Infrastructure/Cloud Admin Bundle
As the demand for infrastructure management shifts, so does our approach. Companies are now venturing into server virtualization and cloud-based infrastructures to stay current with trends. This training bundle provides students a plethora of options and information regarding managing both server virtualization and/or cloud-based infrastructures. This invaluable collection contains 7 courses that ensure you’ll have all the resources needed to be successful in this field.
Included In This Course
Closed Captions
Certificate of Completion
- Microsoft AZ-203: Developing Solutions for Microsoft Azure
- VMWare vSphere 6.7 Fundamentals
- CompTIA Cloud+ CV0-001
- Cloud Computing Security Knowlege (CCSK)
- CompTIA Cloud Overview
- Exin Cloud Computing
- Microsoft 70-347: Enabling Office 365 Service
Proudly DisplayYour Achievement
Upon completion of your training, you’ll receive a personalized certificate of completion to help validate to others your new skills.Microsoft AZ-203: Developing Solutions for Microsoft Azure Course Content
Module 1: Implement VM Solutions
- Intro
- Implement VM Solutions Pt 1
- Implement VM Solutions Pt 2
- Implement VM Solutions Pt 3
- Implement VM Solutions Pt 4
- Implement Batch Jobs Using AZ Batch Services
- Create Containerized Solutions Pt 1
- Create Containerized Solutions Pt 2
Module 2: Develop Azure Platform as a Service
- Develop Azure Platform as a Service (PaaS) Pt 1
- Develop Azure Platform as a Service (PaaS) Pt 2
- Develop Azure Platform as a Service (PaaS) Pt 3
- Develop Azure Platform as a Service (PaaS) Demo Pt 1
- Develop Azure Platform as a Service (PaaS) Demo Pt 2
- Create Azure App Service Mobile Apps
- Create Azure App Service API Apps
- Implement Azure Functions Pt 1
- Implement Azure Functions Pt 2
Module 3: Develop for Azure Storage
- Develop for Azure Storage Pt 1
- Develop for Azure Storage Pt 2
- Develop for Azure Storage Pt 3
- Develop Solutions that use Azure Cosmos DB Pt 1
- Develop Solutions that use Azure Cosmos DB Pt 2
- Develop Solutions that use Relational Database Pt 1
- Develop Solutions that use Relational Database Pt 2
- Develop Solutions that use Microsoft Blob Storage
Module 4: Implement Azure Security
- Implement Azure Security Pt 1
- Implement Azure Security Pt 2
- Implement Azure Security Pt 3
- Implementing Access Control Pt 1
- Implementing Access Control Pt 2
- Implementing Secure Data Solutions
Module 5: Monitor, Troubleshoot and Optimize Azure Solutions
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 1
- Monitor, Troubleshoot and Optimize Azure Solutions Pt 2
- Develop for Code Scalability
- Instrument Solutions to Support Monitoring and Logging
- Integrate Caching and Content Delivery Pt 1
- Integrate Caching and Content Delivery Pt 2
Module 6: Connect to and Consume Azure and Third Party Services
- Connect to and Consume Azure and Third Party Services Pt 1
- Connect to and Consume Azure and Third Party Services Pt 2
- Working with Azure Search
- Azure API Management
- Develop Event Based Solutions Pt 1
- Develop Event Based Solutions Pt 2
- Develop Message Based Solutions Pt 1
- Develop Message Based Solutions Pt 2
- Outro
VMWare vSphere 6.7 Fundamentals Course Content
Chapter 1: Course Introduction and Methodology
- 1.1
- 1.2
- 1.3
Chapter 2: Virtualization Overview
- 2.1
- 2.2
Chapter 3: Planning and Installing ESXi
- 3.1
- 3.2
- 3.3
- 3.4
- 3.5
- 3.6
- 3.7
Chapter 4: Using tools to Administer a VMware Environment
- 4.1
- 4.2
- 4.3
Chapter 5: vCenter and Licensing
- 5.1
- 5.2
- 5.3
- 5.4
- 5.5
- 5.6
- 5.7
Chapter 6: Configuring Networking
- 6.1
- 6.2
- 6.3
Chapter 7: Configuring Storage
- 7.1
- 7.2
- 7.3
- 7.4
- 7.5
- 7.6
Chapter 8: VM Creation, Configuration, and Snapshots
- 8.1
- 8.2
- 8.3
- 8.4
- 8.5
- 8.6
- 8.7
- 8.8
- 8.9
Chapter 9: Security and Permissions
- 9.1a
- 9.1b
- 9.1c
- 9.2
- 9.3
- 9.4
Chapter 10: Host and VM Monitoring
- 10.1
- 10.2a
- 10.2b
- 10.3
- 10.4
- 10.5
- 10.6
Chapter 11: Advanced ESXi and vCenter Server Management
- 11.1
- 11.2
- 11.3
- 11.4
- 11.5
- 11.6
Chapter 12: Patching and Upgrading ESXi
- 12.1a
- 12.1b
- 12.2a
- 12.2b
Chapter 13: Disaster Recovery and Backup
- 13.1
- 13.2
- 13.3
- 13.4
Microsoft 70-347: Enabling Office 365 Services Course Content
Module 1: Technology Review
- Introduction
- Active Directory Install And Configure
- PowerShell Primer
- Microsoft Exchange Server Install And Configure - Part 1
- Microsoft Exchange Server Install And Configure - Part 2
- Review Cloud Computing - Part 1
- Review Cloud Computing - Part 2
- Review Virtualization And The Cloud - Part 1
- Review Virtualization And The Cloud - Part 2
- Review Virtualization And The Cloud - Part 3
Module 2: Device Management
- Client Devices
- Demo Client Device Setup - Part 1
- Demo Client Device Setup - Part 2
- Office 365 Client Deployment
- Office 365 Components
- Office 365 Deployment Methods
- Office 365 Cloud Deployment Methods
- Office 365 Deployment Prerequisites
- Office 365 Deployment Readiness
- Office 365 Deployment Network Environment
Module 3: Office 365 Deployment Plan
- Network Planning
- Internet Network Usage Planning
- Network Device Planning
- Account Management Planning - Part 1
- Account Management Planning - Part 2
- Migration And Coexistence Options
- Single Sign On Architecture
- Demo Server 2012 Core With Active Directory Role
Module 4: Windows Azure
- SharePoint 2013 Using Windows Azure - Part 1
- SharePoint 2013 Using Windows Azure - Part 2
- SharePoint 2013 Capabilities
Module 5: PowerShell
- Scripting And PowerShell - Part 1
- Scripting And PowerShell - Part 2
- PowerShell Scripting Techniques - Part 1
- PowerShell Scripting Techniques - Part 2
- Enterprise Ready Scripts - Part 1
- Enterprise Ready Scripts - Part 2
- PowerShell Scripting Syntax - Part 1
- PowerShell Scripting Syntax - Part 2
- PowerShell Scripting Active Directory - Part 1
- PowerShell Scripting Active Directory - Part 2
- PowerShell Remoting
- PowerShell Adding Bulk Users In AD
Module 6: SQL Server
- Introduction To SQL Queries
- SQL Queries - Part 1
- SQL Queries - Part 2
- DML And DDL - Part 1
- DML And DDL - Part 2
- DDL
- SQL Server And PowerShell
- SQL Server PowerShell And AD
- Logging Data In SQL Server Using PowerShell
Module 7: Azure Lync and SharePoint
- Azure Active Directory Fundamentals - Part 1
- Azure Active Directory Fundamentals - Part 2
- Deploying Lync Server - Part 1
- Deploying Lync Server - Part 2
- Deploying Lync Server - Part 3
- SharePoint Designer
- Backup And Restore Share Point
- Windows PowerShell And SharePoint
- Identity Service With Active Directory
- Setup And Deploy Exchange
Module 8: Course Review
- Review Virtualization
- Review Cloud
- Review Automation Using PowerShell
- Review Desktop Applications
- Move To Office 365
- Conclusion
CompTIA CV0-001: CompTIA Cloud + Course Content
Module 1
- Introduction
- Models-Part 1
- Models-Part 2
- Service And Delivery Models
- Terms And Characteristics
- Objects Storage Concepts
Module 2
- Virtualization
- Install Configure Manage VM And Devices
- Backups
- Virtual Disks
- Virtual Switches
- Virtual Resource Migration
- Benefits Of Virtualization In A Cloud Environment
- Compare And Contrast Virtua lEnvironment
Module 3
- Infrastructure
- Different Access Protocols
- Explain Storage Configuration
- File Systems Types
- Executing Storage Provisioning
- Network Share Demo
- Implement Appropriate Network Configurations
- Importance Of Network Optimization
- Troubleshoot Basic Network Configuration-Part 1
- Troubleshoot Basic Network Configuration-Part 2
- Troubleshoot Commands-Part 1
- Troubleshoot Commands-Part 2
- Troubleshoot Commands-Part 3
- Explain Common Network Protocols
- Common Hardware Resources
Module 4
- Resource Management-Part 1
- Resource Management-Part 2
- Establishing Baselines And Thresholds
- Appropriately Allocate Physical Host Resources-Part 1
- Appropriately Allocate Physical Host Resources-Part 2
- Appropriately Allocate Virtual Guest Resources-Part 1
- Appropriately Allocate Virtual Guest Resources-Part 2
- Use Appropriate Tools For Remote Access
Module 5
- Security-Part 1
- Security-Part 2
- Storage Security Concepts And Methods
- Different Encryption Technologies
- Identify Access Control Methods
Module 6
- Systems Management-Part 1
- Systems Management-Part 2
- Diagnose Remediate And Optimize-Part 1
- Diagnose Remediate And Optimize-Part 2
- Common Performance Concepts-Part 1
- Common Performance Concepts-Part 2
- Testing Techniques
Module 7
- Business Continuity In Cloud-Part 1
- Business Continuity In Cloud-Part 2
- Solutions To Meet Availability Requirements
- Conclusion
Cloud Computing Security Knowledge (CCSK) Course Content
Module 1: Architecture
- Cloud Security Overview-Part1
- Cloud Security Overview-Part2
- Cloud Diagrams
- Cloud Services
Module 2: Governance and Enterprise Risk
- Risk Management
- Corporate Governance
- Enterprise Risk Management
- Risk Management Balance Process Supply Chain Security
- ERM Incidents Recommendations-Part1
- ERM Incidents Recommendations-Part2
- ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
- Cloud Legal Issues-Part1
- Cloud Legal Issues-Part2
- Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
- Audits
- Compliance And Audit
- Audit Recommendations
- Audit Requirements
Module 5: Information Management and Data Security
- Information And Security
- Storage
- Information Governance Classification
- Data Security
- Protecting Data Moving
- Client Database Encryption
- PaaS Encryption
Module 6: Interoperability and Portability
- Interoperability And Portability
- Interoperability Recommendations
- Portability Recommendations
- Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
- Business Continuity And Disaster Recovery
- Assessing CSP Security
- Equipment Maintenance
- Recommendations
Module 8: Data Center Operations
- Data Center Operations
Module 9: Incident Response
- Incident Response
- Testing
- IaaS
- C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
- Application Security
- Security Testing
- Audit Compliance
- Security Assurance Recommendations
Module 11: Encryption and Key Management
- Encryption And Key Management
- Content Aware Encryption
- Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
- Building Access Control
- Intro To Identity
- Entitlement Process
- Trust With Identity
- Recommendations For Identity Management
Module 13: Virtualization
- Virtualization
- Hypervisor And Virtual Machine
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
- Security As A Service
- Security Offerings
- Intrusion Detection Prevention
- Business Continuity And Disaster Recovery
- European CCSK
- Top Security Benefits
- European Legal Based Issues
CompTIA Cloud Overview Course Content
Domain 1 - Characteristics of Cloud Services from a Business Perspect
- Overview
- History
- The Three Delivery Model Architecture
- SaaS
- Justification For Cloud
- Confidentiality And Availability
- Concepts From NIST
- On Demand Self-Service
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
Domain 2 - Cloud Computing and Business Value
- Reasons For Cloud-Agility-Part1
- Reasons For Cloud-Agility-Part2
- New Business Opportunities
Domain 3 - Technical Perspectives/Cloud Types
- Technical Perspectives Cloud Types
- Sources
- Security Risk
- Technical Risk And Solutions
Domain 4 - Steps to Successful Adoption of Cloud
- Steps To Adopting Cloud-Part1
- Steps To Adopting Cloud-Part2
- Steps To Adopting Cloud-Part3
Domain 5 - Impact and Changes of Cloud Computing on IT Service Management
- Information Security Management System-Part1
- Information Security Management System-Part2
Domain 6 - Risks and Consequences of Cloud Computing
- Information Management And Security-Part1
- Information Management And Security-Part2
- The Data Security LifeCycle
- Governance
- Data Loss Prevention-Part1
- Data Loss Prevention-Part2
- Protecting Data
- Risk Management-Part1
- Risk Management-Part2
- Risk Management-Part3
- Risk Management-Part4
- Risk Management-Part5
- Recommendations-Part1
- Recommendations-Part2
- IT Governance
- Audit
- Recommendations For Audit-Part1
- Recommendations For Audit-Part2
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
EXIN Cloud Computing Course Content
Module 1: The principles of CC
- EXIN Overview-Part 1
- EXIN Overview-Part 2
- EXIN Overview 2-Part 1
- EXIN Overview 2-Part 2
- The Basics
- History Of Cloud
- Delivery Model Architectures
- Software As A Service
- Justification For Cloud Computing
- Confidentiality And Availability
- Concepts From NIST
- Important Characteristics
- Broad Network Access
- Resource Pooling
- Measured Service
- Service Models
- Terms Of Service
- Recommendations
- Virtualization
- Virtualization Concepts
- Inter-Virtual Machine Attacks
- Virtual Machine Encryption
- Recommendations
- Service Models
- Business Process
- Outsourcing
- Software As A Service-Part 1
- Software As A Service-Part 2
- Risks And Recommendations
- Platform As A Service
- PaaS Considerations
- PaaS Issues
- Infrastructure As A Service
- Scope Of Control
- IaaS Benefits
- IaaS Issues And Concerns
- IaaS Recommendations
- Services Oriented Architecture
- Web Services
- Infrastructure On Demand
- Why Cloud
- Collaborative Working
- New Business Opportunities
Module 2: Implementing and Managing CC
- Implementing And Managing Cloud Computing
Module 3: Using the Cloud
- Relevent Technologies In Cloud
- Storage Devices-Part 1
- Storage Devices-Part 2
- Application Programming Interfaces
- Traditional Software Model
- Impact Of Cloud On Users
- Providing Cloud Services
- Developing Added Services-Part 1
- Developing Added Services-Part 2
- Using Cloud Services
Module 4: Security and Compliance
- Threats And Controls
- Malicious Insiders
- Insiders Remediation
Module 5: Evaluation of CC
- Why Cloud
- Resource Scaling
- Quality
- Thin Clients
- Buying Cloud Services
- Pay As You Go Vs Ownership
- Establishing Requirements
- Contract Terms
5 star | 82 | 82% |
4 star | 17 | 17% |
3 star | 1 | 1% |
2 star | 0% | |
1 star | 0% |
Sorry, no reviews match your current selections
Your Training Instructors
Tom has years of experience building software for health insurance providers, medical providers, retail businesses, manufacturing, and both federal and state governments. His experience includes roles as software designer, developer and data analyst for Blue Cross Blue Shield of GA, Federated Stores (now Macy's), Tull Metals, Hughston Orthopaedic Clinc, and Director of IT for Health Images Inc. More recently he developed cash management software for the USDA Forest Service and Bureau of Land Management.
Tom enjoys teaching. He continues to help students and fellow employees learn the latest technologies to further their careers. Tom has been a Microsoft Certified Trainer since 1996 and has instructed thousands of students worldwide. He teaches courses related to application design, coding, security, database administration and cloud services.
David has been a professional IT instructor for the past four years for the US Army. He teaches a broad range of certification courses ranging from CompTIA, Microsoft to Cisco and EC-Council. Prior to working with the US Army, David worked as a Jr. Network Admin and Web Services Manager with KCTCS in Kentucky. He performed multiple jobs being on the IT team. Additionally, David taught part-time during the evening at the college, where he instructed on Active Directory, Introduction to Computers, and Networking. David has 18 years of IT experience, 17 professional IT certifications, and 8 years of teaching experience.
Subscribe To All-Access
Lock In $16.99 / Month Forever
Access this course and over 2,700 hours of focused IT training. Start your first month for only $1.00. Then lock in only $16.99 / month for life.
- Get Every Course
- Free Updates / New Content Added
- 2,700+ Hours of Training
- Price Lock Guarantee
- Games / Flashcards
- 21,000+ Practice Questions
$49.99 $16.99 Monthly
$49.00
good
Smooth delivery and easy access to LMS. Good to see that the LMS offers progress tracking. Would be great if badges were offered on completion of courses to share via Credly to future employers.