IT Pro Training Bundle
This ITU Bundle unlocks a world of potential for you to become proficient in the cloud sector, mobile devices and project management. With 5 valuable certification courses included in this bundle, you will have unlimited access to CCSK, EXIN Cloud+, Mobility+ and CAPM training.
Included In This Course
Closed Captions
Certificate of Completion
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Certified Associate in Project Management (CAPM) (R) Course Content
Module 1: Overview
- Overview Part 1
- Overview Part 2
- Overview Part 3
- Introduction
Module 2: Organizational Influences and Project Life Cycle
- Organizational Structures And ProcessPart1
- Organizational Structures And ProcessPart2
Module 3: Project Management Process
- Project Management Process-Part1
- Project Management Process-Part2
- Project Management Process Questions
Module 4: Project Integration Management
- Project Integration Management-Part1
- Project Integration Management-Part2
- Project Integration Management-Part3
- Project Integration Management Questions
Module 5: Project Scope Management
- Project Scope Management
- Define Scope
- Create WBS
- Validate Scope
- Project Scope Management Questions
Module 6: Project Time Management
- Project Time Management-Part1
- Project Time Management-Part2
- Project Time Management-Part3
- Project Time Management-Part4
- Project Time Management-Part5
- Develop Schedule-Part1
- Develop Schedule-Part2
- Develop Schedule-Part3
- Develop Schedule-Part4
- Develop Schedule-Part5
- Develop Schedule Questions
Module 7: Project Cost Management
- Project Cost Management-Part1
- Project Cost Management-Part2
- Project Cost Management-Part3
- Project Cost Management-Part4
- Project Cost Management-Part5
- Project Cost Management Questions
Module 8: Project Quality Management
- ProjectQualityManagementPart1
- ProjectQualityManagementPart2
- ProjectQualityManagementPart3
- ProjectQualityManagementPart4
- ProjectQualityManagementQuestions
Module 9: Project Human Resource Management
- Project Human Resource Management-Part1
- Project Human Resource Management-Part2
- Project Human Resource Management-Part3
- Project Human Resource Management Questions
Module 10: Project Communications Management
- Project Communications Management-Part1
- Project Communications Management-Part2
- Project Communications Management Questions
Module 11: Project Risk Management
- Project Risk Management Part 1
- Project Risk Management Part 2
- Project Risk Management Part 3
- Project Risk Management Part 4
- Project Risk Management Part 5
- Project Risk Management Part 6
- Project Risk Management Part 7
- Project Risk Management Questions
Module 12: Project Procurement Management
- Project Procurement Management-Part1
- Project Procurement Management-Part2
- Project Procurement Management-Part3
- Project Procurement Management-Part4
- Project Procurement Management-Part5
Module 13: Project Stakeholder Management
- Project Stakeholder Management-Part1
- Project Stakeholder Management-Part2
- Project Stakeholder Management Questions
Module 14: Professional Responsibility
- Professional Responsibility
Module 15: Preparing For Exam
- Preparing For Exam
- Outro
CompTIA MB0-001: Mobility+ Course Content
Module 1: Over-The-Air Technologies
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
Module 2: Network Infrastructure
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
Module 3: Mobile Device Manager
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
Module 4: Security
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
Module 5: Troubleshooting
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
Cloud Computing Security Knowledge (CCSK) Course Content
Module 1: Architecture
- Cloud Security Overview-Part1
- Cloud Security Overview-Part2
- Cloud Diagrams
- Cloud Services
Module 2: Governance and Enterprise Risk
- Risk Management
- Corporate Governance
- Enterprise Risk Management
- Risk Management Balance Process Supply Chain Security
- ERM Incidents Recommendations-Part1
- ERM Incidents Recommendations-Part2
- ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
- Cloud Legal Issues-Part1
- Cloud Legal Issues-Part2
- Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
- Audits
- Compliance And Audit
- Audit Recommendations
- Audit Requirements
Module 5: Information Management and Data Security
- Information And Security
- Storage
- Information Governance Classification
- Data Security
- Protecting Data Moving
- Client Database Encryption
- PaaS Encryption
Module 6: Interoperability and Portability
- Interoperability And Portability
- Interoperability Recommendations
- Portability Recommendations
- Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- Business Continuity And Disaster Recovery
- Assessing CSP Security
- Equipment Maintenance
- Recommendations
Module 8: Data Center Operations
- Data Center Operations
Module 9: Incident Response
- Incident Response
- Testing
- IaaS
- C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
- Application Security
- Security Testing
- Audit Compliance
- Security Assurance Recommendations
Module 11: Encryption and Key Management
- Encryption And Key Management
- Content Aware Encryption
- Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
- Building Access Control
- Intro To Identity
- Entitlement Process
- Trust With Identity
- Recommendations For Identity Management
Module 13: Virtualization
- Virtualization
- Hypervisor And Virtual Machine
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
- Security As A Service
- Security Offerings
- Intrusion Detection Prevention
- Business Continuity And Disaster Recovery
- European CCSK
- Top Security Benefits
- European Legal Based Issues
CompTIA Cloud Overview Course Content
Domain 1 - Characteristics of Cloud Services from a Business Perspect
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
Domain 2 - Cloud Computing and Business Value
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
Domain 3 - Technical Perspectives/Cloud Types
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
Domain 4 - Steps to Successful Adoption of Cloud
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
Domain 5 - Impact and Changes of Cloud Computing on IT Service Management
- Information Security Management System-Part1
- Information Security Management System-Part2
Domain 6 - Risks and Consequences of Cloud Computing
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
5 star | 82 | 82% |
4 star | 17 | 17% |
3 star | 1 | 1% |
2 star | 0% | |
1 star | 0% |
Sorry, no reviews match your current selections
Your Training Instructors
Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.
Chris is a Sr. Cisco Instructor and leading consultant for clients throughout the U.S. Chris has over 15 years’ experience as a network engineer and 5 additional years as an instructor. Chris has worked at the service provider/partner level throughout his career, working with national and global clients to solve complex business problems through the use of technology and IT training solutions. Working with Chris, you will see a true industry expert with experience, drive, and patience unparalleled in the industry.
Subscribe To All-Access
Lock In $16.99 / Month Forever
Access this course and over 2,700 hours of focused IT training. Start your first month for only $1.00. Then lock in only $16.99 / month for life.
- Get Every Course
- Free Updates / New Content Added
- 2,700+ Hours of Training
- Price Lock Guarantee
- Games / Flashcards
- 21,000+ Practice Questions
$49.99 $16.99 Monthly
$49.00
good
Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.