Give The Gift of Learning
25% off Winter Sale!

Days
Hours
Minutes

Use coupon code: 25learn

Infrastructure/Cloud Admin Bundle

$999.00

SKU infrastructure-cloud-bundle Category
 

Course overview

91  HOURS OF TRAINING
403 VIDEOS
59  SKILLS
606 PRACTICE QUESTIONS

Managing infrastructure has taken on a new approach over the years. Companies are moving more and more into server virtualization and cloud infrastructure. This training bundle provides students with a wide array of options and information related to managing server virtualization and/or cloud-based infrastructures. The following 7 courses are included in this training bundle.

  • Microsoft AZ-203: Developing Solutions for Microsoft Azure
  • VMWare vSphere 6.7 Fundamentals
  • CompTIA Cloud+ CV0-001
  • Cloud Computing Security Knowlege (CCSK)
  • CompTIA Cloud Overview
  • Exin Cloud Computing
  • Microsoft 70-347: Enabling Office 365 Service

This bundle includes more 75 hours of on-demand training and includes test quizzes to help student ensure they are retaining the knowledge being provided in the course content.

Microsoft AZ-203: Developing Solutions for Microsoft Azure Course Outline

Module 1: Implement VM Solutions
  •    Intro
  •    Implement VM Solutions Pt 1
  •    Implement VM Solutions Pt 2
  •    Implement VM Solutions Pt 3
  •    Implement VM Solutions Pt 4
  •    Implement Batch Jobs Using AZ Batch Services
  •    Create Containerized Solutions Pt 1
  •    Create Containerized Solutions Pt 2
Module 2: Develop Azure Platform as a Service
  •    Develop Azure Platform as a Service (PaaS) Pt 1
  •    Develop Azure Platform as a Service (PaaS) Pt 2
  •    Develop Azure Platform as a Service (PaaS) Pt 3
  •    Develop Azure Platform as a Service (PaaS) Demo Pt 1
  •    Develop Azure Platform as a Service (PaaS) Demo Pt 2
  •    Create Azure App Service Mobile Apps
  •    Create Azure App Service API Apps
  •    Implement Azure Functions Pt 1
  •    Implement Azure Functions Pt 2
Module 3: Develop for Azure Storage
  •    Develop for Azure Storage Pt 1
  •    Develop for Azure Storage Pt 2
  •    Develop for Azure Storage Pt 3
  •    Develop Solutions that use Azure Cosmos DB Pt 1
  •    Develop Solutions that use Azure Cosmos DB Pt 2
  •    Develop Solutions that use Relational Database Pt 1
  •    Develop Solutions that use Relational Database Pt 2
  •    Develop Solutions that use Microsoft Blob Storage
Module 4: Implement Azure Security
  •    Implement Azure Security Pt 1
  •    Implement Azure Security Pt 2
  •    Implement Azure Security Pt 3
  •    Implementing Access Control Pt 1
  •    Implementing Access Control Pt 2
  •    Implementing Secure Data Solutions
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
  •    Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
  •    Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
  •    Develop for Code Scalability
  •    Instrument Solutions to Support Monitoring and Logging
  •    Integrate Caching and Content Delivery Pt 1
  •    Integrate Caching and Content Delivery Pt 2
Module 6: Connect to and Consume Azure and Third Party Services
  •    Connect to and Consume Azure and Third Party Services Pt 1
  •    Connect to and Consume Azure and Third Party Services Pt 2
  •    Working with Azure Search
  •    Azure API Management
  •    Develop Event Based Solutions Pt 1
  •    Develop Event Based Solutions Pt 2
  •    Develop Message Based Solutions Pt 1
  •    Develop Message Based Solutions Pt 2
  •    Outro

VMWare vSphere 6.7 Fundamentals Course Outline

Chapter 1: Course Introduction and Methodology
  •    1.1
  •    1.2
  •    1.3
Chapter 2: Virtualization Overview
  •    2.1
  •    2.2
Chapter 3: Planning and Installing ESXi
  •    3.1
  •    3.2
  •    3.3
  •    3.4
  •    3.5
  •    3.6
  •    3.7
Chapter 4: Using tools to Administer a VMware Environment
  •    4.1
  •    4.2
  •    4.3
Chapter 5: vCenter and Licensing
  •    5.1
  •    5.2
  •    5.3
  •    5.4
  •    5.5
  •    5.6
  •    5.7
Chapter 6: Configuring Networking
  •    6.1
  •    6.2
  •    6.3
Chapter 7: Configuring Storage
  •    7.1
  •    7.2
  •    7.3
  •    7.4
  •    7.5
  •    7.6
Chapter 8: VM Creation, Configuration, and Snapshots
  •    8.1
  •    8.2
  •    8.3
  •    8.4
  •    8.5
  •    8.6
  •    8.7
  •    8.8
  •    8.9
Chapter 9: Security and Permissions
  •    9.1a
  •    9.1b
  •    9.1c
  •    9.2
  •    9.3
  •    9.4
Chapter 10: Host and VM Monitoring
  •    10.1
  •    10.2a
  •    10.2b
  •    10.3
  •    10.4
  •    10.5
  •    10.6
Chapter 11: Advanced ESXi and vCenter Server Management
  •    11.1
  •    11.2
  •    11.3
  •    11.4
  •    11.5
  •    11.6
Chapter 12: Patching and Upgrading ESXi
  •    12.1a
  •    12.1b
  •    12.2a
  •    12.2b
Chapter 13: Disaster Recovery and Backup
  •    13.1
  •    13.2
  •    13.3
  •    13.4

Microsoft 70-347: Enabling Office 365 Services Course Outline

Module 1: Technology Review
  •    Introduction
  •    Active Directory Install And Configure
  •    PowerShell Primer
  •    Microsoft Exchange Server Install And Configure - Part 1
  •    Microsoft Exchange Server Install And Configure - Part 2
  •    Review Cloud Computing - Part 1
  •    Review Cloud Computing - Part 2
  •    Review Virtualization And The Cloud - Part 1
  •    Review Virtualization And The Cloud - Part 2
  •    Review Virtualization And The Cloud - Part 3
Module 2: Device Management
  •    Client Devices
  •    Demo Client Device Setup - Part 1
  •    Demo Client Device Setup - Part 2
  •    Office 365 Client Deployment
  •    Office 365 Components
  •    Office 365 Deployment Methods
  •    Office 365 Cloud Deployment Methods
  •    Office 365 Deployment Prerequisites
  •    Office 365 Deployment Readiness
  •    Office 365 Deployment Network Environment
Module 3: Office 365 Deployment Plan
  •    Network Planning
  •    Internet Network Usage Planning
  •    Network Device Planning
  •    Account Management Planning - Part 1
  •    Account Management Planning - Part 2
  •    Migration And Coexistence Options
  •    Single Sign On Architecture
  •    Demo Server 2012 Core With Active Directory Role
Module 4: Windows Azure
  •    SharePoint 2013 Using Windows Azure - Part 1
  •    SharePoint 2013 Using Windows Azure - Part 2
  •    SharePoint 2013 Capabilities
Module 5: PowerShell
  •    Scripting And PowerShell - Part 1
  •    Scripting And PowerShell - Part 2
  •    PowerShell Scripting Techniques - Part 1
  •    PowerShell Scripting Techniques - Part 2
  •    Enterprise Ready Scripts - Part 1
  •    Enterprise Ready Scripts - Part 2
  •    PowerShell Scripting Syntax - Part 1
  •    PowerShell Scripting Syntax - Part 2
  •    PowerShell Scripting Active Directory - Part 1
  •    PowerShell Scripting Active Directory - Part 2
  •    PowerShell Remoting
  •    PowerShell Adding Bulk Users In AD
Module 6: SQL Server
  •    Introduction To SQL Queries
  •    SQL Queries - Part 1
  •    SQL Queries - Part 2
  •    DML And DDL - Part 1
  •    DML And DDL - Part 2
  •    DDL
  •    SQL Server And PowerShell
  •    SQL Server PowerShell And AD
  •    Logging Data In SQL Server Using PowerShell
Module 7: Azure Lync and SharePoint
  •    Azure Active Directory Fundamentals - Part 1
  •    Azure Active Directory Fundamentals - Part 2
  •    Deploying Lync Server - Part 1
  •    Deploying Lync Server - Part 2
  •    Deploying Lync Server - Part 3
  •    SharePoint Designer
  •    Backup And Restore Share Point
  •    Windows PowerShell And SharePoint
  •    Identity Service With Active Directory
  •    Setup And Deploy Exchange
Module 8: Course Review
  •    Review Virtualization
  •    Review Cloud
  •    Review Automation Using PowerShell
  •    Review Desktop Applications
  •    Move To Office 365
  •    Conclusion

CompTIA CV0-001: CompTIA Cloud + Course Outline

Module 1
  •    Introduction
  •    Models-Part 1
  •    Models-Part 2
  •    Service And Delivery Models
  •    Terms And Characteristics
  •    Objects Storage Concepts
Module 2
  •    Virtualization
  •    Install Configure Manage VM And Devices
  •    Backups
  •    Virtual Disks
  •    Virtual Switches
  •    Virtual Resource Migration
  •    Benefits Of Virtualization In A Cloud Environment
  •    Compare And Contrast Virtua lEnvironment
Module 3
  •    Infrastructure
  •    Different Access Protocols
  •    Explain Storage Configuration
  •    File Systems Types
  •    Executing Storage Provisioning
  •    Network Share Demo
  •    Implement Appropriate Network Configurations
  •    Importance Of Network Optimization
  •    Troubleshoot Basic Network Configuration-Part 1
  •    Troubleshoot Basic Network Configuration-Part 2
  •    Troubleshoot Commands-Part 1
  •    Troubleshoot Commands-Part 2
  •    Troubleshoot Commands-Part 3
  •    Explain Common Network Protocols
  •    Common Hardware Resources
Module 4
  •    Resource Management-Part 1
  •    Resource Management-Part 2
  •    Establishing Baselines And Thresholds
  •    Appropriately Allocate Physical Host Resources-Part 1
  •    Appropriately Allocate Physical Host Resources-Part 2
  •    Appropriately Allocate Virtual Guest Resources-Part 1
  •    Appropriately Allocate Virtual Guest Resources-Part 2
  •    Use Appropriate Tools For Remote Access
Module 5
  •    Security-Part 1
  •    Security-Part 2
  •    Storage Security Concepts And Methods
  •    Different Encryption Technologies
  •    Identify Access Control Methods
Module 6
  •    Systems Management-Part 1
  •    Systems Management-Part 2
  •    Diagnose Remediate And Optimize-Part 1
  •    Diagnose Remediate And Optimize-Part 2
  •    Common Performance Concepts-Part 1
  •    Common Performance Concepts-Part 2
  •    Testing Techniques
Module 7
  •    Business Continuity In Cloud-Part 1
  •    Business Continuity In Cloud-Part 2
  •    Solutions To Meet Availability Requirements
  •    Conclusion

Cloud Computing Security Knowledge (CCSK) Course Outline

Module 1: Architecture
  •    Cloud Security Overview-Part1
  •    Cloud Security Overview-Part2
  •    Cloud Diagrams
  •    Cloud Services
Module 2: Governance and Enterprise Risk
  •    Risk Management
  •    Corporate Governance
  •    Enterprise Risk Management
  •    Risk Management Balance Process Supply Chain Security
  •    ERM Incidents Recommendations-Part1
  •    ERM Incidents Recommendations-Part2
  •    ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
  •    Cloud Legal Issues-Part1
  •    Cloud Legal Issues-Part2
  •    Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
  •    Audits
  •    Compliance And Audit
  •    Audit Recommendations
  •    Audit Requirements
Module 5: Information Management and Data Security
  •    Information And Security
  •    Storage
  •    Information Governance Classification
  •    Data Security
  •    Protecting Data Moving
  •    Client Database Encryption
  •    PaaS Encryption
Module 6: Interoperability and Portability
  •    Interoperability And Portability
  •    Interoperability Recommendations
  •    Portability Recommendations
  •    Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
  •    Business Continuity And Disaster Recovery
  •    Assessing CSP Security
  •    Equipment Maintenance
  •    Recommendations
Module 8: Data Center Operations
  •    Data Center Operations
Module 9: Incident Response
  •    Incident Response
  •    Testing
  •    IaaS
  •    C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
  •    Application Security
  •    Security Testing
  •    Audit Compliance
  •    Security Assurance Recommendations
Module 11: Encryption and Key Management
  •    Encryption And Key Management
  •    Content Aware Encryption
  •    Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
  •    Building Access Control
  •    Intro To Identity
  •    Entitlement Process
  •    Trust With Identity
  •    Recommendations For Identity Management
Module 13: Virtualization
  •    Virtualization
  •    Hypervisor And Virtual Machine
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
  •    Security As A Service
  •    Security Offerings
  •    Intrusion Detection Prevention
  •    Business Continuity And Disaster Recovery
  •    European CCSK
  •    Top Security Benefits
  •    European Legal Based Issues

CompTIA Cloud Overview Course Outline

Domain 1 - Characteristics of Cloud Services from a Business Perspect
  •    Overview
  •    History
  •    The Three Delivery Model Architecture
  •    SaaS
  •    Justification For Cloud
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    On Demand Self-Service
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
Domain 2 - Cloud Computing and Business Value
  •    Reasons For Cloud-Agility-Part1
  •    Reasons For Cloud-Agility-Part2
  •    New Business Opportunities
Domain 3 - Technical Perspectives/Cloud Types
  •    Technical Perspectives Cloud Types
  •    Sources
  •    Security Risk
  •    Technical Risk And Solutions
Domain 4 - Steps to Successful Adoption of Cloud
  •    Steps To Adopting Cloud-Part1
  •    Steps To Adopting Cloud-Part2
  •    Steps To Adopting Cloud-Part3
Domain 5 - Impact and Changes of Cloud Computing on IT Service Management
  •    Information Security Management System-Part1
  •    Information Security Management System-Part2
Domain 6 - Risks and Consequences of Cloud Computing
  •    Information Management And Security-Part1
  •    Information Management And Security-Part2
  •    The Data Security LifeCycle
  •    Governance
  •    Data Loss Prevention-Part1
  •    Data Loss Prevention-Part2
  •    Protecting Data
  •    Risk Management-Part1
  •    Risk Management-Part2
  •    Risk Management-Part3
  •    Risk Management-Part4
  •    Risk Management-Part5
  •    Recommendations-Part1
  •    Recommendations-Part2
  •    IT Governance
  •    Audit
  •    Recommendations For Audit-Part1
  •    Recommendations For Audit-Part2

EXIN Cloud Computing Course Outline

Module 1: The principles of CC
  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities
Module 2: Implementing and Managing CC
  •    Implementing And Managing Cloud Computing
Module 3: Using the Cloud
  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services
Module 4: Security and Compliance
  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation
Module 5: Evaluation of CC
  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms

EXIN Cloud Computing Course Outline

Module 1: The principles of CC
  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities
Module 2: Implementing and Managing CC
  •    Implementing And Managing Cloud Computing
Module 3: Using the Cloud
  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services
Module 4: Security and Compliance
  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation
Module 5: Evaluation of CC
  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms

EXIN Cloud Computing Course Outline

Module 1: The principles of CC
  •    EXIN Overview-Part 1
  •    EXIN Overview-Part 2
  •    EXIN Overview 2-Part 1
  •    EXIN Overview 2-Part 2
  •    The Basics
  •    History Of Cloud
  •    Delivery Model Architectures
  •    Software As A Service
  •    Justification For Cloud Computing
  •    Confidentiality And Availability
  •    Concepts From NIST
  •    Important Characteristics
  •    Broad Network Access
  •    Resource Pooling
  •    Measured Service
  •    Service Models
  •    Terms Of Service
  •    Recommendations
  •    Virtualization
  •    Virtualization Concepts
  •    Inter-Virtual Machine Attacks
  •    Virtual Machine Encryption
  •    Recommendations
  •    Service Models
  •    Business Process
  •    Outsourcing
  •    Software As A Service-Part 1
  •    Software As A Service-Part 2
  •    Risks And Recommendations
  •    Platform As A Service
  •    PaaS Considerations
  •    PaaS Issues
  •    Infrastructure As A Service
  •    Scope Of Control
  •    IaaS Benefits
  •    IaaS Issues And Concerns
  •    IaaS Recommendations
  •    Services Oriented Architecture
  •    Web Services
  •    Infrastructure On Demand
  •    Why Cloud
  •    Collaborative Working
  •    New Business Opportunities
Module 2: Implementing and Managing CC
  •    Implementing And Managing Cloud Computing
Module 3: Using the Cloud
  •    Relevent Technologies In Cloud
  •    Storage Devices-Part 1
  •    Storage Devices-Part 2
  •    Application Programming Interfaces
  •    Traditional Software Model
  •    Impact Of Cloud On Users
  •    Providing Cloud Services
  •    Developing Added Services-Part 1
  •    Developing Added Services-Part 2
  •    Using Cloud Services
Module 4: Security and Compliance
  •    Threats And Controls
  •    Malicious Insiders
  •    Insiders Remediation
Module 5: Evaluation of CC
  •    Why Cloud
  •    Resource Scaling
  •    Quality
  •    Thin Clients
  •    Buying Cloud Services
  •    Pay As You Go Vs Ownership
  •    Establishing Requirements
  •    Contract Terms
ITU Learning Management System Image