IT Pro Training Bundle - ITU Online IT Training
Ready to start learning? Individual Plans →Team Plans →
[ Course ]

IT Pro Training Bundle

41 Hrs 47 Min283 Videos349 QuestionsCertificate of CompletionClosed Captions

IT Pro Training Bundle



This ITU Bundle includes training for 5 of the most valuable certifications on the market. You will have access to 3 Cloud courses(CCSK, EXIN and Cloud+), Mobility+, and CAPM. In today’s industry, having a well rounded skill-set is imperative to securing a high paying position. This training bundle will give you skills in the Cloud sector, mobile devices and also project management. Positions in all 3 of these arenas represent some of the most lucrative positions in the IT industry. This bundle includes over 100 hours of award winning training including instructor led lectures, visual demonstrations, multi-media presentations, flash cards, test simulations, educational games and one-on-one support.

Module 1: Overview
  • Overview Part 1
  • Overview Part 2
  • Overview Part 3
  • Introduction
Module 2: Organizational Influences and Project Life Cycle
  • Organizational Structures And ProcessPart1
  • Organizational Structures And ProcessPart2
Module 3: Project Management Process
  • Project Management Process-Part1
  • Project Management Process-Part2
  • Project Management Process Questions
Module 4: Project Integration Management
  • Project Integration Management-Part1
  • Project Integration Management-Part2
  • Project Integration Management-Part3
  • Project Integration Management Questions
Module 5: Project Scope Management
  • Project Scope Management
  • Define Scope
  • Create WBS
  • Validate Scope
  • Project Scope Management Questions
Module 6: Project Time Management
  • Project Time Management-Part1
  • Project Time Management-Part2
  • Project Time Management-Part3
  • Project Time Management-Part4
  • Project Time Management-Part5
  • Develop Schedule-Part1
  • Develop Schedule-Part2
  • Develop Schedule-Part3
  • Develop Schedule-Part4
  • Develop Schedule-Part5
  • Develop Schedule Questions
Module 7: Project Cost Management
  • Project Cost Management-Part1
  • Project Cost Management-Part2
  • Project Cost Management-Part3
  • Project Cost Management-Part4
  • Project Cost Management-Part5
  • Project Cost Management Questions
Module 8: Project Quality Management
  • ProjectQualityManagementPart1
  • ProjectQualityManagementPart2
  • ProjectQualityManagementPart3
  • ProjectQualityManagementPart4
  • ProjectQualityManagementQuestions
Module 9: Project Human Resource Management
  • Project Human Resource Management-Part1
  • Project Human Resource Management-Part2
  • Project Human Resource Management-Part3
  • Project Human Resource Management Questions
Module 10: Project Communications Management
  • Project Communications Management-Part1
  • Project Communications Management-Part2
  • Project Communications Management Questions
Module 11: Project Risk Management
  • Project Risk Management Part 1
  • Project Risk Management Part 2
  • Project Risk Management Part 3
  • Project Risk Management Part 4
  • Project Risk Management Part 5
  • Project Risk Management Part 6
  • Project Risk Management Part 7
  • Project Risk Management Questions
Module 12: Project Procurement Management
  • Project Procurement Management-Part1
  • Project Procurement Management-Part2
  • Project Procurement Management-Part3
  • Project Procurement Management-Part4
  • Project Procurement Management-Part5
Module 13: Project Stakeholder Management
  • Project Stakeholder Management-Part1
  • Project Stakeholder Management-Part2
  • Project Stakeholder Management Questions
Module 14: Professional Responsibility
  • Professional Responsibility
Module 15: Preparing For Exam
  • Preparing For Exam
  • Outro
Module 1: Over-The-Air Technologies
  • Introduction
  • Over-The-Air-Technologies
  • Wireless Technologies-Part 1
  • Wireless Technologies-Part 2
  • Radio Frequency
  • RF Power Fun
  • Antennas
  • Issues With RF
  • NON Wireless
  • Governing Bodies And Regulations
Module 2: Network Infrastructure
  • Network Foundations-Part 1
  • Network Foundations-Part 2
  • Network Foundations-Part 3
  • Network Foundations-Part 4
  • OSI Model Review
  • Wireless Terms And Terminology-Part 1
  • Wireless Terms And Terminology-Part 2
  • Wireless Media And Communication
  • Unified Wireless Architecture
  • SSIDs And VLANs
Module 3: Mobile Device Manager
  • Mobile Device Management-Part 1
  • Profiles And Polices-Part 1
  • Profiles And Polices-Part 2
  • Enterprise Mail And Messaging
  • Wireless Site Survey-Part 1
  • Wireless Site Survey-Part 2
  • Wireless Site Survey-Part 3
  • Wireless Site Survey-Part 4
  • Wireless Device Management-Part 1
  • Wireless Device Management-Part 2
Module 4: Security
  • Mobile Device Security
  • Network Security 101
  • Security Protocols-Part 1
  • Security Protocols-Part 2
  • Security Protocols-Part 3
  • EAP Overview
  • Encryption Overview-Part 1
  • Encryption Overview-Part 2
  • Common Security Troubleshooting
  • Wireless Risks-Part 1
  • Wireless Risks-Part 2
  • Other Risks
Module 5: Troubleshooting
  • Wireless Troubleshooting-Part 1
  • Wireless Troubleshooting-Part 2
  • Wireless Troubleshooting-Part 3
  • Conclusion
Module 1: Architecture
  • Cloud Security Overview-Part1
  • Cloud Security Overview-Part2
  • Cloud Diagrams
  • Cloud Services
Module 2: Governance and Enterprise Risk
  • Risk Management
  • Corporate Governance
  • Enterprise Risk Management
  • Risk Management Balance Process Supply Chain Security
  • ERM Incidents Recommendations-Part1
  • ERM Incidents Recommendations-Part2
  • ERM Incidents Recommendations-Part3
Module 3: Legal Issues- Contracts and Electronic
  • Cloud Legal Issues-Part1
  • Cloud Legal Issues-Part2
  • Cloud Legal Issues-Part3
Module 4: Compliance and Audit Management
  • Audits
  • Compliance And Audit
  • Audit Recommendations
  • Audit Requirements
Module 5: Information Management and Data Security
  • Information And Security
  • Storage
  • Information Governance Classification
  • Data Security
  • Protecting Data Moving
  • Client Database Encryption
  • PaaS Encryption
Module 6: Interoperability and Portability
  • Interoperability And Portability
  • Interoperability Recommendations
  • Portability Recommendations
  • Recommendations SAAS
Module 7: Traditional Security, Business Continuity, and Disaster Recovery
  • Business Continuity And Disaster Recovery
  • Assessing CSP Security
  • Equipment Maintenance
  • Recommendations
Module 8: Data Center Operations
  • Data Center Operations
Module 9: Incident Response
  • Incident Response
  • Testing
  • IaaS
  • C.E.R.- Containment, Eradication, And Recovery
Module 10: Application Security
  • Application Security
  • Security Testing
  • Audit Compliance
  • Security Assurance Recommendations
Module 11: Encryption and Key Management
  • Encryption And Key Management
  • Content Aware Encryption
  • Storage Of Keys
Module 12: Identity, Entitlement, and Access Management
  • Building Access Control
  • Intro To Identity
  • Entitlement Process
  • Trust With Identity
  • Recommendations For Identity Management
Module 13: Virtualization
  • Virtualization
  • Hypervisor And Virtual Machine
  • Inter-Virtual Machine Attacks
  • Virtual Machine Encryption
  • Virtual Machine Recommendations And Requirements
Module 14: Security as a Service
  • Security As A Service
  • Security Offerings
  • Intrusion Detection Prevention
  • Business Continuity And Disaster Recovery
  • European CCSK
  • Top Security Benefits
  • European Legal Based Issues
Domain 1 – Characteristics of Cloud Services from a Business Perspect
  • Overview
  • History
  • The Three Delivery Model Architecture
  • SaaS
  • Justification For Cloud
  • Confidentiality And Availability
  • Concepts From NIST
  • On Demand Self-Service
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations
Domain 2 – Cloud Computing and Business Value
  • Reasons For Cloud-Agility-Part1
  • Reasons For Cloud-Agility-Part2
  • New Business Opportunities
Domain 3 – Technical Perspectives/Cloud Types
  • Technical Perspectives Cloud Types
  • Sources
  • Security Risk
  • Technical Risk And Solutions
Domain 4 – Steps to Successful Adoption of Cloud
  • Steps To Adopting Cloud-Part1
  • Steps To Adopting Cloud-Part2
  • Steps To Adopting Cloud-Part3
Domain 5 – Impact and Changes of Cloud Computing on IT Service Management
  • Information Security Management System-Part1
  • Information Security Management System-Part2
Domain 6 – Risks and Consequences of Cloud Computing
  • Information Management And Security-Part1
  • Information Management And Security-Part2
  • The Data Security LifeCycle
  • Governance
  • Data Loss Prevention-Part1
  • Data Loss Prevention-Part2
  • Protecting Data
  • Risk Management-Part1
  • Risk Management-Part2
  • Risk Management-Part3
  • Risk Management-Part4
  • Risk Management-Part5
  • Recommendations-Part1
  • Recommendations-Part2
  • IT Governance
  • Audit
  • Recommendations For Audit-Part1
  • Recommendations For Audit-Part2
Module 1: The principles of CC
  • EXIN Overview-Part 1
  • EXIN Overview-Part 2
  • EXIN Overview 2-Part 1
  • EXIN Overview 2-Part 2
  • The Basics
  • History Of Cloud
  • Delivery Model Architectures
  • Software As A Service
  • Justification For Cloud Computing
  • Confidentiality And Availability
  • Concepts From NIST
  • Important Characteristics
  • Broad Network Access
  • Resource Pooling
  • Measured Service
  • Service Models
  • Terms Of Service
  • Recommendations
  • Virtualization
  • Virtualization Concepts
  • Inter-Virtual Machine Attacks
  • Virtual Machine Encryption
  • Recommendations
  • Service Models
  • Business Process
  • Outsourcing
  • Software As A Service-Part 1
  • Software As A Service-Part 2
  • Risks And Recommendations
  • Platform As A Service
  • PaaS Considerations
  • PaaS Issues
  • Infrastructure As A Service
  • Scope Of Control
  • IaaS Benefits
  • IaaS Issues And Concerns
  • IaaS Recommendations
  • Services Oriented Architecture
  • Web Services
  • Infrastructure On Demand
  • Why Cloud
  • Collaborative Working
  • New Business Opportunities
Module 2: Implementing and Managing CC
  • Implementing And Managing Cloud Computing
Module 3: Using the Cloud
  • Relevent Technologies In Cloud
  • Storage Devices-Part 1
  • Storage Devices-Part 2
  • Application Programming Interfaces
  • Traditional Software Model
  • Impact Of Cloud On Users
  • Providing Cloud Services
  • Developing Added Services-Part 1
  • Developing Added Services-Part 2
  • Using Cloud Services
Module 4: Security and Compliance
  • Threats And Controls
  • Malicious Insiders
  • Insiders Remediation
Module 5: Evaluation of CC
  • Why Cloud
  • Resource Scaling
  • Quality
  • Thin Clients
  • Buying Cloud Services
  • Pay As You Go Vs Ownership
  • Establishing Requirements
  • Contract Terms

This course is included in all of our team and individual training plans. Choose the option that works best for you.

[ Team Training ]

Enroll My Team.

Give your entire team access to this course and our full training library. Includes team dashboards, progress tracking, and group management.

Get Team Pricing

[ Individual Plans ]

Choose a Plan.

Get unlimited access to this course and our entire library with a monthly, quarterly, annual, or lifetime plan.

View Individual Plans

Ready to start learning? Individual Plans →Team Plans →