All Access IT Training – 1 Year
The Annual All Access program offers you an affordable option to excel in your IT skillset and advance your career in IT. With access to every course ITU offers, including future courses, sign up today for our Annual All-Access program.
Included In This Course
Closed Captions
Certificate of Completion
Our One Year All Access Library Includes
- Over 225+ courses
- Over 2,500 hours of video content
- Hands On Practice Activities
- Flashcards
- Games
- Practice Exam Questions/Test
- 24/7/365 On Demand Access For 1 Year
- Industry Leading Certified Instructors
- Certificate of Completion For Each Course You Finish
Access our extensive library of over 225 courses and 2,500 hours of instructional videos, taught by our instructors who are industry certified and have over 10+ years of experience in the related field. Content can be accessed anytime to match your busy schedule.
As a 1 Year Unlimited Library All Access subscriber, you will have access to all your training material 24 hours a day, 7 days a week. You can learn at your own pace, and go back to review topics as many times as you need. Plus, our 1 Year All Access Pass includes full access to our entire course library, so you can explore new courses and topics as you continue to grow and develop your skills.
The course material is continuously updated to reflect the latest industry changes. You will have access to all new courses and updates for as long as you remain a subscriber.
Your success is our top priority and we take our responsibility as a partner in your success very seriously. Our students have a 98% first time pass rate on major certification exams.
As technology changes, ITU is focused on delivering new and updated content so as technology changes, you always have access to up-skilling your knowledge through our online training. Looking for the same great training for a team? Be sure to look at our Team Training Packages that offer even greater value for multi-user licenses.
No matter your position in the IT industry, we have something for you. Covering all the best and most widely accepted major disciplines. It adds up to thousands of hours of high-quality online-focused IT training. You can trust ITU to give you an edge in the industry.
ITU is also focused on staying up-to-date. We have a team of instructional designers that are always working on new courses and updates to existing ones. As technology changes, we want to make sure our students are getting the most relevant and useful information possible.
The bottom line: an annual subscription to ITU Online Training is one of the best investments you can make in your professional development. And, since it’s a subscription, you always have access to the latest courses and future course releases at no extra charge. So, why wait? Get started today!
Join the thousands of students who have already benefited from our All Access Library Program!
P.S. – If you’re not sure which course is right for you, our team can help! Just reach out to us at support@ituonline.com.When you sign up for our 1 Year Unlimited Online Access, you’ll get access to our exclusive IT certification training videos that will help you prep for your exams. Plus, you’ll get access to all of our current courses and future course releases during your 1 Year access period at no extra charge. We want you to succeed and we are here for you! You’ll also get downloadable assets from your courses, so you can keep them forever and reference them anytime you need them.
Sign up today and get unlimited access to everything ITU has to offer!
The Ultimate in IT Training For Leading Technologies
No matter your position in the IT industry, we have something for you. From cloud and data center operations to networking and cybersecurity, we provide training that will help you further your career.
Our comprehensive library of courses covers the most important topics in IT. Whether you’re looking to improve your skills or learn new technologies, we have the resources you need.
Why Buy A Training Library?
Purchasing a library is the most cost-effective IT training you’ll ever buy. Just a few of the best reasons are:
- Always Be Up-to-date In The IT Field – Technology changes rapidly. As it changes, you have a great resource to learn new technologies. When we update courses and add new courses, you have full access to it all without addition payment. An exclusive to ITU Online training offered by no other IT training provider.
- Train On Your Time – There are no deadlines. Train whenever and wherever you want at your own pace.
- Expand Your IT Knowledge – Even if you only focus on a single technology now, always be open to learning new technologies. If you’re proficient in Microsoft Technologies, there’s no better time to become proficient in all things Cisco. The more you know, the more marketable you and the higher salaries you can command in your field of choice.
- Quite Simply, Learning Is Fun!
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Responsible Automated Intelligence (AI) Ethics Fundamentals Course Content
Introduction - Responsible Automated Intelligence Ethics
- Course Welcome
- Instructor Introduction
Module 1: Introduction to AI Ethics
- 1.1 Introduction to AI Ethics
- 1.2 Understanding AI Ethics
- 1.3 Ethical Frameworks and Principles in AI
- 1.4 Ethical Challenges
- 1.5 Whiteboard - Key Principles of Responsible AI
Module 2: Responsible AI Development
- 2.1 Responsible AI Development - Introduction
- 2.2 Responsible AI Development - Continued
- 2.3 Bias and Fairness in AI
- 2.4 Transparency in AI
- 2.5 Demonstration - Microsoft Responsible AI
- 2.6 Accountability and Governance in AI
Module 3: Privacy and Security with AI
- 3.1 Privacy and Security in AI
- 3.2 Data Collection and Usage
- 3.3 Risks and Mitigation Strategies
- 3.4 Ethical Data Management in AI
- 3.5 Demonstration - Examples of Privacy EUL
Module 4: Social and Ethical Impacts of AI
- 4.1 Social and Ethical Impacts of AI
- 4.2 Automation and Job Displacement
- 4.3 AI and Social Good
- 4.4 Demonstration - ChatGPT
- 4.5 Demonstration - Bard
Module 5: Policy Development
- 5.1 Policy Development
- 5.2 Ethical AI Leadership Culture
- 5.3 Ethical AI Policy Elements
- 5.4 Ethical AI in a Changing Landscape
- 5.5 Course Review
- 5.6 Course Closeout
Apache Kafka Fundamentals Course Content
Apache Kafka - Introduction
- Course Introduction
- Instructor Introduction
Module 1: Overview of Apache Kafka and Common Use Cases
- 1.1 Overview and Common Use Cases
- 1.2 What is Kafka
- 1.3 Kafka History
- 1.4 Kafka Use Cases
- 1.5 Kafka APIs
- 1.6 Kafka Pub Sub Patterns
- 1.7 Whiteboard Discussion- Use Case
Module 2: Kafka Core Concepts
- 2.1 Kafka Core Concepts
- 2.2 The Importance of Event Data Streams
- 2.3 Kafka Messaging, Topics, Partitions and Segments
- 2.4 Whiteboard - Kafka Components
- 2.5 Whiteboard - Brokers and Clusters
- 2.6 Kafka Streams and Patterns
- 2.7 Whiteboard - Zookeeper and Kraft
- 2.8 Demonstration - Kafka Connect
- 2.9 Whiteboard- - Architecture Deep Dive
- 2.10 Whiteboard - Kafka Design Patterns
Module 3: Installing and Deploying Kafka
- 3.1 Installing and Deploying Kafka
- 3.2 Demonstration - Kafka Resources and Licensing
- 3.3 Demonstration - Kafka Installation Options, Considerations and Requirements
- 3.4 Demonstration - Deployment and Environment
- 3.5 Demonstration - Starting Kafka
- 3.6 Demonstration - Terminating Kafka Environment
- 3.7 Whiteboard - Connections and Processing Events
- 3.8 Additional Resources
- 3.9 Putting it all together - Course Review
Leadership for Administrative Professionals Course Content
Module 1: Core Concepts of Leadership
- 1.1 - Understanding Leadership vs. Management
- 1.2 The Importance of Leadership in Administrative Roles
- 1.3 The Role of Influence Without Authority
Module 2: Developing Personal Leadership Skills
- 2.1 Self-Assessment with SWOT
- 2.2 Identifying and Leveraging Personal Strengths
- 2.3 Recognizing Weaknesses and Overcoming Threats
- 2.4 Enhancing Emotional Intelligence
Module 3 - Communication and Building Trust
- 3.1 Essential Communication Skills for Leaders
- 3.2 Building Credibility and Trust
- 3.3 Course Closeout
CompTIA Linux+ (XK0-005) Course Content
Module 1: Performing Basic Linux Tasks
- 1.1 Introduction to Linux XK0-005
- 1.2 Instructor Introduction
- 1.3 Course Introduction
- 1.4 Identify the Linux Design Philosophy
- 1.5 Enter Shell Commands
- 1.6 Shell Commands Activity
- 1.7 Get Help with Linux
Module 2: Managing Users and Groups
- 2.1 Assume Superuser Privileges
- 2.2 Create, Modify, and Delete Users
- 2.3 Create, Modify, and Delete Groups
- 2.4 Query Users and Groups
- 2.5 Configure Account Profiles
Module 3: Managing Permissions and Ownership
- 3.1 Modify File and Directory Permissions
- 3.2 Modify File and Directory Ownership
- 3.3 Configure Special Permissions and Attributes
- 3.4 Troubleshoot Permissions Issues
Module 4: Managing Storage
- 4.1 Create Partitions
- 4.2 Manage Logical Volumes
- 4.3 Mount File Systems
- 4.4 Manage File Systems
- 4.5 Navigate the Linux Directory Structure
- 4.6 Troubleshoot Storage Issues
- 4.7 Container Storage Management
- 4.8 Advanced Data Management and Security for Containers
Module 5: Managing Files and Directories
- 5.1 Create and Edit Text Files
- 5.2 Search for Files
- 5.3 Perform Operations on Files and Directories
- 5.4 Process Text Files
- 5.5 Manipulate File Output
Module 6: Managing Kernel Modules
- 6.1 Explore the Linux Kernel
- 6.2 Install and Configure Kernel Modules
- 6.3 Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- 7.1 Configure Linux Boot Components
- 7.2 Configure GRUB
Module 8: Managing System Components
- 8.1 Configure Localization Options
- 8.2 Configure GUIs
- 8.3 Manage Services
- 8.4 Troubleshoot Process Issues
- 8.5 Troubleshoot CPU and Memory Issues
- 8.6 - Troubleshooting With systemd
Module 9: Managing Devices
- 9.1 Identify the Types of Linux Devices
- 9.2 Configure Devices
- 9.3 Monitor Devices
- 9.4 Troubleshoot Hardware Issues
Module 10: Managing Networking
- 10.1 Identify TCP-IP Fundamentals
- 10.2 Identify Linux Server Roles
- 10.3 Connect to a Network
- 10.4 Configure DHCP and DNS Client Services
- 10.5 Configure Cloud and Virtualization Technologies
- 10.6 Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- 11.1 Identify Package Managers
- 11.2 Manage RPM Packages with YUM
- 11.3 Manage Debian Packages with APT
- 11.4 Configure Repositories
- 11.5 Acquire Software
- 11.6 Build Software from Source Code
- 11.7 Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- 12.1 Implement Cybersecurity Best Practices
- 12.2 Implement Identity and Access Management Methods
- 12.3 Configure SELinux or AppArmor
- 12.4 Configure Firewalls
- 12.5 Implement Logging Services
- 12.6 Back Up, Restore, and Verify Data
- 12.7 NFTables - Setting Up Advanced Firewalls
Module 13: Working with Bash Scripts
- 13.1 Customize the Bash Shell Environment
- 13.2 Identify Scripting and Programming Fundamentals
- 13.3 Write and Execute a Simple Bash Script
- 13.4 Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- 14.1 Schedule Jobs
- 14.2 Implement Version Control Using Git
- 14.3 Identify Orchestration Concepts
Module 15: Installing Linux
- 15.1 Prepare for Linux Installation
- 15.2 Perform the Installation
Module 16 - Working With Modern IT Infrastruture
- 16.1 - Infrastruture As Code (IAC)
- 16.2 - Containers, Cloud, and Orchestration Concepts
- 16.3 - Container Management
- 16.4 - Container and Cloud Networking Basics
FinOps Fundamentals Course Content
Module 1 - Key Elements of The FinOps Framework
- 1.1 - Introduction to FinOps
- 1.2 - Overview of the FinOps Framework
- 1.3 - The FinOps Lifecycle Phases
- 1.4 - The FinOps Principles
- 1.5 - Collaboration and Accountability in FinOps
- 1.6 - FinOps Persona and Allied Personas
- 1.7 - FinOps Domains Overview
Module 2 - FinOps Domain: Cloud Usage & Cost
- 2.1 - Understand Cloud Usage & Cost Introduction
- 2.2 - Data Ingestion
- 2.3 - Cost Allocation
- 2.4 - Reporting & Analytics
- 2.5 - Anomaly Management
Module 3 - FinOps Domain: Quantify Business Value
- 3.1 - Introduction to the Quantify Business Value
- 3.2 - Planning & Estimating
- 3.3 - Forecasting
- 3.4 - Budgeting
- 3.5 - Benchmarking
Module 4 - FinOps Domain: Optimize Cloud Usage & Cost
- 4.1 - Optimizing Cloud Usage and Costs Introduction
- 4.2 - Architecting for the Cloud
- 4.3 - Rate Optimization
- 4.4 - Workload Optimization
- 4.5 - Cloud Sustainability
- 4.6 - Licensing and SaaS
Module 5 - FinOps Domain: Manage the FinOps Practice
- 5.1 - Manage the FinOps Practice Overview
- 5.2 - FinOps Practice Operations
- 5.3 - Cloud Policy & Governance
- 5.4 - FinOps Assessment
- 5.5 - FinOps Tools & Services
- 5.6 - FinOps Education and Enablement
- 5.7 - Invoicing and Chargeback
- 5.8 - Onboarding Workloads
- 5.9 - Intersecting Disciplines
Module 6 - FinOps FOCUS
- 6.1 - Introduction to FinOps FOCUS
- 6.2 - Implementing FinOps FOCUS for AWS, Google Cloud, and Micro
Module 7 - FinOps Certifications and Course Closeout
- 7.1 - Exploring the FinOps Certifications
- 7.2 - Course Closeout and Next Steps
CyberArk Fundamentals Course Content
Module 1 - Overview of Privileged Access Management (PAM)
- 1.1 - Your Complete PAM Solution
- 1.2 - Overview of CyberArk
Module 2 - CyberArk Architecture and Componets
- 2.1 - CyberArk Architecture Overview
- 2.2 - CyberArk Deployment Models
Module 3 - Working With The CyberArk Vault
- 3.1 - The CyberArk Digital Vault
- 3.2 Managing Users and Permissions
Module 4 - Privileged Account Management
- 4.1 Add and Managing PAM Accounts
- 4.2 - Password Rotation and Policy Management
Module 5 - Monitoring and Session Management
- 5.1 - Using the Privileged Session Manager (PSM)
- 5.2 - Session Monitoring and Reporting
Module 6 - Security Best Practices
- 6.1 - CyberArk Hardening and Best Practices
- 6.2 - Incident Reponse With CyberArk
Module 7 - Use Cases, Certification & Closeout
- 7.1 - Real World Use Cases of CyberArk
- 7.2 - CyberArk Certification Paths
- 7.3 - CyberArk Fundamentals Course Closeout
AI Fundamentals For Business Professionals Course Content
Introduction To AI For Business Professionals
- 01 Course Welcome
- 02 Instructor Introduction
- 03 Download Course Resources
Module 1 - Introduction to AI in Business
- 1.1 Introduction to AI in Business
- 1.2 Understanding the Basics of AI
- 1.3 Exploring the Role of AI in Business
- 1.4 Identifying the Benefits of AI in Business
- 1.5 Whiteboard - How Does AI Actually Work?
- 1.6 Demonstration - Google Bard AI
Module 2 - Implementing AI in Business
- 2.1 Implementing AI in Business
- 2.2 Preparing Your Business for AI Integration
- 2.3 Whiteboard AI Strategy
- 2.4 Identifying the Best AI Tools for Your Business
Module 3 - AI for Marketing and Sales
- 3.1 Demonstration - Hacksocial AI
- 3.2 How AI Can Help Your Marketing and Sales Efforts
- 3.3 Exploring AI-Driven Customer Insights and Targeting
- 3.4 Examples AI Sales Tools in 2023
- 3.5 Optimizing Your Marketing and Sales Strategies with AI
- 3.6 Demonstration - RegieAI Sales Workflows
Module 4 - AI Applications in Human Resources
- 4.1 AI Applications in Human Resources
- 4.2 Using AI for Talent Acquisition and Recruitment
- 4.3 Optimizing Performance Management with AI
- 4.4 Enhancing Employee Engagement with AI
- 4.5 Whiteboard - Resume Filtering with AI
Module 5 - AI for Operations and Supply Chain Managemen
- 5.1 AI for Operations and Supply Chain Management
- 5.2 How AI Can Improve Your Operations and Supply Chain Management
- 5.3 Exploring AI-Driven Predictive Maintenance and Quality Control
- 5.4 Optimizing Your Operations and Supply Chain Strategies with AI
Module 6 - AI for Finance and Accounting
- 6.1 AI for Finance and Accounting
- 6.2 How AI Can Streamline Your Finance and Accounting Processes
- 6.3 Exploring AI-Driven Fraud Detection and Risk Management
- 6.4 Personal Finance AI Applications
- 6.5 Optimizing Your Finance and Accounting Strategies with AI
- 6.6 Demonstration - Using Bing AI Chatbot for Personal Finance
Module 7 - The Future of AI in Business
- 7.1 The Future of AI in Business
- 7.2 Latest Developments in AI Technology
- 7.3 Implications of AI for Business and Society
- 7.4 Discussion - Developing an AI Strategy
Module 8 - Course Closeout
- 8.1 Course Closeout
- 8.2 Course Review
- 8.3 Course Closeout
CompTIA Data+ (DAO-001) Course Content
Introduction To CompTIA Data+
- Course Welcome
- Module Overview
- Instructor Introduction
- What is the CompTIA Data Plus Exam
- Roles that should consider the exam
- Exam Objectives
- Discussion - The Importance of Data
- US DOD Member Data Directives and 8570
Module 1 - Data Concepts and Environments
- 1.1 Module Overview
- 1.2 Understanding Data Schemes
- 1.3 Databases
- 1.4 Demonstration - Google Cloud SQL
- 1.5 Data Warehouses and Data Lakes
- 1.7 Comparing OLTP and OLAP Processing
- 1.8 Demonstration - AWS Redshift
- 1.9 Demonstration - Deploy SQL DemoBench
- 1.10 What is Column Database
- 1.11 Data Structures, Files and Types
- 1.12 Module Summary Review
- 1.13 Module Review Questions
Module 2 - Data Mining
- 2.1 Module 2 Overview
- 2.2 Data Acquisition and Integration
- 2.3 Demonstration - Data Integration Techniques
- 2.4 API Fundamentals
- 2.5 Demonstration - Google Vision API
- 2.6 Data Profiling and Cleansing
- 2.7 Data Collection Method Options
- 2.8 Data Outliers
- 2.9 Understanding ETL and ELT
- 2.10 Query Optimization
- 2.11 Understanding Data Manipulation Techniques
- 2.12 Module Summary Review
- 2.13 Module Review Questions
Module 3 - Data Analysis
- 3.1 Module Overview
- 3.2 Descriptive Statistical Methods
- 3.3 Measures of Tendency and Dispersion
- 3.4 Understanding Percentages
- 3.5 Inferential Statistical Methods
- 3.6 Hypothesis Testing with Excel
- 3.7 Whiteboard - Linear Regression and Correlation
- 3.8 Whiteboard - Analysis Testing
- 3.9 Module Summary Review
- 3.10 Module Review Questions
Module 4 - Data Visualization
- 4.10 Module Review Questions
- 4.1 Module Overview
- 4.2 Translate Business Requirements to Reports
- 4.3 Whiteboard - Translate Business Requirements
- 4.4 Dashboard Fundamentals
- 4.5 Demonstration - Dashboard Components
- 4.6 Data Sources and Attributes
- 4.7 Understanding Chart and Graphs
- 4.8 Reports Type and Elements
- 4.9 Module Summary Review
Module 5 - Data Governance, Quality and Controls
- 5.1 Module Overview
- 5.2 Introduction to Data Governance
- 5.3 The Data Lifecycle
- 5.4 Determining Data Classification
- 5.5 Data Ownership
- 5.6 Data Storage Access
- 5.7 Data Privacy and Frameworks
- 5.8 Information Rights Management (IRM) and Data Loss Prevention (DLP)
- 5.9 Setting Data Quality Control
- 5.10 Methods to Validate Quality
- 5.11 Data Transformation Tools
- 5.12 Data Security Fundamentals
- 5.13 Master Data Management (MDM)
- 5.14 Module Summary Review
- 5.15 Module Review Questions
Module 6 - Exam Preparation and Practice Exams
- 6.1 Module Overview
- 6.2 Course Summary Review
- 6.3 Data Plus Exam Experience
- 6.4 Certification CEU Requirements
- 6.5 Practice Exams-Additional Resources
- 6.6 Course Closeout
ISC(2) CC(sm) - Certified In Cybersecurity Course Content
Module 1 - Introduction and Security Concepts
- Certification Overview
- Exam Objectives
- Instructor Introduction
- ISC CiC Course Intro
- 1.0 Module 1 Overview
- 1.1.5 Password Security
- 1.1.6 Whiteboard - Multifactor Authentication (MFA)
- 1.2 Understand the risk management process
- 1.2.1 Risk Management
- 1.2.2 Risk Identification assessment and treatment
- 1.3 Understand security controls
- 1.3.1 Technical Controls
- 1.3.2 Administrative Controls
- 1.3.3 Physical Controls
- 1.3.4 Whiteboard Discussion - Controls-
- 1.3.5 Demonstration - AWS Access Controls
- 1.4 - Understand ISC2 Code of Ethics
- 1.4.1 Professional Code of Ethics
- 1.5 Understand Governance processes
- 1.5.1 Standards, Regulations, etc
- 1.5.2 Security Policies
- 1.5.3 Module Summary Review
- 1.5.4 Module Review Questions
Module 2 - Incident Response, Business Continuity and Disaster Recovery Concepts
- 2.0 Module 2 Overview
- 2.1 Understand Business Continuity
- 2.1.1 Business Continuity
- 2.1.2 Components of a Business Continuity Plan
- 2.2.1 Disaster Recovery
- 2.2.2 RTO-RPO
- 2.3 Understand Business Response
- 2.3.1 Incident Response
- 2.3.2 Post Incident Review
- 2.3.3 Module Summary Review
- 2.3.4 Module Review Questions
Module 3 - Access Control Concepts
- 3.0 Module 3 Overview
- 3.1 Understand physical access controls
- 3.1.1 Defense In Depth
- 3.1.2 Compare Physical Control Types
- 3.1.3 Monitoring Controls
- 3.2 Describe logical access controls
- 3.2.1 Logical Access controls
- 3.2.2 Principle of least privilege
- 3.2.3 Segregation of duties
- 3.2.4 Whiteboard - Access Control
- 3.2.5 Demonstration - Cloud IAM Sequence 32
- 3.2.6 Module Summary Review
- 3.2.7 Module Review Questions
Module 4- Network Security
- 4.0 Module 4 Overview
- 4.1 Understanding computer networking
- 4.1.1 Network Security Design
- 4.1.2 Whiteboard - Networking Concepts
- 4.1.3 Networking protocols and ports
- 4.1.4 Demonstration - AWS VPC
- 4.2 Understand Network Threats
- 4.2.1 Types of network (cyber) threats and attacks
- 4.2.2 Threat Actors
- 4.2.3 Tools used to identify and prevent threats
- 4.2.4 Whiteboard Discussion - DDoS attacks
- 4.3 Network Security Infrastructure
- 4.3.1 On Premises Architecture
- 4.3.2 Data Center Design Discussion
- 4.3.3 Cloud Architecture Service and Deployment Models
- 4.3.4 Managed Service Providers
- 4.3.5 Service Level Agreements (SLA)
- 4.3.6 Shared Security Model
- 4.3.7 Zero Trust
- 4.3.8 Module Summary Review
- 4.3.9 Module Review Questions
Module 5 - Security Operations
- 5.0 Module 5 Overview
- 5.1 Understand Data Security
- 5.1.1 Data Security Fundamentals
- 5.1.2 Data Handling Best Practices
- 5.1.3 Encryption
- 5.1.4 Data Security Compliance
- 5.2 Understand System Hardening
- 5.2.1 System Hardening
- 5.2.2 Configuration Management
- 5.3 Understanding Best Practice Security Policies
- 5.3.1 Common Security Policies
- 5.3.2 Demonstration - AUP
- 5.3.3 Demonstration - Privacy Policy
- 5.4 Security Awareness Training
- 5.4.1 Importance of Security Awareness Training
- 5.4.2 Social Engineering
- 5.4.3 Module Summary Review
- 5.4.4 Module Review Questions
- 5.4.5 Next Steps and Course Closeout
Windows Server 2022 - Installation and Deployments Course Content
Module 1 - Introduction To Windows Server 2022
- 1.1 - Windows Server 2022 Overview
- 1.2 - Preparing for Installation
Module 2 - Installation of Windows Server 2022
- 2.1 - Installation Methods for Windows Server 2022
- 2.2 - Performing A Clean Install
- 2.3 - Post-Installation Configurations
Module 3 - Server Roles and Features
- 3.1 - Server Roles and Features
- 3.2 - Installing Active Directory
- 3.3 - Verify and Update DNS Settings
- 3.4 - Installing DHCP
- 3.5 - Installing IIS
- 3.6 - Power of Hyper-V on Windows Server 2022
- 3.7 - Other Common Server Roles & Services
Module 4 - Deployment Tools
- 4.1 - Deployment Techniques
- 4.2 - Deploying Windows Server 2022 Using Windows Deployment Services (WDS)
- 4.3 - Using Microsoft Deployment Toolkit (MDT)
- 4.4 - SCCM Deployment
Module 5: Security and Maintenance
- 5.1 - Securing Windows Server 2022
- 5.2 - Managing Updates and Patches
- 5.3 - Monitoring and Performance Tuning
- 5.4 - Backup and Recovery
- 5.5 - Regular Maintenance Task
Module 6: Integrating Windows Server 2022 with Azure
- 6.1 - Integrating Windows Server 2022 with Azure
- 6.2 - Course Closeout
Cybersecurity Essentials: Protecting Yourself in the Digital Age Course Content
Module 1 - Understanding Cyber Threats
- 1.1 - Welcome to Essential Cybersecurity 101
- 1.2 - 5 Cyber Threats and How to Stay Safe
Module 2 - Defending Against Cyber Attacks
- 2.1 - Defending Against Ransomware
- 2.2 - Phishing Attack Awareness
Module 3 - Securing Your Digital Environment
- 3.1 - Securing Your Home Network
- 3.2 - Best Practices for Securing Work-from-Home Devices and Data
Module 4 - The Human Element of Cybersecurity
- 4.1 - Understanding Social Engineering
- 4.2 - Protecting Your Digital Identity
Module 5 - The Role of AI in Cybersecurity
- 5.1 - AI Powered Threat Detection and Prevention
- 5.2 - AI in Cybersecurity Incident Response and Fraud Detection
CompTIA Tech+ (FC0-U71) Certification Preparation Course Content
Module 1 - IT Concepts and Terminology
- 1.1 - Introduction to Tech+
- 1.2 - Understanding Notational Systems
- 1.3 - The Basics of Computing
- 1.4 - Comparing Units of Measure
- 1.5 - Troubleshooting Methodology, Cases and Tips
Module 2 - Infrastructure
- 2.1 - Introduction to Infrastructure
- 2.2 - Types of Computing Devices
- 2.3 - Internal Components of A Computer
- 2.4 - Types of Storage
- 2.5 - Peripheral Devices and Installation
- 2.6 - Virtualization and Cloud Technologies
- 2.7 - Common Internet Service Types
Module 3 - Networking Fundaments
- 3.1 - Introduction to Networking
- 3.2 - Core Principles of Computer Networking
- 3.3 - Network Ports
- 3.4 - Network Addresses and Identifiers
- 3.5 - Network Models and Types
- 3.6 - Networking Devices and Connectors
- 3.7 - Small Wireless Networks
Module 4 - Operating Systems
- 4.1 Introduction to Operating Systems (OS)
- 4.2 - What is an Operating System_
- 4.3 - Drivers, Applications, Tasks and System Services
- 4.4 - File and Disk Management
- 4.5 - Backup and Recovery
Module 5 - Software and Applications
- 5.1 - Common Software Applications
- 5.2 - Productivity Software
- 5.3 - Business and Enterprise Software
- 5.4 - Manging Software
- 5.5 - Trusted Software Sources
Module 6 - Web Browsing, Configuration & Security
- 6.1 - Introduction To Web Browsing
- 6.2 - Browser Settings, Configuration and Maintenance
- 6.3 - Secure Web Browsing
- 6.4 - Protecting Your Privacy
Module 7 - Software Development Concepts
- 7.1 - Introduction to Programming
- 7.2 - Programming Tools
- 7.3 - Programming Organization and Logic Flows
- 7.4 - Understanding Programming Language Categories
- 7.5 - Code Maintenance, Version Control Systems and Branching
- 7.6 - Fundamental Data Types and Their Characteristics
Module 8 - Data and Database Fundamentals
- 8.1 - Introduction to Databases and the Value of Data
- 8.2 - Database Concepts and Structures
- 8.3 - Working with Relational Databases
- 8.4 - Database Operations and Access
- 8.5 - Database Backup and Recovery
Module 9 - Security: Keeping Things Safe
- 9.1 - Basic Security Concepts and Strategies
- 9.2 - Identifying Common Security Threats
- 9.3 - Securing Devices and Networks
- 9.4 - Security Tools and Software
- 9.5 - Encryption and Data Protection
Module 10 - AI Uses and Impact
- 10.1 - The Impact and Use of AI
- 10.2 - Course Closeout
Cisco 200-301 v1.1 CCNA Course Content
Module 1: CCNA 200-301 v1.1 Network Fundamentals
- 1.1 Intro to Networking
- 1.2 OSI Model
- 1.3 TCP-IP
- 1.4 Network Components
- 1.5 Network Topology
- 1.6 Copper Cable Types
- 1.7 Fiber Optic Cable Types
Module 2: CCNA 200-301 v1.1 Network Device Management
- 2.1 Connecting to a Cisco Device
- 2.1.1 ACTIVITY - Intro to Packet Tracer
- 2.2 Basic Cisco Commands
- 2.2.1 ACTIVITY - Navigating the CLI
- 2.3 Configuring for Connectivity
- 2.3.1 ACTIVITY - Configuring a Router Interface
- 2.3.2 ACTIVITY - Making a Remote Telnet Connection
- 2.3.3 ACT - Making a Remote SSH Connection
- 2.4 Neighbor Discovery
- 2.4.1 ACT - Discovering Neighbors
- 2.5 Basic Troubleshooting
- 2.6 Review
Module 3: CCNA 200-301 v1.1 Switching
- 3.1 Ethernet Basics
- 3.2 Switching Overview
- 3.2.1 ACTIVITY - Setting Up a Simple Switched Network
- 3.3 Spanning-Tree Protocol
- 3.4 Rapid PVST+
- 3.5 VLANs
- 3.6 VLAN Trunking Protocol
- 3.6.1 ACTIVITY - Creating Trunk Links
- 3.7 VLAN Trunking Protocol (VTP)
- 3.8 VLAN Routing
- 3.8.1 ACTIVITY - Configuring the VLAN 1 Interface on a Switch
- 3.8.2 ACTIVITY - Routing Between VLANs
- 3.9 Switchport Configuration
- 3.9.1 ACTIVITY - Configuring Voice and Data VLANs
- 3.10 EtherChannel
- 3.10.1 ACTIVITY - Bundling Links into an EtherChannel
- 3.11 Review
Module 4: CCNA 200-301 v1.1 Internet Protocol (IP)
- 4.1 IPv4 Basics
- 4.2 IP Packet and Interface Types
- 4.3 Binary Numbering System
- 4.4 Classful and Classless Addressing
- 4.5 IPv4 Subnetting
- 4.5.1 ACTIVITY - Moving the Subnet Mask
- 4.6 Subnetting in Other Octets
- 4.6.1 ACTIVITY - Subnetting
- 4.6.2 ACTIVITY - Subnetting by Host Requirements
- 4.6.3 ACTIVITY - Grouping Hosts into Subnets
- 4.7 Supernetting
- 4.7.1 ACTIVITY - Supernetting
- 4.8 IPv6
- 4.9 Review
Module 5: CCNA 200-301 v1.1 Routing
- 5.1 Introducing the Route
- 5.2 Routing Basics
- 5.3 Packet Delivery on the Same Network
- 5.4 IP Routing Across a Single Router
- 5.4.1 ACTIVITY - Configuring Basic Routing
- 5.5 IP Routing Across Multiple Routers
- 5.5.1 ACTIVITY - Configuring IPv4 Static Routes
- 5.5.2 ACTIVITY - Adding Special Static Routes
- 5.6 Routing Protocols Overview
- 5.7 Route Selection
- 5.8 Open Shortest Path First (OSPF)
- 5.8.1 ACTIVITY - Deploying Single Area OSPF
- 5.9 First Hop Redundancy Protocol (FHRP)
- 5.10 Network Address Translation (NAT)
- 5.10.1 ACTIVITY - Implementing Static NAT
- 5.10.2 ACTIVITY - Using a NAT Pool
- 5.10.3 ACTIVITY - Configuring PAT
- 5.11 Review
Module 6: CCNA 200-301 v1.1 IP Services
- 6.1 Remote Control
- 6.2 File Transfer
- 6.3 Monitoring
- 6.4 Infrastructure
- 6.4.1 ACTIVITY - Implementing a DHCP Relay
- 6.5 Quality of Service
- 6.6 Review
Module 7: CCNA 200-301 v1.1 Wireless
- 7.1 Wi-Fi Principles
- 7.2 Cisco Wireless Architectures
- 7.3 WLC Configuration
- 7.3.1 ACT - Configuring a WLAN
- 7.4 Review
Module 8: CCNA 200-301 v1.1 Security Fundamentals
- 8.1 Intro to Security
- 8.2 Local Device Access Control
- 8.3 Protecting Privileged EXEC Mode
- 8.4 Password Management
- 8.5 Local User
- 8.6 Password Recovery
- 8.6.1 ACTIVITY - Password Recovery
- 8.7 Remote Access
- 8.8 Access Control List (ACL)
- 8.8.1 ACTIVITY - Deploying a Standard ACL
- 8.8.2 ACTIVITY - Deploying an Extended ACL
- 8.9 DHCP Snooping
- 8.10 Dynamic ARP Inspection (DAI)
- 8.11 Layer 2 Port Security
- 8.11.1 ACTIVITY - Securing Layer 2 Ports
- 8.12 Authentication, Authorization and Accounting (AAA)
- 8.13 Wireless Security
- 8.14 Review
Module 9: CCNA 200-301 v1.1 Automation and Programmability
- 9.1 Network Automation Overview
- 9.2 Software Defined Networks
- 9.3 JSON
- 9.4 REST APIs
- 9.5 Management Mechanisms
- 9.6 AI in Network Operations
- 9.7 Review
Project Management Professional PMP PMI V7 Course Content
Module 1: Preparing for and Taking the PMI PMP v7 Exam
- 1.1 Preparing to Take the PMP v7 Exam From PMI
- 1.2 PMI PMP v7 Exam Characteristics
Module 2: Process Domain - PMI - PMP v7
- 2.1 What’s New in PMBOK 7
- 2.1.1 Performance Domains
- 2.2 Process Domain and Framework defined
- 2.3 Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- 2.4 Framework Definitions
- 2.5 Project Manager Skills
- 2.6 Framework Key Points to Remember
- 2.6.1 Framework Key Points to Remember -Incorporating Agile
- 2.7 Framework Example Questions Review
- 2.8 Project Integration Management Knowledge Area Defined
- 2.9 Develop Project Charter and Develop Project Management Plan
- 2.10 Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- 2.11 Perform Integrated Change Control
- 2.12 Close Project or Phase
- 2.13 Integration Key Points to Remember
- 2.13.1 Integration Key Points to Remember - Incorporating Agile
- 2.14 Integration Example Questions Review
- 2.15 Project Scope Management Knowledge Area Defined
- 2.16 Plan Scope Management and Collect Requirements
- 2.17 Define Scope and Create WBS
- 2.18 Breakdown Structures used in WBS Dictionary
- 2.19 Validate Scope and Control Scope
- 2.20 Defining Requirements in Agile
- 2.21 Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- 2.22 Scope Key Points to Remember
- 2.22.1 Scope Key Points to Remember - Incorporating Agile
- 2.23 Scope Example Questions Review
- 2.24 Project Schedule Management Knowledge Area Defined
- 2.25 Plan Schedule Management, Define Activities, and Sequence Activities
- 2.26 Dependencies, Predecessors, Leads, and Lags
- 2.27 Estimate Activity Durations
- 2.28 Develop Schedule
- 2.29 Critical Path Method
- 2.30 Schedule Compression
- 2.31 Resource Leveling, Schedule Format, and Control Schedule
- 2.32 Agile Estimating
- 2.33 Agile Schedule Planning and Reporting
- 2.34 Schedule Key Points to Remember and Example Question review
- 2.35 Project Cost Management Knowledge Area Defined
- 2.36 Plan Cost Management and Estimate Cost
- 2.37 Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- 2.38 Life Cycle Costing, Status Reporting, and Determine Budget
- 2.39 Control Costs, and Earned Value Management
- 2.40 Earned Schedule, and Agile Cost Control
- 2.41 Cost Key Points to Remember
- 2.41.1 Cost Key Points to Remember - Incorporating Agile
- 2.42 Cost Example Questions Review
- 2.43 Project Quality Management Knowledge Area Defined
- 2.44 Plan Quality Management
- 2.45 Manage Quality
- 2.46 Control Quality
- 2.47 Continuous Improvement in Agile-Adaptive Life Cycles - Kaizen and Process Analysis
- 2.48 Continuous Improvement in Agile-Adaptive Life Cycles - Retrospectives
- 2.49 Quality Key Points to Remember
- 2.49.1 Quality Key Points to Remember - Incorporating Agile
- 2.50 Quality Example Questions Review
- 2.51 Project Risk Management Knowledge Area Defined
- 2.52 Risk Management Plan and Identify Risks
- 2.53 Risk Register and Issues Vs Risk
- 2.54 Perform Qualitative and Quantitative Risk Analysis
- 2.55 Plan Risk Responses
- 2.56 Implement Risk Responses and Monitor Risks
- 2.57 Agile Risk Tools and Risk Key Points to Remember
- 2.57.1 Agile Risk Tools and Risk Key Points to Remember - Incorporating Agile
- 2.58 Risk Example Questions Review
- 2.59 Project Procurement Management Knowledge Area Defined
- 2.60 Plan Procurement Management and Conduct Procurements
- 2.61 Contracts
- 2.62 Share and Point of Total Assumption
- 2.63 Procurement Documents
- 2.64 Non-Competitive Awards and Control Procurements
- 2.65 Agile Contracts
- 2.66 Procurement Key Points to Remember and Example Questions Review
- 2.66.1 Procurement Key Points to Remember - Incorporating Agile
Module 3: People Domain - PMI - PMP v7
- 3.1 People Domain and Project Communications Management Knowledge Area Defined
- 3.2 Plan Communications Management
- 3.3 Manage and Monitor Communications
- 3.4 Agile Communications
- 3.5 Communications Key Points to Remember
- 3.6 Communications Example Question Review
- 3.7 Project Stakeholder Management Knowledge Area Defined
- 3.8 Stakeholder Position Descriptions
- 3.9 Identify Stakeholders
- 3.9.1 Identify Stakeholders - Incorporating Agile
- 3.10 Plan Stakeholder Engagement and Manage Stakeholder Engagement
- 3.11 Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- 3.12 Stakeholder Management Key Points to Remember
- 3.12.1 Stakeholder Management Key Points to Remember - Incorporating Agile
- 3.13 Stakeholder Management Example Question Review
- 3.14 Resource Management Knowledge Area Defined
- 3.15 Plan Resource Management and Estimate Activity Resources
- 3.16 Acquire Resources and Develop Team
- 3.17 Manage Team
- 3.17.1 Manage Team - Focus on Servant Leadership
- 3.18 Control Resources and Agile Teaming Concepts
- 3.19 Other Agile Teaming Concepts
- 3.20 Agile team roles and challenges
- 3.21 Resources Key Points to Remember
- 3.22 Resources Example Question Review
Module 4: Business Environment Domain - PMI - PMP v7
- 4.1 Business Environment Domain Defined
- 4.1.1 Business Environment Domain Defined - Focus on Organization Chnge Management
- 4.2 Project Selection Tools
- 4.3 PMO, Organizational Structure, and Reports
- 4.3.1 PMO, Organizational Structure and Reports - Matching PMO's to PMBOK Terms
- 4.4 Agile in the Business Environment
- 4.5 Business Environment Key Points to Remember and Example Question Review
- 4.6 Test Taking Tips and Techniques for PMI PMP v7
- 4.6.1 Question Formats for PMI PMP v7
- 4.6.2 Post Certification Requirements for PMI PMP
- 4.7 Course Closing
Fundamentals of the Software Development Lifecycle (SDLC) Course Content
Module 1 - Introduction to SDLC
- 1.1 - Definition and Purpose of SDLC
- 1.2 - Overview of the SDLC Process
Module 2 - Phases of the SDLC
- 2.1 - Requirement Gathering and Analysis
- 2.2 - Planning Phase
- 2.3 - Design Phase
- 2.4 - Development Phase
- 2.5 - Testing Phase
- 2.6 - Deployment Phase
- 2.7 - Maintenance Phase
Module 3 - SDLC Methodologies
- 3.1 - Waterfall Methodology
- 3.2 - Agile Methodology
- 3.3 - Lean Methodology
- 3.4 DevOps Methodology
- 3.5 - DevOps vs. Agile
- 3.6 - Which Methodology To Use
Module 4 - Role of QA in SDLC
- 4.1 - Importance of QA in the Software Development Process
- 4.2 - QA Methodologies and Tools
Module 5 - Best Practices for Effective SDLC Management
- 5.1 - Project Management and Communications
- 5.2 - Risk Management In the SDLC
- 5.3 - Continuous Improvement and Feedback Loops
- 5.4 - Course Closeout
The Future of Work with AI Course Content
Module 1 - AI and the Workforce Transformation
- 1.1 - The Future of Work with AI Intro
- 1.2 - The Evolution of Work
- 1.3 - AI's Impact on Job Roles
- 1.4 - Emerging Job Roles in the Age of AI
Module 2 - Skills for the AI-Driven Economy
- 2.1 - The Importance of Adaptability and Lifelong Learnin
- 2.2 - Technical Skills and AI Literacy
- 2.3 - Critical Soft Skills in the AI Era
- 2.4 - The Role of Data in AI-Driven Decision Making
Module 3 - Preparing for AI-Driven Changes in the Workplace
- 3.1 - Organizational Strategies for AI Integration
- 3.2 - Workforce Reskilling and Upskilling
- 3.3 - The Role of Leadership in AI Transition
- 3.4 - Ethical Considerations and Workforce Well-being
Module 4 - Case Studies and Course Wrap-Up
- 4.1 - Practical AI Case Studies
- 4.2 - Developing a Personal or Organizational AI-Readines
- 4.3 - In Closing, Embrace, Not Fear AI
Navigating Change Management in IT Teams Course Content
Module 1 - Introduction to Change Management in IT
- 1.1 - Change Management Course Introduction
- 1.2 - Defining Change Management
- 1.3 - Types of Change
Module 2 - Strategies for Managing Resistance to Change
- 2.1 - Understanding Resistance to Change
- 2.2 - Proactive Strategies for Overcoming Resistance
- 2.3 - Building Resilience in IT Teams
Module 3 - Developing Communication Plans for Change Initiatives
- 3.1 - Role of Communication in Successful
- 3.2 - Crafting Clear and Consistent Messages
- 3.3 - Utilizing Various Communication Channels
Module 4 - Tools and Technologies for Supporting Change in IT Teams
- 4.1 - Digital Tools for Change Management
- 4.2 - Automation and Workflow Management
- 4.3 - Key Metrics for Tracking Change Management Success
Module 5 - Case Studies of Effective Change Management in IT
- 5.1 - Case Study 1: Changing To Agile
- 5.2 - Case Study 2: Cloud Migration
- 5.3 - Course Closeout
OWASP Top 10: Essential Web Application Security Risks Course Content
Module 1 - What Is OSWASP
- Module 1.1 - Introduction to OSWASP Top 10
Module 2 - Top 10 Web Application Security Risks
- Module 2.1 - Overview of Risks We Will Explore
- Module 2.2 - Injection
- Module 2.3 - Broken Authentication
- Module 2.4 - Sensitive Data Exposure
- Module 2.5 - XML External Entities (XXE)
- Module 2.6 - Broken Access Control
- Module 2.7 - Security Misconfiguration
- Module 2.8 - Cross-Site Scripting XSS
- Module 2.9 - Insecure Deserialization
- Module 2.10 - Using Vulnerable Components
- Module 2.11 - Insufficient Logging and Monitoring
- Module 2.12 - Course Conclusion
Microsoft SC-900: Security, Compliance & Identity Fundamentals Course Content
Module 1 - Security, Compliance, and Identity
- Module 1.1 - Course Introduction
- Module 1.2 - Core Concepts and Strategies
- Module 1.3 - Identity Concepts
Module 2 - Microsoft Entra ID Capabilities
- Module 2.1 - Microsoft Entra ID
- Module 2.2 - Entra ID Authentication
- Module 2.3 - Access Management Capabilities
- Module 2.4 - Entra ID Governance
- Module 2.5 - Entra ID Protection
Module 3 - Microsoft Security Solutions
- Module 3.1 - Exploring Core Infrastructure Services
- Module 3.2 - Security Management Capabilities
- Module 3.3 - Microsoft Sentinal
- Module 3.4 Microsoft Defender XDR
Module 4 - Microsoft Compliance Solutions
- Module 4.1 - Service Trust Portal and Privacy
- Module 4.2 - Microsoft Purview for Compliance
- Module 4.3 - Information Protection, Data Lifecycle Management, and Data Governance
- Module 4.4 - Insider Risk Capabilities
- Module 4.5 - eDiscovery and Audit
Project Management Essentials Course Content
Module 1 - Course Introduction and Overview
- Module 1.1 - Welcome and Course Objectives
- Module 1.2 - Introduction to PMBOK 7 Principles
- Module 1.3 - Defining Project Managment & Your Role
Module 2 - Project Scope, Estimating and Planning
- Module 2.1 - Defining the Project Scope
- Module 2.2 - Project Estimating Techniques
- Module 2.3 - Project Planning - Techniques and Task Breakdown
- Module 2.4 - Scheduling and Resource Management
Module 3 -Effective Communication and Stakeholder Management
- Module 3.1 - Communication Planning
- Module 3.2 - Stakeholder Management
- Module 3.3 - Team Collaboration
Module 4 - Risk Management and Adaptability
- Module 4.1 - Introduction to Risk Management
- Module 4.2 - Risk Identification and Analysis
- Module 4.3 - Risk Response Planning
Module 5 - Project Execution and Control
- Module 5.1 - Project Execution and Control
- Module 5.2 - Monitoring and Controlling the Project
Module 6 - Project Tools and Techniques
- Module 6.1 - Using Project Management Tools
- Module 6.2 - Tools for Different Methodologies
Module 7 - Closing the Project
- Module 7.1 - Project Closure
- Module 7.2 - Post Project Evaluations
Microsoft 365 Fundamentals - MS-900 Course Content
Module 1: Introduction to Cloud Concepts
- Module 1.1 - Course Introduction
- Module 1.2 - Introduction to Cloud Computing
- Module 1.3 - Microsoft SaaS, PaaS, IaaS Offerings
- Module 1.4 - Cloud, Hybrid, On-Premises Models - Benefits and Considerations
- Module 1.5 - Exploring Public, Private and Hybrid Cloud Models
- Module 1.6 - Cost Benefit of Cloud Solutions
- Module 1.7 - The Hybrid Work and Flexible Work Concept
- Module 1.8 - Introducing Microsoft Co-Pilot
- Module 1.9 - Microsoft 365 Tenant
Module 2: Microsoft 365 Apps and Services
- Module 2.1 - Core Productivity Solutions
- Module 2.2 - Work Management in Microsoft 365
- Module 2.3 - Collaboration Solutions
- Module 2.4 - Microsoft Teams and Teams Phone Deep Dive
- Module 2.5 - Extending Teams with Collaborative Apps
- Module 2.6 - Endpoint Management with Microsoft Intune
- Module 2.7 - Windows 365 vs. Azure Virtual Desktop
- Module 2.8 - Deployment and Update Channels for Microsoft 365
- Module 2.9 - Analytics in Microsoft 365
Module 3: Security, Compliance, Privacy, and Trust in Microsoft 365
- Module 3.1 - Identity and Access Management with Microsoft Entra
- Module 3.2 - Threat Protection - Defender Suite Overview
- Module 3.3 - Zero Trust Model and Compliance Solutions
- Module 3.4 - Information Protection and Data Residency
Module 4: Microsoft 365 Pricing, Licensing, and Support
- Module 4.1 - Understanding Microsoft 365 Pricing and Billing
- Module 4.2 - Licensing Options and Management
- Module 4.3 - Microsoft 365 Support, SLAs and Monitoring Service
- Module 4.4 - Microsoft 365 Fundamentals Course Closeout
AI Fundamentals - Getting Started With Artificial Intelligence Course Content
Module 1 - Getting Started With AI
- Module 1.1 Introduction To AI
- Module 1.2 Understanding The Types of AI
Module 2 - Programming Lanaguages, Tools and Platforms For AI Solutions
- Module 2.1 AI and Programming Languages
- Module 2.2 AI, Machine Learning and Deep Learning
- Module 2.3 AI Models
- Module 2.4 AI Services in the Cloud
Module 3 - Data Science Fundamentals for AI
- Module 3.1 Introduction to Data Science
- Module 3.2 Data Preparation Techniques
- Module 3.3 Exploratory Data Analysis (EDA)
Module 4 - AI In the Modern Workplace
- Module 4.1 AI In The Workplace
- Module 4.2 Data Analysis and Business Intelligence AI Tools
- Module 4.3 Automation and Workflow Management Tools
- Module 4.4 Natural Language Processing (NLP) Tools
- Module 4.5 Virtual Assistants and Chatbots
Module 5 - Ethical AI and Future Trends
- Module 5.1 Understanding Bias, Fairness, Privacy, and Security
- Module 5.2 Impact of AI on Jobs and Society
- Module 5.3 Emerging Trends in AI
- Module 5.4 AI Governance and Regulation
Module 6 - Monumental Leaps Forward With AI
- Module 6.1 AI for Social Good
- Module 6.2 AI in Creative Industries
- Module 6.3 AI in Cybersecurity
- Module 6.4 AI in Smart Cities and Infrastructure
Module 7 - AI Project Lifecycle Management
- Module 7.1 AI Project Lifecycle Management
- Module 7.2 Development and Implementation
- Module 7.3 Maintenance, Evaluation, and Scaling
Module 8 - AI Fundamentals Course Closeout
- Module 8.1 Course Closeout
CompTIA Security+ SY0-701 Course Content
Module 1 - SY0-701 General Security Concepts
- 1.0 Introduction to the Course
- 1.1 Fundamental Security Concepts
- 1.2 Zero Trust
- 1.3 Deception and Disruption
- 1.3.1 ACTIVITY - Testing a Honeypot
- 1.4 Security Controls
- 1.5 Change Management and Security
- 1.6 Cryptography Basics
- 1.6.1 ACTIVITY - Examining Symmetric Encryption
- 1.7 Asymmetric Encryption
- 1.7.1 ACTIVITY - Exploring Asymmetric Encryption
- 1.8 Hashing
- 1.8.1 ACTIVITY - Verifying Integrity with Hashing
- 1.9 Digital Certificates
- 1.10 Public Key Infrastructure
- 1.11 Data and Keys
- 1.12 Crypto Implementations
- 1.13 Blockchain
- 1.14 Non-Cryptographic Data Protection
Module 2 - SY0-701 Threats, Vulnerabilities, and Mitigations
- 2.1 Threat Actors and Motivations
- 2.2 Threat Vectors
- 2.2.1 ACTIVITY - O.MG Cable Baiting
- 2.2.2 O.MG-No Cable
- 2.3 Social Engineering
- 2.4 Operating System Vulnerabilities and Attacks
- 2.5 Application Vulnerabilities and Attacks
- 2.5.1 ACTIVITY - Performing a Buffer Overflow
- 2.6 Web-based Vulnerabilities and Attacks
- 2.6.1 ACTIVITY - Abusing Unsanitized Input
- 2.6.2 ACTIVITY - Grabbing Passwords with SQL Injection
- 2.6.3 ACTIVITY - Swiping a Token with XSS
- 2.7 Other Vulnerabilities
- 2.8 Common Malicious Activity Indicators
- 2.9 Insider Threat Indicators
- 2.10 Social Engineering Indicators
- 2.10.1 ACTIVITY - Capturing Credentials through Social Engineering
- 2.11 Malware Activity Indicators
- 2.12 Operating System Attack Indicators
- 2.13 Application Attack Indicators
- 2.13.1 ACTIVITY - Recognizing Directory Traversal
- 2.14 Physical Attack Indicators
- 2.14.1 ACTIVITY - Quickly Cloning an RFID Badge
- 2.15 Network Attack Indicators
- 2.15.1 ACTIVITY - Crashing a Target with DoS
- 2.16 Cryptographic Attack Indicators
- 2.17 Password Attack Indicators
- 2.17.1 ACTIVITY - Password Cracking
- 2.18 Network Segmentation
- 2.19 Access Control
- 2.20 Enterprise Device Hardening
Module 3 - SY0-701 Security Architecture
- 3.1 Network Segmentation
- 3.1.1 ACTIVITY - Segementing a Network
- 3.2 High Availability
- 3.3 Virtualization
- 3.3.1 ACTIVITY - Deploying Docker Containers
- 3.4 Cloud
- 3.5 Serverless Computing
- 3.6 IoT
- 3.7 ICS SCADA
- 3.7.1 ACTIVITY - Operating a SCADA System
- 3.8 RTOS and Embedded Systems
- 3.9 Reducing the Attack Surface
- 3.10 Firewalls
- 3.11 IDS IPS.mp4
- 3.12 Secure Communications - Access
- 3.13 Port Security
- 3.14 SD-WAN and SASE
- 3.15 Data Classifications
- 3.16 Protecting Data Types
- 3.17 Data Considerations
- 3.18 Redundancy
- 3.19 Alternate Sites
- 3.20 Multiple Platforms
- 3.21 Business Continuity
Module 4 - SY0-701 Security Operations
- 4.1 Secure Baselines
- 4.2 Attack Surface Reduction
- 4.3 Wireless Installation
- 4.4 Wireless Security Settings
- 4.5 Mobile Solutions
- 4.5.1 ACTIVITY - Pwning a Mobile Device
- 4.6 Application Security Management
- 4.7 Asset Management
- 4.8 Vulnerability Management
- 4.9 Monitoring Activities
- 4.10 Monitoring Tools
- 4.10.1 ACTIVITY - Scanning a Network for Vulnerabilities
- 4.11 Firewall Configuration
- 4.11.1 ACTIVITY - Configuring Firewall Rules
- 4.12 Intrusion Detection Configuration
- 4.13 Web Traffic Filtering
- 4.14 Operating System Policy
- 4.14.1 ACTIVITY - Examining Windows Group Policy
- 4.15 Network Service Security
- 4.16 Data Loss Protection
- 4.16.1 ACTIVITY - Checking File Integrity
- 4.17 Network Access Control
- 4.17.1 ACTIVITY - Require Multifactor Authentication
- 4.18 Identity Management
- 4.19 Access Management
- 4.19.1 ACTIVITY - Implementing Access Control
- 4.20 Security Automation
- 4.21 Incident Response
- 4.22 Digital Forensics
Module 5 - SY0-701 Security Program Management and Oversight
- 5.1 Elements of Effective Security Governance
- 5.2 Elements of the Risk Management Process
- 5.3 Third Party Risk Assessment and Management
- 5.3.1 ACTIVITY - Analyzing the Solar Winds Supply Chain Failure
- 5.4 Effective Security Compliance
- 5.5 Audits and Assessments
- 5.5.1 ACTIVITY - Conducting OSINT
- 5.5.2 ACTIVITY - Performing Active Reconnaissance
- 5.6 Security Awareness Practices
- 5.7 Course Outro
Data Security : Mastering PII Protection in Cybersecurity Course Content
Module 1 - Data Threats & ID Theft
- Module 1.1 - Introduction
- Module 1.2 - Data Threats & Costs
Module 2 - Device Security
- Module 2.1 - Device Access
- Module 2.2 - Device Management
Module 3 - Preventing Inadvertant Disclosure
- Module 3.1 - Inadvertant Disclosure
- Module 3.2 - Removing PII
- Module 3.3 - Social Engineering
Module 4 - Physical & Technical Safeguards
- Module 4.1 - Physical Security
- Module 4.2 - Issues With Public Networds
- Module 4.3 - Data Encryption and Destruction
- Module 4.4 - Incident Reporting
- Module 4.5 - Course Conclusion
CompTIA Cybersecurity Analyst CySA+ (CS0-003) Course Content
Module 1 - CompTIA CySA+ CS0-003 Basics
- 1.1 Course Introduction
- 1.2 Instructor Introduction
- 1.3 What is CySA
- 1.4 Exam Objectives
- 1.5 Cybersecurity Pathway
- 1.6 DoD Baseline Certfication
Module 2 - CompTIA CySA+ CS0-003 Domain 1 - Security Operations
- 2.1 Domain 1 - Security Operations Overview
- 2.2 System and Network Architecture Concepts in Security Operations
- 2.3 Log Files
- 2.4 Operating Systems
- 2.5 Infrastructure Concepts
- 2.6 Network Architecture
- 2.7 Software Defined Networking
- 2.8 Whiteboard Discussion - Network Architectures
- 2.9 Identity and Access Management IAM Basics
- 2.10 Demonstration - IAM
- 2.11 Encryption
- 2.12 Sensitive Data
- 2.13 1.2 Analyze Indicators of Potentially Malicious Activity
- 2.14 Network Attack
- 2.15 Host Attacks
- 2.16 Application Related Attacks
- 2.17 Social Attacks
- 2.18 Tools or Techniques to Determine Malicious Activity Overview
- 2.19 Tools and Toolsets For Identifying Malicious Activity
- 2.20 Common Techniques
- 2.21 Programming Concerns
- 2.22 Threat-Intelligence and Threat-Hunting Concepts Overview
- 2.23 Threat Actors
- 2.24 Tactics, Techniques and Procedures
- 2.25 Confidence Levels IOC
- 2.26 Collection Sources
- 2.27 Threat Intelligence
- 2.28 Cyber Response Teams
- 2.29 Security Operations
- 2.30 Standardized Processes and Operations
- 2.31 Security Operations Tools and Toolsets
- 2.32 Module 2 Review
Module 3 - CompTIA CySA+ CS0-003 Domain 2 - Vulnerability Management
- 3.1 Domain 2 - Vulnerability Management Overview
- 3.2 Vulnerability Discovery and Scanning
- 3.3 Asset Discovery and Scanning
- 3.4 Industry Frameworks
- 3.5 Mitigating Attacks
- 3.6 CVSS and CVE
- 3.7 Common Vulnerability Scoring System (CVSS) interpretation
- 3.8 CVE Databases
- 3.9 Cross Site Scripting (XSS)
- 3.10 Vulnerability Response, Handling, and Management
- 3.11 Control Types (Defense in Depth, Zero Trust)
- 3.12 Patching and Configurations
- 3.13 Attack Surface Management
- 3.14 Risk Management Principles
- 3.15 Threat Modeling
- 3.16 Threat Models
- 3.17 Secure Coding and Development (SDLC)
- 3.18 Module 3 Review
Module 4 - CompTIA CySA+ CS0-003 Domain 3 - Incident Response and Management
- 4.1 Domain 3 - Incident Response and Management Overview
- 4.2 Attack Methodology Frameworks
- 4.3 Cyber Kill Chain
- 4.4 Frameworks to Know
- 4.5 Incident Response and Post Reponse
- 4.6 Detection and Analysis
- 4.7 Post Incident Activities
- 4.8 Containment, Eradication and Recovery
- 4.9 Module 4 Review
Module 5 - CompTIA CySA+ CS0-003 Domain 4 - Reporting and Communication
- 5.1 Domain 4 - Reporting and Communication Overview
- 5.2 Reporting Vulnerabilities Overview
- 5.2.1 Vulnerability Reporting
- 5.3 Compliance Reports
- 5.4 Inhibitors to Remediation
- 5.5 Metrics and KPI's
- 5.6 Incident Response Reporting and Communications Overview
- 5.7 Incident Declaration
- 5.8 Communication with Stakeholders
- 5.9 Root Cause Analysis
- 5.10 Lessons Learned and Incident Closure
- 5.11 Module 5 Review
Module 6 - CompTIA CySA+ CS0-003 - Course Closeout
- 6.1 Course Closeout Overview
- 6.2 Practice Questions
- 6.3 Exam Process
- 6.4 Continuing Education
- 6.5 Course Closeout
Moving On-Site Infrastructure To The Cloud Course Content
Module 1 - Welcome and Course Introduction
- Module 1.0 - Introduction To Transitioning To The Cloud
- Module 1.1 - Who Is This Course For
- Module 1.2 - The Importance and Benefits Of Moving To The Cloud
- Module 1.3 - Module Recap
Module 2 - Understanding On-Site Infrastructure
- Module 2.1 - Defining On-Site Infrastructure
- Module 2.2 - Pros and Cons of On-Site Infrastructure
Module 3 - Types of Cloud Services
- Module 3.1 - What is Cloud Computing?
- Module 3.2 - Categories of Cloud Computing
- Module 3.3 - Key Advantages
- Module 3.4 - Key Considerations
- Module 3.5 - Recap
Module 4 - Why Transition To The Cloud?
- Module 4.1 - Cost-Efficiency
- Module 4.2 - Scalability
- Module 4.3 - Flexibility and Mobility
- Module 4.4 - Recap
Module 5 - Planning The Transition
- Module 5.1 - Assessing Current Infrastructure
- Module 5.2 - Choosing A Cloud Provider
- Module 5.3 - Budget and Timeline
- Module 5.4 - Recap
Module 6 - Key Steps in the Transition
- Module 6.1 - Data Migration
- Module 6.2 - Application Porting
- Module 6.3 - Employee Training
- Module 6.4 - Recap
Module 7 - Post-Transition Management
- Module 7.1 - Monitoring and Analytics
- Module 7.2 - Security Measures
- Module 7.3 - On-going Costs
- Module 7.4 - Recap
Combating Cyber Threats Mini Training Series Course Content
Combating Cyber Threats
- Chrys Thorsen - Webinar - Road To Zero
Microsoft Azure Administrator (AZ-104) Course Content
Module 1 - Azure Overview
- 1.0 Introduction to AZ-104
- 1.1 Cloud Computing
- 1.2 Cloud Services Benefits
- 1.3 Cloud Service Types
- 1.4 Azure Core Architectural Components
- 1.4.1 ACTIVITY-Creating Management Groups and Subscriptions
- 1.5 Azure Compute Services
- 1.6 Azure Application Hosting Options
- 1.7 Azure Networking Services
- 1.8 Azure Storage Services
- 1.9 Azure Identity, Access, and Security
- 1.10 Azure Cost Management
- 1.10.1 ACTIVITY- Checking Your Azure Balance
- 1.11 Azure Governance and Compliance Tools
- 1.11.1 ACTIVITY- Assign an Azure Policy
Module 2 - Azure Tools
- 2.1 Azure Portal
- 2.1.1 ACTIVITY- Exploring the Azure Portal
- 2.2 Azure Monitoring Tools
- 2.3 Azure PowerShell
- 2.3.1 ACTIVITY- Using Azure PowerShell
- 2.4 Azure CLI
- 2.4.1 ACTIVITY- Using the Azure CLI
- 2.5 Azure Cloud Shell
- 2.6 ARM Templates
- 2.6.1 ACTIVITY- Using Templates to Deploy Resources
- 2.7 Azure Resource Manager
- 2.8 Hybrid Tools
Module 3 - Azure Identities and Governance
- 3.1 Azure AD Overview
- 3.1.1 ACTIVITY- Exploring Azure Active Directory
- 3.1.2 ACTIVITY- Adding a Custom Domain
- 3.2 Subscriptions
- 3.3 Users and Groups
- 3.3.1 ACTIVITY- Adding Azure Active Directory User
- 3.3.2 ACTIVITY- Bulk Inviting New Users
- 3.3.3 ACTIVITY- Creating Azure AD Groups
- 3.4 Authentication
- 3.5 SSPR
- 3.5.1 ACTIVITY- Implementing SSPR
- 3.6 Devices
- 3.7 Azure Roles
- 3.7.1 ACTIVITY- Assigning Azure Roles
- 3.8 Azure AD Roles
- 3.8.1 ACTIVITY- Assigning Azure AD Roles
- 3.9 Conditional Access
- 3.10 Authorization
- 3.10.1 ACTIVITY- Managing Licenses
- 3.11 Azure Policy
Module 4 - Azure Storage
- 4.1 Storage Accounts
- 4.1.1 ACTIVITY- Creating a Storage Account
- 4.2 Storage Types
- 4.2.1 ACTIVITY- Creating Storage Types
- 4.3 Azure Storage Tools
- 4.3.1 ACTIVITY- Azure Storage Explorer
- 4.4 Azure Files and File Sync
- 4.4.1 ACTIVITY- Deploying an Azure Files Share
- 4.5 Azure Storage Security
Module 5 - Azure Compute Resources
- 5.1 Virtual Machines
- 5.1.1 ACTIVITY- Create Virtual Machines
- 5.1.2 ACTIVITY- Delete a Virtual Machine
- 5.2 VM Availability
- 5.2.1 ACTIVITY- Increasing VM Availability
- 5.3 VM Extensions
- 5.4 Azure App Service
- 5.5 Azure Container Instances
- 5.6 Kubernetes
Module 6 - Azure Virtual Networks
- 6.1 Virtual Networks
- 6.1.1 ACTIVITY- Create a VNet
- 6.2 Network Security Groups-Part 1
- 6.2.1 Network Security Groups-Part 2
- 6.3 Azure Firewall
- 6.3.1 ACTIVITY- Deploying a Firewall
- 6.4 Azure DNS-Part 1
- 6.4.1 Azure DNS-Part 2
- 6.4.2 ACTIVITY- Implementing Azure DNS Zone6
- 6.5 Virtual Network Peering
- 6.5.1 ACTIVITY- VNet Peering
- 6.6 Azure VPN Gateway
- 6.7 ExpressRoute and Virtual WANs
- 6.8 Azure Load Balancer
- 6.9 Azure Application Gateway
- 6.10 Azure Routes
Module 7 - Azure Monitoring and Backup
- 7.1 Network Watcher
- 7.2 Azure Monitor
- 7.3 Azure Backup-Part 1
- 7.4 Azure Backup-Part 2
- 7.5 Azure Backup-Part 3
- 7.6 Conclusion to AZ-104
ChatGPT and AI Business Fundamentals Course Content
Module 1 - ChatGPT Fundamentals
- 1.1 Course Welcome
- 1.2 Instructor Introduction
- 1.3 Download Course Resources
- 1.4 ChatGPT Fundamentals
- 1.5 What is ChatGPT
- 1.6 Use Cases for ChatGPT
- 1.7 Role of ChatGPT
- 1.8 Future of ChatGPT
- 1.9 ChatGPT Statistics, Facts & Trends
- 1.10 Limitations
- 1.11 What is a Chatbot
- 1.12 Understanding AI-ML
- 1.13 Demonstration - Tools to Use with ChatGPT
- 1.14 Business Benefits
- 1.15 Whiteboard - How it all works
- 1.16 Demonstration - How to Get Started with ChatGPT
- 1.17 Demonstration - Example Prompts
- 1.18 Discussion - ChatGPT Performance Issues
- 1.19 Module Summary
Module 2 - ChatGPT Prompt Demonstrations
- 2.1 ChatGPT Prompt Demonstrations
- 2.2 What is a Prompt
- 2.3 Best Practices For Writing Prompts
- 2.4 Prompt Demonstration - Asking Questions
- 2.5 Prompt Demonstration - Top Ten Lists
- 2.6 Prompt Demonstration - Long Form Docs
- 2.7 Prompt Demonstration - Complex Form and Code
- 2.8 Prompt Demonstration - Feedback
- 2.9 Prompt Demonstration - Content Modification
- 2.10 Prompt Demonstration - Instruction Generation
- 2.11 Prompt Demonstration - Information Extraction
- 2.12 Prompt Demonstration - Writing Computer Code
- 2.13 Prompt Demonstration - Solving Math Problems
- 2.14 Prompt Demonstration - Create YT Video Outline
- 2.15 Prompt Demonstration - Write a Blog Article
- 2.16 Prompt Demonstration - SEO Keywords
- 2.17 Comparing Google Bard vs ChatGPT
- 2.18 Module Summary
- 2.19 Course Closeout
Certified Ethical Hacker (CEH) v12 Course Content
Module 1 - Introduction To Ethical Hacking
- 1.0 Introduction to CEH v12
- 1.1 Elements of Security
- 1.2 Cyber Kill Chain
- 1.3 MITRE ATT&CK Framework
- 1.3.1 Activity - Researching the MITRE ATTACK Framework
- 1.4 Hacking
- 1.5 Ethical Hacking
- 1.6 Information Assurance
- 1.7 Risk Management
- 1.8 Incident Management
- 1.9 Information Security Laws and Standards
- 1.10 Introduction to Ethical Hacking Review
Module 2: Footprinting and Reconnaissance
- 2.1 Footprinting Concepts
- 2.2 OSINT Tools
- 2.2.1 Activity - Conduct OSINT with OSR Framework
- 2.2.2 Activity - OSINT with theHarvester
- 2.2.3 Activity - Add API Keys to theHarvester
- 2.2.4 Activity - Extract Document Metadata with FOCA
- 2.2.5 Activity - Extract Document Metadata with FOCA
- 2.3 Advanced Google Search
- 2.3.1 Activity - Google Hacking
- 2.4 Whois Footprinting
- 2.4.1 Activity - Conducting Whois Research
- 2.5 DNS Footprinting
- 2.5.1 Activity - Query DNS with NSLOOKUP
- 2.6 Website Footprinting
- 2.6.1 Activity - Fingerprint a Webserver with ID Serve
- 2.6.2 Activity - Extract Data from Websites
- 2.6.3 Activity - Mirror a Website with HTTrack
- 2.7 Email Footprinting
- 2.7.1 Activity - Trace a Suspicious Email
- 2.8 Network Footprinting
- 2.9 Social Network Footprinting
- 2.10 Footprinting and Reconnaissance Countermeasures
- 2.11 Footprinting and Reconnaissance Review
Module 3: Scanning Networks
- 3.1 Scanning Concepts
- 3.2 Discovery Scans
- 3.2.1 Activity - ICMP ECHO and ARP Pings
- 3.2.2 Activity - Host Discovery with Angry IP Scanner
- 3.3 Port Scans
- 3.3.1 Activity - Port Scan with Angry IP Scanner
- 3.4 Other Scan Types
- 3.5 Scanning Tools
- 3.5.1 Activity - Hping3 Packet Crafting
- 3.5.2 Activity - Fingerprinting with Zenmap
- 3.6 NMAP
- 3.6.1 Activity - Nmap Basic Scans
- 3.6.2 Activity - Host Discovery with Nmap
- 3.6.3 - Activity - Nmap Version Detection
- 3.6.4 Activity - Nmap Idle (Zombie) Scan
- 3.6.5 Activity - Nmap FTP Bounce Scan
- 3.6.6 - Activity - NMAP Scripts
- 3.7 Firewall and IDS Evasion
- 3.7.1 Activity - Nmap Advanced Scans
- 3.8 Proxies
- 3.9 Scanning Countermeasures
- 3.10 Scanning Networks Review
Module 4: Enumeration
- 4.1 Enumeration Overview
- 4.2 SMB_NetBIOS_Enumeration
- 4.2.1 Activity - Enumerate NetBIOS Information with Hyena
- 4.3 File Transfer Enumeration
- 4.4 WMI Enumeration
- 4.4.1 - Activity - Enumerating WMI with Hyena
- 4.5 SNMP Enumeration
- 4.5.1 Activity - Enumerate WMI, SNMP and Other Information Using SoftPerfect
- 4.6 LDAP Enumeration
- 4.7 DNS Enumeration
- 4.8 SMTP Enumeration
- 4.8.1 Activity - Enumerate Email Users with SMTP
- 4.9 Remote Connection Enumeration
- 4.10 Website Enumeration
- 4.10.1 Activity - Enumerate a Website with DirBuster
- 4.11 Other Enumeration Types
- 4.12 Enumeration Countermeasures and Review
Module 5: Vulnerability Analysis
- 5.1 Vulnerability Scanning
- 5.1.1 Vulnerability Scanning with OpenVAS
- 5.2 Vulnerability Assessment
- 5.3 Vulnerability Analysis Review
Module 6: System Hacking
- 6.1 System Hacking Concepts
- 6.2 Common OS Exploits
- 6.3 Buffer Overflows
- 6.3.1 Activity - Performing a Buffer Overflow
- 6.4 System Hacking Tools and Frameworks
- 6.4.1 Activity - Hack a Linux Target from Start to Finish
- 6.5 Metasploit
- 6.5.1 Activity - Get Started with Metasploit
- 6.6 Meterpreter
- 6.7 Keylogging and Spyware
- 6.7.1 Activity - Keylogging with Meterpreter
- 6.8 Netcat
- 6.8.1 Activity - Using Netcat
- 6.9 Hacking Windows
- 6.9.1 Activity - Hacking Windows with Eternal Blue
- 6.10 Hacking Linux
- 6.11 Password Attacks
- 6.11.1 Activity - Pass the Hash
- 6.11.2 Activity - Password Spraying
- 6.12 Password Cracking Tools
- 6.13 Windows Password Cracking
- 6.13.1 Activity - Cracking Windows Passwords
- 6.13.2 Activity - Cracking Password Hashes with Hashcat
- 6.14 Linux Password Cracking
- 6.15 Other Methods for Obtaining Passwords
- 6.16 Network Service Attacks
- 6.16.1 Activity - Brute Forcing a Network Service with Medusa
- 6.17 Post Exploitation
- 6.18 Pivoting
- 6.18.1 & 6.18.2 Activity - Pivoting Setup and Attack
- 6.19 Maintaining Access
- 6.19.1 Activity - Persistence
- 6.20 Hiding Data
- 6.20.1 Activity - Hiding Data Using Least Significant Bit Steganography
- 6.21 Covering Tracks
- 6.21.1 Activity - Clearing Tracks in Windows
- 6.21.2 Activity - View and Clear Audit Policies with Auditpol
- 6.22 System Hacking Countermeasures
- 6.23 System Hacking Review
Module 7: Malware Threats
- 7.1 Malware Overview
- 7.2 Viruses
- 7.3 Trojans
- 7.3.1 Activity - Deploying a RAT
- 7.4 Rootkits
- 7.5 Other Malware
- 7.6 Advanced Persistent Threat
- 7.7 Malware Makers
- 7.7.1 Activity - Creating a Malware Dropper and Handler
- 7.8 Malware Detection
- 7.9 Malware Analysis
- 7.9.1 Activity - Performing a Static Code Review
- 7.9.2 Activity - Analyzing the SolarWinds Orion Hack
- 7.10 Malware Countermeasures
- 7.11 Malware Threats Review
Module 8: Sniffing
- 8.1 Network Sniffing
- 8.2 Sniffing Tools
- 8.2.1 Activity- Sniffing HTTP with Wireshark
- 8.2.2 Activity - Capturing Files from SMB
- 8.3 ARP and MAC Attacks
- 8.3.1 Activity - Performing an MITM Attack with Ettercap
- 8.4 Name Resolution Attacks
- 8.4.1 Activity - Spoofing Responses with Responder
- 8.5 Other Layer 2 Attacks
- 8.6 Sniffing Countermeasures
- 8.7 Sniffing Review
Module 9: Social Engineering
- 9.1 Social Engineering Concepts
- 9.2 Social Engineering Techniques
- 9.2.1 Activity - Deploying a Baited USB Stick
- 9.2.2 Activity - Using an O.MG Lightning Cable
- 9.3 Social Engineering Tools
- 9.3.1 Activity - Phishing for Credentials
- 9.4 Social Media, Identity Theft, Insider Threats
- 9.5 Social Engineering Countermeasures
- 9.6 Social Engineering Review
Module 10: Denial-of-Service
- 10.1 DoS-DDoS Concepts
- 10.2 Volumetric Attacks
- 10.3 Fragmentation Attacks
- 10.4 State Exhaustion Attacks
- 10.5 Application Layer Attacks
- 10.5.1 Activity - Performing a LOIC Attack
- 10.5.2 Activity - Performing a HOIC Attack
- 10.5.3 Activity - Conducting a Slowloris Attack
- 10.6 Other Attacks
- 10.7 DoS Tools
- 10.8 DoS Countermeasures
- 10.9 DoS Review
Module 11: Session Hijacking
- 11.1 Session Hijacking
- 11.2 Compromising a Session Token
- 11.3 XSS
- 11.4 CSRF
- 11.5 Other Web Hijacking Attacks
- 11.6 Network-Level Session Hijacking
- 11.6.1 Activity - Hijack a Telnet Session
- 11.7 Session Hijacking Tools
- 11.8 Session Hijacking Countermeasures
- 11.9 Session Hijacking Review
Module 12: Evading IDS, Firewalls, and Honeypots
- 12.1 Types of IDS
- 12.2 Snort
- 12.3 System Logs
- 12.4 IDS Considerations
- 12.5 IDS Evasion
- 12.5.1 Activity - Fly Below IDS Radar
- 12.6 Firewalls
- 12.7 Packet Filtering Rules
- 12.8 Firewall Deployments
- 12.9 Split DNS
- 12.10 Firewall Product Types
- 12.11 Firewall Evasion
- 12.11.1 Activity - Use Social Engineering to Bypass a Windows Firewall
- 12.11.2 Activity - Busting the DOM for WAF Evasion
- 12.12 Honeypots
- 12.13 Honeypot Detection and Evasion
- 12.13.1 Activity - Test and Analyze a Honey Pot
- 12.14 Evading IDS, Firewalls, and Honeypots Review
Module 13: Hacking Web Servers
- 13.1 Web Server Operations
- 13.2 Hacking Web Servers
- 13.3 Common Web Server Attacks
- 13.3.1 Activity - Defacing a Website
- 13.4 Web Server Attack Tools
- 13.5 Hacking Web Servers Countermeasures
- 13.6 Hacking Web Servers Review
Module 14: Hacking Web Applications
- 14.1 Web Application Concepts
- 14.2 Attacking Web Apps
- 14.3 A01 Broken Access Control
- 14.4 A02 Cryptographic Failures
- 14.5 A03 Injection
- 14.5.1 Activity - Command Injection
- 14.6 A04 Insecure Design
- 14.7 A05 Security Misconfiguration
- 14.8 A06 Vulnerable and Outdated Components
- 14.9 A07 Identification and Authentication Failures
- 14.10 A08 Software and Data integrity Failures
- 14.11 A09 Security Logging and Monitoring Failures
- 14.12 A10 Server-Side Request Forgery
- 14.13 XSS Attacks
- 14.13.1 Activity - XSS Walkthrough
- 14.13.2 Activity - Inject a Malicious iFrame with XXS
- 14.14 CSRF
- 14.15 Parameter Tampering
- 14.15.1 Activity - Parameter Tampering with Burp
- 14.16 Clickjacking
- 14.17 SQL Injection
- 14.18 Insecure Deserialization Attacks
- 14.19 IDOR
- 14.19.1 Activity - Hacking with IDOR
- 14.20 Directory Traversal
- 14.21 Session Management Attacks
- 14.22 Response Splitting
- 14.23 Overflow Attacks
- 14.24 XXE Attacks
- 14.25 Web App DoS
- 14.26 Soap Attacks
- 14.27 AJAX Attacks
- 14.28 Web API Hacking
- 14.29 Webhooks and Web Shells
- 14.30 Web App Hacking Tools
- 14.31 Hacking Web Applications Countermeasures
- 14.32 Hacking Web Applications Review
Module 15: SQL Injection
- 15.1 SQL Injection Overview
- 15.2 Basic SQL Injection
- 15.3 Finding Vulnerable Websites
- 15.4 Error-based SQL Injection
- 15.5 Union SQL Injection
- 15.5.1 Activity - Testing SQLi on a Live Website - Part 1
- 15.5.2 Activity - Testing SQLi on a Live Website - Part 2
- 15.6 Blind SQL Injection
- 15.7 SQL Injection Tools
- 15.7.1 Activity - SQL Injection Using SQLmap
- 15.8 Evading Detection
- 15.9 Analyzing SQL Injection
- 15.10 SQL Injection Countermeasures
- 15.11 SQL Injection Review
Module 16: Hacking Wireless Networks
- 16.1 Wireless Concepts
- 16.2 Wireless Security Standards
- 16.3 WI-FI Discovery Tools
- 16.4 Common Wi-Fi Attacks
- 16.5 Wi-Fi Password Cracking
- 16.6 WEP Cracking
- 16.6.1 Activity - Cracking WEP
- 16.7 WPA,WPA2,WPA3 Cracking
- 16.7.1 Activity - WPA KRACK Attack
- 16.8 WPS Cracking
- 16.9 Bluetooth Hacking
- 16.10 Other Wireless Hacking
- 16.10.1 Activity - Cloning an RFID badge
- 16.10.2 Activity - Hacking with a Flipper Zero
- 16.11 Wireless Security Tools
- 16.12 Wireless Hacking Countermeasures
- 16.13 Hacking Wireless Networks Review
Module 17: Hacking Mobile Platforms
- 17.1 Mobile Device Overview
- 17.2 Mobile Device Attacks
- 17.3 Android Vulnerabilities
- 17.4 Rooting Android
- 17.5 Android Exploits
- 17.5.1 Activity - Hacking Android
- 17.5.2 Activity - Using a Mobile Device in a DDoS Campaign
- 17.6 Android-based Hacking Tools
- 17.7 Reverse Engineering an Android App
- 17.8 Securing Android
- 17.9 iOS Overview
- 17.10 Jailbreaking iOS
- 17.11 iOS Exploits
- 17.12 iOS-based Hacking Tools
- 17.13 Reverse Engineering an iOS App
- 17.14 Securing iOS
- 17.15 Mobile Device Management
- 17.16 Hacking Mobile Platforms Countermeasures
- 17.17 Hacking Mobile Platforms Review
Module 18: IoT AND OT Hacking
- 18.1 IoT Overview
- 18.2 IoT Infrastructure
- 18.3 IoT Vulnerabilities and Threats
- 18.3.1 Activity - Searching for Vulnerable IoT Devices
- 18.4 IoT Hacking Methodology and Tools
- 18.5 IoT Hacking Countermeasures
- 18.6 OT Concepts
- 18.7 IT-OT Convergence
- 18.8 OT Components
- 18.9 OT Vulnerabilities
- 18.10 OT Attack Methodology and Tools
- 18.11 OT Hacking Countermeasures
- 18.12 IoT and OT Hacking Review
Module 19: Cloud Computing
- 19.1 Cloud Computing Concepts
- 19.2 Cloud Types
- 19.3 Cloud Benefits and Considerations
- 19.4 Cloud Risks and Vulnerabilities
- 19.5 Cloud Threats and Countermeasures
- 19.5.1 Activity - Hacking S3 Buckets
- 19.6 Cloud Security Tools And Best Practices
- 19.7 Cloud Computing Review
Module 20: Cryptography
- 20.1 Cryptography Concepts
- 20.2 Symmetric Encryption
- 20.2.1 Activity - Symmetric Encryption
- 20.3 Asymmetric Encryption
- 20.3.1 Activity - Asymmetric Encryption
- 20.4 Public Key Exchange
- 20.5 PKI
- 20.5.1 Activity - Generating and Using an Asymmetric Key Pair
- 20.6 Digital Signatures
- 20.7 Hashing
- 20.7.1 Activity - Calculating Hashes
- 20.8 Common Cryptography Use Cases
- 20.9 Cryptography Tools
- 20.10 Cryptography Attacks
- 20.11 Cryptography Review
- 20.12 Course Conclusion
CompTIA Cloud+ (CV0-003) Course Content
Module 1 - CompTIA Cloud+ CV0-003 Course Overview
- 1.0 Course Trailer
- 1.1 Course Overview
- 1.2 What is the Cloud + Exam
- 1.3 Cloud + Domain Obectives Overview
- 1.4 CompTIA Certification Pathways
- 1.5 DoD and ISO Requirements
Module 2 - General Cloud Knowledge
- 2.1 Domain Overview
- 2.2 Compare and Contrast Cloud Models
- 2.3 Cloud Computing Defined
- 2.4 Deployment Models
- 2.5 Service Models
- 2.6 Cloud Characteristics
- 2.7 Cloud Roles
- 2.8 Evaluate Cloud Providers and Services
- 2.9 Regions and Zones
- 2.10 Shared Responsibility Model
- 2.11 Demonstration - AWS Shared Security Model
- 2.12 Comparing Cloud to Virtualization
- 2.13 Comparing Cloud to On Premises
- 2.14 What is a Virtual Machine
- 2.15 Demonstration - Deploy a Cloud VM (AWS EC2)
- 2.16 What is an API
- 2.17 Capacity Planning Factors
- 2.18 Licensing, Factors, Requirements and Planning
- 2.19 Capacity Planning
- 2.20 Demonstration - AWS Trusted Advisor
- 2.21 HA and Scaling
- 2.22 High Availability and Disaster Recovery
- 2.23 Virtual, System and Communication Protection
- 2.24 Hypervisor Affinity
- 2.25 Analyze the solution design
- 2.26 Business Requirements
- 2.27 Business Enablers
- 2.28 Demonstration -AWS Well Architected Tool
- 2.29 Testing Techniques
- 2.30 Testing Success Factors
- 2.31 Module Review Questions
- 2.32 Module Summary Review
Module 3 - Cloud Security
- 3.1 Domain Overview
- 3.2 Configure Identity and Access Management
- 3.3 Identification and Authorization Management (IAM)
- 3.4 SDLC
- 3.5 Directory Services
- 3.6 Security and Access Controls
- 3.7 Federation
- 3.8 SSO and MFA
- 3.9 Certificates and Key Management
- 3.10 Secure a Network in a Cloud Environment
- 3.11 Networking Devices and Segmentation
- 3.12 Firewalls and Proxies
- 3.13 NAT and PAT
- 3.14 Secure Network Configurations (Tunnelling and Encryption)
- 3.15 Demo Hardening and Configuration Changes
- 3.16 OS Application Controls and Security Credentials
- 3.17 Policies and Permissions
- 3.18 Host and Network Protections (HIDSIPS)
- 3.19 Virtualization Security
- 3.20 Monitoring
- 3.21 Data Security and Compliance Controls in Cloud Environments
- 3.22 Structured, Unstructured and Semi Structured Data
- 3.23 Data Classification and Labeling
- 3.24 Data Loss Prevention
- 3.25 Demonstration - Google Cloud DLP
- 3.26 Chain of Custody and Non-Repudiation
- 3.27 Discussion - CASB
- 3.28 Module Summary Review
- 3.29 Module Review Questions
Module 4 - Cloud Deployment
- 4.1 Domain Overview
- 4.2 Integrate Components into Cloud Solutions
- 4.3 Subscription Services
- 4.4 Demonstration - Provision VM
- 4.5 Cloud Infrastructure Components
- 4.6 Whiteboard - Design a Resilent AWS Cloud Architecture
- 4.7 Containers
- 4.8 Microservices
- 4.9 Demonstration - Deploy Containers
- 4.10 Scaling
- 4.11 Provision Storage
- 4.12 Cloud Storage Protocols
- 4.13 Storage Features
- 4.14 Storage Cost Considerations
- 4.15 Storage Performance
- 4.16 RAID and Tiering
- 4.17 Demonstration - AWS S3
- 4.18 Deploy Cloud Networking Solutions
- 4.19 Connecting to The Cloud
- 4.20 Network Protocols
- 4.21 VPNS, VPC and Connectivity
- 4.22 Whiteboard - AWS VPC Connectivity
- 4.23 Demonstration - AWS VPC
- 4.24 Software Defined Networking (SDN)
- 4.25 Compute Sizing
- 4.26 Virtualization Considerations
- 4.27 Resource Rightsizing (CPU, Memory, etc)
- 4.28 Module Summary Review
- 4.29 Module Review Questions
Module 5 - Operations and Support
- 5.1 Domain Overview
- 5.2 Logging Monitoring and Alerting
- 5.3 Logging, Storage and Analysis of Data Events
- 5.4 Monitoring Cloud Resources
- 5.5 Service Level Agreements
- 5.6 Demonstration - SLAs in AWS
- 5.7 Maintain Efficient Operations of a Cloud Environment
- 5.8 Lifecycle Management
- 5.9 Change and Asset Management
- 5.10 SOP, Patching and Upgrades
- 5.11 Orchestration and Automation
- 5.12 Orchestration or Automation
- 5.13 DevOps, IaC and CICD Pipelines
- 5.14 Playbooks and Templates
- 5.15 Backup and Restore Operations
- 5.16 Backup Types, Objects, Targets
- 5.17 Restore and Recovery
- 5.18 Module Summary Review
- 5.19 Module Review Questions
Module 6 - Troubleshooting
- 6.1 Domain Overview
- 6.2 Troubleshooting Methodology Intro
- 6.3 Troubleshooting Methodology
- 6.4 Troubleshoot Security Issues
- 6.5 Cloud Attacks
- 6.6 Security Groups and NACLS
- 6.7 Troubleshoot Deployment Issues
- 6.8 Discussion Site Connectivity Issues
- 6.9 Discussion - Capacity Issues
- 6.10 Connectivity Issues
- 6.11 Connectivity Troubleshooting Tools
- 6.12 Demonstration - GCP AWS Azure Latency Test
- 6.13 Module Summary Review
- 6.14 Module Review Questions
Module 7 - Course Closeout
- 7.1 Exam Preparation
- 7.2 Course Closeout
Google Cloud Digital Leader Course Content
Module 1 - Google Cloud Digital Leader Course Overview
- 1.0 About Google Cloud Digital Leader
- 1.1 Course and Instructor Intro
- 1.2 Course PreReqs
- 1.3 GCP Certification Overview
- 1.4 GCP Digital Leader Exam Objectives
Module 2 - General Cloud Knowledge
- 2.0 General Cloud Knowledge
- 2.1 Domain Objectives
- 2.2 Intro to Cloud Computing
- 2.3 Essential Characteristics of Cloud Computing
- 2.4 Service Models
- 2.5 Deployment Models
- 2.6 Multitenancy
- 2.7 Resilency
- 2.8 Replication
- 2.9 Automation and Orchestration
- 2.10 Chargeback
- 2.11 Vendor Lockin
- 2.12 Cloud Standards
- 2.13 OpEx, CapEx
- 2.14 TCO-ROI
- 2.15 Business Enablers
- 2.16 Section Summary
- 2.17 Review Questions
Module 3 - General Google Cloud Knowledge
- 3.0 General GCP Knowledge
- 3.1 Domain Objectives
- 3.2 GCP Overview
- 3.3 Cloud Infrastructure
- 3.4 Cloud Hierarchy
- 3.5 Project Demo
- 3.6 Whiteboard Hierarchy and Projects
- 3.7 Service Options
- 3.8 Demo - Services Overview
- 3.9 Pricing Calculator
- 3.10 Demo - Pricing Calculator
- 3.11 Billing models and Discounts
- 3.12 Demo Billing
- 3.13 Compliance Resources
- 3.14 Demo - Compliance Reports Manager
- 3.15 Support Options
- 3.16 Service Level Agreement (SLA)
- 3.17 Google Cloud Framework and Maturity Model
- 3.18 Demo - Maturity Assessment
- 3.19 Access to GCP
- 3.20 Demo - GCP ACCESS
- 3.21 Section Summary
- 3.22 Review Questions
Module 4 - Google Cloud Products and Services
- 4.0 Google Cloud Products and Services
- 4.1 Domain Objectives
- 4.2 Core Services
- 4.3 Google Compute Engine, Google Cloud VMware Engine, and Bare Metal
- 4.4 Compute Storage and Disk Options
- 4.5 App Engine, Google Cloud Functions, and Cloud Run
- 4.6 Google Kubernetes Engine
- 4.7 Demo Compute Services
- 4.8 Container registry
- 4.9 Cost and Performance Tradeoffs of Scale To Zero
- 4.10 Database Options - Cloud SQL, Cloud Spanner, Cloud Bigtable, BigQuery
- 4.11 Demo - Database Offerings
- 4.12 Vision API, AI Platform, TPUs
- 4.13 Pre Trained Models
- 4.14 Data Pipeline Offerings
- 4.15 Data Ingestion Options
- 4.16 Software Development Life Cycle (SDLC)
- 4.17 Visibility and Alerting Offerings
- 4.18 Identify Data Migration Options
- 4.19 Compute VM Migration
- 4.20 Whiteboard - Migrations
- 4.21 Application Modernization
- 4.22 Define Software-Defined WAN (SD-WAN)
- 4.23 Connectivity Options
- 4.24 Whiteboard - Connectivity
- 4.25 IAM and Security
- 4.26 Whiteboard Cloud Architecture
- 4.27 Section Summary
- 4.28 Review Questions
Module 5 - Google Cloud Digital Leader Course Closeout
- 5.0 Google Cloud Digital Leader Course Closeout
- 5.1 Course Review
- 5.2 Resources
- 5.3 Exam Overview
- 5.4 Course Closeout
Google Analytics 4 Course Content
Module 1 - Google Analytics 4 - Course Overview
- 1.0 About Google Analytics 4
- 1.1 Course Intro Welcome
- 1.2 Instructor Intro
Module 2 - Fundamentals of Google Analytics
- 2.1 What is a Digital Product
- 2.2 Google Market Platform
- 2.3 Google Analytics Overview
- 2.4 Google Analytics 4 Overview
- 2.5 Whiteboad Discussion-How Does GA Work
- 2.6 Comparing GA3 to GA4
- 2.7 Whiteboard Compare Data Models
- 2.8 Demo- GA Console Walkthru
- 2.9 Admin Panel
- 2.10 Demo Admin Panel
- 2.11 Tag Manager
- 2.12 Demo Tag Manager
- 2.13 Segment Review
- 2.14 Segment Review Questions
Module 3 - Advanced Topics with Google Analytics
- 3.1 Upgrading and Running Parallel
- 3.2 Whiteboard Discussion - Parallel
- 3.3 Demo Console Parallel
- 3.4 Hands on Demo - Install GA4 on a Live Site
- 3.5 Understand Reporting Options, Lifecycle Collections
- 3.6 Hands on Demo - Exploring reports
- 3.7 Hands on Demo - Set up GA4 Custom Eventsmp4
- 3.8 Hands on Demo - Conversions, Audiences, DebugView
- 3.9 Hands on Demo - Advertising
- 3.10 Hands on Demo - Explorations:Insights
- 3.11 Hands on Demo - Lifecycle and Users
- 3.12 Google Big Query Connections
- 3.13 Demo - BigQuery Data Integrations
- 3.14 Google Ads
- 3.15 Demo - Google Ads
- 3.16 Google Signals
- 3.17 Demo - Google Signals
- 3.18 Certification Options
- 3.19 Segment Summary
- 3.20 Review Questions
- 3.21 Resources
- 3.22 Course Closeout
CompTIA A+ 220-1101 (Core 1) Course Content
Module 1 - Devices, Setups, and Installs
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Appropriate Safety Procedures
- 1.3 PC Components
- 1.4 Guidlines for PC Disassembly
- 1.5 Motherboards
- 1.6 CPU Sockets
- 1.7 PCI Bus
- 1.8 Storage Bus (SATA and IDE)
- 1.9 Discussing PC Components
- 1.10 Common Connection Interfaces
- 1.11 Wired and Wireless Connection Standards
- 1.12 Install Peripheral Devices
- 1.13 Guidlines and Discussion for Installing Peripheral Devices
Module 2 - Displays and Multimedia Devices
- 2.1 Displays and Multimedia
- 2.2 Display Device Connections and Cables
- 2.3 Discussing Display Device Installation and Configuration
- 2.4 Troubleshoot Display Devices
- 2.5 Guidelines for Troubleshooting Display Devices
- 2.6 Discussing Display Device Troubleshooting
- 2.7 Install and Configure Multimedia Devices
- 2.8 Discussing Multimedia Device Installation and Configuration
Module 3 - Supporting Multiple Drive Types
- 3.1 Supporting Multiple Drive Types and Memory
- 3.2 Memory Types
- 3.3 RAM Types
- 3.4 Memory Modules
- 3.5 DIMM and SO-DIMM Technologies
- 3.6 Parity and ECC RAM
- 3.7 Memory Compatibility Issues
- 3.8 Discussing System Memory Installation
- 3.9 Install and Configure Mass Storage Devices
- 3.10 Storage Adapters and Cables
- 3.11 Solid State Drives
- 3.12 Guidlines for Installing Mass Storage Devices
- 3.13 Discussing Mass Storage Device Installation and Configuration
- 3.14 Install and Configure Removable Storage
- 3.15 Discussing Removable Storage Device Istallation and Configuration
- 3.16 Configure RAID
- 3.17 RAID Configuration Options
- 3.18 Discussing RAID Configuration
- 3.19 Troubleshoot Storage Devices
- 3.20 Boot Failures
- 3.21 Discussing Storage Device Troubleshooting
Module 4 - Accounting for CPUs and Internal Components
- 4.1 Install Upgrade CPUs
- 4.2 Multiprocessing and Multicore Processors
- 4.3 Discussing CPU Upgrades
- 4.4 Configure and Update BIOS UEFI
- 4.5 Discussing BOIS-UEFI Configuration and Updates
- 4.6 Install Power Supplies
- 4.7 Discussing Power Supply Installation
- 4.8 Troubleshoot Internal System Components
- 4.9 POST and Boot Problems
- 4.10 Boot Troubleshooting and Log Entries
- 4.11 Motherboard Component Problems
- 4.12 Discussing System Component Troubleshooting
Module 5 - All About Network Theories
- 5.1 Wired Networks
- 5.2 Common Ethernet Network Implementations
- 5.3 Taps and Mirrors
- 5.4 Discussing Wired Networks
- 5.5 Network Hardware Devices
- 5.6 Switches
- 5.7 Power Over Ethernet
- 5.8 Discussing Network Hardware Devices
- 5.9 Wireless Networks
- 5.10 Access Points and Wireless Network Modes
- 5.11 Discussing Wireless Networks
- 5.12 Internet Connection Types
- 5.13 Wireless Internet Service Providers WISP
- 5.14 Discussing Internet Connection Types
- 5.15 Network Configuration Concepts
- 5.16 The TCIP-IP Protocol Suite
- 5.17 Internet Protocol and IP Addressing
- 5.18 Public and Private IP Addresses
- 5.19 IPv6
- 5.20 Discussing Network Configuration Concepts
- 5.21 Network Services
- 5.22 DNS
- 5.23 Dynamic and Static IP Configurations
- 5.24 DNS Records MX and A
- 5.25 Web Servers and HTTP-HTTPS
- 5.26 Discussing Network Services
Module 6 - Network Operations and Diagnostics
- 6.1 Configuring and Troubleshooting Networks
- 6.2 Network Connections in Windows
- 6.3 Install and Configure SOHO Networks
- 6.4 Configure SOHO Network Security
- 6.5 Firewalls
- 6.6 Port Fowarding and Port Triggering
- 6.7 Windows Firewall
- 6.8 Network Security and Embedded Appliances
- 6.9 Configure Remote Access
- 6.10 Discussing Remote Access Configuration
- 6.11 Troubleshoot Network Connections
- 6.12 IP Configuration Issues
- 6.13 Routing Issues
- 6.14 Discussing Network Connection Troubleshooting
Module 7 - Cloud and Virtualization Computing
- 7.1 Configure Client-Side Virtulaization
- 7.2 Hypervisors
- 7.3 Processor Support and Resource Requirements
- 7.4 Virtual Networks
- 7.5 Client-Side Virtualization
- 7.6 Cloud Computing Concepts
- 7.7 Internal and External Shared Resources
- 7.8 Cloud Service Options
- 7.9 Virtual Desktops
- 7.10 Software-Defined Networking (SDN)
- 7.11 Discussing Cloud Computing Concepts
Module 8 - Laptop Features and Troubleshooting
- 8.1 Use Laptop Features
- 8.2 Expansion Options
- 8.3 Discussing Laptop Features
- 8.4 Install and Configure Laptop Hardware
- 8.5 Discussing Laptop Hardware Installation and Configuration
- 8.6 Troubleshoot Common Laptop Issues
- 8.7 Discussing Troubleshooting Common laptop Issues
Module 9 - Syncing and Setup of Mobile Devices
- 9.1 Syncing and Setup of Mobile Devices
- 9.2 Connect and Configure Mobile Devices
- 9.3 Configure Mobile Device Network Connectivity
- 9.4 Mobile VPN Configuration
- 9.5 Email Configuration Options
- 9.6 Discussing Mobile Device Network Connectivity Configuration
- 9.7 Support Mobile Apps
- 9.8 Discussing Mobile App Support
Module 10 - All Things Printing
- 10.1 All Things Printing
- 10.2 Discussing Laser Printer Maintenance
- 10.3 Maintain Inkjet Printers
- 10.4 Discussing Inkjet Printer Maintenance
- 10.5 Maintain Impact, Thermal, and 3D Printers
- 10.6 Discussing Impact, Thermal, and 3D Printer Maintenance
- 10.7 Install and Configure Printers
- 10.8 Discussing Printer Installation and Configuration
- 10.9 Troubleshoot Print Device Issues
- 10.10 Install and Configure Imaging Devices
- 10.11 Discussing Device Installation and Configuration
Module 11 - Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
CompTIA A+ 220-1102 (Core 2) Course Content
Module 1 - Operating System Management
- 1.1 Introduction to the Course, Meet the Instructor
- 1.2 Identify Common Operating Systems
- 1.3 Microsoft Windows
- 1.4 Work and Education Features
- 1.5 Windows System Limits
- 1.6 Apple Operating Systems
- 1.7 Linux Disk and File Management
- 1.8 Discussing OS Types
- 1.9 Use Windows Features and Tools
- 1.10 Administrative Tools
- 1.11 Manage Files in Windows
- 1.12 System Hierarchies
- 1.13 File Attributes
- 1.14 Discussing Windows Features and Tools
- 1.15 Manage Disks in Windows
- 1.16 Discussing File Management in Windows
- 1.17 The Windows Disk Management Console
- 1.18 Discussing Windows Disk Management
- 1.19 Manage Devices in Windows
- 1.20 Device Manager
- 1.21 Discussing Windows Device Manager
Module 2 - Configuring and installing the OS
- 2.1 Configuring and Installing the OS
- 2.2 Installation Boot Methods
- 2.3 Disk Formatting and Partitioning
- 2.4 Networking Considerations
- 2.5 Post Installation Tasks
- 2.6 OS Installation Types
- 2.7 Unattended Installations
- 2.8 Maintain OSs
- 2.9 OS Updates
- 2.10 Anti-Malware Updates
- 2.11 Scheduled Backups
- 2.12 Task Schedulers part 1
- 2.13 Task Schedulers part 2
- 2.14 Install Windows 10 Demonstration
- 2.15 Discussing OS Maintenance
Module 3 - Tools to Troubleshoot and Maintain the OS
- 3.1 Install and Manage Windows Applications
- 3.2 Windows OS Tools
- 3.3 Application and Print Services
- 3.4 Task Manager
- 3.5 Manage Windows Performance
- 3.6 Windows Performance Management Tools
- 3.7 Troubleshoot Windows
- 3.8 Event Viewer
- 3.9 The System Configuration Utility
- 3.10 Troubleshooting Tips Boot Process
- 3.11 Troubleshooting Tips for Windows System Issues
- 3.12 Blue Screens and Spontaneous Shutdowns
- 3.13 Troubleshooting Tips for File and Memory Corruption
- 3.14 Safe Boot
- 3.15 System Repair Disc
- 3.16 System Restore
- 3.17 Guidelines for Troubleshooting Windows Issues
Module 4 - Network Management Tools
- 4.1 Network Management Tools
- 4.2 Network Connectivity
- 4.3 IP Addressing and Connection Types
- 4.4 Proxy Settings
- 4.5 Windows Client Configuration
- 4.6 Location Services
- 4.7 Firewalls
- 4.8 Network Troubleshooting
- 4.9 Remote Desktop Tools
- 4.10 Desktop Management and Remote Monitoring Tools
- 4.11 Disscussion Topics
Module 5 - Sharing Resources and Wrights Management
- 5.1 Sharing Resources and Wrights Management
- 5.2 User Group Accounts
- 5.3 Local Secutity Policy
- 5.4 SSO and Credential Manager
- 5.5 Workgroups and Homegroups
- 5.6 Network and Sharing Center
- 5.7 Network Share Configuration
- 5.8 NTSF File and Folder Permissions
- 5.9 Configure Active Directory Accounts and Policies
- 5.10 Domain Membership and Group Policy Objects
- 5.11 Basic AD Functions
- 5.12 Account Locks and Password Resets
Module 6 - Threats and Security Measures
- 6.1 Threats and Security Measures
- 6.2 Logical Security Concepts
- 6.3 Encryption
- 6.4 PKI and Certificates
- 6.5 Execution Control
- 6.6 NAC
- 6.7 Discussing Logical Decurity Concepts
- 6.8 Threats and Vulnerablilities
- 6.9 Types of Password Attacks
- 6.10 Discussing Threats and Vulnerabilities
- 6.11 Physical Security Controls
- 6.12 Discussing Physical Security Measures
Module 7 - Policies to Protect Data
- 7.1 Policies to Protect Data
- 7.2 Implement Security Best Practices
- 7.3 Guidlines for Implementing Security Best Practices
- 7.4 Discussing Security Best Practices Implementation
- 7.5 Implement Data Protection Policies
- 7.6 ACLs and Directory Permissions
- 7.7 Full Disk Encryption
- 7.8 Guildlines for Implementing Data Protection Policies
- 7.9 Discussing Data Protection Policies
- 7.10 Protect Data During Incident Response
- 7.11 Discussing Data Protection During Incident Response
Module 8 - Prevent Malware and Security Threats
- 8.1 Prevent Malware and Security Threats
- 8.2 Detect, Remove, and Prevent Malware
- 8.3 Trojan Horses and Spyware
- 8.4 Sources of Malware Infection
- 8.5 Best Practices for Malware Removal
- 8.6 Discussing Detecting, Removing, and Preventing Malware Infections
- 8.7 Troubleshoot Common Workstation Security Issues
- 8.8 Discussing Troubleshoot Common Workstation Security Issues
Module 9 - Supporting and Troubleshooting Mobile Devices
- 9.1 Supporting and Troubleshooting Mobile Devices
- 9.2 Secure Mobile Devices
- 9.3 IOT Internet of Things
- 9.4 Discussing Mobile Device Security
- 9.5 Troubleshoot Mobile Device Issues
- 9.6 Mobile Device Security Troubleshooting
- 9.7 Discussing Troubleshooting Mobile Devices
Module 10 - Implementing Operational Procedures
- 10.1 Implementing Operational Procedures
- 10.2 Environmental Impacts and Controls
- 10.3 Discussing Environmental Impact and Controls
- 10.4 Create and Maintain Documentation
- 10.5 Discussing Documentation Creation and Maintenance
- 10.6 Use Basic Change Management Best Practices
- 10.7 Discussing Change Management Best Practices
- 10.8 Implement Disaster Prevention and Recovery Methods
- 10.9 Discussing Implement Disaster Prevention and Recovery Methods
- 10.10 Basic Scripting Concepts
- 10.11 Discussing Scripting
- 10.12 Professionalism and Communication
- 10.13 Discussing Professionalism and Communication Skills
Module 11 - Resources and Testing
- 11.1 Introduction to Resources and Testing
- 11.2 Resources and Testing
- 11.3 Joining a Domain with Windows 10
- 11.4 Boot Order and BIOS
- 11.5 Virtual Machine Install & Configure
- 11.6 PC Teardown
- 11.7 Exploring the Laptop
- 11.8 Install Windows 10 Demonstration
Certified Ethical Hacker (CEH) Version 11 Part 3: Advanced Ethical Hacker (ECC 312-50) Course Content
Module 61 - CEH v11 Advanced Ethical Hacker Course Intro
- 61.1 About This Course: Advanced Ethical Hacker
- 61.2 About the Instructor
Module 62 - CEH v11 Session Hjacking
- 62.1 Session Hijacking Concepts
- 62.2 Token-based Authentication
- 62.3 Compromising a Session Token
- 62.4 XSS
- 62.5 CSRF
- 62.6 Other Attacks
Module 63 - CEH v11 Defending Against Hijacking
- 63.1 Network Level Hijacking
- 63.2 Session Hijacking Tools
- 63.3 Session Hijacking Countermeasures
- 63.4 Session Penetration Hijacking
- 63.5 Review
Module 64 - CEH v11 Implementing Intrusion Detection
- 64.1 IDS-IPS
- 64.2 Snort
- 64.3 Snort Rules
- 64.4 Syslog
Module 65 - CEH v11 Testing Intrusion Detection
- 65.1 WIPS
- 65.2 IDS Considerations
- 65.3 IDS Tools
- 65.4 IDS Evasion
- 65.5 IDS-Firewall Evasion Tools
- 65.6 IDS Scenerios
Module 66 - CEH v11 Implementing Firewalls
- 66.1 Firewalls
- 66.2 Packet Filtering Rules
- 66.3 Firewall Deployments
- 66.4 Traffic Flow through Firewalls
- 66.5 Split DNS
Module 67 - CEH v11 Testing Firewallls
- 67.1 Firewall Tools
- 67.2 Firewall Evasion
- 67.3 Firewall Scenarios
Module 68 - CEH v11 Implementing Honeypots
- 68.1 Honeypots
- 68.2 Honeypot Detection
- 68.3 IDS-Firewall Evasion Countermeasures
- 68.4 IDS-Firewall Honeypot Penetration Testing
- 68.5 Review
Module 69 - CEH v11 Attacker Webserver
- 69.1 Webserver Security Overview
- 69.2 Common Webservers
- 69.3 Webserver Attacks
- 69.4 Misconfiguration Attack Examples
Module 70 - CEH v11 Webserver Defense
- 70.1 Webserver Attack Tools
- 70.2 Attack Countermeasures
- 70.3 Webserver Penetration Testing
- 70.4 Review
Module 71 - CEH v11 Intro To Web Apps
- 71.1 Web Application Concepts
- 71.2 Attacking Web Apps
Module 72 - CEH v11 OWASP Top 5 Web App Vulnerabilities
- 72.1 A01 - Broken Access Control
- 72.2 A02 - Cryptographic Failures
- 72.3 A03 - Injection
- 72.4 A04 - Insecure Design
- 72.5 A05 - Security Misconfiguration
Module 73 - CEH v11 OWASP Additional Web App Vulnerabilities
- 73.1 A06 - Vulnerable and Outdated Components
- 73.2 A07 - Identification and Authentication Failures
- 73.3 A08 - Software and Data Integrity Failures
- 73.4 A09 - Security Logging and Monitoring
- 73.5 A10 - Server Side Request Forgery
Module 74 - CEH v11 Common Web App Attacks
- 74.1 XSS Attacks
- 74.2 CSRF
- 74.3 Parameter Tampering
- 74.4 Clickjacking
- 74.5 SQL Injection
Module 75 - CEH v11 Unauthorized Access Through Web Apps
- 75.1 Insecure Deserialization Attacks
- 75.2 IDOR
- 75.3 Directory Traversal
- 75.4 Session Management Attacks
- 75.5 Response Splitting
Module 76 - CEH v11 Web App Overflow Attacks
- 76.1 Denial of Service
- 76.2 Overflow Attacks
- 76.3 XXE Attacks
- 76.4 Soap Attacks
- 76.5 Ajax Attacks
Module 77 - CEH v11 Defending Web Apps
- 77.1 Web App Hacking Tools
- 77.2 Web Hacking Countermeasures
- 77.3 Web Application Penetration Testing
- 77.4 Review
Module 78 - CEH v11 Intro To SQL Injection
- 78.1 SQL Overview
- 78.2 SQL Injection Concepts
- 78.3 Basic SQL Injection
Module 79 - CEH v11 Performing SQL Injection
- 79.1 Finding Vulnerable Websites
- 79.2 Error-based SQL Injection
- 79.3 Union SQL Injection
- 79.4 Blind SQL Injection
- 79.5 SQL Injection Scenarios
- 79.6 Evading Detection
Module 80 - CEH v11 Defending Against SQL Injection
- 80.1 SQL Injection Tools
- 80.2 SQL Injection Countermeasures
- 80.3 Safe Coding Examples
- 80.4 SQL Wildcards
- 80.5 SQL Injection Penetration Testing
- 80.6 Review
Module 81 - CEH v11 Wireless Networking Overview
- 81.1 Wireless Concepts
- 81.2 Wireless Signal Encoding
- 81.3 Wi-Fi Standards
- 81.4 Wi-Fi Antennas
- 81.5 Wireless Authentication
Module 82 - CEH v11 Wi-Fi Security
- 82.1 Wi-Fi Security Standards
- 82.2 Wireless Network Troubleshooting Tools
- 82.3 Wi-Fi Discovery Tools
- 82.4 Sniffing Wi-Fi
Module 83 - CEH v11 Hacking Wi-Fi
- 83.1 Wi-Fi Attack Types
- 83.2 Wi-Fi Rogue Access Point Attacks
- 83.3 Wi-Fi Denial of Service Attacks
- 83.4 Wi-Fi Password Cracking Attacks
- 83.5 WEP Cracking
Module 84 - CEH v11 Advanced Wireless Attacks
- 84.1 WPA-WPA2 Cracking
- 84.2 WPA3 Attacks
- 84.3 WPS Cracking
- 84.4 Wi-Fi Attack Tools for Mobile Devices
- 84.5 Bluetooth Hacking
- 84.6 Other Wireless Hacking
Module 85 - CEH v11 Defending Wireless Networks
- 85.1 Wireless Hacking Countermeasures
- 85.2 Wireless Security Tools
- 85.3 Wireless Penetration Testing
- 85.4 Review
Module 86 - CEH v11 Mobile Platform Overview
- 86.1 Mobile Platform Overview
- 86.2 Mobile Device Vulnerabilities
- 86.3 Mobile Device Attacks
Module 87 - CEH v11 Hacking Android
- 87.1 Android
- 87.2 Android Vulnerabilities
- 87.3 Rooting Android
- 87.4 Android Exploits
- 87.5 Android Hacking Tools
- 87.6 Reverse Engineering an Android App
- 87.7 Securing Android
Module 88 - CEH v11 Hacking iOS
- 88.1 iOS
- 88.2 iOS Vulnerabilities
- 88.3 Jailbreaking iOS
- 88.4 iOS Exploits
- 88.5 iOS Hacking Tools
- 88.6 Securing iOS
Module 89 - CEH v11 Mobile Platform Defense
- 89.1 Mobile Device Management
- 89.2 BYOD
- 89.3 Mobile Security Guidelines and Tools
- 89.4 Mobile Device Penetration Testing
- 89.5 Review
Module 90 - CEH v11 IoT Hacking
- 90.1 loT Concepts
- 90.2 loT Infrastructure
- 90.3 Fog Computing
- 90.4 loT Vulnerabilities
- 90.5 loT Threats
Module 91 - CEH v11 IoT Defense
- 91.1 IoT Hacking Methodologies and Tools
- 91.2 IoT Hacking Methodolgies and Tools Part 2
- 91.3 Hacking Countermeasures
- 91.4 IoT Penetration Testing
- 91.5 OT Concepts
- 91.6 Industrial IoT
Module 92 - CEH v11 Operational Technology Overview
- 92.1 IT-OT Convergence
- 92.2 ICS
- 92.3 SCADA
- 92.4 DCS
- 92.5 RTU
- 92.6 PLC
- 92.7 Addition OT Components
Module 93 - CEH v11 Hacking OT
- 93.1 OT Variables
- 93.2 Well-known OT attacks
- 93.3 OT Attack Methodology and Basic Tools
- 93.4 OT Reconnaissance
- 93.5 OT Penetration and Control
Module 94 - CEH v11 Defending OT
- 94.1 OT Attack Tools
- 94.2 OT Hacking Countermeasures
- 94.3 OT Penetration Testing
- 94.4 Review
Module 95 - CEH v11 Attacking The Cloud
- 95.1 Cloud Computing Concepts
- 95.2 Virtualization
- 95.3 Cloud Types
- 95.4 Cloud Benefits and Considerations
- 95.5 Cloud Risks and Vulnerablilities
Module 96 - CEH v11 Cloud Defense
- 96.1 Cloud Threats and Countermeasures
- 96.2 Cloud Security Tools
- 96.3 Cloud Security Best Practices
- 96.4 Cloud Penetration Testing
- 96.5 Review
Module 97 - CEH v11 Cryptography Overview
- 97.1 Cryptography Concepts
- 97.2 Symetric Encryption
- 97.3 Asymmetric Encryption
- 97.4 Public Key Exchange
- 97.5 PKI
Module 98 - CEH v11 Protecting Data With Crytography
- 98.1 Digital Certificates
- 98.2 Digital Signatures
- 98.3 Hashing
- 98.4 Email Encryption
- 98.5 Network Communication Encryption
Module 99 - CEH v11 Protecting Data at Home and in Transit
- 99.1 Disk Encryption
- 99.2 VPN Encryption
- 99.3 Cryptography Tools
Module 100 - CEH v11 Pentesting Cryptography
- 100.1 Cryptography Attacks
- 100.2 Cryptography Penetration Testing
- 100.3 Review
- 100.4 Conclusion
Certified Ethical Hacker (CEH) Version 11 Part 2: Ethical Hacker (ECC 312-50) Course Content
Module 21 - CEH v11 Ethical Hacker Course Intro
- 21.1 About this course - Ethical Hacker
- 21.2 About the Instructor
Module 22 - CEH v11 Intro to Footprinting
- 22.1 Footprinting Concepts
- 22.2 Footprinting Methodology
- 22.3 OSINT Tools
- 22.4 Advanced Google Search
- 22.5 Whois Footprinting
- 22.6 Activity - Performing a Whois Lookup
Module 23 - CEH v11 Footprinting Network Services
- 23.1 DNS Footprinting
- 23.2 Website Footprinting
- 23.3 Email Footprinting
- 23.4 Network Footprinting
- 23.5 Footprinting through Social Networking Sites
Module 24 - CEH v11 Defend Against Footprinting
- 24.1 Competitive Intelligence Gathering
- 24.2 Footprinting Countermeasures
- 24.3 Footprinting Penetration Testing
- 24.4 Review
Module 25 - CEH v11 Intro to Scanning
- 25.1 Scanning Concepts
- 25.2 ICMP Discovery Scans
- 25.3 Other Discovery Scans
Module 26 - CEH v11 Port Scanning
- 26.1 Ports
- 26.2 TCP Flags and Handshakes
- 26.3 TCP Scan Types
- 26.4 Other Scanning Techniques
Module 27 - CEH v11 Vulnerability Scanning
- 27.1 Banner Grabbing
- 27.2 Vulnerability Scanning
- 27.3 SSDP Scanning
Module 28 - CEH v11 NMAP
- 28.1 Nmap
- 28.2 Common Nmap Scans
- 28.3 Nmap Options
- 28.4 Nmap Stealth Scans
- 28.5 Hping and Other Scanners
Module 29 - CEH v11 Firewalls and Intrusion Detection
- 29.1 Firewall Types
- 29.2 Firewall Features
- 29.3 Firewall Features Part 2
- 29.4 Firewall Configurations
- 29.5 Intrusion Detection and Prevention
Module 30 - CEH v11 Evading Detection
- 30.1 Firewall and IDS Evasion
- 30.2 Firewall and IDS Evasion Part 2
- 30.3 Firewalking
- 30.4 Probing a Firewall
- 30.5 Probing a Firewall Part 2
Module 31 - CEH v11 Proxies and VPNs
- 31.1 Proxies
- 31.2 VPNs
- 31.3 Tor
- 31.4 Scanning Countermeasures
- 31.5 Scanning Penetration Testing
- 31.6 Review
Module 32 - CEH v11 Accessing Vulnerability
- 32.1 Vulnerability Assessment Overview
- 32.2 Vulnerability Scoring Systems
- 32.3 Vulnerability Assessment Tools
Module 33 - CEH v11 Vulnerability Research
- 33.1 Scanner Output and Reports
- 33.2 Vulnerability Research
- 33.3 Review
Module 34 - CEH v11 Intro to Enumeration
- 34.1 Enumeration Concepts
- 34.2 Enumeration Techniques and Tools
- 34.3 Service and Application Enumeration
- 34.4 SMB and NetBIOS Enumeration
Module 35 - CEH v11 Service Enumeration
- 35.1 SNMP Enumeration
- 35.2 LDAP Enumeration
- 35.3 DNS Enumeration
- 35.4 SMTP Enumeration
- 35.5 NTP Enumeration
Module 36 - CEH v11 Advanced Enumeration
- 36.1 Remote Connection Enumeration
- 36.2 File Transfer Enumeration
- 36.3 VoIP Enumeration
- 36.4 IPSEC Enumeration
- 36.5 IPv6 Enumeration
- 36.6 BGP Enumeration
Module 37 - CEH v11 Command Line Enumeration
- 37.1 Windows Command Line Enumeration
- 37.2 Linux Command Line Enumeration
- 37.3 Linux Command Line Enumeration Part 2
Module 38 - CEH v11 Defending Against Enumeration
- 38.1 Enumeration Countermeasures
- 38.2 Enumeration Countermeasures Part 2
- 38.3 Enumeration Penetration Testing
- 38.4 Review
Module 39 - CEH v11 Intro to System Hacking
- 39.1 System Hacking Concepts
- 39.2 System Hacking Tools and Frameworks
- 39.3 Searchsploit
- 39.4 Compiling and Running Exploits
Module 40 - CEH v11 System Hacking with Metasploit
- 40.1 Metasploit
- 40.2 Metasploit Search
- 40.3 Metasploit Exploits and Payloads
- 40.4 Metasploit Meterpreter
- 40.5 Metasploit Connectivity
- 40.6 Metasploit Impersonation and Migration
Module 41 - CEH v11 Further Attacking a Compromised System
- 41.1 Netcat
- 41.2 Pivoting
- 41.3 Netcat Relays
- 41.4 Metasploit Post Exploitation Modules
- 41.5 Common Operating System Exploits
Module 42 - CEH v11 Hacking an Operating System
- 42.1 Hacking Windows
- 42.2 Hacking Linux
- 42.3 Network Service Exploits
- 42.4 Password Attacks
Module 43 - CEH v11 Password Cracking Overview
- 43.1 Dictionary Attack
- 43.2 Brute Force Attack
- 43.3 Password Spraying
- 43.4 Rainbow Tables
Module 44 - CEH v11 Performing Password Attacks
- 44.1 Network Service Password Attacks
- 44.2 Password Cracking Tools
- 44.3 Online Password Cracking Sites
- 44.4 Windows Password Cracking
- 44.5 Linux Password Cracking
- 44.6 Other Methods for Obtaining Passwords
Module 45 - CEH v11 Using Exploits
- 45.1 Keylogging
- 45.2 Spyware
- 45.3 Rootkits
- 45.4 Buffer Overflows
- 45.5 Privilege Escalation
- 45.6 Hiding Files
Module 46 - CEH v11 Hiding Information
- 46.1 Alternate Data Streams
- 46.2 Steganography
- 46.3 Creating and Maintaining Remote Access
- 46.4 Hiding Evidence
Module 47 - CEH v11 Covering Tracks
- 47.1 Covering Tracks in Windows
- 47.2 Covering Tracks in Linux
- 47.3 System Hacking Counter-Measures
- 47.4 System Hacking Penetration Testing
- 47.5 Review
Module 48 - CEH v11 Malware Overview
- 48.1 Intro to Malware
- 48.2 Virus Overview
- 48.3 Virus Types
- 48.4 Self-Hiding Viruses
- 48.5 Worms
- 48.6 Trojans
- 48.7 Trojan Types
- 48.8 RATS
Module 49 - CEH v11 Hacking With Malware
- 49.1 Ransomware
- 49.2 Botnets
- 49.3 Covert Channel Trojans
- 49.4 Banking Trojans
- 49.5 Rootkits
Module 50 - CEH v11 Creating Malware
- 50.1 Other Malware
- 50.2 Malware Makers
- 50.3 Dropper and Stage Creation
- 50.4 Exploit Kits
Module 51 - CEH v11 Detecting Malware
- 51.1 Malware Detection
- 51.2 Malware Detection Part 2
- 51.3 Malware Analysis
Module 52 - CEH v11 Defending Against Malware
- 52.1 Malware Reverse Engineering
- 52.2 Malware Countermeasures
- 52.3 Malware Penetration Testing
- 52.4 Review
Module 53 - CEH v11 Sniffing
- 53.1 Sniffing Concepts
- 53.2 Types of Sniffing
- 53.3 Sniffing Protocols
- 53.4 Sniffing Tools
Module 54 - CEH v11 Spoofing and MITM
- 54.1 ARP
- 54.2 ARP Spoofing
- 54.3 MITM
- 54.4 MAC Attacks
- 54.5 MAC Spoofing
- 54.6 DHCP Attacks
Module 55 - CEH v11 Defending Against Poisoning and Sniffing
- 55.1 Name Resolution Poisoning
- 55.2 VLAN Hopping
- 55.3 Sniffing Counter Measures
- 55.4 Sniffing Penetration Testing
- 55.5 Review
Module 56 - CEH v11 Social Engineering
- 56.1 Social Engineering Concepts
- 56.2 Social Engineering Techniques
- 56.3 Social Engineering Examples
- 56.4 Social Engineering Tools
Module 57 - CEH v11 Defending Against Social Engineering
- 57.1 Social Media
- 57.2 Identity Theft
- 57.3 Insider Threats
- 57.4 Social Engineering Countermeasures
- 57.5 Social Engineering Penetration Testing
- 57.6 Review
Module 58 - CEH v11 Denial-of-Service
- 58.1 DoS-DDoS Concepts
- 58.2 Volumetric Attacks
- 58.3 Fragmentation Attacks
- 58.4 State Exhaustion Attacks
- 58.5 Application Layer Attacks
Module 59 - CEH v11 Advanced DoS Attacks
- 59.1 Protocol Attacks
- 59.2 Other Attacks
- 59.3 Botnets
Module 60 - CEH v11 Defending Against Denial-of-Service
- 60.1 DoS-DDoS Attack Tools
- 60.2 DoS-DDoS Countermeasures
- 60.3 Dos Penetration Testing
- 60.4 Review
HTML5 & CSS3 Web Design Fundamentals with JavaScript Course Content
Module 1 - HTML5-CSS3 Introduction
- 1.1 Introduction to the Course
Module 2 - The Internet and World Wide Web
- 2.1 The Internet and World Wide Web
Module 3 - HTML Fundamentals
- 3.1 Web Development Tools
- 3.2 HTML Skeletons
- 3.3 Paragraph Elements
- 3.4 Phrase Elements
- 3.5 HTML Comments
- 3.6 HTML Entities
Module 4 - CSS Fundamentals
- 4.1 CSS Fundamentals
- 4.2 Inline Styles
- 4.3 Embedded Style Sheets
- 4.4 External Style Sheets
- 4.5. Selector Types
- 4.6 Decendent Selectors
- 4.7 CSS Colors
- 4.8 ID Versus Class
- 4.9 CSS Text Properties
- 4.10 CSS Box Model
Module 5 - Images and Links
- 5.1 Images and Links
- 5.2 Image Elements
- 5.3 Images with Hyperlinks
- 5.4 Open Links in New Tab
- 5.5 Telephone and Email Links
- 5.6 Validate and Debug
Module 6 - Responsive Design
- 6.1 Responsive Design
- 6.2 Fixed Layouts
- 6.3 Viewport Meta Element
- 6.4 Usefull CSS Styles
Module 7 - Media Queries
- 7.1 More About Responsive Design
- 7.2 Global Changes
- 7.3 Mobile Devices
- 7.4 Manipulate Logo
Module 8 - Layouts
- 8.1 Layouts
- 8.2 Tablets Part 1
- 8.3 Tablets Part 2
- 8.4 Styling Part 1
- 8.5 Styling Part 2
- 8.6 Styling Part 3
- 8.7 Styling Part 4
- 8.8 Styling Part 5
- 8.9 Styling Part 6
Module 9 - Tables
- 9.1 Tables Part 1
- 9.2 Tables Part 2
Module 10 - Multimedia
- 10.1 Multimedia
- 10.2 Multimedia Part 2
- 10.3 Multimedia Part 3
Module 11 - Forms and JavaScript
- 11.1 Forms and JavaScript
- 11.2 jQuery
- 11.3 Styling Tables
Module 12 - The Web Server
- 12.1 The Web Server
Module 13 - Programming and JavaScript
- 13.1 Data Types
- 13.2 Global Methods
- 13.3 Variables
- 13.4 Conditional Statements
- 13.5 Loops
- 13.6 Operators
Module 14 - The Calculator
- 14.1 Calculator Part 1
- 14.2 Calculator Part 2
- 14.3 Calculator Part 3
- 14.4 Calculator Part 4
- 14.5 Calculator Part 5
- 14.6 Calculator Part 6
- 14.7 Calculator Part 7
CompTIA Security+ SY0-601 (2022) Course Content
Module 1 - Introduction to Security
- 1.1 Introduction to Security
Module 2 - Malware and Social Engineering Attacks
- 2.1 Malware and Social Engineering Attacks
Module 3 - Basic Cryptography
- 3.1 Basic Cryptography
Module 4 - Advanced Cryptography and PKI
- 4.1 Advanced Cryptography and PKI
Module 5 - Networking and Server Attacks
- 5.1 Networking and Server Attacks
Module 6 - Network Security Devices, Designs and Technology
- 6.1 Network Security Devices, Designs and Technology
Module 7 - Administering a Secure Network
- 7.1 Administering a Secure Network
Module 8 - Wireless Network Security
- 8.1 Wireless Network Security
Module 9 - Client and Application Security
- 9.1 Client and Application Security
Module 10 - Mobile and Embedded Device Security
- 10.1 Mobile and Embedded Device Security
Module 11 - Authentication and Account Management
- 11.1 Authentication and Account Management
Module 12 - Access Management
- 12.1 Access Management
Module 13 - Vulnerability Assessment and Data Security
- 13.1 Vulnerability Assessment and Data Security
Module 14 - Business Continuity
- 14.1 Business Continuity
Module 15 - Risk Mitigation
- 15.1 Risk Mitigation
Module 16 - Security Plus Summary and Review
- 16.1 - Security Plus Summary and Review
Module 17 - Hands-On Training
- 17.1 Hands-On Scanning Part 1
- 17.2 Hands-On Scanning Part 2
- 17.3 Hands-On Advanced Scanning
- 17.4 Hands-On MetaSploit
- 17.5 Hands-On BurpSuite
- 17.6 Hands-On Exploitation Tools Part 1
- 17.7 Hands-On Exploitation Tools Part 2
- 17.8 Hands-On Invisibility Tools
- 17.9 Hands-On Connect to Tor
Certified Ethical Hacker (CEH) Version 11 Part 1: Foundations (ECC 312-50) Course Content
Module 1 - CEH v11 Foundations Course Introduction
- 1.1 About this course: CEH Foundations
- 1.2 About the Instructor
Module 2 - CEH v11 Introduction To Networking
- 2.1 Networking Overview
- 2.2 Network Scope
- 2.3 Network Addressing
- 2.4 Activity - Examining Network Addressing
Module 3 - CEH v11 Lan Components
- 3.1 Protocols, Ports, Sockets
- 3.2 Network Topologies
- 3.3 LAN Devices
- 3.4 LAN Devices Part 2
- 3.5 VLANs
- 3.6 Activity - Examining Ports and Sockets
- 3.7 Activity - Examining Switches and VLANs
Module 4 - CEH v11 Routing and Network Access
- 4.1 Routers
- 4.2 Layer 3 Switches
- 4.3 Modems and Remote Access
- 4.4 Firewalls and Proxies
- 4.5 Activity - Examining Routing
- 4.6 Activity - Examining VLAN Routing
- 4.7 Activity - Examining Firewall Rules
Module 5 - CEH v11 Intrusion Detection and Network Layers
- 5.1 IDS and IPS
- 5.2 OSI Model
- 5.3 TCP-IP
- 5.4 Activity - Examining Network Layers
Module 6 - CEH v11 Networking Protocols and Addressing
- 6.1 Layer 4 Protocols
- 6.2 Layer 3 Protocols
- 6.3 Layer 2 Protocols
- 6.4 IP Addressing
- 6.5 Subnetting
- 6.6 DHCP
- 6.7 Activity - Examining TCP
- 6.8 Activity - Examining UDP
- 6.9 Activity - Examining IP
- 6.10 Activity - Examining ICMP
- 6.11 Activity - Examining ARP
Module 7 - CEH v11 Network Services
- 7.1 DNS
- 7.2 DNS Records
- 7.3 NTP
- 7.4 Authentication
- 7.5 Biometrics
- 7.6 Activity - Examining DNS
- 7.7 Activity - Examining DNS Records
Module 8 - CEH v11 Access Control
- 8.1 Local Authentication
- 8.2 Directory Service Authentication
- 8.3 Extending Authentication
- 8.4 Authorization
- 8.5 Activity - Testing Access Control
Module 9 - CEH v11 Intro to Linux
- 9.1 Linux Overview
- 9.2 Linux File System
- 9.3 Linux Core Commands
- 9.4 Linux Search and Read Commands
- 9.5 Activity - Exploring Linux
- 9.6 Activity - Using Linux Core Commands
- 9.7 Activity - Using Linux Search Commands
- 9.8 Activity - Using Linux Read Commands
Module 10 - CEH v11 Configuring Linux
- 10.1 Linux File Permissions
- 10.2 Linux Special Permissions
- 10.3 Linux Configuration
- 10.4 Linux Packages
- 10.5 Linux User Management
Module 11 - CEH v11 Practicing Linux Configuration
- 11.1 Activity - Setting Linux Permissions
- 11.2 Activity - Setting Linux Special Permissions
- 11.3 Activity - Managing Packages in Kali Linux
- 11.4 Activity - Managing Users and Groups in Linux
Module 12 - CEH v11 Managing Linux
- 12.1 Linux Job Scheduling
- 12.2 Linux File, Directory, and Download Commands
- 12.3 Linux System Commands
- 12.4 Linux Network Management
- 12.5 Linux Firewall
Module 13 - CEH v11 Practicing Linux Management
- 13.1 Activity - Scheduling Tasks in Linux
- 13.2 Activity - Using Linux File, Directory, and Download Commands
- 13.3 Activity - Using Linux Edit and Archive Commands
- 13.4 Activity - Compiling Malicious Code
- 13.5 Activity - Using Linux Process and System Commands
- 13.6 Activity - Using Linux Disk, Hardware, and Network Commands
Module 14 - CEH v11 Intro to Windows
- 14.1 Windows Overview
- 14.2 Windows Registry
- 14.3 Windows Security
Module 15 - CEH v11 Windows Commands
- 15.1 Windows Commands
- 15.2 Windows Admin Commands
- 15.3 Windows Network Commands
- 15.4 Windows Run Line Commands
- 15.5 Windows PowerShell
Module 16 - CEH v11 Practicing Windows Commands
- 16.1 Activity - Using Windows Built-in Commands
- 16.2 Activity - Using Windows Task Commands
- 16.3 Activity - Using Windows Admin Commands
- 16.4 Activity - Using Windows Network Commands
- 16.5 Activity - Using Windows PowerShell
- 16.6 Networking and OS Penetration Testing
- 16.7 Review
Module 17 - CEH v11 Intro to Hacking
- 17.1 Information Security Overview
- 17.2 Hacking Concepts
- 17.3 Ethical Hacking Concepts
- 17.4 Penetration Testing
- 17.5 Penetration Testing Part 2
- 17.6 Activity - Performing a Static Code Review
Module 18 - CEH v11 Information Security
- 18.1 Cyber Kill Chain Concepts
- 18.2 Activity - Performing Weaponization
- 18.3 Information Security
- 18.4 Security Policies
- 18.5 Security Controls
- 18.6 Access Control
Module 19 - CEH v11 Protecting Data
- 19.1 Data Protection
- 19.2 Backup Sites
- 19.3 Vulnerability Management
- 19.4 SIEM
- 19.5 Risks
Module 20 - CEH v11 Managing Risk
- 20.1 Risk Management
- 20.2 Incident Handling
- 20.3 Information Security Laws and Standards
- 20.4 Activity - Assessing Risk
- 20.5 Ethical Hacking Penetration Testing
- 20.6 Review
- 20.7 Conclusion
Cisco 300-410 ENARSI - Implementing Cisco Enterprise Advanced Routing and Services Course Content
Module 1 - Welcome to ENARSI
- 1.1 Welcome to ENARSI
- 1.2 A Few Things Before We Start
Module 2 - EIGRP (Enhanced Interior Gateway Protocol)
- 2.1 EIGRP Features
- 2.2 EIGRP Operations
- 2.3 EIGRP Exchange of Routing Information
- 2.4 EIGRP Metrics
- 2.5 EIGRP Queries
- 2.6 EIGRP Obtaining a Default Route
- 2.7 EIGRP Load Balancing
- 2.8 EIGRP Authentication
- 2.9 Troubleshooting EIGRP Part 1
- 2.10 Troubleshooting EIGRP Part 2
- 2.11 Troubleshooting EIGRP Part 3
- 2.12 Troubleshooting EIGRP Part 4
Module 3 - OSPF (Open Shortest Path First)
- 3.1 Implementing OSPF Part 1
- 3.2 Implementing OSPF Part 2
- 3.3 Implementing OSPF Part 3 DR BDR Election
- 3.4 Implementing OSPF Part 4 LSA Types
- 3.5 Implementing OSPF Part 5 OSPF States
- 3.6 Optimizing OSPF Summarization
- 3.7 Optimizing OSPF Default Routing
- 3.8 Optimizing OSPF Authentication
- 3.9 Optimizing OSPF Virtual Links
Module 4 - Route Redistribution
- 4.1 Route Redistribution Introduction
- 4.2 Route Redistribution Implementation
- 4.3 Route Redistribution OSPF E1 or E2
- 4.4 Route Redistribution Types
- 4.5 Route Redistribution Manipulation & Filtering
- 4.6 Route Redistribution Prefix-Lists
- 4.7 Route Redistribution Route-Maps
Module 5 - Implementing Path Control
- 5.1 Implementing Path Control
- 5.2 Implementing Path Control Implementation
Module 6 - BGP (Border Gateway Protocol)
- 6.1 BGP Fundamentals
- 6.2 BGP Attributes
- 6.3 BGP Path Selection Criteria
- 6.4 BGP Transit AS
- 6.5 BGP Split Horizon
- 6.6 BGP Weight Attribute
- 6.7 BGP Local Preference Attribute
- 6.8 BGP MED Attribute
- 6.9 BGP Route Filtering
- 6.10 BGP Peer Groups
- 6.11 BGP Route Reflectors
- 6.12 BGP Authentication
- 6.13 BGP Troubleshooting Part 1
- 6.14 BGP Troubleshooting Part 2
Module 7 - Implementing VRF (Virtual Routing and Forwarding)
- 7.1 Implementing VRF-Lite
Module 8 - Implementing DHCP
- 8.1 Implementing DHCP
- 8.2 Implementing DHCP Relay Manual Binding and Options
- 8.3 Implementing DHCP SLAAC and DHCPv6
- 8.4 Troubleshooting DHCP
Module 9 - Securing Cisco Routers (Control Plane)
- 9.1 Securing Cisco Routers Control Plane Security CoPP
- 9.2 Securing Cisco Routers Control Plane Security CoPP Implementation
Module 10 - Infrastructure Services
- 10.1 Infrasctucture Services AAA
- 10.2 Infrastructure Services SNMP
- 10.3 Infrastructure Services SYSLOG
- 10.4 Infrastructure Services SSH
- 10.5 Infrastructure Services HTTP FTP SCP
- 10.6 Infrastructure Services NetFlow
Adobe XD 2022 Course Content
Module 1 - Welcome to Adobe XD 2022
- 1.1 Welcome to Adobe XD 2022
- 1.2 What is Adobe XD 2022
Module 2 - Adobe XD 2022 Overview
- 2.1 Adobe XD 2022 Overview
Module 3 - Designing in a Project with Adobe XD 2022
- 3.1 Adobe XD 2022 Project Overview
- 3.2 Designing Your First Screen in Adobe XD 2022
Module 4 - Assets, Reusable Styles, and Responsive Resize in Adobe XD 2022
- 4.1 Assets and Reusable Styles in Adobe XD 2022
- 4.2 Responsive Resize in Adobe XD 2022
Module 5 - Images and Visual Effects in Adobe XD 2022
- 5.1 Imports, Images, and Masks in Adobe XD 2022
- 5.2 Special Visual Effects in Adobe XD 2022
Module 6 - Making Interactive Buttons in Adobe XD 2022
- 6.1 Plugins in Adobe XD 2022
- 6.2 Stacks in Adobe XD 2022
- 6.3 Components in Adobe XD 2022
- 6.4 Repeat Grid in Adobe XD 2022
Module 7 - Grouped Imports and Scroll Groups in Adobe XD 2022
- 7.1 Grouped imports in Adobe XD 2022
- 7.2 Scroll Groups in Adobe XD 2022
Module 8 - Prototyping and Animations in Adobe XD 2022
- 8.1 Prototyping with Adobe XD 2022
- 8.2 Animations in Adobe XD 2022
Module 9 - Exporting and Sharing with Adobe XD 2022
- 9.1 Exports in Adobe XD 2022
- 9.2 Adobe XD 2022 Conclusion
Adobe InDesign Course Content
Module 1 - Introduction To Adobe Indesign
- 1.1 Intro-InDesign
- 1.2 What is InDesign
Module 2 - Getting Started With Adobe InDesign
- 2.1 Creating a New Document
- 2.2 Importing Images and Understanding Links
- 2.3 Embedding
- 2.4 Navigating the Interface
- 2.5 Manipulating Graphics
- 2.6 Creating simple shapes
- 2.7 Basic Tools
- 2.8 Properties Panel
- 2.9 Working with Layers
- 2.10 Elements of Design
Module 3 - Understanding and Applying Colors
- 3.1 Color Theory
- 3.2 Color Swatches RGB vs Lab vs CMYK
- 3.3 Understanding and Applying Gradients
Module 4 - Pages
- 4.1 Pages Panel
- 4.2 Parent Pages
Module 5 - Typography
- 5.1 Typography
- 5.2 Creating Text
- 5.3 Character and Paragraph Formatting
- 5.4 Character and Paragraph Styles
- 5.5 Chaining Text Boxes Together
- 5.6 OpenType
- 5.7 Creating Outlines
- 5.8 Working with Tables
Module 6 - Packaging and Exporting for Web and Print
- 6.1 Preflight
- 6.2 Packaging Your Document
- 6.3 Exporting a PDF
- 6.4 Exporting an Image Sequence
Module 7 - Principles of Design
- 7.1 Principles of Design
Module 8 - Designing for Your Output
- 8.1 Letterheads
- 8.2 Business Cards
- 8.3 Resume
- 8.4 Brochures
- 8.5 Types of Binding
- 8.6 Impose
Module 9 - Advanced Techniques in InDesign
- 9.1 Clipping Mask
- 9.2 Step and Repeat
- 9.3 GREP
- 9.4 Layer Effects
- 9.5 Page Tool
- 9.6 Scripts
Module 10 - Interactivity in InDesign
- 10.1 Interactivity
- 10.2 Importing Media
- 10.3 Using Multiple Pages in Interactivity
- 10.4 Crating an Interactive Project
- 10.5 Animation
- 10.6 InDesign Conclusion
Adobe Illustrator Course Content
Module 1 - Introduction to Adobe Illustrator 2022
- 1.1 Instructor Bio
- 1.2 Course Introduction
Module 2 - Getting Started with Adobe Illustrator 2022
- 2.1 What are Vectors
- 2.2 Creating a New Document
- 2.3 Navigating the Interface
Module 3 - Drawing
- 3.1 Drawing and Manipulating Primitive Shapes
- 3.2 Drawing Custom Shapes
- 3.3 Importing Images
- 3.4 Understanding Layers and Sublayers
- 3.5 Additional Drawing and Manipulation Tools
Module 4 - Colors and Gradients
- 4.1 Color Theory
- 4.2 In-depth dive into Color Palette-
- 4.3 Creating Color Swatches
- 4.3.2 Gradient Mesh
Module 5 - Intermediate Illustration
- 5.1 Appearance Palette
- 5.2 Pathfinder Palette
- 5.3.1 Recreating an Existing Logo
- 5.3.2 Creating an icon from a Sketch
- 5.3.3 Creating a vector illustration from a sketch
- 5.3.4 Blending Modes
Module 6 - Typography
- 6.1 Introduction to Typography
- 6.2 Type Tools in Illustrator
- 6.3 Envelope Warp and Mesh
- 6.4 Breaking Text into Outlines
- 6.5 Caligramme Demo
Module 7 - Live Trace, Paintbrush and Blob Brush
- 7.1 Live Trace
- 7.2 Paint Brush
Module 8 - Advanced Illustration
- 8.1 Illustrating a face from a photo
- 8.2 Illustrating the body
- 8.3 Hair and emulating texture
- 8.4 Adding a background
- 8.5 Shadows and highlights
Module 9 - Exporting
- 9.1 Differences Between File Formats
- Conclusion
CompTIA Network+ N10-008 Course Content
Module 0 - Course introduction
- 0.1 Instructor Intro
- 0.2 Course Overview
Module 1 - Networking Fundamentals
- 1.1 Intro to Networking
- 1.1.1 Activity: Creating a Network
- 1.2 Common Terminology
- 1.2.1 Activity: Examining Ports and Sockets
- 1.3 OSI Model
- 1.4 DoD Model
- 1.4.1 Activity: Examining Network Layers
- 1.5 TCP, UDP, IP
- 1.5.1 Activity: Examining TCP
- 1.5.2 Activity: Examining UDP
- 1.5.3 Activity: Examining IP
- 1.6 ICMP, IGMP, ARP
- 1.6.1 Activity: Examining ICMP
- 1.6.2 Activity: Examining ARP
- 1.6.3 Activity: Examining IGMP
- 1.7 Network Topologies
- 1.8 Network Types
- 1.9 Part 1: Network Characteristics
- 1.9 Part 2: Network Characteristics
- 1.10 Module 1 outro
Module 2 - Cables and Connectors
- 2.1 Ethernet Standards
- 2.2 Copper Cable Types
- 2.3 Fiber Optic Cable Types
- 2.4 Connector Types
- 2.4.1 Activity: Selecting the Right Cable
- 2.5 Media Converters and Transceivers
- 2.6 Cable Management
- 2.7 Module 2 Outro
Module 3 - Internet Protocol (IP)
- 3.1 IPv4 Basics
- 3.2 IP Packet and Interface Types
- 3.2.1 Activity: Configuring Client IP Settings
- 3.3 Binary Numbering System
- 3.4 Classful and Classless Addressing
- 3.5 Understanding CIDR Notation
- 3.6 IPv4 Subnetting Method
- 3.7 Verifying with Binary
- 3.8 Finding Subnet IDs
- 3.8.1 Activity: Subnetting a Class C Network
- 3.9 The Delta in Action
- 3.9.1 Activity: Subnetting With the Delta
- 3.10 Subnetting Based on Hosts
- 3.11 Subnetting in Other Octets
- 3.12 Supernetting
- 3.12.1 Activity: Supernetting
- 3.13 IPv6
- 3.14 IPv4 - IPv6 Transition Mechanisms
- 3.15 Module 3 Outro
Module 4 - Layer 7 Protocols
- 4.1 Remote Control Protocols
- 4.2 File Sharing Protocols
- 4.3 Web Protcols
- 4.4 Email Protocols
- 4.5 Database Protocols
- 4.6 Voice Protocols
- 4.7 Security Protocols
- 4.8 Management Protocols
- 4.9 Module 4 Outro
Module 5 - Network Services
- 5.1 DHCP
- 5.1.1 Activity: Configuring DHCP
- 5.1.2 Activity: Configuring a DHCP Relay Agent
- 5.2 DNS
- 5.2.1 Activity: Configuring DNS - Part 1
- 5.2.2 Activity: Configuring DNS - Part 2
- 5.3 NTP
- 5.4 Corporate and Datacenter Network Architecture
- 5.5 Cloud Concepts and Connectivity Options
- 5.6 Module 5 Outro
Module 6 - Networking Devices
- 6.1 Introductory Concepts
- 6.2 Repeaters and Hubs
- 6.2.1 Activity: Connecting Devices with a Hub
- 6.3 Bridges and Switches
- 6.3.1 Activity: Connecting Devices with a Switch
- 6.4 Routers and Multilayer Switches
- 6.5 Security Devices
- 6.6 Modems
- 6.7 Module 6 Outro
Module 7 - Networked Devices
- 7.1 IP Devices
- 7.2 IoT
- 7.2.1 Activity - Programming IoT Devices
- 7.3 ICS/SCADA
- 7.4 Module 7 Outro
Module 8 - Routing and Bandwidth Management
- 8.1 Routing Basics
- 8.1.1 Activity: Configuring Static Routes
- 8.2 Packet Delivery on the Same Network
- 8.3 IP Routing Across a Single Router
- 8.4 IP Routing Across Multiple Hops
- 8.4.1 Activity: Static Routes - CHALLENGE
- 8.5 Route Selection
- 8.6 RIP
- 8.6.1 Activity: Configuring RIP - CHALLENGE
- 8.7 OSPF
- 8.8 EIGRP
- 8.9 BGP
- 8.10 NAT/PAT
- 8.11 Bandwidth Management (with Module 8 Outro)
Module 9 - Ethernet Switching
- 9.1 Ethernet Basics
- 9.2 Switching Overview
- 9.2.1 Activity: Examining a MAC Table
- 9.3 VLANs
- 9.3.1 Activity: Creating VLANs
- 9.4 VLAN Trunking
- 9.4.1 Activity: Configuring VLAN Trunking
- 9.5 VLAN Routing
- 9.5.1 Activity: Configuring VLAN Routing
- 9.6 Contention Management
- 9.7 Switchport Configuration (with Module 9 Outro)
Module 10 - Wireless Technologies
- 10.1 Wireless Overview
- 10.2 Radio Basics
- 10.3 Modulation
- 10.4 Wi-Fi Standards
- 10.5 Antennas
- 10.6 Wi-Fi Service Sets
- 10.7 Wi-Fi Security
- 10.8 Cellular
Module 11 Network Performance
- 11.1 Monitoring Performance
- 11.2 Common Metrics
- 11.2.1 Activity: Examining Interface Statistics
- 11.3 SNMP
- 11.4 Netflow
- 11.5 Network Security Monitoring (with Module 11 Outro)
Module 12 High Availability and Disaster Recovery
- 12.1 HA and DR Concepts
- 12.2 High Availability Mechanisms
- 12.3 Disaster Recovery Mechanisms
- 12.4 Facility and Infrastructure Support (with Module 12 Outro)
Module 13 Organizational Documents
- 13.1 Plans and Procedures
- 13.2 Security Policies
- 13.3 Loss Prevention
- 13.4 Common Agreements
- 13.5 Common Documentation
- 13.6 Structured Cabling - MDF and IDF
- 13.7 Horizontal and Vertical Cabling
- 13.7.1 Activity - Implementing Cable Management
- 13.8 Labeling
- 13.9 Surveys and Assessments (with Module 13 Outro)
Module 14 Network Security
- 14.1 Common Security Concepts
- 14.2 Common Attack Types
- 14.3 Spoofing-based Attacks
- 14.4 Hijacking and MITM
- 14.5 Social Engineering
- 14.6 Network Segmentation
- 14.7 Private VLANs
- 14.8 Single Organization Authentication
- 14.9 Extending Authentication
- 14.10 Authorization
- 14.11 Network Device Hardening
- 14.12 Wireless Security
- 14.13 Remote Access Security
- 14.14 IoT Security
- 14.15 Physical Security (with Module 14 Outro)
Module 15 Network Troubleshooting
- 15.1 Troubleshooting Methodology
- 15.2 Physical Connectivity Issues
- 15.3 Hardware Testing Tools
- 15.3.1 Activity - Testing an Ethernet Cable
- 15.3.2 Activity - Crimping on an RJ-45 Connector
- 15.3.3 Activity - Punching Down Twisted Pair
- 15.3.4 Activity - Using a Telephone Toner
- 15.4 Understanding Electricity
- 15.4.1 Activity - Checking Cable Continuity
- 15.4.2 Activity - Testing DC Voltage
- 15.4.3 Activity - Testing AC Voltage
- 15.5 Twisted Pair Pinout Problems
- 15.6 Twisted Pair Termination Problems
- 15.7 Repairing Damaged Twisted Pair Cable
- 15.8 Fiber Optic Connectivity Issues
- 15.8.1 Activity - Testing a Fiber Optic Cable
- 15.9 Common Port Problems
- 15.9.1 Working with Ports and Their Devices
- 15.10 Common Software Testing Tools
- 15.10.1 Activity - Scanning for Open Ports
- 15.11 Common Command Line Utilities
- 15.12 Troubleshooting Basic IP Networking Issues
- 15.13 Common Switching Issues
- 15.14 Switching Test Tools and Techniques
- 15.15 Common IP Routing Issues
- 15.16 Wi-Fi Access Point Issues
- 15.17 Wirelss Interference
- 15.17.1 Activity - Using a Spectrum Analyzer
- 15.18 Wireless Antenna Issues
- 15.18.1 Activity - Configuring a Wi-Fi Router
- 15.19 WAP Placement Strategies
- 15.20 Infrastructure Service Issues (DHCP)
- 15.21 Infrastructure Service Issues (DNS)
- 15.22 Infrastructure Service Issues (NTP)
- 15.23 Fireall / ACL Issues
- 15.24 VPN Issues
- 15.25 Additional Network Security Troubleshooting and Tips
- 15.26 Advanced Networking Issues
- 15.27 Troubleshooting Server Services (with Module 15 Outro)
- CompTIA Network+ N10-008 Course Outro
Adobe After Effects Course Content
Module 1: Getting Started
- 1.1 Course Introduction
- 1.2 Keyboard Shortcuts
- 1.3 Keyboard Tips
- 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
- 2.1 General Interface and Starting a Project
- 2.2 Basic Title Animation Using Keyframes
- 2.3 Keyframe Interpolation and Keyframe Assistan
- 2.4 Renaming a Composition
- 2.5 Soloing a Layer for Individual Edits
- 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
- 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
- 3.1 Importing Files from Bridge and Creating a New Composition
- 3.2 Horizontal Type Tool and Guides
- 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
- 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
- 4.2 Preview and Apply Text Animation Presets and Use Keyframes
- 4.3 Animate Layers Using Parenting
- 4.4 Editing and Animating Imported Photoshop Text
- 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
- 5.1 Create and Customize a Shape with Shape Tool
- 5.2 Self Animating Shape with a Wiggle Path (green marker)
- 5.3 Create and Customize a Shape with Pen Tool
- 5.4 Snap Layers
- 5.5 Animating Shape Layers with Path Operations
- 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
- 6.1 Animate Multiple Layers Using Parenting
- 6.2 Precomposing Layers
- 6.3 Keyframing a Motion Path
- 6.4 Animating a Character to Create Movement
- 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
- 7.1 Animating Change in Light
- 7.2 Animating Birds Flying with a Track Mat
- 7.3 Animating Shadows and Using Corner Pin
- 7.4 Adding a Lens Flare Effect
- 7.5 Render Composition and Retime
- 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
- 8.1 Setup a Basic Mask
- 8.2 Refine and Apply Mask
- 8.3 Creating a Reflection with a Mask and Blending Modes
- 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
- 9.1 Puppet Position Pen Tool
- 9.2 Starch Pins
- 9.3 Manually Animate with Puppet Tool
- 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
- 10.1 Extract Foreground Object from Background and Create a Mat
- 10.2 Touch Up a Mat with the Refine Edge Tool
- 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
- 11.1 Set up Composition and Use Levels to Start Balancing the Color
- 11.2 Basic Color Grading with Lumetri Color Effects
- 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
- 11.4 Use an Adjustment Layer to Create a Global Color Effect
- 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
- 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
- 12.2 Using Adjustment Layers to Apply a Specific Effect
- 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
- 12.4 Create Checkboxes to Toggle Visibility of a Background Image
- 12.5 Protect Portions of a Project from Time Stretching and Export Template
CISSP : Certified Information Systems Security Professional Course Content
Module 1: Security and Risk Management
- Intro
- Security and Risk Management pt.1
- Security and Risk Management pt.2
- Security and Risk Management pt.3
- Security and Risk Management Summary
- Security and Risk Management Test Prep pt.1
- Security and Risk Management Test Prep pt.2
- Security and Risk Management Test Prep pt.3
- Security and Risk Management Test Prep pt.4
Module 2: Asset Security
- Asset Secutity pt.1
- Asset Security pt.2
- Asset Security Summary
- Asset Security Test Prep
Module 3: Security Architecture and Engineering
- Security Architecture and Engineering pt.1
- Security Architecture and Engineering pt.2
- Security Architecture and Engineering pt.3
- Security Architecture and Engineering Summary
- Security Architecture and Engineering Test Prep pt.1
- Security Architecture and Engineering Test Prep pt.2
- Security Architecture and Engineering Test Prep pt.3
Module 4: Communication and Network Security
- Communication and Network Security pt.1
- Communication and Network Security pt.2
- Communication and Network Security Summary
- Communication and Network Security Test Prep
Module 5: Identity and Access Management (IAM)
- Identity and Access Management (IAM)
- Identity and Access Management (IAM) Summary
- Identity and Access Management (IAM) Test Prep pt.1
- Identity and Access Management (IAM) Test Prep pt.2
- Identity and Access Management (IAM) Test Prep pt.3
- Identity and Access Management (IAM) Test Prep pt.4
Module 6: Security Assessment and Testing
- Security Assessment and Testing
- Security Assessment and Testing Summary
- Security Assessment and Testing Test Prep
Module 7: Security Operations
- Security Operations pt.1
- Security Operations pt.2
- Security Operations pt.3
- Security Operations pt.4
- Security Operations Summary
- Security Operations Test Prep
Module 8: Software Development Security
- Software Development Security pt.1
- Software Development Security pt.2
- Software Development Security pt.3
- Software Development Security pt.4
- Software Development Security pt.5
- Software Development Security Summary
- Software Development Security Test Prep
- Outro
Microsoft MD-101: Managing Modern Desktops Course Content
Module 1: Deploy and Update Operating Systems
- 1.1 Instructor and Course Introduction
- 1.2 Exam Information
- 1.3 Deploy and Update Operating Systems Introduction
- 1.4 Plan and Implement Windows 10 by Using Dynamic Deployment
- 1.5 Plan and Implement Windows 10 by Using Windows Autopilot
- 1.6 Upgrade Devices to Windows 10
- 1.7 Manage Updates
- 1.8 Manage Device Authentication
- 1.9 Install VMware Workstation 15 in Windows 10 Demo
- 1.10 Performing a Clean Install of Windows 10 Demo
- 1.11 Upgrading Windows 8.1 to Windows 10 Demo
- 1.12 Configuring Locales Demo
- 1.13 Troubleshooting Failed Installation with Setup Logs Demo
- 1.14 Installing Windows 16 Server Demo
- 1.15 Installing Microsoft Deployment Toolkits (MDT) Part 1 Demo
- 1.16 Installing Microsoft Deployment Toolkits (MDT) Part 2 Demo
- 1.17 Setting Up an On-Site Domain Controller Demo
- 1.18 Joining Windows 10 Client Machine to an On-Site Domain Controller Demo
- 1.19 Getting Started with Free Azure Subscription Demo
- 1.20 Getting Familiarized with Azure Portal Options Demo
- 1.21 Create a Virtual Machine Demo
Module 2: Manage Policies and Profiles
- 2.1 Managing Policies and Profiles Introduction
- 2.2 Plan and Implement Co-Management
- 2.3 Implement Conditional Access and Compliance Policies
- 2.4 Configure Device Profiles
- 2.5 Manage User Profiles
- 2.6 Deploy Azure Container Instances Demo
- 2.7 Manage Access with RBAC Demo
- 2.8 Secure Network Traffic Demo
- 2.9 Installing OneDrive Demo
Module 3: Manage and Protect Devices
- 3.1 Manage and Protect Devices Introduction
- 3.2 Manage Windows Defender
- 3.3 Manage Intune Device Enrollment and Inventory
- 3.4 Monitor Devices
- 3.5 Windows Defender Security Center Overview Demo
- 3.6 Installing Windows Defender Application Guard Demo
- 3.7 Creating a New Inbound Rule Demo
Module 4: Manage Apps and Data
- 4.1 Manage Apps and Data Introduction
- 4.2 Deploy and Update Applications
- 4.3 Implement Mobile Application Management
- 4.4 Setting up a Microsoft Intune Account Demo
- 4.5 Create a New Group Demo
- 4.6 Confirm the Version of Windows Demo
Microsoft SQL Server 2019 - Introduction to Data Analysis Course Content
Module 1 - Query Tools
- 1.1 Course Introduction
- 1.2 Intro to Management Studio
- 1.3 Intro to command-line query tools
Module 2 - Introduction to T-SQL Querying
- 2.1 Introducing T-SQL
- 2.2 Understanding Sets
- 2.3 Understanding the Logical Order of Operations in SELECT statements
Module 3 - Basic SELECT Queries
- 3.1 Writing Simple SELECT Statements
- 3.2 Eliminate Duplicates with DISTINCT
- 3.3 Using Column and Table Aliases
- 3.4 Write Simple CASE Expressions
Module 4 - Querying Multiple Tables
- 4.1 Understanding Joins
- 4.2 Querying with Inner Joins
- 4.3 Querying with Outer Joins
- 4.4 Querying with Cross Joins and Self Joins
Module 5 - Sorting and Filtering Data
- 5.1 Sorting Data
- 5.2 Filtering Data with Predicates
- 5.3 Filtering with the TOP and OFFSET-FETCH
- 5.4 Working with Unknown Values
Module 6 - Introduction to Business Intelligence and Data Modeling
- 6.1 Introduction to Business Intelligence
- 6.2 The Microsoft Business Intelligence Platform
- 6.3 Exploring a Data Warehouse
- 6.4 Exploring a Data Model
Module 7 - Prepare Data
- 7.1 Introduction to Power BI
- 7.2 Get data from various data sources
- 7.3 Preview source data
Module 8 - Clean, Transform, and Load Data
- 8.1 Data Transformation Intro
- 8.2 Transformation Example 1
- 8.3 Transformation Example 2
- 8.4 Transformation Example 3
- 8.5 Transformation Example 4
- 8.6 Transformation Example 5
- 8.7 Transformation Example 6
Module 9 - Design a Data Model
- 9.1 Introduction to Data Modeling
- 9.2 Model Relationships
- 9.3 Table Configuration
- 9.4 Model interface
- 9.5 Quick Measures
- 9.6 Many-to-many relationships
- 9.7 Row-level security
Module 10 - Create Model Calculations using DAX
- 10.1 DAX context
- 10.2 Calculated Tables
- 10.3 Calculated Columns
- 10.4 Managing Date Tables
- 10.5 Measures
- 10.6 Filter Manipulation
- 10.7 Time Intelligence
Module 11 - Create Reports
- 11.1 Basic Report Creation
- 11.2 Example Page 1
- 11.3 Example Page 2
- 11.4 Example Page 3
- 11.5 Report Publishing
- 11.6 Enhancing Reports
- 11.7 Drill-Through Pages
- 11.8 Conditional Formatting
- 11.9 Buttons and Bookmarks
Module 12 - Create Dashboards
- 12.1 Dashboard Basics
- 12.2 Real Time Dashboards
- 12.3 Enhanced Dashboards
Module 13 - Create Paginated Reports
- 13.1 Introduction to Power BI Report Builder
- 13.2 Report Layouts
- 13.3 Report Data
- 13.4 Report Tables
Module 14 - Perform Advanced Analytics
- 14.1 Introduction to Advanced Analytics
- 14.2 Scatter Chart
- 14.3 Forecast
- 14.4 Decomposition Tree
- 14.5 Key Influencers
Module 15 - Create and Manage Workspaces
- 15.1 Introduction to Workspaces
- 15.2 Working with Workspaces and the Portal
Module 16 - Create Power App Visuals
- 16.1 Introduction to Power Apps Visual
- 16.2 Creating the App
- 16.3 Basic Power Apps Concepts
- 16.4 Refreshing the Report
Module 17 - Analysis Services and Power BI
- 17.1 Introduction to Analysis Services
- 17.2 Connecting with Multidimensional Models
- 17.3 Premium Workspaces and Analysis Services
- 17.4 Course Wrap Up
Microsoft SQL Server 2019 - Querying SQL Server Course Content
Module 1 - Query Tools
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Intro to Management Studio
- 1.4 Intro to command-line query tools
Module 2 - Introduction to T-SQL Querying
- 2.1 Module 2 Introduction
- 2.2 Introducing T-SQL
- 2.3 Understanding Sets
- 2.4 Understanding the Logical Order of Operations in SELECT statements
Module 3 - Basic SELECT Queries
- 3.1 Module 3 Introduction
- 3.2 Writing Simple SELECT Statements
- 3.3 Eliminate Duplicates with DISTINCT
- 3.4 Using Column and Table Aliases
- 3.5 Write Simple CASE Expressions
Module 4 - Querying Multiple Tables
- 4.1 Module 4 Introduction
- 4.2 Understanding Joins
- 4.3 Querying with Inner Joins
- 4.4 Querying with Outer Joins
- 4.5 Querying with Cross Joins and Self Joins
Module 5 - Sorting and Filtering Data
- 5.1 Module 5 Introduction
- 5.2 Sorting Data
- 5.3 Filtering Data with Predicates
- 5.4 Filtering with the TOP and OFFSET-FETCH
- 5.5 Working with Unknown Values
Module 6 - Working with SQL Server Data Types
- 6.1 Module 6 Introduction
- 6.2 Writing Queries that return Date and Time Data
- 6.3 Writing Queries that use Date and Time Functions
- 6.4 Writing Queries that return Character Data
- 6.5 Writing Queries that use Character Functions
Module 7 - Using DML to Modify Data
- 7.1 Module 7 Introduction
- 7.2 Inserting Records with DML
- 7.3 Updating Records Using DML
- 7.4 Deleting Records Using DML
Module 8 - Using Built-In Functions
- 8.1 Module 8 Introduction
- 8.2 Writing Queries with Built-In Functions
- 8.3 Using Conversion Functions
- 8.4 Using Logical Functions
- 8.5 Using Functions to Work with NULL
Module 9 - Grouping and Aggregating Data
- 9.1 Module 9 Introduction
- 9.2 Using Aggregate Functions
- 9.3 Using the GROUP BY Clause
- 9.4 Filtering Groups with HAVING
Module 10 - Using Subqueries
- 10.1 Module 10 Introduction
- 10.2 Writing Self-Contained Subqueries
- 10.3 Writing Correlated Subqueries
- 10.4 Using the EXISTS Predicate with Subqueries
Module 11 - Using Table Expressions
- 11.1 Module 11 Introduction
- 11.2 Using Views
- 11.3 Using Inline Table-Valued Functions
- 11.4 Using Derived Tables
- 11.5 Using Common Table Expressions
Module 12 - Using Set Operators
- 12.1 Module 12 Introduction
- 12.2 Writing Queries with the UNION operator
- 12.3 Using EXCEPT and INTERSECT
- 12.4 Using APPLY
Module 13 - Using Window Ranking, Offset, and Aggregate Functions
- 13.1 Module 13 Introduction
- 13.2 Creating Windows with OVER
- 13.3 Exploring Window Functions
Module 14 - Pivoting and Grouping Sets
- 14.1 Module 14 Introduction
- 14.2 Writing Queries with PIVOT and UNPIVOT
- 14.3 Working with Grouping Sets
Module 15 - Implementing Error Handling
- 15.1 Module Introduction
- 15.2 Implementing T-SQL error handling
- 15.3 Implementing structured exception handling
Module 16 - Managing Transactions
- 16.1 Module 16 Introduction
- 16.2 Transactions and the Database Engine
- 16.3 Controlling Transactions
- 16.4 Course Wrap Up
SQL Server 2019 Database Design Course Content
Module 1 - Designing and Building Tables
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Database Design
- 1.4 Creating Tables
- 1.5 Data Types
- 1.6 Schemas
- 1.7 Altering Tables
Module 2 - Enforcing Data Integrity
- 2.1 Module 2 Introduction
- 2.2 Introduction to Data Integrity
- 2.3 Data Domain Integrity
- 2.4 Implementing Data Domain Integrity
- 2.5 Implementing Entity and Referential Integrity
Module 3 - Indexing
- 3.1 Module 3 Introduction
- 3.2 Core Indexing Concepts
- 3.3 Heaps, Clustered, and Nonclustered Indexes
- 3.4 Data Types and Indexes
- 3.5 Single Column and Composite Indexes
Module 4 - Stored Procedures, Functions, and Triggers
- 4.1 Module 4 Introduction
- 4.2 Introduction to Database Programming
- 4.3 Creating Stored Procedures
- 4.4 Creating User-Defined Functions
- 4.5 Creating Triggers
Module 5 - Blob and Filestream Data
- 5.1 Module 5 Introduction
- 5.2 Introduction to Binary Data
- 5.3 Considerations for BLOB data
- 5.4 FILESTREAM Example
- 5.5 File Table Example
Module 6 - Full-Text Search
- 6.1 Module 6 Introduction
- 6.2 Introduction to Full-Text Search
- 6.3 Full-Text Catalogs
- 6.4 Full-Text Indexes
- 6.5 Full-Text Queries
Module 7 - Azure vs On-Prem
- 7.1 Module 7 Introduction
- 7.2 SQL Server on Azure VM
- 7.3 Azure Managed SQL Instance
- 7.4 Azure SQL Database
- 7.5 Course Wrap Up
Certified Blockchain Developer Hyperledger (CBDH) Course Content
Module 1: Certified Blockchain Developer Hyperledger Overview
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Audience for the Certification
- 1.4 What is a CBDH
- 1.5 Exam Objectives
- 1.6 Exam Overview
Module 2: Hyperledger Framework
- 2.1 Module 2 Introduction
- 2.2 Hyperledger Project Overview
- 2.3 Hyperledger Frameworks
- 2.4 Hyperledger Fabric
- 2.5 Hyperledger Fabric Use Cases
Module 3: Hyperledger Fabric Blockchain
- 3.1 Module 3 Introduction
- 3.2 Hyperledger Fabric Design Overview
- 3.3 Hyperledger Fabric WhiteboardÂ
- 3.4 Hyperledger Fabric Consensus
- 3.5 Hyperledger Fabric Transactions
- 3.6 Transactions Whiteboard
- 3.7 Hyperledger Fabric Ledger
- 3.8 Ledger Whiteboard
- 3.9 Hyperledger Fabric Versions
- 3.10 Hyperledger Fabric Membership Services
- 3.11 Node Types and Roles
- 3.12 Nodes and Peers Whiteboard
- 3.13 Channels
- 3.14 Channels Whiteboard
Module 4: Access Controls and Secure Chaincode
- 4.1 Module 4 Introduction
- 4.2 Access Controls Lists (.acl)
- 4.3 Certificates and Certificate Authority
- 4.4 Organizations and Participants
- 4.5 Endorsement Policies
- 4.6 Rest APIs
Module 5: Plan and Prepare Apps for Deployment
- 5.1 Module 5 Introduction
- 5.2 Development Whiteboard
- 5.3 Installation Considerations
- 5.4 Composer
- 5.5 Composer Demo
Module 6: Hyperledger Fabric Explorer
- 6.1 Module 6 Introduction
- 6.2 Hyperledger Fabric Explorer Basics
- 6.3 Installation Requirements of Hyperledger Explorer
Module 7: Chaincode and Development
- 7.1 Module 7 Introduction
- 7.2 What is Chaincode
- 7.3 Writing Chaincode Considerations
- 7.4 Development Language
- 7.5 Client App Considerations
- 7.6 BNA Files
- 7.7 Service Discovery
Module 8: Course Wrap Up
- 8.1 Module 8 Introduction
- 8.2 Course Review
- 8.3 Top 10 Things to know for the exam
- 8.4 Taking the Exam
- 8.5 Course Closeout
Certified Blockchain Solutions Architect (CBSA) Course Content
Module 1: Certified Blockchain Solutions Architect Overview
- 1.1 Module 1 Introduction
- 1.2 What is a CBSA
- 1.3 Exam Questions
- 1.4 Exam Objectives
Module 2: Blockchain 101 Terminology and Components
- 2.1 Module 2 Introduction
- 2.2 What is a Blockchain
- 2.3 Blockchain Terminology
- 2.4 Blockchain Key Components
Module 3: Exam Objectives
- 3.1 Module 3 Introduction
- 3.2 Proof of Work, Proof of Stake, Other Proof Systems
- 3.3 Why Cryptocurrency is Needed
- 3.4 Public, Private, and Permissioned Blockchains
- 3.5 How Blocks are Written to a Blockchain
- 3.6 Block Activity Demo
- 3.7 Transactions Whiteboard
- 3.8 Cryptography
- 3.9 LTC Wallet Demo
- 3.10 Database or Blockchain
- 3.11 Public Blockchain Common Uses
- 3.12 Private & Permissioned Blockchain Common Uses
- 3.13 Launching Your Own Blockchain
- 3.14 Segwits and Forks
- 3.15 Mining
- 3.16 Byzantine Fault Tolerance
- 3.17 Consensus Among Blockchains
- 3.18 Hasing
- 3.19 Anders Hashing Demo
- 3.20 Security in Blockchain
- 3.21 Smart Contracts and dApps
- 3.22 History of Blockchain
- 3.23 Blockchain Programming Languages
- 3.24 Common Testing and Deployment Practices
- 3.25 Metamask Demo
- 3.26 Value Creation
- 3.27 Blockchain Architecture
- 3.28 Corda Blockchain Architecture Whiteboard
- 3.29 Enterprise Blockchains
- 3.30 Bitcoin Improvement Protocols
Module 4: Hyperledger
- 4.1 Module 4 Introduction
- 4.2 Hyperledger Project
- 4.3 Hyperledger Fabric
- 4.4 Hyperledger Chaincode
- 4.5 Hyperledger Fabric Whiteboard
- 4.6 Hyperledger Fabric on AWS Demo
Module 5: Ethereum
- 5.1 Module 5 Introduction
- 5.2 Ethereum Overview
- 5.3 Ethereum EVM
- 5.4 Ethereum Browsers
- 5.5 Ethereum Development
- 5.6 Etherscan Demo
Module 6: Course Closeout
- 6.1 Module 6 Introduction
- 6.2 Summary Review
- 6.3 Taking the CBSA Exam
- 6.4 Practice Question
Enterprise Blockchain Bootcamp for Solutions Engineers Course Content
Module 1: Course Overview
- 1.1 Course Introduction
- 1.2 Course Target Audience
- 1.3 Course Pre-Requirements
Module 2: Pre-Sales Activities
- 2.1 Module 2 Introduction
- 2.2 Request for Proposals
- 2.3 Request for Proposals Fintech
- 2.4 Proof of Concepts
- 2.5 Return on Investment
- 2.6 Value Creation
- 2.7 Cost Modeling
- 2.8 Cost Considerations
- 2.9 Enterprise Integration
- 2.10 TPS
- 2.11 Whiteboard Discussion
Module 3: Blockchain Fundamentals
- 3.1 Module 3 Introduction
- 3.2 What is a Blockchain
- 3.3 Blockchain Components
- 3.4 Blockchain Terminology
- 3.5 Enterprise Blockchains
- 3.6 Consensus and Mining
- 3.7 Ledgers
- 3.8 Permissioned vs Permissionless Blockchains
- 3.9 Trust and Blockchain
- 3.10 Advantages of Transparency
- 3.11 Development Expertise
- 3.12 Dapps
- 3.13 BaaS
- 3.14 AWS BaaS Whiteboard Discussion
- 3.15 Understanding Blockchain Architecture
Module 4: Enterprise Blockchains
- 4.1 Module 4 Introduction
- 4.2 Hyperledger
- 4.3 Ethereum
- 4.4 Quorum
- 4.5 R3 Corda
- 4.6 Corda Demobench Demo
- 4.7 Ripple
- 4.8 IBM BaaS
- 4.9 AWS BaaS Demo
Module 5: Use Cases
- 5.1 Module 5 Introduction
- 5.2 Ripple Use Cases
- 5.3 Dubai Use Cases
Module 6: Course Closeout
- 6.1 Module 6 Introduction
- 6.2 Course Review
- 6.3 Blockchain Roles
Microsoft SQL Server 2019 Analysis Services (SSAS) Course Content
Module 1 - Introduction to Business Intelligence and Data Modeling
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Business Intelligence
- 1.4 The Microsoft Business Intelligence Platform
- 1.5 Exploring a Data Warehouse
- 1.6 Exploring a Data Model
Module 2 - Multidimensional Databases
- 2.1 Module 2 Introduction
- 2.2 Introduction to Multidimensional Analysis
- 2.3 Overview of Cube Security
- 2.4 Creating and Configuring a Cube
- 2.5 Data Sources
- 2.6 Data Source Views
- 2.7 Adding a Dimension to a Cube
Module 3 - Cubes and Dimensions
- 3.1 Module 3 Introduction
- 3.2 Dimensions
- 3.3 Attribute Hierarchies and Relationships
- 3.4 Sorting and Grouping Attributes
- 3.5 Slowly Changing Dimensions
Module 4 - Measures and Measure Groups
- 4.1 Module 4 Introduction
- 4.2 Measures
- 4.3 Measure Groups and Relationships
- 4.4 Measure Group Storage
Module 5 - Introduction to MDX
- 5.1 Module 5 Introduction
- 5.2 MDX Fundamentals
- 5.3 Adding Calculations to a Cube
- 5.4 Querying a cube using MDX
Module 6 - Customizing Cube Functionality
- 6.1 Module 6 Introduction
- 6.2 Key Performance Indicators
- 6.3 Actions
- 6.4 Perspectives
- 6.5 Translations
Module 7 - Tabular Data Models
- 7.1 Module 7 Introduction
- 7.2 Introduction to Tabular Data Models
- 7.3 Creating a Tabular Data Model
- 7.4 Configure Relationships and Attributes
- 7.5 Configuring Data Model for an Enterprise BI Solution
Module 8 - Data Analysis Expressions (DAX)
- 8.1 Module 8 Introduction
- 8.2 DAX Fundamentals
- 8.3 Calculated Columns
- 8.4 Relationships
- 8.5 Measures
- 8.6 Time Intelligence
- 8.7 KPI
- 8.8 Parent - Child Hierarchies
Module 9 - Data Mining
- 9.1 Module 9 Introduction
- 9.2 Overview of Data Mining
- 9.3 Custom Data Mining Solutions
- 9.4 Validating a Data Mining Model
- 9.5 Consuming a Data Mining Model
- 9.6 Course Wrap Up
Introduction to Microsoft Power BI Course Content
Module 1 - Prepare Data
- 1.1 Course Introduction
- 1.2 Module 1 Introduction
- 1.3 Introduction to Power BI
- 1.4 Get data from various data sources
- 1.5 Preview source data
Module 2 - Clean, Transform, and Load Data
- 2.1 Module 2 Introduction
- 2.2 DimEmployee Example
- 2.3 DimEmployeeSalesTerritory Example
- 2.4 DimReseller Example
- 2.5 FactResellersSales Example
- 2.6 ResellerSalesTargets Example
- 2.7 Color Formats Example
Module 3 - Design a Data Model
- 3.1 Module 3 Introduction
- 3.2 Introduction to Data Modeling
- 3.3 Model Relationships
- 3.4 Table Configuration
- 3.5 Model interface
- 3.6 Quick Measures
- 3.7 Many-to-many relationships
- 3.8 Row-level security
Module 4 - Create Model Calculations using DAX
- 4.1 Module 4 Introduction
- 4.2 DAX context
- 4.3 Calculated Tables
- 4.4 Calculated Columns
- 4.5 Managing Date Tables
- 4.6 Measures
- 4.7 Filter Manipulation
- 4.8 Time Intelligence
Module 5 - Create Reports
- 5.1 Module 5 Introduction
- 5.2 Basic Report Creation
- 5.3 Example Page 1
- 5.4 Example Page 2
- 5.5 Example Page 3
- 5.6 Report Publishing
- 5.7 Enhancing Reports
- 5.8 Drill-Through Pages
- 5.9 Conditional Formatting
- 5.10 Buttons and Bookmarks
Module 6 - Create Dashboards
- 6.1 Module 6 Introduction
- 6.2 Dashboard Basics
- 6.3 Real Time Dashboards
- 6.4 Enhanced Dashboards
Module 7 - Create Paginated Reports
- 7.1 Module 7 Introduction
- 7.2 Introduction to Power BI Report Builder
- 7.3 Report Layouts
- 7.4 Report Data
- 7.5 Report Tables
Module 8 - Perform Advanced Analytics
- 8.1 Module 8 Introduction
- 8.2 Introduction to Advanced Analytics
- 8.3 Scatter Chart
- 8.4 Forecast
- 8.5 Decomposition Tree
- 8.6 Key Influencers
Module 9 - Create and Manage Workspaces
- 9.1 Introduction to Workspaces
- 9.2 Working with Workspaces and the Portal
Module 10 - Create Power App Visuals
- 10.1 Module 10 Introduction
- 10.2 Introduction to Power Apps Visual
- 10.3 Creating the App
- 10.4 Basic Power Apps Concepts
- 10.5 Refreshing the Report
Module 11 - Analysis Services and Power BI
- 11.1 Module 11 Introduction
- 11.2 Introduction to Analysis Services
- 11.3 Connecting with Multidimensional Models
- 11.4 Premium Workspaces and Analysis Services
- 11.5 Course Wrap Up
Certified Kubernetes Administrator (CKA) Course Content
Module 1: Course Overview
- 1.1 Course Overview
- 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
- 2.1 Core Concepts
- 2.2 What is the CKA Exam
- 2.3 Why Get Certified
- 2.4 CKA Exam Domains
- 2.5 What is Kubernetes
- 2.6 What is a Container
- 2.7 What is Docker
- 2.8 Kubernetes Terminology
- 2.9 Kubernetes Components
- 2.10 Kubernetes Documentation
- 2.11 Whiteboard - Kubernetes Overview
Module 3: Kubernetes Installation
- 3.1 Kubernetes Installation
- 3.2 Installation Options
- 3.3 MiniKube
- 3.4 Demo - Install Minikube
- 3.5 Demo - Clusters
- 3.6 Kubectl Basics
- 3.7 Demo - Install Kubectl
Module 4: Working with Kubernetes Clusters and Nodes
- 4.1 Working with Kubernetes Clusters and Nodes
- 4.2 Understanding the Architecture
- 4.3 Understanding the nodes
- 4.4 Core Objects
- 4.5 API
- 4.6 Create a Cluster
- 4.7 Demo - Create a Cluster
- 4.8 Demo - YAML
- 4.9 Demo - Nodes
- 4.10 Demo - Kubectl Client Config
Module 5: API Access and Commands
- 5.1 API Access and Commands
- 5.2 About the API
- 5.3 Accessing the APIs
- 5.4 Demo - Exploring APIS
- 5.5 Kubectl
- 5.6 Using YAML for API Objects
- 5.7 Using Curl
- 5.8 Labels and Annotations
Module 6: Running Pods and Deployments
- 6.1 Running Pods and Deployments
- 6.2 Pods and Deployments
- 6.3 What is a Namespace
- 6.4 Scalability Options
- 6.5 Rolling Updates
- 6.6 Apply Changes to a Pod
- 6.7 Stateful Sets
- 6.8 Demo - Manage Deployments
Module 7: Configuring Storage
- 7.1 Configuring Storage
- 7.2 Storage options with Kubernetes
- 7.3 Configure Pod Volumes
- 7.4 Configure Persistent Volumes
- 7.5 Storage Classes
- 7.6 Whiteboard - Persistent Volumes
- 7.7 Demo - Configure Storage
Module 8: Kubernetes Networking
- 8.1 Kubernetes Networking
- 8.2 Understanding Networking
- 8.3 Services
- 8.4 Network Plugins
- 8.5 DNS
- 8.6 Network Policies
- 8.7 Namespaces
- 8.8 Demo - Networking
- 8.9 Manage High Availability
Module 9: Managing Security
- 9.1 Managing Security
- 9.2 Kubernetes Security
- 9.3 Container and Pod Security
- 9.4 Certificates
- 9.5 API Security
- 9.6 Configmaps and Secrets
- 9.7 Secure Images
- 9.8 Security Context
- 9.9 RBAC
Module 10: Managing Kubernetes In the Enterprise
- 10.1 Managing Kubernetes In the Enterprise
- 10.2 Cluster Management and Maintenance
- 10.3 Demo - Scale Deployment
- 10.4 Demo - Restart Cluster
- 10.5 Demo - Add or Remove Nodes
- 10.6 Demo - Create a Pod in the Background
- 10.7 Kubelet Restarts and Drains
- 10.8 UI Dashboard
- 10.9 Demo - Describe Resources
- 10.10 Kube-scheduler
- 10.11 Demo - Set-Up Alias
Module 11: Kubernetes Monitoring and Troubleshooting
- 11.1 Kubernetes Monitoring and Troubleshooting
- 11.2 Monitoring Resources
- 11.3 Monitoring Pods
- 11.4 Demo - Monitoring Pods
- 11.5 Logging
- 11.6 Demo - Logging
- 11.7 Troubleshooting
- 11.8 Affinity and Taints
Module 12: CKA Practice Exams
- 12.1 CKA Practice Exams
- 12.2 Exam Preparation Must Know
- 12.3 Question 1 - Create a Cluster, Deploy Pods and a Deployment
- 12.4 Question 2 - Create a Pod and Verify
- 12.5 Question 3 - Create a Pod with a Secret
- 12.6 Question 4 - Get Logs on a Pod and Send to File
- 12.7 Question 5 - Liveness Probe
- 12.8 Question 6 - Use Labels
- 12.9 Additional Questions
Module 13: Course Closeout
- 13.1 Course Closeout
- 13.2 Course Review
- 13.3 Kubernetes Certifications
- 13.4 Additional Resources
- 13.5 Exam Readiness
- 13.6 Course Closeout
Certified Kubernetes Application Developer (CKAD) Course Content
Module 1: Course Overview
- 1.1 Course Overview
- 1.2 Course PreReqs
Module 2: Kubernetes and Container Fundamentals
- 2.1 Core Concepts
- 2.2 What is the CKAD Exam
- 2.3 Why Get Certified
- 2.4 CKAD Exam Domains
- 2.5 APIs
- 2.6 Demo - Explore APIS
- 2.7 Pods
- 2.8 Whiteboard - Pod Creation Workflow
- 2.9 Create a Pod
- 2.10 Lifecycle Status
- 2.11 Inspecting Pods
- 2.12 Demo - Create a Pod and Inspect
Module 3: Configuration
- 3.1 Configuration
- 3.2 Understand Configmaps
- 3.3 Understand Security Contexts
- 3.4 Demo - Create a Security Context
- 3.5 Create and Consume Secrets
- 3.6 Understand Service Accounts
- 3.7 Demo - Create a Pod to Use a Secret
- 3.8 Demo - Define a Service Account
Module 4: Multi Container Pods
- 4.1 Multi Container Pods
- 4.2 Multi Container Pods Design and Patterns
- 4.3 Ambassador Containers
- 4.4 Connecting to Pods
- 4.5 Side Cars
- 4.6 Demo - Create an Init Container
Module 5: Observability
- 5.1 Observability
- 5.2 Container Health
- 5.3 Probes
- 5.4 Logging
- 5.5 Monitor Resources and Apps
- 5.6 Monitoring Pods
- 5.7 Demo - Monitoring and Logging
Module 6: Pod Design
- 6.1 Pod Design
- 6.2 Deployments
- 6.3 Rolling Updates
- 6.4 Pod Changes
- 6.5 Jobs and Crons
- 6.6 Labels and Annotations
- 6.7 Demo - Define and Query Labels
- 6.8 Scalability Options
Module 7: Services and Networking
- 7.1 Services and Networking
- 7.2 Understanding Networking, Routing and Services
- 7.3 Network Policies
- 7.4 Namespaces
- 7.5 Demo - Networking
Module 8: State Persistence
- 8.1 State Persistence
- 8.2 Storage Options
- 8.3 Volume Storage
- 8.4 Configure Pod Volumes
- 8.5 Configure Persistent Volumes
- 8.6 Whiteboard - Persistent Volumes
Module 9: CKA Practice Exams
- 9.1 CKAD Practice Preparation
- 9.2 Exam Prep Need to Know
- 9.3 Question 1 - Create a Pod and Inspect
- 9.4 Question 2 - Define a Pods Readiness
- 9.5 Question 3 - Create a Pod with a Secret
- 9.6 Question 4 - View Pods logs in Real Time
- 9.7 Question 5 - Define and query labels
- 9.8 Additional Questions
Module 10: Course Closeout
- 10.1 Course Closeout
- 10.2 Course Summary Review
- 10.3 Kubernetes Certifications
- 10.4 Additional Resources
- 10.5 Exam Review
- 10.6 Course Closeout
Cisco 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) (CCNP) Course Content
Module 1: Architecture
- 1.1 About Your Instructor
- 1.2 Course Introduction
- 1.3 Welcome to the Architecture Domain
- 1.4 Classic 3 and 2 Tier Models
- 1.5 2 Tier Spine Leaf
- 1.6 Fabric Capacity Planning
- 1.7 High Availability
- 1.8 Designing a WLAN Deployment
- 1.9 Cloud vs On-Prem
- 1.10 The Cisco SD-WAN
- 1.11 Cisco SD-Access
- 1.12 QoS
- 1.13 Hardware vs Software Switching
Module 2: Virtualization
- 2.1 Welcome to the Virtualization Domain
- 2.2 Device Virtualization Technologies
- 2.3 Data Path Virtualization
- 2.4 Network Virtualization Concepts
Module 3: Infrastructure
- 3.1 Welcome to the Infrastructure Domain
- 3.2 Trunking - VTP - EtherChannel
- 3.3 RSTP and MST
- 3.4 EIGRP vs OSPF
- 3.4 OSPF
- 3.5 eBGP
- 3.6 eBGP Part 2
- 3.7 WLANs
- 3.8 NTP NAT PAT
- 3.9 HSRP VRRP GLBP
- 3.10 Multicast
Module 4: Network Assurance
- 4.1 Welcome to the Network Assurance Module
- 4.2 Diagnose Network Issues
- 4.3 NetFlow
- 4.4 SPAN
- 4.5 IP SLA
- 4.6 DNA Center
Module 5: Security
- 5.1 Welcome to the Security Module
- 5.2 Device Access Control
- 5.3 ACLs and CoPP
- 5.4 Wireless Security
- 5.5 Components in Security Design
Module 6: Automation
- 6.1 Welcome to the Automation Module
- 6.2 Python
- 6.3 JSON
- 6.4 YANG
- 6.5 NETCONF-RESTCONF
- 6.6 APIs
- 6.7 EEM
- 6.8 Orchestration Tools
Microsoft SQL Server - Big Data Course Content
Module 1: What are Big Data Clusters?
- 1.1 Introduction
- 1.2 Linux, PolyBase, and Active Directory
- 1.3 Scenarios
Module 2: Big Data Cluster Architecture
- 2.1 Introduction
- 2.2 Docker
- 2.3 Kubernetes
- 2.4 Hadoop and Spark
- 2.5 Components
- 2.6 Endpoints
Module 3: Deployment of Big Data Clusters
- 3.1 Introduction
- 3.2 Install Prerequisites
- 3.3 Deploy Kubernetes
- 3.4 Deploy BDC
- 3.5 Monitor and Verify Deployment
Module 4: Loading and Querying Data in Big Data Clusters
- 4.1 Introduction
- 4.2 HDFS with Curl
- 4.3 Loading Data with T-SQL
- 4.4 Virtualizing Data
- 4.5 Restoring a Database
Module 5: Working with Spark in Big Data Clusters
- 5.1 Introduction
- 5.2 What is Spark
- 5.3 Submitting Spark Jobs
- 5.4 Running Spark Jobs via Notebooks
- 5.5 Transforming CSV
- 5.6 Spark-SQL
- 5.7 Spark to SQL ETL
Module 6: Machine Learning on Big Data Clusters
- 6.1 Introduction
- 6.2 Machine Learning Services
- 6.3 Using MLeap
- 6.4 Using Python
- 6.5 Using R
Module 7: Create and Consume Big Data Cluster Apps
- 7.1 Introduction
- 7.2 Deploying, Running, Consuming, and Monitoring an App
- 7.3 Python Example - Deploy with azdata and Monitoring
- 7.4 R Example - Deploy with VS Code and Consume with Postman
- 7.5 MLeap Example - Create a yaml file
- 7.6 SSIS Example - Implement scheduled execution of a DB backup
Module 8: Maintenance of Big Data Clusters
- 8.1 Introduction
- 8.2 Monitoring
- 8.3 Managing and Automation
- 8.4 Course Wrap Up
Microsoft MD-100: Windows 10 Course Content
Module 1: Introduction and Deploy Windows
- 1.1 Instructor and Course Introduction
- 1.2 Exam Overview
- 1.3 Deploy Windows Intro
- 1.4 Deploy Windows 10
- 1.5 Deploy Windows 10 Pt 2
- 1.6 Preparing Virtual Lab Setup for the Client 1
- 1.7 Installation of Windows 10 Enterprise
- 1.8 Troubleshooting Failed Installations with Setup Logs
- 1.9 Configuring Locales
- 1.10 Perform Post-Installation Configuration
- 1.11 Navigating Microsoft Edge
- 1.12 Modifying Microsoft Edge Settings
- 1.13 Customizing Your Computer Setting
Module 2: Manage Devices and Data
- 2.1 Manage devices and data intro
- 2.2 Manage local users, groups, and devices
- 2.3 Configure data access and protection
- 2.4 Adding and accessing local users and groups
- 2.5 Managing NTFS permissions in Windows 10
- 2.6 Configure devices by using local policies
- 2.7 Configuring Audit Policies on Windows 10
- 2.8 Manage Windows security
- 2.9 How to change user account settings
Module 3: Configure Connectivity
- 3.1 Configure connectivity intro
- 3.2 Configure networking
- 3.3 Configuring network adapter advanced properties
- 3.4 Configuring a static TCP/IP address
- 3.5 Viewing the networking connection details
- 3.6 Setting up a VPN connection
- 3.7 Configure remote connectivity
- 3.8 Configure remote management
Module 4: Maintain Windows
- 4.1 Maintain Windows intro
- 4.2 Configure system and data recovery
- 4.3 Backing up files in Windows 10
- 4.4 Using the recycle bin
- 4.5 Manage updates
- 4.6 Check for updates in Windows 10
- 4.7 Configuring hardware in Windows 10
- 4.8 Monitor and manage Windows
- 4.9 Configuring Windows 20 desktop options
- 4.10 Installing new features
DevOps Fundamentals Course Content
Module 1: Course Overview
- Course Overview
- Course Pre Reqs
Module 2: The Basics
- The Basics
- What is DevOps
- DevOps Building Blocks
- DevOps Best Practices
- Why Containers
- What is a Pipeline
- Continuous Integration and Continous Delivery
- Continuous Deployment
- Pipelines - Whiteboard
Module 3: Development
- Development Basics
- CICD Strategy
- Source Control Management
- Demo - Build Management
Module 4: Infrastructure
- Release and Deployments
- Release Management
- Demo - Release Management
- Reliability Engineering
- DevOps Tools
- Infrastructure as Code
- Automation
- Demo - (IaaC) CloudFormation
- Demo - Jenkins
- Demo - GitHub
Module 5: Key Performance Indicators (KPIs)
- Key Performance Indicators (KPI)
- KPI Metrics
- KPI Tools
- Monitoring Applications
- Demo - AWS CloudWatch
Module 6: Course Closeout
- 6.1 Module 6 Introduction
- Course Closeout
- 6.2 Course Review
- Summary Review
- 6.3 Blockchain Roles
- Additional Resources
- DevOps Job Outlook
- Course Closeout
Kubernetes - Containerizing Applications in the Cloud Course Content
Module 1: Course Overview
- Course Overview
- Course PreReqs
Module 2: Basics of Kubernetes
- Basics of Kubernetes
- What is Kubernetes
- Business Value of Kubernetes
- What is a Container
- What is Docker
- Kubernetes History
- Kuberntes Terminology
- Kubernetes Components
- Whiteboard - Kubernetes Overview
Module 3: Kubernetes Design and Architecture
- Kubernetes Design and Architecture
- Kubernetes Design Fundamentals
- Whiteboard - Kubernetes Architecture
- Deployment - Nodes, Pods, and Clusters
- Etcd
- Kubectl
- Demo - Install Kubectl
- Demo - Kubernetes Commands
- Demo - Kubernetes Commands
Module 4: Deployments
- Deployments
- Options for Deployment
- Deploying a Containerized Application
- What is Minikube
- Demo - Deploy MiniKube
- Demo - Deploy Cluster Deployment
- Demo - Deploy Services
- Demo - Manage Application
Module 5: Course Closeout
- Course Closeout
- Course Review
- Kubernetes Certifications
- Additional Resources
- Kubernetes Job Outlook
- Course Closeout
Google Cloud Platform (GCP) Certification Training Course Content
Module 1: Course Overview
- Course Overview
- Course PreReqs
Module 2: DevOps Basics
- DevOps Fundamentals
- What is DevOps
- What are Pipelines
- Continuous Integration and Delivery
- Continuous Deployment
- Whiteboard Build Services
- Demo - DevOps Services on GCP
Module 3: App Engine PaaS
- App Engine
- App Engine Basics
- App Engine Demo
- App Engine Security Scanner Demo
- App Engine or Kubenetes Engine
Module 4: Kubenetes Engine Overview
- Kubenetes Engine
- Kubernetes Basics
- What is Kubenetes Engine
- Demo - Kubenetes Engine Clusters Demo
- Kubenetes Engine Application Demo
- Kubenetes Engine Whiteboard
Module 5: DevOps Developer Tools
- DevOps Services & Tools
- Demo - Cloud SDK
- Demo - Cloud Shell
- Demo - Cloud Build
- Demo - Container Registry
- Demo - Cloud Source Repositories
- Demo - Private Catalog
- Demo - Artifact Registry
Module 6: Microservices
- Microservices
- Demo - Cloud Watch
- Cloud Functions-Cloud Run
- Demo - Cloud Functions
- Demo - Cloud Run
Module 7: Management of your DevOps Services
- Management and Monitoring
- Cloud Operations
- Demo - Cloud Operations
- Service Accounts
- Cloud Endpoints and Apigee
- Demo - Workflows and Cloud Tasks
- Demo - Recommendation Engine
- Infrastructure as Code (IaaC)
- Deployment Manager
- Demo - Deployment Manager
- Demo - Cloud Marketplace
Module 8: Resources and Closeout
- Resources and Closeout
- Course Summary
- DevOps Roles and Salary Demand
- Additional Resources
- Google Cloud Platform Certification
- Course Closeout
Microsoft SQL Server 2019 Administration Course Content
Module 1: Installation
- SQL Admin Intro
- Installation
Module 2: Data Storage
- Introduction to Data Storage with SQL Server
- Managing Storage for System Databases
- Managing Storage for User Databases
- Moving Database Files
Module 3: Data Recover
- Intro to Data Recovery
- Understanding SQL Server Recovery Models
- Planning a Backup Strategy
- Backing up Databases and Transaction Logs
- Using SSMS For Backup
- Understanding the Restore Process
- How to Restore a Database
- Using SSMS For Restore
- T-SQL Backup and Restore
- Advanced Restore Scenarios
- Introduction to Transferring Data
- Importing and Exporting Table Data
- Copying or Moving a Database
Module 4: Monitoring
- Introduction to Monitoring SQL Server
- Dynamic Management Views and Functions
- Server Reports
- System Performance Monitor
- Tracing SQL Server Workload Activity
- Extended Events
- Database Tuning Advisor
Module 5: Security
- Introduction to SQL Server Security
- Managing Server-Level Security
- Managing Database-Level Security
- Row Level Security (RLS) Using Policies
- Database Security Tools
- Contained Database
- Auditing Data Access in SQL Server
- Implementing Transparent Data Encryption
Module 6: Maintenance
- Introduction to Maintenance
- Ensuring Database Integrity
- Maintaining Indexes
- Automating Routine Database Maintenance
- Automating SQL Server Management
- Monitoring SQL Server Errors
- Configuring Database Mai
Certified Information Security Manager (CISM) Course Content
Module 1: Introduction
- Instructor Introduction
- Course Introduction
- Exam Overview
Module 2: Information Security Governance
- Module Overview
- InfoSec Strategic Context Part 1
- InfoSec Strategic Context Part 2
- GRC Strategy and Assurance
- Roles and Responsibilities
- GMA Tasks Knowledge and Metrics
- IS Strategy Overview
- Strategy Implemenation
- Strategy Development Support
- Architecture and Controls
- Considerations and Action Plan
- InfoSec Prog Objectives and Wrap-Up
Module 3: Information Security Risk Management
- Module Overview
- Risk Identification Task and Knowledge
- Risk Management Strategy
- Additional Considerations
- Risk Analysis and Treatment Tasks & Knowledge
- Leveraging Frameworks
- Assessment Tools and Analysis
- Risk Scenario Development
- Additional Risk Factors
- Asset Classification and Risk Management
- Risk Monitoring and Communication
- Information Risk Management Summary
Module 4: InfoSec Prog Development and Management
- Module Overview
- Alignment and Resource Management - Task and Knowledge
- Key Relationships
- Standards Awareness and Training - Tasks and Knowledge
- Awareness and Training
- Building Security into Process and Practices - Tasks and Knowledge
- Additional Technology Infrastructure Concerns
- Security monitoring and reporting Overview Tasks and Knowledge
- Metrics and Monitoring
- Summary
Module 5: Information Security Incident Management
- Module Overview
- Planning and Integration Overview Task and Knowledge
- Incident Response Concepts and Process
- Forensics and Recovery
- Readiness and Assessment - Overview Tasks and Knowledge
- Identification and Response Overview Tasks and Knowledge
- Incident Processes
Module 6: Exam Prep
- Case Study - Security On a Shoestring Budget
- Case Study - APT In Action
- Summary
- Exam Prep
Project Management Professional (PMP) 6th edition PMBOK Course Content
Module 1: Preparing for and Taking the Exam
- Preparing to Take the Exam and Instructor Introduction
- Getting Certified to take the Examination
- Examination Characteristics
- Test Taking Tips and Techniques
- Question Formats
- Post Certification Requirements
Module 2: Process Domain
- Process Domain and Framework defined
- Predictive, Iterative, Incremental and Adaptive Project Life Cycles
- Framework Definitions
- Project Manager Skills
- Framework Key Points to Remember
- Framework Example Questions Review
- Project Integration Management Knowledge Area Defined
- Knowledge Area Process Mapping and Definitions
- Develop Project Charter and Develop Project Management Plan
- Direct and Manage Project Work, Manage Project Knowledge, and Monitor and Control Project Work
- Perform Integrated Change Control
- Close Project or Phase
- Integration Key Points to Remember
- Integration Example Questions Review
- Project Scope Management Knowledge Area Defined
- Plan Scope Management and Collect Requirements
- Nominal Group Technique (Delphi-Opinion Technique)
- Define Scope and Create WBS
- Breakdown Structures used in WBS Dictionary
- Validate Scope and Control Scope
- Defining Requirements in Agile
- Prioritizing requirements in Agile, Definition of Done and Rolling Wave Planning
- Scope Key Points to Remember
- Scope Example Questions Review
- Project Schedule Management Knowledge Area Defined
- Plan Schedule Management, Define Activities, and Sequence Activities
- Dependencies, Predecessors, Leads, and Lags
- Estimate Activity Durations
- Develop Schedule
- Critical Path Method
- Schedule Compression
- Resource Leveling, Schedule Format, and Control Schedule
- Agile Estimating
- Agile Schedule Planning and Reporting
- Schedule Key Points to Remember and Example Question review
- Project Cost Management Knowledge Area Defined
- Plan Cost Management and Estimate Cost
- Types of Cost, Expected Present Value, Sunk Costs, and Depreciation
- Life Cycle Costing, Status Reporting, and Determine Budget
- Control Costs, and Earned Value Management
- Earned Schedule, and Agile Cost Control
- Cost Key Points to Remember
- Cost Example Questions Review
- Project Quality Management Knowledge Area Defined
- Plan Quality Management
- Manage Quality
- Control Quality
- Continuous Improvement in Agile-Adaptive Life Cycles - Kaizen and Process Analysis
- Continuous Improvement in Agile-Adaptive Life Cycles - Retrospectives
- Quality Key Points to Remember
- Quality Example Questions Review
- Project Risk Management Knowledge Area Defined
- Risk Management Plan and Identify Risks
- Risk Register and Issues Vs Risk
- Perform Qualitative and Quantitative Risk Analysis
- Plan Risk Responses
- Implement Risk Responses and Monitor Risks
- Agile Risk Tools and Risk Key Points to Remember
- Risk Example Questions Review
- Project Procurement Management Knowledge Area Defined
- Plan Procurement Management and Conduct Procurements
- Contracts
- Share and Point of Total Assumption
- Procurement Documents
- Non-Competitive Awards and Control Procurements
- Agile Contracts
- Procurement Key Points to Remember and Example Questions Review
Module 3: People Domain
- People Domain and Project Communications Management Knowledge Area Defined
- Plan Communications Management
- Manage and Monitor Communications
- Agile Communications
- Communications Key Points to Remember
- Communications Example Question Review
- Project Stakeholder Management Knowledge Area Defined
- Stakeholder Position Descriptions
- Identify Stakeholders
- Plan Stakeholder Engagement and Manage Stakeholder Engagement
- Monitor Stakeholder Engagement and Agile Stakeholder Engagement Techniques
- Stakeholder Management Key Points to Remember
- Stakeholder Management Example Question Review
- Resource Management Knowledge Area Defined
- Plan Resource Management and Estimate Activity Resources
- Acquire Resources and Develop Team
- Manage Team
- Control Resources and Agile Teaming Concepts
- Other Agile Teaming Concepts
- Agile Team Roles and Troubleshooting Agile team issues
- Resources Key Points to Remember
- Resources Example Question Review
Module 4: Business Environment Domain
- Business Environment Domain Defined
- Project Selection Tools
- PMO, Organizational Structure, and Reports
- Agile in the Business Environment
- Business Environment Key Points to Remember and Example Question Review
- Course Closing
AWS Certified Cloud Practitioner Course Content
Module 1: Introduction to Cloud Computing
- Welcome
- Why Cloud Computing
- What is Cloud Computing
- Cloud Computing Deployment Models
- Cloud Computing Types
- AWS Cloud Overview
- AWS Management Console Walk-Through
- AWS Shared Responsibility
- Summary
Module 2: Identity and Access Management IAM
- IAM Overview
- IAM Users & Groups Hands-On
- IAM Policies Hands-On
- MFA Overview
- MFA Hands-On
- AWS CLI
- AWS CLI Installation Hands-On
- AWS CLI Hands-On
- IAM Roles
- IAM Roles Hands-On
- IAM Security Tools
- IAM Security Tools Hands-On
- IAM Best Practices
- Shared Responsibility Model for IAM
- IAM Summary
Module 3: Elastic Cloud Computing EC2
- Budget Setup
- EC2 Overview
- EC2 Instance Hands-On
- Security Groups
- Security Groups Hands-On
- SSH Overview
- SSH Using Putty-Windows
- SSH Using CMD-Windows
- EC2 Instance Connect
- EC2 Instance Roles
- EC2 Launch Types
- Shared Responsibility Model for EC2
- EC2 Summary
Module 4: EC2 Storage
- Intro to EC2 Instance Storage
- EBS Volume Overview
- EBS Volume Hands-On
- EBS Snapshots
- EBS Snapshots Hands-On
- AMI Overview
- AMI Hands-On
- EC2 Instance Store
- EC2 Instance Store Hands-On
- Elastic File System - EFS
- Shared responsibility Model for EC2 Storage
- Section Cleanup
- EC2 Instance Storage Summary
Module 5: Elastic Load Balancer and Auto Scaling Group ELB and ESG
- Introduction to Scalability & High-Availability
- High Availability, Scalability and Elasticity
- ELB Overview
- ELB Hands-On
- ASG Overview
- ASG Hands-On
- Section Cleanup
- Summary
Module 6: Amazon S3
- S3 Introduction
- S3 Overview
- S3 Hands-On
- S3 Security
- S3 Bucket Policies Hands-On
- S3 Websites
- S3 Website Hands-On
- S3 Versioning
- S3 Versioning Hands-On
- S3 Access Logs
- S3 Access Logs Hands-On
- S3 Replication
- S3 Replication Hands-On
- S3 Storage Classes
- Snowball, Snowball Edge and SnowMobile
- S3 Summary
Module 7: Database and Analytics
- Database Introduction
- RDS & Aurora Overview
- RDS Database Hands-On
- ElastiCache Overview
- DynamoDB Overview
- DynamoDB Hands-On
- RedShift Overview
- Amazon EMR Overview
- Athena Overview
- AWS Glue
- DMS Overview
- Database & Analytics Summary
Module 8: Other Services
- Other Compute Introduction
- ECS-Fargate-ECR Overview
- What is Serverless
- AWS Lambda
- AWS Lambda Hands-On
- AWS Batch
- AWS LightSail
- AWS LightSail Hands-On
- Other Compute Summary
Module 9: Scaling Your Infrastructure
- CloudFormation Overview
- Cloud Formation Hands-On
- Elastic Beanstalk Overview
- Elastic Beanstalk Hands-On
- AWS CodeDeploy
- AWS SSM
- AWS OpsWorks
- Infrastructure at Scale Summary
Module 10: Global Applications
- Why Global Application
- Route 53
- Route 53 Hands-On
- CloudFront
- CloudFront Hands-On
- S3 Transfer Acceleration
- AWS Global Aceelerator
- Global Application Summary
Module 11: Cloud Integration
- Cloud Integration Introduction
- SQS Service
- SQS Service Hands-On
- SNS Service
- SNS Service Hands-On
- Cloud Integration Summary
Module 12: Cloud Monitoring
- CloudWatch Metrics and Alarms
- CloudWatch Metrics and Alarms Hands-On
- CloudWatch Logs
- CloudWatch Events and EventBridge
- CloudWatch Events and EventBridge Hands-On
- CloudTrail
- X-Ray
- Service Health Dashboard
- Personal Health Dashboard
- Monitoring Summary
Module 13: Virtual Private Network
- Settings the Expectations
- VPC and subnets, Internet Gateway and NAT Gateways
- VPC and subnets, Internet Gateway and NAT Gateways-Hands-On
- NACL and Security Groups
- NACL and Security Groups Hands-On
- VPC Flow Logs
- VPC Peering
- VPC Flow Logs and VPC Peering Hands-On
- VPC Endpoints
- VPC Endpoints Hands-On
- Site-to-Site VPNs and Direct Connect
- Transit Gateway
- VPC Summary
Module 14: Security and Compliance
- Introduction to Security and Compliance
- DDoS Mitigration
- Penetration Testing
- KMS and CloudHSM
- Secrets Manager
- AWS Artifact
- GuardDuty
- Inspector
- AWS Config
- AWS Macie
- Security and Compliance Summary
Module 15: Machine Learning
- Amazon Rekognition
- Amazon Transcribe
- Amazon Polly
- Amazon Translate
- Amazon Lex and Connect
- Amazon Comprehend
- Amazon SageMaker
- Machine Learning Summary
Module 16: Advanced Identity
- Amazon Cognito
- Directory Services
- Single Sign-On (SSO)
- Advanced Identity Summary
Module 17: Are You Well Architected?
- Are You Well Architected
- Operational Excellence
- Security
- Reliability
- Performance Efficiency
- Cost Optimization
- Trusted Advisor
Module 18: Congratulations & Exam Preparation
- Exam Tips & Congratulations
Microsoft AZ-900 Microsoft Azure Fundamentals Course Content
Module 1: Introduction
- Instructor Introduction
- Course Overview
- Expectations
Module 2: Cloud Fundamentals
- What is the Cloud
- Basic Terms
- Types of cloud computing
- Cloud Service Models
Module 3: Azure’s Architecture
- Regions and Availability
- Resource Groups and Management
- Azure Marketplace
- Demo- Azure Console Exploration
Module 4: Compute
- Virtual Machines
- Containers
- Demo - Containers
- Functions
- Demo - Functions
- Windows Virtual Desktop and App Services
Module 5: Networking and CDN
- Virtual Networks
- Load Balancers
- Gateways
- Content Delivery Network
- Network Security
- Demo - Connecting two VMs
Module 6: Storage
- Storage
- Big Data and Analytics
- Databases
- Demo - SQL Database
- Database Migration
Module 7: Azure Solutions
- IoT
- Demo - IoT Hub
- AI
- Serverless Computing
Module 8: Administration
- Security
- Identity and Access Management
- Demo - Adding Users and Groups
- Governance
- Demo - Resource Locks
- Privacy and Compliance
Module 9: Pricing and Service Level Agreements
- Managing Costs
- Demo - Pricing Calculator
- Service Level Agreements and Service Lifecycles
Module 10: Exam Preparation
- Exam Layout
- Best Practices and Study Tips
- Overview and Conclusion
Module 11: Review Questions
- Module 11 pt 1
- Module 11 pt 2
- Module 11 pt 3
- Module 11 pt 4
CompTIA Linux+ (XK0-004) Course Content
Module 1: Intro & Performing Basic Linux Tasks
- Instructor Introduction
- Course Introduction
- Identify The Linux Design Philosophy
- Enter Shell Commands
- Shell Commands Activity
- Get Help with Linux
Module 2: Managing Users and Groups
- Assume Superuser and Groups
- Create, Modify, and Delete Users
- Create, Modify, and Delete Groups
- Query Users and Groups
- Configure Account Profiles
Module 3: Managing Permissions and Ownership
- Modify File and Directory Permissions
- Modify File and Directory Ownership
- Configure Special Permissions and Attributes
- Troubleshoot Permissions Issues
Module 4: Managing Storage
- Create Partitions
- Manage Logical Volumes
- Mount File Systems
- Manage File Systems
- Navigate the Linux Directory Structure
- Troubleshoot Storage Issues
Module 5: Managing Files and Directories
- Create and Edit Text Files
- Search for Files
- Perform Operations on Files and Directories
- Process Text Files
- Manipulate File Output
Module 6: Managing Kernel Modules
- Explore the Linux Kernel
- Install and Configure Kernel Modules
- Monitor Kernel Modules
Module 7: Managing the Linux Boot Process
- Configure Linux Boot Components
- Configure GRUB
Module 8: Managing System Components
- Configure Localization Options
- Configure GUIs
- Manage Services
- Troubleshoot Process Issues
- Troubleshoot CPU and Memory Issues
Module 9: Managing Devices
- Identify the Types of Linux
- Configure Devices
- Monitor Devices
- Troubleshoot Hardware Issues
Module 10: Managing Networking
- Identify TCP/IP Fundamentals
- Identify Linux Server Roles
- Connect to a Network
- Configure DHCP and DNS Client Services
- Configure Cloud and Virtualization Technologies
- Troubleshoot Networking Issues
Module 11: Managing Packages and Software
- Identify Package Managers
- Manage RPM Packages with YUM
- Manage Debian Packages with APT
- Configure Repositories
- Acquire Software
- Build Software from Source Code
- Troubleshoot Software Dependency Issues
Module 12: Securing Linux Systems
- Implement Cybersecurity Best Practices
- Implement Identity and Access Management Methods
- Configure SELinux or AppArmor
- Configure Firewalls
- Implement Logging Services
- Back Up, Restore, and Verify Data
Module 13: Working with Bash Scripts
- Customize the Bash Shell Environment
- Identify Scripting and Programming Fundamentals
- Write and Execute a Simple Bash Script
- Incorporate Control Statements in Bash Scripts
Module 14: Automating Tasks
- Schedule Jobs
- Implement Version Control Using Git
- Identify Orchestration Concepts
Module 15: Installing Linux
- Prepare for Linux Installation
- Perform the Installation
CompTIA CySA+ (Cybersecurity Analyst+) CS0-002 Course Content
Module 1: Threat and Vulnerability Management
- Instructor Intro
- About the Exam
- Test Taking Tips and Techniques
- Explain the importance of threat data and intelligence
- Given a scenario, utilize threat intelligence to support organizational security
- Given a scenario, perform vulnerability management activities Pt 1
- Given a scenario, perform vulnerability management activities Pt 2
- Given a scenario, analyze the output from common vulnerability assessment tools
- Explain the threats and vulnerabilities associated with specialized technology
- Explain the threats and vulnerabilities associated with operating in the Cloud
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
- Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
Module 2: Software and Systems Security
- Given a scenario, apply security solutions for infrastructure management Pt 1
- Outline
- Given a scenario, apply security solutions for infrastructure management Pt 2
- Given a scenario, apply security solutions for infrastructure management Pt 3
- Flashcards
- Explain software assurance best practices
- Scatter
- Explain hardware assurance best practices
- Learn
- Speller
- Workbook
Module 3: Security Operations and Monitoring
- Given a scenario, analyze data as part of security monitoring activities Pt 1
- Given a scenario, analyze data as part of security monitoring activities Pt 2
- Given a scenario, analyze data as part of security monitoring activities Pt 3
- Given a scenario, implement configuration changes to existing controls to improve security Pt 1
- Given a scenario, implement configuration changes to existing controls to improve security Pt 2
- Explain the importance of proactive threat hunting
- Compare and contrast automation concepts and technologies
Module 4: Incident Response
- Explain the importance of the incident response process
- Given a scenario, apply the appropriate the incident response procedure
- Given an incident, analyze potential indicators of compromise
- Given a scenario, utilize basic digital forensic techniques
Module 5: Compliance and Assessment
- Understand the importance of data privacy and protection
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
- Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
- Explain the importance of frameworks, policies, procedures, and controls Pt 1
- Explain the importance of frameworks, policies, procedures, and controls Pt 2
Module 6: Afterword
- Recap
- Review Questions
- Before the Exam
OSHA Training Course Content
Module 1: The Basics
- The Basics
Module 2: Construction and Facility
- Construction and Facility
Module 3: MSDS Sheets
- MSDS Sheets
Module 4: OSHA in Healthcare
- OSHA in Healthcare
Module 5: Other Risk Areas
- Other Risk Areas
HIPAA, Fraud, and Abuse Course Content
Module 1: HIPAA and Privacy
- HIPAA and Privacy
- Security, Safeguards, and Controls
- Examples and Cases
Module 2: Fraud, Waste, and Abuse
- Fraud, Waste, and Abuse
- Case Examples and Law
Module 3: Compliance and Prevention
- Compliance and Prevention
Harassment in the Workplace Course Content
Module 1: Basic Protections
- Basic Protections
Module 2: Sexual Harassment
- Sexual Harassment
Module 3: Other Harassment
- Other Harassment
Module 4: Laws and Cases
- Laws
- Cases
Module 5: Recognize and Prevention
- Recognize and Prevention
CompTIA Cloud Essentials+ (CLO-002) Course Content
Module 1: Understanding Cloud Computing Concepts
- Course Intro
- Understand Basic Cloud Concepts and Terms Pt 1
- Understand Basic Cloud Concepts and Terms Pt 2
- Understand Basic Cloud Concepts and Terms Activity
- Identify Cloud Network and Cloud Storage Technologies
- Identify Cloud Network and Cloud Storage Technologies Activity
- Recognize Cloud Design Aspects
- Recognize Cloud Design Aspects Activity
Module 2: Applying Cloud Business Principles
- Relate Cloud Concepts to Business Principles
- Relate Cloud Concepts to Business Principles Activity
- Establish Cloud Vendor Relations
- Establish Cloud Vendor Relations Activity
- Distinguish the Financial Aspects of Engaging a Cloud Service Provider
- Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity
- Report Financial Expenditures
- Report Financial Expenditures Activity
Module 3: Advising a Cloud Design and Migration
- Relate Cloud Concepts to Cloud Design and Migration
- Relate Cloud Concepts to Cloud Design and Migration Activity
- Use Cloud Assessments
- Use Cloud Assessments Activity
- Manage Cloud Design
- Manage Cloud Design Activity
- Compare Cloud Migration Approaches
- Compare Cloud Migration Approaches Activity
- Identity Benefits and Solutions of Cloud Services
- Identity Benefits and Solutions of Cloud Services Activity
Module 4: Operating in the Cloud
- Relate Cloud Concepts to Technical Operations
- Relate Cloud Concepts to Technical Operations Activity
- Identify the Technical Aspects of Cloud Operations
- Identify the Technical Aspects of Cloud Operations Activity
- Understand DevOps in the Cloud
- Understand DevOps in the Cloud Activity
- Explain Cloud Security Concerns, Measures, and Concepts Part 1
- Explain Cloud Security Concerns, Measures, and Concepts Part 2
- Explain Cloud Security Concerns, Measures, and Concepts Activity
Module 5: Managing Cloud Governance
- Relate Cloud Concepts to Governance
- Relate Cloud Concepts to Governance Activity
- Apply Risk Management Concepts
- Apply Risk Management Concepts Activity
- Understand Compliance and the Cloud
- Understand Compliance and the Cloud Activity
- Manage Policies and Procedures for Cloud Services
- Manage Policies and Procedures for Cloud Services Activity
Module 6: Exam Information, Review and Summary
- Exam Information
- Exam Review Pt 1
- Exam Review Pt 2
- Exam Review Pt 3
- Exam Review Pt 4
Module 7: Activities
- Apply Risk Management Concepts Activity
- Compare Cloud Migration Approaches Activity
- Distinguish the Financial Aspects of Engaging a Cloud Service Provider Activity
- Establish Cloud Vendor Relations Activity
- Explain Cloud Security Concerns, Measures, and Concepts Activity
- Identify Cloud Network and Cloud Storage Technologies Activity
- Identify the Technical Aspects of Cloud Operations Activity
- Identity Benefits and Solutions of Cloud Services Activity
- Manage Cloud Design Activity
- Manage Policies and Procedures for Cloud Services Activity
- Recognize Cloud Design Aspects Activity
- Relate Cloud Concepts to Business Principles Activity
- Relate Cloud Concepts to Cloud Design and Migration Activity
- Relate Cloud Concepts to Governance Activity
- Relate Cloud Concepts to Technical Operations Activity
- Report Financial Expenditures Activity
- Understand Basic Cloud Concepts and Terms Activity
- Understand Compliance and the Cloud Activity
- Understand DevOps in the Cloud Activity
- Use Cloud Assessments Activity
Module 8: Tools and Resources
- AWS Tools and Resources
- Azure Tools and Resources
- GCP Tools and Resources
CompTIA Cloud+ (CVO-002) Course Content
Module 1: Preparing to Deploy Cloud Solutions
- Course Introduction
- Instructor Intro
- Describe Interaction of Cloud Components and Services
- Activity Scenario Introduction
- Describe Interaction of Cloud Components and Services Activity
- Describe Interaction of Non-cloud Components and Services
- Describe Interaction of Non-cloud Components and Services Activity
- Evaluate Existing Components and Services for Cloud Deployment
- Evaluate Existing Components and Services for Cloud Deployment Activity
- Evaluate Automation and Orchestration Options
- Evaluate Automation and Orchestration Options Activity
- Prepare for Cloud Deployment
- Prepare for Cloud Deployment Activity
Module 2: Deploying a Pilot Project
- Manage Change in a Pilot Project
- Manage Change in a Pilot Project Activity
- Execute Cloud Deployment Workflow
- Execute Cloud Deployment Workflow Activity
- Complete Post-Deployment Configuration
- Complete Post-Deployment Configuration Activity
Module 3: Testing Pilot Project Deployments
- Identify Cloud Service Components for Testing
- Identify Cloud Service Components for Testing Activity
- Test for High Availability and Accessibility
- Test for High Availability and Accessibility Activity
- Perform Deployment Load Testing
- Perform Deployment Load Testing Activity
- Analyze Test Results
- Analyze Test Results Activity
Module 4: Designing a Secure and Compliant Cloud Infrastructure
- Design Cloud Infrastructure for Security
- Design Cloud Infrastructure for Security Activity
- Determine Organizational Compliance Needs
- Determine Organizational Compliance Needs Activity
Module 5: Designing and Implementing a Secure Cloud Environment
- Design Virtual Network for Cloud Deployment
- Design Virtual Network for Cloud Deployment Activity
- Determine Network Access Requirements
- Determine Network Access Requirements Activity
- Secure Networks for Cloud Interaction
- Secure Networks for Cloud Interaction Activity
- Manage Cloud Component Security
- Implement Security Technologies
- Implement Security Technologies Activity
Module 6: Planning Identity and Access Management for Cloud Deployments
- Determine Identity Management and Authentication Technologies
- Determine Identity Management and Authentication Technologies Activity
- Plan Account Management Policies for the Network and Systems
- Plan Account Management Policies for the Network and Systems Activity
- Control Access to Cloud Objects
- Control Access to Cloud Objects Activity
- Provision Accounts
- Provision Accounts Activity
Module 7: Determing CPU and Memory Sizing for Cloud Deployments
- Determine CPU Size for Cloud Deployment
- Determine CPU Size for Cloud Deployment Activity
- Determine Memory Size for Cloud Deployment
Module 8: Determing Storage Requirements for Cloud Deployments
- Determine Storage Technology Requirements
- Determine Storage Technology Requirements Activity
- Select Storage Options for Deployment
- Select Storage Options for Deployment Activity
- Determine Storage Access and Provisioning Requirements
- Determine Storage Access and Provisioning Requirements Activity
- Determine Storage Security Options
- Determine Storage Security Options Activity
Module 9: Analyzing Workload Characteristics to Ensure Successful Migration
- Determine the Type of Cloud Deployment to Perform
- Determine the Type of Cloud Deployment to Perform Activity
- Manage Virtual Machine and Container Migration
- Manage Virtual Machine and Container Migration Activity
- Manage Network, Storage, and Data Migration
- Manage Network, Storage, and Data Migration Activity
Module 10: Maintaining Cloud Systems
- Patch Cloud Systems
- Patch Cloud Systems Activity
- Design and Implement Automation and Orchestration for Maintenance
- Design and Implement Automation and Orchestration for Maintenance Activity
Module 11: Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures
- Back Up and Restore Cloud Data
- Back Up and Restore Cloud Data Activity
- Implement Disaster Recovery Plans
- Implement Disaster Recovery Plans Activity
- Implement Business Continuity Plans
- Implement Business Continuity Plans Activity
Module 12: Analyzing Cloud Systems for Performance
- Monitor Cloud Systems to Measure Performance
- Monitor Cloud Systems to Measure Performance Activity
- Optimize Cloud Systems to Meet Performance Criteria
- Optimize Cloud Systems to Meet Performance Criteria Activity
Module 13: Analyzing Cloud Systems for Anomalies and Growth Forecasting
- Monitor for Anomalies and Resource Needs
- Monitor for Anomalies and Resource Needs Activity
- Plan for Capacity
- Plan for Capacity Activity
- Create Reports on Cloud System Metrics
- Create Reports on Cloud System Metrics Activity
Module 14: Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues
- Troubleshoot Deployment Issues
- Troubleshoot Deployment Issues Activity
- Troubleshoot Capacity Issues
- Troubleshoot Capacity Issues Activity
- Troubleshoot Automation and Orchestration Issues
- Troubleshoot Automation and Orchestration Issues Activity
Module 15: Troubleshooting Connectivity Issues
- Identify Connectivity Issues
- Identify Connectivity Issues Activity
- Troubleshoot Connectivity Issues
- Troubleshoot Connectivity Issues Activity
Module 16: Troubleshooting Security Issues
- Troubleshoot Identity and Access Issues
- Troubleshoot Identity and Access Issues Activity
- Troubleshoot Attacks
- Troubleshoot Attacks Activity
- Troubleshoot Other Security Issues
- Troubleshoot Other Security Issues Activity
Module 17: Exam Information, Review, and Summary
- Exam Information
- Course Review
Module 18: Activities
- Activity Scenario Introduction
- Describe Interaction of Cloud Components and Services Activity
- Describe Interaction of Non-cloud Components and Services Activity
- Evaluate Existing Components and Services for Cloud Deployment Activity
- Evaluate Automation and Orchestration Options Activity
- Prepare for Cloud Deployment Activity
- Manage Change in a Pilot Project Activity
- Execute Cloud Deployment Workflow Activity
- Complete Post-Deployment Configuration Activity
- Identify Cloud Service Components for Testing Activity
- Test for High Availability and Accessibility Activity
- Perform Deployment Load Testing Activity
- Analyze Test Results Activity
- Design Cloud Infrastructure for Security Activity
- Determine Organizational Compliance Needs Activity
- Design Virtual Network for Cloud Deployment Activity
- Determine Network Access Requirements Activity
- Secure Networks for Cloud Interaction Activity
- Implement Security Technologies Activity
- Determine Identity Management and Authentication Technologies Activity
- Plan Account Management Policies for the Network and Systems Activity
- Control Access to Cloud Objects Activity
- Provision Accounts Activity
- Determine CPU Size for Cloud Deployment Activity
- Determine Storage Technology Requirements Activity
- Select Storage Options for Deployment Activity
- Determine Storage Access and Provisioning Requirements Activity
- Determine Storage Security Options Activity
- Determine the Type of Cloud Deployment to Perform Activity
- Manage Virtual Machine and Container Migration Activity
- Manage Network, Storage, and Data Migration Activity
- Patch Cloud Systems Activity
- Design and Implement Automation and Orchestration for Maintenance Activity
- Back Up and Restore Cloud Data Activity
- Implement Disaster Recovery Plans Activity
- Implement Business Continuity Plans Activity
- Monitor Cloud Systems to Measure Performance Activity
- Optimize Cloud Systems to Meet Performance Criteria Activity
- Monitor for Anomalies and Resource Needs Activity
- Plan for Capacity Activity
- Create Reports on Cloud System Metrics Activity
- Troubleshoot Deployment Issues Activity
- Troubleshoot Capacity Issues Activity
- Troubleshoot Automation and Orchestration Issues Activity
- Identify Connectivity Issues Activity
- Troubleshoot Connectivity Issues Activity
- Troubleshoot Identity and Access Issues Activity
- Troubleshoot Attacks Activity
- Troubleshoot Other Security Issues Activity
PMI Risk Management Professional (PMI-RMP) 6th Edition Course Content
Module 1: Risk Management Fundamentals
- Instructor Intro
- Course Intro
- Risk Management Fundamentals Pt 1
- Risk Management Fundamentals Pt 2
Module 2: Test Requirements
- Test Requirements
Module 3: Test Domains
- Test Domains Pt 1
- Test Domains Pt 2
Module 4: Risk Strategy and Planning
- Risk Strategy and Planning Pt 1
- Risk Strategy and Planning Pt 2
Module 5: Stakeholder Engagement
- Stakeholder Engagement Pt 1
- Stakeholder Engagement Pt 2
- Stakeholder Engagement Pt 3
- Stakeholder Engagement Pt 4
Module 6: Risk Process Facilitation
- Risk Process Facilitation Pt1
- Risk Process Facilitation Pt2
- Risk Process Facilitation Pt3
Module 7: Risk Monitoring and Reporting
- Risk Monitoring and Reporting Pt 1
- Risk Monitoring and Reporting Pt 2
- Risk Monitoring and Reporting Pt 3
Module 8: Specialized Risk Analyses
- Specialized Risk Analyses Pt 1
- Specialized Risk Analyses Pt 2
- Specialized Risk Analyses Pt 3
Module 9: RMP Recap
- RMP Recap
Module 10: RMP Review Questions
- RMP Review Questions Pt 1
- RMP Review Questions Pt 2
- RMP Review Questions Pt 3
- RMP Review Questions Pt 4
- RMP Review Questions Pt 5
HTML5 and CSS3 Fundamentals Course Content
Module 1: Course Orientation, Internet & Web
- Instructor Intro
- Course Intro
- Internet and the Web
Module 2: HTML Basics
- HTML Overview and Your First Webpage
- Create a Template
- Heading Element
- Paragraph Element
- Line Break Elemen
- Blockquote Element
- Phrase Elements
- Ordered List and Unordered Lists
- Description List
- Special Characters
- Structural Elements
- Anchor Elements
- HTML Validation
Module 3: Color & Text, CSS
- Overview of Cascading Style Sheets
- Using Color on Web Pages
- Inline CSS with the Style Attribute
- Embedded CSS with the Style Element
- Configuring Text with CSS
- CSS Class, ID, and Descendant Selectors
- Span Element
- Using External Style Sheets
- Center HTML Elements with CSS
- The Cascade
- CSS Validation
Module 4: Visual Elements & Graphics
- Visual Elements and Graphics
- Types of Graphics
- Image Element
- Image Hyperlinks
- HTML5 Visual Elements
- HTML5 Visual Elements Continued
- Meter and Progress Element
- Background Images
- More About Images
- Sources and Guidelines for Graphics
- CSS3 Visual Effects Pt 1
- CSS3 Visual Effects Pt 2
Module 5: Web Design
- Web Design
Module 6: Page Layout
- Page Layout Pt 1
- Page Layout Pt 2
- Hyperlinks in an Unordered List
- Practice with CSS Two-column Layout
- Header Text Image Replacement
- Practice with an Image Gallery
- Positioning with CSS
- CSS Debugging Techniques
- More HTML5 Structured Elements
Module 7: Links, Layout, & Mobile
- Links, Layout, & Mobile
- Fragment Identifiers
- The Target Attribute
- CSS Sprites
- Three-column CSS Page Layout Pt 1
- Three-column CSS Page Layout Pt 2
- Three-column CSS Page Layout Pt 3
- Three-column CSS Page Layout Pt 4
- Three-column CSS Page Layout Pt 5
- Three-column CSS Page Layout Pt 6
- CSS Styling for Print
- Designing for the Mobile Web
- Viewport Meta Tag & CSS Media Queries
- Responsive Images
- Testing Mobile Display
- Flexible Box Layout
- CSS Grid Layout
Module 8: Tables
- Tables Pt 1
- Tables Pt 2
Module 9: Forms
- Overview of Forms
- Input Element Form Controls Pt 1
- Input Element Form Controls Pt 2
- HTML5 Form Controls
Module 10: Web Development
- Web Development Pt 1
- Web Development Pt 2
Module 11: Web Multimedia and Interactvity
- Web Multimedia and Interactivity
- Getting Started with Audio and Video
- HTML5 Audio and Video Elements
- CSS3 and Interactivity Pt 1
- CSS3 and Interactivity Pt 2
- CSS3 Transform Property and Transition Property Pt 1
- CSS3 Transform Property and Transition Property Pt 2
- CSS3 Transform Property and Transition Property Pt 3
- HTML5 Details and Summary Elements
- Java, JavaScript, Ajax, and jQuery Programming Languages
- HTML5 APIs
Module 12: JavaScript and jQuery
- JavaScript and jQuery
- Debugging
- Document Object Model
- Events and Event Handlers
- Variables
- Programming Concepts
- Form Handling
- jQuery
- jQuery Selectors and jQuery Methods
- jQuery Image Gallery Pt 1
- jQuery Image Gallery Pt 2
- jQuery Plugins Pt 1
- jQuery Plugins Pt 2
Module 13: Course Summary
- Course Summary
Certified Cloud Security Professional - CCSP Course Content
Cloud Concepts, Architecture and Design
- Course Intro
- Cloud Concepts, Architecture and Design - Part 1
- Cloud Concepts, Architecture and Design - Part 2
- Cloud Concepts, Architecture and Design - Part 3
- Cloud Concepts, Architecture and Design - Part 4
- Cloud Concepts, Architecture and Design - Part 5
- Cloud Concepts, Architecture and Design - Part 6
- Cloud Concepts, Architecture and Design - Part 7
- Cloud Concepts, Architecture and Design - Part 8
- Cloud Concepts, Architecture and Design - Part 9
Legal, Risk and Compliance
- Legal, Risk and Compliance Part 1
- Legal, Risk and Compliance Part 2
- Legal, Risk and Compliance Part 3
- Legal, Risk and Compliance Part 4
- Legal, Risk and Compliance Part 5
- Legal, Risk and Compliance Part 6
- Legal, Risk and Compliance Part 7
Cloud Data Security
- Cloud Data Security - Part 1
- Cloud Data Security - Part 2
- Cloud Data Security - Part 3
- Cloud Data Security - Part 4
- Cloud Data Security - Part 5
- Cloud Data Security - Part 6
- Cloud Data Security - Part 7
Cloud Platform and Infrastructure Security
- Cloud Platform and Infrastructure Security - Part 1
- Cloud Platform and Infrastructure Security - Part 2
- Cloud Platform and Infrastructure Security - Part 3
- Cloud Platform and Infrastructure Security - Part 4
- Cloud Platform and Infrastructure Security - Part 5
- Cloud Platform and Infrastructure Security - Part 6
- Cloud Platform and Infrastructure Security - Part 7
- Cloud Platform and Infrastructure Security - Part 8
Cloud Application Security
- Cloud Application Security - Part 1
- Cloud Application Security - Part 2
- Cloud Application Security - Part 3
- Cloud Application Security - Part 4
- Cloud Application Security - Part 5
- Cloud Application Security - Part 6
- Cloud Application Security - Part 7
- Cloud Application Security - Part 8
- Cloud Application Security - Part 9
Cloud Security Operations
- Cloud Security Operations - Part 1
- Cloud Security Operations - Part 2
- Cloud Security Operations - Part 3
- Cloud Security Operations - Part 4
- Cloud Security Operations - Part 5
- Cloud Security Operations - Part 6
- Cloud Security Operations - Part 7
- Cloud Security Operations - Part 8
- Cloud Security Operations - Part 9
- Cloud Security Operations - Part 10
- Cloud Security Operations - Part 11
- Course Outro
Cisco 200-301: Cisco Certified Network Associate (CCNA) Course Content
Module 1: Exploring the Functions of Networking
- Course Introduction
- Instructor Introduction
- Exploring the Functions of Networking Pt 1
- Exploring the Functions of Networking Pt 2
Module 2: Introducing the Host-To-Host Communications Model
- Introducing the Host-To-Host Communications Model Pt 1
- Introducing the Host-To-Host Communications Model Pt 2
Module 3: Introducing LANs
- Introducing LANs
- Get Started with CLI Demo Pt 1
- Get Started with CLI Pt Demo 2
- Adding Descriptions to Interfaces Demo
- Configure Gateway on a Switch Demo
- Visualize Interfaces and Statistics Demo
- Show Version Command Demo
- CDP Demo
Module 4: Exploring the TCP/IP Link Layer
- Exploring the TCP-IP Link Layer Pt 1
- Exploring the TCP-IP Link Layer Pt 2
Module 5: Subnetting
- Subnetting Pt 1
- Subnetting Pt 2
- Subnetting Pt 3
- Subnetting Pt 4
- Subnetting Pt 5
- Subnetting Pt 6
Module 6: Explaining the TCP/IP Transport Layer and Application Layer
- Explaining the TCP-IP Transport Layer and Application Layer Pt 1
- Explaining the TCP-IP Transport Layer and Application Layer Pt 2
- Explaining the TCP-IP Transport Layer and Application Layer Pt 3
Module 7: Exploring the Functions of Routing
- Exploring the Functions of Routing Pt 1
- Exploring the Functions of Routing Pt 2
- Exploring the Functions of Routing Pt 3
- Configuring RIP Demo
- EIGRP Demo Pt 1
- EIGRP Demo Pt 2
Module 8: Exploring the Packet Delivery Process
- Exploring the Packet Delivery Process
Module 9: Troubleshooting a Simple Network
- Troubleshooting a Simple Network
Module 10: Introducing Basic IPv6
- Introducing Basic IPv6 Pt 1
- Introducing Basic IPv6 Pt 2
- Introducing Basic IPv6 Pt 3
- Introducing Basic IPv6 Pt 4
- Introducing Basic IPv6 Pt 5
- Introducing Basic IPv6 Pt 6
- Introducing Basic IPv6 Pt 7
- Introducing Basic IPv6 Pt 8
- IPV6 Basic Configuration and SLAAC Demo Pt 1
- IPV6 Basic Configuration and SLAAC Demo Pt 2
- IPV6 Routing Demo Pt 1
- IPV6 Routing Demo Pt 2
- IPV6 Static Routes Demo
Module 11: Configuring Static Routing
- Configuring Static Routing
- Static Routes Demo
Module 12: Implementing VLANs and Trunks
- Implementing VLANs and Trunks Pt 1
- Implementing VLANs and Trunks Pt 2
- Implementing VLANs and Trunks Pt 3
- Implementing VLANs and Trunks Pt 4
- Spanning-tree Protocol Demo Pt 1
- Spanning-tree Protocol Demo Pt 2
- Spanning-tree Protocol Demo Pt 3
Module 13: Routing Between VLANs
- Routing Between VLANs
- Inter VLAN Routing Demo
Module 14: Introducing OSPF
- Introducing OSPF Pt 1
- Introducing OSPF Pt 2
- Introducing OSPF Pt 3
- Introducing OSPF Pt 4
- OSPF Single Area Demo Pt 1
- OSPF Single Area Demo Pt 2
- OSPF Multiple Area Demo Pt 1
- OSPF Multiple Area Demo Pt 2
Module 15: Building Redundant Switched Topologies
- Building Redundant Switched Topologies Pt 1
- Building Redundant Switched Topologies Pt 2
Module 16: Improving Redundant Switched Topologies with EtherChannel
- Improving Redundant Switched Topologies with Ether Channel Pt 1
- Improving Redundant Switched Topologies with Ether Channel Pt 2
- Configuring Ether Channel Demo
Module 17: Exploring Layer 3 Redundancy
- Exploring Layer 3 Redundancy
Module 18: Introducing WAN Technologies
- Introducing WAN Technologies Pt 1
- Introducing WAN Technologies Pt 2
- Introducing WAN Technologies Pt 3
- Introducing WAN Technologies Pt 4
- Introducing WAN Technologies Pt 5
- Introducing WAN Technologies Pt 6
Module 19: Explaining Basics of ACL
- Explaining Basics of ACL Pt 1
- Explaining Basics of ACL Pt 2
- Explaining Basics of ACL Pt 3
Module 20: Enabling Internet Connectivity
- Enabling Internet Connectivity
- DHCP Demo
- Static NAT Demo
- PAT Using Specific IP Demo
- PAT Using IP of Interface Demo
Module 21: Introducing QoS
- Introducing QoS Pt 1
- Introducing QoS Pt 2
- Introducing QoS Pt 3
- Introducing QoS Pt 4
- Introducing QoS Pt 5
Module 22: Introducing Architectures and Virtualization
- Introducing Architectures and Virtualization Pt 1
- Introducing Architectures and Virtualization Pt 2
- Introducing Architectures and Virtualization Pt 3
- Introducing Architectures and Virtualization Pt 4
Module 23: Introducing System Monitoring
- Introducing System Monitoring Pt 1
- Introducing System Monitoring Pt 2
- Introducing System Monitoring Pt 3
Module 24: Managing Cisco Devices
- Managing Cisco Devices Pt 1
- Managing Cisco Devices Pt 2
- NTP Demo
- Syslog Demo
Module 25: Examining the Security Threat Landscape
- Examining the Security Threat Landscape Pt 1
- Examining the Security Threat Landscape Pt 2
Module 26: Implementing Threat Defense Technologies
- Implementing Threat Defense Technologies Pt 1
- Implementing Threat Defense Technologies Pt 2
- Implementing Threat Defense Technologies Pt 3
- Implementing Threat Defense Technologies Pt 4
- Implementing Threat Defense Technologies Pt 5
- Authentication Protocols Demo Pt 1
- Authentication Protocols Demo Pt 2
- Device Hardening Demo Pt 1
- Device Hardening Demo Pt 2
- Device Hardening Demo Pt 3
- Port Security Demo
Module 27: Exam Preparation
- Exam Prep Tips
Module 28: Practice Demos
- Get Started with CLI Demo Pt 1
- Get Started with CLI Pt Demo 2
- Adding Descriptions to Interfaces Demo
- Configure Gateway on a Switch Demo
- Visualize Interfaces and Statistics Demo
- Show Version Command Demo
- CDP Demo
- Static Routes Demo
- DHCP Demo
- Static NAT Demo
- PAT Using Specific IP Demo
- PAT Using IP of Interface Demo
- Configuring RIP Demo
- Configuring Ether Channel Demo
- Inter VLAN Routing Demo
- Spanning-tree Protocol Demo Pt 1
- Spanning-tree Protocol Demo Pt 2
- Spanning-tree Protocol Demo Pt 3
- EIGRP Demo Pt 1
- EIGRP Demo Pt 2
- Authentication Protocols Demo Pt 1
- Authentication Protocols Demo Pt 2
- NTP Demo
- Syslog Demo
- Device Hardening Demo Pt 1
- Device Hardening Demo Pt 2
- Device Hardening Demo Pt 3
- Port Security Demo
- OSPF Single Area Demo Pt 1
- OSPF Single Area Demo Pt 2
- OSPF Multiple Area Demo Pt 1
- OSPF Multiple Area Demo Pt 2
- IPV6 Basic Configuration and SLAAC Demo Pt 1
- IPV6 Basic Configuration and SLAAC Demo Pt 2
- IPV6 Routing Demo Pt 1
- IPV6 Routing Demo Pt 2
- IPV6 Static Routes Demo
Quickbooks Online Course Content
Module 1: Setup and Maintenance
- Module 1 Notes
- Course Introduction
- Knowing Which Account is Right for You
- Getting Started
- User Setup
- Access Rights
- User Setup Completion
- Adding Employees to Payroll
- Inviting Your Accountant
- Dashboard and 3 Ways to Navigate QBO
- Commonly Used Forms
- Module 1 Summary
Module 2: List Management
- Module 2 Notes
- Defining Lists
- Importing Lists
- Employees vs 1099
- Adding and Removing Entries
- Updating Entries
- Editing and Managing List Elements Demo
- Merging Items (entries)
- Form Requirements
- Module 2 Summary
Module 3: Sales (Money-In)
- Module 3 Notes
- Product and Service Setup
- Customer Setup Demo
- Invoicing Workflows
- Recording Sales
- Customer Statements
- Tracking Audit History Demo
- Sales Reciept Workflow
- Undeposited Funds Account
- Accounts Receivable Impact
- Impact of Connecting Your Bank Account to QBO
- Billable Expense Invoicing
- Recording a Customer Credit
- Delayed Charges
- Estimates
- Module 3 Summary
Module 4: Purchased (Money-Out)
- Module 4 Notes
- Product and Service Setup on Purchase Forms
- Vendor Setup
- Purchase Order Transactions
- Entering and Paying Bills
- Recording Checks
- Recording Credit and Debit Card Transactions
- Recording EFTs, Online Payments, and Wire Transfers
- Recording Vendor Credits
- Voiding vs Deleting Checks
- Vendor Page and Report Insights
- Module 4 Summary
Module 5: Accounting
- Module 5 Notes
- Basic financial statements (Balance sheet, income statement, and statement of cash flows)
- Financial Statements Expanded
- Cash and Accrual Accounting Differences
- Difference Between Cash and Accrual Reporting
- Setting a Closing Date
- Balancing Your Books aka Reconciling Demo
- Journal Entries
- Audit Log Insights
- Project Profitability Demo
- Module 5 Summary
Module 6: Reports
- Module 6 Notes
- Customized Reports
- Commonly Used Reports Demo
- Setup Automatic Report Emails
- Collapse and Expand Report Function
- Exporting and Importing Reports
- Module 6 Summary
Module 7: Customizations and Time Savers
- Module 7 Notes
- Tracking Income and Expenses for Multiple Locations
- Organizing your Chart of Accounts
- Custom Fields on Invoices
- Recurring Transactions
- Customizing a Sales Form
- Keyboard Shortcuts
- QBO Mobile App Preview
- Connecting Third Party Apps to QBO
- Module 7 Summary
Module 8: Extra
- Module 8 Notes
- Common Mistakes QBO Users Make
- Final Note on Bookkeeping Best Practices
- Why QBO is Awesome
- Course Outro
- Defining Terms and Sample Quiz Questions
Social Media Marketing Course Content
Module 1: Social Media Marketing
- Course Intro
- How to Utilize Social Media
- Client Briefs
- Target Markets
- Personas Pt 1
- Personas Pt 2
- Personas Pt 3
- Competitive Analysis Pt 1
- Competitive Analysis Pt 2
- Competitive Analysis Pt 3
Module 2: Social Media Marketing
- What is the Right Content for You
- Images Pt 1
- Images Pt 2
- Images Pt 3
- Images Pt 4
- Images Pt 5
- Video Pt 1
- Video Pt 2
- Video Pt 3
- Video Pt 4
- Live Videos and Engagement Pt 1
- Live Videos and Engagement Pt 2
Module 3: Social Media Marketing
- What are Analytics and How to Use Them
- Free Analytic Tools Available
- Paid Services to Consider Pt 1
- Paid Services to Consider Pt 2
- Finding the Right Hashtags
- What is Automation
- How to Best Use Automation
- Course Outro
Implementing Online Learning Course Content
Module 1: Online Learning
- Module 1 Notes
- Course Introduction
- History of Online Learning
- What is Online Learning and Different Types
- Introduction to Synchronous and Asynchronous Learning
- Introduction to Bringing Your Class Online
- Synchronous and Asynchronous Formats
- Hybrid and Enhanced Formats
- Tips for Any Format Part 1
- Tips for Any Format Part 2
- Community of Inquiry Learning Model
- Popular Learning Management Systems
- LMS Discussion Forums
- LMS Announcements
- LMS Content Management and Uploading
- LMS Grading and Feedback
- LMS Integration with Outside Applications
- Moving to Online Teaching
- Segmentation within Online Courses
- Time Limitations in Traditional Teaching vs Online
- Discussions and Engagement In-person vs Online
- Changes and Variances in Online Teaching vs Traditional Teaching
- Attendance in Online Courses
- Deadlines in Online Courses
- Feedback Online
- Tips and Best Practices for Online Teaching
Module 2: Online Learning
- Module 2 Notes
- Creating Structure with Modules
- Example of Module Course Structure within Canvas
- Types of Resources
- Zoom
- Flipgrid
- Slack
- Ziteboard
- Screencastify
- Microsoft Teams
- Google Classroom
- Otter
- edpuzzle
- Best Tips and Practices for Lecturing Online Pt 1
- Best Tips and Practices for Lecturing Online Pt 2
- Best Tips and Practices for Grading Online Pt 1
- Best Tips and Practices for Grading Online Pt 2
- Best Tips and Practices for Online Office Hours and Feedback
- Best Tips and Practices for Online Testing and Study Guides Pt 1
- Best Tips and Practices for Online Testing and Study Guides Pt 2
- Course Outro
Adobe Audition Course Content
Module 1: Getting Started
- 1.1 Instructor Introduction
- 1.2 Course Introduction
Module 2: Getting to Know Adobe Audition
- 2.1 Setting Up Your Workspace and Using Shortcuts
Module 3: The Interface
- 3.1 Setting Up and Adjusting Your Workspace
- 3.3 Navigating the Media Browser
- 3.4 Create a Short Cut to Media and Basic Dive into the Editor Panel
Module 4: Waveform Editing
- 4.1 Opening Audio and Video Files
- 4.2 Making a Basic Adjustment in the HUD
- 4.3 Skipping and Deleting Unwanted Portions of Audio
- 4.4 Quickly Insert Silence into an Audio Track
- 4.5 Using the Zero Crossing Tool to Remove Pops in Audio
- 4.6 Cut, Copy and Paste Phrases and Use Multiple Clipboards
- 4.7 Merge Sections of Audio with Mix Paste
- 4.8 Create a Loop
- 4.9 Add an Audio Fade
Module 5: Effects
- 5.1 Working With Effects
- 5.2 Gain Staging
- 5.3 Applying the Effect
- 5.4 Amplitude and Compression
- 5.5 Delay and Echo Effects
- 5.6 Filter and EQ Effects
- 5.7 Modulation Effects
- 5.8 Reverb Effects
- 5.9 Special Effects
- 5.10 Stereo Imagery Effects
- 5.11 Time and Pitch Effects
- 5.12 Audio Plugin Manager and Effects Menu vs Effects Rack
- 5.13 Invert, Reverse, Silence and Generate Effects
- 5.14 Match Loudness and Additional Effects
- 5.15 Create Effect Presets and Favorites
Module 6: Audio Restoration
- 6.1 Hiss Reduction
- 6.2 Crackle, Pop and Click Reduction
- 6.3 Broadband Noise Reduction
- 6.4 Hum Reduction
- 6.5 Removing Artifacts Manually
- 6.6 Automated Sound Removal
Module 7: Mastering
- 7.1 Parametric Equalizer and Equalization
- 7.2 Multi Band Compressor and Dynamic Processing
- 7.3 Reverb and Ambience
- 7.4 Stereo Imaging
- 7.5 Diagnostic Tools and Metering
Module 8: Sound Design
- 8.1 Generate Noise and Tones
- 8.2 Generate Speech Based on Text
- 8.3 Use a Sound File to Create Various Sound Effects Pt 1
- 8.4 Use a Sound File to Create Various Sound Effects Pt 2
- 8.5 Extracting Frequency Bands with the Frequency Band Splitter
Module 9: Creating and Recording Files
- 9.1 Create a Project and Record Into the Waveform Editor
- 9.2 Recording Into the MultiTrack Editor
- 9.3 Check Remaining Free Space for Recording on Hard Drive
- 9.4 Dragging Files Into Audition Directly From a Computer
- 9.5 Import Tracks from a CD
Module 10: Multitrack Sessions
- 10.1 Create a Multitrack session and Template
- 10.2 Multitrack and Waveform Editor Integration
- 10.3 Change Track Colors and Tracks Panel
- 10.4 Track Controls and Creating Busses
- 10.5 Channel Mapping in the Multitrack Editor
- 10.6 Multitrack Editor Effects Rack
Module 11: Multitrack Session Editing
- 11.1 Create a Session, Add Clips and Adjust Timing
- 11.2 Mix Down Session Into a New Audio Track
- 11.3 Adjusting the Timing of a Clip to Match a Specific Range of Time
- 11.4 Clip Editing Techniques and Effects
Module 12: Additional Features and Summary
- 12.1 Advanced Features to Consider and Conclusion
Adobe CC After Effects Course Content
Module 1: Getting Started
- 1.1 Course Introduction
- 1.2 Keyboard Shortcuts
- 1.3 Keyboard Tips
- 1.4 Things to Do Before Starting
Module 2: Getting to Know the Workflow
- Practice Files 1
- Practice Files 2
- 2.1 General Interface and Starting a Project
- 2.2 Basic Title Animation Using Keyframes
- 2.3 Keyframe Interpolation and Keyframe Assistan
- 2.4 Renaming a Composition
- 2.5 Soloing a Layer for Individual Edits
- 2.6 Interface Continued: Tool bar, Timeline panel, Preferences, Workspaces
- 2.7 Render and Export
Module 3: Creating a Basic Animation Using Effects and Presets
- Practice Files 3
- 3.1 Importing Files from Bridge and Creating a New Composition
- 3.2 Horizontal Type Tool and Guides
- 3.3 Controls, Effects and Presets for Titles and Logos
Module 4: Animating Text
- Practice Files 4
- 4.1 Create and Stylize a Text Layer With the Characters and Paragraph Panels
- 4.2 Preview and Apply Text Animation Presets and Use Keyframes
- 4.3 Animate Layers Using Parenting
- 4.4 Editing and Animating Imported Photoshop Text
- 4.5 Install Fonts Using Adobe Fonts
Module 5: Working With Shape Layers
- Practice Files 5
- 5.1 Create and Customize a Shape with Shape Tool
- 5.2 Self Animating Shape with a Wiggle Path (green marker)
- 5.3 Create and Customize a Shape with Pen Tool
- 5.4 Snap Layers
- 5.5 Animating Shape Layers with Path Operations
- 5.6 Creating Nulls from Paths
Module 6: Animating a Multimedia Presentation
- Practice Files 6
- 6.1 Animate Multiple Layers Using Parenting
- 6.2 Precomposing Layers
- 6.3 Keyframing a Motion Path
- 6.4 Animating a Character to Create Movement
- 6.5 Animating Precomposed Layers with Effects
Module 7: Animating Photoshop Layers
- Practice Files 7
- 7.1 Animating Change in Light
- 7.2 Animating Birds Flying with a Track Mat
- 7.3 Animating Shadows and Using Corner Pin
- 7.4 Adding a Lens Flare Effect
- 7.5 Render Composition and Retime
- 7.6 Use the Graph Editor to Remap Time
Module 8: Working With Masks
- Practice Files 8
- 8.1 Setup a Basic Mask
- 8.2 Refine and Apply Mask
- 8.3 Creating a Reflection with a Mask and Blending Modes
- 8.4 Create a Vignette
Module 9: Distorting Objects with the Puppet Tools
- Practice Files 9
- 9.1 Puppet Position Pen Tool
- 9.2 Starch Pins
- 9.3 Manually Animate with Puppet Tool
- 9.4 Automate Animation Using Puppet Sketch Tool
Module 10: Using the Roto Brush Tool
- Practice Files 10
- 10.1 Extract Foreground Object from Background and Create a Mat
- 10.2 Touch Up a Mat with the Refine Edge Tool
- 10.3 Edit or Replace the Separated Background
Module 11: Performing Color Correction
- Practice Files 11
- 11.1 Set up Composition and Use Levels to Start Balancing the Color
- 11.2 Basic Color Grading with Lumetri Color Effects
- 11.3 Use Basic Masking, Tracking and Keying to Replace the Background
- 11.4 Use an Adjustment Layer to Create a Global Color Effect
- 11.5 Gaussian Blur Effect
Module 12: Creating Motion Graphics Templates
- Practice Files 12.1
- Practice Files 12.2
- Practice Files 12.3
- Practice Files 12.4
- 12.1 Add New Font with Adobe Fonts and Create a Title with Basic Effects
- 12.2 Using Adjustment Layers to Apply a Specific Effect
- 12.3 Use Essential Graphics Panel to Build Custom Controls and Share as a Template
- 12.4 Create Checkboxes to Toggle Visibility of a Background Image
- 12.5 Protect Portions of a Project from Time Stretching and Export Template
Adobe XD Course Content
Adobe XD: Module 1
- Instructor Into
- What is XD
- UI and UX Design
- Prototype Forms and Wireframes
- Starting a New Design in XD
- Assets and Character Styles
Adobe XD: Module 2
- Importing Content
- Responsive Resize and Changing Formats
- Adding Interactivity
- Animating Elements
- Sharing and Exporting
Adobe Spark Course Content
Adobe Spark: Module 1
- Instructor Intro
- Course Intro
- Web Based vs Mobile Device
- How to Access Spark
- Branding in Spark
Adobe Spark: Module 2
- Using Spark Post
- Uploading Content from Post for Exporting
- Using Spark Video
- Exporting Finished Videos
- Using Spark Page
- Putting Spark Pages on the Web
Adobe Premiere Rush Course Content
Adobe Premiere Rush: Module 1
- Instructor Intro
- Course Intro
- How Does Rush Differ
- Starting a New Project
- Video Resolution and Creating Content
- Finding and Importing Content
- Timeline Controls
- Importing Audio
Adobe Premiere Rush: Module 2
- Gernal Editing
- Advanced Editing
- Color Grading
- Adding Titles
- Principles of Typography in Video
- Fixing Audio
- Video and Audio Transitions
- Exporting Finished Projects
Adobe Dreamweaver Course Content
Adobe Dreamweaver: Module 1
- Instructor Intro
- Course Intro
- Getting Images Ready for the Web
- Setting Up Your Workspace
- Creating a New Site
Adobe Dreamweaver: Module 2
- Building Your First Web Pages pt.1
- Building Your First Web Pages pt.2
- Linking Your Web Pages
- Adding Colors and Style
- Creating a Page Visually in Photoshop
- Importing Into Dreamweaver
- Export Site to Web
Adobe Stock Course Content
Module 1 - Adobe Stock
- Instructor Info
- Course Info
- Interface and Features
- Images
- Videos and Licensing
- Templaes and Premium
- Contributing Content
- Best Practices when Contributing
Adobe Portfolio Course Content
Module 1 - Adobe Portfolio Website Editor
- Instructor Introduction
- Getting Started With Adobe Portfolio
- Creating A Website To Showcase Your Work
- Importing And Syncing From Adobe Lightroom
- Customizing Your Landing Page
Adobe Fonts Course Content
Module 1 - Adobe Fonts
- Instructor Intro
- Course Intro
- Navigating the Interface
- Activating and Deactivating Fonts
- Font Packs
- Type Kit Web Fonts
- Course Conclusion
Adobe Behance Course Content
Get Creative With Adobe Behance
- Instructor Introduction
- Adobe Behance Course Introduction
- Adobe Behance - A Creative, Collaborative Application
- Using The Profile page
- Creating A Project
- Exploring The Jobs Section
AWS - Introduction and Deep Dive Course Content
Module 1: Introduction to AWS Basics
- 1.1 Instructor Intro
- 1.2 AWS Basic Intro
- 1.3 What Is AWS
- 1.4 Advantages of cloud computing
- 1.5 Types of cloud computing
Module 2: AWS Web Services and Cloud Platform Services
- 2.1 Console
- 2.2 CLI
- 2.3 Compute/EC2
- 2.4 Database-RDS
- 2.5 Networking and content delivery
- 2.6 Analytics
- 2.7 SQS-SNS
- 2.8 Workmail
- 2.9 SES
- 2.10 Systems manager
- 2.11 CloudTrail
- 2.12 Route53
- 2.13 Elastic Load Balancing (ELB)
- 2.14 Certificate manager
- 2.15 Directory service
- 2.16 Amazon Simple Storage Service (S3)
- 2.17 Identity and Access Management (IAM)
Module 3: AWS Basic Summary
- 3.1 AWS Basic Summary
Module 4: Introduction to AWS Deep Dive
- 4.1 AWS Deep Dive Intro
Module 5: AWS Management of Services and Features Deep Dive
- 5.1 VPC and Endpoint services pt 1
- 5.1 VPC and Endpoint services pt 2
- 5.2 DNS (Route 53)
- 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 1
- 5.3 Elastic Load Balancing (ELB) & Certificate manager pt 2
- 5.4 Compute-EC2 Stand alone and SA with AR pt 1
- 5.4 Compute-EC2 Stand alone and SA with AR pt 2
- 5.5 ASG and Suspended ASG processes pt 1
- 5.5 ASG and Suspended ASG processes pt 2
- 5.6 Code deploy pt 1
- 5.6 Code deploy pt 2
- 5.7 Backups-Recovery of EC2 pt 1
- 5.7 Backups-Recovery of EC2 pt 2
- 5.7 Backups-Recovery of EC2 pt 3
- 5.8 RDS pt 1
- 5.8 RDS pt 2
- 5.8 RDS pt 3
- 5.9 Directory service
- 5.10 Identity and Access Management (IAM) pt 1
- 5.10 Identity and Access Management (IAM) pt 2
- 5.11 Amazon Simple Storage Service (S3)
- 5.12 SES
- 5.13 Cloudwatch
- 5.14 Cloudtrail
Module 6: AWS Deep Dive Summary
- 6.1 AWS Deep Dive Summary
Adobe InDesign 2021 Course Content
Module 1
- 1.1 Instructor Bio
- 1.2 Course Intro
Module 2
- 2.1 Creating a New Document
- 2.2 Importing Images and Understanding Links
- 2.3 Basic Tools and Navigating the Interface
- 2.4 Properties Panel
- 2.5 Creating Your Own Graphics within InDesign-
- 2.6 Working with Layers
Module 3
- 3.1 Color Theory
- 3.2 Adding and Altering Fills, Strokes, Colors and Gradients
Module 4
- 4.1 Pages Panel
- 4.2 Master Pages
Module 5
- 5.1 Typography Terms and Definitions
- 5.2 Creating Text + Character and Paragraph Formatting
- 5.3 Character and Paragraph Styles
- 5.4 Wrapping Text Around an Image
- 5.5 Working with Tables
Module 6
- 6.1 Saving, Preflight and Packaging Your Document
- 6.2 Exporting a PDF
Module 7
- 7.1 Principles of Design
Module 8
- 8.1 Letterheads
- 8.2 Business Card
- 8.3 Brochure
- 8.4 Multi-Page Binded Document
- 8.5 Print Booklet
Module 9
- 9.1 Creating a Template in InDesign
- 9.2 Using Step and Repeat
- 9.3 Grouping Objects
- 9.4 Island Spread & Page Tool-
- 9.5 Scripts
- 9.6 Object Styles
- 9.7 Content Collector & Content Placer
- 9.8 Gap Tool
- 9.9 Pathfinder Pallet
Module 10
- 10.1 Considerations When Working with Interactive Documents
- 10.2 Web Docs, Hyperlinks, Buttons and Rollovers
- 10.3 Creating Your Own Path
- 10.4 Exporting
Module 11
- 11.1 Outro
Introduction to Adobe Illustrator 2021 Course Content
Module 1: Introduction
- 1.1 Instructor Intro
- 1.2 Course Intro
Module 2: Getting Started
- 2.1 What are Vectors
- 2.2 Creating a New Document
- 2.3 Navigating the Interface
Module 3: Drawing
- 3.1 Drawing and Manipulating Primitive Shapes
- 3.2 Drawing Custom Shapes Part 1
- 3.2 Drawing Custom Shapes Part 2
- 3.2 Drawing Custom Shapes Part 3
- 3.3 Importing Images
- 3.4 Understanding Layers and Sublayers
- 3.5 Additional Drawing and Manipulation Tools
Module 4: Colors and Gradients
- 4.1 Color Theory
- 4.2 In-depth dive into Color Palette-
- 4.3 Creating Color Swatches
- 4.4 Creating and Manipulating Gradients Part 1
- 4.4 Creating and Manipulating Gradients part 2
- 4.4 Creating and Manipulating Gradients Part 3
Module 5: Intermediate Illustration
- 5.1 Appearance Palette
- 5.2 Pathfinder Palette
- 5.3 Drawing with Intent part 1
- 5.3 Drawing with Intent Part 2
- 5.4 Blending Modes & FX Part 1
- 5.4 Blending Modes & FX Part 2
Module 6: Typography
- 6.1. Introduction to Typography
- 6.2. Type Tools in Illustrator
- 6.3 Envelope Warp and Mesh
- 6.4 Breaking Text into Outlines
Module 7: Live Trace, Paint Brush and Blob Brush
- 7.1 Live Trace
- 7.2 Paint and Blob Brush
Module 8: Exporting
- 8.1 Difference Between File Formats and Exporting
- 8.2 Course Conclusion
Microsoft Excel 2019 Course Content
Module 1: Beginner
- 1.0 Intro
- 1.1 The Ribbon
- 1.2 Saving Files
- 1.3 Entering and Formatting Data
- 1.4 Printing from Excel & Using Page Layout View
- 1.5 Formulas Explained
- 1.6 Working with Formulas and Absolute References
- 1.7 Specifying and Using Named Range
- 1.8 Correct a Formula Error
- 1.9 What is a Function
- 1.10 Insert Function & Formula Builder
- 1.11 How to Use a Function- AUTOSUM, COUNT, AVERAGE
- 1.12 Create and Customize Charts
Module 2: Intermediate
- 2.0 Recap
- 2.1 Navigating and editing in two or more worksheets
- 2.2 View options - Split screen, view multiple windows
- 2.3 Moving or copying worksheets to another workbook
- 2.4 Create a link between two worksheets and workbooks
- 2.5 Creating summary worksheets
- 2.6 Freezing Cells
- 2.7 Add a hyperlink to another document
- 2.8 Filters
- 2.9 Grouping and ungrouping data
- 2.10 Creating and customizing all different kinds of charts
- 2.11 Adding graphics and using page layout to create visually appealing pages
- 2.12 Using Sparkline formatting
- 2.13 Converting tabular data to an Excel table
- 2.14 Using Structured References
- 2.15 Applying Data Validation to cells
- 2.16 Comments - Add, review, edit
- 2.17 Locating errors
Module 3: Advanced
- 3.1 Recap
- 3.2 Conditional (IF) functions
- 3.3 Nested condition formulas
- 3.4 Date and Time functions
- 3.5 Logical functions
- 3.6 Informational functions
- 3.7 VLOOKUP & HLOOKUP
- 3.8 Custom drop down lists
- 3.9 Create outline of data
- 3.10 Convert text to columns
- 3.11 Protecting the integrity of the data
- 3.12 What is it, how we use it and how to create a new rule
- 3.13 Clear conditional formatting & Themes
- 3.14 What is a Pivot Table and why do we want one
- 3.15 Create and modify data in a Pivot Table
- 3.16 Formatting and deleting a Pivot Table
- 3.17 Create and modify Pivot Charts
- 3.18 Customize Pivot Charts
- 3.19 Pivot Charts and Data Analysis
- 3.20 What is it and what do we use it for
- 3.21 Scenarios
- 3.22 Goal Seek
- 3.23 Running preinstalled Macros
- 3.24 Recording and assigning a new Macro
- 3.25 Save a Workbook to be Macro enabled
- 3.26 Create a simple Macro with Visual Basics for Applications (VBA)
- 3.27 Outro
Microsoft Word 2019 Course Content
Module 1: Beginner
- 1.01 Instructor Intro
- 1.02 Course Intro
- 1.1 Explaining the Ribbon
- 1.2 Creating a Document
- 1.3 Saving Files
- 1.4 Page Views
- 1.5 Formatting Text
- 1.6 Ruler, Margins and Tab Stops
- 1.7 Moving and Duplicating Text
- 1.8 Line Spacing and Paragraph Formatting
- 1.9 Basic Editing
- 1.10 Insert a Basic Table and Graphics
- 1.11 Working with Styles
Module 2: Intermediate
- 2.1 Intermediate Intro
- 2.2 Collaboration & Co-Authorship
- 2.3 Tracking and Viewing Changes
- 2.4 Commenting
- 2.5 Templates & Layouts
- 2.6 Layout Functions on the Ribbon
- 2.7 Customize, Format and Convert Tables and Use as a Page Layout
- 2.8 Insert and Edit a Cover Page
- 2.9 Insert and Customize Headers and Footers
- 2.10 Insert and Customize Endnotes and Footnotes
- 2.11 Creating Sections in a Long Document
- 2.12 Using Sections to Format a Document
- 2.13 Deleting a Section
- 2.14 Reviewing, Inserting and Updating TOC
- 2.15 Creating a Data Source and Linking a Mailing List
- 2.16 Print Settings for Mail Merge
Module 3: Advanced
- 3.1 Adding the Developer Tab
- 3.2 Functionality Among Microsoft Office Products
- 3.3 Using Formulas in Word
- 3.4 Citing Sources in Word
- 3.5 Reviewing and Merging Versions of the Same Document
- 3.6 Creating a Master Document
- 3.7 Creating Sub Documents and Editing Master and Sub Docs
- 3.8 Controlling Editable Content
- 3.9 Form Creation Using the Developer Tab
- 3.10 Macros
Adobe Premiere Pro Training Course Content
Module 1: Getting Started
- 1.0 Course Intro
- 1.1 Touring Adobe PP
- 1.1 Touring Adobe PP pt.2
- 1.2 Setting Up a Project
- 1.3 Importing Media
- 1.4 Organizing Media
- 1.5 Mastering the Essentials of Video Editing
- 1.6 Working with Clips and Markers
- 1.7 Adding Transitions
- 1.8 Multicamera Editing
- 1.9 Advanced Editing Techniques
Module 2: Motion, Sound, and More
- 2.1 Putting Clips in Motion
- 2.2 Editing and Mixing Audio
- 2.3 Sweetening Sound
- 2.4 Adding Video Effects
- 2.5 Basic Color Correction
- 2.6 Compositing Techniques
- 2.7 Creating Graphics
- 2.8 Exporting Frames, Clips and Sequences
Introduction to Adobe Photoshop Course Content
Module 1: Getting Started
- 1.1 Instructor Intro
- 1.1 Course Intro
- 1.2 Open Images
- 1.3 Get Familiar with Work Space
- 1.4 Zoom and Pan
- 1.5 Undo and Save Pt 1
- 1.5 Undo and Save Pt 2
- 1.6 Resize and Resolution
- 1.7 Crop and Straighten
- 1.8 Expand the Canvas
- 1.9 Basic Image Corrections
Module 2: Layers and More
- 2.1 Layer Basics
- 2.2 Resizing Layers
- 2.3 Adding Text and Images
- 2.4 Layer Styles
- 2.5 Photo Merge and Panoramic Images
- 2.6 Camera Raw
- 2.7 Camera Raw Continued and Adjustment Layers
- 2.8 Selection Basics
Module 3: Editing, Techniques and More
- 3.1 Raw File XMP
- 3.2 Masks
- 3.3 Puppet Warp and Alpha Channel
- 3.4 Typography
- 3.5 Vector Drawing Techniques
- 3.6 Advanced Compositing
ICD 10 & 11 Medical Coding and Billing Course Content
Module 1: Anatomy
- Module 1 Workbook
- 1.1 Introduction
- 1.2 Human Body
- 1.3 Skin
- 1.4 Bones, Muscles and Joints
- 1.5 Heart and Blood Vessels
- 1.6 Lungs
- 1.7 Stomach, Intestines and Colon
- 1.8 Kidney, Bladder, Prostate and More
- 1.9 Uterus, Ovaries and Female Parts
- 1.10 Eye
- 1.11 Glands
- 1.12 Ear, Nose and Throat
- 1.13 Blood
- 1.14 Immune
- 1.15 Brain and Spinal Cord
Module 2: Diagnosis Coding
- Module 2 Workbook
- 2.1 Overview of ICD
- 2.2 Outpatient Guidelines
- 2.3 Infectious and Parasitic
- 2.4 Neoplasms
- 2.5 Diseases of the Blood and Blood Organs
- 2.6 Endocrine, Nutritional and Metabolic Diseases
- 2.7 Mental and Behaviroal Health
- 2.8 Pregnancy, Childbirth and the Puerperium
- 2.9 Conditions Originating in Perinatal Period
- 2.10 Symptoms, Signs and Abnormal Clinical and Laboratory Findings
- 2.11 Injury, Poisoning and Certain Other External Causes
- 2.12 Diseases of the Skin and Subcutaneous Tissue
- 2.13 External Causes of Morbidity
- 2.14 Factors Influencing Health
- 2.15 Circulatory System
- 2.16 Eye
- 2.17 Respiratory
- 2.18 Digestive
Module 3: Procedure Coding
- Module 3 Workbook
- 3.1 Evaluation and Management part 1
- 3.1 Evaluation and Management part 2
- 3.1 Evaluation and Management part 3
- 3.1 Evaluation and Management part 4
- 3.2 Anesthesia
- 3.3 Modifiers
- 3.4 Surgery part 1
- 3.4 Surgery part 2
- 3.4 Surgery part 3
- 3.5 Radiology
- 3.6 Pathology
- 3.7 OB/GYN
- 3.8 Physical Medicine part 1
- 3.8 Physical Medicine part 2
- 3.9 HCPCS
- 3.10 Diving Into Coding part 1
- 3.10 Diving Into Coding part 2
- 3.10 Diving Into Coding part 3
- 3.11 NCCI, MUE and GME
- 3.12 CAT Codes
Module 4: Billing Guidelines and Practices
- Module 4 Workbook
- 4.1 HIPAA, Compliance and Reimbursement part 1
- 4.1 HIPAA, Compliance and Reimbursement part 2
- 4.1 HIPAA, Compliance and Reimbursement part 3
- 4.1 HIPAA, Compliance and Reimbursement part 4
- 4.2 The Next Steps
Microsoft AZ-203: Developing Solutions for Microsoft Azure Course Content
Module 1: Implement VM Solutions
- Intro
- Implement VM Solutions Pt 1
- Implement VM Solutions Pt 2
- Implement VM Solutions Pt 3
- Implement VM Solutions Pt 4
- Implement Batch Jobs Using AZ Batch Services
- Create Containerized Solutions Pt 1
- Create Containerized Solutions Pt 2
Module 2: Develop Azure Platform as a Service
- Develop Azure Platform as a Service (PaaS) Pt 1
- Develop Azure Platform as a Service (PaaS) Pt 2
- Develop Azure Platform as a Service (PaaS) Pt 3
- Develop Azure Platform as a Service (PaaS) Demo Pt 1
- Develop Azure Platform as a Service (PaaS) Demo Pt 2
- Create Azure App Service Mobile Apps
- Create Azure App Service API Apps
- Implement Azure Functions Pt 1
- Implement Azure Functions Pt 2
Module 3: Develop for Azure Storage
- Develop for Azure Storage Pt 1
- Develop for Azure Storage Pt 2
- Develop for Azure Storage Pt 3
- Develop Solutions that use Azure Cosmos DB Pt 1
- Develop Solutions that use Azure Cosmos DB Pt 2
- Develop Solutions that use Relational Database Pt 1
- Develop Solutions that use Relational Database Pt 2
- Develop Solutions that use Microsoft Blob Storage
Module 4: Implement Azure Security
- Implement Azure Security Pt 1
- Implement Azure Security Pt 2
- Implement Azure Security Pt 3
- Implementing Access Control Pt 1
- Implementing Access Control Pt 2
- Implementing Secure Data Solutions
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
- Develop for Code Scalability
- Instrument Solutions to Support Monitoring and Logging
- Integrate Caching and Content Delivery Pt 1
- Integrate Caching and Content Delivery Pt 2
Module 6: Connect to and Consume Azure and Third Party Services
- Connect to and Consume Azure and Third Party Services Pt 1
- Connect to and Consume Azure and Third Party Services Pt 2
- Working with Azure Search
- Azure API Management
- Develop Event Based Solutions Pt 1
- Develop Event Based Solutions Pt 2
- Develop Message Based Solutions Pt 1
- Develop Message Based Solutions Pt 2
- Outro
Adobe Lightroom Course Content
Module 1: Adobe Lightroom Overview
- Instructor Introduction
- Preparing To Use Adobe Lightroom
Module 2: Adobe Lightroom Use Case
- Non-Destructive Photo Editor
Module 3: Lightroom Library and Organization
- Lightroom Library And Organization Part 1
- Lightroom Library And Organization Part 2
- Lightroom Library And Organization Part 3
- Lightroom Library And Organization Part 4
Module 4: Editing Your Photo - Global Adjustments
- Edit Your Photo - Global Adjustments Part 1
- Edit Your Photo - Global Adjustments Part 2
- Edit Your Photo - Global Adjustments Part 3
- Edit Your Photo - Global Adjustments Part 4
- Edit Your Photo - Global Adjustments Part 5
- Edit Your Photo - Global Adjustments Part 6
- Edit Your Photo - Global Adjustments Part 7
- Edit Your Photo - Global Adjustments Part 8
- Edit Your Photo - Global Adjustments Part 9
- Edit Your Photo - Global Adjustments Part 10
- Edit Your Photo - Global Adjustments Part 11
Module 5: Edit Your Photo - Local Adjustments
- Edit Your Photo - Local Adjustments Part 1
- Edit Your Photo - Local Adjustments Part 2
- Edit Your Photo - Local Adjustments Part 3
- Edit Your Photo - Local Adjustments Part 4
- Edit Your Photo - Local Adjustments Part 5
- Edit Your Photo - Local Adjustments Part 6
Module 6: Saving and Exporting Your Photo In Lightroom Classic
- Exploring All Saving And Exporting Options
Module 7: Lightroom CC - A Cloud Based Version
- How to Launch And Work Within Lightroom CC
Module 8: Course Closeout
- Instructor Course Wrap Up
Digital Photography Introduction Course Content
Module 1: Intro
- Intro
Module 2: Camera Anatomy
- Camera Anatomy
- Camera Anatomy 2
Module 3: Scene Camera Modes
- Scene Camera Modules
Module 4: Achieve Exposure
- Achieve Exposure
- Achieve Exposure 2
Module 5: Filetypes
- Filetypes
Module 6: Sensor
- Sensor
Module 7: Resolution
- Resolution
Module 8: White Balance
- White Balance
- White Balance 2
Module 9: Color Theory
- Color Theory
Module 10: Depth of Field
- Depth of Field
Module 11: Focusing
- Focusing
Module 12: Lighting
- Lighting
- Lighting 2
Module 13: Metering
- Metering
Module 14: Composition
- Composition
VMWare vSphere 6.7 Fundamentals Course Content
Chapter 1: Course Introduction and Methodology
- 1.1
- 1.2
- 1.3
Chapter 2: Virtualization Overview
- 2.1
- 2.2
Chapter 3: Planning and Installing ESXi
- 3.1
- 3.2
- 3.3
- 3.4
- 3.5
- 3.6
- 3.7
Chapter 4: Using tools to Administer a VMware Environment
- 4.1
- 4.2
- 4.3
Chapter 5: vCenter and Licensing
- 5.1
- 5.2
- 5.3
- 5.4
- 5.5
- 5.6
- 5.7
Chapter 6: Configuring Networking
- 6.1
- 6.2
- 6.3
Chapter 7: Configuring Storage
- 7.1
- 7.2
- 7.3
- 7.4
- 7.5
- 7.6
Chapter 8: VM Creation, Configuration, and Snapshots
- 8.1
- 8.2
- 8.3
- 8.4
- 8.5
- 8.6
- 8.7
- 8.8
- 8.9
Chapter 9: Security and Permissions
- 9.1a
- 9.1b
- 9.1c
- 9.2
- 9.3
- 9.4
Chapter 10: Host and VM Monitoring
- 10.1
- 10.2a
- 10.2b
- 10.3
- 10.4
- 10.5
- 10.6
Chapter 11: Advanced ESXi and vCenter Server Management
- 11.1
- 11.2
- 11.3
- 11.4
- 11.5
- 11.6
Chapter 12: Patching and Upgrading ESXi
- 12.1a
- 12.1b
- 12.2a
- 12.2b
Chapter 13: Disaster Recovery and Backup
- 13.1
- 13.2
- 13.3
- 13.4
Introduction to Python Course Content
Module 1: Getting Started with Python
- Module 1 File
- Intro to Course and Instructor
- Getting Started with Python
Module 2: Working with Primitive Data Types
- Module 2 File
- Working with Primitive Data Types
- Working with Primitive Data Types Part 2
- Working with Primitive Data Types Part 3
- Working with Primitive Data Types Part4
- Working with Primitive Data Types Part4 Answers
Module 3: Working with Multiple Assignments Statements
- Module 3 File
- Working with Multiple Assignments Statements
Module 4: Convert Types in Python
- Module 4 File
- Convert Types in Python
Module 5: Creating Lists
- Module 5 File
- Creating Lists
Module 6: Modifying Lists
- Module 6 Notes
- Modifying Lists
Module 7: Sorting and Reversing Lists
- Module 7 File
- Sorting and Reversing Lists
Module 8: Slicing Lists
- Module 8 File
- Slicing Lists
Module 9: Working With Operators
- Module 9 File
- Working With Operators
- Working With Operators Part2
- Working With Operators Part3
Module 10: Determining Operator Precedence
- Module 10 File
- Determining Operator Precedence
Module 11: Working with IF Statements
- Module 11 File
- Working with IF Statements
Module 12: Working With For Loops
- Module 12 File
- Working With For Loops
Module 13: Working With While Loops
- Module 13 File
- Working With While Loops
Module 14: Nesting for Loops
- Module 14 File
- Nesting for Loops
Module 15: Reading Files
- Module 15 File
- Reading Files Part1
- Reading Files Part2
Module 16: More on Files
- Module 16 File
- More on Files
Module 17: Merging Emails
- Module 17 File
- Merging Emails
Module 18: Reading Console Inputs and Formatting Outputs
- Module 18 File
- Reading Console Inputs and Formatting Outputs
Module 19: Reading Command Line Argument
- Module 19 File
- Reading Command Line Argument
Module 20: Defining Functions
- Module 20 File
- Defining Functions
Module 21: Using Default Argument
- Module 21 File
- Using Default Argument
Module 22: Using Keyword and Positional Arguments
- Module 22 File
- Using Keyword and Positional Arguments
Module 23: Handling Exceptions
- Module 23 File
- Handling Exceptions
Module 24: Using Math and Random Modules
- Module 24 File
- Using Math and Random Modules
Module 25: Displaying Daytime Working Directory and File Metadata
- Module 25 File
- Displaying Daytime Working Directory and File Metadata
CompTIA FC0-U61: IT Fundamentals Course Content
Module 1 - IT Concepts and Terminology
- Module 1 Notes
- 0.1 Instructor Intro
- 1.1 Compare and Contrast Notational Systems
- 1.1 Compare and Contrast Notational Systems Demo
- 1.2 Compare and Contrast Fundamentals Data Types and Their Characteristics
- 1.3 Illustrate the Basics of Computing and Processing
- 1.4 Explain the Value of Data and Information
- 1.5 Compare and Contrast Common Units of Measures
- 1.5 Compare and Contrast Common Units of Measures Demo
- 1.6 Explain the Troubleshooting Methodology
Module 2 - Infrastructure
- Module 2 Notes
- 2.1 Classify Common Types of Input-Output Device Interfaces
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC
- 2.2 Given a scenario, set up & install Common Peripheral Devices to a PC Demo
- 2.3 Explain the Purpose of Common Internal Computing Components
- 2.4 Compare & Contrast Common Internet Service Types-
- 2.5 Compare & Contrast Storage Types
- 2.6 Compare & Contrast Common Computing Devices & Their Purposes
- 2.7 Explain Basic Networking Concepts
- 2.7 Explain Basic Networking Concepts Demo
- 2.7 Explain Basic Networking Concepts Part 2
- 2.7 Explain Basic Networking Concepts Part 3
- 2.7 Explain Basic Networking Concepts Part 4
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network
- 2.8 Given a scenario Install, Configure & Secure a Basic Wireless Network Demo
Module 3 - Applications and Software
- Module 3 Notes
- 3.1 Explain the Purpose of Operating Systems
- 3.1 Explain the Purpose of Operating Systems Demo
- 3.2 Compare & Contrast Components of an Operating System
- 3.2 Compare & Contrast Components of an Operating System Demo
- 3.3 Explain the Purpose & Proper Use of Software
- 3.4 Explain Methods of Application Architecture & Delivery Models
- 3.5 Given a Scenario Configure & Use Web Browsers
- 3.5 Given a Scenario Configure & Use Web Browsers FireFox
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Chrome
- 3.5 Given a Scenario Configure & Use Web Browsers Demo Edge
- 3.6 Compare & Contrast General Application Concepts & Uses
Module 4 - Software Development
- Module 4 Notes
- 4.1 Compare & Contrast Programming Language Categories-
- 4.2 Given a Scenario Use Programming Organizational Techniques & Interpret Logic-
- 4.3 Explain the Purpose & Use of Programming Concepts-
- 4.3 HTML Demo
Module 5 - Database Fundamentals
- Module 5 Notes
- 5.1 Explain Database Concepts and the Purpose of Databases
- 5.2 Compare and Contrast Various Database Structures
- 5.3 Summarize Methods Used to Interface with Databases
- 5.3 Summarize Methods Used to Interface with Databases Demo
Module 6 - Security
- Module 6 Notes
- 6.1 Summarize Confidentiality, Integrity, and Availability Concerns
- 6.2 Explain Methods to Secure Devices and Best Practices
- 6.3 Summarize Behavioral Security Concepts
- 6.4 Compare & Contrast Authentication, Authorization, Accounting, & Repudiation Concepts
- 6.5 Explain Password Best Practices
- 6.6 Explain Common Uses of Encryption
- 6.7 Explain Business Continuity Concepts
- 6.8 Takeaways-
- 6.9 ITF Fundamentals Conclusion
Microsoft 98-365 MTA Windows Server 2016 Administration Course Content
Module 1 Introducing Windows Server 2016
- Module 1 Notes
- 1. Windows Server 2016 Fundamentals Intro
- 2. Mod 1 Introducing Windows Server 2016
- 3. Mod 1a Introducing Windows Server 2016
Module 2 Managing Windows Server 2016
- Module 2 Notes
- 4. Mod 2 Managing Windows Server 2016
- 5. Mod 2a Managing Windows Server 2016
Module 3 Managing Storage
- Module 3 Notes
- 6. Mod 3 Managing Storage
- 7. Mod 3a Managing Storage
Module 4 Monitoring and Troubleshooting Servers
- Module 4 Notes
- 8. Mod 4 Monitoring and Troubleshooting Servers
- 9. Mod 4a Monitoring and Troubleshooting Servers
Module 5 Essential Services
- Module 5 Notes
- 10. Mod 5 Essential Services
- 11. Mod 5a Essential Services
Module 6 Understanding File and Print Services
- Module 6 Notes
- 12. Mod 6 Understanding File and Print Services
Module 7 Windows Network Services and Applications
- Module 7 Notes
- 13. Mod 7 Windows Network Services and Applications-
- 14. Mod 7a Windows Network Services and Applications-
Mod 8 Key Takeaways
- Key Takeaway Notes
- 15. Key takeaways Intro
- 16. Key takeaways - Module 1 Introducing Windows Server 2016
- 17. Key takeaways - Module 2 Managing Windows Server 2016
- 18 Key takeaways - Module 3 Storing Data in Windows Server 2016
- 19. Key takeaways - Module 4 Monitoring and Troubleshooting Servers
- 20. Key takeaways - Module 5 Essential Services
- 21. Key takeaways - Module 6 Understanding File and Print Services
- 22. Key takeaways - Module 7 Windows Network Services and Applications
Mod 9 Terms to Know
- Terms to Know Notes
- 23. Terms to Know Intro
- 24. Terms to Know - Module 1 Introducing Windows Server 2016
- 25. Terms to Know - Module 2 Managing Windows Server 2016
- 26 Terms to Know - Module 3 Storing Data in Windows Server 2016
- 27. Terms to Know - Module 4 Monitoring and Troubleshooting Servers
- 28. Terms to Know - Module 5 Essential Services
- 29. Terms to Know - Module 6 Understanding File and Print Services
- 30. Terms to Know - Module 7 Windows Network Services and Applications
Mod 10 Hands on Labs
- Hands on Labs Setup Notes
- 01 MTA 98-365 Windows Server 2016 Administration Fundamentals Lab setup
- 02 Step by Step Install VMware Player 15 in Windows 10 1
- 03 Installing and Configuring DC1 Virtual Machine
- 04 Installing and Configuring SRV-1 Virtual Machine
- 05 Installing and Configuring Client 1 Virtual Machine
- 06 Installing and Configuring the Router Virtual Machine
- 07 Creating and Configuring SRV-2 Virtual Machine
- 08 Working with Windows Server 2016 Desktop Experience
- 09 Managing Organizational Units and Groups in AD DS
Microsoft 98-367 MTA Security Fundamentals Course Content
Module 1 Understanding Security Layers
- Module 1 Notes
- 1.0 Security Fundamentals Instructor
- 1.1 Security Fundamentals Intro
- 1.2 Understanding Security Layers Part1
- 1.3 Understanding Security Layers Part2
Module 2 Authentication, Authorization, and Accounting
- Module 2 Notes
- 2.0 Authentication, Authorization & Accounting Part1
- 2.1 Authentication, Authorization & Accounting Part2
- 2.2 Authentication, Authorization & Accounting Demo
Module 3 Understanding Security Policies
- Module 3 Notes
- 3.0 Understanding Security Policies
Module 4 Understanding Network Security
- Module 4 Notes
- 4.0 Understanding Network Security Part1
- 4.1 Understanding Network Security Part2
Module 5 Locking Down Server and Client
- Module 5 Notes
- 5.0 Locking Down the Server and Client
- 5.1 Locking Down the Server and Client Part2
Module 6 Key Takeaways
- Key Takeaway Notes
- 6.0 Key Take Aways Intro
- 6.1 Understanding Security Layers
- 6.2 Authentication Authorization and Accounting
- 6.3 Understanding Security Policies
- 6.4 Understanding Network Security
- 6.5 Security Fundamentals Part 2
Module 7 Terms to Know
- Terms to Know Notes
- 7.0 Terms to Know Intro
- 7.1 Understanding Security Layers Terms
- 7.2 Authentication Authorization and Accounting Terms
- 7.3 Understanding Security Policies Terms
- 7.4 Understanding Network Security Terms
- 7.5 Locking Down Server and Client Terms
Microsoft 98-366 MTA Networking Fundamentals Course Content
Module 1 Understanding Local Area Networking
- Module 1 Notes
- 1.0 Intro to Networking Fundamentals
- 1.1 Exam Overview
- 1.1 Examining Local Network Devices and Data Transfers 1a
- 1.1 Examining Local Network Devices and Data Transfers 1b
- 1.1 Examining Local Network Devices and Data Transfers 1c
- 1.1 Examining Local Network Devices and Data Transfers 1d
- 1.1 Examining Local Network Devices and Data Transfers 1e
- 1.1 Examining Local Network Devices and Data Transfers 1f
- 1.2 Examining Local Network Devices and Data Transfers Part 2a
- 1.2 Examining Local Network Devices and Data Transfers Part 2b
Module 2 Defining Networks with the OSI Model
- Module 2 Notes
- 2.1 Defining Networks with OSI Model Part 1a
- 2.2 Defining Networks with OSI Model Part 1b
- 2.3 Defining Networks with OSI Model Part 1c
- 2.4 Defining Networks with OSI Model Part 1d
- 2.5 Defining Networks with OSI Model Part 1e
- 2.6 Defining Networks with OSI Model Part 1f
- 2.7 Defining Networks with OSI Model Part 1g
- 2.8 Defining Networks with OSI Model Part 1h
Module 3 Understanding Wired and Wireless Networks
- Module 3 Notes
- 3.1 Understand Wired and Wireless Networks Part1
- 3.2 Understand Wired and Wireless Networks Part2
Module 4 Understanding Internet Protocol
- Module 4 Notes
- 4.1 Understanding Internet Protocol Part1
- 4.2 Understanding Internet Protocol Part2
Module 5 Implementing TCP-IP in the command line
- Module 5 Notes
- 5.1 Implementing TCPIP in the Command Line
Module 6 Working with Networking Services
- Module 6 Notes
- 6.1 Working with Networking Services
Module 7 Understanding Wide Area Networks
- Module 7 Notes
- 7.1 Understanding Wide Area Network Part1
- 7.2 Understanding Wide Area Network Part2
Module 8 Defining Network Infrastructure and Security
- Module 8 Notes
- 8.1 Defining Network Infrastructure & Network Security Part1
- 8.2 Defining Network Infrastructure & Network Security Part2
Module 9 Key Takeaways
- Key Takeaway Notes
- 1. Key Take Aways of Networking Fundamentals
- 2. Key Take Aways Mod1
- 3. Key Take Aways Mod2
- 4. Key Take Aways Mod3
- 5. Key Take Aways Mod4
- 6. Key Take Aways Mod5
- 7. Key Take Aways Mod6
- 8. Key Take Aways Mod7
Module 10 Terms to Know
- Terms to Know Notes
- 1. Terms to Know Networking Fundamentals
- 2. Terms to Know Mod1
- 3. Terms to Know Mod2
- 4. Terms to Know Mod3
- 5. Terms to Know Mod4
- 6. Terms to Know Mod5
- 7. Terms to Know Mod6
- 8. Terms to Know Mod7
- 9. Terms to Know Mod8
CompTIA A+ 220-1002 (Core 2) Course Content
Module 1 - Operating Systems
- Module 1 Workbook
- 0.1 Intro to A+ Core2 Instructor
- 1.0 Intro to A+ Core2
- 1.1 Operating Systems Part1
- 1.1 Operating Systems Part2
- 1.2 Compare and Contrast features of Microsoft Windows Versions
- 1.3 Summarize General OS Installation Considerations Upgrade Methods
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part2
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Part3
- 1.3 Summarize General OS Installation Considerations Upgrade Methods Demo
- 1.4 Scenario use appropriate Microsoft Command Line Tools Part1
- 1.4 Scenario use appropriate Microsoft Command Line Tools Part2
- 1.4 Scenario use appropriate Microsoft Command Line Tools Demo
- 1.5 Microsoft Operating System and Tools Part1
- 1.5 Microsoft Operating System and Tools Part1 Demo
- 1.5 Microsoft Operating System and Tools Part2
- 1.5 Microsoft Operating System and Tools Part2 Demo
- 1.5 Microsoft Operating System and Tools Part3
- 1.5 Microsoft Operating System and Tools Part3 Demo
- 1.5 Microsoft Operating System and Tools Part4
- 1.5 Microsoft Operating System and Tools Part4 Demo
- 1.6 Microsoft Windows Control Panel Utilities
- 1.6 Microsoft Windows Control Panel Utilities Demo
- 1.7 Summerize Application Installation and Configuration Concepts
- 1.8 Configure Windows Networking on a Client Desktop
- 1.8 Configure Windows Networking on a Client Desktop Demo
- 1.9 Features and Tools of MAC OS and Linux Client Desktop
Module 2 - Security
- Module 2 Workbook
- 2.1 Security - Physical Security Measures
- 2.2 Explain Logical Security Concepts
- 2.2 Explain Logical Security Concepts Part2
- 2.3 Compare, Contrast Wireless Security Protocols & Authentication Methods
- 2.4 Detect, Remove, and Prevent Malware using Appropriate Tools
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part1
- 2.5 Compare & Contrast Social Engineering, Threats, and Vulnerability Part2
- 2.6 Compare Contrast the different Microsoft Windows Security Settings
- 2.6 Compare Contrast the different Microsoft Windows Security Settings- Demo
- 2.7 Implement Security Best Practices to Secure a Workstation
- 2.7 Implement Security Best Practices to Secure a Workstation Part2
- 2.8 Implement Methods for Securing Mobile Devices
- 2.9 Implement Appropriate Data Destruction & Disposal Methods
- 2.10 Configure Security on SOHO Wireless and Wired Networks
- 2.10 Configure Security on SOHO Wireless and Wired Networks Demo
Module 3 - Software Troubleshooting
- Module 3 Workbook
- 3.1 Software Troubleshooting Part1
- 3.1 Software Troubleshooting Part2
- 3.1 Software Troubleshooting Demo
- 3.2 Troubleshoot and Resolve PC Security Issues
- 3.2 Troubleshoot and Resolve PC Security Issues Part2
- 3.2 Troubleshoot and Resolve PC Security Issues Demo
- 3.3 Best Practice Procedures for Malware Removal
- 3.4 Troubleshoot Mobile OS and Application
- 3.5 Troubleshoot Mobile OS and Application Security Issue
Module 4 - Operational Procedures
- Module 4 Workbook
- 4.1 Operational Procedures
- 4.2 Implement Basic Change Management Best Practices
- 4.3 Implement Basic Disaster Prevention and Recovery Methods
- 4.4 Explain Common Safety Procedures
- 4.5 Explain Environmental Impacts and Appropriate Controls
- 4.6 Explain Processes for Addressing Prohibited Content-Activity & Privacy Licensing Policy Concepts
- 4.7 Using Proper Communication Techniques and Professionalism
- 4.8 Identify the Basic of Scripting
- 4.8 Identify the Basic of Scripting Demo
- 4.9 Use Remote Access Technologies
CompTIA A+ 220-1001 (Core 1) Course Content
Module 1 - Mobile Devices
- Module 1 Workbook
- 0.1 Intro to A+ Core1 Instructor
- 1.0 CompTIA A+ Course Intro
- 1.1 Mobile Devices Part 1
- 1.1 Mobile Devices Part 2
- 1.1 Mobile Devices Part 3
- 1.2 Installing Components in Laptop
- 1.3 Laptop Features Part 1
- 1.3 Laptop Features Part 2
- 1.4 Compare and Contrast Types of Mobile Devices
- 1.5 Accessories and Ports of Other Mobile Devices Part 1
- 1.5 Accessories and Ports of Other Mobile Devices Part 2
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 1
- 1.6 Configure Basic Device Network Connectivity and Application Support Part 2
- 1.7 Use Methods to Perform Mobile Device Synchronization
- 1.8 Laptop Disassemble and Assemble
Module 2 - Networking
- Module 2 Workbook
- 2.1 Networking Part 1
- 2.1 Networking Part 2
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 1
- 2.2 Compare and Contrast Common Networking Hardware Devices Part 2
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 1
- 2.3 Install and Configure a Basic Wired or Wireless SOHO Network Part 2
- 2.3 Setting Up a Wireless Router
- 2.4 Compare and Contrast Wireless Networking Protocols
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 1
- 2.5 Summarize the Properties and Purposes of Services Provided by Network Hosts Part 2
- 2.6 Explain Common Network Configuration Concepts Part 1
- 2.6 Explain Common Network Configuration Concepts Part 2
- 2.7 Compare and Contrast Internet Connection Types Network Types and Features
- 2.8 Given a Scenario Using Appropriate Networking Tools
Module 3 - Hardware
- Module 3 Workbook
- 3.1 Hardware Part 1
- 3.1 Hardware Part 2
- 3.1 Hardware Part 3
- 3.2 Identify Common Connector Types
- 3.3 Scenario Install RAM Types
- 3.4 Scenario Select Install and Configure Storage Devices
- 3.4 Scenario Select Install and Configure Storage Devices Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 1
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 2
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 3
- 3.5 Install and Configure Motherboards CPUs and Add-on Cards Part 4
- 3.5 Install Disassemble and Assemble a Desktop
- 3.6 Purposes for Peripherals and Types
- 3.7 Summarize Power Supplies
- 3.8 Scenario Select and Configure Appropriate Components for Customers PCs
- 3.9 Scenario Installand Configure Common Devices
- 3.10 Scenario Configure SOHO Multifunction Devices Printers and Settings
- 3.11 Scenario Install and Maintain Various Print Technologies Part 1
- 3.11 Scenario Install and Maintain Various Print Technologies Part 2
- 3.11 Scenario Install and Maintain Various Print Technologies Part 3
Module 4 - Virtualization and Cloud Computing
- Module 4 Workbook
- 4.1 Virtualization Part 1
- 4.1 Virtualization Part 2
- 4.2 Scenario Setup and Configure Client-side Virtualization
Module 5 - Hardware and Network Troubleshooting
- Module 5 Workbook
- 5.1 Hardware and Networking Troubleshooting
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 1
- 5.2 Troubleshoot Problems Related to Motherboards RAM CPUs and Power Part 2
- 5.3 Troubleshoot Hard Drives and RAID Arrays
- 5.4 Troubleshoot Video and Display Issues
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 1
- 5.5 Troubleshoot Common Mobile Device Issues While Adhering to Appropriate Procedures Part 2
- 5.6 Troubleshoot Printers
- 5.7 Troubleshoot Common Wired and Wireless Network Problems
AGILE/XP Course Content
Module 1 : Agile Principles and Mindset
- Agile Introduction XP
- Agile Core Principles XP
- Lean Product Development XP
- Agile Leadership Tasks XP
- Agile Communications XP
Module 2 : Value Driven Delivery
- Value Driven Delivery XP
- Value Driven Delivery XP Part2
Module 3 : Stakeholder Engagement
- Stakeholder Engagement XP
- Facilitation Tools XP
Module 4 : Team Performance
- Team Performance XP
- Digital Tools for Distibuted Teams XP
Module 5 : Adaptive Planning
- Adaptive Planning XP
- Adaptive Planning Part2 XP
Module 6 : Problem Detection and Resolution
- Problem Detection and Resolution XP
Module 7 : Continuous Improvement
- Continuous Improvement XP
AGILE/Scrum Course Content
Module 1 : Agile Principles and Mindset
- Agile Introduction Scrum
- Agile Core Principles Scrum
- Lean Product Development Scrum
- Agile Leadership Tasks Scrum
- Agile Communications Scrum
Module 2 : Value Driven Delivery
- Value Driven Delivery Scrum
- Value Driven Delivery Scrum Part2
Module 3 : Stakeholder Engagement
- Stakeholder Engagement Scrum
- Facilitation Tools Scrum
Module 4 : Team Performance
- Team Performance Scrum
- Digital Tools for Distibuted Teams Scrum
Module 5 : Adaptive Planning
- Adaptive Planning Scrum
- Adaptive Planning Scrum Part2
Module 6 : Problem Detection and Resolution
- Problem Detection and Resolution Scrum
Module 7 : Continuous Improvement
- Continuous Improvement Scrum
Microsoft 70-698: Installing and Configuring Windows 10 Course Content
Module 1 : Prepare for installation requirements
- Module 1 Workbook
- Prep for Installation Windows 10
- Clean Install or Upgrade Windows 10
- Editions of Windows 10
- What Features Do You Want
- Installation Media
- Looking at MS Application Compatibility Toolkit (ACT)
Module 2 : Install Windows
- Module 2 Workbook
- Installing Windows
- Clean installation of Windows 10-Demo
- Upgrade using Installation Media
- Configure Native Boot and VHD
- Migrating to Windows 10
- Chp2 Booting from VHD
- Creating a VHD-Demo
- Installing Windows 10 to a VHD-Demo
- Installing on Bootable USB
- Using USMT User State Migration Tool-Demo
- Additional Windows Features
- Create an MBR-Partitioned VHD-Demo
- Additional Regional and Language Support
- Putting Win 10 on a VHD with DISM-Demo
Module 3 : Configure devices and device drivers
- Module 3 Workbook
- Configure Devices and Device Drivers
- Resolve Driver Issues
- Configuring Driver Settings
- Manage Driver Packages
- Download and Import Driver Packages
- Using DISM
- Installing o Updating Drivers using Device Manager-Demo
- Roll Back Drivers-Demo
- Using Sigverif-Demo
- More on Device Manager-Demo
Module 4 : Perform post-installation configuration
- Module 4 Workbook
- Perform Post Installation Configuration
- Configure Accessibilty Options
- Configure Cortana
- Configure Microsoft Edge
- Configure Internet Explorer
- Configure Client Hyper-V
- Configure Power Settings
- Customizing the Start Menu-Demo
- Start Tiles-Demo
- Desktop Customization-Demo
- Action Center and Notifications-Demo
- Hyper V-Demo
- Power Settings-Demo
Module 5 : Implement Windows in an enterprise environment
- Module 5 Workbook
- Implement Windows in an Enterprise Enviornment
- Implementing Active Directory
- Implement Volume Activation Using a Key Mgmt Service
- Query and Configure Activation State using Command line
- Configure Active Directory Including Group Policies
- Configure and Optimize User Account Control UAC
- Using Software Licensing Manager; slmgr.vbs -dli-Demo
- Taking a look at UAC-Demo
Module 6 : Configure networking
- Module 6 Workbook
- Configuring Networking
- Configuring Name Resolution
- Connect to a Network
- Configure Network Locations
- Configure Windows Firewall
- Configure Windows Firewall with Advance Security
- Configure Network Discovery
- Configuring Wi-Fi Settings
- Troubleshoot Network Issues
- Configure VPNs
- Configure IPsec
- Configure DirectAccess
- Configure IP Addresses Manually-Demo
- DNS Settings-Demo
- Looking at Network Locations and where to make Chpanges-Demo
- Windows Firewall – Basic Settings-Demo
- Windows Firewall – Advanced Settings-Demo
- Troubleshooting Tools-Demo
- Create a VPN Connection-Demo
Module 7 : Configure storage
- Configure Storage
- Create and Configure VHD
- Configure Removable Devices
- Create and Configure Storage Spaces
- Troubleshoot Storage and Removable Device Issue
- Steps to create a simple volume-Demo
- Create VHD with Hyper-V Manager-Demo
- Create VHD with PowerShell-Demo
- Bitlocker to Go-Demo
Module 8 : Configure data access and usage
- Module 8 Workbook
- Configure Data Access and Usage File-Printer
- Configure File System Permissions
- Configure File Share Public Folders and OneDrive
- Configure OneDrive usage including Files On Demand
- Troubleshoot Data Access and Usage
- File Sharing-Demo
- Printer Sharing-Demo
- Set Printer Security-Demo
- File system permissions-Demo
- Public Folder Sharing-Demo
- OneDrive-Demo
- Storage Sense-Demo
- Disk Quotas-Demo
Module 9 : Implement Apps
- Module 9 Workbook
- Implement Apps
- Configure Startup Options
- Configure Windows Features
- Configure Windows Stores
- Implementing Windows Store Apps
- Implement Windows Store for Business and Education
- Provison Packages
- Create Packages
- Chpange Default Apps-Demo
- Application Startup Options-Demo
- Looking at Windows Features-Demo
- Windows Store-Demo
- Windows Imaging and Configuration Designer Tool ICD-Demo
Module 10 : Configure remote management
- Module 10 Workbook
- Configuring Remote Management
- Configure Remote Management Settings
- Configure Remote Desktop
- Configure Remote Assistance
- Modifying Using MMC or PS
- Configure Remote PowerShell
- Remote Management Settings-Demo
- Allow through Windows Firewall-Demo
- Remote Desktop-Demo
- Remote Assistance-Demo
- Remote with MMC-Demo
- Windows PowerShell Remoting-Demo
Module 11 : Configure Updates
- Module 11 Workbook
- Configure Update Windows 10
- Manage Update History
- Roll Back Updates
- Implement Insider Preview CB CBB and LTSB
- Update Windows Store Apps
- Windows Update Options-Demo
- Update History-Demo
- Rolling Back Updates-Demo
- Update Windows Store apps-Demo
Module 12 : Monitor Windows
- Module 12 Workbook
- Monitor Windows
- Configure Event Subscriptions
- Monitor Performance Using Task Manager
- Monitor System
- Monitor and Manage Printers
- Monitor Performance Using Performance Monitor Data Collectors
- Monitor and Manage Printers
- Configure Indexing Options
- Manage Client Security by Using Windows Defender
- Evaluate System Stability by Using Reliaability Monitor
- Troubleshoot Performance Issues
- Manage Security Using Windows Defender Security Center
- Configure Windows Defender Advanced Threat Detection
- Event Viewer-Demo
- Creating Event Subscriptions-Demo
- Task Manager-Demo
- Performance Monitor-Demo
- Resource Monitor-Demo
- Managing the Printers with Print Management-Demo
- Indexing-Demo
- Windows Defender-Demo
- Reliability Monitor-Demo
Module 13 : Configure System and Data Recovery
- Module 13 Workbook
- Configure System and Data Recovery
- Configure System Restore
- Configure Restore Points
- Peform a Refresh or Recycle
- Restore Previous Versions of Files and Folders
- Configure File History
- Recover Files from OneDrive
- Use Windows Backup and Restore
- Perform a Backup and Restore with WBAdmin
- Perform Recovery Operations Windows Recovery
- Configure a Recovery Drive-Demo
- Configure System Restore-Demo
- Configure Restore Points-Demo
- Performing a Refresh or Recycle-Demo
- Configure File History-Demo
- Use Windows Backup & Restore-Demo
Module 14 : Configure Authorization and Authentication
- Module 14 Workbook
- Configure Authorization and Authentication
- Configure Pictures Passwords and Biometrics
- Configure Workgroups
- Configure Domain Settings
- Configue Homegroup Settings
- Configure Credential Manager
- Configure Local Accounts
- Configure Microsoft Accounts
- Configure Device Registration
- Configure Windows Hello for Business
- Configure Device Guard
- Credential Guard
- Configure Device Health Attestation
- Configure UAC Behavior
- Configure Dynamic Look
- Picture Passwords-Demo
- Workgroups-Demo
- Domains-Demo
- Credential Manager-Demo
- Configure Local Accounts-Demo
- Dynamic Lock-Demo
Module 15 : Configure Advanced Management Tools
- Module 15 Workbook
- Configure Advanced Management Tools
- Configure Device Manager
- Configure and use the MMC
- Configure Task Schedule
- Configure Automation of Mgmt Task Using Windows PowerShell
- Convert Group Policy Objects to MDM Policies using the MDM
- Services-Demo
- Using the MMC-Demo
- Task Scheduler-Demo
- Opening PowerShell and the Integrated Scripting Environment-Demo
Managing Different Personality Types Course Content
Module 1: Intro and what will this course cover?
- Managing Different Personalities Intro
Module 2: My Story and background
- My Story
Module 3: Let's get on the same page
- Let's Start Together on the Same Page
Module 4: Two personality types
- Two Types of Personalities
Module 5: A Good vs Bad Manager
- Good vs Bad Manager
Module 6: What are the best ways to manage your team?
- What is the Best Way to Manage Your Team
Module 7: Mentalities to avoid
- Mentalities to Avoid
- Can You Be Your Employee's Friend
- Trying To Make Everyone Happy
- Talking Down to Your Team
Module 8: How to approach a problem with an employee?
- How To Approach a Problem with an Employee
Module 9: Diversity in your team
- There is A lot of Diversity Out There
Module 10: My personal difficulty with careless employees
- My Personal Difficulties
Module 11: Discipline
- Discipline
- Best Practices During Discipline
Module 12: Angry employees
- What To Do with Angry Employees
- Is It Ok To Yell at Your Employees
Module 13: When it is time to say goodbye
- When It Is Time to Say Goodbye
Module 14: Disrespect from your team
- Disrespect from Your Team
- How to Build Respect from Your Team
Module 15: Common management mistakes
- Common Mangement Mistakes
Module 16: How do I become a better manager?
- How Do I Become a Better Manager
Module 17: How to manage if you aren't the big, big boss
- How To Manage a Team if You're a Middle Manager
Module 18: Dealing with other managers
- Dealing with other Managers
Module 19: Conclusion and summary of course
- Summary
CompTIA PenTest+ (PT0-001) Course Content
Module 1 - The Pen Test Engagement
- Module 1 Notes
- 1.0 PenTest Plus Introduction
- 1.1 PenTest Plus Topics
- 1.2 PenTest Engagement
- 1.3 Threat Modeling
- 1.4 Technical Constraints
- 1.5 PenTest Engagement Review
- 1.6 Examining PenTest Engagement Documents Act
Module 2 - Passive Reconnaissance
- Module 2 Notes
- 2.1 Passive Reconnaissance part1
- 2.2 WHOIS Act
- 2.3 Passive Reconnaissance part2
- 2.4 Google Hacking Act
- 2.5 Passive Reconnaissance part3
- 2.6 DNS Querying Act
- 2.7 Passive Reconnaissance part4
- 2.8 Email Server Querying Act
- 2.9 SSL-TLS Cerfificates
- 2.10 Shodan Act
- 2.11 The Havester
- 2.12 TheHarvester Act
- 2.13 Recon-ng
- 2.14 Recon-g Act
- 2.14 Recon-ng-Part-2-API-key Act
- 2.15 Maltego
- 2.16 Have I been Pwned
- 2.17 Punked and Owned Pwned Act
- 2.18 Fingerprinting Organization with Collected Archives
- 2.19 FOCA Act
- 2.20 Findings Analysis Weaponization
- 2.21 Chp 2 Review
Module 3 - Active Reconnaissance
- Module 3 Notes
- 3.1 Active Reconnaissannce
- 3.2 Discovery Scans Act
- 3.3 Nmap
- 3.4 Nmap Scans Types Act
- 3.5 Nmap Options
- 3.6 Nmap Options Act
- 3.7 Stealth Scans
- 3.8 Nmap Stealth Scans Act
- 3.9 Full Scans
- 3.10 Full Scans Act
- 3.11 Packet Crafting
- 3.12 Packet Crafting Act
- 3.13 Network Mapping
- 3.14 Metasploit
- 3.15 Scanning with Metasploit Act
- 3.16 Enumeration
- 3.17 Banner Grabbing Act
- 3.18 Windows Host Enumeration
- 3.19 Winddows Host Enumeration Act
- 3.20 Linux Host Enumeration
- 3.21 Linux Host Enumeration Act
- 3.22 Service Enumeration
- 3.23 Service Enumeration Act
- 3.24 Network Shares
- 3.25 SMB Share Enumeration Act
- 3.26 NFS Network Share Enumeration
- 3.27 NFS Share Enumeration Act
- 3.28 Null Sessions
- 3.29 Null Sessions Act
- 3.30 Website Enumeration
- 3.31 Website Enumeration Act
- 3.32 Vulnerability Scans
- 3.33 Compliance Scans Act
- 3.34 Credentialed Non-credentialed Scans
- 3.35 Using Credentials in Scans Act
- 3.36 Server Service Vulnerability Scan
- 3.37 Vulnerability Scanning Act
- 3.38 Web Server Database Vulnerability Scan
- 3.39 SQL Vulnerability Scanning Act
- 3.40 Vulnerability Scan Part 2 OpenVAS Act
- 3.41 Web App Vulnerability Scan
- 3.42 Web App Vulnerability Scanning Act
- 3.43 Network Device Vulnerability Scan
- 3.44 Network Device Vuln Scanning Act
- 3.45 Nmap Scripts
- 3.46 Using Nmap Scripts for Vuln Scanning Act
- 3.47 Packet Crafting for Vulnerbility Scans
- 3.48 Firewall Vulnerability Scans
- 3.49 Wireless Access Point Vunerability
- 3.50 Wireless AP Scans Act
- 3.51 WAP Vulnerability Scans
- 3.52 Container Security issues
- 3.53 How to Update Metasploit Pro Expired Trial License
Module 4 - Physical Security
- Module 4 Notes
- 4.1 Physical Security
- 4.2 Badge Cloning Act
- 4.3 Physical Security Review
Module 5 - Social Engineering
- Module 5 Notes
- 5.1 Social Engineering
- 5.2 Using Baited USB Stick Act
- 5.3 Using Social Enginnering to Assist Attacks
- 5.4 Phishing Act
- 5.5 Social Engineering Review
Module 6 - Vulnerability Scan Analysis
- Module 6 Notes
- 6.1 Vulnerbility Scan Analysis
- 6.2 Validating Vulnerability Scan Results Act
- 6.3 Vulnerbility Scan Analysis Review
Module 7 - Password Cracking
- Module 7 Notes
- 7.1 Password Cracking
- 7.2 Brute Force Attack Against Network Service Act
- 7.3 Network Authentication Interception Attack
- 7.4 Intercepting Network Authentication Act
- 7.5 Pass the Hash Attacks
- 7.6 Pass the Hash Act
- 7.7 Password Cracking Review
Module 8 - Penetrating Wired Networks
- Module 8 Notes
- 8.1 Penetrating Wired Network
- 8.2 Sniffing Act
- 8.3 Eavesdropping
- 8.4 Eavesdropping Act
- 8.5 ARP Poisoning
- 8.6 ARP Poisoning Act
- 8.7 Man In The Middle
- 8.8 MITM Act
- 8.9 TCP Session HiJacking
- 8.10 Server Message Blocks SMB Exploits
- 8.11 SMB Attack Act
- 8.12 Web Server Attacks
- 8.13 FTP Attacks
- 8.14 Telnet Server Attacks
- 8.15 SSH Server Attacks
- 8.16 Simple Network Mgmt Protocol SNMP
- 8.17 Simple Mail Transfer Protocol SMTP
- 8.18 Domain Name System DNS Cache Poisoning
- 8.19 Denail of Service Attack DoS-DDoS
- 8.20 DoS Attack Act
- 8.21 VLAN Hopping Review
Module 9 - Penetrating Wireless Networks
- Module 9 Notes
- 9.1 Penetrating Wireless Networks
- 9.2 Jamming Act
- 9.3 Wireless Sniffing
- 9.4 Replay Attacks
- 9.5 WEP Cracking Act
- 9.6 WPA-WPA2 Cracking
- 9.7 WAP Cracking Act
- 9.8 Evil Twin Attacks
- 9.9 Evil Twin Attack Act
- 9.10 WiFi Protected Setup
- 9.11 Bluetooth Attacks
- 9.12 Penetrating Wireless Networks
Module 10 - Windows Exploits
- Module 10 Notes
- 10.1 Windows Exploits
- 10.2 Dumping Stored Passwords Act
- 10.3 Dictionary Attacks
- 10.4 Dictionary Attack Against Windows Act
- 10.5 Rainbow Table Attacks
- 10.6 Credential Brute Force Attacks
- 10.7 Keylogging Attack Act
- 10.8 Windows Kernel
- 10.9 Kernel Attack Act
- 10.10 Windows Components
- 10.11 Memory Vulnerabilities
- 10.12 Buffer Overflow Attack Act
- 10.13 Privilegde Escalation in Windows
- 10.14 Windows Accounts
- 10.15 Net and WMIC Commands
- 10.16 Sandboxes
Module 11 - Linux Exploits
- Module 11 Notes
- 11.1 Linux Exploits
- 11.2 Exploiting Common Linux Features Act
- 11.3 Password Cracking in Linux
- 11.4 Cracking Linux Passwords Act
- 11.5 Vulnerability Linux
- 11.6 Priviledge Escalation Linux
- 11.7 Linux Accounts
- 11.8 Linux Exploits Review
Module 12 - Mobile Devices
- Module 12 Notes
- 12.1 Mobile Devices
- 12.2 Hacking Android Act
- 12.3 Apple Exploits
- 12.4 Moblie Devices Review
Module 13 - Specialized Systems
- Module 13 Notes
- 13.1 Specialized Systems
- 13.2 Specialized Systems Review
Module 14 - Scripts
- Module 14 Notes
- 14.1 Scripts
- 14.2 Powershell
- 14.3 Python
- 14.4 Ruby
- 14.5 Common Scripting Elements
- 14.6 Scripts Review
- 14.7 Better Ping Sweep
- 14.8 Simple Port Scanner2
- 14.9 Multitarget Port Scanner
- 14.10 Port Scanner with Nmap
- 14.11 Scripts Review
Module 15 - Application Testing
- Module 15 Notes
- 15.1 Application Testing
- 15.2 Reverse Engineering
Module 16 - Web App Exploits
- Module 16 Notes
- 16.1 Webb App Exploits
- 16.2 Injection Attacks
- 16.3 HTML Injection
- 16.4 SQL Hacking - SQLmap Act
- 16.5 Cross-Site Attacks
- 16.6 Cross-Site Request Forgery
- 16.7 Other Web-based Attacks
- 16.8 File Inclusion Attacks
- 16.9 Web Shells
- 16.10 Web Shells Review
Module 17 - Lateral Movement
- Module 17 Notes
- 17.1 Lateral Movement
- 17.2 Lateral Movement with Remote Mgmt Services
- 17.3 Process Migration Act
- 17.4 Passing Control Act
- 17.5 Pivoting
- 17.6 Tools the Enable Pivoting
- 17.7 Lateral Movement Review
Module 18 - Persistence
- Module 18 Notes
- 18.1 Persistence
- 18.2 Breeding RATS Act
- 18.3 Bind and Reverse Shells
- 18.4 Bind Shells Act
- 18.5 Reverse Shells
- 18.6 Reverse Shells Act
- 18.7 Netcat
- 18.8 Netcat Act
- 18.9 Scheduled Tasks
- 18.10 Scheduled Tasks Act
- 18.11 Services and Domains
- 18.12 Persistence Review
Module 19 - Cover Your Tracks
- Module 19 Notes
- 19.1 Cover Your Tracks
- 19.2 Cover Your Tracks - Timestomp Files Act
- 19.3 Cover Your Tracks - Frame the Administrator Act
- 19.4 Cover Your Tracks - Clear the Event Log Act
- 19.5 Cover Your Tracks Review
Module 20 - The Report
- Module 20 Notes
- 20.1 The Report
- 20.2 The Report Review
Module 21 - Post Engagement Cleanup
- Module 21 Notes
- 21.1 Post Engagement Cleanup_1
- 21.3 Post Engagement Cleanup Review
- 21.4 PenTest Plus Conclusion.mp4
Certified Associate in Project Management (CAPM) 6th Edition Course Content
Module 1 : Getting Certified to take the Examination
- Intro
Module 2 : Techniques for Preparing for and Taking the Examination
- Getting Certified to take the Exam
- Techniques for Preparing for the Exam
Module 3 : Project Management Framework
- PMBOK Framework prt1
- PMBOK Framework prt2
- PMBOK Framework prt3
Module 4 : Project Integration Management
- Project Integration Mgmt
- Project Integration Mgmt prt2
- Integration Questions
Module 5 : Project Scope Management
- Project Scope Mgmt
- Project Scope Mgmt prt2
- Scope Questions
Module 6 : Project Schedule Management
- Project Schedule Mgmt
- Project Schedule Mgmt prt2
- Project Schedule Mgmt prt3
- Schedule Knowledge Questions
Module 7 : Project Cost Management
- Project Cost Mgmt
- Earned Value Mgmt
- Trend Analysis
- Cost Questions
Module 8 : Project Quality Management
- Project Quality Mgmt
- Quality Zero Defects
- Control Quality
- Quality Questions
Module 9 : Project Resource Management
- Project Resource Mgmt
- Estimate Activity Resources
- Manage Team
- Resource Histogram
- Resource Questions
Module 10 : Project Communications Management
- Project Communication Mgmt
- Communication Methods
- Communications
- Communication Questions
Module 11 : Project Risk Management
- Project Risk Mgmt
- Identify Risk
- Quantitive Risk Analysis
- Plan Risk Responses
- Risk Questions
Module 12 : Project Procurement Management
- Project Procurement
- Make or Buy
- Share
- Procurement Documents
- Negotiations
- Procurement Questions
Module 13 : Project Stakeholder Management
- Project Stakeholder Mgmt
- Plan Stakeholder Engagement
- Project Stakeholder Questions
- CAPM Conclusion
CompTIA Advanced Security Practitioner (CASP) CAS-003 Course Content
Module 1 - Risk Management
- Module 1 Notes
- Intro CASP
- CASP Introduction
- Mod 1.1 Exploring Cloud Services Act
- Mod 1.1 Acquisition Merger Demerger
- Mod 1.1 Acquisition Merger Demerger Part2
- Mod 1.2 Compare and Contrast
- Mod 1.3 Given Scenario Execute Risk
- Mod 1.3 Given Scenario Execute Risk Part2
- Mod 1.3 Continuing Terminology IT Governance
- Mod 1.4 Analyze Security Solution Metrics and Attributes
- Mod 1.4 Analyze Risk
- Mod 1.4 Trend Analysis Act
Module 2 - Enterprise Security Architecture
- Module 2 Notes
- Mod 2 Enterprise Security Architecture
- Mod 2.1 Network Device Security Act
- Mod 2.1 Application and Protocol
- Mod 2.1 Advanced Network Security Act
- Mod 2.1 Complex Network Security Solution
- Mod 2.1 Implementing VLANs Switchport Sec Act
- Mod 2.1 Implementing VLANs Switchport Sec Act Part2
- Mod 2.1 Distributed Denial of Service
- Mod 2.1 Exploring DoS Attacks Act
- Mod 2.1 Security Zones
- Mod 2.1 Network Access Control
- Mod 2.1 Searching for Vulnerablie ICS-SCADA Act
- Mod 2.2 Analyze a Scenario Integrate Security
- Mod 2.2 Configuring Windows Firewall Act
- Mod 2.2 Log Monitoring and Auditing
- Mod 2.2 Group Policy Act
- Mod 2.2 Patch Management
- Mod 2.2 Management Interface
- Mod 2.2 Measured Launch
- Mod 2.3 Analyze a Scenario to Integrate Security Controls
- Mod 2.3 Security Implications Privacy
- Mod 2.3 Baseband
- Mod 2.4 Given Software Vulnerabilty Scenarios
- Mod 2.4 SQL Injection Act
- Mod 2.4 Improper Error and Exception Handling
- Mod 2.4 Buffer Overflows Act
- Mod 2.4 Memory Leaks
- Mod 2.4 Researching Vulnerabilities Exploits Act
Module 3 - Enterprise Security Operations
- Module 3 Notes
- Mod 3 Enterprise Security Operations
- Mod 3 Runtime Debugging
- Mod 3.1 Fingerprinting an OS Services Act
- Mod 3.1 Code Review
- Mod 3.1 Conducting OSINT Act
- Mod 3.1 Types
- Mod 3.1 Conducting a Vulnerability Assessment Act
- Mod 3.2 Analyze a Scenario Output
- Mod 3.2 Network Sniffing Act
- Mod 3.2 Security Content Automation
- Mod 3.2 Using a SCAP Scanner Act
- Mod 3.2 Network Enumerator
- Mod 3.2 Password Cracking Act
- Mod 3.2 Host Vulnerability Scanner
- Mod 3.2 Using Command Line Tools Act
- Mod 3.2 OpenSSL
- Mod 3.2 Scanning for Heartbleed Act
- Mod 3.2 Local Exploitation Tools
- Mod 3.2 Verifying File Integrity with SFC Act
- Mod 3.2 Log Analysis Tools
- Mod 3.3 Given Scenario Implement Incident
- Mod 3.3 Facilitate Incident Detection Response
- Mod 3.3 Using Incident Response Support Tools Act
- Mod 3.3 Severity of Incident Detection Breach
Module 4 - Technical Integration of Enterprise Security
- Module 4 Notes
- Mod 4 Technical Integration of Enterprise
- Mod 4 Technical Integration of Enterprise Part2
- Mod 4.1 DataSecurity Considerations
- Mod 4.1 Examing Network Diagrams Act
- Mod 4.1 Security and Privacy Considerations of Storage integration
- Mod 4.1 Exploring Directory Services and DNS Act
- Mod 4.2 Given Scenario Integrate Cloud and Virtualization
- Mod 4.2 Taking Another Look at Cloud Services Act
- Mod 4.2 Security Advantages and Disadvanatges of Virtualization
- Mod 4.2 Using Virtualization Act
- Mod 4.2 Cloud Augmented Security
- Mod 4.3 Given Scenario Integrate and Troubleshoot Advanced Authentication
- Mod 4.4 Given Scenario Cryptographic
- Mod 4.4 Cryptographic Part2
- Mod 4.4 Mobile Device Encryption
- Mod 4.4 Cryptography Act
- Mod 4.5 Select the Appropriate Control
- Mod 4.5 Phising Act
- Mod 4.5 Telephony VoIP Integration
Module 5 - Research, Development and Collaboration
- Module 5 Notes
- Mod 5 Research Methods to Determine Industry Trends
- Mod 5.1 Practicing Threat Intelligence Act
- Mod 5.2 Scenario Implememt Security Activities Across
- Mod 5.2 Static Testing
- Mod 5.3 Explain the Importance of Interaction
- CASP Conclusion
Social Media & Digital Marketing 101 Course Content
Module 1 Online Lead Generation
- Intro to Social Media Digital Marketing
- Online Lead Generation prt1
- Online Lead Generation prt2
- Lead Examples
- Live Streaming Video for Leads
- Lead Generation
- Using Your Customers
- Be Ready
Module 2 Facebook, LinkedIn, and YouTube 101
- Create a Facebook Business Page
- Facebook Setup
- Marketing in Facebook Groups
- Messenger Bots
- More on Messenger
- Facebook Video using InShot
- Repurposing
- Setting Up LinkedIn Pro le
- Benefits of YouTube
Module 3 List Building & Email Marketing
- Email List prt1
- Email List prt2
- MailChimp prt1
- MailChimp prt2
- Email Content Ideas
- Email summary
Module 4 Creating Social Media Content and Marketing Materials with Canva and other Apps
- Canva Image Creation
- Making a video with your phone
- InShot video
- Purpose Video Marketing
- Transcribing Video
- Word Swag
- Ripl
- Instagram prt1
- Instagram prt2
- Instagram prt3
Module 5 Sales Funnels
- Click Funnel prt1
- Click Funnel prt2
- Funnel Building prt1
- Funnel Building prt2
Module 6 Apps & Tools Review
- Social Media apps
- Podcasting
- Customer Value Letter
- Tips and Tricks
- Fiverr
- Outro
Photography Basics Course Content
Module 1
- Introduction
- Photography Basics
- Photography Basics prt 2
- Questions and Answers
- Questions and Answers prt 2
- Questions and Answers prt 3
- Basic Accessories
- Basic Accessories prt 2
- Lenses
- DSLR vs DSLM
- Studio shoot
- Studio shoot with model prt 1
- Studio shoot with model prt 2
- Studio green-screen shoot
- Common Questions
- Common Questions prt 2
- Basic Editing
- Levitation and Transferring Images to Your PC
- Levitation and Importing into PhotoShop
- Logo and Watermark
- Deleting Backgrounds
- Product Photography
- Website
- Website Images prt 2
- Real Estate Photography
- Branding
- Camera phone
- Accessories for Mobile Phones and GoPro
- Conclusion
Starting Your Own YouTube Channel 101 Course Content
Starting Your Own YouTube Channel
- Welcome to the course
- What Will Your Channel Be About?
- Recording Device
- Your Competition
- Your Normal Video Formula
- Your Apprearance
- Your Personality On Camera
- Beware of Copy-written Content
- Elements To Make Your Channel and Videos Better Part 1
- Elements To Make Your Channel and Videos Better Part 2
- Sound Quality
- Post Schedule
- Doing Too Much
- Community Interaction
- Trolls and Negative Comments
- Fancy Equipment Or Not
- Patience
- Conclusion
Microsoft 70-765 SQL Server 2016 Provisioning SQL Databases Course Content
Module 1: Deploy a Microsoft Azure SQL Database
- Introduction
- Introducing the Azure SQL Database Part 1
- Introducing the Azure SQL Database Part 2
- Setting Up Azure Lab
- Chose a Service Tier Part 1
- Chose a Service Tier Part 2
- Create Servers and Databases Part 1
- Creating a Azure SQL Server and Database Lab
- Create Servers and Databases Part 2
- Create Servers and Databases Part 3
- Connecting SSMS to Azure SQL Lab Part 1
- Connecting SSMS to Azure SQL Lab Part 2
- Create a Sysadmin Account
- Creating Azure SQL Logins and Users Lab
- Congure Elastic Pools
- Creating and Conguring an Elastic Pool Lab
Module 2: Plan for SQL Server Installation
- Plan for an IaaS or On-Premises Deployment Part 1
- Plan for an IaaS or On-Premises Deployment Part 2
- Select the Appropriate Size for a Virtual Machine
- Plan Storage Pools Based on Performance Requirements Part 1
- Plan Storage Pools Based on Performance Requirements Part 2
- Evaluate Best Practices for Installation
- Design a Storage Layout for a SQL Server Virtual Machine
Module 3: Deploy SQL Server Instances
- Deploy a SQL Server Instance in IaaS and On-Premises
- Restoring AdventureWorks 2016 Database Lab
- Provision an Azure Virtual Machine to Host a SQL Server Instance
- Provisioning an Azure Virtual Machine to Host a SQL Server Lab
- Manually Install SQL Server on an Azure Virtual Machine
- Installing SQL 2016 Lab Part 1
- Installing SQL 2016 Lab Part 2
- Automate the Deployment of SQL Server Databases
- Exploring Azure SQL Database Automation Lab
- Deploy SQL Server by Using Templates
- Managing JSON Templates Lab
Module 4: Deploy SQL Server Databases to Azure Virtual Machines
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 1
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 2
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 3
- Migrate an On-Premises SQL Server Database to an Azure Virtual Machine Lab Part 4
- Generate Benchmark Data for Performance Needs
- Generating Benchmark Data Lab Part 1
- Generating Benchmark Data Lab Part 2
- Perform Performance Tuning on Azure IaaS
- Perform Performance Tuning on Azure IaaS Lab Part 1
- Perform Performance Tuning on Azure IaaS Lab Part 2
- Support Availability Sets in Azure Part 1
- Support Availability Sets in Azure Part 2
- Manage High Availability Lab Part 1
- Manage High Availability Lab Part 2
- Manage High Availability Lab Part 3
- Manage High Availability Lab Part 4
- Manage High Availability Lab Part 5
Module 5: Configure Secure Access to Microsoft Azure SQL Databases
- Configure Firewall Rules
- Creating Firewall Rules Lab
- Configure Always Encrypted for Azure SQL Database
- Implementing Always Encrypted Lab
- Configure Cell-Level Encryption
- Cell-Level Encryption Lab
- Configure Dynamic Data Masking
- Dynamic Data Masking Lab
- Configure Transparent Data Encryption (TDE)
- Transparent Data Encryption (TDE) Lab
Module 6: Configure SQL Server performance settings
- Configure SQL Performance Settings
- Configuring SQL Performance Settings Lab
- Configure Max Server Memory
- Configuring SQL Memory Lab
- Configure Database Performance Settings
- Configure Database Performance Settings Lab
- Configure Operators and Alerts
- Configure alerts in Azure and On-Premise SQL Server Lab
Module 7: Manage SQL Server instances
- Create Databases
- Creating Databases Lab
- Manage Files and File Groups
- Managing Files and File Groups Lab
- Manage System Database Files
- Manage System Database Files Lab
- Configure tempdb
- Configure tempdb Lab
Module 8: Manage SQL Storage
- Manage SMB File Shares
- Manage SMB File Shares Lab
- Manage Stretch Databases
- Configure Azure Storage
- Change Service Tiers
- Change Service Tiers Lab Part 1
- Review Wait Statistics
- Manage Storage Pools
- Recover from Failed Storage
- Managing Storage Lab Part 1
- Managing Storage Lab Part 2
Module 9: Perform Database Maintenance
- Monitoring Tools
- Using Monitoring Tools Lab Part 1
- Using Monitoring Tools Lab Part 2
- Azure Performance Tuning
- Automate Maintenance Tasks
- Update Statistics and Indexes
- Update Statistics and Indexes Lab Part 1
- Update Statistics and Indexes Lab Part 2
- Verify Database Integrity
- Verify Database Integrity Lab
- Recover from Database Corruption
- Recover from Database Corruption Lab
- Conclusion
Microsoft 70-764 SQL 2016 - Administering a SQL Database Infrastructure Course Content
Module 1: Configure Encryption
- Introduction
- Exam Objectives and Lab Setup
- Restoring AdventureWorks 2016 Database Lab Part 1
- Restoring AdventureWorks 2016 Database Lab Part 2
- Restoring AdventureWorks 2016 Database Lab Part 3
- Configure Encryption
- Cell-Level Encryption Part 1
- Cell-Level Encryption Part 2
- Cell-Level Encryption Lab Part 1
- Cell-Level Encryption Lab Part 2
- Transparent Data Encryption
- Transparent Data Encryption Lab
- Always Encrypted
- Always Encrypted Lab
- Backup Encryption
- Backup Encryption Lab
- Connection Encryption
- Encryption Troubleshooting
Module 2: Configure Data Access and Permissions
- Create and Maintain Users
- Create and Maintain Users Lab Part 1
- Create and Maintain Users Lab Part 2
- Configure and Maintain Custom Roles
- Configure and Maintain Custom Roles Lab
- Manage Database Object Permissions Part 1
- Manage Database Object Permissions Part 2
- Manage Database Object Permissions Lab Part 1
- Manage Database Object Permissions Lab Part 2
- Configure User Options for Azure SQL Database
- Configure Row-Level Security
- Configure Dynamic Data Masking
- Configure Dynamic Data Masking Lab
Module 3: Configure Auditing
- Manage a SQL Server Audit
- Manage a SQL Server Audit Lab
- Query the SQL Server Audit Log
- Manage an Azure SQL Server Audit
Module 4: Develop a Backup Strategy
- Backup Types Part 1
- Backup Types Part 2
- Manage, Backup, and Restore Databases Lab Part 1
- Manage, Backup, and Restore Databases Lab Part 2
- Backup Very Large Databases Part 1
- Backup Very Large Databases Part 2
- Backup Very Large Databases Part 3
- Backup Very Large Databases Part 4
- 4.9 Managing Very Large Databases Lab Part 1
- 4.10 Managing Very Large Databases Lab Part 2
- 4.11 Managing Very Large Databases Lab Part 3
- Configure Alerting for Failed Backups
- Configure Alerting for Failed Backups Lab Part 1
- Configure Alerting for Failed Backups Lab Part 2
- Back up Databases to Azure
- Manage Transaction Log Backups
- Configure Database Recovery Models
- Set Database Recovery Model Lab
- Configure Backup Automation
- Configure Backup Automation Lab
Module 5: Restore Databases
- Perform Piecemeal Restores
- Restore Databases Lab Part 1
- Restore Databases Lab Part 2
- Restore Databases Lab Part 3
- Perform Page Recovery
- Perform Point-in-Time Recovery
- Perform Point-in-Time Recovery Lab
- Restore File Groups
- Develop a Plan to Automate and Test Restores
Module 6: Manage Database Integrity
- Implement Database Consistency Checks
- Implement Database Consistency Checks Lab
- Identify Database Corruption
- Recover From Database Corruption
Module 7: Monitor Database Activity
- Monitor Current Sessions
- Monitor Current Sessions Lab
- Identify Sessions that Cause Blocking Activity
- Identify Sessions that Consume tempdb Resources
- Configure the Data Collector
Module 8: Monitor Queries
- Manage the Query Store
- Manage the Query Store Lab
- Configure Extended Events and Trace Events
- Identify Problematic Execution Plans
Module 9: Manage Indexes
- Identify and Repair Index Fragmentation
- Identify and Create Missing Indexes
- Identify and Drop Underutilized Indexes
- Manage Existing Columnstore Indexes Part 1
- Manage Existing Columnstore Indexes Part 2
- Partitioned Tables
Module 10: Monitor SQL Server Instances
- Create and Manage Operators
- Create and Manage SQL Agent Alerts
- Configure Policy-Based Management
- Configure Policy-Based Management Lab
- Identify Available Space on Data Volumes
- Identify the Cause of- Manage Performance Degradation
- Identify the Cause of- Manage Performance Degradation Lab Part 1
- Identify the Cause of- Manage Performance Degradation Lab Part 2
Module 11: Implement Log Shipping
- Configure and Monitor Log Shipping
- Configure and Monitor Log Shipping Lab Part 1
- Configure and Monitor Log Shipping Lab Part 2
Module 12: Implement Failover Cluster Instances
- Windows Server Failover Cluster
- Manage Shared Disks
- Configure Cluster Shared Volumes
- Configuring WSFC Lab
Module 13: Implement Always On Availability Groups
- Database Mirroring
- Create an Availability Group
- Manage Failover
- Configure Read-Only Routing
- Create Distributed Availability Groups
- Configuring Always On Availability Group Lab Part 1
- Configuring Always On Availability Group Lab Part 2
- Conclusion
Adobe Flash/Animate Course Content
Module 1
- 1.1 Introduction
- 1.2 What is Flash Animate
- 1.3 Creating A New Document in Flash and Exploring the Interface
- 1.4 Drawing in Flash Part 1
- 1.5 Drawing in Flash Part 2
- 1.6 Frame by Frame Animating in Flash Part 1
- 1.7 Frame by Frame Animating in Flash Part 2
- 1.8 Saving, Rendering, and Exporting
- 1.9 Animating with Symbols Part 1
- 1.10 Animating with Symbols Part 2
- 1.11 Animating with Symbols Part 3
- 1.12 Different Types of Tweening Part 1
- 1.13 Different Types of Tweening Part 2
- 1.14 Nesting Symbols
- 1.15 Importing Graphics Part 1
- 1.16 Importing Graphics Part 2
- 1.17 Masking Part 1
- 1.18 Masking Part 2
- 1.19 Camera and Parallax Scrolling Part 1
- 1.20 Camera and Parallax Scrolling Part 2
- 1.21 Camera and Parallax Scrolling Part 3
- 1.22 Rotoscoping Part 1
- 1.23 Rotoscoping Part 2
- 1.24 Rotoscoping Part 3
- 1.25 Rotoscoping Part 4
- 1.26 Rotoscoping Part 5
- 1.27 Rotoscoping Part 6
- 1.28 Rotoscoping Part 7
- 1.29 Creating a Puppet Part 1
- 1.30 Creating a Puppet Part 2
- 1.31 Creating a Puppet Part 3
- 1.32 Creating a Puppet Part 4
- 1.33 Creating a Puppet Part 5
- 1.34 Creating a Puppet Part 6
- 1.35 Animating a Puppet Part 1
- 1.36 Animating a Puppet Part 2
- 1.37 Animating a Puppet Part 3
- 1.38 Animating a Puppet Part 4
- 1.39 Cycles
- 1.40 Interchangeable Parts
- 1.41 Interactivity
- 1.42 Text Part 1
- 1.43 Text Part 2
- 1.44 Animating with Code
- 1.45 Dialog Part 1
- 1.46 Dialog Part 2
- 1.47 Dialog Part 3
- 1.48 Dialog Part 4
- 1.49 Controlling the Timeline Part 1
- 1.50 Controlling the Timeline Part 1
- 1.51 Putting Together an Interactive eCard Part 1
- 1.52 Putting Together an Interactive eCard Part 2
- 1.53 Putting Together an Interactive eCard Part 3
- 1.54 Putting Together an Interactive eCard Part 4
- 1.55 Putting Together an Interactive eCard Part 5
- 1.56 Bone Tool
- 1.57 Conclusion
Microsoft 70-742 Identity in Windows Server 2016 MCSA Course Content
Module 1: Installing and Configuring Domain Controllers
- Introduction
- Overview of Identity Management Concepts Part 1
- Overview of Identity Management Concepts Part 2
- Active Directory Domain Services Components Part 1
- Active Directory Domain Services Components Part 2
- Active Directory Domain Services Components Part 3
- Overview of ADDS Domain Services Part 1
- Overview of ADDS Domain Services Part 2
- Deploying Domain Controllers Part 1
- Deploying Domain Controllers Part 2
- Deploying Domain Controllers Part 3
Module 2: Managing AD DS Objects
- Overview of Object Management Part 1
- Overview of Object Management Part 2
- Managing User Accounts Part 1
- Managing User Accounts Part 2
- Managing User Accounts Part 3
- Managing User Accounts Part 4
- Managing User Accounts Part 5
- Managing Groups Part 1
- Managing Groups Part 2
- Managing Groups Part 3
- Managing Computer Accounts Part 1
- Managing Computer Accounts Part 2
- Managing Organizational Units Part 1
- Managing Organizational Units Part 2
Module 3: Securing Active Directory Domain Services
- Managing Organizational Units Part 1
- Managing Organizational Units Part 2
- Implementing Account Security Part 1
- Implementing Account Security Part 2
- Auditing AD DS
- Configuring Managed Service Accounts
Module 4: Working with Complex AD Infrastructures
- Overview of Advanced AD DS Deployments
- Deploying a Distributed AD DS Environment Part 1
- Deploying a Distributed AD DS Environment Part 2
- Deploying a Distributed AD DS Environment Part 3
- Overview of AD DS Replication
- Configuring AD DS Services Part 1
- Configuring AD DS Services Part 2
- Configuring AD DS Services Part 3
Module 5: Implementing Group Policy
- Overview of Group Policy Part 1
- Overview of Group Policy Part 2
- Overview of Group Policy Part 3
- Creating and Configuring GPOs Part 1
- Creating and Configuring GPOs Part 2
- Monitoring and Troubleshooting Group Policy
- Managing Security Options for Computers using Group Policy Part 1
- Managing Security Options for Computers using Group Policy Part 2
- Managing User Environments Part 1
- Managing User Environments Part 2
- Managing User Environments Part 3
Module 6: Understanding Microsoft Azure AD and Directory Synchronization
- Planning Directory Synchronization Part 1
- Planning Directory Synchronization Part 2
- Implementing Azure AD Connect Part 1
- Implementing Azure AD Connect Part 2
- Managing Identities with Directory Synchronization
Module 7: Monitoring and Recovering AD DS
- Monitoring AD DS Part 1
- Monitoring AD DS Part 2
- Monitoring AD DS Part 3
- Database Management
- ackup and Recovery in AD DS Part 1
- Backup and Recovery in AD DS Part 2
Module 8: Implementing Active Directory Certificate Services
- Overview of Public Key Infrastructure and AD CS Part 1
- Overview of Public Key Infrastructure and AD CS Part 2
- Deploying Certificate Authority Hierarchy
- Administering Certificate Authorities
- Deploying and Managing Certificates Part 1
- Deploying and Managing Certificates Part 2
- Managing Revocation and Distribution
- Configuring Certificate Recovery
Module 9: Implementing Active Directory Federation Services
- Overview of AD FS
- Planning and Deploying AD FS
- Overview of Web Application Proxy
Module 10: Implementing Active Directory Rights Management Services
- Overview of AD RMS
- Deploying AD RMS
- Protecting with AD RMS
- Conclusion
Microsoft 70-741 Networking with Windows Server 2016 MCSA Course Content
Module 1: Plan and Implement IPv4 and IPv6 Networks
- Introduction
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 1
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 2
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 3
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 4
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 5
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 6
- Planning and Implementing IP addressing Schemes for IPv4 Networks Part 7
- Configuring IPv4 Hosts Part 1
- Configuring IPv4 Hosts Part 2
- Managing and Troubleshooting IPv4 Connectivity Part 1
- Managing and Troubleshooting IPv4 Connectivity Part 2
- Managing and Troubleshooting IPv4 Connectivity Part 3
- Implementing IPV6 for Network Hosts Part 1
- Implementing IPV6 for Network Hosts Part 2
- Implementing IPV6 for Network Hosts Part 3
- Implementing IPv6 Transitioning and Coexistence
Module 2: Installing and Configuring DHCP
- Overview of DHCP Server Role Part 1
- Overview of DHCP Server Role Part 2
- Deploying DHCP Part 1
- Deploying DHCP Part 2
- Deploying DHCP Part 3
- Deploying DHCP Part 4
- Deploying DHCP Part 5
- Managing and Troubleshooting DHCP Part 1
- Managing and Troubleshooting DHCP Part 2
- Managing and Troubleshooting DHCP Part 3
- Managing and Troubleshooting DHCP Part 4
- Managing and Troubleshooting DHCP Part 5
Module 3: Installing and Configuring DNS
- Implementing DNS Servers Part 1
- Implementing DNS Servers Part 2
- Implementing DNS Servers Part 3
- Creating and Configuring DNS Zones Part 1
- Creating and Configuring DNS Zones Part 2
- Creating and Configuring DNS Zones Part 3
- Creating and Configuring DNS Zones Part 4
- Understanding Active Directory Integration Part 1
- Configuring Advanced DNS Settings Part 1
- Configuring Advanced DNS Settings Part 2
- Configuring Advanced DNS Settings Part 3
- Troubleshooting DNS Name Resolution Part 1
- Troubleshooting DNS Name Resolution Part 2
Module 4: Implementing and Managing IP Address Management
- Overview of IPAM Part 1
- Overview of IPAM Part 2
- IPAM Deployment and Administration Part 1
- IPAM Deployment and Administration Part 2
- IPAM Deployment and Administration Part 3
- Managing IP Address Spaces by Using IPAM
Module 5: Implementing Remote Access
- Remote Access Overview Part 1
- Remote Access Overview Part 2
- Remote Access Overview Part 3
- Implementing the Web Application Proxy
- Planning and Implementing Virtual Private Networks Part 1
- Planning and Implementing Virtual Private Networks Part 2
- Planning and Implementing Virtual Private Networks Part 3
- Planning and Implementing Virtual Private Networks Part 4
- Planning and Implementing Virtual Private Networks Part 5
- Overview of Direct Access Part 1
- Overview of Direct Access Part 2
- Implementing Direct Access Part 1
- Implementing Direct Access Part 2
- Implementing Direct Access Part 3
Module 8: Securing the Network Infrastructure
- Using the Windows Firewall with Advanced Security Part 1
- Using the Windows Firewall with Advanced Security Part 2
- Utilizing IP Security Part 1
- Utilizing IP Security Part 2
- Conclusion
Adobe Introduction to Animation Course Content
Module 1: What is Animation and the Basics
- 1.1 Introduction
- 1.2 What is Animation - Part1
- 1.3 What is Animation - Part2
- 1.4 Bouncy Ball Demo - Part1
- 1.5 Bouncy Ball Demo - Part2
- 1.6 Bouncy Ball Demo - Part3
- 1.7 Pendulum Demo - Part1
- 1.8 Pendulum Demo - Part2
- 1.9 Platform Pendulum Demo - Part1
- 1.10 Platform Pendulum Demo - Part2
- 1.11 Principles of Animation - Part1
- 1.12 Principles of Animation - Part2
- 1.13 Bouncy Ball in Perspective Demo - Part1
- 1.14 Bouncy Ball in Perspective Demo - Part2
- 1.15 Flag Wave Demo - Part1
Module 2: Intermediate Animation Techniques
- 2.1 Weight Demo - Part1
- 2.2 Weight Demo - Part2
- 2.3 Weight Demo- Part3
- 2.4 Breaking a Character Down Into Basic Shapes - Part1
- 2.5 Breaking a Character Down Into Basic Shapes - Part2
- 2.6 Breaking a Character Down Into Basic Shapes - Part3
- 2.7 Boil Demo - Part1
- 2.8 Boil Demo - Part2
- 2.9 A Take Demo - Part1
- 2.10 A Take Demo - Part2
- 2.11 Staggering Demo - Part1
- 2.12 Staggering Demo - Part2
- 2.13 Staggering Demo - Part3
- 2.15 Head Turn Demo - Part1
- 2.16 Head Turn Demo - Part2
- 2.17 Head Turn Demo - Part3
- 2.18 Head Turn Demo - Part4
- 2.19 Walk Cycles Demo - Part1
- 2.20 Walk Cycles Demo - Part2
- 2.21 Walk Cycles Demo - Part3
- 2.22 Run Cycles Demo
- 2.23 Dialogue Demo - Part1
- 2.24 Dialogue Demo - Part2
- 2.25 Dialogue Demo - Part3
- 2.26 Dialogue Demo - Part4
- 2.27 Conclusion
Adobe Premiere Pro Essential Training Course Content
Module 1: Introduction to Premiere and Getting Started on an Editing Project
- 1.1 Course Introduction
- 1.2 Introduction to Premiere Pro CC
- 1.3 Creating a New Project
- 1.4 Workspace Layout
- 1.5 Importing Media
- 1.6 Organizing Media
- 1.7 Monitoring Footage
- 1.8 Navigating the Source Monitor
- 1.9 Creating a Sequence
- 1.10 Editing Video Part 1
- 1.11 Editing Video Part 2
- 1.12 Editing with Multi Source Sequence Part 1
- 1.13 Editing with Multi Source Sequence Part 2
- 1.14 Editing with Multi Source Sequence Part 3
- 1.15 Adding Titles
Module 2: More Editing Techniques and Completing a Project
- 2.1 Editing Using Program Monitor
- 2.2 Advanced Editing Techniques
- 2.3 Inserting Graphics
- 2.4 Adding Music
- 2.5 Adjusting Audio
- 2.6 Using The Tools In Tool Panel
- 2.7 Trimming Using The Program Monitor
- 2.8 Track Monitoring And Algorithm
- 2.9 Transitions
- 2.10 Basic Effects
- 2.11 Manipulate Clip Speed
- 2.12 Color Correction
- 2.14 Exporting A Project
- 2.15 Conclusion
Adobe Photoshop Course Content
Module 1: Tools and Effects in Photoshop
- 1.1 Introduction
- 1.2 Exploring the Tools and Work Area - Part1
- 1.3 Exploring the Tools and Work Area - Part2
- 1.4 Exploring the Tools and Work Area - Part3
- 1.5 Exploring the Tools and Work Area - Part4
- 1.6 Layers in Photoshop - Part1
- 1.7 Layers in Photoshop - Part2
- 1.8 Layers in Photoshop - Part3
- 1.9 Crop and Transform
- 1.10 Working with Text - Part1
- 1.11 Working with Text - Part2
- 1.12 Filters in Photoshop
- 1.13 Layer Styles
- 1.14 Adjustment Layers - Part1
- 1.15 Adjustment Layers - Part2
Module 2: Creating Projects in Photoshop
- 2.1 Photo Retouching Methods - Part1
- 2.2 Photo Retouching Methods - Part2
- 2.3 Creating a Poster Design - Part1
- 2.4 Creating a Poster Design - Part2
- 2.5 Creating a Poster Design - Part3
- 2.6 Creating a Poster Design - Part4
- 2.7 Coloring Digital Art - Part1
- 2.8 Coloring Digital Art - Part2
- 2.9 Coloring Digital Art - Part2
- 2.10 Colorizing a Black and White Photo - Part1
- 2.11 Colorizing a Black and White Photo - Part2
- 2.12 Creating a Website Design - Part1
- 2.13 Creating a Website Design - Part2
- 2.14 Creating a Website Design - Part3
- 2.15 Exporting in Photoshop
- 2.16 Conclusion
Adobe InDesign Course Content
Module 1
- 1.1 Introduction
- 1.2 What is InDesign
- 1.3 Creating a New Document
- 1.4 Importing Images - Part1
- 1.5 Importing Images - Part2
- 1.6 Vector vs. Pixels
- 1.7 Exploring the InDesign Work Area
- 1.8 Master Pages
Module 2
- 2.1 Typography - Part1
- 2.2 Typography - Part2
- 2.3 Creating Tables
- 2.4 Packaging
- 2.5 Principle of Design
- 2.6 Knowing Your Output
- 2.7 Advanced Techniques in InDesign
- 2.8 Using InDesign for Ineractivity
- 2.9 Scripts
- 2.10 Exporting
- 2.11 Conclusion
Adobe Illustrator Course Content
Module 1: Tools and Effects in Illustrator
- 1.1 Course Introduction
- 1.2 Introduction to Adobe Illustrator
- 1.3 Basic Tools in Illustrator
- 1.4 Working with Shapes
- 1.5 Fills and Strokes
- 1.6 Pencil Tool
- 1.7 Pen Tool
- 1.8 Brush Tool
- 1.9 Compound Path
- 1.10 Gradients
- 1.11 Layers and Grooves
- 1.12 Transparency and Graphic Style
- 1.13 Transforming, Moving and Rotating Objects
- 1.14 Type Tool
- 1.15 Blending Shapes and Colors
- 1.16 Basic Effects in Illustrator
- 1.17 Image Trace Tool
Module 2: Creating Projects in Illustrator
- 2.1 Creating a Caricature Part 1
- 2.2 Creating a Caricature Part 2
- 2.3 Creating a Caricature Part 3
- 2.4 Creating a Caricature Part 4
- 2.5 Recreating a Wonka Bar Logo Part 1
- 2.6 Recreating a Wonka Bar Logo Part 2
- 2.7 Creating a Logo
- 2.8 Recreating a Pablo Picasso Painting Part 1
- 2.9 Recreating a Pablo Picasso Painting Part 2
- 2.10 Recreating a Pablo Picasso Painting Part 3
- 2.11 Recreating a Pablo Picasso Painting Part 4
- 2.12 Recreating a Pablo Picasso Painting Part 5
- 2.13 Recreating a Pablo Picasso Painting Part 6
- 2.14 Exporting
- 2.15 Conclusion
Adobe After Effects - Legacy Course Content
Module 1: Introduction to After Effects
- 1.1 Introduction
- 1.2 What is After Effects?
- 1.3 Creating a New Project in After Effects
- 1.4 Creating and Animating Primitive Shapes Demo - Part1
- 1.5 Creating and Animating Primitive Shapes Demo -Part2
- 1.6 Simply Bouncing Ball Demo -Part1
- 1.7 Simply Bouncy Ball Demo - Part2
- 1.8 Complex Bouncy Ball Demo - Part1
- 1.9 Complex Bouncing Ball Demo - Part2
- 1.10 Exporting from After Effects
- 1.11 Curves Editor Demo
- 1.12 Importing Footage - Part1
- 1.13 Importing Footage - Part2
- 1.14 Parenting - Part1
- 1.15 Parenting - Part2
Module 2: Intermediate Effects and Techniques in After Effects
- 2.1 3D Layers and Cameras Demo - Part1
- 2.2 3D Layers and Cameras Demo - Part2
- 2.3 Animating Text Demo - Part1
- 2.4 Animating Text Demo - Part2
- 2.5 Animating Text Demo - Part3
- 2.6 Animating Text Demo - Part4
- 2.7 Importing and Syncing Audio
- 2.8 Particles Demo - Part1
- 2.9 Particles Demo - Part2
- 2.10 Lights Demo
- 2.11 Common Effects in After Effects
Module 3: More Advanced Effects and Techniques in After Effects
- 3.1 Puppet Building Demo - Part1
- 3.2 Puppet Building Demo - Part2
- 3.3 Puppet Building Demo - Part3
Microsoft 70-740 Installation, Storage & Compute with Windows Server 2016 Course Content
Module 1: Installing Windows Server 2016 in Host and Compute Environments
- Course Introduction
- Determining Windows Server 2016-Part1
- Determining Windows Server 2016-Part2
- Determining Windows Server 2016-Part3
- Determining Windows Server 2016-Part4
- Determining Windows Server 2016-Part5
- Installing Windows 2016-Part1
- Installing Windows 2016-Part2
- Installing Windows 2016-Part3
- Installing Windows 2016-Part4
- Installing Windows 2016-Part5
- Managing Windows Installation With Windows PowerShell
- Creating Managing And Maintaining Windows Images For Deployment-Part1
- Creating Managing And Maintaining Windows Images For Deployment-Part2
- Creating Managing And Maintaining Windows Images For Deployment-Part3
- Creating Managing And Maintaining Windows Images For Deployment-Part4
Module 2: Configuring Active Directory Networks for Host and Compute Environments
- Overview Of Active Directory Domain Services-Part1
- Overview Of Active Directory Domain Services-Part2
- Overview Of Active Directory Domain Services-Part3
- Overview Of ADDS Domain Controllers-Part1
- Overview Of ADDS Domain Controllers-Part2
- Deploying Domain Controllers-Part1
- Deploying Domain Controllers-Part2
- Overview Of Group Policy Purpose Components And Processes-Part1
- Overview Of Group Policy Purpose Components And Processes-Part2
- Overview Of Group Policy Purpose Components And Processes-Part3
- Creating And Configuring GPOs-Part1
- Creating And Configuring GPOs-Part2
- Security Management Using Group Policy-Part1
- Security Management Using Group Policy-Part2
- Security Management Using Group Policy-Part3
Module 3: Implementing Local and Enterprise Storage Solutions
- Managing Disk And Volumes In Windows Server 2016-Part1
- Managing Disk And Volumes In Windows Server 2016-Part2
- Managing Disk And Volumes In Windows Server 2016-Part3
- Managing Disk And Volumes In Windows Server 2016-Part4
- Implementing And Managing Storage Spaces-Part1
- Implementing And Managing Storage Spaces-Part2
- Implementing And Managing Storage Spaces-Part3
- Configuring Data Duplication-Part1
- Configuring Data Duplication-Part2
- Understanding Various Types Of Storage
- Comparing SAN Options-Part1
- Comparing SAN Options-Part2
- Understanding ISNS DCB And MPIO
- Configuring File And Folder Sharing In Windows Server-Part1
- Configuring File And Folder Sharing In Windows Server-Part2
- Configuring File And Folder Sharing In Windows Server-Part3
- Configuring Advanced File Services With FSRM-Part1
- Configuring Advanced File Services With FSRM-Part2
- Configuring Advanced File Services With FSRM-Part3
Module 4: Implementing Hyper-V Virtualization and Containers
- Installing Hyper-V Virtualization
- Configuring Storage And Networking In Hyper-VHosts-Part1
- Configuring Storage And Networking In Hyper-VHosts-Part2
- Configuring And Managing Virtual Machines-Part1
- Configuring And Managing Virtual Machines-Part2
- Understanding Windows Server And Hyper-VContainers
- Deploying Windows Server And Hyper-VContainers
- Using Docker To Install Configure And Manage Containers
Module 5: Implementing High Availability
- Overview Of High Availability And Disaster Recovery-Part1
- Overview Of High Availability And Disaster Recovery-Part2
- Implementing Network Load Balancing-Part1
- Implementing Network Load Balancing-Part2
- Planning And Configuring Failover Clustering-Part1
- Planning And Configuring Failover Clustering-Part2
- Planning And Configuring Failover Clustering-Part3
- Managing A Failover Cluster
- Integrating Failover Clustering And Hyper-V-Part1
- Integrating Failover Clustering And Hyper-V-Part2
- Configuring Site Availability
Module 6: Maintaining and Monitoring Windows Server 2016
- Windows Server Update Services-Part1
- Windows Server Update Services-Part2
- Windows PowerShell Desired State Configuration
- Windows Server 2016 Monitoring Tools-Part1
- Windows Server 2016 Monitoring Tools-Part2
- Conclusion
Agile Project Management Course Content
Module 1: What Is Agile
- Course And Instructor Introduction
- What Is Agile - Part1
- What Is Agile Part2 - Agile Manifesto Principles 1-6
- What Is Agile Part3 - Agile Manifesto Principles 7-12
- What Is Agile Part4 - Agile Manifesto Values
- What Is Agile Part5 - Why Agile?
- What Is Agile - Part6 - Misconceptions about Agile
- What Is Agile Part7 - Agile Lifecycle
- What Is Agile Part8 - Key Definitions
- What Is Agile - Part9
Module 2: Projects And Projects Management In An Agile World
- Projects And Project Management In An Agile World Part 1 - Historical Information
- Projects And Project Management In An Agile World Part 2 - Organizational Projects
- Projects And Project Management In An Agile World Part 3 - Traditional Projects
- Projects And Project Management In An Agile World Part 4 - Roles
- Projects And Project Management In An Agile World Part 5 - Roles 2
Module 3: Agile and Scrum
- Agile And Scrum Part1 - In Depth
- Agile And Scrum Part2 - Major Activities
- Agile And Scrum Part3 - 3 Questions
- Agile And Scrum Part4 - Sprints
Module 4: Common Scrum Terminology
- Common Scrum Terminology-Part1
- Common Scrum Terminology-Part2
Module 5: Other Iterative Methods
- Other Iterative Methods
Module 6: Communication Skills In Agile World
- Communication Skills In Agile World Part1 - Model
- Communication Skills In Agile World Part2 - Verbal vs. Nonverbal
- Communication Skills In Agile World Part3 - Learned Patterns
- Communication Skills In Agile World Part4 - Key Skills
- Communication Skills In Agile World Part5 - Key Skills
- Communication Skills In Agile World Part6 - Conflict Resolution
- Communication Skills In Agile World Part7 - Tuckman's 5 Stages
Module 7: Using Agile Outside Software Development
- Using Agile Outside Software Development-Part1
- Using Agile Outside Software Development-Part2
Module 8: Case Studies Of Transitioning to Agile
- Case Studies Of Transitioning To Agile-Part1
- Case Studies Of Transitioning To Agile Part2 - Procurement
- Case Studies Of Transitioning To Agile Part3 - In an Agile World
- Case Studies Of Transitioning To Agile Part4 - Measurements
Module 9: Critique Of Agile
- Critique Of Agile-Part1
- Critique Of Agile-Part2
Module 10: Review Of Agile
- Review Of Agile-Part1
- Review Of Agile-Part2
- Review Of Agile-Part3
- Course Conclusion
Cisco 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 Course Content
Module 1: Configuring Ethernet LANs
- Introduction
- Ethernet LAN Fundamentals- Part 1
- Ethernet LAN Fundamentals- Part 2
- Implementing Virtual LANs- Part 1
- Implementing Virtual LANs- Part 2
- Using VLAN Trunking- Part 1
- Using VLAN Trunking- Part 2
- Understanding Spanning Tree Protocol- Part 1
- Understanding Spanning Tree Protocol- Part 2
- Understanding Spanning Tree Protocol- Part 3
- Spanning Tree Implementation- Part 1
- Spanning Tree Implementation- Part 2
- Spanning Tree Implementation- Part 3
- Security Management- Part 1
- Security Management- Part 2
- Security Management- Part 3
- Security Management- Part 4
Module 2: Configuring IPv4 Routing Protocols
- Understanding OSPF- Part 1
- Understanding OSPF- Part 2
- Understanding OSPF- Part 3
- Implementing OSPF- Part 1
- Implementing OSPF- Part 2
- Implementing OSPF- Part 3
- Implementing OSPF- Part 4
- Understanding EIGRP- Part 1
- Understanding EIGRP- Part 2
- Understanding EIGRP- Part 3
- Implementing EIGRP- Part 1
- Implementing EIGRP- Part 2
- Troubleshooting IPv4- Part 1
- Troubleshooting IPv4- Part 2
- Troubleshooting IPv4- Part 3
Module 3: Wide Area Networks
- Implementing Point-To-Point WANs- Part 1
- Implementing Point-To-Point WANs- Part 2
- Implementing Point-To-Point WANs- Part 3
- Private WANs With Ethernet And MPLS- Part 1
- Private WANs With Ethernet And MPLS- Part 2
- Private WANs With Ethernet And MPLS- Part 3
- Private WANs With Internet VPNs- Part 1
- Private WANs With Internet VPNs- Part 2
- Private WANs With Internet VPNs- Part 3
Module 4: IPv4 Services
- Basic Access Control Lists- Part 1
- Basic Access Control Lists- Part 2
- Advanced Access Control Lists- Part 1
- Advanced Access Control Lists- Part 2
- Quality Of Service- Part 1
- Quality Of Service- Part 2
Module 5: IPv4 Routing And Troubleshooting
- IPv4 Routing In The LAN- Part 1
- IPv4 Routing In The LAN- Part 2
- Implementing HSRP- Part 1
- Implementing HSRP- Part 2
- Troubleshooting IPv4 Routing- Part 1
- Troubleshooting IPv4 Routing- Part 2
Module 6: IPv6 Routing
- IPv6 Implementation And Routing Basics- Part 1
- IPv6 Implementation And Routing Basics- Part 2
- IPv6 Implementation And Routing Basics- Part 3
- IPv6 Implementation And Routing Basics- Part 4
- Implementing OSPF For IPv6- Part 1
- Implementing OSPF For IPv6- Part 2
- Implementing EIGRP For IPv6- Part 1
- Implementing EIGRP For IPv6- Part 2
- IPv6 Access Control Lists- Part 1
- IPv6 Access Control Lists- Part 2
Module 7: Cloud Based Networking
- Overview Of Cloud Computing- Part 1
- Overview Of Cloud Computing- Part 2
- Conclusion
Cisco 100-105 ICND1 Interconnecting Cisco Network Devices Part 1 Course Content
Module 1: Networking Fundamentals
- Introduction
- Introduction To TCPIP Networking- Part 1
- Introduction To TCPIP Networking- Part 2
- Introduction To TCPIP Networking- Part 3
- Introduction To TCPIP Networking- Part 4
- Ethernet LAN Fundamentals- Part 1
- Ethernet LAN Fundamentals- Part 2
- Ethernet LAN Fundamentals- Part 3
- Wide Area Networks- Part 1
- Wide Area Networks- Part 2
- IPv4 Addressing And Routing Fundamentals- Part 1
- IPv4 Addressing And Routing Fundamentals- Part 2
- IPv4 Addressing And Routing Fundamentals- Part 3
- TCPIP Transport And Applications- Part 1
- TCPIP Transport And Applications- Part 2
Module 2: Basic Ethernet LAN Implementation
- Command Line Essentials- Part 1
- Command Line Essentials- Part 2
- Command Line Essentials- Part 3
- Ethernet LAN Switching
- Managing Ethernet Switches- Part 1
- Managing Ethernet Switches- Part 2
- Configuring Switch Interfaces
Module 3: Designing Ethernet LANS
- Understanding LAN Design Options- Part 1
- Understanding LAN Design Options- Part 2
- Understanding LAN Design Options- Part 3
- Implementing And Configuring Ethernet VLANS- Part 1
- Implementing And Configuring Ethernet VLANS- Part 2
Module 4: Understanding IPv4
- IPv4 Subnetting- Part 1
- IPv4 Subnetting- Part 2
- IPv4 Subnetting- Part 3
- IPv4 Subnetting- Part 4
- Analyzing Classful IPv4 Networks- Part 1
- Analyzing Classful IPv4 Networks- Part 2
- Analyzing Classful IPv4 Networks- Part 3
- Analyzing Subnet Masks- Part 1
- Analyzing Subnet Masks- Part 2
- Analyzing Existing Subnets
Module 5: Working With Cisco Routers
- Implementing IPv4- Part 1
- Implementing IPv4- Part 2
- Configuring IPv4 Address And Static Routes- Part 1
- Configuring IPv4 Address And Static Routes- Part 2
- Configuring IPv4 Address And Static Routes- Part 3
- Using Dynamic Routing Protocols- Part 1
- Using Dynamic Routing Protocols- Part 2
- Configuring IPv4 Hosts- Part 1
- Configuring IPv4 Hosts- Part 2
Module 6: IPv4 Design And Troubleshooting
- Designing IP Subnets- Part 1
- Designing IP Subnets- Part 2
- Using VLAN- Part 1
- Using VLAN- Part 2
- Troubleshooting IPv4
Module 7: IPv4 Services
- Access Control Lists- Part 1
- Access Control Lists- Part 2
- Access Control Lists- Part 3
- Access Control Lists- Part 4
- Network Address Translation- Part 1
- Network Address Translation- Part 2
Module 8: Implementing IPv6
- IPv6 Fundamentals- Part 1
- IPv6 Fundamentals- Part 2
- IPv6 Fundamentals- Part 3
- IPv6 Fundamentals- Part 4
- IPv6 Addressing And Subnetting- Part 1
- IPv6 Addressing And Subnetting- Part 2
- Implementing IPv6- Part 1
- Implementing IPv6- Part 2
- Implementing IPv6- Part 3
- Implementing IPv6- Part 4
- Course Conclusion
Cisco 210-060 CICD: Implementing Cisco Collaboration Devices Course Content
Module 1: Introducing Cisco Collaboration Architecture
- Course Introduction
- Introducing Cisco Collaboration Architecture Part 1
- Introducing Cisco Collaboration Architecture Part 2
- Small To Mid-Size Business Part 1
- Small To Mid-Size Business Part 2
- Small To Mid-Size Business Part 3
- Cisco Unified Communications Manager Part 1
- Cisco Unified Communications Manager Part 2
- Cisco Unified Communications Manager Part 3
- Cisco Unified Connection
- Lab Introduction
Module 2: Telephony And Call Routing
- Telephony 101 Part 1
- Telephony 101 Part 2
- Telephony 101 Part 3
- Telephony 101 Part 4
- Telephony 101 Part 5
- Telephony 101 Part 6
- Call Routing 101 Part 1
- Call Routing 101 Part 2
- VoIP Call Routing 101
- Call Routing With DNS
- Deployment Scenarios Part 1
- Deployment Scenarios Part 2
- Deployment Scenarios Part 3
- Gateway Call Routing Basics Part 1
- Gateway Call Routing Basics Part 2
- Gateway Call Routing Basics Part 3
- Gateway Call Routing Basics Part 4
- Configuring The Gateway Lab Part 1
- Configuring The Gateway Lab Part 2
Module 3: Preparing The Network And Phone Behavior
- Preparing The Network For Voices Part 1
- Preparing The Network For Voices Part 2
- IP Phone Behavior
- Configuring The LAN Lab
- Standing Up The Platform Lab
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 1
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 2
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 3
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 4
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 5
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 6
- Using OVA Templates To Deploy CUCM-CUC-IMP Lab Part 7
- Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 1
- Using OVA Templates To Deploy Prime Collaboration Provisioning Lab Part 2
Module 4: CUCM Administration Interfaces
- CUCM Administration Interfaces Part 1
- CUCM Administration Interfaces Part 2
- CUCM Stand Up
- CUCM Stand Up Lab
- End User Interfaces
- End User Configuration Lab
- AD Integration Lab
- End Point Implementation Part 1
- End Point Implementation Part 2
- IMP Integration Lab
- CUC Integration Lab Part 1
- CUC Integration Lab Part 2
- IP Communicator Lab
- Profiles And Templates Lab
- CUCME Phone Configuration
- Configuring CUCME Lab Part 1
- Configuring CUCME Lab Part 2
- CUCM End-User Portal Lab
- Configuring CUCM Phones From Scratch
- Configuring Cisco SX20 Codec Part 1
- Configuring Cisco SX20 Codec Part 2
Module 5: Call Configuration
- Advanced Call Coverage Part 1
- Advanced Call Coverage Part 2
- Advanced Call Coverage Part 3
- Call Coverage Lab Part 1
- Call Coverage Lab Part 2
- Call Coverage Lab Part 3
- Call Coverage Lab Part 4
- Call Coverage Lab Part 5
- Calling Constrictions And COS Part 1
- Calling Constrictions And COS Part 2
- Implementing Class Of Control Lab Part 1
- Implementing Class Of Control Lab Part 2
- Connecting To The PSTN Part 1
- Configuring Voice Gateway Features Lab Part 1
- Configuring Voice Gateway Features Lab Part 2
- Configuring Voice Gateway Features Lab Part 3
- Connecting To The PSTN Part 2
- PSTN Calling And Digit Manipulation Lab Part 1
- PSTN Calling And Digit Manipulation Lab Part 2
- PSTN Dial Plan Configuration Lab Part 1
- PSTN Dial Plan Configuration Lab Part 2
- Course Conclusion
Java Programming Course Content
Module 1: Foundations (Beginner)
- Introduction
- History Of Computer Programming
- Categories Of Programming Languages
- Condensed History Of Java
- Software Life Cycle
Module 2: Terms and Tools (Beginner)
- Programming General Terms
- Downloading And Installing Java
- Programmer Editors And Integrated Development Environments Part 1
- Programmer Editors And Integrated Development Environments Part 2
- Installing Eclipse
Module 3: Identifiers, Variables, and Data Types (Beginner)
- Understanding Identifiers
- Unicode And Java Syntax
- Variables Constants And Literals
- Field Member And Variable Components
- Primitive Data Types Part 1
- Primitive Data Types Part 2
- Primitive Data Types Part 3
- Operators Part 1
- Operators Part 2
- Escape Characters
- Type Conversions And Type Casting
- Java Reserved Words
- Commenting
- Abstract Data Types
Module 4: Object-Orientated Programming (Intermediate)
- Object Oriented Programming
- What Is An Object?
- Eclipse Lab
Module 5: Predefined Classes (Intermediate)
- String Class Part 1
- String Class Part 2
- String Class Part 3
- Date Class
- Simple Date Format Class
- Scanner Class Part 1
- Scanner Class Part 2
- Decimal Format Class Part 1
- Decimal Format Class Part 2
- JFrame Class
- Container Class Part 1
- Container Class Part 2
Module 6: Methods Part 1 (Intermediate)
- Methods
- Naming Methods
- Implementation Method Hiding
- Method Variables And Literals
- Invoking A Method
Module 7: Methods Part 2 (Advanced)
- Methods And Multiple Arguments
- Methods Lab
- Method Overloading
Module 8: Constructors (Advanced)
- Creating Objects
- Constructor Declarations
- Overloading And Default Constructors
Module 9: Control of Flow (Advanced)
- While Loop
- While Statement
- For Loop
Module 10: Arrays and Exceptions (Advanced)
- Array Structures
- Constants And Array Sizes Part 1
- Constants And Array Sizes Part 2
- Exceptions And The Try Catch Block
- Conclusion
Cisco 210-065 CIVND: Implementing Cisco Video Network Devices Course Content
Module 1: Pre-Course Chapter 1
- Course Introduction
- Civnd Intro Part 1
- Civnd Intro Part 2
- The Big Picture
Module 2: Pre-Course Chapter 2
- All About Video Part 1
- All About Video Part 2
- All About Video Part 3
- All About Video Part 4
Module 3: Cisco Video And Content Delivery
- Cisco Video And Content Delivery Part 1
- Cisco Video And Content Delivery Part 2
- Cisco Video And Content Delivery Part 3
Module 4: Cisco Video Surveillance
- Cisco Video Surveillance Part 1
- Cisco Video Surveillance Part 2
Module 5: Cisco Collaboration
- Cisco Collaboration Part 1
- Cisco Collaboration Part 2
- Cisco Collaboration Part 3
Module 6: Central Collaboration Endpoint Control
- Central Collaboration Endpoint Control
Module 7: Unified IP Phones, Desk Endpoints And Cisco Jabber
- Unified IP Phones Desk Endpoints And Cisco Jabber
Module 8: Configuring Unified IP Phones And Cisco Jabber
- Configuring Unified IP Phones And Cisco Jabber Part 1
- Configuring Unified IP Phones And Cisco Jabber Part 2
Module 9: Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 1
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 2
- Operating And Troubleshooting Cisco Unified IP Phone And Cisco Jabber Part 3
Module 10: Cisco Telepresence Endpoints Installation And Characteristics
- Cisco Telepresence Endpoints Installation And Characteristics Part 1
- Cisco Telepresence Endpoints Installation And Characteristics Part 2
- Cisco Telepresence Endpoints Installation And Characteristics Part 3
- Cisco Telepresence Endpoints Installation And Characteristics Part 4
Module 11: Configuring Cisco Telepresence CTS And Cisco DX650 Endpoints
- Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 1
- Configuring Cisco Telepresence CTs And Cisco D X650 Endpoints Part 2
Module 12: Configuring Cisco Telepresence TC Endpoints
- Configuring Cisco Telepresence TC Endpoints Part 1
- Configuring Cisco Telepresence TC Endpoints Part 2
- Configuring Cisco Telepresence TC Endpoints Part 3
- Configuring Cisco Telepresence TC Endpoints Part 4
- Configuring Cisco Telepresence TC Endpoints Part 5
- Configuring Cisco Telepresence TC Endpoints Part 6
Module 13: Operating And Troubleshooting Cisco Telepresence Endpoints
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 1
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 2
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 3
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 4
- Operating And Troubleshooting Cisco Telepresence Endpoints Part 5
Module 14: Cisco Multipoint Conferencing Solutions
- Cisco Multipoint Conferencing Solutions Part 1
- Cisco Multipoint Conferencing Solutions Part 2
- Cisco Multipoint Conferencing Solutions Part 3
Module 15: Configuring And Monitoring Cisco Multipoint
- Configuring And Monitoring Cisco Multipoint Part 1
- Configuring And Monitoring Cisco Multipoint Part 2
Module 16: Cisco DMP Characteristics And Installation
- Cisco DMP Characteristics And Installation Part 1
- Cisco DMP Characteristics And Installation Part 2
Module 17: Configuring Cisco DMPs
- Configuring Cisco DMP's
Module 18: Managing Cisco Edge 340 DMPs
- Managing Cisco Edge340 DMPs
- Course Conclusion
Module 19: Labs
- Basic Switch Port Configuration
- Dashboard Options Part 1
- Dashboard Options Part 2
- Preparations For Endpoints Part 1
- Preparations For Endpoints Part 2
- Preparations For Endpoints Part 3
- Preparations For Endpoints Part 4
- Basic Troubleshooting
- Setup TC Endpoint Part 1
- Setup TC Endpoint Part 2
- Setup TC Endpoint Part 3
- Setup TC Endpoint Part 4
Microsoft Word 2016 Course Content
Word 2016 Basic
- Introduction To Word Interface Part1
- Introduction To Word Interface Part2
- Introduction To Word Interface Part3
- View
- Typing Part1
- Typing Part2
- Typing Part3
- Typing Part4
- Resume Part1
- Resume Part2
- Bullet List
Word 2016 Intermediate
- Menus And Keyboard Shortcuts Part1
- Menus And Keyboard Shortcuts Part2
- Tabs
- Tables Part1
- Tables Part2
- Tables Part3
- Styles Part1
- Styles Part2
- Styles Part3
- Page Formatting Part1
- Page Formatting Part2
- Page Formatting Part3
Word 2016 Advanced
- Creating An Outline
- Inserting Images Part1
- Inserting Images Part2
- Tracking Changes
- Mail Merge Part1
- Mail Merge Part2
- Large Documents Part1
- Large Documents Part2
- Other Word Functions Part1
- Other Word Functions Part2
- Document Comparison
Microsoft PowerPoint 2016 Course Content
Basic Microsoft PowerPoint 2016
- What Is PowerPoint Part 1
- What Is PowerPoint Part 2
- New Presentation
- Viewing Presentation
- Inserting Transitions
- More Visual Designs Part 1
- More Visual Designs Part 2
- More Visual Designs Part 3
- More Visual Designs Part 4
- Notes
Intermediate Microsoft PowerPoint 2016
- Visual Designs With Logos And Animation Part1
- Visual Designs With Logos And Animation Part2
- Visual Designs With Logos And Animation Part3
- Visual Designs With Logos And Animation Part4
- Visual Designs With Logos And Animation Part5
- Exit Animation Part1
- Exit Animation Part2
- Exit Animation Part3
- Navigation Buttons
- Layout Options Part1
- Layout Options Part2
Advanced Microsoft PowerPoint 2016
- Master Pages Part1
- Master Pages Part2
- Software Simulation Part1
- Software Simulation Part2
- Setting Pictures To Music
- Advanced Animation Techniques
- Triggers
- Motion Path Animation
- Video In PowerPoint
- PowerPoint Review Part1
- PowerPoint Review Part2
- Additional Options
Microsoft Outlook 2016 Course Content
Outlook 2016 Basic
- Introduction Part 1
- Introduction Part 2
- Options For Displaying Email Messages
- Create And Send An Email
- Receive An Email
- Calendar Part 1
- Calendar Part 2
- Contacts Part 1
- Contacts Part 2
- Tasks
Outlook 2016 Intermediate
- Folder Structure Part
- Folder Structure Part 2
- Multiple Email Accounts Part 1
- Multiple Email Accounts Part 2
- Create A New Email Part 1
- Create A New Email Part 2
- Signatures
- Calendars Part 1
- Calendars Part 2
- Contacts
- Outlook Settings Part 1
- Outlook Settings Part 2
Outlook 2016 Advanced
- One Note Introduction Part 1
- One Note Introduction Part 2
- One Note And PowerPoint
- One Note And Word
- One Note And Outlook
- Sharing Information
- OneNote And Mobile Devices
- Additional Elements Part 1
- Additional Elements Part 2
Microsoft Excel 2016 Course Content
Excel 2016 Basic
- Tabs And Ribbons Part1
- Tabs And Ribbons Part2
- Cells Part1
- Cells Part2
- Cells Part3
- Cells Part4
- Calculations Part1
- Calculations Part2
- Calculations Part3
- Printing Part1
- Printing Part2
Excel 2016 Intermediate
- Menus And Keyboard Shortcuts Part1
- Menus And Keyboard Shortcuts Part2
- Menus And Keyboard Shortcuts Part3
- Tabs Part1
- Tabs Part2
- Formulas And Calculations Part1
- Formulas And Calculations Part2
- Formulas And Calculations Part3
- Formulas And Calculations Part4
- Importing Data Part1
- Importing Data Part2
- Invoices
Excel 2016 Advanced
- Advanced Invoice Part1
- Advanced Invoice Part2
- Advanced Invoice Part3
- Advanced Invoice Part4
- Number Crunching
- Creating A Pivot Table From Scratch
- Smaller Excel Components Part1
- Smaller Excel Components Part2
- Smaller Excel Components Part3
Microsoft Access 2016 Course Content
Access 2016 Basic
- Introduction Part1
- Introduction Part2
- Elements Part1
- Elements Part2
- Reviewing Data
- Queries Part1
- Queries Part2
- Tracking Time Part1
- Tracking Time Part2
- Tracking Time Part3
- Design Work With Forms
Access 2016 Intermediate
- Relationships Part1
- Relationships Part2
- Changing Information
- Loading Tables
- Relating Invoices Part1
- Relating Invoices Part2
- Relating Invoices Part3
- Relating Invoices Part4
- Time Entry Form
Access 2016 Advanced
- Queries Part1
- Queries Part2
- Queries Part3
- Queries Part4
- Reports Based On Queries
- Adding Additional Information
- Update Query Part1
- Update Query Part2
- Creating A Report From Scratch Part1
- Creating A Report From Scratch Part2
- Creating A Report From Scratch Part3
Cisco 210-260 IINS: Implementing Cisco Network Security Course Content
Module 1: Network Review
- Course Introduction
- Network Review Part 1
- Network Review Part 2
- Network Review Part 3
- Network Review Part 4
Module 2: Terminology And Fundamentals
- Terminology And Fundamentals Part 1
- Terminology And Fundamentals Part 2
- Terminology And Fundamentals Part 3
- Terminology And Fundamentals Part 4
- Terminology And Fundamentals Part 5
- Terminology And Fundamentals Part 6
- Terminology And Fundamentals Part 7
Module 3: PKI And Cryptography
- Pki And Cryptography Part 1
- Pki And Cryptography Part 2
Module 4: AAA
- AAA Part 1
- AAA Part 2
- AAA Part 3
Module 5: Bring Your Own Device
- Bring Your Own Device Part 1
- Bring Your Own Device Part 2
- Bring Your Own Device Part 3
Module 6: Secure Access
- Secure Access Part 1
- Secure Access Part 2
- Secure Access Part 3
- Secure Access Demo
Module 7: VPNs
- VPN Concepts Part 1
- VPN Concepts Part 2
- Remote Access VPNs Part 1
- Remote Access VPNs Part 2
- Site To Site VPNs
Module 8: Secure Routing And Switching
- Secure Routing And Switching Part 1
- Secure Routing And Switching Part 2
- Secure Routing And Switching Demo 1
- Secure Routing And Switching Demo 2
- Layer2 Attacks Part 1
- Layer2 Attacks Part 2
- Layer2 Attacks Part 3
- Mitigation Part 1
- Mitigation Part 2
Module 9: Firewalls
- Firewall Technologies Part 1
- Firewall Technologies Part 2
- Implementing Nat Part 1
- Implementing Nat Part 2
- Zone Based Firewall
- Firewall Features On The ASA Part 1
- Firewall Features On The ASA Part 2
- Firewall Features On The ASA Part 3
Module 10: Intrusion Protection System (IPS)
- Intrusion Protection System Part 1
- Intrusion Protection System Part 2
Module 11: Content And Endpoint Security
- Content And Endpoint Security Part 1
- Content And Endpoint Security Part 2
- Course Conclusion
Cisco 200-355: Implementing Cisco Wireless Network Fundamentals Course Content
Module 1: Wireless Basics
- Course And Instructor Introduction
- Wireless Basics Part 1
- Wireless Basics Part 2
- Wireless Basics Part 3
- Wireless Basics Part 4
- Wireless Basics Part 5
- Wireless Basics Part 6
Module 2: Wireless Standards
- Wireless Standards Part 1
- Wireless Standards Part 2
- Wireless Standards Part 3
- Wireless Standards Part 4
- Wireless Standards Part 5
Module 3: Wireless Signals
- Wireless Signals Part 1
- Wireless Signals Part 2
Module 4: Antennas
- Antennas Part 1
- Antennas Part 2
- Antennas Part 3
Module 5: Topologies
- Topologies Part 1
- Topologies Part 2
Module 6: Frame Types
- Frame Types Part 1
- Frame Types Part 2
- Frame Types Part 3
Module 7: Planning Coverage
- Planning Coverage Part 1
- Planning Coverage Part 2
- Planning Coverage Part 3
Module 8: Architectures
- Architectures Part 1
- Architectures Part 2
- Architectures Part 3
Module 9: Stand Alone And Cloud Deployments
- Stand Alone And Cloud Deployments Part 1
- Stand Alone And Cloud Deployments Part 2
Module 10: Controller Based Deployment
- Controller Based Deployment Part 1
- Controller Based Deployment Part 2
- Controller Based Deployment Part 3
Module 11: Controller Discovery
- Controller Discovery Part 1
- Controller Discovery Part 2
- Controller Discovery Part 3
Module 12: Roaming
- Roaming Part 1
- Roaming Part 2
Module 13: Radio Resource Management
- Radio Resource Management Part 1
- Radio Resource Management Part 2
- Radio Resource Management Part 3
Module 14: Wireless Security
- Wireless Security Part 1
- Wireless Security Part 2
- Wireless Security Part 3
Module 15: WLAN Configuration
- WLAN Configuration
Module 16: Guest Networks
- Guest Networks
Module 17: Client Connectivity
- Client Connectivity Part 1
- Client Connectivity Part 2
Module 18: Managing Wireless
- Managing Wireless Part 1
- Managing Wireless Part 2
Module 19: Interference
- Interference Part 1
- Interference Part 2
Module 20: Troubleshooting
- Troubleshooting Part 1
- Troubleshooting Part 2
- Course Conclusion
Microsoft 70-488: Developing Microsoft SharePoint Server 2013 Core Solutions Course Content
Module 1: Overview of SharePoint Development
- Course Introduction
- Introduction To SharePoint Development Part1
- Introduction To SharePoint Development Part2
- Introduction To SharePoint Development Part3
- Choosing A Development Approach Part1
- Choosing A Development Approach Part2
- SharePoint 2013 Deployment And Execution Models Part1
- SharePoint 2013 Deployment And Execution Models Part2
- SharePoint 2013 Deployment And Execution Models Part3
Module 2: Working With Objects, List, And Libraries
- Introduction To The SharePoint Object Hierarchy Part1
- Introduction To The SharePoint Object Hierarchy Part2
- Working With Sites And Webs Part1
- Working With Sites And Webs Part2
- Working With Sites And Webs Part3
- Working With Sites And Webs Part4
- Managing Execution Contexts Part1
- Managing Execution Contexts Part2
- Using Lists And Library Objects Part1
- Using Lists And Library Objects Part2
- Querying And Retrieving Data From Lists Part1
- Querying And Retrieving Data From Lists Part2
- Querying And Retrieving Data From Lists Part3
- Working With Large Lists Part1
- Working With Large Lists Part2
Module 3: Working With Features and Solutions
- Introduction To Features
- Introduction To Solutions
- Creating And Configuring Features And Solutions Part1
- Creating And Configuring Features And Solutions Part2
- Creating And Configuring Features And Solutions Part3
- Creating And Configuring Features And Solutions Part4
- Using Sandboxed Solutions
Module 4: Developing Server Side Code
- Web Parts
- Event Receivers Part1
- Event Receivers Part2
- Timer Jobs
- Storing Configuration Data Part1
- Storing Configuration Data Part2
Module 5: Managing Authentication And Authorization
- Introduction To Identity Management
- Managing Permissions
- Configuring Forms Based Authentication
- Working With Custom Authentication Part1
- Working With Custom Authentication Part2
- Working With Custom Authentication Part3
Module 6: Client Side SharePoint Development
- Using The CSOM For Managed Code Part1
- Using The CSOM For Managed Code Part2
- Using The CSOM For Managed Code Part3
- Using The CSOM For JavaScript
- Using The Rest API With JavaScript Part1
- Using The Rest API With JavaScript Part2
Module 7: Developing And Managing Apps
- Overview Of Apps For SharePoint Part1
- Overview Of Apps For SharePoint Part2
- Developing Apps For SharePoint
- Overview Of Remote Hosted Apps
- Configuring Remote Hosted Apps
- Developing Remote Hosted Apps Part1
- Developing Remote Hosted Apps Part2
- Publishing And Distributing Apps Part1
- Publishing And Distributing Apps Part2
- Publishing And Distributing Apps Part3
Module 8: Using Workflows To Automate Business Processes
- Overview Of Workflows In SharePoint 2013
- Building Workflows Part1
- Building Workflows Part2
- Developing Workflows Part1
- Developing Workflows Part2
Module 9: Customizing SharePoint Interfaces
- Working With Custom Actions
- Using Client-Side Interface Components
- Customizing The SharePoint List User Interface
- Course Conclusion
Microsoft 70-489: Developing Sharepoint 2013 Advanced Solutions Course Content
Module 1: Introduction To Creating Efficient Apps For Sharepoint
- Course And Instructor Introduction
- Apps For SharePoint Part1
- Apps For SharePoint Part2
- Communication From Apps To SharePoint Part1
- Communication From Apps To SharePoint Part2
- Authentication And Authorization Part1
- Authentication And Authorization Part2
- Designing Apps For Performance Part1
- Designing Apps For Performance Part2
- Designing Apps For Performance Part3
Module 2: Working With Managed Metadata Solutions
- Overview Of Managed Metadata Part1
- Overview Of Managed Metadata Part2
- Configuring Managed Metadata Term Sets Part1
- Configuring Managed Metadata Term Sets Part2
- Configuring Managed Metadata Term Sets Part3
- Configuring Managed Metadata Term Sets Part4
- Working With Managed Metadata Fields Part1
- Working With Managed Metadata Fields Part2
Module 3: Working With The Search Service
- Overview Of The SharePoint 2013 Search Service Part1
- Overview Of The SharePoint 2013 Search Service Part2
- Overview Of The SharePoint 2013 Search Service Part3
- Building Search Queries
- Using Code To Execute Search Queries Part1
- Using Code To Execute Search Queries Part2
- Customizing Query Processing Part1
- Customizing Query Processing Part2
- Customizing Search Results Part1
- Customizing Search Results Part2
- Customizing Content Processing Part1
- Customizing Content Processing Part2
Module 4: Implementing Enterprise Content Management
- Working With eDiscovery Part1
- Working With eDiscovery Part2
- Working With Content Management Part1
- Working With Content Management Part2
- Handling Automated Records Management Part1
- Handling Automated Records Management Part2
- Handling Automated Records Management Part3
Module 5: Developing Publishing Sites
- Introduction To Developing Publishing Solutions
- Developing Page Components For Web Content Publishing Part1
- Developing Page Components For Web Content Publishing Part2
- Developing Page Components For Web Content Publishing Part3
- Website Structure And Navigation Part1
- Website Structure And Navigation Part2
- Website Structure And Navigation Part3
- Publishing Content
- Publishing To Mobile Devices
- Optimizing For Search Engines Part1
- Optimizing For Search Engines Part2
- Optimizing Performance And Availability Part1
- Optimizing Performance And Availability Part2
Module 6: Interacting With Business Connectivity Services
- Overview Of Business Connectivity Services
- Creating BDC Models
- Creating An App Scoped External Content Type
- Conclusion
Information Technology Infrastructure Library (ITIL®) - Service Operations Course Content
Module 1: Service Operation Introduction
- Introduction
- Syllabus Exam Overview And Testing Tips
- Service Operation Introduction Part 1
- Service Operation Introduction Part 2
- Service Operation Introduction Part 3
- Service Operation Introduction Part 4
- Service Operation Introduction Part 5
Module 2: Service Management As a Practice
- Service Management As A Practice Part 1
- Service Management As A Practice Part 2
- Service Management As A Practice Part 3
Module 3: Service Operation Principles
- Service Operation Principles Part 1
- Service Operation Principles Part 2
- Service Operation Principles Part 3
- Service Operation Principles Part 4
Module 4: Service Operation Process
- Service Operation Process Part 1
- Service Operation Process Part 2
- Service Operation Process Part 3
- Incident Management Part 1
- Incident Management Part 2
- Problem Management
- Request Fulfillment
- Access Management
Module 5: Common Service Operation Activities
- Common Service Operation Activities Part 1
- Common Service Operation Activities Part 2
- Common Service Operation Activities Part 3
- Common Service Operation Activities Part 4
Module 6: Organizing For Service Operation
- Organizing For Service Operation Part 1
- Organizing For Service Operation Part 2
- Organizing For Service Operation Part 3
- Roles Part 1
- Roles Part 2
Module 7: Technology Considerations
- Technology Considerations
Module 8: Service Operation
- Implementation Of Service Operation
- Challenges Risks And Critical Success Factors
- Conclusion
CSS Essentials Course Content
Module 1: Introduction to CSS3
- Introduction
- The Advantages Of Style Sheets
- Discovering Cascading Style Sheets
- CSS Structure And Syntax Part1
- CSS Structure And Syntax Part2
- CSS Structure And Syntax Part3
- Using Different Kinds Of Style Sheets
Module 2: Understanding The CSS Box Model
- What Is The Box Model
- Height And Width
- Margin And Padding
- Working With Borders
Module 3: Working With Page Layouts
- Positioning Elements
- Floating Elements
- Controlling Display And Visibility
Module 4: Using Colors And Backgrounds
- Working With Colors
- Working With Backgrounds
Module 5: Web Typography
- Understanding Fonts
- Working With Text Properties
- Text And Shadow Effects Part1
- Text And Shadow Effects Part2
Module 6: Links, Lists, And Tables
- Working With Lists
- Using Navigation Bars
- Working With Tables Part1
- Working With Tables Part2
Module 7: Dynamic CSS3 Properties
- Using Transforms Part1
- Using Transforms Part2
- Using Transitions
- Using Animations
- CSS Project Part1
- CSS Project Part2
- Course Conclusion
Javascript Essentials Course Content
Module 1: Introduction To Javascript
- Introduction
- Java Script From The Dawn Of The Web Part 1
- Java Script From The Dawn Of The Web Part 2
- Getting The Right Tools
- Creating Your First JavaScript Program Part 1
- Creating Your First JavaScript Program Part 2
Module 2: Core Concepts And Syntax
- The Structure And Content Part 1
- The Structure And Content Part 2
- Naming And Casing Best Practices
- Understanding Variables Part 1
- Understanding Variables Part 2
- Understanding Variables Part 3
- Working With Operators Part 1
- Working With Operators Part 2
- Working With Loops Part 1
- Working With Loops Part 2
- Creating Functions Part 1
- Creating Functions Part 2
- Understanding Types And Objects Part 1
- Understanding Types And Objects Part 2
- Understanding Types And Objects Part 3
- Understanding Types And Objects Part 4
- Understanding Types And Objects Part 5
Module 3: Getting A Handle On The DOM
- Introduction To The HTML Document Object Model
- Accessing DOM Elements
- Changing DOM Elements
- Creating DOM Elements
- Responding To Events Part 1
- Responding To Events Part 2
Module 4: Working With Libraries
- Introduction To Libraries
- Installing And Using jQuery Part 1
- Installing And Using jQuery Part 2
- Modifying Web Pages Using jQuery Part 1
- Modifying Web Pages Using jQuery Part 2
- Conclusion
HTML Essentials Course Content
Module 1: What Is HTML?
- Introduction
- What Is HTML
- HTML Resources
- Choosing A Code Editor
- The Relationship Of HTML, CSS And JavaScript
Module 2: The Structure And Components
- The HTML Document
- DOCTYPE Declaration
- The Head
- The Body
- The Footer
Module 3: Formatting The Page
- Using Headings
- Creating Paragraphs
- Emphasizing Text
- Controlling Line Breaks And Whitespace
- Creating Lists
- Working With Tables
Module 4: Structuring Content
- Why Structure Matters
- Controlling Document Outlines
- Structure Elements Part 1
- Structure Elements Part 2
Module 5: Adding Links, Images And Other Media
- Working With Links Part 1
- Working With Links Part 2
- Working With Images Part 1
- Working With Images Part 2
Module 6: Styling Web Pages
- HTML And CSS
- Creating Inline Styles
- Controlling Typography
- Adding Color
- Externalizing Styles
Module 7: Creating Your Own Website
- Creating A Website Part 1
- Creating A Website Part 2
- Conclusion
Cyber Security Awareness and Prevention Course Content
Module 1: Cyber Security Awareness and Prevention
- Course Introduction
- Where We Are Today
- Areas Of Protection
- The Connection - Part 1
- The Connection - Part 2
- Network Protection
- Browsing Blunders - Part 1
- Browsing Blunders - Part 2
- Settings - Part 1
- Settings - Part 2
- Settings - Part 3
- Settings - Part 4
- Cookies
- Browsing Tips And Tricks
- Email Can't Hurt You Right - Part 1
- Email Can't Hurt You Right - Part 2
- Viruses - Part 1
- Viruses - Part 2
- Viruses - Part 3
Module 2: Managing Mobile Device Security
- Managing Mobile Device Security-Part1
- Managing Mobile Device Security-Part2
- Secure Access
- Secure Access iPhone Demo
- Secure Access Android Demo
- Protect The Digital
- Protect The Digital Android Demo
- Protect The Digital iPhone Demo
- Manage App Access
- Manage App Access iPhone Demo
- Manage App Access Android Demo
- Stay Up To Date
- Stay Up To Date Android Demo
- Stay Up To Date iPhone Demo
- Use Other Tools To Help
- Prepare For The Worst
- Prepare For The Worst-Android Demo
- Prepare For The Worst-iPhone Demo
- Best Practices
- Course Conclusion
Microsoft 70-486: Developing ASP.NET MVC Web Applications Course Content
Module 1: Introduction to Web Development
- Course And Instructor Introduction
- ASP.Net Using Visual Studio
- ASP.Net Tools In Visual Studio
- ASP.Net Data Validation-Part1
- ASP.Net Data Validation-Part2
- ASP.Net Web User Control
- ASP.Net Creating Web Service
- ASP.Net Web Service Explained
- Classes Defined
Module 2: C Sharp
- Intro To C Sharp
- Functions In C Sharp
- If Statements In C Sharp
- Static Variables In C Sharp
- Loops In C Sharp
- Debugging In C Sharp
- Introduction To Windows Forms In C Sharp
- More Windows Forms In C Sharp
- Windows Forms Controls In C Sharp
- Object Oriented Programming In C Sharp
- Constructors And Destructors In C Sharp
- Members Of A Class In C Sharp
- Class Inheritance In C Sharp
- Abstract Classes In C Sharp
- Enumerations In C Sharp
- Exception Handling In C Sharp
- Creating XML Documents In C Sharp
- Putting It All Together In A File In C Sharp
Module 3: HTML and CSS Comprehensive Review
- Intro To HTML
- HTML Markup
- Lists In HTML
- Links In HTML
- Tables In HTML
- Forms In HTML
- Intro To CSS
- CSS Color Properties
Module 4: Intro to SQL Server
- Databases Defined
- Tables Defined
- Basic Query Optimization
- Defining And Using Store Procedures
- Creating Stored Procedure
- Executing Store Procedure From C Sharp
- Executing Store Procedure From ASP.Net
- Changing ASP.Net Interface To Retrieve Data-Part1
- Changing ASP.Net Interface To Retrieve Data-Part2
Module 5: Java Script A Comprehensive Introduction
- Intro To JavaScript
- Using JavaScript For Data Validation
- Using JavaScript To Manipulate Documents
- Variables In JavaScript
- If Statements In JavaScript
- Logical Operators In JavaScript
- If Else Statements In JavaScript
- Switch Statements In JavaScript
- For Loops In JavaScript
- For And While Loops In JavaScript
Module 6: Object Based Java Script
- Working With String Object
- More On String Object
- The Math Object
- Creating Your Own Objects
- String Manipulation In JavaScript
- Programming The Browser In JavaScript
- Browser Versions In JavaScript
- Working With Forms In JavaScript
Module 7: Model View and Controller
- MVC Mindset
- MVC Defined
- Create An MVC Project
- MVC Project Initial Walkthrough
- MVC Building Routes
- MVC Approach
- Controllers
- Controllers From Scratch
- MVC Routing
- MVC Routing Constraints
- Routing Constraint Attributes
- MVC Attribute Routing
Module 8: A Comprehensive Introduction to jQuery
- What Is jQuery
- jQuery Effects
- Get And Set Elements In jQuery
- Add And Remove Elements In jQuery
- CSS In jQuery
- Ancestors And Descendants
Module 9: Course Review
- MVC Best Practices
- Testing The Application
- Writing For Production
- Review Web Development
- Review C Sharp
- Review HTML And CSS
- Review SQL Server
- Review JavaScript
- Review Software Development Lifecycle
- Review Design Patterns
- Review jQuery
- Conclusion
Microsoft 70-487: Developing Microsoft Azure and Web Services Course Content
Module 1: Accessing Data
- Introduction To 70 - 487 Developing Microsoft Azure And Web Services
- Overview Of Service And Cloud Technologies
- Accessing Data Using ADO Dot NET Part1
- Accessing Data Using ADO Dot NET Part2
- Accessing Data From Web Service
- SQL Server Database In Azure
- Read And Write XML Data
- Implementing Azure Storage
- Managing Azure PowerShell
- WCF Data Services Part1
- WCF Data Services Part2
- WCF With Client
Module 2: Designing And Implementing WCF Services
- Create WCF Service And Client From Scratch Part1
- Create WCF Service And Client From Scratch Part2
- WCF Configuration Settings Part1
- WCF Configuration Settings Part2
- WCF And Azure SQL Database Part1
- WCF And Azure SQL Database Part2
- WCF And Azure SQL Database Part3
- WCF Services And Azure Review
Module 3: Querying And Manipulating Data Using Entity Framework
- Design And Implement An ERD
- Introduction To Entity Framework
- Introduction To LINQ
- LINQ To SQL
- LINQ To Entities
- Introduction To Lambda Expressions
- Introduction To Entity SQL
- Profiling Queries Created By Entity Framework
- Query Projections
- Query With Navigation Properties
- Bringing It All Together Part1
- Bringing It All Together Part2
- Using Entity Framework From Scratch
- Entity Framework Review
Module 4: Creating And Consuming Web API Based Services
- Introduction To Web API
- First Web API App
- Web API App Enhanced
- Web API App Extended
- Web API Using Standard Conventions
- Debugging Our Web API App
- Getting Data From Database In Web API App
- Web API Standards
- More On Web API Standards
- Simple Web API CRUD App
- Web API Example In Depth
- Summarizing Web API
Module 5: Deploying Web Applications And Services
- Introduction To Application Deployment Strategies Part1
- Introduction To Application Deployment Strategies Part2
- Introduction To Application Deployment Strategies Part3
- Introduction To Application Deployment Strategies Part4
- Deploying Web Applications ToIIs
- Deploying Web Applications To Azure
- Deployment Considerations
- Deployment Design
- Deployment Configurations
Module 6: Course Review
- Accessing Data
- Web Front End Options
- Course Conclusion
Data Security Compliance Course Content
Module 1: Data Breaches And ID Theft
- Course Introduction
- Treat And Cost
Module 2: Device Security Basics
- Device Access
- Device Management
Module 3: Avoiding Inadvertent Disclosure
- No More Oops Part1
- No More Oops Part2
Module 4: Physical And Technical Safeguards
- The DO Of Security Part1
- The DO Of Security Part2
- Course Conclusion
Ultimate Resume Building Course Content
Module 1: What is a Resume?
- Course Introduction
- What Is A Resume
- When Or Why Do You Need A Resume
- Plan Then Do
- Objective
- Skills And Accomplishments
- Backing It Up
- Types Of Resume
- Structure
- Collecting Information-Part 1
- Collecting Information-Part 2
- Expanding And Expounding
- Putting It On Paper
Module 2: Tips and Tricks
- Word Processor Tips And Tricks-Part 1
- Word Processor Tips And Tricks-Part 2
- Word Processor Tips And Tricks-Part 3
- Word Processor Tips And Tricks-Part 4
- Word Processor Tips And Tricks-Part 5
- Word Processor Tips And Tricks-Part 6
- Word Processor Tips And Tricks-Part 7
- Word Processor Tips And Tricks-Part 8
- Word Processor Tips And Tricks-Part 9
- Word Processor Tips And Tricks-Part 10
- Word Processor Tips And Tricks-Part 11
- Word Processor Tips And Tricks-Part 12
- Course Outro
SalesForce: Power User Course Content
Module 1: Intro to SalesForce Automation
- Course And Instructor Introduction
- What Is Salesforce Automation
- Sales Force Automation System Overview
- Why Salesforce
Module 2: Working With The SalesForce System
- Creating Accounts And Contacts
- Creating Leads And Opportunities
- Sales Process-Part 1
- Sales Process-Part 2
- Sales Process-Part 3
- Sales Process-Part 4
- Leads Through Social Channels
Module 3: SalesForce Solution
- Core Problems
- Managing Accounts
- Badges And Campaigns
- Custom Apps
Module 4: SalesForce Admin
- Introduction To RDBMS
- Introduction To The Cloud
- Introduction To Virtual Machines-Part1
- Introduction To Virtual Machines-Part2
- Salesforce Development
- Introduction To Building In The Cloud
- Salesforce Set Up
Module 5: Migrating To SalesForce
- Tasks To Complete Before Migration-Part 1
- Tasks To Complete Before Migration-Part 2
- Frequently Asked Questions-Part 1
- Frequently Asked Questions-Part 2
- Frequently Asked Questions-Part 3
- Frequently Asked Questions-Part 4
- Frequently Asked Questions-Part 5
- Frequently Asked Questions-Part 6
- Frequently Asked Questions-Part 7
- Frequently Asked Questions-Part 8
- Frequently Asked Questions-Part 9
Module 6: Course Conclusion
- The Salesforce Solution
- Conclusion
Windows 10 Power User (How to use Windows 10) Course Content
Module 1: Getting Started With Windows 10
- Introduction
- First Steps
- Navigating The Desktop
- Using Cortana To Search
Module 2: Using File Explorer
- File Explorer
- Understanding File And Folder Basics
- Work With Libraries
- Creating A Home Group
Module 3: Using Windows Applications
- Opening And Using Applications
- Installing New Applications From The Windows Store
- Using Default Applications
Module 4: Browsing the Web With Microsoft Edge
- Examining The Edge Window
- Searching The Web With Edge
- Bookmarking Important Sites
- Using The Reading List
- Marking A Page With Web Notes
- Conclusion
Module 5: Customizing Windows
- Introduction
- Customizing The Display
- Customizing File Explorer
- Configuring Cortanas Notebook Feature
- Customizing Privacy Settings
- Customizing Microsoft Edge
Module 6: Connecting Devices And Devices
- Connecting Printers
- Connecting And Using A Flash Drive
- Connect A Phone
Module 7: Managing User Accounts
- Create Additional Users
- Understanding User Profiles
- Sharing Data Between Profiles
Module 8: Backing Up Important Data
- Using File History
- Using Windows Backup
- Using System Restore
Module 9: Maintaining Windows
- Windows Updates
- Working With The Action Center
- Using Disk Defragmenter
- Managing Storage And Apps Using Settings
- Conclusion
Module 10: Protecting Windows
- Introduction
- Using Windows Defender
- Using Windows Firewall
- Using Bit Locker
- Windows Hello
Module 11: Monitoring Performance
- Using Task Manager
- Using Resource Monitor
Module 12: Working With Control Panel And Settings
- Control Panel Part 1
- Control Panel Part 2
- Settings App
- Using Device Manager
- Using Remote Desktop
- Conclusion
Microsoft 70-697: Configuring Windows Devices (Windows 10) Updated Version Course Content
Module 1: Introducing Windows 10
- Course Introduction
- What Makes Windows 10 Different
- Overview Of Windows 10 Features
- Navigating And Using Windows 10-Part 1
- Navigating And Using Windows 10-Part 2
Module 2: Installing Windows 10
- Preparing For Installation
- Installation Options
- Upgrading And Migrating-Part 1
- Upgrading And Migrating-Part 2
Module 3: Configuring Devices
- Overview Of Configuration Tools
- Common Configuration Options
- Managing User Accounts-Part 1
- Managing User Accounts-Part 2
- Using Control Panel
- Using Windows Administration Tools-Part 1
- Using Windows Administration Tools-Part 2
- Using Windows PowerShell-Part 1
- Using Windows PowerShell-Part 2
Module 4: Configuring Network Connectivity
- TCP IP Network Connectivity-Part 1
- TCP IP Network Connectivity-Part 2
- TCP IP Network Connectivity-Part 3
- Name Resolution
- Wireless
- Remote Access Overview-Part 1
- Remote Access Overview-Part 2
- Troubleshooting Connectivity
Module 5: Managing Storage, Data, And Printers
- Managing Hard Disks-Part 1
- Managing Hard Disks-Part 2
- Managing Hard Disks-Part 3
- Creating And Managing Storage Spaces
- Overview Of Data Access
- Configuring And Managing File Access
- Managing Shared Folder
- Understanding Work Folder
- Managing Printers
Module 6: Managing Apps
- Installing And Configuring Applications
- Managing Apps From The Windows Store
- Managing Microsoft Edge Web Browser
Module 7: Managing Device Security
- Configuring Network Security-Part 1
- Configuring Network Security-Part 2
- Configuring Local Security
- Configuring Data Security-Part 1
- Configuring Data Security-Part 2
- Configuring Device Security
Module 8: Maintaining Windows 10
- Updating Windows 10
- Monitoring And Optimizing Windows 10-Part 1
- Monitoring And Optimizing Windows 10-Part 2
Module 9: Troubleshooting And Recovery
- Managing Devices And Drives
- Recovery Files
- Recovering Devices
Module 10: Deploying Windows 10 Enterprise Desktops
- Overview Of Image Based Deployment
- Automating Installations
- Windows Activation
Module 11: Managing User Profiles And User State Virtualization
- Managing User Profiles-Part 1
- Managing User Profiles-Part 2
- User State Virtualization
- User Profile Migration
Module 12: Managing Desktop And Application Settings Using Group policy
- Using Group Policy To Manage Windows 10 Devices Part 1
- Using Group Policy To Manage Windows 10 Devices-Part 2
- Using Group Policy To Manage Windows 10 Devices-Part 3
- Using Group Policy To Manage Windows 10 Devices-Part 4
- Using Group Policy To Manage Applications-Part 1
- Using Group Policy To Manage Applications-Part 2
Module 13: Configuring And Managing Client Hyper-V
- Introduction To Client Hyper-V
- Creating Virtual Machines
- Managing Virtual Machine Storage And Snapshot
- Conclusion
Module 14: Configuring Windows Devices - December, 2017 Update - Part1
- Module 14 Workbook
- Flashcards (Updated)
- 1. Intro to Windows 10 Update 70-697-1D
- 2. Mod 1 Win 10 Update
- 3. Mod 1 Installing Windows 10
- 4. Mod 1 Examining Windows 10 Act
- 5. Mod 3 Configuring Devices
- 6. Mod 3 Examining GPOs Act
- 7. Mod 3.3 Display Options
- 8. Mod 3 Examining One Drive Act
- 9. Mod 4 Configuring Network Connectivity
- 10. Mod 4 Powershell Networking Commands Act
- 11. Mod 4.1 Network Mgmt Tools
- 12. Mod 4.1 Command Prompt Networkiing Tools Act
- 13. Mod 4.1 Network Mgmt Tools Part2
- 14. Mod 4.2 DNS
- 15. Mod 4.2 Name Resolution Act
- 16. Mod 4.3 Direct Access
- 17. Mod 5 Managing Storage
- 18. Mod 5 Server Based Storage
- 19. Mod 5 Storage Act
- 20. Mod 5.5 Diskpart
- 21. Mod 5.6 Powershell Disk Mgmt
- 22. Mod 5.7 Storage Mgmt
- 23. Mod 5 Storage Mgmt Act
- 24. Mod 6 Managing Files and Printers
- 25. Mod 6 CMD and PS Files System Commands Act
- 26. Mod 6.2 Permissions Inheritance
- 27. Mod 6.2 NTFS and Sharing Permissions Act
- 28. Mod 6.3 Type 4 Printer Drivers
- 29. Mod 6 Printing Mgmt Act
- 30. Mod 7 Managing Apps
- 31. Mod 7 Internet Explorer 11 Act
- 32. Mod 8 Managing Device Security
- 33. Mod 8.1 Security Compliance Toolkit
- 34. Mod 9 Maintaining Windows 10
- 35. Mod 9 Windows Update Settings Act
- 36. Mod 10 Startup and Recovery
- 37. Mod 10 Startup and Recovery settings Act
- 38. Mod 11 Additional Skills
- Windows Intro Update 70-697-2C
Module 15: Configuring Windows Devices - December, 2017 Update - Part2
- Module 15 Workbook
- Flashcards (Updated)
- 1. Mod 1 Developing Mgmt Win 10
- 2. Mod 1 Windows Defender Act
- 3. Mod 1.1 Developing Part2
- 4. Mod 1 Applocker Act2
- 5. Mod1.2 Managing a Mobile Workforce
- 6. Mod 1 Remote Access Act2
- 7. Mod 1.2 Managing a Mobile Workforce Part2
- 8. Mod 1.3 Overview
- 9. Mod 1 Microsoft Azure Act2
- 10. Mod 2 Managing Win 10 Sign-in
- 11. Mod 2 Microsoft Account Act2
- 12. Mod 2.2 Overview of Azure AD
- 13. Mod 2 Microsoft Azure AD Act2
- 14. Mod 3 Managing User Profiles and User
- 15. Mod 4 Managing Desktop and Apps
- 16. Mod 5 Managing Devices in MS365
- 17. Mod 5 Office 365 Act2
- 18. Mod 6 Managing PCs Devices using Intune
- 19. Mod 6 Intune Act2
- 20. Mod 6.3 Intune App Mgmt
- 21. Mod 6.4 Working with WIP
- 22. Mod 7 Configuring and Using MS Store
- 23. Mod 7 Microsoft Store for Business Act2
- 24. Mod 7.2 Deploy Win 10 Auto-pilot
- 25. Mod 8 Managing Data Access Windows
- 26. Mod 8.4 Publishing and Using RemoteApp
- 27. Mod 9 Configuring and Managing Client Hyper-V
- 28. Mod 10 Additional Skills
- 29. Outr to Windows 10 Update 70-697
Wine Making Course Content
Wine Making
- Course Instructor Introduction
- Supplies And Ingredients Needed
- Cleaning And Prepping Equipment
- Chemicals Processing Aids And Oaks-Part 1
- Chemicals Processing Aids And Oaks-Part 2
- Wine Kits And Making Watermelon White Merlot
- Making Watermelon White Merlot-Part 2
- Making Amarone
- Apple Cider Wine
- Degassing Wine-Part 1
- Degassing Wine-Part 2
- Degassing Wine-Part 3
- Adding More Ingredients To You Wine
- Gentle Punch Down And Degassing Of Amarone
- Reracking The Amarone
Wine Mixing And Food Pairing
- Different Wine Varietals-Part 1
- Different Wine Varietals-Part 2
- Hydrometer
- Wine Yeast
- Wine Blending And Food Pairing-Part 1
- Wine Blending And Food Pairing-Part 2
- Bottling The Apple Cider Wine
- Conclusion
Microsoft 70-687: Configuring Windows 8 Course Content
Module 1: Installing and Deploying Windows 8.1
- Course Introduction
- Introduction To Windows
- Preparing To Install Windows 8.1
- Understanding Deployment Options Part 1
- Understanding Deployment Options Part 2
- Upgrading To Windows 8.1
- Migrating To Windows 8.1
- Automating Installations Part 1
- Automating Installations Part 2
- Automating Installations Part 3
- Windows Activation
Module 2: Enterprise Management in Windows 8.1
- Local And Management Tools Part 1
- Local And Management Tools Part 2
- Using Windows PowerShell To Manage Windows 8.1 Part 1
- Using Windows PowerShell To Manage Windows 8.1 Part 2
- Using Windows PowerShell To Manage Windows 8.1 Part 3
- Using Group Policy To Manage Windows 8.1
Module 3: Managing User Settings
- Managing User Profiles
- User State Virtualization
- User Profile Migration
Module 4: Configuring Hardware Access
- Managing And Maintaining HardDisk Drives Part 1
- Managing And Maintaining HardDisk Drives Part 2
- Working With Device Drivers
Module 5: Configuring Networking
- Configuring IPv4 Part 1
- Configuring IPv4 Part 2
- Configuring IPv4 Part 3
- Configuring IPv6
- Managing Name Resolution
- Configuring Wireless Connections
- Troubleshooting Network Connections
Module 6: Configuring Resource Access
- Configuring Network Access
- Managing File Access With NTFS
- Managing Shared Folders
- Configure And Manage Printers
- Providing Access To Non-Domain Devices
- Planning To Use One Drive
Module 7: Configuring Applications
- Installing And Configuring Applications
- Managing Apps From The Windows Store
- Controlling Desktop Applications
- Manage Internet Explorer
- Using Virtualisation To Support Applications
Module 8: Managing Security in Windows 8.1
- Overview Of Network Security
- Managing The Windows Firewall
- Malware Protection
- Configuring Data Security
- User Account Control
Module 9: Optimizing and Recovering Windows 8.1
- Performance Monitoring And Optimization
- Managing And Troubleshooting Reliability
- Troubleshooting With Event Viewer
- Managing Windows Updates
- Backing Up Data
- Recovery Options
Module 10: Mobile Computing With Windows 8.1
- Configuring Mobile Computer Settings
- Configuring VPNs
- Overview Of Direct Access
- Conclusion
Microsoft 70-346: Managing Office 365 Identities and Requirements Course Content
Module 1: Introduction To Office 365
- Course Introduction
- Introduction To Office 365 - Part 1
- Introduction To Office 365 - Part 2
- Planning A Pilot Implementation - Part 1
- Planning A Pilot Implementation - Part 2
- Planning A Pilot Implementation - Part 3
- Planning A Pilot Implementation - Part 4
- Provisioning Tenant Accounts - Part 1
- Configuring A Test Lab
- Provisioning Tenant Accounts - Part 2
Module 2: Administration In Office 365
- Introduction To Administration In Office 365 - Part 1
- Introduction To Administration In Office 365 - Part 2
- Introduction To Administration In Office 365 - Part 3
- Introduction To Administration In Office 365 - Part 4
- Introduction To Administration In Office 365 - Part 5
- Managing Users And Licenses - Part 1
- Managing Users And Licenses - Part 2
- Managing Users And Licenses - Part 3
- Managing Security And Distribution Groups - Part 1
- Managing Security And Distribution Groups - Part 2
Module 3: Managing Clients
- Planning For Office Clients - Part 1
- Planning For Office Clients - Part 2
- Planning For Office Clients - Part 3
- Managing User - Driver Client Deployments
- IT Managed Deployments - Part 1
- IT Managed Deployments - Part 2
- IT Managed Deployments - Part 3
- Office Telemetry And Reporting
Module 4: Planning DNS And Exchange Migrations
- Working With Custom Domains - Part 1
- Working With Custom Domains - Part 2
- Working With Custom Domains - Part 3
- Working With Custom Domains - Part 4
- Planning To Migrate Mailboxes
- Choosing A Migration Method - Part 1
- Choosing A Migration Method - Part 2
- Choosing A Migration Method - Part 3
Module 5: Planning And Configuring Exchange Online
- Planning For Exchange Online - Part 1
- Planning For Exchange Online - Part 2
- Planning For Exchange Online - Part 3
- Planning For Exchange Online - Part 4
- Planning For Exchange Online - Part 5
- Planning For Exchange Online - Part 6
- Planning For Exchange Online - Part 7
- Managing Recipients - Part 1
- Managing Recipients - Part 2
- Managing Recipients - Part 3
- Managing Recipients - Part 4
- Managing Anti-Malware And Anti-Spam
- Managing Message Retention Recovery - Part 1
- Managing Message Retention Recovery - Part 2
Module 6: Configuring Sharepoint Online
- Managing Site Collections - Part 1
- Managing Site Collections - Part 2
- Configuring Sharing With External Users
- Planning For Users Collaboration
Module 7: Configuring Lync Online
- Plan For Lync Online
- Configuring Lync Online Settings
Module 8: Implementing Coexistence Technologies
- Implementing Directory Synchorization - Part 1
- Implementing Directory Synchorization - Part 2
- Implementing Directory Synchorization - Part 3
- Implementing Organizational Federation
- Course Outro
Microsoft 70-680 TS: Configuring Windows 7 Course Content
Module 1: Installing,Upgrading and Migrating Windows 7
- Course And Instructor Introduction
- Introducing Windows 7-Part1
- Introducing Windows 7-Part2
- Pre Installation Requirements-Part1
- Pre Installation Requirements-Part2
- Installing Windows 7-Part1
- Installing Windows 7-Part2
- Upgrading Windows 7
- Migrating Windows 7
Module 2: Deploying Windows 7 in the Enterprise
- Overview Of Image Based Installations-Part1
- Overview Of Image Based Installations-Part2
- Overview Of Image Based Installations Demo
- Capturing System Images-Part1
- Capturing System Images-Part2
- Capturing System Images-Part3
- Preparing Images For Deployment-Part1
- Preparing Images For Deployment-Part2
- Working With User State
- Working With Virtual Drives
- Activating Windows 7
Module 3: Enterprise Management in Windows 7
- Automating Management Using Group Policy-Part1
- Automating Management Using Group Policy-Part2
- Automating Management Using Group Policy-Part3
- Using Windows Powershell 2.0-Part1
- Using Windows Powershell 2.0-Part2
- Using Windows Powershell 2.0-Part3
Module 4: Configuring Hardware and Applications
- Working With Device Drivers-Part1
- Working With Device Drivers-Part2
- Working With Hard Disks-Part1
- Working With Hard Disks-Part2
- Configuring Application Compatibility
- Configuring Internet Explorer-Part1
- Configuring Internet Explorer-Part2
- Configuring Application Restrictions
Module 5: Configuring Network Connectivity
- Configuring TCPIP-Part1
- Configuring TCPIP-Part2
- Configuring TCPIP-Part3
- IP Address Assignment-Part1
- IP Address Assignment-Part2
- Name Resolution Services-Part1
- Name Resolution Services-Part2
- Wireless Networking-Part1
- Wireless Networking-Part2
- Remote Management
- Troubleshooting Connectivity Issues
Module 6: Configuring Access to Resources
- Authentication And Authorization-Part1
- Authentication And Authorization-Part2
- Managing Access To Files Using NTFS
- Managing Sharing
- Managing Shared Printers
- Configuring Branch Cache
Module 7: Configuring Mobile Computing
- Configuring Mobile Computer And Device Settings-Part1
- Configuring Mobile Computer And Device Settings-Part2
- Configuring Remote Access-Part1
- Configuring Remote Access-Part2
Module 8: Configuring Security Options
- User Account Control
- Encrypting File Systems
- Bit Locker Drive Encryption-Part1
- Bit Locker Drive Encryption-Part2
- Network Access Protection
- Windows Firewall With Advanced Security
- Configuring Anti-Malware
- Auditing Network Access
Module 9: Monitoring And Maintaining Systems
- Configuring Windows Updates
- Event Monitoring
- Performance Monitoring
Module 10: Configuring Backup and Recovery Options
- Troubleshooting Startup Issues
- Using Windows Backup
- Using System Restore
- Course Conclusion
Microsoft 70-347: Enabling Office 365 Services Course Content
Module 1: Technology Review
- Introduction
- Active Directory Install And Configure
- PowerShell Primer
- Microsoft Exchange Server Install And Configure - Part 1
- Microsoft Exchange Server Install And Configure - Part 2
- Review Cloud Computing - Part 1
- Review Cloud Computing - Part 2
- Review Virtualization And The Cloud - Part 1
- Review Virtualization And The Cloud - Part 2
- Review Virtualization And The Cloud - Part 3
Module 2: Device Management
- Client Devices
- Demo Client Device Setup - Part 1
- Demo Client Device Setup - Part 2
- Office 365 Client Deployment
- Office 365 Components
- Office 365 Deployment Methods
- Office 365 Cloud Deployment Methods
- Office 365 Deployment Prerequisites
- Office 365 Deployment Readiness
- Office 365 Deployment Network Environment
Module 3: Office 365 Deployment Plan
- Network Planning
- Internet Network Usage Planning
- Network Device Planning
- Account Management Planning - Part 1
- Account Management Planning - Part 2
- Migration And Coexistence Options
- Single Sign On Architecture
- Demo Server 2012 Core With Active Directory Role
Module 4: Windows Azure
- SharePoint 2013 Using Windows Azure - Part 1
- SharePoint 2013 Using Windows Azure - Part 2
- SharePoint 2013 Capabilities
Module 5: PowerShell
- Scripting And PowerShell - Part 1
- Scripting And PowerShell - Part 2
- PowerShell Scripting Techniques - Part 1
- PowerShell Scripting Techniques - Part 2
- Enterprise Ready Scripts - Part 1
- Enterprise Ready Scripts - Part 2
- PowerShell Scripting Syntax - Part 1
- PowerShell Scripting Syntax - Part 2
- PowerShell Scripting Active Directory - Part 1
- PowerShell Scripting Active Directory - Part 2
- PowerShell Remoting
- PowerShell Adding Bulk Users In AD
Module 6: SQL Server
- Introduction To SQL Queries
- SQL Queries - Part 1
- SQL Queries - Part 2
- DML And DDL - Part 1
- DML And DDL - Part 2
- DDL
- SQL Server And PowerShell
- SQL Server PowerShell And AD
- Logging Data In SQL Server Using PowerShell
Module 7: Azure Lync and SharePoint
- Azure Active Directory Fundamentals - Part 1
- Azure Active Directory Fundamentals - Part 2
- Deploying Lync Server - Part 1
- Deploying Lync Server - Part 2
- Deploying Lync Server - Part 3
- SharePoint Designer
- Backup And Restore Share Point
- Windows PowerShell And SharePoint
- Identity Service With Active Directory
- Setup And Deploy Exchange
Module 8: Course Review
- Review Virtualization
- Review Cloud
- Review Automation Using PowerShell
- Review Desktop Applications
- Move To Office 365
- Conclusion
Microsoft 70-480:Programming in HTML5 with JavaScript and CSS3 Course Content
Module 1: Introduction to Web Development Technologies
- Intro To Software Development
- Introduction To HTML5-Part1
- Introduction To HTML5-Part2
- Introduction To CSS3
- Overview Of HTML CSS And JavaScript-Part1
- Overview Of HTML CSS And JavaScript-Part2
- Introduction To JavaScript-Part1
- Introduction To JavaScript-Part2
- Demo JavaScript
Module 2: HTML
- Demonstrating Formatting Quotations And Citations
- Tables Lists Blocks Classes And Layout-Part1
- Tables Lists Blocks Classes And Layout-Part2
- Page Design Frames And Colors
- Form Elements-Part1
- Form Elements-Part2
Module 3: CSS
- Comprehensive Introduction To CSS
- Styles With CSS-Part1
- Styles With CSS-Part2
- Selectors Content And Classes
Module 4: JavaScript
- Demo JavaScript Syntax-Part1
- Demo JavaScript Syntax-Part2
- Demo String Methods
- Demo Scope Events And Numbers-Part1
- Demo Scope Events And Numbers-Part2
- Demo Dates And Arrays-Part1
- Demo Dates And Arrays-Part2
- Demo Dates And Arrays-Part3
- Demo Comparisons Conditions And Loops
- Demo Breaks Conversion And Regular Expression-Part1
- Demo Breaks Conversion And Regular Expression-Part2
- Demo Errors And Debugging
Module 5: jQuery
- Intro To jQuery
- Demo Using jQuery
Module 6: HTML5
- HTML5
- Input Validation In HTML5
- Demo Password Validation
- Demo Using Regular Expressions To Validate Password
- Demo Validate A Checkbox
- Demo Validate Date And Time-Part1
- Demo Validate Date And Time-Part2
Module 7: CSS3
- Demo CSS3 Selectors-Part1
- Demo CSS3 Selectors-Part2
- Demo CSS3 Effects
Module 8: Course Review
- Review Of HTML5 CSS3 And JavaScript-Part1
- Review Of HTML5 CSS3 And JavaScript-Part2
- Comprehensive Walk through Of Visual Studio
- Cloud Computing Overview Using Azure-Part1
- Cloud Computing Overview Using Azure-Part2
- Cloud Computing Overview Using Azure-Part3
- Code Review HTML5 CSS3 And JavaScript
- Web Design Best Practices
- Review jQuery
- Course Conclusion
Cisco 300-115: CCNP - SWITCH - Routing and Switching Course Content
Module 1: Plan And Design
- Course And Instructor Introduction
- Planning For Complex Network-Part1
- Planning For Complex Network-Part2
- Intro To Cisco Enterprise Architecture And CAM-Part1
- Intro To Cisco Enterprise Architecture And CAM-Part2
- Review Networking Topology-Part1
- Review Networking Topology-Part2
- Review OSI Model
- Review SLA
- Network Discovery
- NTP Explained-Part1
- NTP Explained-Part2
- Network Security-Part1
- Network Security-Part2
Module 2: Switch Configuration
- VLAN And Trunking-Part1
- VLAN And Trunking-Part2
- VTP Intro And Config
- Ether Channel Configuration And Load Balancing
- More Ether Channel Configuration-Part1
- More Ether Channel Configuration-Part2
- Port Security
- Root Guard
- Configuring MST
Module 3: IP Configuration
- DHCP Intro And Config-Part1
- DHCP Intro And Config-Part2
- IPV6 Intro And Config-Part1
- IPV6 Intro And Config-Part2
- Configure DHCP
- Configure DHCPV6
- Configure IPSLA
- NTP Configuration
- Network Monitoring Using IPSLA-Part1
- Network Monitoring Using IPSLA-Part2
- Network Monitoring Using IPSLA-Part3
Module 4: STP And RTP
- Config Routing Between VLANs With A Router
- Improves STP Config-Part1
- Improve STP Config-Part2
- Improve STP Config-Part3
- Improve STP Config-Part4
- Implement RSTP
- Intro And Config MST
Module 5: Routing
- Config Routing Between VLANs With A Router
- Routing On A Multi Layer Switch
- Routing With An External Router
- Further Routing On Multilayer Switch
Module 6: HSRP, VRRP, GLBP
- Configure And Tune HSRP
- Configure HSRP With Load Balancing
- HSRP For IPv6
- Configure VRRP
- Configure VRRP With Load Balancing
- Implement GLBP
- Configure GLBP
Module 7: Course Review
- Designing Complex Networks
- Review Demo CAM
- Review Demo VLANs And Trunking
- Review Demo VTP Configure
- Review Demo Ether Channel And Load Balancing
- Review Demo RSTP
- Review Demo Routing Between VLANs With A Router
- Course Outro
Oracle 12c OCP 1Z0-062: Installation and Administration Course Content
Module 1: Database Concepts And Tools
- Instructor And Course Introduction
- Database Concepts And Tools - Part 1
- Database Concepts And Tools - Part 2
Module 2: Memory Structure
- Memory Structure - Part 1
- Memory Structure - Part 2
Module 3: Tables
- Tables - Part 1
- Tables - Part 2
Module 4: Indexes
- Indexes - Part 1
- Indexes - Part 2
Module 5: Constraints And Triggers
- Constraints And Triggers - Part 1
- Constraints And Triggers - Part 2
Module 6: Users
- Users
- Profiles
- Privileges
- Roles
Module 7: Internal Structures
- Storage Structures - Part 1
- Storage Structures - Part 2
- Internal Memory Structures - Part 1
- Internal Memory Structures - Part 2
- Background Processes - Part 1
- Background Processes - Part 2
Module 8: Starting Up and Shutting Down Database
- Starting And Stopping DataBase - Part 1
- Starting And Stopping DataBase - Part 2
Module 9: Critical Storage Files
- Critical Storage Files - Part 1
- Critical Storage Files - Part 2
Module 10: Data Manipulation Language
- DML Atomicity - Part 1
- DML Atomicity - Part 2
- DML Insert
- DML Update - Part 1
- DML Update - Part 2
- DML Delete And Review Of DML Statements - Part 1
- DML Delete And Review Of DML Statements - Part 2
Module 11: Data Concurrency
- Data Concurrency - Part 1
- Data Concurrency - Part 2
Module 12: BackUp And Recovery
- Back Up - Part 1
- Back Up - Part 2
- Back Up - Part 3
- RMAN Catalog
- RMAN BackUps - Part 1
- RMAN BackUps - Part 2
- Disaster Preparedness
- Recovery
- Flashback Recovery
Module 13: Installation
- Installation - Part 1
- Installation - Part 2
Module 14: Course Review
- Course Review - Part 1
- Course Review - Part 2
- Course Review - Part 3
- Course Review - Part 4
- Course Review - Part 5
- Course Outro
Microsoft 70-412: Configuring Advanced Windows Server 2012 Services (R2 update) Course Content
Module 1: Configuring Advanced DNS Services
- Introduction
- DNSSEC
- Socket Pool And Cache Locking
- Advanced DNS Settings
- Questions
Module 2: Advanced DHCP Services
- DHCP Scopes
- High Availability
- Policy-Based Assignments
- DHCPv6
- Questions
Module 3: Active Directory Forest Configuration
- Active Directory Forests
- Active Directory Sites
- Active Directory Trusts
- Active Directory Read Only Domain Controllers
- Active Directory Replication
Module 4: Active Directory Certificate Services
- ADCS Overview
- ADCS Management
Module 5: ISCSI And ISNS
- ISCSI And ISNS
- ISCSI And ISNS Demo
- Questions
Module 6: Configuring IPAM
- Install And Configure IPAM
- IPAM Demo
- Questions
Module 7: Network Balancing
- Install And Configure NLB
- NLB Demo
- Questions
Module 8: Failover Clusters
- Cluster Overview
- Cluster Aware Updating
- Failover Clusters Demo
- Questions
Module 9: Configuring Hyper_V Virtual Machines
- Create VM Replicas In Hyper-V And Migrate VMs
- Hyper V Virtual Machines Demo
- Questions
Module 10: Dynamic Access Control
- DAC Overview And Configure
- DAC Demo
- Questions
Module 11: Active Directory Rights Management Services
- Install ADRMS
- Manage ADRMS
- ADRMS Demo
- Questions
Module 12: Active Directory Federation Services
- Configure And Manage ADFS
- ADFS Demo
- Questions
Module 13: Disaster Recovery
- Configure And Restore Windows Server Backup
- Configure And Restore Windows Server Backup Demo
- Questions
Module 14: Configuring Additional Services
- Configuring Additional Services
- Configuring Additional Services Demo-Part1
- Configuring Additional Services Demo-Part2
- Questions
- Conclusion
Microsoft 70-411: Administering Windows Server 2012 (R2 update) Course Content
Module 1: Managing User and Service Accounts
- Introduction
- User Accounts-Part 1
- User Accounts-Part 2
- User Accounts-Part 3
- Service Accounts-Part 1
- Service Accounts-Part 2
- Questions
Module 2: Administer Group Policy
- Group Policy
- User Configuration-Part 1
- User Configuration-Part 2
- User Configuration-Part 3
- Computer Configurations
- Group Policy Management-Part 1
- Group Policy Management-Part 2
- Group Policy Management-Part 3
- Questions
Module 3: Managing Network File Services
- File System Resource Manager
- Distributed File System
- Encrypting File System
- Auditing Resources
- Questions
Module 4: Domain Name System
- DNS Functionality-Part 1
- DNS Functionality-Part 2
- DNS and Active Directory
- DNS Server Configuration-Part 1
- DNS Server Configuration-Part 2
- Questions
Module 5: Windows Deployment Services
- WDS Overview
- Creating Images
Module 6: Windows Server Update Services
- WSUS-Part 1
- WSUS-Part 2
Module 7: Remote Access
- Implement Remote Access-Part 1
- Implement Remote Access-Part 2
- Implement Remote Access-Part 3
- Offline Domain Join
- Implement Network Policy Server-Part 1
- Implement Network Policy Server-Part 2
- Implement Network Policy Server-Part 3
Module 8: Monitoring System
- Monitoring System Resources-Part 1
- Monitoring System Resources-Part 2
Module 9: Managing Active Directory Services
- Managing Active Directory Services-Part 1
- Managing Active Directory Services-Part 2
- Managing Active Directory Services-Part 3
- Conclusion
Oracle 12c OCP 1Z0-061: SQL Fundamentals Course Content
Module 1: Introduction To Oracle 12c SQL Fundamentals
- Introduction
- Intro To Oracle 12c-SQL Fundamentals
- Structure Of SQL
- Basic Select Statements
- Basic Select Statements Demo
Module 2: Retrieving Data
- Modifying Reported Output
- The Where Clause
- The Order By Clause
- Left And Right Outer Joins
- The Where Clause Demo
- Multi-Table Selection Demo
Module 3: SQL Functions
- Single Row Functions
- Aggregate Functions
- Single Row Functions Demo
- Muiltrow Functions Demo
- Group By
- Grouping Demo
- Conversion Functions
- Conversion Functions Demo
- Datetime Functions
- Datetime Functions Demo
Module 4: Subqueries
- Single-Row Subqueries
- Single-Row Subqueries Demo
- Multi-Row Subqueries
- Multi-Row Subqueries Demo
- Other Subquery Types
- Other Subquery Types Demo
Module 5: Data Manipulation Language
- Adding Data
- Changing Data
- Deleting Data
- DML Demo
Module 6: Data Control Language
- Security
- Object Privileges
- DCL Demo
Module 7: Data Definition Language
- Creating Objects In The Database
- Creating Objects In The Database Demo
- Sequences
- Sequenced Demo
- Indexes
- Views
Module 8: Combining Queries
- Combining Queries
Module 9: Oracle 12C SQL Fundamentals Review
- Oracle 12c SQL Fundamentals Review - Part 1
- Oracle 12c SQL Fundamentals Review - Part 2
- Oracle 12c SQL Fundamentals Review - Part 3
- Conclusion
Microsoft 70-410: Installing and Configuring Windows Server 2012 (R2 update) Course Content
Module 1: Installing And Configuring Windows Server 2012 R2
- Course And Instructor Introduction
- Overview-Part1
- Overview-Part2
- Overview-Part3
- Management-Part1
- Management-Part2
- Management-Part3
- Management-Part4
- Management-Part5
- Installation-Part1
- Installation-Part2
- Installation-Part3
- Questions-Part1
- Questions-Part2
Module 2: Installing and Configuring an Active Directory Domaine Control
- Active Directory Design-Part1
- Active Directory Design-Part2
- Active Directory Design-Part3
- Installing Active Directory Domain Services-Part1
- Installing Active Directory Domain Services-Part2
- Installing Active Directory Domain Services-Part3
- Installing Active Directory Domain Services-Part4
- Questions
Module 3: Administering Active Directory Objects
- Design And Create An Active Directory Hierarchy-Part1
- Design And Create An Active Directory Hierarchy-Part2
- Manage Users-Part1
- Manage Users-Part2
- Manage Users-Part3
- Manage Computers-Part1
- Manage Computers-Part2
- Manage Computers-Part3
- Questions
Module 4: Automating Administration Tasks
- Powershell Overview And Object Command-Part1
- Powershell Overview And Object Command-Part2
- Powershell Overview And Object Command-Part3
- Command Line Object Management And Bulk Operations-Part1
- Command Line Object Management And Bulk Operations-Part2
- Questions
Module 5: Configuring IPv4
- TCP IP Overview
- IPv4 Addressing-Part1
- IPv4 Addressing-Part2
- Subnetting And Supernetting
- Configure And Troubleshoot IPv4-Part1
- Configure And Troubleshoot IPv4-Part2
- Questions-Part1
- Questions-Part2
Module 6: Configuring IPv6
- Configuring IPV6-Part1
- Configuring IPV6-Part2
- Questions
Module 7: Installing and Configuring DHCP
- DHCP Overview Database Security-Part1
- DHCP Overview Database Security-Part2
- Questions
Module 8: Installing and Configuring DNS
- Installing And Configuring DNS-Part1
- Installing And Configuring DNS-Part2
- Installing And Configuring DNS-Part3
- Installing And Configuring DNS-Part4
- Installing And Configuring DNS-Part5
- Questions
Module 9: Configuring Storage Spaces And File And Print Services
- Design And Implement Storage Spaces-Part1
- Design And Implement Storage Spaces-Part2
- Design And Implement Storage Spaces-Part3
- Secure Files And Folders Configure Offline Files And Shadow Copies
- Implement Network Printing
- Questions
Module 10: Configuring Group Policy
- Create Group Policy Objects
- Configure Group Policy Settings-Part1
- Configure Group Policy Settings-Part2
- Implement A Central Store And Questions
Module 11: Securing Windows Servers
- Securing Windows Servers-Part1
- Securing Windows Servers-Part2
- Questions
Module 12: Installing and Configuring Virtual Servers and Clients
- Virtualization Solution
- Hyper V-Part1
- Hyper V-Part2
- Network Virtualization And Questions-Part1
- Network Virtualization And Questions-Part2
- Conclusion
Cisco 300-135: CCNP - TSHOOT - Troubleshooting and Maintaining Cisco IP Networks Course Content
Module 1: Introduction to Cisco Troubleshooting
- Introduction
- Troubleshooting And Maintenance
- IOS Troubleshooting Commands
- Remote Data Gathering
- Introduction To Graphical Troubleshooting Tools And Review
Module 2: Troubleshooting Switches
- Troubleshoot Catalyst Switches
- Troubleshoot TCAM
Module 3: Troubleshooting VLANS and Trunking
- Troubleshooting VLANs And Trunking-Part1
- Troubleshooting VLANs And Trunking-Part2
- Troubleshooting VLANs And Trunking-Part3
- Trouble Ticket 1 VLANS
Module 4: Troubleshooting Spanning Tree Protocol, EtherChannel
- Spanning Tree Protocol
- STP Port Configuration
- Ether Channel
- Trouble Ticket 2-Trunking
Module 5: Troubleshooting InterVLAN Routing and Layer 3 EtherChannel
- Troubleshooting Inter-VLAN Routing
- Troubleshooting Layer 3 Ether Channel
Module 6: Troubleshooting Switch Security Features
- Troubleshoot Switch Security-Part1
- Troubleshoot Switch Security-Part2
- Trouble Ticket 3-Switch Security-Part1
- Trouble Ticket 3-Switch Security-Part2
Module 7: Troubleshooting FirstHop Redundancy Protocols
- HSRP
- VRRP
- Questions
- Trouble Ticket 4
Module 8: Troubleshooting IPv4 and IPv4 Addressing
- IPv4 Addressing DHCPNAT-Part1
- IPv4 Addressing DHCPNAT-Part2
- Trouble Ticket 5
- Trouble Ticket 6
Module 9: IPv6 Addressing and Addressing Technologies
- IPv6 Addressing Options
Module 10: Troubleshooting IPv4 and IPv6 ACLs and Prefix Lists
- IPv4 ACLs
- Prefixlists IPv6 ACLs
- Trouble Ticket Access Control List1
- Trouble Ticket Access Control List2
Module 11: Troubleshooting GRE and Basic Routing Tunnels
- IPv4 Routing-Part1
- IPv4 Routing-Part2
- IPv6 Routing
- GRE Tunnels
Module 12: Troubleshooting RIPv2 and RIPng
- RIPv2
- RIPng
Module 13: Troubleshooting EIGRP
- EIGRP
- EIGRP For IPv6
- Trouble Ticket 1
- Trouble Ticket 2
Module 14: OSPF and OSPFv3
- OSPF-Part1
- OSPF-Part2
- OSPFv3
- Trouble Ticket 1
- Trouble Ticket 2
- Trouble Ticket 3
Module 15: Troubleshooting Route Maps and Policy Based Routing
- Route Maps And Policy Based Routing
Module 16: Troubleshooting Redistribution
- Verifying Redistribution Configuration
- Troubleshooting Redistribution With Route Maps
Module 17: Troubleshooting BGP
- BGP Overview
- BGP Configuration-Part1
- BGP Configuration-Part2
- Trouble Ticket 1
- Trouble Ticket 2
Module 18: Troubleshooting Management Protocols and Tools
- Troubleshooting Management Protocols And Tools
- SPAN And RSPAN
Module 19: Troubleshooting Management Access
- Management Access Troubleshooting
- Conclusion
Wine Pairing and Tasting Course Content
Module 1: Introduction and White Wines
- White Wines
Module 2: Glassware, Temperature, Storage and Ratings
- Temperature Glassware Storage And Ratings
Module 3: Red Wines
- Red Wines
Module 4: Regions
- Europe
- Europe Continued
- North America
- South America Australia New Zealand
- Conclusion
Cisco 300-101: CCNP - ROUTE - Implementing Cisco IP Routing Course Content
Module 1: Plan And Design
- Introduction
- Review Routing Fundamentals
- Review Route Selection
- Review Switching Versus Routing
- Review IP Subnetting
- Review How To Subnet
- Review IP Address Classes
Module 2: EIGRP Enhanced Interior Gateway Routing Protocol
- Plan And Design-Part1
- Plan And Design-Part2
- EIGRP Config
- Configuring RIPng
- Building EIGRP Topology Table
- EIGRP Stub Routing
- EIGRP Summarization
- EIGRP Load Balancing
- Discovering Main EIGRP Configuration
- Implementing EIGRP Through Name Config
- Configure EIGRP Authentication
- Configure Authentication For EIGRP Routes
Module 3: IPv6
- Introduction To IPv6-Part1
- Introduction To IPv6-Part2
- IPv6 Addressing
- Basic IPv6 Configuration
- EIGRP For IPv6
- Configure And Optimize EIRGP For IPv6
Module 4: OSPF
- lntroduction To OSPF-Part1
- lntroduction To OSPF-Part2
- lntroduction To OSPF-Part3
- Configure OSPF
- Building The Link State Database
- OSPF Path Selection
- OSPF Route Summarization
- OSPF Stub Areas
- Implement OSPF
- Optimize OSPF
- OSPF Authentication Configuration
- Configure OSPFV3
- Basic Redistribution
Module 5: Border Gateway Protocol BGP
- Introduction To BGP
- BGP Specifics
- Basic BGP
- BGP Path Selection
- Configure BGP Authentication
- Configure BGP
Module 6: Course Review
- Configure Basic EIGRP
- Basic OSPF Configuration
- Summary Of-EIGRP-OSPF-IPv6-BGP
- Conclusion
Citrix CXA-206: XenApp 7.5 Design, Implement and Administer Course Content
Module 1: Introduction To Application Virtualization
- Course Introduction
- Introduction To Virtualization
- Introduction To Desktop Virtualization
- Introduction To Application Virtualization
- The XenApp Blue Print
- Building The Lab Environment
Module 2: XenApp Server Setup
- Configure XenApp Server After Initial Install
- Configuration Updates And Virtual Delivery Agent Install
- Build Master Image For Machine Catalog
- Complete Master Image Build
- Setup Delivery Group
- Test XenApp Application Delivery
Module 3: Plan For High Availability
- High Availability Explained-Part1
- High Availability Explained-Part2
- Windows Failover Cluster-Part1
- Windows Failover Cluster-Part2
- Complete Failover Cluster Configuration
- Complete Basic Cluster Configuration-Part1
- Complete Basic Cluster Configuration-Part2
- High Availability Explained-Part1
- High Availability Explained-Part2
- Windows Failover Cluster-Part1
- Windows Failover Cluster-Part2
- Complete Failover Cluster Configuration
- Complete Basic Cluster Configuration-Part1
- Complete Basic Cluster Configuration-Part2
Module 4: Scripting Primer
- Windows Batch Files-Part1
- Windows Batch Files-Part2
- Windows Batch Files-Part3
- Power Shell Scripts-Part1
- Power Shell Scripts-Part2
- Error Handling In PowerShell Scripts
- Scripts Explained
Module 5: Using VMware vSphere
- Introduction To VMware
- Configuring Windows 7 And Installing VMware Tools
- Power CLI Scripting In VMware
Module 6: Virtualization Using Microsoft Hyper-V
- Introduction To Hyper-V
- Introduction To Hyper-V Continued
- Windows Server Core Install And Configure-Part1
- Windows Server Core Install And Configure-Part2
- Install And Configure DHCP Server
- Hyper-V Virtual Networking
Module 7: Course Review
- Active Directory Fundamentals
- Permissions In Active Directory
- Logon Scripts In Windows
- Review Virtualization
- Review Application Virtualization
- Review High Availability
- Review Scripting
- Review XenApp Blue Print
- Course Conclusion
Microsoft 70-246: Monitoring and Operating a Private Cloud 2012 Course Content
Module 1: Introducing The Cloud Model
- Course And Instructor Introduction
- Overview Of Cloud Computing
- Dissecting Hybrid Cloud Environments
- Requirements For Cloud Implementation
- Using System Center To Operate The Cloud - Part 1
- Using System Center To Operate The Cloud - Part 2
- Using System Center To Operate The Cloud - Part 3
- Ongoing Cloud Maintenance
- System Center Component Integration
- Verifying The Cloud Infrastructure Demo
Module 2: Configuring The Private Cloud Environment
- Overview Of Virtual Machine Manager
- Managing Virtual Environments
- Creating Private Cloud
- Configuring And Optimizing The Private Cloud
Module 3: Deploying Services For The Private Cloud
- Understanding Service Templates
- Configuring Profiles - Part 1
- Configuring Profiles - Part 2
- Using Web Deploy Packages
- Configuring Server App-V
- Using Data Tier Applications
- Using App Controller To Deploy Services
- Deploying Cloud Services Demo
Module 4: Monitoring Cloud Based Applications
- Overview Of Operations Manager
- Deploying Monitoring Agents
- Customizing Monitoring Solutions
- Monitoring The Network Infrastructure
- Distributed Application Monitoring
- Application Performance Monitoring - Part 1
- Application Performance Monitoring - Part 2
- Application Performance Monitoring - Part 3
- Application Performance Monitoring - Part 4
- Application Performance Monitoring - Part 5
Module 5: Service Management For The New Cloud
- Configuring Service Manager - Part 1
- Configuring Service Manager - Part 2
- Configuring Service Manager - Part 3
- Configuring Service Manager - Part 4
- Automating Service Management - Part 1
- Automating Service Management - Part 2
- Automating Service Management - Part 3
- Managing Incidents And Problems
Module 6: High Availability And Disaster Recovery For The Private Cloud
- High Availability For The Private Cloud - Part 1
- High Availability For The Private Cloud - Part 2
- High Availability For The Private Cloud - Part 3
- High Availability For The Private Cloud - Part 4
- Protecting Data In The Private Cloud - Part 1
- Protecting Data In The Private Cloud - Part 2
- Recovering Data In The Private Cloud - Part 1
- Recovering Data In The Private Cloud - Part 2
Module 7: Optimizing The Private Cloud Infrastructure
- Applying Infrastructure Updates
- Applying Updates To Virtual Machines
- Extending The Private Cloud Infrastructure
- Optimizing The Cloud Infrastructure With System Center Advisor
- Using PRO-Tips To Optimize The Cloud
Module 8: Configuring MultiTenant SelfService Using Windows Azure Pack
- Understanding Windows Azure Pack
- Windows Azure Pack Administration
- Windows Azure Pack Providers
Module 9: Configuring And Monitoring The Private Cloud Review
- Configuring And Monitoring The Private Cloud Review
- Conclusion
Microsoft 70-409: Server Virtualization with Windows Server Hyper-V and System Center Course Content
Module 1: Understanding Microsoft Applications
- Introduction To Exam 70-409
- Introduction To Microsoft Virtualization-Part1
- Introduction To Microsoft Virtualization-Part2
- Introduction To System Center 2012 R2 Components
- Evaluate The Existing Environment For Virtualization
- Module 1 Review Questions
Module 2: Installing And Configuring The Hyper-V Role
- Install The Hyper-V Role
- Manage Hyper-V
- Configure Hyper-V Settings
- Introduction To Hyper-V Host Storage And Networking
- Module 2 Review Questions
- Installing Hyper-V-Demo
Module 3: Creating And Managing Virtual Hard Disks, Virtual Machines, And Virtual Machine Checkpoints
- Create And Configure Virtual Hard Disks
- Create And Configure Virtual Machines
- Install And Import Virtual Machines
- Manage Virtual Machine Checkpoints
- Monitor Hyper-V
- Design Virtual Machines For Server Roles-Services
- Module 3 Review Questions
- Creating A Virtual Machine-Demo
Module 4: Producing And Configuring Virtual Machine Networks
- Generate And Utilize Hyper-V Virtual Switches-Part1
- Generate And Utilize Hyper-V Virtual Switches-Part2
- Introduction To Advanced Hyper-V Networking Features
- Configure And Utilize Hyper-V Network Virtualization
- Module 4 Review Questions
- ControllingThe VM Demo
Module 5: Virtual Machine Movement And Hyper-V Replicas
- Deliver High Availability And Redundancy For Virtualization
- Implement Virtual Machine Movement
- Implement And Manage Hyper-V Replica
- Module 5 Review Questions
Module 6: Implementing Failover Clustering Using Hyper-V
- Introduction To Failover Clustering-Part1
- Introduction To Failover Clustering-Part2
- Configure And Utilize Shared Storage
- Implement And Manage Failover Clustering Using Hyper-V
- Module 6 Review Questions
- Exploring Clustering-Demo
Module 7: Installing And Configuring Microsoft System Center 2012 R2 Virtual Machine Manager
- Integrated System Center And Server Virtualization
- Virtual Machine Manager
- Install VMM And Add Hosts And Manage Host Groups
- Module 7 Review Questions
- Exploring SCVMM
Module 8: Managing The Network And Storage Infrastructure In Microsoft System Center 2012 R2 Virtual Machine Manager
- Managing Networking Infrastructure
- Managing Storage Infrastructure And Infrastructure Updates
- Module 8 Review Questions
Module 9: Creating And Managing Virtual Machines Using Microsoft System Center 2012 R2Virtual Machine Manager
- Introduction To Virtual Machine Management Tasks In VMM
- Create Clone And Convert Virtual Machines
- Introduction To Virtual Machine Updating
- Module 9 Review Questions
Module 10: Configuring And Managing The Microsoft System Center 2012 R2 Virtual Machine Manager Library
- Introduction To The Virtual Machine Manager Library
- Working With Profiles And Templates
- Module 10 Review Questions
Module 11: Managing Clouds In Microsoft System Center 2012 R2 Virtual Machine Manager
- Introduction To The Cloud
- Produce And Manage A Cloud And User Role Utilization In VMM
- Module 11 Review Questions
Module 12: Managing Services In Microsoft System Center 2012 R2 Virtual Machine Manager And Application Controller
- Managing Service In MSC 2012 R2 VMM And Application Controller-Part1
- Managing Service In MSC 2012 R2 VMM And Application Controller-Part2
- Module 12 Review Questions
Module 13: Protecting And Monitoring Virtualization Infrastructure
- Introduction To Backup And Restore Options For Virtual Machines
- Protecting Virtualization Infrastructure By Using DPM-Part1
- Protecting Virtualization Infrastructure By Using DPM-Part2
- Utilize Operations Manager For Monitoring And Reporting
- Integrate VMM With Operations Manager
- Module 13 Review Questions
- Exploring DPM-Demo
Module 14: Hyper-V And SCVMM Review
- Hyper-V And SCVMM Review-Part1
- Hyper-V And SCVMM Review-Part2
- Hyper-V And SCVMM Review-Part3
- Hyper-V And SCVMM Review-Part4
- Exam 70-409 Conclusion
Citrix CXS-203: XenServer 6.0 Design, Implement and Administer Course Content
Module 1: Intro To XenServer And Virtualization
- Intro To Virtual Computing
- Hypervisors-Part1
- Hypervisors-Part2
- Installing Your First VM
- Creating An Active Directory Domain In The VM
- Adding VM And Host To Domain
- Virtual Networks Explained
Module 2: Comprehensive Introduction To Linux
- Intro And Demo Of Linux
- Configuring Linux VM
- Network Configuration
- Linux Scripting And File Permissions
- Advanced Linux Permissions
- Linux DHCP And Disks Explained
- Install And Configure DHCP
Module 3: Hosts, Storage, And Networking
- Storage Access And Configuration
- iCSI Configuration And Access
- Storage Repository
- Subnets Explained
- Subnets Example
- More Subnetting
- Building A Linux Based VM Router
Module 4: Comprehensive Introduction To Powershell
- Why Powershell
- Using Powershell
- Pipelines And WMI
- More WMI And Scripting Using Powershell
- Advanced Powershell Scripting
Module 5: XenServer Components And Features
- Critical Components
- VM Templates
- Virtual Networking
- Automation Explained
- Automation Using XenServer CLI Demo
- Automation Using Powershell Demo
- Powershell Script Completion And Execution
- Protecting Your Virtual Environment Explained
- Protecting Your Virtual Environment Demo
- XenCenter Comprehensive Walk Through
Module 6: Problem Resolution
- Troubleshooting Explained
- VM Migration
Module 7: Review
- XenServer Exam Objectives
- PXE Server Explained
- PXE Server Demo
- XenServer Product Review
- AD Using Command Line And PowerShell
- Conclusion
Microsoft 70-336: MCSE: Core Solutions Lync Server 2013 Course Content
Module 1: Handling Design And Architecture For Microsoft Lync Server 2013
- Course And Instructor Introduction
- Introduction To Lync Server 2013 Architecture - Part 1
- Introduction To Lync Server 2013 Architecture - Part 2
- Introduction To Lync Server 2013 Architecture - Part 3
- Introduction To Lync Server 2013 Architecture - Part 4
- Introduction To Lync Server 2013 Architecture - Part 5
- Introduction To Lync Server 2013 Architecture - Part 6
- Introduction To Lync Server 2013 Core Capabilites
- Introduction To Lync Server 2013 Design Process
- Evaluate Infrastructure Requirements And Update The Design
- Plan For All Phases Of Microsoft Solutions Framework - Part 1
- Plan For All Phases Of Microsoft Solutions Framework - Part 2
- Plan For All Phases Of Microsoft Solutions Framework - Part 3
- Module 1 Questions
Module 2: Designing A Lync Server 2013
- Plan Infrastructure Requirements For Lync Server 2013 - Part 1
- Plan Infrastructure Requirements For Lync Server 2013 - Part 2
- Use The Lync Server 2013 Planning Tool
- Use The Topology Builder - Part 1
- Use The Topology Builder - Part 2
- Plan The Server Infrastructure
- Design Documentation With The Use Of Microsoft Office - Part 1
- Design Documentation With The Use Of Microsoft Office - Part 2 And Module 2 Questions
Module 3: Installing Lync
- Prepare For Installation
- Install Lync - Part 1
- Install Lync - Part 2
Module 4: Using Management Tools And RBAC
- Using Management Tools - Part 1
- Using Management Tools - Part 2
- Using Management Tools - Part 3
- Using Management Tools - Part 4
- Using Management Tools - Part 5
- Using Management Tools - Part 6
- Introduction To Role-Based Access Control
- Module 4 Questions
Module 5: Deploying And Managing Clients And Devices
- Prepare For Client Deployment
- Deploy And Manage Lync 2013 Clients
- Prepare For Device Deployment And Module 5 Questions
Module 6: Conferencing In Lync Server 2013
- Introduction To Conference In Lync Server 2013 - Part 1
- Introduction To Conference In Lync Server 2013 - Part 2
- Design For Web And Audio-Video Conferencing
- Introduction To Dial-In Conferencing In Lync Server 2013
- Manage And Administer Conferencing And Module 6 Questions
Module 7: Designing And Deploying External Access
- Introduction To Lync 2013 External Capabilities - Part 1
- Introduction To Lync 2013 External Capabilities - Part 2
- Plan For IM And Presence Federation
- Design Edge Requirements - Part 1
- Design Edge Requirements - Part 2
- Module 7 Questions
Module 8: Deploying Microsoft Lync Server 2013 Persistant Chat
- Introduction To Persistent Chat Architecture And Design Considerations In Lync Server 2013
- Deploy And Configure Lync Server 2013 Persistent Chat And Module 8 Questions
Module 9: Archiving And Monitoring
- Introduction To The Archiving And Monitoring Services
- Configure Archiving And Monitoring And Module 9 Questions
Module 10: Administering And Maintaining Lync Server 2013
- Administering And Maintaining Lync Server 2013 - Part 1
- Administering And Maintaining Lync Server 2013 - Part 2
Module 11: Configuring And Managing High Availability In Lync Server 2013
- Introduction To High Availability In Lync Server 2013
- Design Load Balancing - Part 1
- Design Load Balancing - Part 2
Module 12: Understanding Disaster Recover In Lync Server 2013
- Understanding Disaster Recover In Lync Server 2013 - Part 1
- Understanding Disaster Recover In Lync Server 2013 - Part 2
- Module 12 Real World Scenarios And Questions
Module 13: Planning a Migration to Lync Server 2013
- Introduction To Coexistence And Migration - Part 1
- Introduction To Coexistence And Migration - Part 2
- Introduction To Coexistence And Migration - Part 3
- Introduction To Migration Steps - Part 1
- Introduction To Migration Steps - Part 2
- Plan For Clients And Devices And Design Client Migration And Device Migration Strategy
- Course Outro
Microsoft 70-337: MCSE: Communication - Lync Server Course Content
Module 1: Understanding Voice Architecture
- Course Introduction
- Introduction To Architecture And Server Roles - Part 1
- Introduction To Architecture And Server Roles - Part 2
- Introduction To Architecture And Server Roles - Part 3
- Introduction To Architecture And Server Roles - Part 4
- Introduction To Architecture And Server Roles - Part 5
Module 2: Configuring Key Enterprise Voice Functionality
- Introduction To Lync Voice Routing
- Configure Enterprise Voice - Part 1
- Configure Enterprise Voice - Part 2
- Configure Enterprise Voice - Part 3
- Define Voice Policies - Part 1
- Define Voice Policies - Part 2
Module 3: Designing Exchange Server 2013 Unified Messaging Intergration with Lync Server 2013
- Introduction To Exchange 2013 Unified Messaging - Part 1
- Introduction To Exchange 2013 Unified Messaging - Part 2
- Configure Exchange UM To Work With Lync 2013 - Part 1
- Configure Exchange UM To Work With Lync 2013 - Part 2
- Configure Exchange UM To Work With Lync 2013 - Part 3
- Configure Exchange UM To Work With Lync 2013 - Part 4
- Configuring Exchange And Lync Feature Integration - Part 1
- Configuring Exchange And Lync Feature Integration - Part 2
- Configuring Exchange And Lync Feature Integration - Part 3
- Configuring Exchange And Lync Feature Integration - Part 4
- Configuring Exchange And Lync Feature Integration - Part 5
Module 4: Understanding Voice Applications
- Introduction To Response Group Services - Part 1
- Introduction To Response Group Services - Part 2
- Introduction To Response Group Services - Part 3
- Introduction To Response Group Services - Part 4
Module 5: Configuring and Deploying Emergency Calling
- Introduction To Location Information Server - Part 1
- Introduction To Location Information Server - Part 2
- Introduction To Set Up And Call Flow - Part 1
- Introduction To Set Up And Call Flow - Part 2
- E911 User Experience
Module 6: Integrating the PSTN
- Connect To The PSTN - Part 1
- Connect To The PSTN - Part 2
- Connect To The PSTN - Part 3
- Connect To The Existing PBX
- Intro To M-N Interworking Routing
- Introduction To Call Routing Reliability
Module 7: Understanding Lync Server 2013 and Networking
- Plan For Media Requirements - Part 1
- Plan For Media Requirements - Part 2
- Plan For Call Admission Control - Part 1
- Plan For Call Admission Control - Part 2
- Introduction To Media Bypass
Module 8: Understanding Phones and Devices
- Introduction To Phones And Devices Deploy Device - Part 1
- Introduction To Phones And Devices Deploy Device - Part 2
- Introduction To Phones And Devices Deploy Device - Part 3
- Lync Server 2013 Phones Management - Part 1
- Lync Server 2013 Phones Management - Part 2
Module 9: Configuring And Migrating Lync Online
- Introduction To Office 365 Architecture
- Deploy Lync Online
- Introduction To Lyncy brid Scenerios
Module 10: Monitoring
- Introduction To Voice Quality Concepts
- Explore Lync Monitoring Server Components
- Explore Lync Monitoring Server Reports
Module 11: Understanding Lync Server2013 Voice Resiliency
- Introduction To Voice Resilience
- Introduction Lync Pool Resilience
- Introduction Branch Office Resilience
- Course Outro
Microsoft 70-467: Designing Business Intelligence Solutions with SQL Server 2012 Course Content
Module 1: Intro To Business Intelligence
- Introduction
- The Business Intelligence Solution
- Overview Of Business Intelligence
- BI And Power Pivot Demo
- ETL Intro
- Designing Data Warehouses
- Design For Speed
- BI Semantic Model
Module 2: Database Essentials
- Basic Database Objects Demo
- Stored Procedures And Triggers Demo
- Database Clusters Demo
- SQL Server Management
- Table Triggers
- DB Config Options
- DB Backup
- DB Files And Restore
Module 3: Business Intelligence Development
- Using SQL Server Data Tools Demo
- Building An IS Integration Services Package Demo
- Loading Data From Remote Sources Demo
Module 4: Business Intelligence Results
- Report Building Intro Setup Demo
- Using Report Builder Demo
- Processing Data From Web Service Demo
- Reporting From Multiple Tables Demo
- Report Function And Matrix Demo
- Interactive Reports Demo
- Sorting Report Data Demo
Module 5: Advanced Reporting And Development
- Drill Through Reports
- Data Visualization
- Creating Store Procedure From Scratch
- Memory Optimize Table
Module 6: SQL Server Integration Services (SSIS)
- Building Our First Integration Project
- Data Transformation
- Introduction To Big Data
- Transformation Using Store Procedure
- Transformation Using SSIS
- Building Fact Table Using Store Procedure
- Building Fact Table Using SSIS
Module 7: SQL Server 2014 New Features
- Backup Enhancements
- Index Enhancements
- Online DB Enhancements
- BackUp To The Cloud
- Partition Data
Module 8: Course Review And Exam Prep
- BI Review
- SharePoint Overview
- SharePoint Demo
- Exam Prep
- Before You Take The Exam
- Conclusion
Citrix CXD-203: Managing App and Desktop Solutions with Citrix XenApp and XenDesktop 7.6 Course Content
Module 1: Introduction To Virtualization
- Introduction
- Intro To Virtualization-Part1
- Virtualization Demo-Part1
- Virtualization Demo-Part2
- Intro To Virtualization-Part2
Module 2: Introduction To Desktop Virtualization
- Into To Desktop Virtualization
Module 3: XenDesktop 7.6 Requirements and Implementations
- Intro To Xen Desktop Concepts And Components
- Xen Desktop Implementations-Part1
- Xen Desktop Implementations-Part2
Module 4: Plan and Design XenDesktop Infrastructure
- Intro To Plan And Design-Part1
- Intro To Plan And Design-Part2
- Active Directory Permissions Demo
- Customize The Desktop Demo
- Customize Environment Demo
- Folder Redirection Demo
- Custom Scripts Demo
- Dynamic VM Demo
- Network Design Considerations
- VM From Scratch Demo
- Access And Optimize
- Cloud Considerations Demo
- Design Monitoring
Module 5: Data And Network Redundancy
- Intro To Network Redundancy
- Intro To Data Redundancy
- VM Availability Demo-Part1
- VM Availability Demo-Part2
- VM Availability Demo-Part3
- Citrix Linux VM And Citrix Xendesktop Site Configuration Demo
Module 6: Automating Using Powershell
- Intro To Powershell-Part1
- Intro To Powershell-Part2
- Powershell Scripting Demo
- Creating Functions In Powershell
Module 7: Virtualizing Using Hyper-V
- Introduction To Hyper-V Installtion
- Introduction To Hyper-V VM Build
- Automating Admin In Hyper-V
Module 8: Build Test And Deploy VM To Xen Desktop
- Customize Client OS Demo
- Customize User Profiles Demo
- Installing XenDesktop Client Components For Pooled Desktops Demo
- Installing XenDesktop Client Components For Remote Desktops Demo
- Deploy XenDesktop Client After VDA Install Demo
- Test Client Deployment Demo
Module 9: Internet Information Services
- Intro And Install Of Information Services-Part1
- Intro And Install Of Information Services-Part2
- Creating Websites And Managing Application Pools
- Backup And Restore WebServer
Module 10: Course Review
- Active Directory Domain
- Windows Permissions And Configurations
- Configure Citrix XenDesktop Studio
- Failover Cluster Demo
- Citrix Authentication And Troubleshooting
- XenDesktop Technical Overview
- SQL Server Database Overview Demo
- SQL Server DBA Tasks
- Conclusion
Aerobic Bootcamp Course Content
Module 1: Beginner
- Beginner
Module 2: Intermediate
- Intermediate
Module 3: Advanced
- Advanced
How to Become a Personal Trainer Course Content
How to Become a Personal Trainer
- Intro
- Requirements
- Skills For A Successful Personal Trainer
- Questions To Consider
- Certifications
- Job Opportunities
- Salary For Personal Trainer
- First Aid And CPR
- Time Needed To Become A Personal Trainer
- Know Your Clients
- Interesting And Fun
- Common Mistakes
- Retaining Your Clients
- Insurance
- Summary
Six Sigma Black Belt Course Content
Module 1: Organization - Wide Planning and Deployment
- Introduction
- Wide Planning And Deployment-Part 1
- Wide Planning And Deployment-Part 2
- Wide Planning And Deployment-Part 3
Module 2: Leadership
- Leadership-Part 1
- Leadership-Part 2
Module 3: Organizational Process Measures and Management
- Organizational Process Measures And Management-Part 1
- Organizational Process Measures And Management-Part 2
Module 4: Team Management
- Team Management-Part 1
- Team Management-Part 2
- Team Management-Part 3
- Team Management-Part 4
Module 5: Define Phase - Overview of the Define Phase and the Voice of the Customer
- Overview Of The Define Phase And The Voice Of The Customer-Part 1
- Overview Of The Define Phase And The Voice Of The Customer-Part 2
- Overview Of The Define Phase And The Voice Of The Customer-Part 3
Module 6: Define Phase - Business Case and Project Charter
- Business Case And Project Charter-Part 1
- Business Case And Project Charter-Part 2
Module 7: Define Phase - Analytical Tools
- Analytical Tools
Module 8: Measure Phase - Process Analysis and Documentation
- Process Analysis And Documentation-Part 1
- Process Analysis And Documentation-Part 2
- Process Analysis And Documentation-Part 3
Module 9: Measure Phase - Data Collection
- Data Collection
Module 10: Measure Phase - Measurement Systems
- Measurement Systems-Part 1
- Measurement Systems-Part 2
Module 11: Measure Phase - Basic Statistics
- Basic Statistics-Part 1
- Basic Statistics-Part 2
Module 12: Measure Phase - Probability
- Probability
Module 13: Measure Phase - Process Capability
- Process Capability
Module 14: Analyze Phase - Measuring and Modeling Relationships
- Measuring And Modeling Relationships
Module 15: Analyze Phase - Hypothesis Testing
- Hypothesis Testing
Module 16: Analyze Phase - FEMA and Additional Analysis Methods
- FMEA And Additional Analysis Methods-Part 1
- FMEA And Additional Analysis Methods-Part 2
- FMEA And Additional Analysis Methods-Part 3
- FMEA And Additional Analysis Methods-Part 4
Module 17: Improve Phase - Design of Experiments (DOE)
- Design Of Experiments-Part 1
- Design Of Experiments-Part 2
Module 18: Improve Phase - Lean Method
- Lean Method-Part 1
- Lean Method-Part 2
- Lean Method-Part 3
Module 19: Improve Phase - Implementation
- Implementation
Module 20: Control Phase - Statistical Process Control (SPC)
- Statistical Process Control
Module 21: Control Phase - Other Controls
- Other Controls
Module 22: Control Phase - Maintain Controls and Sustain Improvements
- Maintain Controls And Sustain Improvements
Module 23: DFSS
- DFSS
Module 24: Exam Review - Prep and Key Concepts
- Prep And Key Concepts-Part 1
- Prep And Key Concepts-Part 2
- Prep And Key Concepts-Part 3
- Prep And Key Concepts-Part 4
- Prep And Key Concepts-Part 5
- Conclusion
Six Sigma Green Belt Course Content
Module 1: Six Sigma And The Organization
- Introduction
- Six Sigma And The Organization Goals-Part 1
- Six Sigma And The Organization Goals-Part 2
- Lean Principles In The Organization
- Design For Six Sigma
Module 2: Define PhaseProject Identification
- Define Phase-Project Identification-Part 1
- Define Phase-Project Identification-Part 2
- Define Phase-Project Identification-Part 3
Module 3: Define PhaseVoice Of The Customer
- Define Phase-Voice Of The Customer-Part 1
- Define Phase-Voice Of The Customer-Part 2
Module 4: Define Phase Project Management Basics on Six Sigma Green Belt
- Define Phase-Project Management Basics-Part 1
- Define Phase-Project Management Basics-Part 2
Module 5: Define PhaseManagement And Planning Tools
- Define Phase-Management And Planning Tools-Part 1
- Define Phase-Management And Planning Tools-Part 2
Module 6: Define PhaseBusiness Results For Projects
- Define Phase-Business Results For Projects-Part 1
- Define Phase-Business Results For Projects-Part 2
Module 7: Define PhaseTeam Dynamics And Define Phase Summary Review Questions
- Define Phase-Team Dynamics And Review Questions
- Define Phase-Summary And Review Questions
Module 8: Measure PhaseProcess Analysis And Documentation
- Measure Phase-Process Analysis And Documentation
Module 9: Measure PhaseProbability And Statistics
- Measure Phase-Probability And Statistics
Module 10: Measure PhaseStatistical Distributions
- Measure Phase-Statistical Distributions
Module 11: Measure PhaseCollecting And Summarizing Data
- Measure Phase-Collecting And Summarizing Data-Part 1
- Measure Phase-Collecting And Summarizing Data-Part 2
Module 12: Measure PhaseMeasurements System Analysis (MSA)
- Measure Phase-Measurements System Analysis(MSA)
Module 13: Measure PhaseProcess And Performance Capability And Measure Phase Summary And Review
- Measure Phase-Process And Performance Capability And Measure Phase Summary And Review
Module 14: Analyze PhaseExploratory Data Analysis And Hypothesis Testing
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part1
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part2
- Analyze Phase-Exploratory Data Analysis And Hypothesis Testing-Part3
Module 15: Analyze Phase Process Drivers
- Analyze Phase-Process Drivers-Part 1
- Analyze Phase-Process Drivers-Part 2
- Analyze Phase-Process Drivers-Part 3
- Analyze Phase-Process Drivers-Part 4
- Analyze Phase-Process Drivers-Part 5
Module 16: Improve PhaseDesign Of Experiment (DOE)
- Improve Phase-Design Of Experiment(DOE)-Part 1
- Improve Phase-Design Of Experiment(DOE)-Part 2
Module 17: Improve PhaseRoot Cause Analysis
- Improve Phase-Root Cause Analysis-Part 1
- Improve Phase-Root Cause Analysis-Part 2
- Improve Phase-Root Cause Analysis-Demo
Module 18: Improve PhaseLean Tools
- Improve Phase-Lean Tools-Part 1
- Improve Phase-Lean Tools-Part 2
- Improve Phase-Lean Tools-Part 3
- Improve Phase-Lean Tools-Part 4
Module 19: Control Phase Statistical Process Control
- Control Phase-Statistical Process Control
Module 20: Control PhaseLean Tools For Process Control
- Control Phase-Lean Tools For Process Control-Part 1
- Control Phase-Lean Tools For Process Control-Part 2
- Control Phase-Lean Tools For Process Control-Part 3
Module 21: Review ExamPrep And Key Concepts
- Exam Review And Key Concepts-Part 1
- Exam Review And Key Concepts-Part 2
- Exam Review And Key Concepts-Part 3
- Exam Review And Key Concepts-Part 4
- Exam Review And Key Concepts-Part 5
- Exam Review And Key Concepts-Part 6
- Exam Review And Key Concepts-Part 7
- Exam Review-Flash Cards
- Conclusion
Microsoft 70-247: Configuring and Deploying a Private Cloud 2012 Course Content
Module 1: Designing For The Cloud
- Introduction
- Designing The Cloud
- Reason For Using The Cloud
- Choosing The Right Cloud Model
- Designing Private Clouds
- Overview Of Virtualization Components
- Windows Server 2012 R2 And Hyper-V
- System Center 2012 R2 - Part 1
- System Center 2012 R2 - Part 2
- Deploying Highly Available Hyper-V Hosts
Module 2: Using System Center Virtual Machine Manager R2
- Overview Of Virtual Machine - Part 1
- Overview Of Virtual Machine - Part 2
- Deploying VMM
- Configuring Role Based Access Control
- Managing Hosts
- Configuring Networking - Part 1
- Configuring Networking - Part 2
- Configuring Storage
Module 3: Deploying And Maintaining Fabric Resources
- Extending And Maintaining The Cloud Infrastructure
- Deploying Hyper-V Host Servers - Part 1
- Deploying Hyper-V Host Servers - Part 2
- Providing Patch Management For Fabric Resources - Part 1
- Providing Patch Management For Fabric Resources - Part 2
Module 4: Building The Private Cloud
- Creating Building Blocks For The Private Cloud - Part 1
- Creating Building Blocks For The Private Cloud - Part 2
- Creating Virtual Machine Templates
- Creating A Private Cloud
- Creating And Deploying Applications - Part 1
- Creating And Deploying Applications - Part 2
- Creating And Deploying Applications - Part 3
- Creating And Configuring Services - Part 1
- Creating And Configuring Services - Part 2
- Configuring Access To The Private Cloud
Module 5: Monitoring And Optimizing The Private Cloud
- Overview Of Operations Manager
- Installing Operations Manager
- Deploying Monitoring Agents
- Configuring Access To Operations Manager
- Creating And Configuring Management Packs
- Configuring System Center Integration
- Extending And Optimizing Monitoring - Part 1
- Extending And Optimizing Monitoring - Part 2
Module 6: Planning And Deploying Service Management
- Overview Of Service Manager
- Deploying Service Manager
- Service Manager Work Items - Part 1
- Service Manager Work Items - Part 2
- Service Manager Work Items - Part 3
- Service Manager Notifications
- System Center Integration - Part 1
- System Center Integration - Part 2
Module 7: Automating And Standardizing The Private Cloud
- Overview Of Orchestrator
- Deploying Automation Using Orchestrator
- Configuring Integration Packs
- Configuring And Managing Runbooks
Module 8: Disaster Recovery And High Availability For The Private Cloud
- Overview Of Data Protection Manager
- Planning For Data Protection Manager
- Deploying Data Protection Manager
- Configuring Protection For The Private Cloud
- Configuring Protection For Applications - Part 1
- Configuring Protection For Applications - Part 2
- Hyper-V Recovery Manager
Module 9: Implementing SelfService MultiTenant Private Clouds
- Implementing The Cloud Services Process Pack - Part 1
- Implementing The Cloud Services Process Pack - Part 2
- Service Provider Foundation
- Configuring The Windows Azure Pack
- Conclusion
Weight Loss Course Content
Weight Loss
- Introduction
- Emotional Eating And Digestion
- Metabolism And Improving Digestion
- Food Mood And Steps For Weight Loss
- Portion Size
- Calorie Intake
- Supplements And Heart rate
Microsoft 70-688: Managing and Maintaining Windows 8 Course Content
Module 1: Introduction
- Intro To Exam 70-688
- Implementing A Methodology For Troubleshooting-Part1
- Implementing A Methodology For Troubleshooting-Part2
- Implementing A Methodology For Troubleshooting-Demo
Module 2: Troubleshooting Start Up Issues
- Troubleshooting Start Up Issues-Part1
- Troubleshooting Start Up Issues-Part2
- Troubleshooting Start Up Issues-Part3
- Troubleshooting Start Up Issues-Part4
- Troubleshooting Start Up Issues-Demo
Module 3: ​Managing Drivers And Hardware
- Managing Drivers And Hardware-Part1
- Managing Drivers And Hardware-Part2
- Managing Drivers And Hardware-Part3
- Managing Drivers And Hardware-Demo
Module 4: Troubleshooting Remote Computers
- Troubleshooting Remote Computers-Part1
- Troubleshooting Remote Computers-Part2
- Troubleshooting Remote Computers-Part3
Module 5: Resolving Problems With Network Connectivity
- Resolving Problems With Network Connectivity-Part1
- Resolving Problems With Network Connectivity-Part2
- Resolving Problems With Network Connectivity-Part3
- Resolving Problems With Network Connectivity-Part4
- Resolving Problems With Network Connectivity-Part5
Module 6: Troubleshooting Group Policy
- Troubleshooting Group Policy-Part1
- Troubleshooting Group Policy-Part2
- Troubleshooting Group Policy-Part3
- Troubleshooting Group Policy-Part4
Module 7: Troubleshooting User Settings
- Troubleshooting User Settings-Part1
- Troubleshooting User Settings-Part2
- Troubleshooting User Settings-Part3
Module 8: Configuring And Troubleshooting Remote Connectivity
- Configuring And Troubleshooting Remote Connectivity-Part1
- Configuring And Troubleshooting Remote Connectivity-Part2
- Configuring And Troubleshooting Remote Connectivity-Part3
- Configuring And Troubleshooting Remote Connectivity Demo-Part1
- Configuring And Troubleshooting Remote Connectivity Demo-Part2
- Configuring And Troubleshooting Remote Connectivity Demo-Part3
Module 9: ​Troubleshooting Resource Access In A Domain
- Troubleshooting Resource Access In A Domain-Part1
- Troubleshooting Resource Access In A Domain-Part2
- Troubleshooting Resource Access In A Domain-Part3
- Troubleshooting Resource Access In A Domain-Demo
Module 10: Configuring And Troubleshooting Resource Access For Non-Domain Members
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part1
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part2
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Part3
- Configuring And Troubleshooting Resource Access For Non-Domain Members-Demo
Module 11: Troubleshooting Applications
- Troubleshooting Applications-Part1
- Troubleshooting Applications-Part2
- Troubleshooting Applications-Part3
- Troubleshooting Applications-Part4
- Troubleshooting Applications-Demo
Module 12: Maintaining Windows 8.1
- Maintaining Windows 8.1-Part1
- Maintaining Windows 8.1-Part2
- Maintaining Windows 8.1-Part3
- Maintaining Windows 8.1-Part4
- Maintaining Windows 8.1-Demo
Module 13: Recovering Windows 8.1
- Recovering Windows 8.1
- Conclusion
Microsoft 70-686 Pro: Windows 7, Enterprise Desktop Administrator Course Content
Module 1: Developing a Strategy for Windows® 7 Business Desktops Deployment
- Introduction
- Developing A Strategy-Part1
- Developing A Strategy-Part2
- Developing A Strategy-Part3
- Developing A Strategy-Part4
- Developing A Strategy Demo-Part1
- Developing A Strategy Demo-Part2
Module 2: Evaluating Application Compatibility in Windows® 7
- Evaluating Application Compatibility-Part1
- Evaluating Application Compatibility-Part2
- Evaluating Application Compatibility-Demo
Module 3: Assessing Deployment Methods for Windows® 7
- Assessing Deployment Methods-Part1
- Assessing Deployment Methods-Part2
- Assessing Deployment Methods-Demo
Module 4: Designing Standard Images for Windows® 7
- Designing Standard Images-Part1
- Designing Standard Images-Part2
- Designing Standard Images-Part3
- Designing Standard Images-Demo
Module 5: Deploying Windows® 7 with Windows AIK
- Deploying Windows With Windows AIK
- Deploying Windows With Windows AIK-Demo
Module 6: Using Windows Deployment Services to Deploy Windows® 7
- Using Windows Deployment Services-Part1
- Using Windows Deployment Services-Part2
- Using Windows Deployment Services-Demo
Module 7: Deploying Windows® 7 Using Lite Touch Installation
- Deploying Windows 7 Using Lite Touch Installation
- Deploying Windows 7 Using Lite Touch Installation-Demo
Module 8: Deploying Windows® 7 Using Zero Touch Installation
- Deploying Windows 7 Using Zero Touch Installation
- Deploying Windows 7 Using Zero Touch Installation-Demo
Module 9: Migrating User State Using USMT 4.0 and WET
- Migrating User State Using USMT 4.0 And WET-Part1
- Migrating User State Using USMT 4.0 And WET-Part2
Module 10: Planning, Configuring, and Managing the Client Environment
- Planning Configuring And Managing The Client Environment-Part1
- Planning Configuring And Managing The Client Environment-Part2
- Planning Configuring And Managing The Client Environment-Part3
- Planning Configuring And Managing The Client Environment-Part4
- Planning Configuring And Managing The Client Environment-Demo
Module 11: Planning and Deploying Applications and Updates to Windows® 7 Clients
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part1
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part2
- Planning And Deploying Applications And Updates To Windows 7 Clients-Part3
- Planning And Deploying Applications And Updates To Windows 7 Clients-Demo
Microsoft 70-432: SQL Server 2008, Implementation and Maintenance Course Content
Installing on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Introduction
- Installing Part 1
- Installing Part 2
- Installing Part 2 Demo 1
- Installing Part 2 Demo 2
Getting familiar with SQL on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Getting Familiar With SQL Part 1
- Getting Familiar With SQL Part 1 Demo
- Getting Familiar With SQL Part 2
- Getting Familiar With SQL Part 2 Demo
- Getting Familiar With SQL Part 3
- Getting Familiar With SQL Part 3 Demo
Types of Data on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Data Types
- Data Types Demo
Databases on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Databases Part 1
- Databases Part 1 Demo
- Databases Part 2
- Databases Part 2 Demo
- Databases Part 3
Looking at Tables on Microsoft 70-432: SQL Server 2008, Implementation and Maintenance
- Tables
- Tables Demo
Module 6: Looking at Views
- Views Part 1
- Views Part 1 Demo
- Views Part 2
- Views Part 2 Demo
- Views Part 3
Module 7: About Constraints
- Constraints Part 1
- Constraints Part 1 Demo
- Constraints Part 2
Module 8: Looking at Stored Procedures
- Stored Procedures Part 1
- Stored Procedures Part 1 Demo
- Stored Procedures Part 2
Module 9: Functions
- Functions
- Functions Demo
Modules 10: About Service Broker
- Service Broker Part 1
- Service Broker Part 2
Modules 11: Integrity
- Data Integrity Part 1
- Data Integrity Part 2
Modules 12: Permissions in SQL
- Permissions Part 1
- Permissions Part 1 Demo
- Permissions Part 2
Modules 13: Accounts
- Logins Roles And Credentials
- Logins Roles And Credentials Demo
Modules 14: Security
- Additional Security Tools
- Additional Security Tools Demo
Modules 15: Backups/Restores
- Backing Up And Restoring Databases Part 1
- Backing Up And Restoring Databases Part 2
- Backing Up And Restoring Databases Demo
Modules 16: Endpoints
- Endpoints
Modules 17: Servers working together
- Linking Servers
Modules 18: Triggers in SQL
- Triggers
Modules 19: Replication between servers
- Replication Part 1
- Replication Part 2
Modules 20: Indexes
- Performing Indexing And Full Text Searching
Modules 21: Transactions in SQL
- Transaction And Locks
Modules 22: Data moves
- Moving Data
Modules 23: Data specialties in SQL
- Handling Specialty Data
Modules 24: Fault Tolerance
- High-Availability Methods Part 1
- High-Availability Methods Part 2
Modules 25: SQL Management
- Maintaining And Automating SQL Server
Modules 26: SQL Management Monitoring
- Monitoring And Optimizing SQL Server
- Monitoring And Optimizing SQL Server Demo
Modules 27: SQL Management tools
- SQL Server Management Tools
Module 28: Troubleshooting
- Troubleshooting Techniques
- Troubleshooting Techniques Demo
Module 29: Course Review
- Course Review Part 1
- Course Review Part 2
- Course Review Part 3
- Course Review Part 4
- Course Review Part 5
Module 30: Common Questions
- Common Student Questions Part 1
- Common Student Questions Part 2
Module 31: Real World Scenarios
- Real World Scenarios Part 1
- Real World Scenarios Part 2
Mastering Beer Brewing Course Content
Day 1
- Intro
- History
- Sanitation
- Cleaning
- Extract Batch Equipment
- Air Locks
- Extract Batch Ingredients
- Extract Batch Recipe
- Heating
- First Hop Addition
- Second Hop Addition
- Filtering
- Measuring Density
Day 2
- Mixed Batch Intro
- Adding Malt
- Removing Malt
- Adding Extract
- Adding 1st Hops
- 2nd Hops Addition
- 3rd Hops Addition
- Final Hop Adition
- Add Yeast Part 1
- Add Yeast Part 2
- All Grains Part 1
- All Grains Part 2
- All Ingredients
Day 3
- All Grains Intro
- CU of Fermentation Bubbling
- Adding Grain
- Adding Grain Insert
- Sparging Part 1
- Sparging Part 2
- Sparging Mid Process
- Boiling
- 2nd Hop Addition
- Colling Wort
- Adding Yeast
- Alternative Methods
Day 4
- Post Brewing Overview
- Siphoning
- Bottling
- Capping
- Bottling Alternatives
- Kegs Part 1
- Kegs Part 2
- Natural Carbonation
- Forced Carbonation
- Kegerator
- Finished Product
- Outro
Mastering Bartending in a Week or Less Course Content
Day 1
- Intro
- Glassware
- Tools
- Alcohol Types
Day 2
- Martini
- Martini continued
- Flavored Martini
- Section Tool
- Long Island
- Sour Drinks
- Popular Drinks Part 1
- Popular Drinks Part 2
- Popular Drinks Part 3
- Popular Drinks Part 4
- Ruthie Martini
- Ruthie Martini Continued
- Flavored Martinis
- More Sour Drinks
Day 3
- Recap Drinks
- Muddlers
- Popular Drinks
- Popular Drinks 2
- Tropical Drinks
- Shooters Part 1
- Shooters Part 2
- Shooters Part 3
- Shots
- Shooters Conclusion
- Beer
- Greetings Customers
Day 4
- Recap-Drinks
- Layered Shots
- Wines
- Counterfeit Money
- Organizing Your Bar Part 1
- Organizing Your Bar Part 2
- Valid ID
- Tools and Accessories
- Common Issues
Day 5
- Review Intro
- Review Characters
- Review Tools
- Review Pour
- Review Glass
- Review Martinis
- Review Muddler
- Review Drinks
- Review Lit
- Review Sour Drinks
- Review Types of Liquor
- Review More Drinks
- Review Tropical Drinks
- Review Shooters
- Review Beer
- Review Layered Shots
- Review Money
- Review ID
- Conclusion
How to Handle Stress in the Workplace Course Content
How to Handle Stress in the Workplace
- Introduction
- What is Stress
- What Does Stress Lead To
- Stress And Food
- Chronic Stress And Cortisol-Part 1
- Chronic Stress And Cortisol-Part 2
- Client Stress Stories
- Stress In The Workplace
- Strategies For Managing Stress
- Planning Ahead
- Money
- Sleep
- Breathing
- Learn To Say No
- Stress Relief At Your Desk
- Stretching
- Conclusion
Become a Scrum Master Course Content
Module 1: Development Methods
- Introduction To Scrum Master
- Development Methods
Module 2: Agile Manifesto Principles
- Agile Manifesto Principles
Module 3: Scrum
- Scrum
- Scrum Summary
Module 4: Why Scrum
- Why Scrum?
Module 5: Scrum-Roles Overview
- Scrum - Roles Overview
Module 6: Product Owner
- Product Owner
Module 7: Scrum Master
- Scrum Master
Module 8: Scrum Team
- Scrum Team
Module 9: Scrum Process
- Scrum Process
Module 10: Scrum Project Phase
- Scrum Project Phase
Module 11: Plan and Estimate
- Plan And Estimate
Module 12: Implement
- Implement
Module 13: Review and Retrospect
- Review And Retrospect
Module 14: Release
- Release
Module 15: Project Vision
- Project Vision
Module 16: Scrum Master and Stake Holder(s)
- Scrum Master And Stake Holders
Module 17: Form Scrum Team
- Form Scrum Team
Module 18: Develop Epics
- Develop Epics
Module 19: User Stories
- User Stories
Module 20: Justifications and Sample Change(s)
- Justifications And Sample Changes
Module 21: Creating a Prioritized Backlog
- Creating A Prioritized Backlog
Module 22: Conduct Release Planning
- Conduct Release Planning
Module 23: Sprints
- Sprints
Module 24: Scrum Framework
- Scrum Framework - Part 1 Roles
- Scrum Framework - Part 2 Ceremonies
- Scrum Framework - Part 3 Artifacts
Module 25: Scrum of Scrums
- Scrum Of Scrums
Module 26: Scrum Demo
- Scrum Demo
Module 27: Review
- Review
- Outro
Microsoft 70-466: Implementing Data Models & Reports with SQL Server 2012 Course Content
Module 1: Introduction To Business Intelligence And Data Modeling
- Introduction To Business Intelligence and Data Modeling Part1
- Introduction To Business Intelligence and Data Modeling Part2
- The Microsoft Business Intelligence Platform Part 1
- The Microsoft Business Intelligence Platform Part 2
- The Microsoft Business Intelligence Platform Part 3
- The Microsoft Business Intelligence Platform Part 4
Module 2: Implementing Reports The SQL Server Reporting Services
- Implementing Reports the SQL Server Reporting Services Part 1
- Implementing Reports the SQL Server Reporting Services Part 2
- Implementing Reports the SQL Server Reporting Services Part 3
- Implementing Reports the SQL Server Reporting Services Part 4
- Implementing Reports the SQL Server Reporting Services Part 5
- Implementing Reports the SQL Server Reporting Services Part 6
- Implementing Reports the SQL Server Reporting Services Part 7
- Implementing Reports the SQL Server Reporting Services Part 8
Module 3: Supporting Self Service Reporting
- Supporting Self Service Reporting Part 1
- Supporting Self Service Reporting Part 2
Module 4: Managing Report Execution And Delivery
- Managing Report Execution And Delivery
- Managing Report Execution
- Subscriptions And Data Alerts
Module 5: Creating Multidimensional Databases
- Creating Multidimensional Databases
- Creating Data Sources And Data Source Views
- Creating And Browsing a Cube
Module 6: Working With Cubes And Dimensions
- Working with Cubes And Dimensions
- Sorting And Grouping Attributes
Module 7: Working With Measures And Measure Groups
- Working With Measures and Measure Groups
Module 8: Introduction To MDX
- Introduction To MDX
- Adding Calculations To A Cube
Module 9: Customizing Cube Functionality
- Customizing Cube Functionality Part 1
- Customizing Cube Functionality Part 2
- Customizing Cube Functionality Part 3
Module 10: Implementing A Tabular Data Model
- Implementing A Tabular Data Model Part 1
- Implementing A Tabular Data Model Part 2
Module 11: Introduction To DAX
- Introduction to DAX
- Demonstration Making A Tabular Model Part 1
- Demonstration Making A Tabular Model Part 2
- Using DAX
Module 12: Implementing An Analysis Services Tabular Data Model
- Implementing An Analysis Services Tabular Data Model Part 1
- Implementing An Analysis Services Tabular Data Model Part 2
- Deploying A Tabular Data Model
Module 13: SQL Analysis Services
- SQL Analysis Services Part 1
- SQL Analysis Services Part 2
Module 14: Creating Data Visualizations With Power View
- Creating Data Visualizations With Power View
Module 15: Supporting Self Service Reporting
- Supporting Self Service Reporting
Module 16: Performing Predictive Analysis With Data Mining
- Performing Predictive Analysis With Data Mining
- Using The Data Mining Wizard
Module 17: Predictive Analytics
- Predictive Analytics Part 1
- Predictive Analytics Part 2
CompTIA CV0-001: CompTIA Cloud + Course Content
Module 1
- Introduction
- Models-Part 1
- Models-Part 2
- Service And Delivery Models
- Terms And Characteristics
- Objects Storage Concepts
Module 2
- Virtualization
- Install Configure Manage VM And Devices
- Backups
- Virtual Disks
- Virtual Switches
- Virtual Resource Migration
- Benefits Of Virtualization In A Cloud Environment
- Compare And Contrast Virtua lEnvironment
Module 3
- Infrastructure
- Different Access Protocols
- Explain Storage Configuration
- File Systems Types
- Executing Storage Provisioning
- Network Share Demo
- Implement Appropriate Network Configurations
- Importance Of Network Optimization
- Troubleshoot Basic Network Configuration-Part 1
- Troubleshoot Basic Network Configuration-Part 2
- Troubleshoot Commands-Part 1
- Troubleshoot Commands-Part 2
- Troubleshoot Commands-Part 3
- Explain Common Network Protocols
- Common Hardware Resources
Module 4
- Resource Management-Part 1
- Resource Management-Part 2
- Establishing Baselines And Thresholds
- Appropriately Allocate Physical Host Resources-Part 1
- Appropriately Allocate Physical Host Resources-Part 2
- Appropriately Allocate Virtual Guest Resources-Part 1
- Appropriately Allocate Virtual Guest Resources-Part 2
- Use Appropriate Tools For Remote Access
Module 5
- Security-Part 1
- Security-Part 2
- Storage Security Concepts And Methods
- Different Encryption Technologies
- Identify Access Control Methods
Module 6
- Systems Management-Part 1
- Systems Management-Part 2
- Diagnose Remediate And Optimize-Part 1
- Diagnose Remediate And Optimize-Part 2
- Common Performance Concepts-Part 1
- Common Performance Concepts-Part 2
- Testing Techniques
Module 7
- Business Continuity In Cloud-Part 1
- Business Continuity In Cloud-Part 2
- Solutions To Meet Availability Requirements
- Conclusion
Microsoft 70-685 Pro: Windows 7, Enterprise Desktop Support Technician Course Content
Module 1: Installing, Upgrading, and Migrating to Windows 7
- Introduction To Exam 685 Windows 7 Enterprise Desktop Support Technician
- Introduction To Installing Upgrading And Migrating To Windows 7
- Windows 7 Pre-Installation Requirements
- Installing Windows 7-Part1
- Installing Windows 7-Part2
- Installing Windows 7-Part3
- Overview Of Image Based Installations-Part1
- Overview Of Image Based Installations-Part2
- Overview Of Image Based Installations-Part3
- Configuring Application Compatibility
- Chapter 1 Summary
Module 2: Configuring Disks And Device Drivers
- Introduction To Configuring Disks And Device Drivers
- Managing And Maintaining Disks-Part1
- Managing And Maintaining Disks-Part2
- Managing And Maintaining Disks-Part3
- Installing And Configuring Device Drivers
- Chapter 2 Summary
Module 3: Configuring File Access And Printers
- Introduction To Configuring File Access And Printers
- Overview Of Authentication And Authorization
- Managing File Access-Part1
- Managing File Access-Part2
- Managing Shared Folders-Part1
- Managing Shared Folders-Part2
- Configuring File Compression
- Managing Printing
- Chapter 3 Summary
Module 4: Indentifying And Resolving Log on Problems
- Introduction To Identifying And Resolving Logon Problems
- Understanding Authentication
- Managing Computer Accounts
- Additional Network Services-Part1
- Additional Network Services-Part2
- Troubleshooting User Properties
- Resolving Logon Issues
- Chapter 4 Summary
Module 5: Configuring Network Connectivity
- Introduction To Configuring Network Connectivity
- Configuring TCPIP Connectivity-Part1
- Configuring TCPIP Connectivity-Part2
- Configuring TCPIP Connectivity-Part3
- Automatic IP Address Allocation
- Name Resolution
- Wireless Networking-Part1
- Wireless Networking-Part2
- Wireless Networking-Part3
- Chapter 5 Summary
Module 6: Troubleshooting Network Issues
- Introduction To Troubleshooting Network Issues
- Troubleshooting Network Connectivity-Part1
- Troubleshooting Network Connectivity-Part2
- Troubleshooting Network Connectivity-Part3
- Troubleshooting Name Resolution-Part1
- Troubleshooting Name Resolution-Part2
- Troubleshooting Name Resolution-Part3
- Troubleshooting Network Printing-Part1
- Troubleshooting Network Printing-Part2
- Troubleshooting Network Printing-Part3
- Chapter 6 Summary
Module 7: Mobile Computing And Remote Access
- Introduction To Mobile Computing And Remote Access
- Configuring Mobile Computer And Device Settings
- Using Remote Control Tools
- Configuring And Troubleshooting Remote Access-Part1
- Configuring And Troubleshooting Remote Access-Part2
- Configuring And Troubleshooting Remote Access-Part3
- Configuring And Troubleshooting Remote Access-Part4
- Configuring Branch Cache Managing Computer Accounts
- Chapter 7 Summary
Module 8: Securing Windows 7 Desktops
- Introduction To Securing Windows 7 Desktops
- Overview Of Security Management-Part1
- Overview Of Security Management-Part2
- Overview Of Security Management-Part3
- User Account Control
- Application Restrictions-Part1
- Application Restrictions-Part2
- Configuring The Windows Firewall-Part1
- Configuring The Windows Firewall-Part2
- Configuring The Windows Firewall-Part3
- Configuring The Windows Firewall-Part4
- Securing And Troubleshooting Internet Explorer-Part1
- Securing And Troubleshooting Internet Explorer-Part2
- Securing And Troubleshooting Internet Explorer-Part3
- Chapter 8 Summary
Module 9: Optimizing And Troubleshooting Performance And Reliabilty
- Introduction To Optimizing And Troubleshooting Performance And Reliability
- Overview Of Performance And Reliability Tools-Part1
- Overview Of Performance And Reliability Tools-Part2
- Optimizing Performance-Part1
- Optimizing Performance-Part2
- Dealing With Hardware Failure
- Chapter 9 Summary
Module 10: Maintaining Windows 7 Desktops
- Introduction To Maintaining Windows 7 Desktops
- Troubleshooting Utilities-Part1
- Troubleshooting Utilities-Part2
- Troubleshooting Utilities-Part3
- Troubleshooting Utilities-Part4
- Backing Up And Restoring Data
- Using System Restore
- Configuring Windows Update
- Chapter 10 Summary
- Conclusion
Microsoft 70-465: Designing Database Solutions for Microsoft SQL Server 2012 Course Content
Module 1: Designing A Database Server Infrastructure
- Introduction
- Designing A Database Server Infrastructure-Part1
- Designing A Database Server Infrastructure-Part2
- Designing A Database Server Infrastructure-Part3
- Designing A Database Server Infrastructure-Part4
- Considerations For Database Server Consolidation
- Managing Server Resources
Module 2: Designing A Logical Database Scheme
- Designing A Logical Database Scheme-Part1
- Designing A Logical Database Scheme-Part2
- Designing A Logical Database Scheme-Part3
- Designing A Logical Database Scheme-Part4
- Designing A Logical Database Scheme-Part5
Module 3: Designing A Physical Database Implementation
- Designing A Physical Database Implementation-Part1
- Designing A Physical Database Implementation-Part2
- Designing A Physical Database Implementation-Part3
Module 4: Incorporating Data Files Into the Database
- Incorporating Data Files Into The Database-Part1
- Incorporating Data Files Into The Database-Part2
- Incorporating Data Files Into The Database-Part3
- Incorporating Data Files Into The Database Demo
- Searching Data Files
- Searching Data Files Demo
Module 5: Tuning Database Performance
- Tuning Database Performance-Part1
- Tuning Database Performance-Part2
- Tuning Database Performance-Part3
- Working With Query Plans-Part1
- Working With Query Plans-Part2
- Working With Query Plans-Part3
- Working With Query Plans-Part4
Module 6: Designing Database Security
- Designing Database Security-Part1
- Designing Database Security-Part2
- Contained Databases
- Protecting Data With Encryption
Module 7: Policy Based Management
- Policy Based Management
- Policy Based Management Demo
Module 8: Monitoring Server Health
- Monitoring Server Health
- Monitoring Server Health Demo
Module 9: Designing Database Backup Solution
- Designing Database Backup Solution-Part1
- Designing Database Backup Solution-Part2
- Designing Database Backup Solution-Part3
- Designing Database Backup Solution-Part4
- Disaster Recovery Plan-Part1
- Disaster Recovery Plan-Part2
Module 10: Automating Multi Server Maintenance
- Automating Multi Server Maintenance
- Managing Multiple Servers
Module 11: Managing SQL Server With Windows Powershell
- Managing SQL Server WIth Windows Powershell
- Windows Powershell Lab
Module 12: Replicating Data
- Replicating Data-Part1
- Replicating Data-Part2
- Replicating Data-Part3
Module 13: Planning High Availability
- Planning High Availability-Part1
- Planning High Availability-Part2
Module 14: Review of SQL Statements
- Review Of SQL Statements-Part1
- Review Of SQL Statements-Part2
- Review Of SQL Statements-Part3
Module 15: Eleven Rules of Database Design
- Eleven Rules Of Database Design
- Conclusion
Microsoft 70-464: Developing Microsoft SQL Server 2012 Databases Course Content
Module 1: SQL 2012 And The 464 Test
- Introduction
- Intro To SQL Server 2012-Part1
- Intro To SQL Server 2012-Part2
- Management Studio Demo-Part1
- Management Studio Demo-Part2
- Management Studio Demo-Part3
- Other SQL Server Tools
Module 2: Working With Data Types
- Working With Data Types-Part1
- Working With Data Types-Part2
- Working With Data Types-Part3
- Other Data Types
Module 3: Tables
- Tables
- Creating Tables
Module 4: Data Constraints
- Data Constraints-Part1
- Data Constraints-Part2
Module 5: Planning In Indexing
- Planning In Indexing-Part1
- Planning In Indexing-Part2
- Planning In Indexing-Part3
- Planning In Indexing-Part4
Module 6: Table Structures
- Table Structures
- Working With Clustered Indexes
- Clustered Indexes
- Designing Effective Clustered Indexes
Module 7: Improving Performance with Non-Clustered Indexes
- Improving Performance With Non-Clustered Indexes-Part1
- Improving Performance With Non-Clustered Indexes-Part2
- Improving Performance With Non-Clustered Indexes-Part3
Module 8: Using Indexes And Execution Plans
- Using Indexes
- Execution Plans-Part1
- Execution Plans Demo
- Execution Plans-Part2
Module 9: Working with Views
- Working With Views-Part1
- Working With Views-Part2
Module 10: Designing and Implementing Stored Procedures
- Designing And Implementing Stored Procedures-Part1
- Designing And Implementing Stored Procedures-Part2
- Designing And Implementing Stored Procedures-Part3
Module 11: Merging Data and Passing Tables
- Merging Data And Passing Tables-Part1
- Merging Data And Passing Tables-Part2
- Merging Data And Passing Tables-Part3
Module 12: Designing and Implementing User Functions
- Designing And Implementing User Functions
Module 13: Creating Highly Concurrent SQL Server Applications
- Creating Highly Concurrent SQL Server Applications-Part1
- Creating Highly Concurrent SQL Server Applications-Part2
- Creating Highly Concurrent SQL Server Applications-Part3
Module 14: Handling Errors in T-SQL
- Handling Error InT-SQL-Part1
- Handling Error InT-SQL-Part2
Module 15: Triggers
- Triggers
Module 16: Implementing Managed Code
- Implementing Managed Code-Part1
- Implementing Managed Code-Part2
- Implementing Managed Code-Part3
- Implementing Managed Code-Part4
Module 17: Storing XML in SQL
- Storing XML In SQL-Part1
- Storing XML In SQL-Part2
Module 18: Querying XML
- Querying XML-Part1
- Querying XML-Part2
Module 19: Working with the Spatial Data
- Working With Spatial Data-Part1
- Working With Spatial Data-Part2
- Working With Spatial Data-Part3
Module 20: Working With Full-Text Indexes and Queries
- Working With Full-Text Indexes And Queries-Part1
- Working With Full-Text Indexes And Queries-Part2
- Working With Full-Text Indexes And Queries-Part3
Microsoft Office 365 Online Versions Course Content
Module 1: What Is Microsoft 365
- Introduction To 365
- A Little Background On MS Office
- Office 365 Versions And Features-Part1
- Office 365 Versions And Features-Part2
- Online Sign Up
Module 2: Word Online
- Word Online Overview
- Starting A Document In Word Online
- Word Saved To One Drive
- Navigating Word
- Tools And Features
- Fonts Attributes-Part1
- Fonts Attributes-Part2
- Lines And Paragraphs-Part1
- Lines And Paragraphs-Part2
- Bullets Numbering And Styles-Part1
- Bullets Numbering And Styles-Part2
- Inserts Pictures And Tools-Part1
- Inserts Pictures And Tools-Part2
- Tables And Formatting-Part1
- Tables And Formatting-Part2
- Sharing And Templates-Part1
- Sharing And Templates-Part2
Module 3: Excel Online
- Excel Online Overview
- Getting Started With Excel
- Data Entry And Navigation
- Data Entry-Part1
- Data Entry-Part2
- Data Entry And Formatting-Part1
- Data Entry And Formatting-Part2
- Intro To Formulas
- Formulas-Part1
- Formulas-Part2
- Formulas-Part3
- Intermediate Formula And Table Format-Part1
- Intermediate Formula And Table Format-Part 2
- Surveys
- More Formula And Charts-Part1
- More Formula And Charts-Part2
- Charts
- Sheets And Templates
Module 4: Powerpoint Online
- What Is Powerpoint
- Screen Layout
- Entering And Formatting Text
- Layouts And Designs Part 1
- Layouts And Designs Part 2
- Inserting Objects
- Objects And Transitions
- Animations
- Smart Art
- Notes Printing And Templates
Module 5: Outlook Online
- Intro To Outlook Online
- Intro To Email Accounts Screen Layout
- Configuring Outlook Online
- Sending Emails Outlook Online
- Organization Outlook Online
- Mail Rules In Outlook Online
- Additional Mail Options In Outlook Online
- Spam And Junk Outlook Online
Module 6: One Note Online
- What Is OneNote
- OneNote Screen Overview
- OneNote Desktop
- Drawing Tools With OneNote
- Send To OneNote
- Media With OneNote
Microsoft Outlook 2013 Course Content
Outlook 2013 Basic
- Introduction To Outlook
- Understanding Email Setting Outlook
- Configuring Interface-Part1
- Configuring Interface-Part2
- Email Window-Part1
- Email Window-Part2
- Managing The Inbox
- Using The Calendar-Part1
- Using The Calendar-Part2
- Contacts-Part1
- Contacts-Part2
- Task List
Outlook 2013 Intermediate
- Adding An Account From Scratch
- Multiple Email Accounts In One Window
- Searching For Mail
- Managing The Folders Views In Inbox
- Using Priority And Receipts
- Calendars
- Contacts-Part1
- Contacts-Part2
Outlook 2013 Advanced
- Mail Part 1 Auto-Replies
- Mail Part 2 Signatures
- Views and Options Part 1
- Views and Options Part 2
- Calendar Part 1
- Calendar Part 2
- Calendar Options
- Contacts
- Contacts Options
- Advanced Options Part 1
- Advanced Options Part 2
Microsoft Word 2013 Course Content
Word 2013 Basic
- Intro To Word
- Screen Layout
- Page Setup And Text Entry
- Auto-correct Text Formatting
- More Font Formatting
- Fonts-Part 3
- Font Attributes Using Right Click
- Paragraph Attributes
- Customizing Bullets And Numbers
- Reveal Codes Putting It All Together And Saving
- Viewing Rulers
- Formatting Images
- Inserting Images
- Tabs
- Window Views And Putting It All Together-Part 1
- Window Views And Putting It All Together-Part 2
Word 2013 Intermediate
- Intro To Word 2013 Intermediate
- Review Introduction To Styles
- Headers And Footers
- Section Breaks Section Footers
- More Objects Word Intermediate
- Tables In Word Intermediate
- Inserting Text Boxes Word Intermediate
- Additional Page Attributes Word Intermediate
- Intro To Customizing Attributes
- Continuing Auto-correct Options
- View Options In Navigation Pane
- Mail Merge-Part 1
- Mail Merge-Part 2
- Mail Merge-Part 3
- Table Of Contents
- Columns
- Working With Outlines
Word 2013 Advanced
- Word Advanced Introduction
- End Notes Foot Notes
- Captions
- Citations
- Table Of Authorities
- Reference Page Index Table
- Track Changes
- Compare
- Advance Mail Merge-Part 1
- Advance Mail Merge-Part 2
- Advance Smart Art
- Templates
- Custom Configuration
Microsoft Powerpoint 2013 Course Content
Powerpoint 2013 Basic
- What Is PowerPoint
- Screen Elements
- Starting A New Presentation
- Layouts
- Objects-Part1
- Objects-Part2
- Objects-Part3
- Slide Design
- Slide Transitions
- Animations-Part1
- Animations-Part2
- View And Slideshow
Powerpoint 2013 Intermediate
- Understanding Slide Masters
- Slide Masters
- Animations-Part1
- Animations-Part2
- Hotspots And Actions
- Views
- Printing Options
Powerpoint 2013 Advanced
- Introduction To Advanced And Inserting Charts
- Setting Up Slide Shows-Part1
- Setting Up Slide Shows-Part2
- Advanced Animations
- Templates Vs Shows
- Reviewing Information And Compare
- Copy And Paste Across Presentations
- Customizing Powerpoint
- Adding Media Video
- Adding Media Audio-Part1
- Adding Media Audio-Part2
Microsoft Excel 2013 Course Content
Excel 2013 Basic
- Intro To Excel Overview Of Screen
- Ribbon Elements
- Entering Data And Editing Font Attributes
- Number Formats
- Formatting Cells
- Printing
- Formulas - Part 1
- Formulas - Part 2
- Rearranging Data
- More Formulas - Part 1
- More Formulas - Part 2 Review And Sort
- More Formulas - Part 3 Concatenate
- Chart - Part 1
- Chart - Part 2
- Chart - Part 3
- Summary
Excel 2013 Intermediate
- Introduction
- Review
- Formulas Across Worksheets - Part 1
- Formulas Across Worksheets - Part 2
- Conditional Formatting
- Data Validation
- Names Ranges
- CSV Files
- Text To Column
- Grouping Data
- More Charts Beyond Building Blocks
- Working With Windows - Part 1
- Working With Windows - Part 2
- Headers Footers And Protecting Data
Excel 2013 Advanced
- Pivot Tables - Part 1
- Pivot Tables - Part 2
- Sparklines
- Trancing Formulas
- What If Scenario
- External Data Sources
- Customizing Menus And Options - Part 1
- Customizing Menus And Options - Part 2
- Macros
Microsoft Access 2013 Course Content
Access 2013 Introduction
- Access 2013 Introduction
- What Are Databases
- The Interface Window
- Setting Up The Database-Part1
- Setting Up The Database-Part2
- Creating Forms
- Understanding Table Relationships
- Introduction To Queries
- Introduction To Reports
Access 2013 Intermediate
- Introduction to Table Tools Part 1
- Table Tools-Part2
- Table Tools-Part3
- Forms And Design Intermediate-Part1
- Forms And Design Intermediate-Part2
- Forms Data Entry-Part1
- Forms Data Entry-Part2
- Queries
- Reports From Queries-Part1
- Reports From Queries-Part2
- Reports From Queries-Part3
- Specialized Form
Access 2013 Advanced
- Advance Introduction And Sub-forms
- Sub-forms
- Additional Types Of Queries
- Form And Macros-Part1
- Form And Macros-Part2
- Advance Forms
- Reports Advance-Part1
- Reports Advance-Part2
- Updating Reports
- Customization And Conclusion
Microsoft 70-243: Administering and Deploying SCCM 2012 Course Content
Module 1: Planning Configuration Manager Infrastructure
- Intro
- Planning Configuration Manager Infrastructure - Part 1
- Planning Configuration Manager Infrastructure - Part 2
- Planning Configuration Manager Infrastructure - Part 3
- Planning Configuration Manager Infrastructure - Part 4
- Planning Configuration Manager Infrastructure - Part 5
Module 2: Migrating To Configuration Manager 2012
- Migrating To Configuration Manager 2012
Module 3: Installations and Site Role Configuration
- Installation And Site Role Configuration - Part 1
- Installation And Site Role Configuration - Part 2
- Installation And Site Role Configuration - Lab 1
- Installation And Site Role Configuration - Lab 2
Module 4: Cloud Integration
- Cloud Integration
Module 5: Installing The Client
- Installing The Client - Part 1
- Installing The Client - Part 2
- Installing The Client - Part 3
- Installing The Client Lab
Module 6: Client Health
- Client Health
Module 7: Application Deployment
- Application Deployment
- Application Deployment Lab
Module 8: Software Updates
- Software Updates - Part 1
- Software Updates - Part 2
- Software Updates Lab
Module 9: Operating System Deployment
- Operating System Deployment - Part 1
- Operating System Deployment - Part 2
- Operating System Deployment - Part 3
Module 10: Inventory and Software Metering
- Inventory And Software Metering
- Inventory And Software Metering Lab
Module 11: Asset Intelligence
- Asset Intelligence
Module 12: Reporting
- Reporting
- Reporting Lab
Module 13: Compliance Settings
- Compliance Settings
Module 14: Endpoint Protection
- Endpoint Protection
Module 15: Mobile Device Management
- Mobile Device Management - Part 1
- Mobile Device Management - Part 2
Module 16: Role-Based Administration
- Role Based Administration
Module 17: Disaster Recovery
- Disaster Recovery
Module 18: Troubleshooting
- Troubleshooting
- Outro
Cooking Course Content
Module 1: Intro
- Introduction
Module 2: Wonton
- Wonton
Module 3: Tomato Basil
- Tomato Basil
Module 4: Ricotta Gnocchi
- Ricotta Nyoki
Module 5: Potato Gnocchi
- Potato Nyoki
Module 6: Pizza Tart
- Pizza Tart
Module 7: Pesto
- Pesto
Module 8: Potato Pancakes
- Potato Pancakes
Module 9: Crostini
- Crostini
Module 10: Fish Chowder
- Fish Chowder
Module 11: Fritters
- Fritters
Module 12: Risotto
- Risotto
Module 13: Risotto Cakes
- Risotto Cakes
Module 14: Spanakopita
- Spanakopita
Module 15: Vegetable Puree Soup
- Vegetable Puree Soup
Module 16: Corn Chowder
- Corn Chowder
Module 17: Tempura
- Tempura
Module 18: Panko Crusted Chicken
- Panko Crusted Chicken
Module 19: Pork Tenderloin
- Pork Tenderloin
Module 20: Potato Crusted Salmon
- Potato Crusted Salmon
Module 21: Grilled Veggies
- Grilled Veggies-Part1
- Grilled Veggies-Part2
- Grilled Veggies-Part3
Module 22: Veggie Risotto
- Veggie Risotto-Part1
- Veggie Risotto-Part2
- Veggie Risotto-Part3
Module 23: Outro
- Conclusion
Microsoft 70-448: Microsoft SQL Server 2008, Business Intelligence Development and Maintenance Course Content
Module 1: SSIS Packages
- Introduction
- Creating SSIS Packages
- Creating A New Package Lab
- Data Sources Lab
- Connections Lab
- Control Flow
- Creating And Editing Control Flow Lab
- Data Flow
- Data Flow Transformations
- Data Flow Lab
Module 2: Debugging and Error Handling in SSIS
- Debugging And Error Handling in SSIS-Part1
- Enable Transactions And Observe Trans Rollback Lab
- Set Checkpoints In A Package Lab
- Debugging And Error Handling in SSIS-Part2
- Setting Up Constraints Lab
- Turn On Logging Lab
- Debugging And Error Handling in SSIS-Part3
- Identifying Data Flow Errors Lab
Module 3: Deploying and Configuring SSIS Packages
- Lesson1-Part1 Deploying
- Lesson1-Part2 Sharing Ordering And Configuring
- Create An XML Configuration Lab
- Create A SQL Server Configuration Lab
- Use A Property Expression To Update A Connection Lab
- Deploying An SSIS Package
- Create And Deploy An Installer Kit Lab
Module 4: Securing and Executing SSIS Packages; Service Administration
- Lesson1-Part1 Securing And Executing SSIS Packages
- Lesson1-Part2 SSIS Package Security
- Turn On Package Encryption Lab
- Change Security Roles Lab
- Lesson2 Executing And Administration
- Create And Execute A Command-Line Statement Lab
- Execute A Package Through SQL Server Agent Lab
Module 5: Data Analysis
- Lesson1 SSAS Cube Development
- Create SSAS Project Lab
- Create A Data Source Lab
- Create A Data Source View Lab
- Lesson2 Creating And Modifying SSAS Cube
- Creating A Cube Lab
- Using Cube Designer To Edit A Cube Structure Lab
- Lesson3 Creating A Dimension
- Create A New Dimension Lab
- Lesson4 Creating Measure Groups And Measures
- Add Measure Groups Lab
- Configure Measure Groups And Measures Lab
Module 6: Extending SSAS Cubes
- Lesson1 Extending SSAS Cubes-Part1
- Define Attribute Relationships Lab
- Define User Hierarchy Lab
- Lesson2 Extending SSAS Cube-Part3
- Implement The Reseller Sales KPI Lab
- Lesson3 Extending SSAS Cube-Part3
- Turn On Proactive Caching Lab
Module 7: Extending SSAS Cubes
- Lesson1-Part1 SSAS Storage Processing And Deployment
- Lesson1-Part2 Aggregating And Enabling Proactive Caching
- Turning On Proactive Caching Lab
- Lesson2 SSAS Deployment
- Deploy Database With Deployment Wizard Lab
- Lesson3 Processing
- Processing Scripts Using SQL Server Agent Lab
Module 8: Securing and Administering SSAS
- Lesson1 SSAS Security
- Create A Role And Set Security Lab
- Lesson2 Backing Up SSAS
- Backing Up And Maintain Management Studio Lab
- Lesson3 Managing SSAS Turning And Logging
- Turning On Query Logging Lab
- Lesson4 SSAS Administering
- Turn On And Use SQL Server Profiler Lab
- Monitor SSAS Performance Lab
Module 9: Working With SSAS Data Mining
- Lesson1-Part1 Prepare And Creating Data Mining Structures
- Lesson1-Part2 Data Mining Algorithms And Usage
- Data Mining Wizard Lab
- Lesson2 Mapping Mining Structure Attributes To Source Columns
- Create A Model From A Cube Lab
- Lesson3 Predictive Models
- Lesson4 Data Mining Security
- Managing Permissions Lab
Module 10: Developing SSAS Reports
- Lesson1 Understanding SSRS Reports
- Creating Reports Lab
- Lesson2 Creating A New Report Database
- Generate More Reports Lab
- Lesson3 Advanced Report Object Properties-Part1
- Lesson4 Advanced Report Object Properties-Part2
Module 11: Extending and Deploying SSRS Reports
- Lesson1 SSRS Report Parameters
- Create A Report Without Using Wizard Lab
- Lesson2 Extending SSRS Reports
- Lesson3 Deploying SSRS Reports
Module 12: Scheduling Deployed Reports and Data Sources
- Lesson1 Scheduling Reports And Subscriptions
- Creating A New Role For SSRS Lab
- Lesson2 SSRS And Data Sources
- Set Up Shared Schedule Lab
Module 13: Configuring And Administering the SSRS Server
- Installing And Configuring SSRS Server
- Changing Settings In Configuration Manager Lab
- Lesson2 Administering The SSES Server And Command-Line Utilities
- Backing Up And Restoring Encryption Keys Lab
- Conclusion
CompTIA MB0-001: Mobility+ Course Content
Module 1: Over-The-Air Technologies
- Introduction
- Over-The-Air-Technologies
- Wireless Technologies-Part 1
- Wireless Technologies-Part 2
- Radio Frequency
- RF Power Fun
- Antennas
- Issues With RF
- NON Wireless
- Governing Bodies And Regulations
Module 2: Network Infrastructure
- Network Foundations-Part 1
- Network Foundations-Part 2
- Network Foundations-Part 3
- Network Foundations-Part 4
- OSI Model Review
- Wireless Terms And Terminology-Part 1
- Wireless Terms And Terminology-Part 2
- Wireless Media And Communication
- Unified Wireless Architecture
- SSIDs And VLANs
Module 3: Mobile Device Manager
- Mobile Device Management-Part 1
- Profiles And Polices-Part 1
- Profiles And Polices-Part 2
- Enterprise Mail And Messaging
- Wireless Site Survey-Part 1
- Wireless Site Survey-Part 2
- Wireless Site Survey-Part 3
- Wireless Site Survey-Part 4
- Wireless Device Management-Part 1
- Wireless Device Management-Part 2
Module 4: Security
- Mobile Device Security
- Network Security 101
- Security Protocols-Part 1
- Security Protocols-Part 2
- Security Protocols-Part 3
- EAP Overview
- Encryption Overview-Part 1
- Encryption Overview-Part 2
- Common Security Troubleshooting
- Wireless Risks-Part 1
- Wireless Risks-Part 2
- Other Risks
Module 5: Troubleshooting
- Wireless Troubleshooting-Part 1
- Wireless Troubleshooting-Part 2
- Wireless Troubleshooting-Part 3
- Conclusion
Microsoft 70-342: Advanced Solutions of Exchange Server 2013 Course Content
Module 1: Overview
- Intro
- Overview Of Advanced Solutions - Part 1
- Overview Of Advanced Solutions - Part 2
- Test Connectivity Demo
- Web Based Outlook Demo - Part 1
- Web Based Outlook Demo - Part 2
Module 2: Beginning Powershell
- Beginning Powershell
- New Mail Contact Demo
- New Mail Contacts Powershell Demo
Module 3: Exhange Control Panel
- Exchange Control Panel
Module 4: Create A New Mailbox with Powershell
- Create A New Mailbox With Powershell
- New Mailbox With Powershell Demo - Part 1
- New Mailbox With Powershell Demo - Part 2
Module 5: Mailbox Statistics With Powershell
- Mailbox Statistics With Powershell
- Get Mailbox Statistics Demo
Module 6: Intermediate Powershell
- Intermediate Powershell
- Wrap Up Of Intermediate Powershell
- Creating A New Accepted Domain Demo - Part 1
- Creating A New Accepted Domain Demo - Part 2
Module 7: Unified Messaging
- Unified Messaging - Part 1
- Unified Messaging - Part 2
- UM Dial Plan Demo
- UM Dial Plan Powershell Demo
Module 8: Installation and Configuration
- Installation And Configuration - Part 1
- Installation And Configuration - Part 2
- Build Exchange From Scratch Demo - Part 1
- Build Exchange From Scratch Demo - Part 2
- Build Exchange From Scratch Demo - Part 3
- Build Exchange From Scratch Demo - Part 4
- Build Exchange From Scratch Demo - Part 5
- Build Exchange From Scratch Demo - Part 6
- Confirming Installation Demo
- Scheme Changes - Part 1
- Scheme Changes - Part 2
- Required Software For Exchange
- Powershell Add Features - Part 1
- Powershell Add Features - Part 2
- Installation - Part 1
- Installation - Part 2
- Installation - Part 3
Module 9: Exchange Online
- Exchange Online - Part 1
- Exchange Online - Part 2
- Exchange Online Demo
Module 10: Advanced Design
- Advanced Design - Part 1
- Advanced Design - Part 2
- Advanced Design - Part 3
- Deployment Assistant Demo
- Ports And Protocols For Exchange Demo
- Outro
Cisco 640-864: CCDA Cisco Certified Design Associate Course Content
Module 1: Methodologies Used To Design A Network
- Introduction
- Developing Business Trends
- P P D I O O- Part 1
- P P D I O O- Part 2
- 3 Layer Campus Design
- Modular Network Design
- Cisco Eight Step Design Methodology
- Cisco I I N
Module 2: Network Structure And Modularity
- Network Design Fundamentals
- Design Methods And Methodologies- Part 1
- Design Methods And Methodologies- Part 2
- Enterprise Campus Design- Part 1
- Enterprise Campus Design- Part 2
Module 3: Basic Enterprise Campus Networks
- Campus Design Considerations- Part 1
- Campus Design Considerations- Part 2
- Cisco S O N A
Module 4: Enterprise Edge And Remote Network Modules
- WAN Technologies And VPN- Part 1
- WAN Technologies And VPN- Part 2
- WAN Technologies- Part 1
- WAN Technologies- Part 2
- VPN Technologies- Part 1
- VPN Technologies- Part 2
- VPN Technologies- Part 3
Module 5: IP Addressing And Routing Protocols
- Routing Protocol Operation And Design- Part 1
- Routing Protocol Operation And Design- Part 2
- Routing Protocol Operation And Design- Part 3
- Routing Protocol Operation And Design- Part 4
- EIGRP - Part 1
- EIGRP - Part 2
Module 6: Enterprise Switching I
- Enterprise Switching
- Inter VLAN Routing
- Multilayer Switch
- Enterprise Switch Features And Design
- VSS
- Best Practices
Module 7: Enterprise Switching II
- Switch Macros And Smart Ports
- Private VLANs
- Etherchannel
Module 8: Subnetting
- IP v4
- Subnetting- Part 1
- Subnetting- Part 2
- Subnetting- Part 3
- Subnetting- Part 4
- IP v6
Module 9: Designing Advanced Services
- Designing Advanced Services
- GLBP
- Access Points
- Radio Frequencies
- Wireless Signals
- Wireless LAN To VLAN Mapping
- Conclusion
Microsoft 70-341: Core Solutions of Exchange Server 2013 Course Content
Module 1: Overview
- Introduction
- Overview Of Exchanger Server 2013 - Part 1
- Overview Of Exchanger Server 2013 - Part 2
- Overview Of Exchanger Server 2013 - Part 3
- Overview Of Exchanger Server 2013 - Part 4
- Overview Of Exchanger Server 2013 - Part 5
- Overview Of Exam - Part 1
- Overview Of Exam - Part 2
Module 2: Exchange Server 2013 Administration
- Exchange Server 2013 Administration - Part 1
- Exchange Server 2013 Administration - Part 2
- Exchange Server 2013 Administration - Part 3
- Exchange Server 2013 Administration - Part 4
- Exchange Server 2013 Administration - Demo 1
- Exchange Server 2013 Administration - Demo 2
- Exchange Server 2013 Administration - Demo 3
Module 3: Fundamentals of Exchange Administration
- Fundamentals Of Exchange Administration - Part 1
- Fundamentals Of Exchange Administration - Demo
Module 4: Archive Mailboxes
- Archive Mailboxes - Part 1
- Archive Mailboxes - Part 2
- Archive Mailboxes - Part 3
- Archive Mailboxes - Demo
Module 5: Properties of User Mailboxes
- Properties Of User Mailboxes
- Properties Of User Mailboxes - Demo
Module 6: Distribution Groups
- Distribution Groups
- Distribution Groups - Demo
Module 7: Outlook and Outlook Web Apps
- Outlook And Outlook Web Apps - Part 1
- Outlook And Outlook Web Apps - Part 2
- Outlook And Outlook Web Apps - Demo
Module 8: Preparation Prerequisites
- Preparation Prerequisites - Part 1
- Preparation Prerequisites - Part 2
- Preparation Prerequisites - Part 3
- Preparation Prerequisites Demo - Part 1
- Preparation Prerequisites Demo - Part 2
- Preparation Prerequisites Demo - Part 3
Module 9: Installation of Exchange 2013
- Installation Of Exchange 2013
- Installation Of Exchange 2013 - Demo
Module 10: Exchange 2013 Design
- Exchange 2013 Design - Part 1
- Exchange 2013 Design - Part 2
- Exchange 2013 Design - Part 3
- Exchange 2013 Design Demo - Part 1
- Exchange 2013 Design Demo - Part 2
- Exchange 2013 Design Demo - Part 3
- Exchange 2013 Design Demo - Part 4
- Exchange 2013 Design Demo - Part 5
- Exchange 2013 Design Demo - Part 6
Module 11: Labs and Demos
- Building Home Lab (setup)
- Creating A Win Server Virtual Machine
- Signing On To Server
- Configuration (Joining Domain)
- Installing Domain Controller - Part 1
- Installing Domain Controller - Part 2
- Checking The Domain Controller
- Setting Up DNS For Exchange
- Schema Updates
- Prerequisite For Exchange 2013
- Installing Exchange
- Confirmation Of Exchange
- How Exchange Is Installed
- Setting Up A Send Connector
- Outro
Microsoft 70-646 Pro: Windows Server 2008, Server Administrator Course Content
Module 1: Planning Server Deployment
- Introduction
- Overview Of Windows Server 2008 Deployment-Part1
- Overview Of Windows Server 2008 Deployment-Part2
- Overview Of Windows Server 2008 Deployment-Part3
- Overview Of Windows Server 2008 Deployment-Part4
- Identifying Windows Server 2008 Compatibility Issues
- Developing A Deployment Plan-Part1
- Developing A Deployment Plan-Part2
- Planning The Server Decommissioning
- Commissioning Windows 2008 Server
- Planning Server Deployment Summary
Module 2: Automating Server Deployment
- Understanding Deployment Options-Part1
- Understanding Deployment Options-Part2
- Windows Automated Installation Kit-Part1
- Windows Automated Installation Kit-Part2
- Windows Automated Installation Kit-Part3
- Working With Images
- Using Windows Deployment Services-Part1
- Using Windows Deployment Services-Part2
- Using Windows Deployment Services-Part3
- Using Windows Deployment Services-Part4
- Automating Server Activation
- Automating Server Deployment Summary
Module 3: Planning for Server Management
- Introduction To Server Management
- Remote Server Management-Part1
- Remote Server Management-Part2
- Remote Server Management-Part3
- Decentralizing Server Management-Part1
- Decentralizing Server Management-Part2
- Planning For Server Management Summary
Module 4: Planning the Network Infrastructure
- Planning An IPv4 Addressing Scheme-Part1
- Planning An IPv4 Addressing Scheme-Part2
- Planning An IPv4 Addressing Scheme-Part3
- Planning An IPv6 Transition
- Planning The DHCP Infrastructure-Part1
- Planning The DHCP Infrastructure-Part2
- Planning DHCP Configuration
- Planning The Network Infrastructure Summary
Module 5: Planning Name Resolution Services
- Gathering Information For The Name Resolution Design-Part1
- Gathering Information For The Name Resolution Design-Part2
- Designing A DNS Server Strategy-Part1
- Designing A DNS Server Strategy-Part2
- Designing DNS Zone Implementations-Part1
- Designing DNS Zone Implementations-Part2
- Optimizing DNS Servers
- Designing DNS For High Availability And Security
- Designing A WINS Name Resolution Strategy
- Planning Name Resolution Services Summary
Module 6: Planning File and Print Services
- Planning File Services-Part1
- Planning File Services-Part2
- Planning File Services-Part3
- Planning File Services-Part4
- Planning File Services-Part5
- Planning For Storage Management
- Planning Print Services-Part1
- Planning Print Services-Part2
- Planning Print Services-Part3
- Planning File And Print Services Summary
Module 7: Planning Active Directory Domain Services
- Planning ADDS Forests
- Planning ADDS Domains
- Planning ADDS Physical Structure-Part1
- Planning ADDS Physical Structure-Part2
- Planning Administrative Structures
- Planning ADDS Maintenance Strategies
- Planning Group Policy Implementations-Part1
- Planning Group Policy Implementations-Part2
- Planning Group Policy Implementations-Part3
- Planning Group Policy Implementations-Part4
- Planning ADDS Summary
Module 8: Planning Active Directory Certificate Services
- Overview Of PublicKey Infrastructure And ADCS-Part1
- Overview Of PublicKey Infrastructure And ADCS-Part2
- Designing Certificate Authority Hierarchy
- Design Certificate Template
- Designing Certificate Distribution And Revocation
- Planning AD Certificate Servers
Module 9: Planning High Availability
- Overview Of High Availability
- Planning Network Load Balancing
- Planning Failover Clustering-Part1
- Planning Failover Clustering-Part2
- Planning High Availability Summary
Module 10: Planning Backups For Windows Server
- Planning Backups For Windows Server-Part1
- Planning Backups For Windows Server-Part2
- Planning A Backup Policy
- Planning Restore Policies For Windows Server 2008
- Planning Business Continuity Summary
Module 11: Planning Server Monitoring and Maintenance
- Planning Server Monitoring-Part1
- Planning Server Monitoring-Part2
- Planning Server Maintenance
- Planning Server Monitoring And Maintenance Summary
- Conclusion
Microsoft 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring Course Content
Module 1: Installing and Configuring Windows Services
- Introduction
- Installing Windows Servers-Part1
- Installing Windows Servers-Part2
- Installing Windows Servers-Part3
- Managing Server Roles And Features-Part1
- Managing Server Roles And Features-Part2
- Windows Server 2008 Server Care Installations-Part1
- Windows Server 2008 Server Care Installations-Part2
- Installing And Configuring Windows Services Summary
Module 2: TCP/IP Protocol Suite
- Overview Of TCP IP-Part1
- Overview Of TCP IP-Part2
- TCP IP Addressing-Part1
- TCP IP Addressing-Part2
- Communication Types
- Name Resolution-Part1
- Name Resolution-Part2
- Name Resolution-Part3
- Name Resolution-Part4
- Dynamic IP Addressing
- TCP IP Tools
- TCP IP Protocol Suite Summary
Module 3: Configuring IPv4 Addressing
- Overview Of IPv4 Communication-Part1
- Overview Of IPv4 Communication-Part2
- Subnetting IPv4 Networks-Part1
- Subnetting IPv4 Networks-Part2
- Subnetting IPv4 Networks-Part3
- Configuring IPv4 Addressing Summary
Module 4: Configuring IP Address Assignment Services
- Overview Of DHC-Part1
- Overview Of DHC-Part2
- Configuring DHCP Scopes And Options-Part1
- Configuring DHCP Scopes And Options-Part2
- Configuring DHCP Scopes And Options-Part3
- Managing The DHCP Database
- Monitoring And Troubleshooting DHCP-Part1
- Monitoring And Troubleshooting DHCP-Part2
- Configuring IP Address Assignment Services Summary
Module 5: Configuring IPv6 Addressing
- Introduction To IPv6-Part1
- Introduction To IPv6-Part2
- Unicast IPv6 Addresses
- Configuring IPv6-Part1
- Configuring IPv6-Part2
- Configuring IPv6 Addressing Summary
Module 6: Configuring Name Resolution Services
- Overview Of DNS-Part1
- Overview Of DNS-Part2
- Configuring The DNS Server Role-Part1
- Configuring The DNS Server Role-Part2
- Configuring The DNS Server Role-Part3
- Configuring The DNS Server Role-Part4
- Configuring The DNS Server Role-Part5
- Manage And Troubleshooting DNS
- Migrating From WIN To DNS
- Configuring Name Resolution Services Summary
Module 7: Configuring File and Print Services
- Introduction To File Services
- Controlling Access To File Services-Part1
- Controlling Access To File Services-Part2
- Controlling Access To File Services-Part3
- Storage Management With File Server Resource Manager-Part1
- Storage Management With File Server Resource Manager-Part2
- Storage Management With File Server Resource Manager-Part3
- Storage Management With File Server Resource Manager-Part4
- Storage Management With File Server Resource Manager-Part5
- Configuring And Managing Distributed File Systems-Part1
- Configuring And Managing Distributed File Systems-Part2
- Configuring And Managing Distributed File Systems-Part3
- Configuring And Managing Distributed File Systems-Part4
- Optimizing Access For Branch Offices
- Configuring Printing-Part1
- Configuring Printing-Part2
- Configuring Printing-Part3
- Configuring Printing-Part4
- Configuring Printing-Part5
- Configuring File And Print Service Summary
Module 8: Securing Windows Servers and Network Communications
- Configuring Server Security Group-Part1
- Configuring Server Security Group-Part2
- Configuring Server Security Group-Part3
- Configuring Server Security Group-Part4
- Configuring Server Security Group-Part5
- Configuring Server Security Group-Part6
- Configuring Server Security Group-Part7
- Storage Security-Part1
- Storage Security-Part2
- Windows Firewall With Advanced Security-Part1
- Windows Firewall With Advanced Security-Part2
- Configuring And Troubleshooting IP Sec-Part1
- Configuring And Troubleshooting IP Sec-Part2
- Configuring And Troubleshooting IP Sec-Part3
- Configuring And Troubleshooting IP Sec-Part4
- SecuringWindows Servers And Network Communications Summary
Module 9: Configuring Routing and Remote Access
- Remote Access Overview
- Configuring Remote Access-Part1
- Configuring Remote Access-Part2
- Configuring Remote Access-Part3
- Configuring Remote Access-Part4
- Overview Of Network Routing-Part1
- Overview Of Network Routing-Part2
- Overview Of Network Routing-Part3
- Configuring Routing And Remote Access Summary
Module 10: Configuring Network Policy Services
- Overview Of Network Policy And Access Services-Part1
- Overview Of Network Policy And Access Services-Part2
- Understanding Network Policies
- Centralizing Authentication And Authorization-Part1
- Centralizing Authentication And Authorization-Part2
- Centralizing Authentication And Authorization-Part3
- Configuring Network Policy Services Summary
Module 11: Configuring Network Access Protection
- Overview Of Network Access Protection
- NAP Architecture
- NAP Enforcement
- NAP Policies-Part1
- NAP Policies-Part2
- Configuring NAP Summary
Module 12: Maintaining and Recovering Windows Server
- Disaster Recovery For Windows Servers-Part1
- Disaster Recovery For Windows Servers-Part2
- Disaster Recovery For Windows Servers-Part3
- Disaster Recovery For Windows Servers-Part4
- Disaster Recovery For Windows Servers-Part5
- Disaster Recovery For Windows Servers-Part6
- Configuring Update Management-Part1
- Configuring Update Management-Part2
- Configuring Update Management-Part3
- Configuring Update Management-Part4
- Maintaining And Recovering Windows Server Summary
- Conclusion
Microsoft 70-413: Designing and Implementing a Server Infrastructure Course Content
Module 1: Plan and Deploy Infrastructure
- Introduction
- Plan And Deploy Infrastructure-Part 1
- Plan And Deploy Infrastructure-Part 2
- Plan And Deploy Infrastructure-Part 3
Module 2: Planning and Implementing
- Planning And Implementing-Part 1
- Multicast Deployment Wizard Demo
- Planning And Implementing-Part 2
- Pre-staging Clients Demo
- Planning And Implementing-Part 3
- Configuring Windows Deployment Services Demo
- Planning And Implementing-Part 4
Module 3: Planning and Implementing Server Upgrade and Migration
- Planning And Implementing Server Upgrade And Migration-Part 1
- Planning And Implementing Server Upgrade And Migration-Part 2
- Planning And Implementing Server Upgrade And Migration-Part 3
Module 4: Planning and Deploying Virtual Machine Manager Resources
- Planning And Deploying Virtual Machine Manager Resources-Part 1
- Planning And Deploying Virtual Machine Manager Resources-Part 2
- Planning And Deploying Virtual Machine Manager Resources-Part 3
- Planning And Deploying Virtual Machine Manager Resources-Part 4
Module 5: Planning and Implementing File and Storage Services
- PlanningAnd Implementing File And Storage Services-Part 1
- Planning And Implementing File And Storage Services-Part 2
- Configuring The iSCSI Target Server Demo
- Planning And Implementing File And Storage Services-Part 3
- Configuring Internet Storage Name Server Demo
- Planning And Implementing File And Storage Services-Part 4
Module 6: Design and Implement Network Infrastructure Services
- Design And Implement Network Infrastructure Services
Module 7: Design and Maintain a Dynamic Host Configuration Protocol Solution
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 1
- Configuring Split Scope In DHCP Demo
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 2
- Design And Maintain A Dynamic Host Configuration Protocol Solution-Part 3
Module 8: Design a Name Resolution Solution Strategy
- Design A Name Resolution Solution Strategy-Part 1
- Design A Name Resolution Solution Strategy-Part 2
- Configuring Global Names Zone Demo
- Design A Name Resolution Solution Strategy-Part 3
Module 9: Design and Manage an IP Address Management Solution
- Design And Manage An IP Address Management Solution-Part 1
- Design And Manage An IP Address Management Solution-Part 2
Module 10: Design and Implement Network Access Services
- Design And Implement Network Access Services
Module 11: Design a VPN Solution
- Design A VPN Solution-Part 1
- Design A VPN Solution-Part 2
Module 12: Design a DirectAccess Solution
- Design A Direct Access Solution-Part 1
- Design A Direct Access Solution-Part 2
Module 13: Implement a Scalable Remote Access Solution
- Implement A Scalable Remote Access Solution-Part 1
- Implementing Packet Tracing Demo
- Implement A Scalable Remote Access Solution-Part 2
- Implement A Scalable Remote Access Solution-Part 3
- Looking At Setting In Direct Access Demo
- Implement A Scalable Remote Access Solution-Part 4
Module 14: Design and Implement a Network Protection Solution
- Design And Implement A Network Protection Solution-Part 1
- Design And Implement A Network Protection Solution-Part 2
- Design And Implement A Network Protection Solution-Part 3
- Looking At Multiple RADIUS Servers Demo
- Design And Implement A Network Protection Solution-Part 4
- Taking A Look At IP Sec Policy Enforcement Demo
- Showing 802.1X Policy Enforcement Demo
- Design And Implement A Network Protection Solution-Part 5
Module 15: Design and Implement an Active Directory Infrastructure
- Design And Implement An Active Directory Infrastructure
Module 16: Design a Forest and Domain Infrastructure
- Design A Forest And Domain Infrastructure
Module 17: Implement a Forest and Domain Infrastructure
- Implement A Forest And Domain Infrastructure-Part 1
- Steps To Perform A Realm Trust Demo
- Implement A Forest And Domain Infrastructure-Part 2
Module 18: Design a Group Policy Strategy
- Design A Group Policy Strategy
Module 19: Design an Active Directory Permission Model
- Design An Active Directory Permission Model-Part 1
- Taking A Look At The Security Tab Or Lack Of Demo
- Design An Active Directory Permission Model-Part 2
- Taking A Look At The Delegation Or Control Wizard Demo
- Design An Active Directory Permission Model-Part 3
- Taking A Look At Kerberos Delegation Demo
- Design An Active Directory Permission Model-Part 4
Module 20: Design and Implement an Active Directory Infrastructure (Physical)
- Design And Implement An Active Directory Infrastructure Physical
Module 21: Design an Active Directory Site Topology
- Design An Active Directory Site Topology
Module 22: Design an Active Directory Site Topology
- Design A Domain Controller Strategy
Module 23: Design and Implement a Branch Office Infrastructure
- Design And Implement A Branch Office Infrastructure-Part 1
- Design And Implement A Branch Office Infrastructure-Part 2
- Taking A Look At Password Replication Policy Tab Demo
- Design And Implement A Branch Office Infrastructure-Part 3
- Conclusion
Microsoft 70-414: Implementing an Advanced Server Infrastructure Course Content
Module 1: Manage and Maintain a Server Infrastructure
- Introduction
- Manage And Maintain A Server Infrastructure-Part1
- Manage And Maintain A Server Infrastructure-Part2
- Design A Monitoring Strategy-Part1
- Design A Monitoring Strategy-Part2
- Plan And Implement Automated Remediation-Part1
- Plan And Implement Automated Remediation-Part2
- Plan And Implement Automated Remediation-Part3
Module 2: Plan and Implement a Highly Available Enterprise Infrastructure
- Plan And Implement A Highly Available Enterprise Infrastructure-Part1
- Plan And Implement A Highly Available Enterprise Infrastructure-Part2
- Highly Available Network Services-Part1
- Highly Available Network Services-Part2
- Plan And Implement Highly Available Storage Solutions-Part1
- Plan And Implement Highly Available Storage Solutions-Part2
- Plan And Implement Highly Available Roles-Part1
- Plan And Implement Highly Available Roles-Part2
- Business Continuity And Disaster Recovery Solution
Module 3: Plan and Implement a Server Virtualization Infrastructure
- Plan And Implement Virtual Hosts - Part 1
- Plan And Implement Virtual Hosts-Part2
- Plan And Implement Virtual Machines
- Plan And Implement Virtualization Networking-Part1
- Plan And Implement Virtualization Networking-Part2
- Plan And Implement Virtualization Storage
- Plan And Implement Virtual Machine Movement
- Manage And Maintain A Server Virtualization Infrastructure
Module 4: Design and Implement Identity and Access Solutions
- Design And Implement Identity And Access Solutions-Part1
- Design And Implement Identity And Access Solutions-Part2
- Implement And Manage Certificates
- Design And Implement A Federated Identity Solution
- Design And Implement AD Rights Management Services
- Conclusion
Microsoft 70-640 TS: Windows Server 2008 Active Directory, Configuring Course Content
Module 1: Active Directory - An Identity And Access Solution
- Introduction
- Understanding The Purpose Of Identity And Access Control
- Active Directory Server Roles For IDA Management-Part 1
- Active Directory Server Roles For IDA Management-Part 2
- Active Directory Server Roles That Support IDA Solutions
- Active Directory Summary
Module 2: Introduction To Active Directory Domain Services
- Overview Of Active Directory Identity And Access-Part 1
- Overview Of Active Directory Identity And Access-Part 2
- Overview Of Active Directory Identity And Access-Part 3
- Active Directory Components And Concepts-Part 1
- Active Directory Components And Concepts-Part 2
- Active Directory Components And Concepts-Part 3
- Active Directory Components And Concepts-Part 4
- Active Directory Components And Concepts-Part 5
- Implementing Active Directory-Part 1
- Implementing Active Directory-Part 2
- Implementing Active Directory-Part 3
- Implementing Active Directory-Part 4
- Implementing Active Directory-Part 5
- Implementing Active Directory-Part 6
- Implementing Active Directory-Part 7
- Implementing Active Directory-Part 8
- Overview Of Active Directory-Part1
- Overview Of Active Directory-Part2
- Overview Of Active Directory-Part3
- Summary
Module 3: Configuring DNS To Support Active Directory Domain Services
- Overview Of Active Directory And DNS Integration-Part 1
- Overview Of Active Directory And DNS Integration-Part 2
- Configure Active Directory Integrated Zones-Part 1
- Configure Active Directory Integrated Zones-Part 2
- Configure Dynamic Updates
- Configure Read-Only Zones
Module 4: Active Directory Object Management
- Overview Of Active Directory Objects
- Configuring User And Computer Accounts-Part 1
- Configuring User And Computer Accounts-Part 2
- Configuring User And Computer Accounts-Part 3
- Configuring Groups-Part1
- Configuring Groups-Part2
- Configuring Groups-Part3
- Configuring Groups-Part4
- Configuring Groups-Part5
- Automating Object Management-Part1
- Automating Object Management-Part2
- Automating Object Management-Part3
- Automating Object Management-Part4
- Automating Object Management-Part5
- Delegation Of Administrative Control-Part1
- Delegation Of Administrative Control-Part2
- Summary
Module 5: Managing Active Directory Replication Using Sites
- Configuring Sites And Subnets-Part 1
- Configuring Sites And Subnets-Part 2
- Configuring Replication-Part 1
- Configuring Replication-Part 2
- Configuring Replication-Part 3
- Configuring Replication-Part 4
- Summary
Module 6: Configuration Management Using Group Policy
- Understanding Group Policy-Part 1
- Understanding Group Policy-Part 2
- Understanding Group Policy-Part 3
- Understanding Group Policy-Part 4
- Understanding Group Policy-Part 5
- Understanding Group Policy-Part 6
- Working With GPOs-Part 1
- Working With GPOs-Part 2
- Working With GPOs-Part 3
- Working With GPOs-Part 4
- Troubleshooting Application Of GPO
- Delegating Administrative Control Of Group Policy
- Summary
Module 7: Desktop Environmental And Security Management
- Configure Scripts And Folder Redirection-Part 1
- Configure Scripts And Folder Redirection-Part 2
- Deploying Software-Part 1
- Deploying Software-Part 2
- Deploying Software-Part 3
- Delegating Computer Support
- Managing Security Settings-Part 1
- Managing Security Settings-Part 2
- Managing Security Settings-Part 3
- Managing Security Settings-Part 4
- Managing Security Settings-Part 5
- Utilizing Auditing-Part 1
- Utilizing Auditing-Part 2
- Summary
Module 8: Maintaining Active Directory
- Monitoring Active Directory-Part 1
- Monitoring Active Directory-Part 2
- Monitoring Active Directory-Part 3
- Monitoring Active Directory-Part 4
- Managing The Active Directory Database
- Disaster Recovery For Active Directory-Part 1
- Disaster Recovery For Active Directory-Part 2
- Disaster Recovery For Active Directory-Part 3
- Disaster Recovery For Active Directory-Part 4
- Maintaining Active Directory Domain Services Summary
Module 9: Deploy and Manage a Public Key Infrastructure
- Overview Of Public Key Infrastructure And ADCS-Part 1
- Overview Of Public Key Infrastructure And ADCS-Part 2
- Overview Of Public Key Infrastructure And ADCS-Part 3
- Deploying A Certificate Authority Hierarchy
- Installing ADCS-Part 1
- Installing ADCS-Part 2
- Installing ADCS-Part 3
- Installing ADCS-Part 4
- Deploying And Managing Certificates-Part 1
- Deploying And Managing Certificates-Part 2
- Deploying And Managing Certificates-Part 3
- Deploying And Managing Certificates-Part 4
- Managing Revocation And Distribution-Part 1
- Managing Revocation And Distribution-Part 2
- Configuring Certificate Recovery-Part 1
- Configuring Certificate Recovery-Part 2
- Deploy And Manage A Public Key Infrastructure Summary
Module 10: Supporting Applications with AD LDS
- ADLDS Overview-Part 1
- ADLDS Overview-Part 2
- Configuring ADLDS Instances
- Configuring Replication
- Understanding Integration With ADLDS
- Supporting Applications With ADLDS Summary
Module 11: Deploying Active Directory Federated Services
- ADFS Overview
- ADFS Deployment Scenarios
- Deploying ADFS-Part 1
- Deploying ADFS-Part 2
- Deploying ADFS-Part 3
- Deploying Active Directory Federated Services Summary
Module 12: Deploying Active Directory Rights Management Services
- ADRMS Overview
- Understanding ADRMS
- Managing ADRMS-Part 1
- Managing ADRMS-Part 2
- Managing ADRMS-Part 3
- Managing ADRMS-Part 4
- Deployment Active Directory Rights Management Services Summary
- Active Directory Conclusion
Cisco 640-461: Cisco Voice and Unified Communications Administration Course Content
Module 1: Introduction
- Intro Part 1
- Intro Part 2
- Intro Part 3
- Intro Part 4
- Intro Part 5
- Intro Part 6
- Intro Part 7
Module 2: Telephony
- Telephony Part 1
- Telephony Part 2
- Telephony Part 3
- Telephony Part 4
Module 3: Basic Call Routing
- Basic Call Routing Part 1
- Basic Call Routing Part 2
- Basic Call Routing Part 3
Module 4: VOIP Call Routing
- VOIP Call Routing Part 1
- VOIP Call Routing Part2
- VOIP Call Routing Part 3
- VOIP Call Routing Part 4
- VOIP Call Routing Part 5
Module 5: CUCME Call Routing Basics
- CUCME Call Routing Basics Part 1
- CUCME Call Routing Basics Part 2
- CUCME Call Routing Basics Part 3
- CUCME Call Routing Basics Part 4
- CUCME Call Routing Basics Part 5
- CUCME Call Routing Basics Part 6
- CUCME Call Routing Basics Part 7
- CUCME Call Routing Basics Part 8
- CUCME Call Routing Basics Part 9
- CUCME Call Routing Basics Part 10
- CUCME Call Routing Basics Part 11
Module 6: Preparing Network For Voice
- Preparing Network For Voice Part 1
- Preparing Network For Voice Part 2
- Preparing Network For Voice Part 3
- Preparing Network For Voice Part 4
- Preparing Network For Voice Part 5
- Preparing Network For Voice Part 6
Module 7: IP Phone Behavior
- IP Phone Behavior
Module 8: CUCME Administration Basics
- CUCME Administration Basics Part 1
- CUCME Administration Basics Part 2
- CUCME Administration Basics Part 3
- CUCME Administration Basics Part 4
Module 9: CUCME StandUp
- CUCME Stand Up Part 1
- CUCME Stand Up Part 2
- CUCME Stand Up Part 3
- CUCME Stand Up Part 4
- CUCME Stand Up Part 5
Module 10: CUCME StandUp Part 2
- CUCME Stand Up2 Part 1
- CUCME Stand Up2 Part 2
Module 11: CUCME StandUp CUCME
- CUCME Stand Up CUCME Part 1
- CUCME Stand Up CUCME Part 2
- CUCME Stand Up CUCME Part 3
Module 12: End Users and End User Interfaces
- End Users And End User Interfaces Part 1
- End Users And End User Interfaces Part 2
- End Users And End User Interfaces Part 3
Module 13: Endpoint Implementation
- Endpoint Implementation Part 1
- Endpoint Implementation Part 2
- Endpoint Implementation Part 3
- Endpoint Implementation Part 4
Module 14: Call Coverage
- Call Coverage Part 1
- Call Coverage Part 2
- Call Coverage Part 3
- Call Coverage Part 4
- Call Coverage Part 5
- Call Coverage Part 6
- Call Coverage Part 7
- Call Coverage Part 8
- Call Coverage Part 9
Module 15: Calling Restrictions and Routing
- Calling Restrictions And Routing Part 1
- Calling Restrictions And Routing Part 2
- Calling Restrictions And Routing Part 3
- Calling Restrictions And Routing Part 4
- Calling Restrictions And Routing Part 5
- Calling Restrictions And Routing Part 6
Module 16: CUCME Advance Call Coverage
- CUCME Advance Call Coverage Part 1
- CUCME Advance Call Coverage Part 2
Module 17: Implementing Unity Connection
- Implementing Unity Connection Part 1
- Implementing Unity Connection Part 2
- Implementing Unity Connection Part 3
- Implementing Unity Connection Part 4
- Implementing Unity Connection Part 5
- Implementing Unity Connection Part 6
- Implementing Unity Connection Part 7
- Implementing Unity Connection Part 8
- Outro
Unix Administration Basics Course Content
Module 1: Virtual Box
- Virtual Box-Part 1
- Virtual Box-Part 2
- Virtual Box-Part 3
- Virtual Box-Part 4
- Virtual Box-Part 5
- Virtual Box-Part 6
Module 2: Basic Commands
- Basic Commands-Part 1
- Basic Commands-Part 2
- Basic Commands-Part 3
- Basic Commands-Part 4
- Basic Commands-Part 5
- Basic Commands-Part 6
- Basic Commands-Part 7
- Basic Commands-Part 8
- Basic Commands-Part 9
- Basic Commands-Part 10
Module 3: Special Characters
- Special Characters-Part 1
- Special Characters-Part 2
- Special Characters-Part 3
Module 4: File Editing
- File Editing-Part 1
- File Editing-Part 2
- File Editing-Part 3
- File Editing-Part 4
- File Editing-Part 5
- File Editing-Part 6
- File Editing-Part 7
Module 5: File System Structure
- File System Structure-Part 1
- File System Structure-Part 2
- File System Structure-Part 3
- File System Structure-Part 4
Module 6: Finding Files
- Finding Files-Part 1
- Finding Files-Part 2
- Finding Files-Part 3
Module 7: Shell Special Characters
- Shell Special Characters-Part 1
- Shell Special Characters-Part 2
- Shell Special Characters-Part 3
Module 8: Regular Expressions
- Regular Expressions-Part 1
- Regular Expressions-Part 2
- Regular Expressions-Part 3
- Regular Expressions-Part 4
- Regular Expressions-Part 5
- Regular Expressions-Part 6
Module 9: Process Management
- Process Management-Part 1
- Process Management-Part 2
- Process Management-Part 3
- Process Management-Part 4
- Process Management-Part 5
- Process Management-Part 6
- Process Management-Part 7
- Process Management-Part 8
Module 10: Job Scheduling
- Job Scheduling-Part 1
- Job Scheduling-Part 2
- Job Scheduling-Part 3
- Job Scheduling-Part 4
- Job Scheduling-Part 5
- Job Scheduling-Part 6
Module 11: Customizing Your Account
- Customizing Your Account-Part 1
- Customizing Your Account-Part 2
- Customizing Your Account-Part 3
- Customizing Your Account-Part 4
- Customizing Your Account-Part 5
- Customizing Your Account-Part 6
Module 12: Unix Printing
- Unix Printing-Part 1
- Unix Printing-Part 2
- Unix Printing-Part 3
- Unix Printing-Part 4
Module 13: Networking
- Networking-Part 1
- Networking-Part 2
- Networking-Part 3
- Networking-Part 4
- Networking-Part 5
- Networking-Part 6
- Networking-Part 7
- Networking-Part 8
- Networking-Part 9
- Networking-Part 10
Module 14: X Windows
- X Windows-Part 1
- X Windows-Part 2
- X Windows-Part 3
- X Windows-Part 4
- X Windows-Part 5
Module 15: Back Up And Compression
- Back Up And Compression-Part 1
- Back Up And Compression-Part 2
- Back Up And Compression-Part 3
- Back Up And Compression-Part 4
Module 16: Text Utility
- Text Utility-Part 1
- Text Utility-Part 2
- Text Utility-Part 3
- Text Utility-Part 4
- Text Utility-Part 5
Module 17: Shell Scripting
- Shell Scripting-Part 1
- Shell Scripting-Part 2
- Shell Scripting-Part 3
- Shell Scripting-Part 4
- Shell Scripting-Part 5
- Shell Scripting-Part 6
- Shell Scripting-Part 7
- Shell Scripting-Part 8
- Shell Scripting-Part 9
- Shell Scripting-Part 10
- Shell Scripting-Part 11
Module 18: System Administration Basics
- System Administration Basics-Part 1
- System Administration Basics-Part 2
- System Administration Basics-Part 3
- System Administration Basics-Part 4
- System Administration Basics-Part 5
Information Technology Infrastructure Library (ITIL®) - Foundation Course Content
Module 1: The ITIL Qualification Scheme
- Intro
- About Scheme
- Levels Of Qualifications
- Qualification Bodies
- The ITIL Foundation Certification Stubble
Module 2: Introduction to Service Management
- Service And Service Management- Part 1
- Service And Service Management- Part2
- Service Management Processes- Part 1
- Service Management Processes- Part 2
- Service Management Best Practices And Summary
Module 3: ITIL and the Service Lifecycle
- Service Management Practices
- Why ITIL
- The Service Lifecycle
Module 4: Service Strategy
- Service Strategy Purpose And Objectives
- Service Strategy Scope
- Business Value Stubble
- Key Principles- Part1
- Key Principles- Part2
- Service Stragey Processes
Module 5: Service Design
- Service Design Purpose And Objectives
- Scope Of Service Design
- Business Value Service Design
- Service Design Key Principles
- Service Design Processes- Part 1
- Service Design Processes- Part 2
- Service Design Processes- Part 3
- Service Design Processes- Part 4
Module 6: Service Transition
- Service Transition Purpose And Objectives
- Service Transition Scope And Business Value
- Service Transition Key Principles
- Service Transition Processes- Part 1
- Service Transition Processes- Part 2
- Service Transition Processes- Part 3
- Service Transition Processes- Part 4
Module 7: Service Operation
- Intro To Service Operation
- Service Operation Basic Concepts
- Service Operation Processes-Part 1
- Service Operation Processes-Part 2
- Service Operation Access Management
- Service Operation Functions
Module 8: Continual Service Improvement
- Continual Service Improvement Purpose Objectives And Scope
- Continual Service Improvement Key Principles
- Continual Service Improvement Processes
Module 9: Service Management Technology
- SMT
- SMT Service Automation
- SMT Service Analytics
Module 10: How it all Fits Together
- How It All Fits Together
- Outro
Module 11: Bonus Material
- Lifecycle Stages Flow-Part 1
- Lifecycle Stages Flow-Part 2
- Lifecycle Stages Breakdown-Part 1
- Lifecycle Stages Breakdown-Part 2
- Lifecycle Stages Breakdown-Part 3
- Function Reviews-Part 1
- Function Reviews-Part 2
- Service Support Function
- Service Delivery Function-Part 1
- Service Delivery Function-Part 2
- Test Taking Tips
- Practice Questions
CompTIA LX0-101 & LX0-102: CompTIA Linux+ Course Content
Module 1: Instructions
- Introduction
- Introduction To Building Labs
- Things You Need To Do
- Install Demo Virtual Box
- Navigation
- Commands With LabDemo
- Internal And External Commands
- Overview Of Shell Commands Tricks
- Exploring Shell Configuration
- Stream Redirection
- Overview Of Processing Text Using Filters
- Overview File-Viewing Commands
- Overview Using Grep
- Sed Syntax And Summary
- Overview Of Exam Essentials
Module 2: Managing Software
- Managing Software
- Managing Software
- Overview Using RPM
- RPM-Part 2
- Overview Using Cpio
- Overview Using Debian And Apt Cache
- Using Apt-get
- Debian Tools
- Managing Shared Libraries
- Overview Locating Library Files
- Foreground and Background Processes
- Managing Software Summary
Module 3: Configuring Hardware
- Configuring Hardware
- Configuring Devices
- Configuring USB
- Configuring Hard Disk
- Designing Hard Disk Layout
- Logical Volume Management
- Overview Using Fdisk
- Overview Common File System Types
- Creating Filesystem
- Overview Maintaining File System Health
- Configuring Hardware Summary
Module 4: Managing Files
- Managing Files
- File Archiving Commands
- Managing Files Ownership
- Managing Disk Quotas
- Directories And Content
- Overview Tools For Locating Files
- Overview Of Exam Essentials
Module 5: Booting Files
- Booting Linux And Editing Files
- Boot And Reboot
- Understanding The Boot Process
- Run Levels Process
- Managing Run Level Services
- Editing With Vi
- Booting Summary
Module 6: X
- X Windows Systems
- X Configuration Options
- X Configuration Options-Part 2
- Untitled Media
- Configuring X Featuring Fonts
- Overview Managing GUI Logins
- Using X For Remote Access
- X Accessibility
- Addition Assistive Technologies
- Configuring Localization And Internationalization
- Querying And Setting Your Locale
- Configuring Printing-Part 1
- Configuring Printing-Part 2
- Using Web-Based CUPS Utilities
Module 7: Admin
- Administering
- Directly Modifying Account Configuration
- Components Of Account
- Adding Groups
- Tuning User And System Environments
- Reviewing Log File Contents
- Maintaining System Time
- Admin Summary
Module 8: Basic Networking
- Basic Networking
- Network Addressing-Part 1
- Network Addressing-Part 2
- DNS Data Flow Zone And Resolution
- Network Ports
- Connections
- Testing Connectivity
- Wireshark Demo
- Basic Networking Summary
Module 9: Scripts
- Scripts E-mail And Databases
- Writing Scripts-Part 1
- Writing Scripts-Part 2
- Managing E-mail
- Managing Data With SQL
- Advantages Of Database
- Scripts Summary
Module 10: Security
- Security
- Configuring Xinetd
- Uninstalling Or Reconfiguring Servers
- Tools For Managing Passwords
- Configuring SSH
- SSH Keys
- Controlling SSH Access
- Using GPG
- Security Summary
Medical Coding and Billing ICD-9 Course Content
Lesson 3 - Medical Terminology
- Medical Terminology
Lesson 2 - Anatomy Physiology
- Anatomy
- Anatomic Organ Systems
Lesson 4 - Introduction to ICD-9-cm
- Introduction To ICD-9-Part 1
- Introduction To ICD-9-Part 2
- Introduction To ICD-9-Part 3
- Introduction To ICD-9-Part 4
- Introduction To ICD-9-Part 5
- Introduction To ICD-9-Part 6
- Introduction To ICD-9-Part 7
- Diagnostic Procedures
- Coding And Reporting Guidelines-Part 1
- Coding And Reporting Guidelines-Part 2
- Coding And Reporting Guidelines-Part 3
Lesson 5 - Application of ICD-9-cm (Ch 1-9)
- Application Of ICD-9-CM
- Caution
- Neoplasms
- Other Metabolic And Immunity Disorders Section
- Hypertensive Heart And Chronic Kidney Disease
Lesson 7 - Introduction to ICD-10-CM
- Overview Of ICD-10-CM
Lesson 1 - Introduction to CPT and HCPCS
- Introduction To CPT And Level II National Codes-HCPCS
- CMS-1500 Form
- Categorized By
- Category I Codes
- Format
Lesson 2 - Evaluation and Management (E/M)
- Evaluation And Management-Part 1
- Evaluation And Management-Part 2
- Nature Of Evaluation And Management Services
- Example Of HPI
- Review Of Systems
- E And M Documentation Guidelines
- E And M Exam-Part 1
- E And M Exam-Part 2
- Exam
- Medical Decision Making
- Number Of Diagnoses Or Treatment Options
- Amount And Or Complexity Of Data Reviewed
- Nature Of Presenting Problem
- E And M Documentation-Level Based On TIme
- Hospital E And M Codes
- Subsequent Visits
- InitialInpatient Services
- ProlongedServices
- Modifiers
Lesson 3 - Surgery, Integumentary system, Anesthesia & Modifiers
- Anesthesia
- Physical Status Modifiers
- Medicare Policy
- Surgical Guidelines
- 58 Staged Or Related Procedure
- Modifier 52-Reduced Services
- Ancillary Modifiers
- Integumentary System
- Morphology
- Integumentary-Nails
- Integumentary-Introduction
- Clinical Scenario
- Mohs Micrographic Surgury
Lesson 4 - Musculoskeletal
- Musculoskeletal System
- Rheumatism
- Endoscopy And Arthroscopy
Lesson 5 - Respiratory and Cardio
- Respiratory System
- Endoscopy
- Mediastinum And Diaphragm
- Circulatory Systems
- Associated Diagnosis
- Pacemaker Or Pacing Cardioverter-Defibrillator
- CABG
- Bypass Grafts
- Selective Catheterization
- Endovascular Revascularization
- Coronary Therapeutic Services And Procedures
- Intracardiac Electrophysiological Procedures And Studies
Lesson 6 - Female Genital System, Maternity Care and General Surgery
- Hemic And Lymphatic Systems
- Female Genitourinary And Maternity Care
- Ultrasound
- Male Genitourinary
- Bladder
- Eyes
- Ears
- Digestive System Terms
- Digestive Procedures
- Endocrine And Nervous System
- Nervous System-Part 1
- Nervous System-Part 2
- Nervous System-Part 3
Lesson 9 - Medicine
- Medicine
- Chemotherapy
- Category III Codes
- Conclusion
Lesson 1 - Introduction to Reimbursement
- Intro
- Medicare-PartB
- Fraud And Abuse
Lesson 7 - Radiology
- Radiology
- Modifiers
- Diagnostic Ultrasound
- Radiation Treatment Management
Lesson 8 - Pathology
- Regulatory Terms
- Urinalysis
Lesson 6 - Application of ICD-9-cm (Ch 10-19)
- Diseases Of The Genitourinary System
- Diabetes Mellitus In Pregnancy
- Diseases Of Musculoskeletal SystemAnd Connective Tissue
- Burns
- Adverse Effects Poisoning And Toxic Effects
Medical Coding and Billing ICD 10 Course Content
Module 1: Certain Infectious and Parasitic Diseases
- Intro
- Certain Infectious And Parasitic Diseases
Module 2: Neoplasm
- Neoplasm
Module 3: Diseases of the Blood and Blood Forming Organs
- Diseases Of The Blood And Blood Forming Organs
Module 4: Endocrine, Nutritional and Metabolic Diseases
- Endocrine Nutritional And Metabolic Diseases
Module 5: Mental Disorders
- Mental Disorders
Module 6: Diseases of the Nervous System
- Disesases Of The Nervous System
Module 7: Diseases of the Eye and Adnexa
- Diseases Of The Eye And Adnexa
Module 8: Diseases of the Ear and Mastoid Process
- Diseases Of The Ear And Mastoid
Module 9: Diseases of the Circulatory System
- Diseases Of The Circulatory System
Module 10: Diseases of the Respiratory System
- Diseases Of The Respiratory System
Module 11: Diseases of the Digestive System
- Diseases Of The Digestive System
- Specific Coding Exercises
Module 12: Diseases of the Skin and Subcutaneous Tissue
- Diseases Of The Skin And Subcutaneous Tissue
Module 13: Diseases of the Musculoskeletal System and Connective Tissue
- Diseases Of The Musculoskeletal System And Connective Tissue
Module 14: Diseases of the Genitourinary System
- Diseases Of The Genitourinary System
Module 15: Pregnancy, Childbirth, and the Puerperium
- Pregnancy Childbirth And The Puerperium
Module 16: Newborn (Perinatal) Guidelines
- Newborn Perinatal Guidelines
Module 17: Congenital Malformations, Deformations and Chromosomal Abnormalities
- Congenital Malformations Deformations And Chromosomal Abnormalities
Module 18: Symptoms, Signs and Abnormal Clinical and Laboratory Findings
- Symptoms Signs And Abnormal Clinical And Laboratory Findings
Module 19: Injury, Poisoning and Certain Other Consequences of the External Causes
- Injury Poisoning And Certain Other Consequences Of The External Causes
- Specific Coding Questions
Module 20: External Causes of Morbidity
- External Causes Of Morbidity
Module 21: Factors Influencing Health Status
- Factors Influencing Health Status
- Case Study 1 And 2
- Outro
Marketing Tools and Tips for Success Course Content
Marketing Tools and Tips for Success
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed Part 1
- Stay Informed Part 2
- Bitly
- Woobox Part 1
- Woobox Part 2
- HootSuite Part 1
- HootSuite Part 2
- Storify
- Social Media Rules And Tips
- Social Media Conclusion
- Tweetdeck-Boolean Search
Marketing with Google and YouTube Course Content
Marketing with Google and YouTube
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Videos
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
Basics of Marketing with Social Media Course Content
Basics of Marketing with Social Media
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
Google Analytics Course Content
Module 1: Introduction to Google Analytics
- Intro Definitions-Part 1
- Intro Definitions-Part 2
- How Google Analytics Works
Module 2: Fundamentals of Google Analytics
- Build Analytics Infrastructure
- Setting Up Conversion Data
- Setting Up E-Commerce And Goal Tracking
- Cross Domain Tracking
- Input New Users
- Examine Data Points
Module 3: Basics of Google Anayltics
- Basic Features
- Dashboard
- Shortcuts
- Adding A Dashboard
- Sharing Reports
- Alerts
- Realtime Analytics
- Standard Reports
- Views
Module 4: Reports in Google Analytics
- Acquisitions Intro
- All Traffic Acquisitions
- Acquisitions Overview
- Acquisitions Channels
- All Referrals
- Campaign
- Keywords
- Social
- Webmaster Tools
Module 5: Behavioral Reports
- Behavioral Reports Intro
- Dimensions
- Content Drilldown
- Landing Pages
- Exit Pages
- Event Flow Report
- Working With Events
- Site Search Report-Part 1
- Site Search Report-Part 2
- Site Search Report-Part 3
- Site Search Report-Part 4
- Behavior Flow Report
- Site Speed
- Using Site Speed Search
- Page Timings
- Speed Suggestions
- User Timing Adsense
- Experiments
- Inpage Analytics
Module 6: Audience
- Audience Reports
- Location Report
- Language
- Behavior
- Frequency Recency
- Engagement Report
- Technology Reports
- Mobile Reporting
- Demographic Report
- Interests
- Visitor Flow Chart
Module 7: Conversions
- Intro To Module 7
- Funnel Visualization
- Goal Flow Report
- Reverse Goal Path
- Goal URLs
- E-commerce Reports
- Product Performance Reports
- Transactions Report
- Time To Purchase Report
- Multi-Channels Funnels Report
- Assisted Conversion Report
- Top Conversion Paths Report
- Time Log And Path Length Report
- Attribution Report And Model Comparison Tool
- Conclusion
Accounting and Business Basics Course Content
Accounting and Business Basics
- Introduction
- Business Entities
- Beginning Your Business
- Financial Basics Part 1
- Financial Basics Part 2
- Employees Payroll
- Getting Your Business Out There
- SEO
- Other Topics
- Closing
Quickbooks Point of Sale (POS) Course Content
Module 1: Creating and Setting Up Your Point of Sale Company File
- Intro To Point Of Sale
- Creating And Setting Up Point Of Sale
Module 2: Installing your System
- Determining Your Point Of Sale Additions
Module 3: Navigating and Customizing the Home Page
- Navigating And Customizing The Homepage
Module 4: Company Preferences
- Company Preferences
Module 5: Financial- Setting up QuickBooks Connection
- Setting Up Quickbooks Connection
Module 6: Setting up Sales Tax
- Setting Up Sales Tax
Module 7: Workstation Preferences
- Workstation Preferences
Module 8: Additional Features
- Additional Features
Module 9: Employees and Security
- Employees And Security
Module 10: Customers
- Customers
Module 11: Rewards Program
- Reward Programs
Module 12: Vendors
- Vendors
Module 13: Setting Up Your Inventory
- Setting Up Inventory
Module 14: Item Styles, Assemblies, and Group
- Adding Styles Assemblies And Groups
Module 15: Working with Inventory
- Working With Inventory
Module 16: Sales
- Sales
Module 17: Working with Price Levels and Discounts
- Working With Price Level And Discounts
Module 18: Collecting Sales Tax
- Collecting Sales Tax
Module 19: Adding Shipping Information (Pro/MS)
- Adding Shipping Info
Module 20: Tracking Sales Commissions
- Tracking Sales And Commission
Module 21: Taking Payment and Giving Change
- Taking Payments And Giving Change
Module 22: Recording Tips
- Recording Tip
Module 23: Handling Tricky Sales Returns
- Handling Tricky Sales And Returns
Module 24: Working with Sales Orders, Work Orders, and Layaways
- Working With Sales And Work Orders
Module 25: Purchasing Merchandise
- Purchasing Merchandise
Module 26: Receiving from a PO
- Receiving Purchase Orders
Module 27: Managing Inventory
- Managing Inventory
Module 28: Reporting
- Reporting Point Of Sales
Module 29: QuickBooks Financial
- Quickbooks Financial
Module 30: Multi-Store
- Multi-Store
Module 31: Protect your data
- Protecting Your Data
Module 32: Adding Third Party Applications
- Adding 3rd Party Apps
- Summary of Point of Sale
Mastering Your Android Phone Course Content
Module 1: The Phone
- Introduction
- Buttons
Module 2: The Screen
- Gestures
Module 3: The Keyboard
- Keypad
Module 4: Contacts
- Contacts
- Groups
Module 5: Phone Calls
- Phone
- Call Customization
Module 6: Messaging
- Messages-Part 1
- Messages - Part 2
- Messages - Part 3
- Messages - Part 4
- Customizing Messages
Module 7: Internet
- Internet - Part 1
- Internet - Part 2
- Internet Settings
Module 8: Email
- Email-Part1
- Email-Part 2
- Setup Email
Module 9: Music
- Music
Module 10: Android Specifics
- Google Voice
- Customization
- Lock Screen
- Stylus
Module 11: Photos & Video
- Camera-Part1
- Camera-Part2
- Taking Photos-Part1
- Taking Photos-Part2
- Editing Photos
- Capturing Video
Module 12: Conclusion
- Wrap Up
Mastering Your iPhone Course Content
Module 1: iPhone Basics
- Iphone Intro
- Iphone The Basics
Module 2: The Screen
- 2.1 The Screen Pt. 1
- 2.2 The Screen Pt. 2
- 2.3 The Screen Pt. 3
- 2.4 The Screen Pt. 4
Module 3: The Keyboard
- Basic Keyboard
- Advanced Keyboard
Module 4: Basic Calls and Settings
- Making A Call
- Settings-Part 1
- Settings-Part 2
Module 5: Contacts
- Contacts-Part 2
- Contacts-Part 2
Module 6: Phone Calls
- Phone Calls-Part 1
- Phone Calls-Part 2
- Phone Calls-Part 3
- Advanced Phone Calls
Module 7: Messaging
- Texting-Part 1
- Texting-Part 2
- Advanced Texting-Part 1
- Advanced Texting-Part 2
- Message Settings
Module 8: Web
- Web-Part 1
- Web-Part 2
- Web-Part 3
Module 9: Email
- Email-Part 1
- Email-Part 2
- Multiple Email Accounts
- Email Settings
Module 10: Siri
- SIRI
Module 11: Music
- Music-Part 1
- Music-Part 2
Module 12: Photos and Video
- Camera Functions
- Photography Settings
- Edit Photos
- Share Photos
- Video Functions
Module 13: Maps
- Apple Maps
Module 14: Conclusion
- Application Management
- Misc-Part 1
- Misc-Part 2
- Conclusion
Microsoft Windows 8 Power User Course Content
Lesson 1: Getting to Know PCs and the Windows 8 User Interface
- Introduction
- Identify Components of a Personal Computer
- Sign in to Windows 8
- Navigate the Desktop
Lesson 2: Using the Modern Apps and Navigation Features
- Using the Modern Apps and Navigation Features
Lesson 3: Working with Desktop Applications
- Navigate the Desktop
Lesson 4: Using Internet Explorer 10
- Navigate Internet Explorer 10
Lesson 5: Customizing the Windows 8 Environment
- Multitasking With Apps
- Use the Control Panel and Task Manager-Part1
- Use the Control Panel and Task Manager-Part2
Lesson 6: Using Windows 8 Security Features
- Customizing the Windows 8 Environment
- Security Features
- Using Other Windows 8 Features-Part1
- Using Other Windows 8 Features-Part2
- Using Other Windows 8 Features-Part3
Cloud Computing Security Knowledge (CCSK) Course Content
Module 1: Architecture
- Cloud Security Overview-Part1
- Cloud Security Overview-Part2
- Cloud Diagrams
- Cloud Services
Module 2: Governance and Enterprise Risk
- Risk Management
- Corporate Governance
- Enterprise Risk Management
- Risk Management Balance Process Supply Chain Security
- ERM Incidents Recommendations-Part1
- ERM Incidents Recommendations-Part2
- ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
- Cloud Legal Issues-Part1
- Cloud Legal Issues-Part2
- Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
- Audits
- Compliance And Audit
- Audit Recommendations
- Audit Requirements
Module 5: Information Management and Data Security
- Information And Security
- Storage
- Information Governance Classification
- Data Security
- Protecting Data Moving
- Client Database Encryption
- PaaS Encryption
Module 6: Interoperability and Portability
- Interoperability And Portability
- Interoperability Recommendations
- Portability Recommendations
- Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- Business Continuity And Disaster Recovery
- Assessing CSP Security
- Equipment Maintenance
- Recommendations
Module 8: Data Center Operations
- Data Center Operations
Module 9: Incident Response
- Incident Response
- Testing
- IaaS
- C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
- Application Security
- Security Testing
- Audit Compliance
- Security Assurance Recommendations
Module 11: Encryption and Key Management
- Encryption And Key Management
- Content Aware Encryption
- Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
- Building Access Control
- Intro To Identity
- Entitlement Process
- Trust With Identity
- Recommendations For Identity Management
Module 13: Virtualization
- Virtualization
- Hypervisor And Virtual Machine
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
- Security As A Service
- Security Offerings
- Intrusion Detection Prevention
- Business Continuity And Disaster Recovery
- European CCSK
- Top Security Benefits
- European Legal Based Issues
Certified Information Systems Auditor (CISA) Course Content
Module 1 - The Audit Process
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self-Assessment
Module 2 - Audit Governance and Compliance
- IT Governance
- Governance & Security Policies
- Outsourcing & Governance
- Outsourcing & Globalization
- Organizational Compliance
- IT Strategy
- IT Performance
Module 3 - System Infrastructure, Project Management, and Testing
- System & Infrastructure
- Requirements
- Project Management Tools - Part 1
- Project Management Tools - Part 2
- Applications
- Agile Development
- Monitoring & Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
Module 4 - Media Disposal, Reviews, and System Maintenance
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
Module 5 - IT Service Level Management
- IT Service Delivery and Support
- How to Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language (SQL)
- Monitoring Performance
- Source Code and Perfomance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
Module 6 - Auditor Technical Overview
- IS Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds of Attacks
- Access Controls
- Identification and Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices and Network Components
- Network Address Translation
- Virtual Private Networks (VPNs)
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- HoneyPot
- Risks to Portable and Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
Module 7 - Business Continuity and Disaster Recovery
- Business Continuity and Disaster Recovery
- Fault Tolerance
- Business Continuity and Disaster Recovery Regulations
CompTIA Cloud Overview Course Content
Domain 1 - Characteristics of Cloud Services from a Business Perspect
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
Domain 2 - Cloud Computing and Business Value
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
Domain 3 - Technical Perspectives/Cloud Types
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
Domain 4 - Steps to Successful Adoption of Cloud
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
Domain 5 - Impact and Changes of Cloud Computing on IT Service Management
- Information Security Management System-Part1
- Information Security Management System-Part2
Domain 6 - Risks and Consequences of Cloud Computing
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
Computer Hacking Forensic Investigator (CHFI) Course Content
Module 1: Computer Forensics Introduction
- Intro To Course-Part1
- Intro To Course-Part2
- Intro To Course-Part3
- Intro To Course-Part4
- Intro To Course-Part5
- Intro To Forensics-Part1
- Intro To Forensics-Part2
- Intro To Forensics-Part3
- Intro To Forensics-Part4
- Intro To Forensics-Part5
- Intro To Forensics-Part6
- Intro To Forensics-Part7
- Intro To Forensics-Part8
Module 2: Forensics Investigation Process
- Forensics Investigation Process-Part1
- Forensics Investigation Process-Part2
- Forensics Investigation Process-Part3
- Forensics Investigation Process-Part4
- Forensics Investigation Process-Part5
- Forensics Investigation Process-Part6
- Forensics Investigation Process-Part7
- Forensics Investigation Process-Part8
- Forensics Investigation Process-Part9
- Forensics Investigation Process-Part10
Module 3: Searching and Seizing
- Searching And Seizing-Part1
- Searching And Seizing-Part2
- Searching And Seizing-Part3
- Searching And Seizing-Part4
- Searching And Seizing-Part5
Module 4: Digital Evidence
- Digital Evidence-Part1
- Digital Evidence-Part2
- Digital Evidence-Part3
- Digital Evidence-Part4
- Digital Evidence-Part5
- Digital Evidence-Part6
- Digital Evidence-Part7
Module 5: First Responder Procedures
- First Responder Procedures-Part1
- First Responder Procedures-Part2
- First Responder Procedures-Part3
- First Responder Procedures-Part4
- First Responder Procedures-Part5
- First Responder Procedures-Part6
- First Responder Procedures-Part7
- First Responder Procedures-Part8
Module 6: Forensics Lab
- Forensic Lab-Part1
- Forensic Lab-Part2
- Forensic Lab-Part3
- Forensic Lab-Part4
- Forensic Lab-Part5
Module 7: Hard Disks and File Systems
- Hard Disks And File Systems-Part1
- Hard Disks And File Systems-Part2
- Hard Disks And File Systems-Part3
- Hard Disks And File Systems-Part4
- Hard Disks And File Systems-Part5
- Hard Disks And File Systems-Part6
- Hard Disks And File Systems-Part7
- Hard Disks And File Systems-Part8
- Hard Disks And File Systems-Part9
- Hard Disks And File Systems-Part10
Module 8: Windows Forensics
- Windows Forensics-Part1
- Windows Forensics-Part2
- Windows Forensics-Part3
- Windows Forensics-Part4
- Windows Forensics-Part5
- Windows Forensics-Part6
- Windows Forensics-Part7
- Windows Forensics-Part8
- Windows Forensics-Part9
- Windows Forensics-Part10
Module 9: Data Acquisition and Duplication
- Data Acquisition And Duplication-Part1
- Data Acquisition And Duplication-Part2
- Data Acquisition And Duplication-Part3
- Data Acquisition And Duplication-Part4
- Data Acquisition And Duplication-Part5
- Data Acquisition And Duplication-Part6
- Data Acquisition And Duplication-Part7
Module 10: Recovering Deleted Files and Partitions
- Recovering Deleted Files And Partitions-Part1
- Recovering Deleted Files And Partitions-Part2
Module 11: Using Access Data FTK
- Using Access Data FTK And Special Steps-Part1
- Using Access Data FTK And Special Steps-Part2
- Using Access Data FTK And Special Steps-Part3
- Using Access Data FTK And Special Steps-Part4
- Using Access Data FTK And Special Steps-Part5
- Using Access Data FTK And Special Steps-Part6
- Using Access Data FTK And Special Steps-Part7
- Using Access Data FTK And Special Steps-Part8
Module 12: Using EnCase
- EnCase-Part1
- EnCase-Part2
- EnCase-Part3
Module 13: Steganography
- Stenography-Part1
- Stenography-Part2
- Stenography-Part3
- Stenography-Part4
Module 14: Password Crackers
- Passwords-Part1
- Passwords-Part2
- Passwords-Part3
- Passwords-Part4
Module 15: Log Correlation
- Log Correlation-Part1
- Log Correlation-Part2
- Log Correlation-Part3
- Log Correlation-Part4
- Log Correlation-Part5
- Log Correlation-Part6
Module 16: Network Forensics
- Network Forensics-Part1
- Network Forensics-Part2
- Network Forensics-Part3
- Network Forensics-Part4
Module 17: Wireless Attacks
- Wireless Attacks-Part1
- Wireless Attacks-Part2
- Wireless Attacks-Part3
Module 18: Web Attacks
- Web Attacks-Part1
- Web Attacks-Part2
- Web Attacks-Part3
- Web Attacks-Part4
- Web Attacks-Part5
- Web Attacks-Part6
- Web Attacks-Part7
- Web Attacks-Part8
Module 19: Email Crimes
- Email Crimes-Part1
- Email Crimes-Part2
- Email Crimes-Part3
- Email Crimes-Part4
Module 20: Mobile Investigation
- Mobile Investigation-Part1
- Mobile Investigation-Part2
- Mobile Investigation-Part3
- Mobile Investigation-Part4
- Mobile Investigation-Part5
Module 21: Investigative Reports
- Investigation Reports-Part1
- Investigation Reports-Part2
- Investigation Reports-Part3
- Investigation Reports-Part4
Module 22: Expert Witness
- Expert Witness-Part1
- Expert Witness-Part2
- Expert Witness-Part3
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
Microsoft .NET 4.5 Programming with HTML 5 Course Content
Module 1
- Introduction and Developing in HTML5 with Javascript and CSS3
- Intro to HTML 5
- Examples of Browsers Using Codes
- Using HTML5 Codes and Utilizing Virtual Studio - Part 1
- Using HTML5 Codes and Utilizing Virtual Studio - Part 2
- Using HTML5 Codes and Utilizing Virtual Studio - Part 3
- Using HTML5 Codes and Utilizing Virtual Studio - Part 4
Module 2
- HTML5 Code Walk through - Part 1
- HTML5 Code Walk through - Part 2
- HTML5 Code Walk through - Part 3
- CSS3 Selectors and Style Properties - Part 1
- CSS3 Selectors and Style Properties - Part 2
- CSS3 Selectors and Style Properties - Part 3
- CSS3 Selectors and Style Properties - Part 4
- CSS3 Selectors and Style Properties - Part 5
- CSS3 Selectors and Style Properties - Part 6
Module 3
- Developer Tool Support
- Browse-Specific Feature Detection
- HTML Form Examples - Part 1
- HTML Form Examples - Part 2
- HTML Form Examples - Part 3
- HTML Form Examples - Part 4
Module 4
- HTML Form Enhancements - Part 1
- HTML Form Enhancements - Part 2
- HTML Form Enhancements - Part 3
- HTML Form Enhancements - Part 4
- HTML Form Enhancements - Part 5
- HTML Form Enhancements - Part 6
Module 5
- Building Websites - Part 1
- Building Websites - Part 2
- Building Websites - Part 3
- Building Websites - Part 4
Module 6
- More HTML5
- More HTML5 - Information Tags
- More HTML5 - Codes
- More HTML5 - Java Script
- Course Outro
Microsoft 70-331: Core Solutions of SharePoint Server 2013 Course Content
Module 1: Comprehensive Introduction to Sharepoint
- Course Intro
- Social Media
- Moblie Access
- Business Intelligence - Part 1
- Business Intelligence - Part 2
- Sharepoint Licensing Overview
- Organize Info
- Share Your Insights
- Minimal Download Strategy
- Enhances Social and Collaboration Features
- Enhanced Search
- Workflow
- Enterprise Content Management
- Web Content Management
Module 2: Installing SharePoint
- What We Will Cover - Part 1
- What We Will Cover - Part 2
- What We Will Cover - Part 3
- What We Will Cover - Part 4
- What We Will Cover - Part 5
- What We Will Cover - Part 6
- What We Will Cover - Part 7
- What We Will Cover - Part 8
- What We Will Cover - Part 9
- Software Requirements
- Service and Accounts
Module 3: SharePoint Architecture, Logical & Physical
- Physical Architecture
- Physical Architecture - Traditional Topologies
- Physical Architecture - Streamlined Topologies
- Physical Architecture - Search Architectures
- Physical Architecture - Enterprise Search Architecture
- Physical Architecture - Multi - Farm
- Logical Architecture
- Logical Architecture - Host Names Based Sites
- Logical Architecture - Path - Based
- Logical Architecture - Extranet
- Logical Architecture - Mobile
- Logical Architecture - Single Farm Deployment
- Databasis
- Summary
Module 4: Web Applications and Site Collections
- Web Applications and Site Collections Intro
- Logical Structure and Web Applications
- Demo
- Site Collections
- Demo - Part 1
- Demo - Part 2
- Application Pools and Summary
Module 5: Configure Service Applications
- Intro
- Service Applications
- Demo of Configuring Excel Services
- Sharepoint Management Shell Demo
- Summary
Module 6: Permissions
- Intro
- Site Permissions
- Terms
- Demo
- Authentication Modes
- O Auth
- Summary
Module 7: Search
- Intro
- Intro to Search
- Search Logical Architecture
- Crawling the Content
- Conent Processing
- Analytics Processing Component
- Summary
Module 8: User Profiles
- Intro
- User Profile Service
- User Profile Demo
- Profile Synchronization Goals
- Profile Synchronization Demo
- Sync Performance Changes
- Sync Performance Changes Demo
- Profile Import Options
Module 9: Ongoing Support and Maintenance
- Intro
- What To Look For
Microsoft 70-332: Advanced Solutions of SharePoint Server 2013 Course Content
Module 1: Business Continuity
- Course Intro
- Intro to Plan Business Continuity Management - Part 1
- Intro to Plan Business Continuity Management - Part 2
- Describe High Availability
- Degraded Availability
- Qualifying Downtime
- Qualifying Downtime Demo - Part 1
- Qualifying Downtime Demo - Part 2
- Qualifying Downtime Demo - Part 3
- Qualifying Downtime Demo - Part 4
- Qualifying Downtime Demo - Part 5
- Qualifying Downtime Demo - Part 6
- Disaster Recovery Plan (DRP) - Part 1
- Disaster Recovery Plan (DRP) - Part 2
- Measure Availability - Part 1
- Measure Availability (Demo) - Part 2
- Measure Availability - Part 3
- Downtime Metrics - Part 1
- Downtime Metrics - Part 2
- Performance to Availability Relationship
- Costs of HA
- HA Supports in a Farm
- Fault Tolerant in your HA Solution
- Backup and Recovery in SharePoint 2013
- Summary
Module 2: Model, Design, and Test
- Intro
- Plan for Success
- Model - Part 1
- Model - Part 2
- Model - Part 3
- Model - Part 4
- Model - Part 5
- Model - Part 6
- Model - Part 7
- Model - Part 8
- Design - Part 1
- Design - Part 2
- Design - Part 3
- Design - Part 4
- Design - Part 5
- Design - Part 6
- Design - Part 7
- Test - Part 1
- Test - Part 2
- Test - Part 3
- Test - Part 4
- Test - Part 5
- Test - Part 6
- Test - Part 7
- Deploy
- Monitor and Maintain
Module 3: Upgrade and Migrate
- Intro to Upgrade and Migrate to SharePoint 2013
- Upgrading to SharePoint 2013 - Part 1
- Upgrading to SharePoint 2013 - Part 2
- Upgrading to SharePoint 2013 - Part 3
- Upgrading to SharePoint 2013 - Part 4
- Upgrading to SharePoint 2013 - Part 5
- Upgrading to SharePoint 2013 - Part 6
- Upgrading to SharePoint 2013 - Part 7
Module 4: Create and Configure Service Applications
- Intro to Create and Configure Service Applications
- Create and Configure Service Applications
- Create and Configure Service Applications Demo
- Create and Configure Service Applications Summary
Module 5: SharePoint Management
- Intro to Manage SharePoint Solution, BI, and System Integration
- Manage SP Solutions, BI, and System Integration
Microsoft 70-461: Querying SQL Server 2012 Course Content
Lesson 1: Getting Started with SQL Server 2012
- Course Introduction
Lesson 2: Working with T-SQL
- Creating Queries-Part 1
- Creating Queries-Part 2
- Creating Queries-Part 3
- Creating Queries-Part 4
- Creating Queries-Part 5
- Constraints-Part 1
- Constraints-Part 2
- Constraints-Part 3
- Constraints-Part 4
- Constraints-Part 5
Lesson 3: Writing SELECT Queries
- Select Statement-Part 1
- Select Statement-Part 2
- Select Statement-Part 3
- Select Statement-Part 4
Lesson 4: Working with SQL Data Types
- Data Types-Part 1
- Data Types-Part 2
- Data Types-Part 3
- Data Types-Part 4
- Data Types-Part 5
- Data Types-Part 6
- Data Types-Part 7
- Data Types-Part 8
- Data Types-Part 9
- Data Types-Part 10
Lesson 5: Sorting and Filtering Data
- Sorting Results-Part 1
- Sorting Results-Part 2
- Sorting Results-Part 3
- Sorting Results-Part 4
- Sorting Results-Part 5
- Sorting Results-Part 6
Lesson 6: Querying Data from Multiple Tables
- Tables Part 1
- Tables Part 2
- Tables Part 3
- Tables Part 4
- Tables Part 5
- Tables Part 6
Lesson 7: Modifying Data
- Inserting Data-Part 1
- Inserting Data-Part 2
- Inserting Data-Part 3
- Inserting Data-Part 4
- Inserting Data-Part 5
- Inserting Data-Part 6
Lesson 8: Working with SQL Server Built-in Functions
- Functions
- Parse
- Logical Functions
- Group By
Lesson 9: Programming in T-SQL
- Programming-Part 1
- Programming-Part 2
- Programming-Part 3
- Programming-Part 4
- Programming-Part 5
- Programming-Part 6
Lesson 10: Implementing Stored Procedures
- Storage Procedures-Part 1
- Storage Procedures-Part 2
- Dynamic SQL-Part 1
- Dynamic SQL-Part 2
Lesson 11: Working with Subqueries and Table Expressions
- Sub-Queries And Table Expressions-Part 1
- Sub-Queries And Table Expressions-Part 2
- Sub-Queries And Table Expressions-Part 3
- Sub-Queries And Table Expressions-Part 4
Lesson 12: Working with Set Operators, Conditional Operators, and Window Functions
- Set Operators-Part 1
- Set Operators-Part 2
- Window Functions-Part 1
- Window Functions-Part 2
- User Defined Functions-Part 1
- User Defined Functions-Part 2
- Advanced Analytical Functions
Lesson 13: Working with PIVOT, UNPIVOT, and Grouping Sets
- Pivot
- Grouping Sets
Lesson 14: Managing Error Handling and Transactions
- Error Handling-Part 1
- Error Handling-Part 2
- Manage Transactions-Part 1
- Manage Transactions-Part 2
- Manage Transactions-Part 3
Lesson 15: Querying SQL Server System
- System Databases-Part 1
- System Databases-Part 2
- System Databases-Part 3
- System Databases-Part 4
Lesson 16: Optimizing Query Performance
- Query Planning-Part 1
- Query Planning-Part 2
- Index-Part 1
- Index-Part 2
- Index-Part 3
Microsoft 70-462: Administering SQL Server 2012 Databases Course Content
Lesson 1: Identifying the SQL Server Platform
- Overview
- DataStorage-Part 1
- DataStorage-Part 2
Lesson 2: Deploying SQL Server
- Install-Part 1
- Install-Part 2
Lesson 3: Configuring SQL Server
- Configuring-Part 1
- Configuring-Part 2
- Changing Memory-Part 1
- Changing Memory-Part 2
- Email-Part 1
- Email-Part 2
Lesson 4: Managing Databases in SQL Server 2012
- User Databases-Part 1
- User Databases-Part 2
- User Databases-Part 3
- User Databases-Part 4
- User Databases-Part 5
Lesson 5: Managing SQL Server Security
- Setting Security-Part 1
- Setting Security-Part 2
- Server Roles-Part 1
- Server Roles-Part 2
- Setting Permissions-Part 1
- Setting Permissions-Part 2
Lesson 6: Implementing Advanced Security Settings
- Querying Data From Multiple Tables-Part 1
- Querying Data From Multiple Tables-Part 2
- Querying Data From Multiple Tables-Part 3
- Querying Data From Multiple Tables-Part 4
- Querying Data From Multiple Tables-Part 5
Lesson 7: Applying Encryption and Compression
- Encrypting And Compressing-Part 1
- Encrypting And Compressing-Part 2
- Encrypting And Compressing-Part 3
Lesson 8: Working with Indexes and Log Files
- Functions-Part 1
- Functions-Part 2
- Functions-Part 3
- Functions-Part 4
- Functions-Part 5
- Functions-Part 6
Lesson 9: Working with Backup and Restore
- Managing Backups-Part 1
- Managing Backups-Part 2
- Managing Backups-Part 3
- Managing Backups-Part 4
- Managing Backups-Part 5
- Managing Backups-Part 6
- Managing Backups-Part 7
Lesson 10: Implementing High Availability
- Stored Procedures-Part 1
- Stored Procedures-Part 2
- Stored Procedures-Part 3
- Stored Procedures-Part 4
Lesson 11: Optimizing Server Performance
- Managing SQL Performance-Part 1
- Managing SQL Performance-Part 2
- Managing SQL Performance-Part 3
- Managing SQL Performance-Part 4
- Managing SQL Performance-Part 5
- Managing SQL Performance-Part 6
- Managing SQL Performance-Part 7
Lesson 12: Troubleshooting Issues and Recovering Databases
- Set Operators-Part 1
- Set Operators-Part 2
- Set Operators-Part 3
- Set Operators-Part 4
- Set Operators-Part 5
Lesson 13: Performing Advanced Database Management Tasks
- Managing Database Infrastructures-Part 1
- Managing Database Infrastructures-Part 2
- Managing Database Infrastructures-Part 3
Microsoft 70-463: Implementing a Data Warehouse with SQL Server 2012 Course Content
Lesson 1: Introduction to Data Warehouse
- Introduction
- Introduction To Data Warehouse-Part1
- Introduction To Data Warehouse-Part2
- Introduction To Data Warehouse-Part3
- Introduction To Data Warehouse-Part4
- Introduction To Data Warehouse-Part5
- Introduction To Data Warehouse-Part6
Lesson 2: Creating Dimensions and Changing Granularity of Dimensions
- Creating Dimensions And Changing Granularity Of Dimensions-Part1
- Creating Dimensions And Changing Granularity Of Dimensions-Part2
- Creating Dimensions And Changing Granularity Of Dimensions-Part3
- Creating Dimensions And Changing Granularity Of Dimensions-Part4
- Creating Dimensions And Changing Granularity Of Dimensions-Part5
- Creating Dimensions And Changing Granularity Of Dimensions-Part6
Lesson 3: Creating Fact Tables and ColumnStore Indexes
- Creating Fact Tables And Column Store Indexes-Part1
- Creating Fact Tables And Column Store Indexes-Part2
- Creating Fact Tables And Column Store Indexes-Part3
- Creating Fact Tables And Column Store Indexes-Part4
- Creating Fact Tables And Column Store Indexes-Part5
Lesson 4: Implementing Data Warehouse in SQL Server 2012
- Implementing Data Warehouse-Part1
- Implementing Data Warehouse-Part2
- Implementing Data Warehouse-Part3
- Implementing Data Warehouse-Part4
Lesson 5: Working with Integration Services
- Working With Integration Services-Part1
- Working With Integration Services-Part2
- Working With Integration Services-Part3
- Working With Integration Services-Part4
- Working With Integration Services-Part5
- Working With Integration Services-Part6
Lesson 6: Managing Control Flow
- Managing Control Flow-Part1
- Managing Control Flow-Part2
- Managing Control Flow-Part3
- Managing Control Flow-Part4
- Managing Control Flow-Part5
Lesson 7: Working with Dynamic Variables
- Working With Dynamic Variables-Part1
- Working With Dynamic Variables-Part2
- Working With Dynamic Variables-Part3
- Working With Dynamic Variables-Part4
- Working With Dynamic Variables-Part5
- Working With Dynamic Variables-Part6
- Working With Dynamic Variables-Part7
- Working With Dynamic Variables-Part8
Lesson 8: Implementing Data Flow
- Implementing DataFlow-Part1
- Implementing DataFlow-Part2
- Implementing DataFlow-Part3
- Implementing DataFlow-Part4
- Implementing DataFlow-Part5
- Implementing DataFlow-Part6
- Implementing DataFlow-Part7
- Implementing DataFlow-Part8
Lesson 9: Managing Data Flow
- Managing DataFlow-Part1
- Managing DataFlow-Part2
- Managing DataFlow-Part3
- Managing DataFlow-Part4
Lesson 10: Managing SSIS Package Execution
- Managing SSIS Package Execution-Part1
- Managing SSIS Package Execution-Part2
- Managing SSIS Package Execution-Part3
- Managing SSIS Package Execution-Part4
- Managing SSIS Package Execution-Part5
- Managing SSIS Package Execution-Part6
Lesson 11: Debugging and Troubleshooting
- Debugging And Troubleshooting-Part1
- Debugging And Troubleshooting-Part2
- Debugging And Troubleshooting-Part3
- Debugging And Troubleshooting-Part4
Lesson 12: Deploying Packages
- Deploying Packages-Part1
- Deploying Packages-Part2
- Deploying Packages-Part3
Lesson 13: Securing Packages and Databases
- Securing Packages And Databases-Part1
- Securing Packages And Databases-Part2
Lesson 14: Working with MDS and Windows
- Working With MDS And Windows Azure
Microsoft ASP .NET MVC Course Content
Module 1
- Exploring ASP Dot NET MVC 4 - Part 1
- Exploring ASP Dot NET MVC 4 - Part 2
- Exploring ASP Dot NET MVC 4 - Part 3
- Exploring ASP Dot NET MVC 4 - Part 4
Module 2
- Designing Web Applications - Part 1
- Designing Web Applications - Part 2
- Designing Web Applications - Part 3
- Designing Web Applications - Part 4
- Designing Web Applications - Part 5
Module 3
- Developing ASP Dot NET MVC 4 Models - Part 1
- Developing ASP Dot NET MVC 4 Models - Part 2
- Developing ASP Dot NET MVC 4 Models - Part 3
Module 4
- Developing ASP Dot NET MVC 4 Controllers - Part 1
- Developing ASP Dot NET MVC 4 Controllers - Part 2
- Developing ASP Dot NET MVC 4 Controllers - Part 3
- Developing ASP Dot NET MVC 4 Controllers - Part 4
Module 5
- Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 1
- Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 2
- Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 3
- Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 4
- Applying Styles to ASP Dot NET MVC 4 Web Applications - Part 5
Module 6
- Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 1
- Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 2
- Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 3
- Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 4
- Testing and Debugging ASP Dot NET MVC 4 Web Applications - Part 5
Module 7
- Structuring ASP Dot NET MVC 4 Web Applications - Part 1
- Structuring ASP Dot NET MVC 4 Web Applications - Part 2
- Structuring ASP Dot NET MVC 4 Web Applications - Part 3
Module 8
- Troubleshooting ASP Dot NET MVC 4 Web Applications
Microsoft Excel 2010 Course Content
Excel 2010 Basic
- Intro to Excel Basic
- Interface and Functions
- Cells
- Entering Data Into Cells
- Basic Formatting in Excel
- Creating a Worksheet
- The Intelligence Of Excel
- Customizing Rows and Columns
- Creating Formulas
- Summary Pages and Moving Workbook to Workbook
- The Function Builder
- Conditional Formatting
- Sorting and Filtering Data
- Printing with Excel
- Conclusion
- Excel Basic Flashcards
Excel 2010 Intermediate
- Intro to Excel Intermediate
- Charts
- Headers Footers and Layout Options
- What If
- Basic Tables in Excel
- Pivot Tables
- Manipulating Data Within the Pivot Tables
- Pivot Table Charts
- Data Validation
- Conclusion
- Excel Intermediate Flashcards
Excel 2010 Advanced
- Intro to Excel Advanced
- Customizing the Ribbon and Cells
- Creating and Managing Ranges
- More Formulas
- Data Analysis
- Data From an Outside Source
- Spark Lines
- Macros
- Conclusion
- Excel Advanced Flashcards
Microsoft Outlook 2010 Course Content
Outlook 2010 Basic
- Intro To Outlook Basic
- Interface
- Customizing Interface
- E-mail 101
- Organizing Inbound E-mails
- Calendar Function
- Task Lists
- Contact List
- Multiple Accounts
- Conclusion
Outlook 2010 Intermediate
- Intro To Outlook Intermediate
- Message Functions
- Calendar
- More In-Depth Contact Functions
- Email Message Options
- Mail Rules
- Customizing Options
- Conclusion
Outlook 2010 Advanced
- Intro To Outlook Advanced
- Send And Receive
- Account Settings
- Calendars
- Quick Actions Within Messages
- Quick Steps
- Conclusion
Microsoft Powerpoint 2010 Course Content
Powerpoint 2010 Basic
- Powerpoint Basic Flashcards
- Intro To PowerPoint Basic
- The PowerPoint Interface
- Creating A New Presentation With Templates
- Slide Layout
- Visually Appealing Presentations
- Preview Mode And Page Setup
- Transitions
- Creating Custom Slides
- Animating Text
- Animating Objects
- Animation Timing
- Conclusion
Powerpoint 2010 Intermediate
- Powerpoint Intermediate Flashcards
- Introduction To PowerPoint Intermediate
- Sections And Organizing Slides
- Adding Autoshapes
- Inserting And Editing Pictures
- Inserting And Editing Video
- Inserting And Editing Tables
- SmartArt
- Animating Smart Art And Inserting Audio
- Headers And Footers In PowerPoint
- Setup Slideshow And Rehearsal Timing
- Conclusion
Powerpoint 2010 Advanced
- Powerpoint Advanced Flashcards
- Intro To PowerPoint Advanced
- Master Slides
- Styles
- More Functions With Video In PowerPoint
- Transitions And Action Buttons
- Customizing The Show
- Printing In PowerPoint
- Conclusion
Microsoft Word 2010 Course Content
Word 2010 Basic
- Flashcards
- Intro to the Word Interface
- Working with Templates
- Creating a New Blank Document
- Formatting a Document
- More Formatting Options
- Adding Shapes, Clipart, & Pictures
- Page Layout
- Conclusion
Word 2010 Intermediate
- Flashcards
- Introduction
- Tracking Changes in a Document
- Customizing the Interface
- Working with Styles
- Tables in Word
- Endnotes, Footnotes, & Captions
- Cover Pages, Headers, & Footers
- Working with Sections
- Headers & Footers
- Cover Sheet & Table of Contents
- Cover Letters & Mail Merge
- Conclusion
Word 2010 Advanced
- Flashcards
- Introduction to the Word Interface
- Customizing the Ribbon
- Embedding Non-Word Documents
- Working with Formulas
- Citations
- Comparing Documents
- Forms & Content Controls
- Master Documents & Subdocuments
- Conclusion
Oracle Database 11g Certified Associate (OCA) Fundamentals 1Z0-051 and Admin 1z0-052 Course Content
Module 1: Database Admininstration
- Intro to Oracle
- Database Administration
- Installing Oracle - Part 1
- Installing Oracle - Part 2
- Post Setup Overview - Part 1
- Post Setup Overview - Part 2
- SQLplus - Part 1
- SQLplus - Part 2
- SQLplus Demo - Part 1
- SQLplus Demo - Part 2
- SQLplus Demo - Part 3
- Startup and Shutdown - Part 1
- Startup and Shutdown - Part 2
Module 2: Oracle Architecture
- Oracle Architecture
- Schema Objects
- Data Access
- Architecture
Module 3: Database Schema
- Database Schema
- Create Table & Tablespace - Part 1
- Create Table & Tablespace - Part 2
- Create View
- Create Index
- Create Sequence
Module 4: Recovery Manager
- Recovery Manager
- What is RMAN
- RMAN Demo
- Restore - Part 1
- Restore - Part 2
Module 5: Introduction to SQL
- SQL - Part 1
- SQL - Part 2
- Parts of SQL Statement
- Select Statement
Module 6: Filtering and Sorting Data
- Build ERD - Part 1
- Build ERD - Part 2
- Build ERD - Part 3
Module 7: Functions
- Functions
- More Functions
- Group Functions
- Custom Functions
Module 8: SET Operators and Subqueries
- SET Operations
- Subqueries
Module 9: Regular Expressions and SQL Loader
- Regular Expressions
- SQL Loader
Microsoft Access 2010 Course Content
Access 2010 Basic
- Access Basic Flashcards
- Introduction
- Databases And The Access Interface
- Spreadsheets And Tables
- Entering Data In A Table
- Relationships Between Tables
- Editing A Form
- Queries
- Across The Tables
- Creating Forms
- Conclusion
Access 2010 Intermediate
- Access Intermediate Flashcards
- Introduction
- Primary Key
- Multiple Table Query
- Creating Forms
- Validation Within Forms
- Adding Related Fields
- Forms Created With Design View
- Find Functionality
- Creating Report
- Conclusion
Access 2010 Advanced
- Access Advanced Flashcards
- Introduction
- Customizing Access With Back Stage Options
- Mailing Labels
- Macros-Part1
- Macros-Part2
- Queries-Part1
- Queries-Part2
- Joining In Sequel
- Navigation
- Adding Chart With Specific Data
- Action Query
- Security
- Conclusion
Sage 50 Course Content
Module 1: Sage 50 2013
- Course Overview-Part1
- Course Overview-Part2
- Course Overview-Part3
- Course Overview-Part4
- New Features-Part1
- New Features-Part2
- New Features-Part3
- Quick Tab Menu Overview
- Business Status-Part1
- Business Status-Part2
- Customer And Sales
- Vendors And Purchases
- Inventory And Services
- Employees And Services
- Banking
- System-Part 1
- System-Part2
- Quick Tab Menu Review
- Sage 50 Menu Overview-Part1
- Sage 50 Menu Overview-Part 2
- Sage 50 Menu Overview-Part3
- Sage 50 Menu Overview-Part 4
- Sage 50 Menu Overview-Part5
- Sage 50 Menu Overview-Part6
- Sage 50 Menu Overview-Part7
Module 2: Sage 50 Basics
- Sage 50 Available Products
- Accounts Payable Features
- Vendors And Purchases-Part 1
- Vendors And Purchases-Part 2
- Vendors And Purchases-Part 3
- Vendors And Purchases-Part 4
- Vendors And Purchases-Part 5
- Vendors And Purchases-Part 6
- Accounts Payable Review
- Accounts Receivable Review
- Customer And Sales Menu
- Customers
- Jobs
- Sales Taxes
- Quotes And Proposals
- Sales Orders
- Invoices
- Finance Charges Basics
- Receive Money
- Bank Accounts
- Printing Statements
- Credits And Returns
- Accounts Receivable Report
- Basics Review
Module 3: Inventory
- Inventory And Services Overview
- Inventory Items-Part 1
- Inventory Items-Part 2
- Company Services
- Assemblies and Prices
- Purchase Orders
- Receiving Inventory Shipping And Tracking
- Inventory Count And Adjustments
- Inventory Reports
- Inventory Review
Module 4: Employee
- Employees And Payroll Overview
- Employees And Users-Part 1
- Employees And Users-Part 2
- 1099's
- Payroll Setup
- Time And Expense Tickets
- Direct Deposit And Printing Payroll Checks
- Forms And Void Checks
- Employees Module Review
Module 5: Banking
- Banking Features Overview
- Write Checks
- Account Register
- Analysis Tools-Part 1
- Analysis Tools-Part 2
- Chart Of Accounts
- Receive Money And Bank Deposits-Part 1
- Receive Money And Bank Deposits-Part 2
- Enter Bills Pay Bills And Electronic Bill Pay
- Reconcile Accounts
- General Journal Entries
- Void Checks And Reports
- Banking Module Review
Module 6: Maintenance
- Automatic Backup
- BackUp Data-Part 1
- BackUp Data-Part 2
- Automatic Backup
- Restore Data
- Data Maintenance
- System Checks
- Company Maintenance
- Data Integrity
- Maintenance Review
Module 7: File Handling
- Attaching Documents
- Attaching And Managing Documents
- File Handling Review
Module 8: Manager
- Analysis Managers
- Cash Flow Manager-Part 1
- Cash Flow Manager-Part 2
- Cash Flow Manager-Part 3
- Collection Manager
- Payment Manager
- Financial Manager
- Manager Review
Module 9: Jobs
- MaintainingJobs
- CreatingJobs-Part 1
- Creating Jobs-Part 2
- Managing Jobs
- Jobs Review
Module 10: Budgets
- Maintain Budgets
- Creating And Managing Budgets-Part 1
- Creating And Managing Budgets-Part 2
- Budgets Module Review
Module 11: Charts of Accounts
- Maintain Chart Of Accounts
- Creating Accounts
- Accounts List-Part 1
- Accounts List-Part 2
- Chart Of Accounts Review
Module 12: Accounts Management
- Maintain Customers And Prospects
- Adding Customers And Prospects
- Accounts Aging
- Payment Methods
- Managing A Customer Account
- Accounts Management Review
Module 13: Customer Setup
- Customer Setup Guide
- Customer Setup-Part 1
- Customer Setup-Part 2
- Customer Setup-Part 3
- Customer Beginning Balance
- Customer Account Defaults
- Sales Tax
- Statement And Invoice Defaults
- Customer Setup Review
Module 14: Jobs Setup
- Jobs Setup Guide
- Jobs Setup
- Jobs Change Order
- Job Ledger
- Job Profitability Report-Part 1
- Job Profitability Report-Part 2
- Job Defaults
- Jobs Beginning Balances
- Jobs Setup Review
Module 15: Vendor Setup
- Vendors Setup Guide
- Vendor Setup-Part 1
- Vendor Setup-Part 2
- Vendor Setup-Part 3
- Vendor Setup-Part 4
- Vendor Beginning Balances
- Vendor Default
- Vendor Setup Review
Module 16: Inventory Setup
- Inventory And Services Items Setup
- Adding And Managing Inventory And Service Items-Part 1
- Adding And Managing Inventory And Service Items-Part 2
- Adding And Managing Inventory And Service Items-Part 3
- Adding And Managing Inventory And Service Items-Part 4
- Quantities On Hand
- Inventory And Service Items Default Setup
- Inventory Setup Review
Module 17: Employee Setup
- Employees Setup Guide
- Employee Payroll Settings
- Payroll Options Settings
- Company Information Setting
- Benefits Settings-Part 1
- Benefits Settings-Part 2
- Payroll Taxes And Place Order Settings
- Employee Setup
- Salary History Setup
- Employees Default Setup
- Employee Setup Review
Module 18: Security Setup
- Security Setup Guide
- Setup Security
- Set Up Users
- User Security Setup
- User List Rights And Permissions
- Setup Guide Next Steps
- Security Review
Module 19: ACTI Link
- Sage 50 ACT
- Sage ACT Link
- ACT Accounting Link Setup
- Creating And Editing Contact Links-Part 1
- Creating And Editing Contact Links-Part 2
- Creating And Editing Contact Links-Part 3
- Contact Link Updates Options
- ACT! Link Review
Module 20: Task Overview
- Tasks Menu
- Quotes Sales Orders And Proposals-Part 1
- Quotes Sales Orders And Proposals-Part 2
- Quotes Sales Orders And Proposals-Part 3
- Sales Invoicing And Time Expenses
- Shipments
- Receipts
- Finance Charges
- Select For Deposit
- Credit Memos
- Select For Purchase Orders-Part 1
- Select For Purchase Orders-Part 2
- Bills And Payments-Part 1
- Bills And Payments-Part 2
- Account Register
- Time And Expense
- Select For Payroll Entry
- General Journal Entry
- Asemblies
- Account Reconciliation And Void Checks
- Write Letters And Action Items
- System Tasks
- Tasks Overview Review
Module 21: Forms, Reports, and Recap
- Reports And Forms
- Form Types And Sample Forms-Part 1
- Form Types And Sample Forms-Part 2
- Form Types And Sample Forms-Part 3
- Reports-Part 1
- Reports-Part 2
- Reports-Part 3
- Reports-Part 4
- Reports-Part 5
- Services
- Program Review
The Key to Nutrition and Wellness Course Content
Module 1
- Wellness Intro-Part 1
- Wellness Intro-Part 2
- Wellness Intro-Part 3
Module 2
- Role Of Carbohydrates-Part 1
- Role Of Carbohydrates-Part 2
Module 3
- Role Of Fiber-Part 1
- Role Of Fiber-Part 2
Module 4
- Glycemic Index-Part 1
- Glycemic Index-Part 2
Module 5
- Impact Of Carbs
Module 6
- Gluten
Module 7
- Role Of Fat-Part 1
- Role Of Fat-Part 2
- How And Why We Gain Fat
- Role Of Protein
Module 8
- Digestion
Module 9
- Calories-Part 1
- Calories-Part 2
Module 10
- Organic Vs Inorganic
Module 11
- Roles Of Vitamins And Minerals-Part 1
- Roles Of Vitamins And Minerals-Part 2
- Roles Of Vitamins And Minerals-Part 3
Module 12
- Role of Water
Module 13
- Supplements-Part 1
- Supplements-Part 2
- Supplements-Part 3
- Supplements-Part 4
- Supplements-Part 5
- Supplements-Part 6
- Supplements-Part 7
- Supplements-Part 8
Module 14
- Artificial Sweeteners-Part 1
- Artificial Sweeteners-Part 2
- Artificial Sweeteners-Part 3
- Artificial Sweeteners-Part 4
- Artificial Sweeteners-Part 5
Module 15
- The Effects Of Caffeine
- Alcohol Does It Make You Fat
Module 16
- Sleep
- Stress
Module 17
- Fad Diets
- Raw Food Diet
- Cabbage Soup Diet
- Blood Group Diet
- Types Of Vegetarians
- Fad Diets And Genetics
Module 18
- Weight Loss Tips
- Setting Goals That Work For You
- Cancer
- Outro
Quickbooks Premier 2014 Course Content
Module 1: Intro and Setup
- Intro To Quickbooks
- Setup Quickbooks
Module 2: Tools
- Tools-Part 1
- Tools-Part 2
- Tools-Part 3
Module 3: Preferences
- Preferences
- Email Preferences
Module 4: Security & Users
- Security And Users
Module 5: Estimates
- Estimates
Module 6: Sales Orders
- Sales And Orders
Module 7: Receiving Money
- Account Receivable
- Batch Invoicing
- Customer Deposits
Module 8: Bounced Checks
- Bounced Checks
Module 9: Specific Tracking
- Vehicle Mileage
- Class Tracking Transactions
Module 10: Receiving and Depositing
- Receiving Payments
- Making Deposits
Module 11: Credit Cards and Bank Accounts
- Credit Cards
- Bank Accounts
Module 12: Payroll
- Payroll Preferences
- Employee Setup
- Processing Payroll
- Payroll Tax Forms
- Job Costing With Payroll
- Payroll Setup Advance
- Workers Compensation
Module 13: Transactions
- Special Transactions
- Memorized Transactions
Module 14: Accounts and Reports
- Other Account Types
- Quickbooks Reporting
- Advance Reporting
- Budgets And Forecast
Module 15: Integrating with Word
- Writing Letters In Microsoft Word
Module 16: Data Types
- Converting Importing And Exporting
- Quickooks Backup Data Integrity
- Multi-Currencies
Module 17: Conclusion
- Advance Features
- Update Or Upgrade
- Summary Of Quickbooks
Social Media Course Content
Module 1.0 Introduction
- Social Media Introduction
- Creating A Google Account
- Setting Up Your Twitter Account
- Getting Your Twitter House In Order
- Why Facebook For Your Business
- Using Facebook As A Business
- Setting Up Your Business Page
- Setting Your Cover Photo
- Tying It All Together
- Tip-Adding Admins In Facebook
Module 2.0 Adjusting Your Facebook Settings
- Adjusting Your Settings-Part1
- Adjusting Your Settings-Part2
- Adjusting Your Settings-Part3
- Updating Your Page Info-Part1
- Updating Your Page Info-Part2
- Tips For Getting 25 Likes
- Using Facebook As Your Business Page
Module 3.0 Posting on Facebook
- What Kind Of Person Would Your Business Be
- How To Post To Facebook
- What To Post
- Sharing Posts
- Sharing Links
- Pinning And Highlighting With Posts
- Tips For GeneratingTraffic
- Getting Notifications And Staying In Clients News Feed
- Comment Moderation
- The Activity Log-Where Do Hidden Posts Go
- Scheduling Posts
Module 7.0 Twitter
- Limiting the Number Of Actions
- Setting Your Twitter Preferences
- Finish Setting Up Your Profile
- Twitter Widgets
- Who To Follow
- Connect
- Bringing Followers From Facebook
- Intro To Hashtags
- Examples Of Hashtags
- Monitoring Whats Going On
- Using Twitter For Social Listening
- Social Media Tips
- Hashtags Across Social Media
Module 8.0 Pinterest
- Overview Of Pinterest
- How Does Pinterest Relate To Your Business
- Industry Specific Sites
- The Uses of Pinterest
- Conclusion Of Pinterest
Module 9.0 Reddit
- Introduction To Reddit
- The Rules Of Reddit
Module 11.0 LinkedIn
- Introduction To LinkedIn
- Overview Of The Interface And Settings
- Open Link Settings
- LinkedIn Groups
- Adding And Removing Applications
- Basic Account Settings
- Updating Your Public Profile
- LinkedIn Connections Groups And Pages
- LinkedIn Channels And Today
- Advertising On LinkedIn
Module 12.0 Google+ and Youtube
- Introduction To Google Plus
- Overview Of The Interface
- Setting Up A Google Plus Page
- Linking Your Other Social Networks
- Linking Your Website To Your Google Plus Page
- Review Of Your Google Plus Dashboard
- Notification Settings For Google Plus
- Photo Settings In Google Plus
- Google Plus And YouTube
- YouTube Advanced Settings
- Interface For Uploaded Video
- Sharing Videos Across Your Social Network
- Updating Your About Section
- Quick Recap Of Everything Covered So Far
Module 14.0 Additional Tools
- Bitly
- Woobox-Part1
- Woobox-Part2
- Hoot Suite-Part1
- Hoot Suite-Part2
- Storify
- Social Media Rules And Tips
- Tweet deck-Boolean Search
- Social Media Conclusion
Module 4.0 Facebook Advertising
- Intro To Facebook Advertising
- Setup Advertising Account
- Types Of Advertising On Facebook
- Ad Testing
- Choosing Our Audience-Location
- Choosing Our Audience-Age And Gender
- Choosing Our Audience-Precise Interests
- Choosing Our Audience-Broad Categories
- Choosing Our Audience-Connections
- Choosing Our Audience-Advanced Targeting Options
- Choosing Our Audience-Campaign And Budget
- Other Types Of Ads-Part1
- Other Types Of Ads-Part2
- Ad Campaign Manager-Part1
- Ad Campaign Manager-Part2
- Outside URLs
- Building Ad Text
- News Feed Format And Creating Your Audience
- Campaign Pricing And Schedule
- Ad Campaign Tracker
Module 5.0 Facebook Insights
- Facebook Insights-Overview Intro
- Analyzing Page Posts
- Engaged Users
- Talking About This
- Virality
- Likes
- Reach
- Reach And Frequency
- Page Visits
- Talking About This
- Conclusion
Module 6.0 Facebook Analytics
- 6.0 New Facebook Analytics Overview
- 6.1 Page Likes
- 6.2 Post Reach
- 6.3 Page Visits
- 6.4 Posts
- 6.5 People
- New Facebook Analytics Overview
- Page Likes
- Post Reach
- Page Visits
- Posts
- People
Module 10.0 Tumblr
- Tumblr Introduction
- Setting Up A Tumblr
- Dashboard
- Posting To Tumblr
- Testing Your Post
- URL Post
- Chat Post
- Audio On Tumblr
- Video On Tumblr
- Tumblr Conclusion
Module 13.0 Best Practices
- Determine Your Goals
- Create Your Persona Or Voice
- Decide On Your Platforms
- Establishing A Social Media Manager
- Coordinate With Customer Service
- Create A Predetermined Crisis Management Plan
- Stick To The Script
- Building Relationships With The Media
- Find Your Evangelist
- Stay Informed-Part1
- Stay Informed-Part2
5 star | 82 | 82% |
4 star | 17 | 17% |
3 star | 1 | 1% |
2 star | 0% | |
1 star | 0% |
Sorry, no reviews match your current selections
Your Training Instructors
Josh has 15 plus years in account management and client support with over 5 years specifically in the healthcare industry. Josh provides hands-on leadership to the healthcare team at NetDirector by focusing on client success and innovative solutions. As the Healthcare Operations Manager, Josh ensures that each client implementation is completed as efficiently as possible with the greatest impact to the client. He holds a Bachelor of Arts degree from the University of South Florida.
Chrys Thorsen is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered over 50 IT Certifications including CISSP, CISA, CEHv12, PenTest+, CompTIA CNVP, Cisco CCSI/CCNP, Microsoft Cloud and on-premises technologies, VMware vSphere, and many more. She has also authored 40 published certification textbooks, and over 35 full-length IT certification video courses.
When not working in the United States, Chrys spends her time abroad capacity-building IT literacy in developing nations in Sub-Saharan Africa. Her client list has included: the US Federal Government, the Republic of Zambia Ministry of Health, Cavendish University Zambia, Accenture, JP Morgan Chase, the US Centers for Disease Control and Prevention, the Elizabeth Glaser Pediatric AIDS Foundation (EGPAF), Hughes Aircraft, Microsoft, and many more.
Chrys lives by, and is fond of repeating, her professional creed:
“The only true measure of success for any project or training is results on the ground. Everything else is just noise.” “I teach what I deploy; I deploy what I teach.”
Dean has had fun for the past 20 years learning and teaching everything he can in technology and security. His consulting experience in accounting systems, inventory control, migrations, and patch management has breathed life into his 12 years in the class room. Dean is a courseware developer who specializes in CISSP and security training. He is the lead instructor for Expanding Security and teaches online as his main job. As a non-military person, he is a proud recipient of six mission coins.
Subscribe To All-Access
Lock In $16.99 / Month Forever
Access this course and over 2,700 hours of focused IT training. Start your first month for only $1.00. Then lock in only $16.99 / month for life.
- Get Every Course
- Free Updates / New Content Added
- 2,700+ Hours of Training
- Price Lock Guarantee
- Games / Flashcards
- 21,000+ Practice Questions
$49.99 $16.99 Monthly
$199.00 Original price was: $199.00.$129.00Current price is: $129.00.
good
Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.