Incidents Recommendations-Part3

Module 3: Legal Issues- Contracts and Electronic

  •    Cloud Legal Issues-Part1
  •    Cloud Legal Issues-Part2
  •    Cloud Legal Issues-Part3

Module 4: Compliance and Audit Management

  •    Audits
  •    Compliance And Audit
  •    Audit Recommendations
  •    Audit Requirements

Module 5: Information Management and Data Security

  •    Information And Security
  •    Storage
  •    Information Governance Classification
  •    Data Security
  •    Protecting Data Moving
  •    Client Database Encryption
  •    PaaS Encryption

Module 6: Interoperability and Portability

  •    Interoperability And Portability
  •    Interoperability Recommendations
  •    Portability Recommendations
  •    Recommendations SAAS

Module 7: Traditional Security, Business Continuity, and Disaster Recovery

  •    Business Continuity And Disaster Recovery
  •    Assessing CSP Security
  •    Equipment Maintenance
  •    Recommendations

Module 8: Data Center Operations

  •    Data Center Operations

Module 9: Incident Response

  •    Incident Response
  •    Testing
  •    IaaS
  •    C.E.R.- Containment, Eradication, And Recovery

Module 10: Application Security

  •    Application Security
  •    Security Testing
  •    Audit Compliance
  •    Security Assurance Recommendations

Module 11: Encryption and Key Management

  •    Encryption And Key Management
  •    Content Aware Encryption
  •    Storage Of Keys

Module 12: Identity, Entitlement, and Access Management

  •    Building Access Control
  •    Intro To Identity
  •    Entitlement Process
  •    Trust With Identity
  •    Recommendations For Identity Management

Module 13: Virtualization

  •    Virtualization
  •    Hypervisor And Virtual Machine
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Virtual Machine Recommendations And Requirements

Module 14: Security as a Service

  •    Security As A Service
  •    Security Offerings
  •    Intrusion Detection Prevention
  •    Business Continuity And Disaster Recovery
  •    European CCSK
  •    Top Security Benefits
  •    European Legal Based Issues

CompTIA Cloud Overview Course Content

Domain 1 - Characteristics of Cloud Services from a Business Perspect

  •    Overview
  •    History
  •    The Three Delivery Model Architecture
  •    SaaS
  •    Justification For Cloud
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    On Demand Self-Service
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations

Domain 2 - Cloud Computing and Business Value

  •    Reasons For Cloud-Agility-Part1
  •    Reasons For Cloud-Agility-Part2
  •    New Business Opportunities

Domain 3 - Technical Perspectives/Cloud Types

  •    Technical Perspectives Cloud Types
  •    Sources
  •    Security Risk
  •    Technical Risk And Solutions

Domain 4 - Steps to Successful Adoption of Cloud

  •    Steps To Adopting Cloud-Part1
  •    Steps To Adopting Cloud-Part2
  •    Steps To Adopting Cloud-Part3

Domain 5 - Impact and Changes of Cloud Computing on IT Service Management

  •    Information Security Management System-Part1
  •    Information Security Management System-Part2

Domain 6 - Risks and Consequences of Cloud Computing

  •    Information Management And Security-Part1
  •    Information Management And Security-Part2
  •    The Data Security LifeCycle
  •    Governance
  •    Data Loss Prevention-Part1
  •    Data Loss Prevention-Part2
  •    Protecting Data
  •    Risk Management-Part1
  •    Risk Management-Part2
  •    Risk Management-Part3
  •    Risk Management-Part4
  •    Risk Management-Part5
  •    Recommendations-Part1
  •    Recommendations-Part2
  •    IT Governance
  •    Audit
  •    Recommendations For Audit-Part1
  •    Recommendations For Audit-Part2

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms

EXIN Cloud Computing Course Content

Module 1: The principles of CC

  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities

Module 2: Implementing and Managing CC

  •    Implementing And Managing Cloud Computing

Module 3: Using the Cloud

  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services

Module 4: Security and Compliance

  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation

Module 5: Evaluation of CC

  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms
Add a review
Currently, we are not accepting new reviews
4.8
Based on 81 reviews
1-5 of 81 reviews
  1. SJ

    good

  2. AA
  3. K
  4. BO
  5. A

    Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.

Your Training Instructors

Tom Kinser

Tom Kinser

IT Instructor

Tom has years of experience building software for health insurance providers, medical providers, retail businesses, manufacturing, and both federal and state governments. His experience includes roles as software designer, developer and data analyst for Blue Cross Blue Shield of GA, Federated Stores (now Macy's), Tull Metals, Hughston Orthopaedic Clinc, and Director of IT for Health Images Inc. More recently he developed cash management software for the USDA Forest Service and Bureau of Land Management.

Tom enjoys teaching. He continues to help students and fellow employees learn the latest technologies to further their careers. Tom has been a Microsoft Certified Trainer since 1996 and has instructed thousands of students worldwide. He teaches courses related to application design, coding, security, database administration and cloud services.

Sean McAuthor

Sean McAuthor

IT Instructor

David Biggers

David Biggers

IT Instructor

David has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Jr. Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Additionally, David taught part-time during the evening at the college, where he instructed on Active Directory, Introduction to Computers, and Networking. David has 18 years of IT experience, 17 professional IT certifications, and 8 years of teaching experience.

default-course image

Subscribe To All-Access
Lock In $16.99 / Month Forever

Gain access to this training and all our other courses with our cost-effective monthly subscription. No obligations. Cancel anytime.

$49.99 $16.99 Monthly

OR

$49.00

today Only: 1-Year For $79.00!

Get 1-year full access to every course, over 2,600 hours of focused IT training, 20,000+ practice questions at an incredible price of only $79.00

Learn CompTIA, Cisco, Microsoft, AI, Project Management & More...