ONLY VIDEO BASE TRAINING (TALK SHOWS)
4000 Hrs + video based IT & Project Management Certification Courses
Select a Course Series title below to begin your training. To help you navigate, search or select a section to jump to your desired training below
CompTIA
- OPERATING SYSTEMS
Overview
Computer Operating Systems
Microsoft Windows
Apple MacOS
GNU Linux
SOFTWARE AND APPLICATIONS
Software Usage Requirements
Business And Productivity Software
Business And Productivity Software Part 2
Collaboration Software
Web Browser Settings
Web Browser Settings Part 2
SOFTWARE DEVELOPMENT
Programming Concepts
Programming Concepts Part 2
Developing With Python
COMPUTER HARDWARE
Central Processing Unit (CPU)
Common Hardware
Common Hardware Part 2
Peripheral Devices
Peripheral Devices Part 2
Display Hardware
Storage Hardware
NETWORKING
Basic Networking Concepts
Basic Networking Concepts Part 2
Configuring A Wireless Router
Configuring A Wireless Router Part 2
Connection And Service Types
Connection And Service Types Part 2
DATABASES
Database Concepts
Querying A Database
Table Design
SECURITY
Basic Security Principles
Basic Security Principles Part 2
Security Best Practices
Security Best Practices Part 2
Security Best Practices Part 3
TROUBLESHOOTING
Troubleshooting Methodology
Troubleshooting Methodology Part 2
Troubleshooting Example
- STORAGE
Overview
Introduction To Storage
Magnetic Storage: Characteristics
Magnetic Storage: Standards
Magnetic Storage: Performance
Determining Magnetic Storage
Electrical Storage – Characteristics
Electrical Storage – Standards
Determining Electrical Storage
Optical Storage – Characteristics
Optical Storage – Standards
Determining Optical Storage
Installing Storage Devices
Configuring Storage
Optimizing Storage
Troubleshooting Storage
MOTHERBOARDS
Motherboard Form Factors
Motherboard Connections
Motherboard BIOS-UEFI Settings
Troubleshooting Memory
COOLING AND POWER
Cooling Systems
Power Supply Units
Troubleshooting Cooling And Power Issues
MEMORY
CPUS
CPUs – Features And Characteristics
CPUs – Sockets And Types
DISPLAY DEVICES
Display Devices – Display Types
Display Devices – Cables And Connections
Display Devices – Features
Troubleshooting Display Devices
EXPANSION CARDS
Expansion Cards
COMPUTER CASES
Computer Cases
CUSTOM PCS
Custom PCs
PERIPHERALS
Peripherals
LAPTOPS AND MOBILE DEVICES
Laptop Hardware And Features
Troubleshooting Laptop Issues
Mobile Devices – Types, Accessories And Ports
Mobile Devices – Connectivity And App Support
Mobiles Devices – Syncronization
PRINTERS
Printers: Print Processes And Maintenance
Troubleshooting Printers
VIRTUALIZATION & CLOUD
Virtualization: Basics
Virtualization: Requirements
Cloud Computing: Models
Cloud Computing: Features
NETWORKING
Network Services – Ports And Protocols
Network Devices
Wireless Standards
Internet Connections
Network Types
Network Tools
- NETWORKING CONCEPTS
Overview
Ports And Protocols
Ports And Protocols Part 2
OSI Model
OSI Model Part 2
Network Traffic Properties
Network Traffic Properties Part 2
Switching Technologies
Routing Technologies
Routing Technologies Part 2
Network Performance Concepts
IP Addressing
IP Addressing Part 2
IP Addressing Part 3
IP Addressing Part 4
Classless IPv4 Addressing
Classless IPv4 Addressing Part 2
Classless IPv4 Addressing Part 3
Classless IPv4 Addressing Part 4
IP Address Assignments
IPv6 Addressing
IPv6 Addressing Part 2
Network Topologies
Network Topologies Part 2
Wireless Technologies
Cloud Concepts
Network Service Functions
Network Service Functions Part 2
Network Service Functions Part 3
TCP/IP Model
TCP/IP Model Part 2
INFRASTRUCTURE
Cabling Solutions-Copper
Cabling Solutions-Copper Part 2
Cabling Solutions-Copper Part 3
Cabling Solutions-Fiber
Cabling Solutions-Fiber Part 2
Network Devices
Advanced Networking Devices
Advanced Networking Devices Part 2
Virtualization And Network Storage
Virtualization And Network Storage Part 2
WAN Technologies
WAN Technologies Part 2
WAN Technologies Part 3
NETWORK OPERATIONS
Network Diagrams And Documentation
Business Continuity And Disaster Recovery
Business Continuity And Disaster Recovery Part 2
Scanning, Monitoring And Patching
Remote Access Methods
Remote Access Methods Part 2
Remote Access Methods Part 3
Policies And Best Practices
Policies And Best Practices Part 2
NETWORK SECURITY
Physical Security Devices
Authentication And Access Control
Authentication And Access Control Part 2
Basic Wireless Network Security
Common Networking Attacks
Common Networking Attacks Part 2
Network Device Hardening
Network Device Hardening Part 2
Common Mitigation Techniques
Common Mitigation Techniques Part 2
Common Mitigation Techniques Part 3
NETWORK TROUBLESHOOTING AND TOOLS
Network Troubleshooting Method
Network Troubleshooting Tools
Network Troubleshooting Tools Part 2
Network Troubleshooting Tools Part 3
Network Troubleshooting Tools Part 4
Network Troubleshooting Tools Part 5
Common Wired Network Issues
Common Wireless Network Issues
Common Network Service Issues
Common Network Service Issues Part 2
Common Network Service Issues Part 3
SUBNETTING
Subnetting Step-By-Step
Subnetting Step-By-Step Part 2
Subnetting Step-By-Step Part 3
Subnetting Step-By-Step Part 4
Subnetting Step-By-Step Part 5
Subnetting Step-By-Step Part 6
Subnetting Step-By-Step Part 7
Subnetting Step-By-Step Part 8
Subnetting Step-By-Step Part 9
Subnetting Step-By-Step Part 10
- NETWORKING CONCEPTS
Overview
Ports And Protocols
OSI Model
Network Traffic Properties
Switching Technologies
Routing Technologies
Network Performance Concepts
IPv4 Addressing
IP Addressing Assignments
IPv6 Addressing
Network Topologies
Wireless Technologies
Cloud Concepts
Network Service Functions
TCP/IP Model
INFRASTRUCTURE
Cabling Solutions – Copper
Cabling Solutions – Fiber
Network Devices
Virtualization And Network Storage
WAN Technologies
NETWORK OPERATIONS
Network Diagrams And Documents
Business Continuity And Disaster Recovery
Policies And Best Practices
Scanning, Monitoring And Patching
Remote Access Methods
NETWORK SECURITY
Physical Security Devices
Authentication And Access Control
Basic Wireless Network Security
Common Network Attacks
Network Device Hardening
Common Mitigation Techniques
NETWORK TROUBLESHOOTING AND TOOLS
Network Troubleshooting Method
Network Troubleshooting Tools
Network Troubleshooting Tools Part 2
Common Network Issues
Common Network Service Issues
Common Network Service Issues Part 2
- THREATS, ATTACKS AND VULNERABILITIES
Overview
Determining Types Of Malware
Determining Types Of Malware Part 2
Types Of Attacks
Types Of Attacks Part 2
Types Of Attacks Part 3
Types Of Attacks Part 4
Threat Vector Types And Attributes
Penetration Testing Concepts
Vulnerability Scanning Concepts
Impact Of Various Vulnerabilities
Impact Of Various Vulnerabilities Part 2
TECHNOLOGIES AND TOOLS
Hardware Software Organizational Security
Hardware Software Organizational Security Part 2
Hardware Software Organizational Security Part 3
Hardware Software Organizational Security Part 4
Security Posture Assessment
Security Posture Assessment Part 2
Security Posture Assessment Part 3
Security Posture Assessment Part 4
Troubleshoot Common Security Issues
Troubleshoot Common Security Issues Part 2
Analyze And Interpret Outputs
Analyze And Interpret Outputs Part 2
Deploy Mobile Security
Implement Secure Protocols
ARCHITECTURE AND DESIGN
Best Practices And Secure Config Guides
Secure Network Architecture Concepts
Secure System Design
Secure Staging Deployment Concepts
Security Implications Of Embedded Systems
Secure App Development And Deployment
Cloud And Virtualization Concepts
Cloud And Virtalization Concepts Part 2
Resiliency And Automation To Reduce Risk
Importance Of Physical Security
Importance Of Physical Security Part 2
IDENTITY AND ACCESS MANAGEMENT
Identity And Access Management Concepts
Identity And Access Services
Identity And Access Management Controls
Identity And Access Management Controls Part 2
Account Management Practices
Account Management Practices Part 2
RISK MANAGEMENT
Policies, Plans And Procedures
Impact Business Analysis
Risk Management Processes And Concepts
Incident Response Procedures
Basic Concepts Of Forensics
Disaster Recovery And Business Continuity
Disaster Recovery And Business Continuity Part 2
Data Security And Privacy
CRYPTOGRAPHY AND PKI
Basic Concepts Of Cryptography
Basic Concepts Of Cryptography Part 2
Cryptography Algorithms Basics
Cryptography Algorithms Basics Part 2
Cryptography Algorithms Basics Part 3
Wireless Security
Public Key Infrastructure
Public Key Infrastructure Part 2
Public Key Infrastructure Part 3
Public Key Infrastructure Part 4
- THREATS, ATTACKS AND VULERABILITIES
Overview
Determining Types Of Malware
Vulnerability Scanning And Pen Testing
Impact Of Various Vulnerabilities
TECHNOLOGIES AND TOOLS
Supporting Organizational Security
Supporting Organizational Security Part 2
Security Posture Assessment
Deploy Mobile Security
Implement Secure Protocols
ARCHITECTURE AND DESIGN
Best Practices, Guides And Configuration
Secure Network Architecture Concepts
App Development And Deployment
Cloud And Virtualization Concepts
IDENTITY AND ACCESS MANAGEMENT
Identity And Access Services
IAM Controls
Account Management Practices
RISK MANANGEMENT
Policies, Plans And Procedures
Risk Management Processes And BIA
IRP And Basic Forensics
Disaster Recovery And Business Continuity
Data Security And Privacy Practices
CRYPTOGRAPHY AND PKI
Cryptography Algorithms Basics
Wireless Security
Public Key Infrastructure
- SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT
Overview
So You Want To Setup A Lab
Begin At The Beginning – Confidentiality
Begin At The Beginning – Integrity
Begin At The Beginning – Availability
Governance And Risk Management: Overview
Governance And Risk Management: Risk Vocabulary
Governance And Risk Management: Risk Management
Governance And Risk Management: Risk Analysis
Assess Risks: What Is A Security Framework
Assess Risks: ESA Framework Assessment Process
Assess Risks: System Specific Risk Analysis
Assess Risks: Risk Determination
Assess Risks: Guidelines For Assessing Risk
Risk Mitigation: What Is A Aggregate CIA Score
Risk Mitigation: What Are The CVSS And CVE
Risk Mitigation: Risk Responses
Risk Management Documentation: Best Practices
Risk Management Documentation: BCP
Risk Management Documentation: What Is A BIA
Risk Management Documentation: Downtime
Risk Management Documentation: Documents
I.T. Governance And Risk Management – Key Points
LEVERAGING COLLABORATION TO SUPPORT SECURITY
Collaboration: GRC And Controls
Collaboration: What Is An SCA
Collaboration: Solutions
Leveraging Collaboration – Key Points
USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE
Research And Analysis: Industry Trends
Research And Analysis: Artificial Intelligence
Research And Analysis: Requirements For Contracts
Analyze Scenarios To Secure The Enterprise
Using Research And Analysis – Key Points
INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES
Authentication And Access Control
Authentication Factors And Controls
Authentication Types
Centralized Remote Authentication Services
Deep Dive: RADIUS
Deep Dive: 802.1X
What Is Authorization/OAuth2.0
What Is XACML
Trusts Models And Kerberos
Trust Models And Kerberos Part 2
Directory Services And LDAP
Hands On: Establishing Peer Trusts
Authentication And Authorization Review Questions
Advanced Identity Concepts And Vocabulary
Identity Federation Methods
Advanced Identity Review Questions
Authentication And Authorization: Key Points
IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
Encryption
Hashing
Digital Signatures
Blockchain And Bitcoin
Hands On: Configuring A Blockchain
Public Key Infrastructure PKI – Design
Public Key Infrastructure PKI – Concepts
Cryptography Concepts
Stream Vs. Block Ciphers
Implement Cryptography
Implementing Cryptographic Techniques – Key Points
IMPLEMENTING SECURITY CONTROLS FOR HOSTS
Host Concepts And Vocabulary
Product Evaluation Models – TCSEC
Product Evaluation Models – ITSEC
Product Evaluation Models – Common Criteria
What Is A Trusted OS
Types Of Security Models
Bell-LaPadula
Biba
Clark-Wilson And Others
Access Control Concepts
Role-Based Access Control (RBAC)
Other Access Control Models
Endpoint Security
Host Review Questions
Hardening Hosts Concepts And Vocabulary
Peripherals
Full Disk Encryption
Hands-On: Hardening Windows Hosts, AppLocker
Virtualization Concepts And Vocabulary
Common VM Vulnerabilities
Hands-On: Creating Securing VM Using Virtualbox
Boot Loader Concepts And Vocabulary
Hands-On: Protecting Boot Loaders
Implementing Security Controls Hosts Key Points
SECURITY CONTROLS FOR MOBILE DEVICES
Mobile Deployment Models
MDM Concepts And Vocabulary
MDM Concepts And Vocabulary Part 2
Storage
Concepts And Vocabulary
Concepts And Vocabulary Part 2
Security Controls For Mobile Devices – Key Points
IMPLEMENTING NETWORK SECURITY
IDSs Vs IPSs Casp
What Is A SIEM System
Network Security Concepts And Vocabulary
Hands-On Deploy Network Security Platform OPNsense
SoC, BASs, ICS And SCADA
Network-Enabled Devices Review Questions
Remote Access And IPv6
Network Authentication
Network Topologies And SDN
Optimizing Resource Placement
Advanced Network Design Review Questions
Network Security Controls Concepts Vocabulary
VLANS And Network Data Flow
DPI And HTTPS Inspection
Network Device Configurations
NAC And Alerting
Hands On: Implementing Network Monitoring Ntopng
Implementing Network Security – Key Points
IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE
What Is The Systems Development Life Cycle SDLC
Development Methodologies
What Are The SDLC Phases
Security Requirements Traceability Matrix SRTM
Common Software Development Approaches
Common Software Development Methods
What About Validation And Acceptance Testing
SDLC Review Questions
Secure Vs Insecure Direct Object References
Error Exception Handling Try…Catch Statements
What Is Privilege Escalation
Overflows And Canaries
Memory Leaks
Races And Exhaustion
What Is SQL Injection
What Is Session…
What Is A Cross-Site Scripting XSS Attack
Cross-Site Request Forgery XSRF/CSRF Attack
What About Clickjacking And Cookie Hijacking
What Is Security By…
Input Validation Fuzzing Application Sandboxing
WS-Security DAM And Software Assurance Tech
Implementing Security In The SDLC – Key Points
INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE
Integrate Best Practices In Enterprise Security
Technical Deployment Models: What Is A Model
Technical Deployment Models: What Is Cloud
Cloud Security Services In The Enterprise
Secure Design: Vocabulary And Concepts
Secure Design: Vocabulary And Concepts Part 2
Secure Design: Review Questions
Data Security: Owners, Processors And Sovereignty
Data Security: Data Flow Security
Data Security: Data Remanence
Data Security: Provisioning And Deprovisioning
Data Security: Review Questions
Enterprise Applications: What Are They
Enterprise Applications: Directory Svcs, DNS
Enterprise Applications: Directory Svsc, DNS Pt.2
Enterprise Applications: Hands On With DNS RRs
DNSSEC, Zone Transfers And TSIGs
DNSSEC, Zone Transfers And TSIG Part 2
DNSSEC, Zone Transfers And TSIG Part 3
Hands On With DNSSEC
Enterprise Applications: Configuration Management
Enterprise Applications: Review Questions
Integrating Assets – Key Points
CONDUCTING SECURITY ASSESSMENTS
Security Assessments: Types
Security Assessments: Application Code Review
Going Deeper: Vulnerability Scanning
Going Deeper: Testing Software
Software Testing Types
Software Testing Types Part 2
Logs, Memory And Debugging
Social Engineering
OSINT, Self-Assessments And Teaming
Security Assessments – Review Questions
Vulnerability Scanner (Nikto)
Port Scanner (Zenmap)
Protocol Analyzer (Wireshark)
Network Enumerator (Zenmap)
Password Cracker (John The Ripper)
Using A Fuzzer In Kali Linux
HTTP Interceptor (Burp Suite)
Exploitation Framework (Social-Engineer Toolkit)
Log Analysis In Kali (Grep And Cut)
OpenSCAP
Reverse Engineering (Strace)
Conducting Security Assessments – Key Points
RESPONDING TO AND RECOVERING FROM INCIDENTS
Concepts And Vocabulary
Incident Response Facilitators
Incident Response Facilitators Part 2
E-Discovery
Incident Response Review Questions
What Is COOP
CSIRTs And Common Tools
Evidence Collection And Handling
Types Of Evidence
Five Rules Of Evidence 5 B’s
Principles Of Criminalistics
Investigation Process
Forensic Analysis Of Compromised Systems
What Is The Order Of Volatility
Conducting Forensic Analysis With Autopsy
Responding To Incidents – Key Points
- THREAT MANAGEMENT
Overview
Reconnaissance: Tools
Reconnaissance: Tools Part 2
Reconnaissance: Tools Part 3
Reconnaissance: Tools Part 4
Reconnaissance: Techniques
Reconnaissance: Techniques Part 2
Reconnaissance: Techniques Part 3
Reconnaissance: Techniques Part 4
Data Correlation And Analytics
Reconnaissance: Interpreting Results
Countermeasures: Network Segmentation
Countermeasures: Honeypots And Sinkholes
Countermeasures: System Hardening And NAC
Security Practices: Penetration Testing
Security Practices: Reverse Engineering
Security Practices: Training And Risk Evaluation
VULNERABILITY MANAGEMENT
Vulnerability Management Process
Vulnerability Management: Scan Configuration
Vulnerability Management CVSS
Vulnerability Management: CVSS Part 2
Vulnerability Management: Remediation
Scan Results Verification
Common Vulnerabilities
Common Vulnerabilities Part 2
Common Vulnerabilities Part 3
Common Vulnerabilities Part 4
Common Vulnerabilities Part 5
CYBER INCIDENT RESPONSE
Threat Classification
Severity And Prioritization
Forensics Toolkit
Incident Response Plan
Forensic Suites And Utilities
Forensic Suites And Utilities Part 2
Forensic Suites And Utilities Part 3
Forensic Suites And Utilities Part 4
CSIRT Roles And Communication
Indicator Of Compromise: Network Symptoms
Indicators Of Compromise: Host And App Symptoms
Recovery And Post-Incident Response
Recovery And Post-Incident Response Part 2
SECURITY ARCHITECTURE AND TOOLSETS
Cybersecurity Frameworks
Cybersecurity Frameworks Part 2
Policies, Controls And Procedures
Policies, Controls And Procedures Part 2
Identity And Access Managemnt
Identity And Access Management Part 2
Compensating Controls And Architecture
Compensating Controls And Architecture Part 2
Compensating Controls And Architecture Part 3
Security Tools And Technologies
Security Tools And Technologies Part 2
Security Tools And Technologies Part 3
Software Development Security
Software Development Security Part 2
- PLANNING AND SCOPING
Overview
Planning An Engagement
Planning On Engagement Part 2
Planning An Engagement Part 3
Planning An Engagement Part 4
Legal Concepts
Scoping An Engagement
Scoping An Engagement Part 2
Compliance-Based Assessments
INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
Pentesting Tools: Use Cases
Pentesting Tools: Use Cases Part 2
Pentesting Tools: Scanners
Pentesting Tools: Credential Testing
Pentesting Tools: Credential Testing Part 2
Pentesting Tools: Web Directory Enum
Pentesting Tools: Debuggers
Pentesting Tools: OSINT
Pentesting Tools: Wireless
Pentesting Tools: Web Proxies
Pentesting Tools: Social Engineering
Pentesting Tools: Remote Access
Pentesting Tools: Networking
Pentesting Tools: Misc
Pentesting Tools: Mobile
Nmap
Common Pentest Objectives
Analyze Scripts: Bash
Analyze Scripts: Bash Part 2
Analyze Scripts: Bash Part 3
Analyze Scripts: Python
Analyze Scripts: Python Part 2
Analyze Scripts: Python Part 3
Analyze Scripts: Ruby
Analyze Scripts: Ruby Part 2
Analyze Scripts: PowerShell
Analyze Scripts: Powershell Part 2
ATTACKS AND EXPLOITS
Info Gathering Techniques
Info Gathering Techniques Part 2
Info Gathering Techniques Part 3
Info Gathering Techniques Part 4
Perform Vulnerability Scans
Perform Vulnerability Scans Part 2
Perform Vulnerability Scans Part 3
Perform Vulnerability Scans Part 4
Vulnerability Scan Results
Exploration Preparation
Exploration Preparation Part 2
Weaknesses In Specialized Systems
Weaknesses In Specialized Systems Part 2
PENETRATION TESTING TOOLS
Social Engineering
Social Engineering Part 2
Network Vulnerability: Name Resolution
Network Vulnerability: SNMP, SMTP And FTP
Network Vulnerability: Pass-The-Hash
Network Vulnerabilities: MITM
Network Vulnerability Denial Of Service
Network Vulnerabilities: NAC Bypass, VLAN Hopping
App Vulnerabilities Injection Attacks
App Vulnerabilities Injection Attacks Part 2
App Vulnerabilities: Injection Attacks Part 3
App Vulnerabilities: File Inclusions
App Vulnerabilities: File Inclusions Part 2
App Vulnerabilities: XSS, CSRF, Clickjacking
App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
App Vulnerabilities: Authentication, Authorization
App Vulnerabilities: Insecure Coding
App Vulnerabilities: Insecure Coding Part 2
Wireless And RF Vulnerabilities
Wireless And RF Vulnerabilities Part 2
Host-Based Vulnerabilities
Host Based Vulnerabilities Part 2
Host Based Vulnerabilites Part 3
Host-Based Vulnerabilities Part 4
Host-Based Vulnerabilities Part 5
Site Security
Site Security Part 2
Post-Exploitation
Post-Exploitation Part 2
REPORTING AND COMMUNICATION
Reports
Post Report Activities
Vulnerability Mitigation Strategies
Communication Importance
- PROJECT BASICS
Overview
Comparing PK0-003 Vs PK0-004
Explain Project Properties
Understand Roles And Responsibilities
Understand Roles And Responsibilities Part 2
Distinguish Standard Project Phases Part 1
Distinguish Standard Project Phases Part 2
Distinguish Standard Project Phases Part 3
Distinguish Standard Project Phases Part 4
Identify Cost Control Basics
Identify Team Organization Structures
Execute And Develop A Project Schedule
Execute And Develop A Project Schedule Part 2
Execute And Develop A Project Schedule Part 3
Identify Agile Methodology Basics
Identify Agile Methodology Basics Part 2
Explain Resource Management Roles
Explain Resource Management Roles Part 2
Explain Resource Management Roles Part 3
Explain Resource Management Roles Part 4
PROJECT CONSTRAINTS
Predict Impact Of Constraints And Influences
Predict Impact Of Contraints And Influences Part 2
Explain Risk Strategies And Activities
COMMUNICATION & CHANGE MANAGEMENT
Use Appropriate Communication Methods
Analyze Communication Factors
Explain Communication Triggers
Use Change Control Process
Use Change Control Process Part 2
Recognize Types Of Organizational Changes
PROJECT TOOLS & DOCUMENTATION
Compare Project Management Tools
Compare Project Management Tools Part 2
Compare Project Management Tools Part 3
Analyze Project Documentation
Identify Third Party Documents
- SERVER ARCHITECTURE
Overview
Server Form Factors
Server Components
Server Components Part 2
Power And Cooling
Power And Cooling Part 2
SERVER ADMINISTRATION
Installing A Server OS
Installing A Server OS Part 2
Installing A Server OS Part 3
Installing A Server OS Part 4
Server Roles And Requirements
Administering A Server
Server Maintenance
Server Maintenance Part 2
Server Maintenance Part 3
Server Maintenance Part 4
Asset Management And Documentation
Asset Management And Documentation Part 2
Virtualization
STORAGE
Primary Storage Devices
Configuring RAID
Configuring RAID Part 2
Storage Technologies
Storage Capacity
SECURITY
Physical Security
Server Hardening
Network Security
Network Security Part 2
Secure Storage Disposal
Logical Access Control
Logical Access Control Part 2
Environmental Controls
Environmental Controls Part 2
Environmental Controls Part 3
NETWORKING
IP Addressing And Services
IP Addressing And Services Part 2
Ports And Protocols
Cable Management
Cable Management Part 2
DISASTER RECOVERY
Disaster Recovery Principles
Backup Techniques
TROUBLESHOOTING
Troubleshooting Methodologies
Troubleshooting Hardware
Troubleshooting Software
Troubleshooting Software Part 2
Troubleshooting Software Part 3
Troubleshooting Networking
Troubleshooting Networking Part 2
Troubleshooting Networking Part 3
Troubleshooting Storage
Troubleshooting Security
Troubleshooting Security Part 2
Troubleshooting Security Part 3
- CONFIGURATION AND DEPLOYMENT
Overview
Cloud Basics: Why And What
Cloud Basics: Why And What Part 2
Cloud Basics: Why And What Part 3
Cloud Components: Interactions And Services
Cloud Components: Interactions And Services Pt.2
Cloud Deployment: Evaluate Readiness
Cloud Deployment: Automation And Orchestration
Cloud Deployment: Automation And Orchestration Pt2
Cloud Deployment: Projectization
SECURITY
Cloud Project: Deployment Workflow
Cloud Project: Deployment Workflow Part 2
Cloud Project: Post Deployment Configuration
Cloud Project: Post Deployment Configuration Pt2
Cloud Project: Manage Changes
MAINTENANCE
Cloud Readiness: Quality Assurance
Cloud Readiness: HA And LB
Cloud Readiness: Deployment Load Testing
MANAGEMENT
Cloud Security: Security Infrastructure
Cloud Security: Organizational Compliance
Cloud Security: Virtual Networking Design
Cloud Security: Virtual Networking Design Part 2
Cloud Security: Network Security Options
Cloud Security: Component Security
Cloud Security: Component Security Part 2
Cloud Security: Implement Security Technologies
TROUBLESHOOTING
Cloud Authorization: IAM Technologies
Cloud Authorization: IAM Technologies Part 2
Cloud Authorization: Account Mgmt Policies
Cloud Authorization: Access Control
Cloud Authorization: Account Provisioning
CLOUD COMPUTE
Cloud Compute: Compute CPUs
Cloud Compute: Compute Memory
Cloud Compute: Compute Storage
Cloud Compute: Compute Storage Requirements
Cloud Compute: Compute Storage Security
CLOUD MIGRATION
Cloud Migration: Deployment Types
Cloud Migration: VMs And Containers
Cloud Migration: Network, Storage And Data
CLOUD SYSTEMS
Cloud Systems: System Maintenance
Cloud Systems: System Maintenance Automation
CLOUD DATA PROTECTION
Cloud Data Protection: Backup And Restore
Cloud Data Protection: Backup And Restore Pt2
Cloud Data Protection: Disaster Recovery Plans
Cloud Data Protection: Business Continuity
CLOUD SYSTEMS ANALYSIS
Cloud Systems Analysis: Monitoring
Cloud Systems Analysis: Monitoring Part 2
Cloud Systems Analysis: Reporting
CLOUD TROUBLESHOOTING
Cloud Troubleshooting: Methodology
Cloud Troubleshooting: Methodology Part 2
Cloud Troubleshooting: Network Connectivity
Cloud Troubleshooting: Network Connectivity Part 2
Cloud Troubleshooting: Security Issues
- PERFORMING BASIC LINUX TASKS
Overview
Introduction To Linux
Linux Command Line
MANAGING USERS AND GROUPS
Super User Privileges
Managing Users
Managing Groups
MANAGING PERMISSIONS AND OWNERSHIP
Managing File Permissions
Advanced Permissions
MANAGING STORAGE
Partitioning Disks
Linux File System
Logical Volume Manager (LVM)
Filesystem Hierarchy Standard (FHS)
MANAGING FILES AND DIRECTORIES
Editing Files With Vi
Editing Files With Vi Part 2
Working With Files
Locating Files
Searching With Grep
Manipulating Text
MANAGING KERNEL MODULES
Managing Kernal Modules
MANAGING THE LINUX BOOT PROCESS
Managing The Linux Boot Process
MANAGING SYSTEM COMPONENTS
Graphical User Interfaces
Managing Services With Systemd
Managing Services With SysVinit
Troubleshooting Services
Troubleshooting Services Part 2
MANAGING DEVICES
Configuring Hardware
Supporting Printers
MANAGING NETWORKING
Understanding TCPIP
Configure Networking
Troubleshooting Network Connections
MANAGING PACKAGES AND SOFTWARE
Managing Software With Apt
Managing Software With Yum/DNF
Building From Source
SECURING LINUX SYSTEMS
Linux Security Best Practices
Linux Security Best Practices Part 2
Securing Apps With SELinux
Securing Apps With AppArmor
Filtering Traffic With Firewalld
Filtering Traffic With Iptables
Backup And Restore Data
WORKING WITH BASH SCRIPTS
Configuring Bash
Writing A Bash Script
AUTOMATING TASKS
Scheduling Tasks
Scheduling Tasks Part 2
Version Control With Git
INSTALLING LINUX
Installing CentOS
Installing CentOS Part 2
Installing Ubuntu
- GETTING STARTED WITH LINUX
Getting Started With Linux
Linux System Structure
Working With The Command Line
Understanding Shells
Constructing Commands
Command Substitution And History
Command Paths
File System Heirarchy
File Specifics
Creating Files
Managing Files
Archiving And Compressing Files
Finding Files
Managing Users And Groups
Pipes And Redirection
Working With Permissions
Special Permissions
Processing Text
Intro To Debian
Intro To RPM Package Management
Configuring Name Resolution
Editing Text
Troubleshooting And Getting Help
- COMPTIA CORE BLOCKCHAIN
Why Blockchain Matters
How We Work Today: The Internet Of Value
Business Drivers And Disrupters
Accelerating Trust: Cryptos And ICOs
Using Blockchain In Your Business: Use Cases
Blockchain And Cybersecurity
How Blockchain Works
Your Blockchain Project: DIY Tools
Seven Steps To Success
MICROSOFT
- UNDERSTANDING OPERATING SYSTEM CONFIGURATIONS
Overview
Configuring Control Panel
Configuring Control Panel Part 2
Configuring Control Panel Part 3
Configuring Control Panel Part 4
Configuring Desktop Settings
Configuring Desktop Settings Part 2
Configuring Native Applications And Tools
Configuring Mobile Settings
INSTALLING AND UPGRADING CLIENT SYSTEMS
Identify Windows OS Editions
Identify Installations And Architecture Types
MANAGING APPLICATIONS
Configuring Applications
Configuring UAC And Antivirus
Configuring UAC And Antivirus Part 2
Configuring UAC And Antivirus Part 3
MANAGING FILES AND FOLDERS
Understanding File Systems
Understanding Libraries
MANAGING DEVICES
Understanding Storage
Understanding Storage Part 2
Understanding Storage Part 3
Understanding Storage Part 4
Understanding Print Devices
Understanding And Connecting Devices
UNDERSTANDING OPERATING SYSTEM MAINTENANCE
Understanding Backup And Recovery
Understanding Backup And Recovery Part 2
Understanding Backup And Recovery Part 3
Maintenance And Management Tools
Configuring Updates
Configuring Updates Part 2
- UNDERSTANDING NETWORK INFRASTRUCTURES
Overview
Understand The OSI Networking Model
Understand The OSI Networking Model Part 2
Understand The OSI Networking Model Part 3
Understand Addressing: Binary
Understand Addressing: MAC Address
Understand Addressing: IPv4 Address
Understand Addressing: IPv6 Address
Understand Network Services
Understand TCP/IP Tools
UNDERSTANDING NETWORK HARDWARE
Understand Switches: Hardware
Understand Switches: Functionality
Understand Routers: Functionality
Understand Routers: Configure A Router
Understand Network Media
Understand Network Media Part 2
Understand Network Media Part 3
Understand Network Media Part 4
UNDERSTANDING PROTOCOLS AND SERVICES
Understand Technologies And Topologies
Understand Technologies And Topologies Part 2
Understand Technologies And Topologies Part 3
Understand Infrastructure: LAN
Understand Infrastructure: WAN
- UNDERSTAND THE CLOUD
Overview
Cloud Principles And Delivery
Cloud Principles And Delivery Part 2
Cloud Security
Cloud Security Part 2
Using Cloud Services
Cloud Updates And Availability
ENABLE MICROSOFT CLOUD SERVICES
Enable Cloud Services
Enable Cloud Services Part 2
Enable Cloud Services Part 3
Enable Cloud Services Part 4
ADMINISTER OFFICE 365 AND MICROSOFT INTUNE
Administering Cloud Services
Administering Cloud Services Part 2
USE AND CONFIGURE MICROSOFT CLOUD SERVICES
Configure Cloud Services
Configure Cloud Services Part 2
SUPPORT CLOUD USERS
Support Cloud Users
Support Cloud Users Part 2
Support Cloud Users Part 3
Support Exchange Online
Support Exchange Online Part 2
Support SharePoint Online
Support Skype For Business
Tools For Troubleshooting
- DEPLOY WINDOWS
Overview
Configure Language Packs
Migrate User Data
Migrate User Data Part 2
Perform A Clean Installation
Perform An In-Place Upgrade
Windows Editions And Activation
Post-Installation Configuration
MANAGE DEVICES AND DATA
Manage Devices
Manage Local Users And Groups
Configure NTFS Permissions
Configure NTFS Permissions Part 2
Configure Shared Permissions
Configure Shared Permissions Part 2
Configure Devices Using Local Policies
Configure Devices Using Local Policies Pt.2
Manage Windows Security
Manage Windows Security Part 2
Manage Windows Security Part 3
Manage Windows Security Part 4
CONFIGURE CONNECTIVITY
Configure Networking
Configure Networking Part 2
Configure Networking Part 3
Configure Remote Connectivity
Configure Remote Connectivity Part 2
Configure Remote Connectivity Part 3
MAINTAIN WINDOWS
Perform File Recovery
Recover Windows 10
Recover Windows 10 Part 2
Manage Updates
Configure Event Logs
Configure Event Logs Part 2
Manage Performance
Manage Performance Part 2
- PLAN AND IMPLEMENT WINDOWS 10 BY USING DYNAMIC DEPLOYMENT
Windows Dynamic Deployment
Windows Dynamic Deployment Part 2
Windows Autopilot
Upgrade Windows 10
Windows Analytics
Windows Analytics Part 2
Windows Analytics Part 3
Migrate User Profiles
Migrate User Profiles Part 2
Manage Updates
Manage Updates Part 2
Manage Updates Part 3
Manage Authentication Policies
Manage Authentication Policies Part 2
Manage Authentication Policies Part 3
Manage Sign-On Options
Manage Sign-On Options Part 2
Perform Azure AD Join
MANAGE POLICIES AND PROFILES
Implement Co-Management
Implement Co-Management Part 2
Conditional Access
Conditional Access Part 2
Conditional Access Part 3
Configure Device Profiles
Configure Device Profiles Part 2
Manage User Profiles
Manage User Profiles Part 2
Manage User Profiles Part 3
MANAGE AND PROTECT DEVICES
Windows Defender Application Guard
Windows Defender Credential Guard
Windows Defender Exploit Guard
Windows Defender Exploit Guard Part 2
Windows Defender Exploit Guard Part 3
Windows Defender Application Control
Windows Defender Application Control Part 2
Windows Defender Antivirus
Enable Device Enrollment
Intune Terms And Conditions
Intune Enrollment Restrictions
Intune Device Categories
Intune Corporate Identifiers
Device Enrollment Manager
Enroll Windows Devices
Enroll Apple Devices
Enroll Apple Devices Part 2
Enroll Android Devices
Device Inventory Reports
Monitor Device Health
Monitor Device Health Part 2
MANAGE APPS AND DATA
Deploy Microsoft Store Apps
Deploy Google Play Store Apps
Deploy Apple App Store Apps
Microsoft Store For Business
Deploy Office 365 ProPlus
Deploy Office 365 ProPlus To MacOS
Sideloading Apps
Implement Assigned Access
Configure IE Enterprise Mode
Gather Office Readiness Data
Implement And Manage MAM Policies
Configure Windows Information Protection
Configure Azure Information Protection
Configure Azure Information Protection Part 2
Configure Azure Information Protection Part 3
- MANAGE AZURE SUBSCRIPTIONS AND RESOURCES
Overview
Manage Subscriptions
Manage Subscriptions Part 2
Manage Subscriptions Part 3
Configure Diagnostic Setting On Resources
Configure Diagnostic Settings On Resources Pt.2
Working With Alerts
Working With Alerts Part 2
Working With Log Analytics
Analyze Metrics Across Subscriptions
Analyze Resource Utilization And Consumption
Manage Resource Groups
Manage Resource Groups Part 2
Manage Resource Groups Part 3
Role Based Access Control
Role Based Access Control Part 2
Custom Roles
Troubleshooting RBAC And RBAC Policies
IMPLEMENT AND MANAGE STORAGE
Azure Storage Introduction
Create And Configure Storage Accounts
Azure Storage Replication
Storage Access Options
Storage Explorer
Azure Data Box
Azure Blob Storage
Azure Blob Storage Part 2
Configure CDN Endpoints
Azure File Storage
Create An Azure File Share
Introduction To Azure File Sync
Planning For Azure File Sync
Configure Sync Service And Sync Agent
Create And Configure Backup Policy
Create Sync Groups And Endpoints
Troubleshooting Azure File Sync
Delete Storage Sync Services
Introduction To Azure Backup
Create Recovery Services Vault
Perform Backup And Restoration Operations
Configure And Review Backup Reports
DEPLOY AND MANAGE VIRTUAL MACHINES (VMS)
Create And Configure Azure VMs
Create And Configure Azure VMs Part 2
Configure High Availability
Configure High Availability Part 2
Deploy And Configure Scale Sets
Deploy And Configure Scale Sets Part 2
Understand ARM Templates
Deploy Virtual Machines From ARM Templates
Virtual Machines And VHD Templates
Save A Deployment As An ARM Template
Manage VM Sizes
Move And Redeploy VMs
Add Data Disks
Add Network Interfaces
DSC And Custom Script Extensions
DSC And Custom Script Extensions Part 2
Configure VM Backups
Configure VM Backups Part 2
Performing VM Restorations
CONFIGURE AND MANAGE VIRTUAL NETWORKS
Virtual Network Introduction
Create An Azure Virtual Network
Create And Configure VNET Peering
Introduction To Virtual Network Gateways
Create A Virtual Network Gateway
Create And Configure VNET To VNET
Network Routes
Configure Azure DNS Zone: Public
Configure Azure DNS Zone: Private
Configure Azure DNS Zone: Private Part 2
Introduction To Network Security Groups
Introduction To Network Security Groups
Create And Configure An NSG
Create And Configure An NSG Part 2
Evaluate Effective Security Rules
Azure Load Balancers
Create A Public Load Balancer
Create Back-End Servers
NSG Rules For Load Balancing
Create A Back-End Address Pool
Create A Health Probe
Create A Load Balancer Rule
Test The Pubic Load Balancer
Configure Internal Load Balancer
Create Internal Load Balancer Resources
Troubleshoot Load Balancing
Monitor On-Premises Connectivity
Configure NPM
Configure NPM Part 2
Network Troubleshooting
ExpressRoute
Azure Gateways
Configure A Site-To-Site VPN
Configure A Site-To-Site VPN Part 2
MANAGE IDENTITIES
Add Custom Domains
Configure Azure AD Identity Protection
Configure Azure AD Identity Protection Part 2
Configure Azure AD Join
Configure Enterprise State Roaming
Configure Self-Service Password Reset
Implement Conditional Access Policies
Manage Multiple Directories
Perform An Access Review
Azure AD Users
Azure AD Groups
Perform Bulk User Updates
Azure AD Connect
Azure AD Connect Sign-On Options
Configure Multi-Factor Authentication
Configure MFA Advanced Features
- DESIGN AND IMPLEMENT MICROSOFT 365 SERVICES
MS-100 Overview
Evaluate Microsoft 365 For An Organization
Plan And Create Microsoft 365 Tenant
Configure Subscriptions
Configure Tenant And Specialist Admin Roles
Configure Additional Admin Roles
Manage And Monitor Subscriptions
Plan For Microsoft 365 On-Premises Infrastructure
Plan Identity And Authentication Solution
Identify Data For Migration
Identify Users And Mailboxes For Migration
Import PST Files
Plan For On-Prem User And Group Migration
Design Domain Name Configuration
Configure Workloads For A New Domain
Configure User Identities For A New Domain
Manage Service Requests And Health Alerts
Create Internal Service Health Response Plan
Configure, Schedule And Review Reporting
MANAGE USER IDENTITY AND ROLES
Evaluate Identity Mgmt Requirements
Evaluate Directory Synchronization Requirements
Evaluate Authentication Requirements
Design Directory Synchronization
Implement Directory Synchronization
Configure Directory Synchronization
Monitor Azure AD Connect Health
Manage Azure AD Connect Sync
Implement Multi-Forest AD Connect Scenarios
Plan Azure AD Identities
Manage Azure AD Users And Groups
Manage Azure AD Passwords
Manage Product Licenses
Perform Bulk Azure AD User Mgmt
Plan For User And Security And Compliance Roles
Manage Admin Rights And Roles
Configure RBAC In Azure Active Directory
Plan For PIM In Azure Active Directory
Configure For PIM In Azure Active Directory
MANAGE ACCESS AND AUTHENTICATION
Design An Authentication Method For M365
Configure Authentication In AzureAD
Manage Authentication In AzureAD
Design, Configure And Manage MFA For M365
Configure Application Registration In Azure AD
Plan For Azure AD Application Proxy
Configure Azure AD Application Proxy
Create B2B And Guest Accounts In M365
Design Solutions For External Access
PLAN OFFICE 365 WORKLOADS AND APPLICATIONS
Identify Hybrid Req For Exchange
Identify Hybrid Reqs For Other Workloads
Plan Migration Strategy For Exchange
Plan Migration Strategy For Other Workloads
Manage And Plan For Office 365 ProPlus
Plan For Deploying Office 365 ProPlus
- IMPLEMENT MOBILE DEVICE MANAGEMENT (MDM)
Overview
So You Want To Build A Lab
Plan For MDM – O365 Vs. Intune
Plan For MDM Planning Infrastructure Requirements
Configure MDM Integration With Azure AD – Overview
Configure MDM Integration With Azure AD – SCCM
Set An MDM Authority
Set Device Enrollment Limit For Users
MANAGE DEVICE COMPLIANCE
Plan For Device Compliance
Determine Use Cases For Device Compliance
Design Conditional Access Policies
Create Conditional Access Policies
Configure Device Compliance Policy
Manage Conditional Access Policies
PLAN FOR DEVICES AND APPS
Create And Configure Microsoft Store For Business
Plan App Deployment
Plan Device Co-Management
Plan Device Monitoring
Plan For Device Profiles
Plan For Mobile Application Management
Plan Mobile Device Security
PLAN WINDOWS 10 DEPLOYMENT
Plan For Windows As A Service (WaaS)
Plan Win10 Ent. Deployment Method – Know
Plan Win10 Ent. Deployment Method – Consider
Plan Deployment Method – In-Place Upgrade SCCM
Plan Deployment Method Modern Servicing Intune
Plan Win10 Deployment Method Modern Servicing GPO
Plan Deployment Method Modern Servicing SCCM
Analyze Upgrade Readiness For Windows 10 – Know
Analyze Upgrade Readiness For Windows 10 Do
Evaluate Deploy Win10 Ent Security Features
CONFIGURE CLOUD APP SECURITY (CAS)
Cloud App Security Overview
Configure Cloud App Security (CAS)
Configure Cloud App Security (CAS) Policies
Cloud App Security (CAS) Policies Activity Policy
Cloud App Security – Anomaly Detection Policy
Cloud App Security Policies App Discovery Policy
Cloud App Security (CAS) Policies File Policy
Cloud App Security (CAS) Policies OAuth App Policy
Cloud App Security (CAS) Policies Session Policy
Cloud App Security (CAS) Policies Access Policy
Configure Connected Apps
Manage Cloud App Security (CAS) Alerts
Upload Cloud App Security (CAS) Traffic Logs
IMPLEMENT THREAT MANAGEMENT
Plan A Threat Management Solution
Azure ATP Architecture, Components – Overview
Azure ATP Architecture, Components – Prerequisites
ATA Architecture And Components
Design Azure Advanced Threat Protection Policies
Design Microsoft 365 ATP Policies
Configure Microsoft 365 ATP Policies
Monitor Advanced Threat Analytics (ATA) Incidents
IMPLEMENT WINDOWS DEFENDER ADVANCED THREAT PROTECTION (ATP)
Plan Windows Defender ATP Solution
Configure Preferences
Implement Windows Defender ATP Policies
Enable, Config Security Features, Windows 10 Ent
MANAGE SECURITY REPORTS AND ALERTS
Manage Service Assurance Dashboard
Manage Azure AD Identity Protection
Configure And Manage Microsoft 365 Security Alerts
CONFIGURE DATA LOSS PREVENTION (DLP)
What Is Data Loss Prevention, How Does It Work
Configure DLP Policies – Overview
Configure DLP Policies – PowerShell
Configure DLP Policies – O365 Security Compliance
Design Data Retention Policies In Microsoft 365
Manage DLP Exceptions
Monitor DLP Policy Matches
Manage DLP Policy Matches
IMPLEMENT AZURE INFORMATION PROTECTION (AIP)
Plan AIP Solution
Deploy On-Prem Rights Management Connector
Plan For Windows Information Protection (WIP)
Plan For Classification Labeling
Information Rights Management (IRM) For Workloads
Configure Super User
Deploy AIP Clients
Implement Azure Information Protection Policies
Implement AIP Tenant Key
MANAGE DATA GOVERNANCE
Plan Information Retention Policies
Configure Information Retention
Plan For Microsoft 365 Backup
Plan For Restoring Deleted Content
MANAGE AUDITING
Configuring Audit Logging
Monitoring Unified Audit Logs
MANAGE EDISCOVERY
Search Content Security Compliance Center
Search Content Security Compliance Center Roles
Plan For In-Place And Legal Hold
Configure EDiscovery
- OVERVIEW OF MICROSOFT SQL SERVER 2012 (70-462)
Intro To Microsoft SQL
INSTALL AND CONFIGURE
Install And Configure SQL
MAINTAIN INSTANCES AND DATABASES
Manage And Configure Databases
Optimizing Database Files
OPTIMIZE AND TROUBLESHOOT
SQL Server Agent
MANAGE DATA
Backup And Restore Databases
Import, Export, And Indexing Data
IMPLEMENT SECURITY
Implementing Security
IMPLEMENT HIGH AVAILABILITY
Clustering And Redundancy
Monitoring SQL Server
- CREATE DATABASE OBJECTS
Overview
SQL Server Basics
SQL Server Basics Part 2
SQL Querying Basics
Create And Alter Tables
Create And Alter Views
Create And Alter Views Part 2
Create And Alter Views Part 3
Create And Modify Constraints
Create And Modify Constraints Part 2
Create And Alter DML Triggers
WORK WITH DATA
Basic SELECT Queries
Basic SELECT Queries Part 2
Query Using JOINS
Query Using JOINS Part 2
Implement Subqueries
Implement Subqueries Part 2
Implement Subqueries Part 3
Implement Aggregate Queries
Implement Aggregate Queries Part 2
Implement Aggregate Queries Part 3
Query Using Synonyms, Except And Intersect
Understand Data Access Technologies
Work With Conditions And Nulls
Work With Table Constraints
Query And Manage XML Data
Query And Manage XML Data Part 2
Implement Data Types
Implement Data Types Part 2
MODIFY DATA
Create And Alter Stored Procedures
INSERT, UPDATE And DELETE
INSERT, UPDATE And DELETE Part 2
Combine Datasets
Work With Functions
TROUBLESHOOT AND OPTIMIZE
Optimize Queries
Optimize Queries Part 2
Optimize Queries Part 3
Manage Transactions
Evaluate Different Operations
Implement Error Handling
- EXCHANGE ONLINE SERVICE DESCRIPTION
Overview
Exchange Online Service Description
EXCHANGE DEPLOYMENT OPTIONS
Exchange Deployment Options
Exchange Deployment Options Part 2
THE EXCHANGE ADMIN CENTER
The Exchange Admin Center Tour
RECIPIENTS
Creating Users, Mail Contacts, Mail Users
Examining Users And Creating Groups
Examining Resources And Sharing Mailboxes
Setting Up PowerShell To Manage Exchange Online
Control Access To PowerShell For Exchange Online
PowerShell Basics For Managing Recipients
PowerShell Basics For Managing Recipients Pt.2
PowerShell Basics For Managing Recipients Pt.3
ORGANIZATION
Sharing And Add-Ins
PUBLIC FOLDERS
Public Folders
MOBILE
Exchange ActiveSync And Mailbox Policies
Exchange ActiveSync And Mailbox Policies Pt.2
Microsoft 365 Device Management With Intune
Microsoft 365 Device Management With Intune Pt2
Microsoft 365 Device Management With Intune Pt3
ADDRESS BOOK POLICIES
Deploying Address Book Policies Using PowerShell
Deploying Address Book Policies W/ PowerShell Pt2
PERMISSIONS
Permissions In Exchange Online
Permissions In Exchange Online Part 2
Permissions In Exchange Online Part 3
Permissions In Exchange Online Part 4
ADVANCED THREATS
Safe Attachments And Safe Links
Safe Attachments And Safe Links Part 2
Safe Attachments And Safe Links Part 3
MAIL FLOW
Rules
Connectors
Traces And Domains
Traces And Domains Part 2
Traces And Domains Part 3
PROTECTION
Malware Filter
Spam Filter
DKIM
Quarantine And The Action Center
COMPLIANCE MANAGEMENT
Auditing
Journal Rules
Data Loss Prevention – EAC
Data Loss Prevention – O365 Security
Data Loss Prevention Document Fingerprinting
Retention Tags And Policies
Retention Tags And Policies Part 2
In-Place EDiscovery And Hold
In-Place EDiscovery And Hold Part 2
- PROVISION OFFICE 365
Overview
Provision Office365 Tenants
Provision Office365 Tenants Pt2
Configure For New Features
Add And Configure Custom Domain
Add And Configure Custom Domain Part 2
Pilot Users And Workloads
Run Idfix
Setup Email For Pilot User
Engage Fasttrack Center For Office
MANAGING USERS, GROUPS, AND LICENSES
Enable Client Connectivity
Administer Azure Rights Management
Administer Azure Rights Management Pt2
Administer Azure Rights Management Pt3
Manage Office 365 Administrator Roles
MANAGE CLOUD IDENTITIES
Manage Passwords And Users
Manage Passwords And Users Part 2
Manage Passwords And Users Part 3
Cloud Identities With PowerShell
Azure Active Directory Cmdlets
Azure Active Directory Cmdlets Part 2
Create Security Groups
MANAGE IDENTITIES WITH AZURE ACTIVE DIRECTORY CONNECT
Prepare AD Synchronization To O365
Prepare AD Synchronization To O365 Part 2
Plan For Filtering Active Directory
Plan For Filtering Active Directory Part 2
Plan For Filtering Active Directory Part 3
Set Up Azure AD Connect Tool
Set Up Azure AD Connect Tool Part 2
Set Up Azure AD Connect Tool Part 3
Set Up Azure AD Connect Tool Part 4
IMPLEMENT AND MANAGE FEDERATED IDENTITIES FOR SSO
Plan AD FS Requirements
Install And Manage AD FS Server
Install Web Access Proxy
Install Web Access Proxy Part 2
Configure Web Access Proxy
Customize ADFS Sign-In Page
MONITOR AND TROUBLESHOOT OFFICE 365 AVAILABILITY AND USAGE
Analyze Reports And Monitor Service Health
Isolate Service Interruption
Disabling AD Federation
Disabling AD Federation Part 2
Document And Email Protection
- MANAGE CLIENTS AND END-USER DEVICES
Overview
Manage Clients Deployment
Manage Clients Deployment Part 2
Manage IT Office 365 Deployments
Manage IT Office 365 Deployments Part 2
Manage IT Office 365 Deployments Part 3
Setup Telemetry And Reporting
Setup Telemetry And Reporting Part 2
Plan For Office Clients
Plan For Office Clients Part 2
Plan For Office Clients Part 3
Create A Pilot Group For Testing Updates
Create A Pilot Group For Testing Updates Part 2
PROVISION SHAREPOINT ONLINE SITE COLLECTIONS
Configure External SharePoint Users
Configure External SharePoint Users Part 2
Configure External SharePoint Users Part 3
Create SharePoint Site Collection
Plan A Collaboration Solution
Plan A Collaboration Solution Part 2
Plan A Collaboration Solution Part 3
Plan A Collaboration Solution Part 4
Plan A Collaboration Solution Part 5
Configure EDiscovery
Configure EDiscovery Part 2
Configure EDiscovery Part 3
Configure EDiscovery Part 4
Configure EDiscovery Part 5
CONFIGURE EXCHANGE ONLINE AND SKYPE FOR BUSINESS ONLINE FOR END USERS
Configure Additional Email Addresses
Configure Additional Email Addresses Part 2
Configure Additional Email Addresses Part 3
Configure Contacts And Resources
Configure Contacts And Resources Part 2
Configure Contacts And Resources Part 3
Configure Personal Archive Policies
Configure Personal Archive Policies Part 2
Configure Skype End User Settings
Configure Skype End User Settings Part 2
Configure Skype End User Settings Part 3
PLAN FOR EXCHANGE ONLINE AND SKYPE FOR BUSINESS ONLINE
Anti-Malware And Anti-Spam Policies
Anti-Malware And Anti-Spam Policies Part 2
Mailbox Migration Strategy
Mailbox Migration Strategy Part 2
Plan For Exchange Online
Plan For Exchange Online Part 2
Manage Skype Global Settings
Manage Skype Global Settings Addendum
Manage Skype Global Settings Part 2
Manage Skype Global Settings Part 3
Configure Advanced Threat Protection
Configure Advanced Threat Protection Part 2
Customize Malware And Spam Protection
Customize Connection Filters
Customize Connection Filters Part 2
Customize Content Filters
Customize Content Filters Part 2
Enable External Mail Flow Topologies
Enable External Mail Flow Topologies Part 2
ENABLING OFFICE 365 SERVICES
Implement Microsoft Teams
Implement Microsoft Teams Part 2
Implement Microsoft Flow And PowerApps
Implement Microsoft Flow And PowerApps Part 2
Configure And Manage Microsoft StaffHub
Configure Storage And Access Control
Configure Storage And Access Control Part 2
Configure Document Deletion Policies
Manage And Migrate OneDrive For Business
Manage And Migrate OneDrive For Business Part 2
Configure EDiscovery And Advanced EDiscovery
Configure Office 365 Security And Governance
Configure Office 365 Security And Governance Pt.2
- OVERVIEW OF MICROSOFT PROJECT 2013
Microsoft Project
INITIALIZE A PROJECT
Create A New Project
Calendars
Custom Fields
Settings Options
CREATE A TASK-BASED SCHEDULE
Set Up Project Information
Creating Tasks
Task Relationships
Task Relationships Part 2
Creating A Schedule
Managing Multiple Projects
MANAGE RESOURCES AND ASSIGNMENTS
Resource Information
Resource Assignments
Team Planner
Model Project Costs
Model Material Resource Costs
TRACK AND ANALYZE A PROJECT
Setting Baselines
Update Progress
Baseline Variances
Resolve Schedule Issues
Display Critical Path
COMMUNICATE PROJECT INFORMATION
Applying Custom Views
Sharing Project Data
Reports And Dashboards
Project Extensions
- MICROSOFT DEPLOYMENT TOOLKIT
In-Place Upgrade With MDT
- INTRODUCTION TO MICROSOFT AZURE
Overview
Introduction To Microsoft Azure
Introduction To Microsoft Azure Part 2
Introduction To Microsoft Azure Part 3
Introduction To Microsoft Azure Part 4
Introduction To Microsoft Azure Part 5
IMPLEMENT VIRTUAL NETWORKS
Azure Virtual Network Overview
Azure Virtual Network Overview Part 2
Azure Virtual Network Overview Part 3
Creating A VNet Part 2
Creating A VNet
Load Balancers
Load Balancers Part 2
Load Balancers Part 3
Load Balancers Part 4
Application Gateways
Application Gateways Part 2
Web Application Firewalls (WAF)
Azure DNS
User Defined Routes (UDR)
User Defined Routes (UDR) Part 2
User Defined Routes (UDR) Part 3
Direct Server Return
VNet Peering
Configuration Management With Puppet
Create Load Balancer And VNet In Azure CLI
Create Load Balancer And VNet In Azure CLI Part 2
VM CONFIGURATION
Configure A VM With A Static Public IP
Configure A VM With A Static Public IP Part 2
Configure A VM With A Private IP
VMs And Network Security Groups
Virtual Machines And Application Gateways
Virtual Machines And Application Gateways Part 2
VPNS
Point To Site VPN
Point To Site VPN Part 2
Site To Site VPN
Forced Tunneling
VNet-To-VNet VPN Gateway
VNet-To-VNet VPN Gateway Part 2
Configure ExpressRoute Connectivity
CREATE AND MANAGE ARM VMS
Identifying Worklods For Azure VMs
Deploy And Run Workloads For Azure VMs
Create And Connect To VMs
Create And Connect To VMs Part 2
Create And Connect To VMs Part 3
Create And Connect To VMs Part 4
Create And Connect To VMs Part 5
Create And Connect To VMs Part 6
Create And Connect To VMs Part 7
Manage ARM VM Availability
Manage ARM VM Availability Part 2
Manage ARM VM Availability Part 3
Plan Storage Capacity And Create VMs
Plan Storage Capacity And Create VMs Part 2
Plan Storage Capacity And Create VMs Part 3
Disk Caching, Redundancy And Geo-Replication
Disk Caching, Redundancy And Geo-Replication Pt.2
Disk Caching, Redundancy And Geo-Replication Pt.3
Shared Storage With Azure File Service
Configure Azure File Share Snapshots
Encrypt Disks
Encrypt Disks Part 2
Encrypt Disks Part 3
Blob Level Tiering And Storage Encryption Keys
Deploy Bring Your Own License (BYOL) Images
Deploy Bring Your Own License (BYOL) Images Pt.2
Create And Deploy ARM VM Scale Sets (VMSS)
Create And Deploy ARM VM Scale Sets (VMSS) Pt.2
Create And Deploy ARM VM Scale Sets (VMSS) Pt.3
Perform Configuration Management
Perform Configuration Management Part 2
Perform Configuration Management Part 3
Monitor ARM VMs
Monitor ARM VMs Part 2
Monitor ARM VMs Part 3
Manage With Azure Container Services (ACS)
Manage With Azure Container Services (ACS) Part 2
Manage With Azure Container Services (ACS) Part 3
Manage With Azure Container Services (ACS) Part 4
Manage With Azure Container Services (ACS) Part 5
Manage With Azure Container Services (ACS) Part 6
Manage With Azure Container Services (ACS) Part 7
Manage With Azure Container Services (ACS) Part 8
DESIGN AND DEPLOY ARM TEMPLATES
Implement ARM Templates
Implement ARM Templates Part 2
Implement ARM Templates Part 3
Control Access
Control Access Part 2
Control Access Part 3
Control Access Part 4
Control Access Part 5
Design Role-Based Access Control
DESIGN AND IMPLEMENT A STORAGE STRATEGY
Implement Storage Blobs And Files
Implement Storage Blobs And Files Part 2
Implement Storage Blobs And Files Part 3
Implement Storage Blobs And Files Part 4
Implement Storage Blobs And Files Part 5
Implement Storage Blobs And Files Part 6
Implement Storage Blobs And Files Part 7
Diagnostics, Monitoring And Analytics
Implement Azure StorSimple
Implement Azure StorSimple Part 3
Implement Azure StorSimple Part 2
Implement Storage Encryption
Implement Storage Encryption Part 2
MANAGE AZURE SECURITY AND RECOVERY SERVICES
Create And Import Encryption Keys With Key Vault
Create And Import Encryption Keys With Key Vault 2
Azure Security Center
Manage Data Protection And Security Compliance
Manage Data Protection And Security Compliance Pt2
Implement Recovery Services
Implement Recovery Services Part 2
Implement Recovery Services Part 3
Implement Recovery Services Part 4
Implement Recovery Services Part 5
Implement Recovery Services Part 6
MANAGE AZURE OPERATIONS
Enhance Cloud Management With Automation
Enhance Cloud Management With Automation Part 2
Enhance Cloud Management With Automation Part 3
Enhance Cloud Management With Automation Part 4
Enhance Cloud Management With Automation Part 5
Enhance Cloud Management With Automation Part 6
Enhance Cloud Management With Automation Part 7
Enhance Cloud Management With Automation Part 8
Working With Data In Cloud And On-Prem
Working With Data In Cloud And On-Prem Part 2
Working With Data In Cloud And On-Prem Part 3
Working With Data In Cloud And On-Prem Part 4
Working With Data In Cloud And On-Prem Part 5
Working With Data In Cloud And On-Prem – ITSMC
DESIGN AND IMPLEMENT AZURE APP SERVICE APPS
Deploy And Configure Web Apps
Deploy And Configure Web Apps Part 2
Deploy And Configure Web Apps Part 3
Define Deployment Slots
Define And Use App Settings
Web Apps And App Service Plans
Web Apps And App Service Plans Part 2
Web Apps And App Service Plans Part 3
Select Appropriate Deployment Methods
Authentication And Authorization For Web Apps
When To Use App Service Environment
When To Use App Service Environment Part 2
Diagnostics, Monitoring And Analytics
Diagnostics, Monitoring And Analytics Part 2
Diagnostics, Monitoring And Analytics Part 3
Diagnostics, Monitoring And Analytics Part 4
Diagnostics, Monitoring And Analytics Part 5
Diagnostics Monitoring And Analytics – OMS
Configure Web Apps For Scale And Resilience
Configure Web Apps For Scale And Resilience Pt.2
MANAGE AZURE IDENTITIES
Manage Azure Active Directory
Manage Azure Active Directory Part 2
Manage Azure Active Directory – AD Connect Tool
Manage Azure Active Directory – AD Connect Tool 2
Manage Azure Active Directory – AD Connect Tool 3
Manage Azure Active Directory – AD Connect Tool 4
Manage Azure Active Directory – ADDS
Manage Azure Active Directory – ADDS 2
Manage Azure Active Directory – Domain Join
Manage Azure Active Directory – Graph API
Manage Azure Active Directory – Linux Domain Join
Manage Azure Active Directory – Password Reset
Manage Azure Active Directory – AD B2B
Manage Azure Active Directory – AD B2C
Manage Azure Active Directory – AD B2C 2
Manage Azure AD – Enterprise State Roaming
Manage Azure AD – Managed Service Identity
Manage Azure AD – Privileged Identity Management
Manage Azure AD – Azure Identity Management
Manage Azure AD – Azure Identity Management Pt.2
- CLOUD DESIGN PATTERNS
Overview
Cloud Design Patterns – Availability
Cloud Design Patterns – Availability Part 2
Cloud Design Patterns – Data Management
Cloud Design Patterns – Data Management Part 2
Cloud Design Patterns – Data Management Part 3
Cloud Design Patterns – Design And Implement
Cloud Design Patterns – Design And Implement Pt2
Cloud Design Patterns – Design And Implement Pt3
Cloud Design Patterns – Design And Implement Pt4
Cloud Design Patterns – Messaging
Cloud Design Patterns – Messaging Part 2
Cloud Design Patterns – Manage And Monitor
Cloud Design Patterns – Perform And Scale
Cloud Design Patterns – Resiliency
Cloud Designs Patterns – Resiliency Part 2
Cloud Design Patterns – Resiliency Part 3
Cloud Design Patterns – Security
DESIGN COMPUTE INFRASTRUCTURE
Solutions Using VMs – Azure Batch And Batch AI
Solutions Using VMs – Azure Batch And Batch AI Pt2
Solutions Using VMs – Azure Batch And Batch AI Pt3
Solutions Using VMs – Azure Batch And Batch AI Pt4
Solutions Using VMs – Cloud Migration Strategy
Solutions Using VMs – Cloud Migration Strategy Pt2
Solutions Using VMs – Cloud Migration Strategy Pt3
Solutions Using VMs – Backup And Site Recovery
Solutions Using VMs – Backup And Site Recovery Pt2
Solutions Using VMs – Backup And Site Recovery Pt3
Solutions Using VMs – Backup And Site Recovery Pt4
Solutions Using VMs – Backup And Site Recovery Pt5
Solutions Using VMs – VM Scale Sets
Solutions Using VMs – Availability Sets…
Solutions Using VMs – Use Web App For Containers
Solutions Using VMs – Using Reserved Instances
Solutions Using VMs – Using Accelerated Networking
Solutions Using VMs – Designing A DevTest Lab
Solutions Using VMs – Designing A DevTest Lab Pt2
Serverless Computing – Azure Container Instances
Serverless Computing Azure Container Instances Pt2
Serverless Computing – Azure Logic Apps
Serverless Computing – Azure Logic Apps Pt2
Serverless Computing – Azure Logic Apps Pt3
Serverless Computing – API Management
Serverless Computing – Event Driven Actions
Serverless Computing – Event-Driven Actions Pt2
Serverless Computing – Data Storage Solutions
Serverless Computing – Event Grid And Bots
Solutions Using Microservices – Container Based
Solutions Using Microservices – Orchestration
Solutions Using Microservices – ASF And API
Solutions Using Microservices – ASF And API Pt2
Solutions Using Microservices – Migrate Vs Deploy
Create, Deploy An ASF Container Application
Create, Deploy An ASF Container Application Pt2
Create, Deploy An ASF Container Application Pt3
Design Web Applications – App Service Web Apps
Design Web Applications – App Service Web Apps 2
Design Web Applications – Custom Web API
Design Web Applications – Secure Web API
Design Web Applications – Secure Web API Pt2
Design Web Applicaitons – Scalability, Performance
Design Web Applications – Multi-Region HA
Design Web Applications – App Service Plans
Design Web Applications – Business Continuity
Design Web Applications – App Service Isolated
Design Web Applications – API Apps
Design Web Applications – Web Apps On Linux
Design Web Applications – Use A CDN
Design Web Applications – Azure Redis Cache
Compute Intensive Applications
Compute Intensive Applications Part 2
Compute Intensive Applications Part 3
Compute Intensive Applications Part 4
Exam Resources
DESIGN DATA IMPLEMENTATION
Design For Azure Storage Solutions
Design For Azure Storage Solutions Part 2
Design For Azure Storage Solutions Part 3
Design For Azure Storage Solutions Part 4
Design For Azure Data Services
Design For Azure Data Services Part 2
Design For Azure Data Services Part 3
Design For Azure Data Services Part 4
Design For Azure Data Services Part 5
Design For Azure Data Services Part 6
Design For Relational Database Storage
Design For Relational Database Storage Part 2
Design For Relational Database Storage Part 3
Design For Relational Database Storage Part 4
Design For NoSQL Storage – Azure Redis Cache
Design For NoSQL Storage – Azure Table Storage
Design For NoSQL Storage – Azure Data Lake
Design For NoSQL Storage – Azure Search
Design For NoSQL Storage – Time Series Insights
Design For NoSQL Storage – Recurring Jobs
Design For CosmosDB Storage
DESIGN NETWORKING IMPLEMENTATION
Azure Virtual Networks – Networking Services
Azure Virtual Networks – Networking Services Pt2
Azure Virtual Networks – DNS, DHCP And IP
Azure Virtual Networks – Load Balancing
Azure Virtual Networks – Load Balancing Pt2
Azure Virtual Networks – Load Balancing Pt3
Azure Virtual Networks – Application Gateway
Azure Virtual Networks – Application Gateway Pt2
Azure Virtual Networks – VNet Service Endpoints
Design External Connectivity
Design External Connectivity Part 2
Design External Connectivity Part 3
Design External Connectivity Part 4
Design External Connectivity Part 5
Design External Connectivity Part 6
Design Security Strategies
Design Security Strategies Part 2
Design Security Strategies Part 3
Design Security Strategies Part 4
Connectivity For Hybrid Applications
Connectivity For Hybrid Applications Part 2
Connectivity For Hybrid Application Part 3
Connectivity For Hybrid Applications Part 4
Connectivity For Hybrid Applications Part 5
DESIGN SECURITY AND IDENTITY SOLUTIONS
Design An Identity Solution
Design An Identity Solution Part 2
Design An Identity Solution Part 3
Design An Identity Solution Part 4
Design An Identity Solution Part 5
Design An Identity Solution Part 6
Design An Identity Solution Part 7
Design An Identity Solution Part 8
Secure Resources Using Identity Providers
Secure Resources Using Identity Providers Part 2
Secure Resources Using Identity Providers Part 3
Design A Data Security Solution
Design A Data Security Solution Part 2
Design A Data Security Solution Part 3
Design A Data Security Solution Part 4
Design A Data Security Solution Part 5
Design A Data Security Solution Part 6
Design A Data Security Solution Part 7
Design A Data Security Solution Part 8
Design A Data Security Solution Part 9
Design A Data Security Solution Part 10
Design A Data Security Solution Part 11
Design Governance And Policies For Resources
Design Governance And Policies For Resources Pt.2
Design Governance And Policies For Resources Pt.3
Design Governance And Policies For Resources Pt.4
Manage Security Risks
Manage Security Risks Part 2
Manage Security Risks Part 3
Manage Security Risks – AD Identity Protection
Manage Security Risks – Advanced Threat Detection
Manage Security Risks – Endpoint Protection
DESIGN SOLUTIONS USING PLATFORM SERVICES
Artificial Intelligence Services
Design For IoT
Design For IoT Part 2
Messaging Solution Architectures
Media Service Solutions
Media Service Solutions Part 2
DESIGN FOR OPERATIONS
Application Monitoring And Alerting Strategies
Application Monitoring And Alerting Strategies Pt2
Application Monitoring And Alerting Strategies Pt3
Application Monitoring And Alerting Strategies Pt4
Application Monitoring And Alerting Strategies Pt5
Platform Monitoring And Alerting Strategies
Platform Monitoring And Alerting Strategies Pt2
Platform Monitoring And Alerting Strategies Pt3
Platform Monitoring And Alerting Strategies Part 4
Operations Automation Strategies
Operations Automation Strategies Part 2
Operations Automation Strategies Part 3
Operations Automation Strategies Part 4
Operations Automation Strategies Part 5
- MICROSOFT DESKTOP OPTIMIZATION PACK
Overview
MBAM Components
Preparing ADDS For MBAM
Installing MBAM
Deploying And Configuring MBAM
Administering And Recovery
Diagnostics And Recovery Toolset
Diagnostics And Recovery Toolset Part 2
Application Virtualization
Application Virtualization Part 2
User Experience Virtualization
User Experience Virtualization Part 2
User Experience Virtualization Part 3
- INTRODUCTION
Getting Started
Basic Syntax And Help
Basic Syntax And Help Part 2
Command History And Aliases
Command History And Aliases Part 2
Piping And Formatting
Piping And Formatting Part 2
Script Execution Policy
Script Execution Policy Part 2
PowerShell Drives
Profiles
Profiles Part 2
Basic Functions
Basic Functions Part 2
Module Basics
Module Basics Part 2
- VARIABLES
Overview
Working With Variables
Working With Variables Part 2
Arrays
Hash Tables
Arithmetic Operators
Assignment Operators
Comparison Operators
Comparison Operators Part 2
If Statements
Switch Statements
For Statements
Foreach Statements
Do Statements
While Statements
Writing A Script
Writing A Script Part 2
Writing Another Script
Writing Another Script Part 2
Writing Another Script Part 3
Function Basics
Function Basics Part 2
Function Basics Part 3
- WINDOWS AUTOPILOT
Overview
Requirements
Scenarios And Capabilities
Administering Windows Autopilot
Administering Windows Autopilot Pt 2
- WINDOWS HELLO FOR BUSINESS
Concepts
Planning The Deployment
Preparing The Active Directory
Preparing The PKI
Preparing The PKI Part 2
Preparing AD Federation Services
Configuring AD FS And DRS
Configuring The Registration Authority
Configuring The Registration Authority Part 2
Configuring The Registration Authority Part 3
Prepare An Azure MFA Server
Preparing The MFA User Portal
Configuring The MFA Server
Installing The User Portal
Connecting The AD FS To The MFA Server
Configuring Group Policy
Deploying And Testing
- SERVER FUNDAMENTALS
Overview
A Peek Into Windows
A Peek Into Windows Part 2
Introduction To Server Manager
Get Started With PowerShell
Get Started With PowerShell Part 2
Adding Server Roles And Features
NETWORKING COMPONENTS OF WINDOWS SERVER
Networking Fundamentals
Networking Fundamentals Part 2
Managing A DHCP Server Role
Managing A DHCP Server Role Part 2
Managing Client Name Resolution
Managing Client Name Resolution Part 2
Managing The DNS Server Role
Managing The DNS Server Role Part 2
Working With DNS Zones
Working With DNS Zones Part 2
Troubleshooting Network Connections
Troubleshooting Network Connections Part 2
Troubleshooting Network Connections Part 3
ACTIVE DIRECTORY DOMAIN SERVICES TASKS
Active Directory Basic Administration
Active Directory Basic Administration Part 2
Create User Accounts
Create User Accounts Part 2
Managing User Accounts
Manage AD Computer Accounts
Managing AD Computer Accounts Part 2
Managing Groups
Managing Groups Part 2
Working With Group Policy
Working With Group Policy Part 2
Securing Server With Group Policy
Securing Server With Group Policy Part 2
Securing Server With Group Policy Part 3
SERVICES, STORAGE AND NTFS PERMISSIONS
Managing Windows Services
Managing Windows Services Part 2
Working With Local Storage
Working With Local Storage Part 2
Working With Local Storage Part 3
Managing NTFS Permissions
Managing NTFS Permissions Part 2
FILE SERVICES AND PRINT SERVICES
Managing Shared Folders And Files
Managing Shared Folders And Files Part 2
Managing Print Services
Managing Print Services Part 2
WINDOWS CONFIGURATION DESIGNER
Installing And Configuring WCD
Installing And Configuring WCD Part 2
- MANAGE IDENTITY
Overview
Support Microsoft Store And Cloud Apps
Support Microsoft Store And Cloud Apps Part 2
Support Microsoft Store And Cloud Apps Part 3
Support Microsoft Store And Cloud Apps Part 4
Support Authentication And Authorization
Support Authentication And Authorization Pt2
Support Authentication And Authorization Pt3
Support Authentication And Authorization Pt4
Support Authentication And Authorization Pt5
PLAN DESKTOP AND DEVICE DEPLOYMENT
Migrate And Configure User Data
Migrate And Configure User Data Part 2
Migrate And Configure User Data Part 3
Migrate And Configure User Data Part 4
Configure Hyper-V
Configure Hyper-V Part 2
Configure Hyper-V Part 3
Configure Hyper-V Part 4
Configure Hyper-V Part 5
Configure Hyper-V Part 6
Configure Hyper-V Part 7
Configure Mobility Options
Configure Mobility Options Part 2
Configure Mobility Options Part 3
Configure Mobility Options Part 4
Configure Mobile Device Security
Configure Mobile Device Security Part 2
PLAN AND IMPLEMENT A MICROSOFT INTUNE DEVICE MANAGEMENT SOLUTION
Support Mobile Devices
Support Mobile Devices Part 2
Support Mobile Devices Part 3
Support Mobile Devices Part 4
Software Updates Using Microsoft Intune
Manage Devices With Microsoft 365
Configure Information Protection
Configure Information Protection Part 2
Configure Information Protection Part 3
CONFIGURE NETWORKING
Configure IP Settings
Configure IP Settings Part 2
Configure Network Settings
Configure Network Security
Configure Network Security Part 2
Configure Network Security Part 3
CONFIGURE STORAGE
Support Data Storage
Support Data Storage Part 2
Support Data Security
Support Data Security Part 2
Support Data Security Part 3
BitLocker And BitLocker To Go
MANAGE DATA ACCESS AND PROTECTION
Configure Shared Resources
Configure Shared Resources Part 2
Configure Shared Resources Part 3
Configure Shared Resources Part 4
Configure File And Folder Access
Configure File And Folder Access Part 2
Configure File And Folder Access Part 3
Configure File And Folder Access Part 4
Configure File Access Auditing
Configure File Access Auditing Part 2
MANAGE REMOTE ACCESS
Configure Remote Connections
Configure Remote Connections Part 2
Configure Remote Connections Part 3
Configure Remote Connections Part 4 2018
Configure Remote Access
Configure Remote Access Part 2
Configure Mobility Options
Configure Mobility Options Part 2
Configure Mobility Options Part 3
MANAGE APPS
Deploy And Manage RemoteApp
Deploy And Manage RemoteApp Part 2
Support Desktop Apps
Support Desktop Apps Part 2
MANAGE UPDATES AND RECOVERY
Configure System Recovery
Configure System Recovery Part 2
Configure System Recovery Part 3
Configure File Recovery
Configure And Manage Updates
- IMPLEMENT WINDOWS
Overview
Preparing For Installation
Preparing For Installation Part 2
Preparing For Installation Part 3
Install Windows
Install Windows Part 2
Install Windows Part 3
Install Windows Part 4
Install Windows Part 5
Install Windows Part 6
Configure Devices And Drivers
Configure Devices And Drivers Part 2
Customize The Desktop
Customize The Desktop Part 2
Action Center And Taskbar
Action Center And Taskbar Part 2
Accessibility Options And Cortana
Internet Explorer And Edge
Internet Explorer And Edge Part 2
Configure Client Hyper-V
Configure Client Hyper-V Part 2
Configure Client Hyper-V Part 3
Configure Client Hyper-V Part 4
Configure Client Hyper-V Part 5
Enterprise Implementations
Enterprise Implementations Part 2
Activation Options
Activation Options Part 2
CONFIGURE AND SUPPORT CORE SERVICES
Configure Networking
Configure Networking Part 2
Configure Networking Part 3
Configure Networking Part 4
Configure Networking Part 5
Configure Networking Part 6
Configure Networking Part 7
Configure Networking Part 8
Network Troubleshooting
Network Troubleshooting Part 2
Network Troubleshooting Part 3
Configure Disks And Volumes
Configure Disks And Volumes Part 2
Configure Disks And Volumes Part 3
Configure Disks And Volumes Part 4
Configure Disks And Volumes Part 5
Configure Disks And Volumes Part 6
Configure Storage Spaces
Troubleshooting Storage
Troubleshooting Storage Part 2
Create And Configure VHDs
Create And Configure VHDs Part 2
Configure File System Permissions
Configure File And Folder Sharing
Configure File And Folder Sharing Part 2
Configure OneDrive And Files On Demand
Configure Apps
Configure Apps Part 2
Provision Packages
Provision Packages Part 2
Provision Packages Part 3
Configure Remote Management
Configure Remote Management Part 2
Configure Remote Management Part 3
MANAGE AND MAINTAIN WINDOWS
Configure Updates
Configure Updates Part 2
Monitor Windows
Monitor Windows: Performance/Resource Monitor
Monitor Windows: Event Viewer
Monitor Windows: Event Subscriptions
Monitor Windows: Printers And Indexing
Monitor Windows: Printers And Indexing Part 2
Windows Defender Options
System And Data Recovery
System And Data Recovery Part 2
System And Data Recovery Part 3
Homegroups And Workgroups
Domain Join Options
Accounts And UAC
Passport And Hello
Credential And Device Guard
Credential And Device Guard Part 2
Device Registration And Health Attestation
Configure Advanced Management Tools
Configure Advanced Management Tools Pt.2
- INSTALL AND CONFIGURE SERVERS
Overview
Planning A Server Installation
Install And Configure Server With GUI
Install And Configure Server Core
Features And Roles
Features And Roles Part 2
Additional Installation Configurations
Additional Installation Configurations Part 2
Configuring Disks
Configuring Disks Part 2
Storage Spaces
Storage Spaces Part 2
Desired State Configuration
Desired State Configuration Part 2
Desired State Configuration Part 3
NIC Teaming
NIC Teaming Part 2
CONFIGURE SERVER ROLES AND FEATURES
Configure NTFS Permissions
Configure NTFS Permissions Part 2
Configure Share Permissions
Configure Share Permissions Part 2
Configure File And Share Access
Configure File And Share Access Part 2
Configure File And Share Access Part 3
Configure File And Share Access Part 4
Configure File And Share Access Part 5
Configure File And Share Access Part 6
Configure File And Share Access Part 7
Configuring Printers
Configuring Printers Part 2
Configuring Printers Part 3
Configure Servers For Remote Management
Configure Servers For Remote Management Part 2
Configure Servers For Remote Management Part 3
CONFIGURE HYPER-V
Understand, Create And Configure VMs
Understand, Create And Configure VMs Part 2
Understand, Create And Configure VM Part 3
Configure Guest Integration Services
Additional VM Configurations
Additional VM Configurations Part 2
Create And Configure VM Storage
Working With VHDs In Powershell
Additional Storage Configurations
Hyper-V Networking
Hyper-V Networking Part 2
Hyper-V Networking Part 3
Hyper-V Networking Part 4
DEPLOY AND CONFIGURE CORE NETWORK SERVICES
Deploy And Configure DHCP
Deploy And Configure DHCP Part 2
Deploy And Configure DHCP Part 3
Deploy And Configure DHCP Part 4
Install DNS
Install DNS Part 2
Install DNS Part 3
Configure DNS
Configure DNS Part 2
Configure DNS Part 3
IPv4 And IPv6 Interoperability
IPv4 And IPv6 Interoperability Part 2
Configure IPv4 And IPv6
Configure IPv4 And IPv6 Part 2
INSTALL AND ADMINISTER ACTIVE DIRECTORY
Install Domain Controllers
Install Domain Controllers Part 2
Install Domain Controllers Part 3
Install Domain Controllers Part 4
Active Directory Users And Computers
Active Directory Users And Computers Part 2
Active Directory Users And Computers Part 3
Create And Manage Groups And OUs
Create And Manage Groups And OUs Part 2
CREATE AND MANAGE GROUP POLICY
Create Group Policy Objects (GPOs)
Create Group Policy Objects (GPOs) Part 2
Create Group Policy Objects (GPOs) Part 3
Create Group Policy Objects (GPOs) Part 4
Create Group Policy Objects (GPOs) Part 5
Configure Security Policies
Configure Security Policies Part 2
Configure Application Restriction Policies
Configure Application Restriction Policies Part 2
Configure Windows Firewall
- OVERVIEW OF MCSA WINDOWS SERVER 2012 R2 (70-411)
Overview Of Windows Server 2012 R2
DEPLOY, MANAGE, AND MAINTAIN SERVERS
Deploy And Manage WDS
Windows Deployment Services Part 2
Configuring WSUS
Configuring WSUS Part 2
Monitoring Servers
Driver Groups And Packages
Patch Management In Mixed Environments
Performance Monitor
CONFIGURE FILE AND PRINT SERVICES
Distributed File System
File Server Resource Manager
File Server Resource Manager Part 2
File And Disk Encryption
EFS And Audit Policies
CONFIGURE NETWORK SERVICES AND ACCESS
Configure DNS Zones
Configure DNS Records
Configure VPN And Routing
Configuring DirectAccess
CONFIGURE A NETWORK POLICY SERVER INFRASTRUCTURE
NPS And NAP
CONFIGURE AND MANAGE ACTIVE DIRECTORY
Operation Master Roles
Read Only Domain Controllers
Configure Account Policies
CONFIGURE AND MANAGE GROUP POLICY
Group Policy Processing
Group Policy Processing Part 2
Group Policy Processing Part 3
Group Policy Settings
Group Policy Settings Part 2
Group Policy Objects
Group Policy Preferences
- ADVANCED NETWORK SERVICES
Overveiw
Advanced Network Services
Advanced Network Services Part 2
Advanced Network Services Part 3
Advanced Network Services Part 4
Advanced Network Serivces Part 5
Advanced Network Services Part 6
Advanced Network Services Part 7
Advanced Network Services Part 8
Advanced Network Services Part 9
Advanced Network Services Part 10
ADVANCED FILE SERVICES
Advanced File Services
Advanced File Services Part 2
Advanced File Services Part 3
Advanced File Services Part 4
Advanced File Services Part 5
Advanced File Services Part 6
IMPLEMENTING DYNAMIC ACCESS CONTROL
Implementing Dynamic Access Control
Implementing Dynamic Access Control Part 2
Access Denied Assistance And Work Folders
DISTRIBUTED AD DS DEPLOYMENTS
Distributed AD DS Deployments
Distributed AD DS Deployments Part 2
Distributed AD DS Deployments Part 3
AD DS SITES AND REPLICATION
AD DS Sites And Replication
AD DS Sites And Replication Part 2
AD DS Sites And Replication Part 3
AD DS Sites And Replication Part 4
IMPLEMENTING AD CS
Implementing AD CS
Implementing AD CS Part 2
Implementing AD CS Part 3
Implementing AD CS Part 4
Implementing AD CS Part 5
Implementing AD CS Part 6
IMPLEMENTING AD RMS
Implementing AD RMS
Implementing AD RMS Part 2
Implementing AD RMS Part 3
Implementing AD RMS Part 4
Implementing AD RMS Part 5
IMPLEMENTING AD FS
Implementing AD FS
Implementing AD FS Part 2
Implementing AD FS Part 3
Implementing AD FS Part 4
Implementing AD FS Part 5
Implementing AD FS Part 6
Implementing AD FS Part 7
IMPLEMENT NETWORK LOAD BALANCING
Implement Network Load Balancing
Implement Network Load Balancing Part 2
Implement Network Load Balancing Part 3
CONFIGURE FAILOVER CLUSTERING
Configure Failover Clustering
Configure Failover Clustering Part 2
Configure Failover Clustering Part 3
Configure Failover Clustering Part 4
Configure Failover Clustering Part 5
Manage Failover Clustering Role
Manage Failover Clustering Role Part 2
CONFIGURE AND MANAGE HIGH AVAILABILITY
Manage VM Movement
Manage VM Movement Part 2
Manage VM Movement Part 3
IMPLEMENT BC AND DR
Implement BC And DR
Implement BC And DR Part 2
Implement BC And DR Part 3
Configure Site-Level Fault Tolerance
Configure Site-Level Fault Tolerance Part 2
- INSTALL WINDOWS SERVERS IN HOST AND COMPUTE ENVIRONMENTS
Overview
Windows Server 2016 Editions
Install With Desktop Experience
Install And Manage Server Core
Server Management Options
Server Management Options Part 2
Server Management Options Part 3
Roles And Features
Roles And Features Part 2
Upgrade Servers
Migrate Servers
Migrate Servers Part 2
Desired State Configuration
Activation Models
Activation Models Part 2
Nano Server
Nano Server Part 2
Nano Server Part 3
Nano Server Part 4
Create, Manage And Maintain Images
Create, Manage And Maintain Images Part 2
Create, Manage And Maintain Images Part 3
IMPLEMENT STORAGE SOLUTIONS
Configure Disks And Volumes
Configure Disks And Volumes Part 2
File And Folder Permissions
File And Folder Permissions Part 2
Configure Shares
Configure Shares Part 2
Virtual Hard Disks
Configure Storage Pools
Configure Storage Pools Part 2
Configure ISCSI Target And Initiator
Configure ISCSI Target And Initiator Part 2
Configure DCB And MPIO
Configure Storage Replica
Implement Data Deduplication
IMPLEMENT HYPER-V
Hyper-V
Hyper-V Part 2
Manage VMs With PowerShell Direct
Configure VM Settings
Configure VM Settings Part 2
Configure VM Settings Part 3
Linux And FreeBSD VMs
Secure Boot And Network Isolation
Implement Discrete Device Assignment
Upgrading, Exporting And Importing VMs
Configure Hyper-V Storage
Configure Hyper-V Storage Part 2
Create And Manage Checkpoints
Configure Virtual Switches
Configure Virtual NICs
Configure Virtual NICs Part 2
NIC Teaming
IMPLEMENT WINDOWS CONTAINERS
Introduction To Windows Containers
Getting Started With Windows Containers
Getting Started With Windows Containers Part 2
Getting Started With Windows Containers Part 3
Getting Started With Windows Containers Part 4
Manage Windows Containers
Manage Container Data Volumes
Manage Container Networking
Manage Container Images With Azure
Manage Container Images With Azure Part 2
IMPLEMENT HIGH AVAILABILITY
High Availability Migration Options
High Availability Migration Options Part 2
Introduction To Failover Clustering
Implement Failover Clustering
Implement Failover Clustering Part 2
Implement Scale-Out File Server
Additional Cluster Storage Options
Cluster-Aware Updating And OS Rolling Upgrades
Implement Resiliency And Restoration
Configure Cluster Networking
Implement Storage Spaces Direct
Manage Failover Clustering
Manage VM Movement In Clustered Nodes
Implement Network Load Balancing
Implement Network Load Balancing Part 2
MAINTAIN AND MONITOR SERVER ENVIRONMENTS
Implement WSUS
Implement WSUS Part 2
Backup And Restore
Backup And Restore Part 2
Monitor Using Performance Monitor
Monitor Using Performance Monitor Part 2
Monitor Using Server Manager And WAC
Monitor Using Event Viewer
- IMPLEMENT DOMAIN NAME SYSTEM (DNS)
Overview
Install And Configure DNS Servers
Install And Configure DNS Server Part 2
Configure Advanced DNS Settings
Configure Advanced DNS Settings Part 2
Configure Advanced DNS Settings Part 3
Administering DNS
Create And Configure DNS Zones
Create And Configure DNS Zones Part 2
Create And Configure DNS Zones Part 3
Create And Configure DNS Zones Part 4
Create And Configure DNS Records
Create And Configure DNS Records Part 2
Create And Configure DNS Records Part 3
Configure DNS Scopes
Monitor DNS
IMPLEMENT DHCP AND IPAM
Install And Configure DHCP
Install And Configure DHCP Part 2
DHCP Scopes And Options
DHCP Scopes And Options Part 2
DHCP Scopes And Options Part 3
DHCP Advanced Configuration
DHCP Advanced Configuration Part 2
DHCP Advanced Configuration Part 3
DHCP Advanced Configuration Part 4
Manage And Maintain DHCP
Manage And Maintain DHCP Part 2
Manage And Maintain DHCP Part 3
IP Address Management (IPAM)
IP Address Management (IPAM) Part 2
IP Address Management (IPAM) Part 3
IP Address Management (IPAM) Part 4
Manage DNS And DHCP Using IPAM
IMPLEMENT REMOTE ACCESS SOLUTIONS
Network Connectivity Solutions
Implement Virtual Private Networks
Implement Virtual Private Networks Part 2
Implement Virtual Private Networks Part 3
Implement Virtual Private Networks Part 4
Implement DirectAccess
Implement DirectAccess Part 2
Implement DirectAccess Part 3
IMPLEMENT CORE AND DISTRIBUTED NETWORK SOLUTIONS
IPv4 And IPv6 Addressing
IPv4 And IPv6 Addressing Part 2
IPv4 And IPv6 Addressing Part 3
Implement Distributed File System (DFS)
Implement Distributed File System (DFS) Pt2
Implement Distributed File System (DFS) Pt3
Implement BranchCache
Implement BranchCache Part 2
Implement BranchCache Part 3
IMPLEMENT AN ADVANCED NETWORK INFRASTRUCTURE
High Performance Network Solutions
High Performance Network Solutions Part 2
Software Defined Networking
Software Defined Networking Part 2
- INSTALL AND CONFIGURE ACTIVE DIRECTORY DOMAIN SERVICES
Overview
Install And Configure Domain Controllers
Install And Configure Domain Controllers Part 2
Install And Configure Domain Controllers Part 3
Install And Configure Domain Controllers Part 4
FSMO Roles
Read-Only Domain Controllers
Domain Controller Cloning
Create And Manage AD Users And Computers
Create And Manage AD Users And Computers Part 2
Create And Manage AD Users And Computers Part 3
Create And Manage AD User And Computers Part 4
AD Groups And Organizational Units
AD Groups And Organizational Units Part 2
AD Groups And Organizational Units Part 3
MANAGE AND MAINTAIN AD DS
Service Authentication And Account Policies
Service Authentication And Account Policies Part 2
Service Authentication And Account Policies Part 3
Service Authentication And Account Policies Part 4
Maintain Active Directory
Maintain Active Directory Part 2
Maintain Active Directory Part 3
Maintain Active Directory Part 4
Maintain Active Directory Part 5
AD Replication And RODCs
AD Replication And RODCs Part 2
AD Replication And RODC Part 3
Configure A Complex AD Environment
Configure A Complex AD Environment Part 2
Active Directory Trusts
Active Directory Trusts Part 2
Active Directory Trusts Part 3
Active Directory Sites
Active Directory Sites Part 2
Active Directory Sites Part 3
CREATE AND MANAGE GROUP POLICY
Create And Manage Group Policy Objects
Create And Manage Group Policy Objects Part 2
Create And Manage Group Policy Objects Part 3
Create And Manage Group Policy Objects Part 4
Configure Group Policy Processing
Configure Group Policy Processing Part 2
Configure Group Policy Processing Part 3
Configure Group Policy Processing Part 4
Configure Group Policy Settings
Configure Group Policy Settings Part 2
Configure Group Policy Settings Part 3
Configure Group Policy Settings Part 4
Configure Group Policy Preferences
Configure Group Policy Preferences Part 2
IMPLEMENT ACTIVE DIRECTORY CERTIFICATE SERVICES
Install And Configure Certificate Services
Install And Configure Certificate Services Part 2
Install And Configure Certificate Services Part 3
Install And Configure Certificate Services Part 4
Install And Configure Certificate Services Part 5
Manage Certificates
Manage Certificates Part 2
Manage Certificates Part 3
Manage Certificates Part 4
Manage Certificates Part 5
IMPLEMENT IDENTITY FEDERATION AND ACCESS SOLUTIONS
Install And Configure AD Federation Services
Install And Configure AD Federation Services Pt.2
Install And Configure AD Federation Services Pt.3
Implement Web Application Proxy (WAP)
Implement Web Application Proxy (WAP) Part 2
Configure AD Rights Management Services
Configure AD Rights Management Services Pt.2
Configure AD Rights Management Services Pt.3
- OVERVIEW FOR MCSE WINDOWS SERVER 2012 R2 (70-413)
Overview Of MCSE Windows Server 2012 (70-413)
PLAN AND DEPLOY A SERVER INFRASTRUCTURE
Designing A Server Infrastructure
Planning Server Deployments
Server Migration And VM Roles
Planning For Storage
DESIGN AND IMPLEMENT NETWORK INFRASTRUCTURE SERVICES
Network Infrastructure
DESIGN AND IMPLEMENT NETWORK ACCESS SERVICES
Planning Network Access
Planning Network Access Part 2
Planning Network Access Part 3
DESIGN AND IMPLEMENT AN ACTIVE DIRECTORY INFRASTRUCTURE (LOGICAL)
Planning For AD (Logical)
Planning For AD (Logical) Part 2
DESIGN AND IMPLEMENT AN ACTIVE DIRECTORY INFRASTRUCTURE (PHYSICAL)
Planning For AD (Physical)
Planning For AD (Physical) Part 2
- OVERVIEW OF MCSE WINDOWS SERVER 2012 (70-414)
Overview Of MCSE Windows Server 2012 (70-414)
MANAGE AND MAINTAIN A SERVER INFRASTRUCTURE
Manage And Maintain Server Infrastructure
Design An Admin Model
Design A Monitoring Strategy
Automated Remediation
PLAN AND IMPLEMENT A HIGHLY AVAILABLE ENTERPRISE INFRASTRUCTURE
Highly Available Infrastructure
Failover Clustering
Failover Clustering Part 2
HA With Network Services
HA Storage Solutions
BC And DR Solutions
PLAN AND IMPLEMENT A SERVER VIRTUALIZATION INFRASTRUCTURE
Virtualization Infrastructure
Virtualization Hosts
Plan And Implement VMs
Virtualization Storage
Virtual Machine Movement
Plan Virtualization Networking
Maintain VM Infrastructure
DESIGN AND IMPLEMENT IDENTITY AND ACCESS SOLUTIONS
Identity And Access Solutions
Design A CA Infrastructure
Design A CA Infrastructure Part 2
Design A CA Infrastructure Part 3
Design A CA Infrastructure Part 4
Implement And Manage Certificates
Implement And Manage Certificates Part 2
Implement And Manage Certificates Part 3
Implementing Federated Identity
Implementing Federated Identity Part 2
Implementing Federated Identity Part 3
Implementing Federated Identity Part 4
Implementing Federated Identity Part 5
Dynamic Access Control
Implementing Rights Management
Implementing Rights Management Part 2
Implementing Rights Management Part 3
Implementing Rights Management Part 4
Configuring AD-RMS
Configuring AD-RMS Part 2
Configuring AD-RMS Part 3
Configuring AD-RMS Part 4
- SECURITY OVERVIEW
Overview
Security Overview
Security Overview Part 2
Configure Disk And File Encryption – EFS
Configure Disk And File Encryption – EFS Pt.2
Configure Disk And File Encryption – Bitlocker
Configure Disk And File Encryption – Bitlocker Pt2
Configure Disk And File Encryption – BitLocker Pt3
Configure Disk And File Encryption – BitLocker Pt4
Configure Disk And File Encryption – BitLocker CSV
Configure Disk And File Encryption: BitLocker VTPM
Antimalware Protection W/ Windows Defender
Antimalware Protection W/ Windows Defender Pt2
Antimalware Protection W/ Windows Defender Pt3
Antimalware Protection W/ Windows Defender Pt4
Windows Defender, WSUS And Windows Update
AppLocker
Device Guard And Control Flow Guard
Device Guard And Control Flow Guard Part 2
Protect Credentials
Protect Credentials Part 2
Create Security Baselines
Create Security Baselines Part 2
SECURE A VIRTUALIZATION INFRASTRUCTURE
Guarded Fabric – Host Guardian Service Overview
Guarded Fabric – HGS Install And Configuration
Guarded Fabric – HGS Install And Configuration Pt2
Guarded Fabric – Admin Trusted Attestation
Guarded Fabric – Admin Trusted Attestation Part 2
Guarded Fabric – TPM Trusted Attestation
Guarded Fabric – TPM Trusted Attestation Part 2
Guarded Fabric – TPM Trusted Attestation Part 3
Guarded Fabric – Troubleshooting Guarded Hosts
Implement Shielded And Encryption-Supported VMs
Troubleshoot Shielded And Encryption-Supported VMs
SECURING NETWORK INFRASTRUCTURE
What Is A Firewall
Configuring The Windows Firewall – Basics
Configuring The Windows Firewall – Basics Pt2
Configuring The Windows Firewall – IPSec
Configuring The Windows Firewall – IPSec Pt2
Configuring The Windows Firewall – IPSec Pt3
Configuring The Windows Firewall – Advanced
Configuring The Windows Firewall – Advanced Pt2
Configuring The Windows Firewall – Advanced Pt3
Software Defined Datacenter Firewall – Overview
Software Defined Datacenter Firewall – On Azure
Software Defined Datacenter Firewall – With WAC
Secure Network Traffic – DNS Cache Locking
Secure Network Traffic – DNS Socket Pool
Secure Network Traffic – DNSSEC
Secure Network Traffic – DNSSEC Part 2
Secure Network Traffic – DNS RRL And DANE
Secure Network Traffic – MSFT Message Analyzer
Secure Network Traffic – SMB Protocol Security
MANAGE PRIVILEGED IDENTITIES
Just In Time Administration – Overview
Just In Time Administration – Demo Setup
Just In Time Administration – Hands-On
Just In Time Administration – Hands-On Part 2
Implement Just Enough Administration
Implement Just Enough Administration Pt.2
Implement Just Enough Administration Pt.3
Implement Just Enough Administration Pt.4
Implement Just Enough Administration Pt.5
Implement Just Enough Administration Pt.6
Implement A PAWS Solution
Implement User Rights Assignments
Implement User Rights Assignments Part 2
Implement User Rights Assignments Part 3
Delegation Of Control Wizard
Authentication Policies And Policy Silos
Account Types And Security
Remote Credential Guard
Enhanced Security Administrative Environment
Local Administrator Password Solution (LAPS)
Local Administrator Password Solution (LAPS) Pt2
Local Administrator Password Solution (LAPS) Pt3
IMPLEMENT THREAT DETECTION SOLUTIONS
Configure Advanced Audit Policies
Configure Advanced Audit Policies Part 2
Configure Advanced Audit Policies Part 3
Microsoft Advanced Threat Analytics
Microsoft Advanced Threat Analytics Part 2
Microsoft Advanced Threat Analytics Part 3
Determine Threat Detection Solutions Using OMS
IMPLEMENT WORKLOAD-SPECIFIC SECURITY
Secure Development And Workload Infrastructure
Implement Secure File Services Infrastructure
Implement Secure File Services Infrastructure Pt2
Implement Secure File Services Infrastructure Pt3
Implement Secure File Services Infrastructure Pt4
Work Folders And File Access Auditing
Implement Dynamic Access Control (DAC)
Implement Dynamic Access Control (DAC) Pt2
Implement Dynamic Access Control (DAC) Pt3
- QUERYING DATA WITH T-SQL
Overview
Introduction To Transact-SQL
Introduction To Transact-SQL Part 2
Retrieving Data With SELECT
Retrieving Data With SELECT Part 2
Combining Results With JOIN
Combining Results With JOIN Part 2
Combining Results With JOIN Part 3
MODIFYING DATA WITH T-SQL
Adding Data With INSERT
Changing Data With UPDATE
Removing Data With DELETE
Recording Changes With OUTPUT
WORKING WITH FUNCTIONS
Querying Data With Functions
Querying Data With Functions Part 2
Aggregating Data
Performing Arithmetic
Working With Dates
System Functions
WORKING WITH DATA TYPES
Data Types
Data Types Part 2
Custom Data Types
Converting Data Types
Converting Data Types Part 2
Conditions And Nulls
PROGRAMMING DATABASES WITH T-SQL
User Defined Functions
Stored Procedures
Creating Views
Transactions
Transactions Part 2
Error Handling
Error Handling Part 2
ADVANCED TRANSACT-SQL
Subqueries
Subqueries Part 2
Grouping Sets And Cubes
Grouping Sets And Cubes Part 2
Ranking Data With Window Functions
Ranking Data With Window Functions Part 2
Pivot And Unpivot Data
Table Expressions And Apply
WORKING WITH JSON AND XML
Working With XML
Working With JSON
CISCO
- NETWORKING FUNDAMENTALS
Overview
Networking Components: Overview
Networking Components: Routers And Switches
Networking Components: NGFW And NGIPS
Networking Components: Cisco DNA Center
Networking Components: WLCs And Access Points
Networking Components: Servers And Endpoints
Networking Topology Architectures: Overview
Network Topology Architectures: Data Center
Networking Topology Architectures: WAN
Networking Topology Architecture: Cloud
Networking Topology Architectures: SOHO
Layer 1: Interfaces And Cabling
Layer 1: Interfaces And Cabling Part 2
Layer 1: Interfaces And Cabling Part 3
Identifying Layer 1 Issues
Identifying Layer 1 Issues Part 2
Networking Protocols
Networking Protocols Part 2
IP Addressing: Overview
IP Addressing: IPv4 Basics
IP Addressing: IPv4 Configuration
IP Addressing: IPv4 Subnetting Review
IP Addressing: IPv4 Subnetting Class C
IP Address: IPv4 Subnetting Class B
IP Addressing: IPv4 Subnetting Class A
IP Addressing: VLSM
IP Addressing: IPv6 Basics And Address Types
IP Addressing: IPv6 Basics And Address Types Pt.2
IP Addressing: IPv6 Configuration
IP Addressing: Client OS
Virtualization Fundamentals
Virtualization Fundamentals Part 2
NETWORK ACCESS
Network Access Overview
Cisco Switching: Basic Concepts
Cisco Switching: VLAN Configurations
Cisco Switch: VLAN Configurations Part 2
Cisco Switching: Interswitch Connectivity
Cisco Switching: Interswitch Connectivity Part 2
Cisco Switching: L2 Discovery Protocols
Cisco Switching: L2 Discovery Protocols Part 2
Cisco Switching: L2 Etherchannel Configuration
Cisco Switching: L2 Etherchannel Config Pt.2
Cisco Switching: L3 Etherchannel Configuration
Cisco Switching: Spanning Tree Protocol Basics
Cisco Switching: STP Operations
Cisco Switching: STP Configuring RPVSTplus
Cisco Switching: STP Portfast And BPDUguard
Cisco Wireless Basics
Cisco Wireless Architecture
Cisco WLAN Components
Cisco WLC Configuration
Cisco Wireless Management Access
IP CONNECTIVITY
IP Connectivity: Overview
IP Connectivity: Routing Basics
IP Connectivity: IPv4 Static Default, Net Routes
IP Connectivity: IPv4 Static Host, Floating Routes
IP Connectivity: IPv6 Static Default, Net Routes
IP Connectivity: IPv6 Static Host, Floating Routes
IP Connectivity: Dynamic Routing Basics
IP Connectivity: Single Area OSPFv2
IP Connectivity: Single Area OSPFv2 Part 2
IP Connectivity: First Hop Redundancy Protocols
IP Connectivity: First Hop Redundancy Proto Pt2
IP SERVICES
IP Services Overview
IP Services: Configuring, Verifying NAT
IP Services: Configuring, Verifying NAT Pt.2
IP Services: Configuring NTP
IP Services: DNS And DHCP
IP Services: DNS And DHCP Part 2
IP Services: Configuring SNMP
IP Services: Understanding Syslog
IP Services: Understanding PHB For QoS
IP Services: Configuring SSH
IP Services: Using FTP And TFTP
SECURITY FUNDAMENTALS
Security Fundamentals Overview
Key Security Concepts
Security Program Components
Security Password Policy Components
Intro To AAA Security
Understanding VPN Types
Configuring And Verifying Standard ACLs
Configuring And Verifying Extended ACLs
Configuring And Verifying Named ACLs
Configuring Port Security-Static
Configuring Port Security-Sticky
Configuring DHCP Snooping And DAI
AUTOMATION AND PROGRAMMABILITY
Automation And Programmability Overview
Intro To Network Programmability
Intro To SDN Architectures
Intro To API Concepts
Intro To REST-Based APIs
Intro To Cisco DNA Center
Intro To Config Management Utilities
Interpret JSON Encoded Data
- NETWORK FUNDAMENTALS
Overview
What Is Networking?
Understand And Apply The OSI Model
Understand And Apply The OSI Model Part 2
Understand And Apply The OSI Model Part 3
Understand And Apply TCP/IP Model
Compare And Contrast TCP And UDP
Describe Enterprise Infrastructure Components
Compare And Contrast Network Topologies
Describe Enterprise Networking Architecture
Select Appropriate Cabling
Understand And Apply IPv4 Addressing
Understand And Apply IPv4 Addressing Part 2
Understand And Apply IPv4 Addressing Part 3
Understand And Apply IPv4 Addressing Part 4
Understand And Apply Subnetting
Understand And Apply Subnetting Part 2
Understand Class B Subnetting
Understand Class B Subnetting Part 2
Understand Class B Subnetting Part 3
Identify IPv6 Addressing Scheme
Identify IPv6 Addressing Scheme Part 2
Identify IPv6 Addressing Scheme Part 3
Perform Initial Device Configuration
Perform Initial Device Configuration Part 2
Perform Initial Device Configuration Part 3
Configure IPv4 Addressing
Configure IPv4 Addressing Part 2
Configure IPv4 Addressing Part 3
Configure IPv6 Addressing
Configure IPv6 Addressing Part 2
Apply Troubleshooting Methodologies
Apply Troubleshooting Methodologies Part 2
Apply Troubleshooting Methodologies Part 3
Interact With Cisco Devices
Interact With Cisco Devices Part 2
LAN SWITCHING FUNDAMENTALS
Describe And Verify Switching Concepts
Describe And Verify Switching Concepts Part 2
Describe And Verify Switching Concepts Part 3
Interpret Ethernet Frame Format
Interpret Ethernet Frame Format Part 2
Troubleshoot Interfaces And Cables
Troubleshoot Interfaces And Cables Part 2
Configure And Verify VLANs
Configure And Verify VLANs Part 2
Configure And Verify VLANs Part 3
Configure Multiple Switches
Configure Multiple Switches Part 2
Configure Multiple Switches Part 3
Configure And Verify Layer 2 Protocols
Configure And Verify Port Security
Configure And Verify Port Security Part 2
ROUTING FUNDAMENTALS
Describe Routing Concepts
Describe Routing Tables
Describe Routing Tables Part 2
Configure InterVLAN Routing
Configure InterVLAN Routing Part 2
Configure Static Routing IPv4
Configure Static Routing IPv6
Configure RIPv2 For IPv4
Configure RIPv2 For IPv4 Part 2
Configure RIPv2 For IPv4 Part 3
INFRASTRUCTURE SERVICES
Describe And Configure DNS On A Router
Describe And Configure DNS On A Router Part 2
Configure DHCP On A Router
Configure DHCP On A Router Part 2
Configure And Verify NTP
Configure And Verify NTP Part 2
Configure Standard Access Lists
Configure Standard Access Lists Part 2
Configure Standard Access Lists Part 3
Configure Standard Access Lists Part 4
Configure NAT
Configure NAT Part 2
Configure NAT Part 3
INFRASTRUCTURE MAINTENANCE
Implement Device Monitoring
Configure Device Management
Implement Initial Device Hardening
Implement Initial Device Hardening Part 2
Perform Device Management
SUBNETTING
Subnetting Practice
Subnetting Practice Part 2
- LAN SWITCHING TECHNOLOGIES
Overview
Configure VLANs
Configure VLANs Part 2
Configure Trunking
Configure Trunking Part 2
Configure Trunking Part 3
Configure Trunking Part 4
Understand And Configure STP
Understand And Configure STP Part 2
Understand And Configure STP Part 3
Understand And Configure STP Part 4
Understand And Configure STP Part 5
Configure PortFast And BPDU Guard
Configure Etherchannel
Configure Etherchannel Part 2
Configure Etherchannel Part 3
Describe Switch Aggregation Benefits
Describe Switch Threat And Mitigation
ROUTING TECHNOLOGIES
Configure InterVLAN Routing
Configure InterVLAN Routing Part 2
Compare And Contrast IGPs
Compare And Contrast IGPs Part 2
Compare And Contrast IGPs Part 3
Configure Single Area OSPFv2
Configure Single Area OSPF Part 2
Configure Single Area OSPFv2 Part 3
Configure Single Area OSPFv2 Part 4
Configure Multiarea OSPFv2
Configure Multiarea OSPFv2 Part 2
Configure Multiarea OSPFv2 Part 3
Configure Single-Area OSPFv3
Configure Multiarea OSPFv3
Understand EIGRP Concepts And Operations
Understand EIGRP Concepts And Operations Part 2
Understand EIGRP Concepts And Operations Part 3
Configure EIGRP For IPv4 Ccna2018
Configure EIGRP For IPv4 Part 2
Configure EIGRP For IPv6
WAN TECHNOLOGIES
Configure PPP And MLPPP
Configure PPP And MLPPP Part 2
Configure Client-Side PPPoE
Configure GRE Tunnel Connectivity
Describe WAN Topology Options
Describe WAN Access Connectivity
Configure Single-Homed Branch – EBGP IPv4
INFRASTRUCTURE SERVICES
Configure Basic HSRP
Describe Cloud Resource Impact On Enterprise
Describe Basic QoS Concepts
Configure Access-Lists For Filtering
Configure Access-Lists For Filtering Part 2
Use APIC-EM Path Trace
INFRASTRUCTURE MAINTENANCE
Configure SNMP For Device Monitoring
Troubleshoot Connectivity With IP SLA
Troubleshoot Problems With SPAN
Describe Device Mgmt Using AAA
Describe Network Programmability
Troubleshoot End-To-End Connectivity
- SECURITY CONCEPTS
Overview
Describe CIA Triad And SIEM Technology
Describe CIA Triad And SIEM Technology Pt2
Identify Common Security Terms
Describe Common Network Attacks
Describe Common Network Attacks Part 2
Describe Common Network Attacks Part 3
Identify Common Malware Types
Classify Data Loss Vectors
Describe Encryption Methods
Describe Encryption Methods Part 2
Describe Crypto Key Exchange
Describe Crypto Key Exchange Part 2
Describe Network Topologies
Describe Network Topologies Part 2
SECURE ACCESS
Compare In-Band And Out-Of-Band Mgmt
Configure And Verify Secure Mgmt
Configure And Verify Secure Mgmt Part 2
Secure Management Plane Access
Secure Management Plane Access Part 2
Configure And Verify SNMPv3
Configure And Verify NTP Security
Configure And Verify NTP Security Part 2
Describe AAA Technologies
Configure Access Using TACACSplus
Configure Access Using TACACSplus Part 2
Use SCP For File Transfer
Explain AD Integration With AAA
Describe Using Cisco ACS And ISE
Identify 802.1x Components And Functions
Describe BYOD Framework And MDM
VPN
Describe IPsec Protocols And Modes
Describe VPN Implementations
Setup Clientless SSL VPN Using ASDM
Setup AnyConnect VPN Using ASDM
Setup AnyConnect VPN Using ASDM Part 2
Setup IPsec Site-To-Site VPN With PSK
Setup IPsec Site-To-Site VPN With PSK Part 2
SECURE ROUTING AND SWITCHING
Secure CLI Access And IOS
Secure CLI Access And IOS Part 2
Setup OSPF Authentication With MD5
Setup EIGRP Authentication With MD5
Setup L2 Attack Mitigation
Setup L2 Attack Mitigation Part 2
Setup L2 Attack Mitigation Part 3
Explain Control Plane Policing
Setup PVLANs For L2 Security
Describe Native VLAN Security Issues
CISCO FIREWALL TECHNOLOGIES
Describe Different Firewall Technologies
Implement NAT On Cisco ASA 9.X
Implement NAT On Cisco ASA 9.X Part 2
Setup Zone Based Firewall: Zone To Zone
Setup Zone Based Firewall: Self Zone
Configure ASA: Access Management
Configure ASA: Security Access Policies
Configure ASA: Modular Policy Framework
Describe Firewall Features
IPS
Describe IPS Deployment Considerations
Configure Cisco IOS IPS
Configure Cisco IOS IPS Part 2
Configure IPS Policy On Cisco FMC
CONTENT AND ENDPOINT SECURITY
Describe Threat Mitigation For Email
Describe Threat Mitigation For Web
Describe Threat Mitigation For Endpoints
- NETWORK CONCEPTS
Overview
Describe Network Models
Describe Network Models Part 2
Describe Network Models Part 3
Describe Basic Networking Protocols
Describe Basic Networking Protocols Part 2
Describe Basic Networking Services
Describe Basic Networking Services Part 2
Describe Networking Devices Operations
Describe Networking Devices Operations Part 2
Describe Network Security Systems
Describe Basic Network Addressing
Describe Basic Network Addressing Part 2
Describe VLANS And Data Visability
Describe ACL Usage On Interfaces
Describe ACL Usage On Interfaces Part 2
Compare Different Filtering Methods
Compare Packet Capture Methods
Compare Packet Analysis Output
Compare Packet Analysis Output Part 2
Identify Traffic Loss From Packet Analysis
SECURITY CONCEPTS
Describe Defense In Depth Principles
Define Security Concepts And Terms
Define Security Concepts And Terms Part 2
Understand Access Control Models
Compare Security Admin Terms
Describe Security Management Concepts
CRYPTOGRAPHY
Describe Crypto Algorithm Usage
Describe Crypto Algorithm Usage Part 2
Describe Digital Signature Creation
Describe PKI Operations
Describe Key Exchange Security
Describe SSL TLS Components
Describe SSL TLS Components Part 2
Describe Hashing Algorithms
Encryption Algorithms And Protocols
Encryption Algorithms And Protocols Part 2
HOST-BASE ANALYSIS
Define Windows Terms
Define Linux Terms
Define Linux Terms Part 2
Describe Endpoint Security Monitoring
Interpret OS Log Data
Interpret OS Log Data Part 2
SECURITY MONITORING
Identify Data Types
Identify Data Types Part 2
Identify Data Types Part 3
Describe NSM Data
Describe Monitoring Context
Describe Monitoring Context Part 2
Describe NGIPS Events
Monitor Protocols
Monitor Protocols Part 2
ATTACK METHODS
Describe Security Attack Concepts
Describe Network And Web App Attacks
Describe Network And Web App Attacks Part 2
Describe Attacks And Evasion Methods
Describe Attacks And Evasion Methods Part 2
- ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS
Overview
Read Analysis Reports
Read Analysis Reports Part 2
Read Analysis Reports Part 3
Describe CVSS 3.0
Describe CVSS 3.0 Part 2
Describe CVSS 3.0 Part 3
Understand Windows File Systems
Understand Windows File Systems Part 2
Understand Linux File Systems
Identify Forensic Evidence
Identify Forensic Evidence Part 2
NETWORK INTRUSION ANALYSIS
Interpret Basic Regular Expressions
Interpret Basic Regular Expressions Part 2
Describe Protocol Headers
Describe Protocol Headers Part 2
Describe Protocol Headers Part 3
Describe IP Headers
Describe IP Headers Part 2
Describe IP Headers Part 3
Describe ICMP Intrusion
Describe ICMP Intrusion Part 2
Describe ICMP Intrusion Part 3
Describe ICMP Intrusion Part 4
Describe Transport Layer Headers
Describe Transport Layer Headers Part 2
Describe Transport Layer Headers Part 3
Describe HTTP Headers
Describe HTTP Headers Part 2
Describe HTTP Headers Part 3
Identify Netflow V5 Records
Identify Netflow V5 Records Part 2
Examine Intrusion Events
Intrusion Event Technologies
Intrusion Event Technologies Part 2
Intrusion Event Technologies Part 3
Intrusion Impact Analysis
Intrusion Impact Analysis Part 2
INCIDENT RESPONSE
Incident Response Elements
Incident Response Elements Part 2
Describe CSIRT Goals
Identify Cybersec Elements And Frameworks
DATA AND EVENT ANALYSIS
Describe Data Normalization
Describe 5 Tuple Correlation
FirePower Management Console
Compare And Contrast Analysis Methods
INCIDENT HANDLING
Classify And Categorize Intrusions
Classify And Categorize Intrusions Part 2
Classify And Categorize Intrusions Part 3
Apply NIST.SP800-61 R2 To Events
NIST SP800-86 Evidence Handling
Apply VERIS Schema Categories
- NETWORK PRINCIPLES
Overview
Cisco Express Forwarding
General Network Challenges
IP Operations
IP Operations Part 2
Explain TCP Operations
Describe UDP Operations
Understanding Network Changes
LAYER 2 TECHNOLOGIES
Point-To-Point Protocol (PPP)
Point-To-Point Protocol (PPP) Part 2
Explain Frame Relay Operations
Explain Frame Relay Operations Part 2
Explain Frame Relay Operations Part 3
LAYER 3 TECHNOLOGIES
IPv4 Addressing
IPv4 Addressing Part 2
IPv4 Addressing Part 3
IPv4 Addressing Part 4
IPv6 Addressing
IPv6 Addressing Part 2
IPv6 Addressing Part 3
Static Routing
Static Routing Part 2
Default Routing
Routing Protocol Types
Routing Protocol Types Part 2
Administrative Distance
Administrative Distance
Passive Interfaces
VRF Lite
VRF Lite Part 2
Filtering Routes
Filtering Routes Part 2
Filtering Routes Part 3
Route Redistribution
Route Redistribution Part 2
Route Redistribution Part 3
Route Summarization
Route Summarization Part 2
Route Summarization Part 3
Policy Based Routing
Route Maps
Loop Prevention
Loop Prevention Part 2
Loop Prevention Part 3
RIPv2 Configuration
Describe RIPng
EIGRP Fundamentals
EIGRP Packet Types
EIGRP Neighbors
EIGRP Neighbors Part 2
EIGRP Authentication
EIGRP Stubs
EIGRP Stubs Part 2
EIGRP Load Balancing
EIGRP Metrics
EIGRP Over IPv6
OSPF Packet Types
Basic OSPF Configuration
Basic OSPF Configuration Part 2
OSPF Network Types
OSPF LSA Types
OSPF Route Types
OSPF Area Types
OSPF Area Types Part 2
OSPF Virtual Links
Manipulating OSPF Paths
IPv6 Routing With OSPF
Introduction To BGP
Configuring BGP
Configuring BGP Part 2
Configuring BGP Part 3
Configuring BGP Part 4
BGP Attributes
BGP Attributes Part 2
VPN TECHNOLOGIES
GRE Tunnels
GRE Tunnels Part 2
Describe DMVPN
Easy Virtual Networking
IPsec Tunnels
INFRASTRUCTURE SECURITY
AAA Configuration
Device Access Control
Device Access Control Part 2
Router Security Features
Router Security Features Part 2
INFRASTRUCTURE SERVICES
Device Management
Device Management Part 2
SNMPv2 And SNMPv3
Configure And Verify NTP
Debugging And Logging
Debugging And Logging
Debugging And Logging Part 2
Debugging And Logging Part 2
Configure And Verify DHCP
Configure And Verify DHCP Part 2
Configure And Verify DHCP Part 3
Network Address Translation
Network Address Translation Part 2
Configuring IP SLAs
Tracking Objects
Netflow
- LAYER 2 TECHNOLOGIES
Overview
Switch Administration
Switch Administration Part 2
Layer 2 Protocols
VLANs: Fundamentals
VLANs: VLAN Types
Trunking: Dynamic Trunking Protocol
Trunking: Dot1q And ISL
Trunking: VTP Fundamentals
Trunking: VTP Versions
Trunking: VTP Pruning
Trunking: VTP Pruning Part 2
EtherChannel Fundamentals
EtherChannel Protocol
EtherChannel Advanced Config
STP And PVST
STP And PVST Part 2
STP And PVST Part 3
RSTP And RPVST
Multiple Spanning Tree
Cisco STP Enhancements
Cisco STP Enhancements Part 2
SPAN And RSPAN
Clustering With StackWise
INFRASTRUCTURE SECURITY
Switch Security: L2 Attacks
Switch Security: Port Security
Switch Security: DHCP Snooping
Switch Security: IPSG And DAI
Switch Security: VLAN ACLs
Switch Security: Private VLANs
Switch Security: Storm Control
Port-Based Authentication
INFRASTRUCTURE SERVICES
Layer 3 Switching
Layer 3 Switching Part 2
Hot Standby Router Protocol (HSRP)
Hot Standby Router Protocol (HSRP) Part 2
Virtual Router Redundancy Protocol (VRRP)
Gateway Load Balancing Protocol (GLBP)
- INTRODUCTION
Overview
Troubleshooting Methodology
Manipulating Command Output
Debug Logging
Path Verification
Response Automation
Backing Up Data
Viewing Network Traffic
Reporting And Monitoring
Troubleshooting Example
LAYER 2 ISSUES
Layer 2 Example #1
Layer 2 Example #2
Layer 2 Example #3
Layer 2 Example #4
Layer 2 Example #5
Layer 2 Example #6
Layer 2 Example #7
Layer 2 Example #8
Layer 2 Example #9
Layer 2 Example #10
Layer 2 Example #11
Layer 2 Example #12
Layer 2 Example #13
Layer 2 Example #14
ETHERCHANNEL ISSUES
EtherChannel Example #1
EtherChannel Example #2
SPANNING TREE ISSUES
Spanning Tree Example #1
Spanning Tree Example #2
FIRST HOP REDUNDANCY ISSUES
HSRP Example #1
HSRP Example #2
HSRP Example #3
HSRP Example #4
VRRP Example #1
GENERAL LAYER 3 ISSUES
Layer 3 Example #1
Layer 3 Example #2
Layer 3 Example #3
Layer 3 Example #4
Layer 3 Example #5
GENERAL ROUTING ISSUES
Routing Example #1
Routing Example #2
Routing Example #3
Routing Example #4
OSPF ISSUES
OSPF Example #1
OSPF Example #2
OSPF Example #3
OSPF Example #4
OSPF Example #5
OSPF Example #6
OSPF Example #7
OSPF Example #8
OSPF Example #9
OSPF Example #10
EIGRP ISSUES
EIGRP Example #1
EIGRP Example #2
EIGRP Example #3
EIGRP Example #4
EIGRP Example #5
EIGRP Example #6
EIGRP Example #7
EIGRP Example #8
EIGRP Example #9
EIGRP Example #10
EIGRP Example #11
EIGRP IPv6 Example #1
EIGRP IPv6 Example #2
EIGRP IPv6 Example #3
BGP ISSUES
BGP Example #1
BGP Example #2
BGP Example #3
BGP Example #4
BGP Example #5
BGP Example #6
BGP Example #7
BGP IPv6 Example #1
BGP IPv6 Example #2
BGP IPv6 Example #3
MISCELLANEOUS ISSUES
Miscellaneous Example #1
Miscellaneous Example #2
Miscellaneous Example #3
Miscellaneous Example #4
- HARDENING IOS DEVICES
Overview
Initial IOS Configuration
Initial IOS Configuration Part 2
IOS Role Based Access Control
CONFIGURING AN IOS FIREWALL
IOS Zone Based Firewalls
IOS Zone Based Firewalls Part 2
Special Zones
HARDENING ASA DEVICES
Initial ASA Configuration
Initial ASA Configuration Part 2
ASA Role Based Access Control
CONFIGURING AN ASA FIREWALL
Configuring Twice NAT
Network Object Translation
ASA Firewall ACLs
ASA Firewall ACLs Part 2
Supporting IPv6
ASA ADVANCED FEATURES
Traffic Inspection
Transparent Firewalls
Security Contexts
High Availability
IMPLEMENT LAYER 2 SECURITY
DHCP Snooping
IP Source Guard
Private VLANs
Storm Control
Port Security
MONITORING SECURITY
Monitoring Traffic With NetFlow
Monitoring Devices With SNMPv3
Centralized Logging With Syslog
Centralized Device Management
- CLOUD CHARACTERISTICS AND MODELS
Overview
Cloud Characteristics: Introduction
Cloud Characteristics: 5 Characteristics
Cloud Service Models: Service Vs. Cloud Providers
Cloud Service Models: IaaS
Cloud Service Models: PaaS
Cloud Service Models: SaaS
CLOUD DEPLOYMENT
Cloud Deployment Models: Public Cloud
Cloud Deployment Models: Private Cloud
Cloud Deployment Models: Community Cloud
Cloud Deployment Models: Hybrid Cloud
Cisco CloudCenter: Introduction
Cisco CloudCenter: Components
Cisco CloudCenter: Components Part 2
BASIC KNOWLEDGE OF CLOUD COMPUTE
Cloud Compute: Cisco UCS Introduction
Cloud Compute: Cisco UCS Management
Cloud Compute: Server Virtualization
BASIC KNOWLEDGE OF CLOUD NETWORKING
Cloud Networking: Infrastructure Virtualization
Cloud Networking: Cisco Nexus 1000V
Cloud Networking: Virtual Networking Services
Cloud Networking: Virtual Networking Services Pt.2
Cloud Networking: VLANs And VXLANs
Cloud Networking: VLANs And VXLANs Part 2
Cloud Networking: Virtual Application Containers
Cloud Networking: Cisco Unified Fabric
Cloud Networking: Cisco Unified Fabric Part 2
Cloud Networking: SDN Basics
Cloud Networking: ACI Basics
Cloud Networking: ACI Basics Part 2
BASIC KNOWLEDGE OF CLOUD STORAGE
Cloud Storage: Storage Provisioning
Cloud Storage: Storage Provisioning Part 2
Cloud Storage: Storage Access Technologies
Cloud Storage: Block Storage Access
Cloud Storage: Block Storage Access Part 2
Cloud Storage: File Storage Access
Cloud Storage: SAN And NAS Concepts
Cloud Storage: Cisco Storage Network Devices
Cloud Storage: Integrated Infrastructure
APPENDICES
Appendix-A: Cisco InterCloud Fabric
Appendix-B: Miscellaneous Tips
- DESIGN METHODOLOGIES
Overview
Cisco Architecture For Enterprise
Cisco Architecture For Enterprise Part 2
Cisco Design: Lifecycle
Cisco Design: Lifecycle Part 2
Cisco Design: Methodology
Cisco Design: Methodology Part 2
Characterize Network: Information Gathering
Characterize Network: Auditing Tools
Characterize Network: Auditing Tools Part 2
Implement A Network Design
DESIGN OBJECTIVES
Design Modularity
Design Modularity Part 2
Design Hierarchy
Design Hierarchy Part 2
Design Scalability
Design Scalability Part 2
Design Resiliency
Design Resiliency Part 2
Design Fault Domains
ADDRESSING AND ROUTING PROTOCOLS IN AN EXISTING NETWORK
Scalable Addressing
IP Addressing Scheme
Routing Protocol Scalability
Routing Protocol Scalability Part 2
Design A Routing Protocol Expansion
Design A Routing Protocol Expansion Part 2
Design A Routing Protocol Expansion Part 3
Design A Routing Protocol Expansion EGP
ENTERPRISE NETWORK DESIGN
Basic Campus Design Overview
Basic Campus Design Overview Part 2
Basic Campus Design Overview Part 3
Basic Campus Design Overview Part 4
Enterprise Network: WAN And Edge
Enterprise Network: WAN And Edge Part 2
Branch Network Design
Branch Network Design Part 2
Branch Network Design Part 3
CONSIDERATIONS FOR EXPANDING AN EXISTING NETWORK
Wireless LAN Design
Wireless LAN Design Part 2
Wireless LAN Design Part 3
Wireless LAN Requirements
Wireless LAN Requirements Part 2
Wireless LAN Requirements Part 3
Security Control Considerations
Voice And Video Considerations
Voice And Video Considerations Part 2
Virtualization In Network Design
Network Programmability Design
Data Center Component Design
Security Skills
- COMPTIA CORE BLOCKCHAIN
Why Blockchain Matters
How We Work Today: The Internet Of Value
Business Drivers And Disrupters
Accelerating Trust: Cryptos And ICOs
Using Blockchain In Your Business: Use Cases
Blockchain And Cybersecurity
How Blockchain Works
Your Blockchain Project: DIY Tools
Seven Steps To Success
- UNDERSTAND SECURITY LAYERS
Overview
Core Security Principles
Physical Security
Internet Browser Security
Internet Browser Security Part 2
Wireless Security
Wireless Security Part 2
UNDERSTAND OPERATING SYSTEM SECURITY
User Authentication
User Authentication Part 2
Permissions
Permissions Part 2
Permissions Part 3
Password Policies
Audit Policies
Encryption
Encryption Part 2
Digital Certificates
Malware
Malware Part 2
UNDERSTAND NETWORK SECURITY
Dedicated Firewalls
Network Isolation
Protocol Security
UNDERSTAND SECURITY SOFTWARE
Client Protection
Email Protection
Server Protection
- SECURITY CONCEPTS
Overview
Describe CIA Triad And SIEM Technology
Describe CIA Triad And SIEM Technology Pt2
Identify Common Security Terms
Describe Common Network Attacks
Describe Common Network Attacks Part 2
Describe Common Network Attacks Part 3
Identify Common Malware Types
Classify Data Loss Vectors
Describe Encryption Methods
Describe Encryption Methods Part 2
Describe Crypto Key Exchange
Describe Crypto Key Exchange Part 2
Describe Network Topologies
Describe Network Topologies Part 2
SECURE ACCESS
Compare In-Band And Out-Of-Band Mgmt
Configure And Verify Secure Mgmt
Configure And Verify Secure Mgmt Part 2
Secure Management Plane Access
Secure Management Plane Access Part 2
Configure And Verify SNMPv3
Configure And Verify NTP Security
Configure And Verify NTP Security Part 2
Describe AAA Technologies
Configure Access Using TACACSplus
Configure Access Using TACACSplus Part 2
Use SCP For File Transfer
Explain AD Integration With AAA
Describe Using Cisco ACS And ISE
Identify 802.1x Components And Functions
Describe BYOD Framework And MDM
VPN
Describe IPsec Protocols And Modes
Describe VPN Implementations
Setup Clientless SSL VPN Using ASDM
Setup AnyConnect VPN Using ASDM
Setup AnyConnect VPN Using ASDM Part 2
Setup IPsec Site-To-Site VPN With PSK
Setup IPsec Site-To-Site VPN With PSK Part 2
SECURE ROUTING AND SWITCHING
Secure CLI Access And IOS
Secure CLI Access And IOS Part 2
Setup OSPF Authentication With MD5
Setup EIGRP Authentication With MD5
Setup L2 Attack Mitigation
Setup L2 Attack Mitigation Part 2
Setup L2 Attack Mitigation Part 3
Explain Control Plane Policing
Setup PVLANs For L2 Security
Describe Native VLAN Security Issues
CISCO FIREWALL TECHNOLOGIES
Describe Different Firewall Technologies
Implement NAT On Cisco ASA 9.X
Implement NAT On Cisco ASA 9.X Part 2
Setup Zone Based Firewall: Zone To Zone
Setup Zone Based Firewall: Self Zone
Configure ASA: Access Management
Configure ASA: Security Access Policies
Configure ASA: Modular Policy Framework
Describe Firewall Features
IPS
Describe IPS Deployment Considerations
Configure Cisco IOS IPS
Configure Cisco IOS IPS Part 2
Configure IPS Policy On Cisco FMC
CONTENT AND ENDPOINT SECURITY
Describe Threat Mitigation For Email
Describe Threat Mitigation For Web
Describe Threat Mitigation For Endpoints
- NETWORK CONCEPTS
Overview
Describe Network Models
Describe Network Models Part 2
Describe Network Models Part 3
Describe Basic Networking Protocols
Describe Basic Networking Protocols Part 2
Describe Basic Networking Services
Describe Basic Networking Services Part 2
Describe Networking Devices Operations
Describe Networking Devices Operations Part 2
Describe Network Security Systems
Describe Basic Network Addressing
Describe Basic Network Addressing Part 2
Describe VLANS And Data Visability
Describe ACL Usage On Interfaces
Describe ACL Usage On Interfaces Part 2
Compare Different Filtering Methods
Compare Packet Capture Methods
Compare Packet Analysis Output
Compare Packet Analysis Output Part 2
Identify Traffic Loss From Packet Analysis
SECURITY CONCEPTS
Describe Defense In Depth Principles
Define Security Concepts And Terms
Define Security Concepts And Terms Part 2
Understand Access Control Models
Compare Security Admin Terms
Describe Security Management Concepts
CRYPTOGRAPHY
Describe Crypto Algorithm Usage
Describe Crypto Algorithm Usage Part 2
Describe Digital Signature Creation
Describe PKI Operations
Describe Key Exchange Security
Describe SSL TLS Components
Describe SSL TLS Components Part 2
Describe Hashing Algorithms
Encryption Algorithms And Protocols
Encryption Algorithms And Protocols Part 2
HOST-BASE ANALYSIS
Define Windows Terms
Define Linux Terms
Define Linux Terms Part 2
Describe Endpoint Security Monitoring
Interpret OS Log Data
Interpret OS Log Data Part 2
SECURITY MONITORING
Identify Data Types
Identify Data Types Part 2
Identify Data Types Part 3
Describe NSM Data
Describe Monitoring Context
Describe Monitoring Context Part 2
Describe NGIPS Events
Monitor Protocols
Monitor Protocols Part 2
ATTACK METHODS
Describe Security Attack Concepts
Describe Network And Web App Attacks
Describe Network And Web App Attacks Part 2
Describe Attacks And Evasion Methods
Describe Attacks And Evasion Methods Part 2
- ENDPOINT THREAT ANALYSIS AND COMPUTER FORENSICS
Overview
Read Analysis Reports
Read Analysis Reports Part 2
Read Analysis Reports Part 3
Describe CVSS 3.0
Describe CVSS 3.0 Part 2
Describe CVSS 3.0 Part 3
Understand Windows File Systems
Understand Windows File Systems Part 2
Understand Linux File Systems
Identify Forensic Evidence
Identify Forensic Evidence Part 2
NETWORK INTRUSION ANALYSIS
Interpret Basic Regular Expressions
Interpret Basic Regular Expressions Part 2
Describe Protocol Headers
Describe Protocol Headers Part 2
Describe Protocol Headers Part 3
Describe IP Headers
Describe IP Headers Part 2
Describe IP Headers Part 3
Describe ICMP Intrusion
Describe ICMP Intrusion Part 2
Describe ICMP Intrusion Part 3
Describe ICMP Intrusion Part 4
Describe Transport Layer Headers
Describe Transport Layer Headers Part 2
Describe Transport Layer Headers Part 3
Describe HTTP Headers
Describe HTTP Headers Part 2
Describe HTTP Headers Part 3
Identify Netflow V5 Records
Identify Netflow V5 Records Part 2
Examine Intrusion Events
Intrusion Event Technologies
Intrusion Event Technologies Part 2
Intrusion Event Technologies Part 3
Intrusion Impact Analysis
Intrusion Impact Analysis Part 2
INCIDENT RESPONSE
Incident Response Elements
Incident Response Elements Part 2
Describe CSIRT Goals
Identify Cybersec Elements And Frameworks
DATA AND EVENT ANALYSIS
Describe Data Normalization
Describe 5 Tuple Correlation
FirePower Management Console
Compare And Contrast Analysis Methods
INCIDENT HANDLING
Classify And Categorize Intrusions
Classify And Categorize Intrusions Part 2
Classify And Categorize Intrusions Part 3
Apply NIST.SP800-61 R2 To Events
NIST SP800-86 Evidence Handling
Apply VERIS Schema Categories
- BUSINESS CONTINUITY AND DISASTER RECOVERY
Overview
Getting Started
Business Impact Analysis
Creating A BIA
BIA Math
Risk Assessment
BCP Planning
BCP Planning Part 2
BCP Roles And Responsibilities
BCP Communications
Creating A BCP
Creating A BCP Part 2
Creating A BCP Part 3
BCP And The Cloud
BCDR KRIs And KPIs
ITDR Planning
IT DR Testing
DR Procedures
BCP Testing
- INTRODUCTION TO CYBERPATRIOT AND CYBERSECURITY
Program Overview
CyberPatriot And Cybersecurity
The Competition
Introduction To Cybersecurity
INTRODUCTION TO ONLINE SAFETY
Online Safety
Online Safety Part 2
CYBER ETHICS
Cyber Ethics
Current Event 1
Current Event 2
Current Event 3
Scenario 1
Scenario 2
Scenario 3
Scenario 4
Scenario 5
Scenario 6
PRINCIPLES OF CYBERSECURITY
Principles Of Cybersecurity
CIA Triad
Threats And Vulnerabilities
Cyber Threats And Countermeasures
Cyber Threats And Countermeasures Part 2
Basic Cybersecurity Techniques
Basic Cybersecurity Techniques Part 2
COMPUTER BASICS AND VIRTUALIZATION
Computer Basics And Virtualization
How Computers Work
How Computers Work Part 2
Virtual Machines
Networking Basics
MICROSOFT WINDOWS BASIC AND MSDN
Microsoft Windows Basics And MSDN
Windows Version History
Windows Basics
What Is MSDN
How To Use MSDN For Training
MICROSOFT WINDOWS SECURITY TOOLS
Microsoft Windows Security Tools
Basic Security Policies And Tools
Basic Security Policies And Tools Part 2
Basic Security Policies And Tools Part 3
Account Management
Account Management Part 2
MICROSOFT WINDOWS SECURITY CONFIGURATION
Microsoft Windows Security Configuration
Windows File Protections
Windows Auditing
Performance Monitoring
INTRODUCTION TO LINUX AND UBUNTU
Introduction To LInux And Ubuntu
What Is Linux
Ubuntu Terminology And Concepts
Introduction To Ubuntu Command Lines
Introduction To Ubuntu Command Line Part 2
UBUNTU SECURITY CONFIGURATION
Ubuntu Security
Basic GUI Security
Basic Command Line Security
Advanced Ubuntu Security
- THREATS, ATTACKS AND VULNERABILITIES
Overview
Determining Types Of Malware
Determining Types Of Malware Part 2
Types Of Attacks
Types Of Attacks Part 2
Types Of Attacks Part 3
Types Of Attacks Part 4
Threat Vector Types And Attributes
Penetration Testing Concepts
Vulnerability Scanning Concepts
Impact Of Various Vulnerabilities
Impact Of Various Vulnerabilities Part 2
TECHNOLOGIES AND TOOLS
Hardware Software Organizational Security
Hardware Software Organizational Security Part 2
Hardware Software Organizational Security Part 3
Hardware Software Organizational Security Part 4
Security Posture Assessment
Security Posture Assessment Part 2
Security Posture Assessment Part 3
Security Posture Assessment Part 4
Troubleshoot Common Security Issues
Troubleshoot Common Security Issues Part 2
Analyze And Interpret Outputs
Analyze And Interpret Outputs Part 2
Deploy Mobile Security
Implement Secure Protocols
ARCHITECTURE AND DESIGN
Best Practices And Secure Config Guides
Secure Network Architecture Concepts
Secure System Design
Secure Staging Deployment Concepts
Security Implications Of Embedded Systems
Secure App Development And Deployment
Cloud And Virtualization Concepts
Cloud And Virtalization Concepts Part 2
Resiliency And Automation To Reduce Risk
Importance Of Physical Security
Importance Of Physical Security Part 2
IDENTITY AND ACCESS MANAGEMENT
Identity And Access Management Concepts
Identity And Access Services
Identity And Access Management Controls
Identity And Access Management Controls Part 2
Account Management Practices
Account Management Practices Part 2
RISK MANAGEMENT
Policies, Plans And Procedures
Impact Business Analysis
Risk Management Processes And Concepts
Incident Response Procedures
Basic Concepts Of Forensics
Disaster Recovery And Business Continuity
Disaster Recovery And Business Continuity Part 2
Data Security And Privacy
CRYPTOGRAPHY AND PKI
Basic Concepts Of Cryptography
Basic Concepts Of Cryptography Part 2
Cryptography Algorithms Basics
Cryptography Algorithms Basics Part 2
Cryptography Algorithms Basics Part 3
Wireless Security
Public Key Infrastructure
Public Key Infrastructure Part 2
Public Key Infrastructure Part 3
Public Key Infrastructure Part 4
- THREATS, ATTACKS AND VULERABILITIES
Overview
Determining Types Of Malware
Vulnerability Scanning And Pen Testing
Impact Of Various Vulnerabilities
TECHNOLOGIES AND TOOLS
Supporting Organizational Security
Supporting Organizational Security Part 2
Security Posture Assessment
Deploy Mobile Security
Implement Secure Protocols
ARCHITECTURE AND DESIGN
Best Practices, Guides And Configuration
Secure Network Architecture Concepts
App Development And Deployment
Cloud And Virtualization Concepts
IDENTITY AND ACCESS MANAGEMENT
Identity And Access Services
IAM Controls
Account Management Practices
RISK MANANGEMENT
Policies, Plans And Procedures
Risk Management Processes And BIA
IRP And Basic Forensics
Disaster Recovery And Business Continuity
Data Security And Privacy Practices
CRYPTOGRAPHY AND PKI
Cryptography Algorithms Basics
Wireless Security
Public Key Infrastructure
- ELIMINATING MALWARE
Identify, Quarantine And Remediate
Updating, Scheduling And Monitoring
- SECURITY IN SOFTWARE
Overview
Prior Knowledge And Expectations
Gather Software Requirements
Assignment: Identity Requirments
Activity: Identify Requirements
Factors That Undermine Software Security
Software Vulnerabilities And Attack Phases
Attack Patterns
Assignment: Find Vulnerabilities
Activity: Find Vulnerabilities
Assignment: New Password Requirements
Activity: New Password Requirements
Assignment: Hashing Passwords
Activity: Hashing Passwords
Vulnerability Intelligence
Assignment: Vulnerability Search
Activity: Vulnerability Search
HANDLING VULNERABILITIES
Bugs In Software
External Libraries And Services
Handling Errors Securely
Human-Related Security
Security Requirements And Design
Security Through The Software Lifecycle
Assignment: Exploring Leftover Artifacts
Activity: Exploring Leftover Artifacts
DESIGNING FOR SECURITY
Principles Of Secure Design
Avoid Common Mistakes
Assignment: Common Security Design Flaws
Activity: Common Security Design Flaws
Understand Risk And Threats
Risk Response Strategies
Exploit Countermeasures
DEVELOPING SECURE CODE
Guidelines For Secure Coding
Buffer Overflows And Prevention
Race Conditions
Assignment Using Locks Remediate Race Condition
Activity Using Locks To Remediate Race Condition
OWASP Top Ten Platform Vulnerabilities
Web Application Vulnerabilities Deep Dive
Mobile Application Vulnerabilities Deep Dive
IoT Vulnerabilities Deep Dive
Desktop Vulnerabilities Deep Dive
Privacy Vulnerability Defects
IMPLEMENTING COMMON PROTECTIONS
Secure Session Management
Users, Protections And Passwords
Encryption And Data Protections
Error Handling And Protections
TESTING AND MAINTAINING SOFTWARE SECURITY
Testing Software For Security
Monitoring And Logging Of Production Applications
- Overview
Reconnaissance: Tools
Reconnaissance: Tools Part 2
Reconnaissance: Tools Part 3
Reconnaissance: Tools Part 4
Reconnaissance: Techniques
Reconnaissance: Techniques Part 2
Reconnaissance: Techniques Part 3
Reconnaissance: Techniques Part 4
Data Correlation And Analytics
Reconnaissance: Interpreting Results
Countermeasures: Network Segmentation
Countermeasures: Honeypots And Sinkholes
Countermeasures: System Hardening And NAC
Security Practices: Penetration Testing
Security Practices: Reverse Engineering
Security Practices: Training And Risk Evaluation
VULNERABILITY MANAGEMENT
Vulnerability Management Process
Vulnerability Management: Scan Configuration
Vulnerability Management CVSS
Vulnerability Management: CVSS Part 2
Vulnerability Management: Remediation
Scan Results Verification
Common Vulnerabilities
Common Vulnerabilities Part 2
Common Vulnerabilities Part 3
Common Vulnerabilities Part 4
Common Vulnerabilities Part 5
CYBER INCIDENT RESPONSE
Threat Classification
Severity And Prioritization
Forensics Toolkit
Incident Response Plan
Forensic Suites And Utilities
Forensic Suites And Utilities Part 2
Forensic Suites And Utilities Part 3
Forensic Suites And Utilities Part 4
CSIRT Roles And Communication
Indicator Of Compromise: Network Symptoms
Indicators Of Compromise: Host And App Symptoms
Recovery And Post-Incident Response
Recovery And Post-Incident Response Part 2
SECURITY ARCHITECTURE AND TOOLSETS
Cybersecurity Frameworks
Cybersecurity Frameworks Part 2
Policies, Controls And Procedures
Policies, Controls And Procedures Part 2
Identity And Access Managemnt
Identity And Access Management Part 2
Compensating Controls And Architecture
Compensating Controls And Architecture Part 2
Compensating Controls And Architecture Part 3
Security Tools And Technologies
Security Tools And Technologies Part 2
Security Tools And Technologies Part 3
Software Development Security
Software Development Security Part 2
- THREATS AND ATTACKS
Overview
Threat Targets
Threat Actors
Threat Motives
Threat Intentions
Attack Phases
Attack Vectors
Technique Criteria
Impact Of Attacks
Footprinting
Network And Port Scanning
Vulnerability Scanning
Penetration Testing
Web App Scanning
Enumeration
GAINING ACCESS
Exploitation Frameworks
Client-Side Attacks
Server-Side Attacks
Mobile Threats
Web Attacks
Password Attack
Wireless Attacks
Social Engineering
Man-In-The-Middle
Malware
Out-Of-Band Attacks
Denial Of Service
POST-EXPLOITATION
Command And Control
Data Exfiltration
Pivoting
Lateral Movement
Persistence
Keylogging
Anti-Forensics
Covering Your Tracks
THREAT RESEARCH AND INCIDENT PREP
Threat Research And Incident Prep
DATA COLLECTION AND ANALYSIS
Network Data Collection And Analysis
Host Data Collection And Analysis
Anomaly Detection
Indicators Of Compromise
Log Analysis Tools
INCIDENT RESPONSE TECHNIQUES
Containment
Asset Discovery
Windows Incident Response Tools
Linux Incident Response Tools
Incident Response Process
Incident Response Preparation
Compliance And Standards
Frameworks And Best-Practices
Forensic Concepts
VULNERABILITY ASSESSMENTS
Common Vulnerable Areas
Vulnerability Assessments
- EMAIL ENCRYPTION
Email Encryption Overview
OpenPGP With Windows
- PLANNING AND SCOPING
Overview
Planning An Engagement
Planning On Engagement Part 2
Planning An Engagement Part 3
Planning An Engagement Part 4
Legal Concepts
Scoping An Engagement
Scoping An Engagement Part 2
Compliance-Based Assessments
INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
Pentesting Tools: Use Cases
Pentesting Tools: Use Cases Part 2
Pentesting Tools: Scanners
Pentesting Tools: Credential Testing
Pentesting Tools: Credential Testing Part 2
Pentesting Tools: Web Directory Enum
Pentesting Tools: Debuggers
Pentesting Tools: OSINT
Pentesting Tools: Wireless
Pentesting Tools: Web Proxies
Pentesting Tools: Social Engineering
Pentesting Tools: Remote Access
Pentesting Tools: Networking
Pentesting Tools: Misc
Pentesting Tools: Mobile
Nmap
Common Pentest Objectives
Analyze Scripts: Bash
Analyze Scripts: Bash Part 2
Analyze Scripts: Bash Part 3
Analyze Scripts: Python
Analyze Scripts: Python Part 2
Analyze Scripts: Python Part 3
Analyze Scripts: Ruby
Analyze Scripts: Ruby Part 2
Analyze Scripts: PowerShell
Analyze Scripts: Powershell Part 2
ATTACKS AND EXPLOITS
Info Gathering Techniques
Info Gathering Techniques Part 2
Info Gathering Techniques Part 3
Info Gathering Techniques Part 4
Perform Vulnerability Scans
Perform Vulnerability Scans Part 2
Perform Vulnerability Scans Part 3
Perform Vulnerability Scans Part 4
Vulnerability Scan Results
Exploration Preparation
Exploration Preparation Part 2
Weaknesses In Specialized Systems
Weaknesses In Specialized Systems Part 2
PENETRATION TESTING TOOLS
Social Engineering
Social Engineering Part 2
Network Vulnerability: Name Resolution
Network Vulnerability: SNMP, SMTP And FTP
Network Vulnerability: Pass-The-Hash
Network Vulnerabilities: MITM
Network Vulnerability Denial Of Service
Network Vulnerabilities: NAC Bypass, VLAN Hopping
App Vulnerabilities Injection Attacks
App Vulnerabilities Injection Attacks Part 2
App Vulnerabilities: Injection Attacks Part 3
App Vulnerabilities: File Inclusions
App Vulnerabilities: File Inclusions Part 2
App Vulnerabilities: XSS, CSRF, Clickjacking
App Vulnerabilities: XSS, CSRF, Clickjacking Pt2
App Vulnerabilities: Authentication, Authorization
App Vulnerabilities: Insecure Coding
App Vulnerabilities: Insecure Coding Part 2
Wireless And RF Vulnerabilities
Wireless And RF Vulnerabilities Part 2
Host-Based Vulnerabilities
Host Based Vulnerabilities Part 2
Host Based Vulnerabilites Part 3
Host-Based Vulnerabilities Part 4
Host-Based Vulnerabilities Part 5
Site Security
Site Security Part 2
Post-Exploitation
Post-Exploitation Part 2
REPORTING AND COMMUNICATION
Reports
Post Report Activities
Vulnerability Mitigation Strategies
Communication Importance
- GENERAL CONCEPTS
Overview
Cryptography Basics
Cryptographic Algorithms
VPN Types
SITE-TO-SITE
IPSec Using IKEv1
IPSec Using IKEv1 Part 2
IPSec Using IKEv2
IPSec With Mixed Hardware
Using IPv6 With IPSec
Tunneling IPv6 Over IPv4
Tunneling IPv6 Over IPv4 Part 2
DMVPN Hub And Spoke
DMVPN Hub And Spoke Part 2
DMVPN Spoke To Spoke
Group Encrypted Transport VPN
Group Encrypted Transport VPN Part 2
REMOTE ACCESS VPNS
AnyConnect SSLVPN For ASAs
AnyConnect SSLVPN On IOS
Clientless SSLVPN
HYBRID VPNS
FlexVPN Components
FlexVPN Site-To-Site
FlexVPN Hub And Spoke
FlexVPN With Redundant Hubs
FlexVPN L2L With IPv6
FlexVPN Remote Access VPN
- END USER SECURITY AWARENESS
Password Security
Social Engineering
Physical Security
Data Disposal
Safe Networks
Malicious Software
- OVERVIEW
Overview
Overview Of The GDPR
Overview Of The GDPR Part 2
Overview Of The GDPR Part 3
Overview Of The GDPR Part 4
Overview Of The GDPR Part 5
PRINCIPLES
Principles
SPECIAL TOPICS TO FOCUS ON
Special Topics To Focus On
Special Topics To Focus On Part 2
THE INDIVIDUAL RIGHTS
Individual Rights
The Right To Be Informed
The Right Of Access
The Right To Rectification
The Right To Erasure
The Right To Restrict Processing
The Right To Data Portability
The Right To Object
Automated Decision Making And Profiling
ACCOUNTABILITY AND GOVERNANCE
Accountability And Governance
TRANSFERS OF PERSONAL DATA
Transfers Of Personal Data
BREACH NOTIFICATION
Breach Notification
NATIONAL DEROGATIONS
National Derogations
- ISO/IEC 27,001 FOUNDATION
Overview
The ISO/IEC 27,001 Foundation Exam
The ISO/IEC 27,000 Family
Data Vs Information
Value Of Information
Fundamental Principles Of Security
Fundamental Principles Of Security Part 2
Threats, Risks, Vulnerabilities And Exposure
Types Of Damage And Risk Management
Countermeasures
The Security Organisation
The Security Organisation Part 2
The Security Organisation Part 3
Access Control
Cryptography
Incident Management
Incident Management Part 2
Importance Of Measures
Physical Security Measures
Technical Security Measures
Organisational Measures
Organisational Measures Part 2
Legislation And Regulation
Legislation And Regulation Part 2
Sample Paper Iso27001
Sample Paper Part 2
- MOBILE SECURITY
Exposure From Unmanaged Mobile Device
Exposure From Unmanaged Mobile Device Part 2
Securing Devices With MDM
Man In The Middle Attacks
Performing An Impersonation Attack
Executing A Remote Exploit
Trojan Horse Exploit
- OWASP TOP 10 – 2017
Overview
A1 Injection: Exploit
A1 Injection: Mitigate
A1 Injection: Breakdown
A2 Broken Auth: Exploit
A2 Broken Auth: Mitigate
A2 Broken Auth: Breakdown
A3 Sensitive Data Exposure: Exploit
A3 Sensitive Data Exposure: Mitigate
A3 Sensitive Data Exposure: Breakdown
A4 XML External Entities: Exploit
A4 XML External Entities: Mitigate
A4 XML External Entities: Breakdown
A5 Broken Access Control: Exploit
A5 Broken Access Control: Mitigate
A5 Broken Access Control: Breakdown
A6 Security Misconfiguration: Exploit
A6 Security Misconfiguration: Mitigate
A6 Security Misconfiguration: Breakdown
A7 Cross-Site Scripting (XSS): Exploit
A7 Cross-Site Scripting (XSS): Mitigate
A7 Cross-Site Scripting: Breakdown
A8 Insecure Deserialization: Exploit
A8 Insecure Deserialization: Mitigate
A8 Insecure Deserialization: Breakdown
A9 Components W/ Known Vulnerabilities: Exploit
A9 Components W/ Known Vulnerabilities: Mitigate
A9 Using Components Known Vulnerability Breakdown
A10 Insufficient Logging And Monitoring
- PENETRATION TESTING
Overview
Platforms And Basic Skills
Remote Shells
Scanning And Enumeration
Buffer Overflows
Buffer Overflows Part 2
Buffer Overflows Part 3
Buffer Overflows Part 4
Web Apps Cross Site Scripting
Web Apps Remote File Inclusion (RFI)
Web Apps Local File Inclusion (LFI)
File Transfer Fun
Windows Privilege Escalation
Linux Privilege Escalation
SQL Injection
SQL Injection Part 2
Password Cracking And Attacks
Password Cracking And Attacks Part 2
Port Redirection
- GENERAL INFORMATION
Overview
Introuce PfSense: History And Use
Introduce PfSense: Hardware Choices
Introduce PfSense: Hardware Choices Part 2
PREPARE AND INSTALL PFSENSE
Prepare And Install PfSense: Installation
Prepare And Install PfSense: Installation Pt.2
Prepare And Install PfSense: Menu Options
Prepare And Install PfSense: Initial Config
Prepare And Install PfSense: System Security
Prepare And Install PfSense: System Security Pt. 2
PFSENSE FEATURES AND SERVICES
Setup PfSense: Configure Firewall Rules
Setup PfSense: Configure Firewall Rules Part 2
Setup PfSense: Configure Schedules And Virtual IPs
Setup PfSense: Understand Traffic Shaper
Setup PfSense: Configure NAT Basics
Setup PfSense: Configure NAT Basics Part 2
Setup PfSense: Configure Services
Setup PfSense: Configure Services Part 2
Setup PfSense: Configure VPN Services
Setup PfSense: Configure VPN Services Part 2
Setup PfSense: Configure VPN Services Part 3
Setup PfSense: Configure VPN Services Part 4
PFSENSE ADVANCED FEATURES
PfSense Advanced: Multi-WAN Support
PfSense Advanced: Multi-WAN Support Part 2
PfSense Advanced: Configure VLANs
PfSense Advanced: Configure VLANs
PfSense Advanced: Configure High Availability
PfSense Advanced: Configure High Availability Pt.2
PfSense Advanced: Configure Bridging
PfSense Advanced: Configure Captive Portal
PfSense Advanced: Monitoring And Packages
MANAGING AND MAINTAINING
Manage And Maintain: Backups And Restores
Manage And Maintain: Reporting, Upgrading
- MANAGEMENT OF RISK® FOUNDATION
Overview
The MoR® Foundation Exam
MoR® Terms And Definitions
MoR® Terms And Definitions Part 2
MoR® Terms And Definitions Part 3
MoR® Terms And Definitions Part 4
What Is Management Of Risk®
Benefits Of MoR®
Barriers To Success
Overcoming Barriers To Success
Corporate Governance
Corporate Governance Part 2
What Are MoR® Principles
MoR® Principle: Aligns With Objectives
MoR® Principle: Fits The Context
MoR® Principle: Engages Stakeholder
MoR® Principle: Provides Clear Guidance
MoR® Principle: Informs Decision Making
MoR® Principle: Facilitates Continual Improvement
MoR® Principle: Creates A Supportive Culture
MoR® Principle: Achieves Measurable Value
Reporting On MoR® Principles
Supporting Factors To MoR® Principles
MoR® Successive Principles
The MoR® Approach And MoR® Products
The Risk Management Policy
The Risk Management Process Guide
Risk Management Strategies Mor
The Risk Register
The Issue Log
MOR PROCESSES
The Management Of Risk® Process
Benefits, Success Factors For The MoR® Process
Barriers To The MoR® Process, Communication
MoR® Process Definitions
Defining A Process Activity
Communication In The MoR® Process
MoR® Process Activity: Identify
Identify Activity: Context
Context Techniques: SWOT
Context Techniques: PESTLE Analysis
Context Techniques: RACI
Context Techniques: Stakeholder Mapping
Context Techniques: Horizon Scanning
MoR® Process Activity: Identify The Risks
Risk Identification Technique: Checklists, Prompts
Risk Identification Technique: Ishikawa, Analyses
Risk Identification Technique: Group Techniques
Outputs From Identify The Risk Activity
MoR® Process Activity: Assess
MoR® Prcess Activity: Estimate Assessments
MoR® Process Activity: Evaluate
MoR® Process: Plan
Risk Responses: Threat Responses
Risk Responses: Opportunity Responses
MoR® Process: Implement
Planning Roles And Techniques
Implement Techniques
EMBED AND REVIEW
Goals And Success Factors Of Embed And Review
The Health Check Process
The Maturity Model
Building Awareness Of MoR®
MOR PERSPECTIVES
Introduction To Management Of Risk® Perspectives
The Strategic Perspective
The Programme Perspective
The Project Perspective
The Operational Perspective
Risk Responsibilities
COMMON TERMS AND TECHNIQUES
Common Terms And Risk Responses
Techniques: PESTLE, SWOT, Horizon Scanning
Stakeholder Analysis, Influence And RACI Matrix
Probability Impact Grid, Summary Risk Profile
RISK SPECIALISMS
MoR® Risk Specialisms
SAMPLE EXAM
MoR® Foundation Sample Paper
MoR® Foundation Sample Paper Part 2
MoR® Foundation Sample Paper Part 3
Book Your Exam
- PRACTICAL IT SECURITY
Multi-Factor Authentication
Multi-Factor Authentication Part 2
Multi-Factor Authentication Part 3
Multi-Factor Authentication Part 4
Multi-Factor Authentication Part 5
Patch Management
Patch Management Part 2
Patch Management Part 3
Patch Management Part 4
Password Hygiene
Password Hygiene Part 2
Social Engineering
MacOS Hardening
MacOS Hardening Part 2
MacOS Hardening Part 3
MacOS Hardening Part 4
MacOS Hardening Part 5
Encryption
Encryption Part 2
Browser Security
Browser Security Part 2
Mobile Device Security
Mobile Device Security Part 2
Mobile Device Security Part 3
Basic Cisco Device Security
Basic Cisco Device Security Part 2
Basic Cisco Device Security Part 3
- PRACTICAL PENTESTING: FEATURING BRAD STINE
Overview
Pentesters – The Good, Bad And Ugly
Pre-Engagement
Pre-Engagement Part 2
Data Security Agreements
Statement Of Work (SOW)
Statement Of Work (SOW) Part 2
Statement Of Work (SOW) Part 3
Final Authorization
Personal Engagement Toolkit
Pentesting Platforms
Stages Of Assessment: Validate Scope
Stages Of Assessment: Recon
Stages Of Assessment: Vulnerability Scan
Stages Of Assessment: Vulnerability Scan Part 2
Stages Of Assessment: Documenting
Stages Of Assessment: Exploitation
Stages Of Assessment: Maintaining Access
Stages Of Assessment: Covering Tracks
Stages Of Assessment: Deliverables
Blue Team Pentesting
- SECURITY TECH SKILLS
Host Discovery
Port Scanning
OpenVAS
MBSA
Nikto
This Is Sparta
Burp Suite
OWASP Zap
SQL Injection
Sqlmap
Password Cracking Basics
Hashcat
- WIRESHARK 2.2.4
Overview
What Is Wireshark
Install Wireshark
Perform Data Capture
Use Wireshark Interface
Use Filters
Capture Unicast Data
Use Advanced Features
Use Advanced Features Part 2
Use Stats And Reporting
- WORKING WITH SSH
Working With SSH
Enabling SSH
Using Certificates With SSH
Hardening SSH
- SUPPORTING IT GOVERNANCE AND RISK MANAGEMENT
Overview
So You Want To Setup A Lab
Begin At The Beginning – Confidentiality
Begin At The Beginning – Integrity
Begin At The Beginning – Availability
Governance And Risk Management: Overview
Governance And Risk Management: Risk Vocabulary
Governance And Risk Management: Risk Management
Governance And Risk Management: Risk Analysis
Assess Risks: What Is A Security Framework
Assess Risks: ESA Framework Assessment Process
Assess Risks: System Specific Risk Analysis
Assess Risks: Risk Determination
Assess Risks: Guidelines For Assessing Risk
Risk Mitigation: What Is A Aggregate CIA Score
Risk Mitigation: What Are The CVSS And CVE
Risk Mitigation: Risk Responses
Risk Management Documentation: Best Practices
Risk Management Documentation: BCP
Risk Management Documentation: What Is A BIA
Risk Management Documentation: Downtime
Risk Management Documentation: Documents
I.T. Governance And Risk Management – Key Points
LEVERAGING COLLABORATION TO SUPPORT SECURITY
Collaboration: GRC And Controls
Collaboration: What Is An SCA
Collaboration: Solutions
Leveraging Collaboration – Key Points
USING RESEARCH AND ANALYSIS TO SECURE THE ENTERPRISE
Research And Analysis: Industry Trends
Research And Analysis: Artificial Intelligence
Research And Analysis: Requirements For Contracts
Analyze Scenarios To Secure The Enterprise
Using Research And Analysis – Key Points
INTEGRATING ADVANCED AUTHENTICATION AND AUTHORIZATION TECHNIQUES
Authentication And Access Control
Authentication Factors And Controls
Authentication Types
Centralized Remote Authentication Services
Deep Dive: RADIUS
Deep Dive: 802.1X
What Is Authorization/OAuth2.0
What Is XACML
Trusts Models And Kerberos
Trust Models And Kerberos Part 2
Directory Services And LDAP
Hands On: Establishing Peer Trusts
Authentication And Authorization Review Questions
Advanced Identity Concepts And Vocabulary
Identity Federation Methods
Advanced Identity Review Questions
Authentication And Authorization: Key Points
IMPLEMENTING CRYPTOGRAPHIC TECHNIQUES
Encryption
Hashing
Digital Signatures
Blockchain And Bitcoin
Hands On: Configuring A Blockchain
Public Key Infrastructure PKI – Design
Public Key Infrastructure PKI – Concepts
Cryptography Concepts
Stream Vs. Block Ciphers
Implement Cryptography
Implementing Cryptographic Techniques – Key Points
IMPLEMENTING SECURITY CONTROLS FOR HOSTS
Host Concepts And Vocabulary
Product Evaluation Models – TCSEC
Product Evaluation Models – ITSEC
Product Evaluation Models – Common Criteria
What Is A Trusted OS
Types Of Security Models
Bell-LaPadula
Biba
Clark-Wilson And Others
Access Control Concepts
Role-Based Access Control (RBAC)
Other Access Control Models
Endpoint Security
Host Review Questions
Hardening Hosts Concepts And Vocabulary
Peripherals
Full Disk Encryption
Hands-On: Hardening Windows Hosts, AppLocker
Virtualization Concepts And Vocabulary
Common VM Vulnerabilities
Hands-On: Creating Securing VM Using Virtualbox
Boot Loader Concepts And Vocabulary
Hands-On: Protecting Boot Loaders
Implementing Security Controls Hosts Key Points
SECURITY CONTROLS FOR MOBILE DEVICES
Mobile Deployment Models
MDM Concepts And Vocabulary
MDM Concepts And Vocabulary Part 2
Storage
Concepts And Vocabulary
Concepts And Vocabulary Part 2
Security Controls For Mobile Devices – Key Points
IMPLEMENTING NETWORK SECURITY
IDSs Vs IPSs Casp
What Is A SIEM System
Network Security Concepts And Vocabulary
Hands-On Deploy Network Security Platform OPNsense
SoC, BASs, ICS And SCADA
Network-Enabled Devices Review Questions
Remote Access And IPv6
Network Authentication
Network Topologies And SDN
Optimizing Resource Placement
Advanced Network Design Review Questions
Network Security Controls Concepts Vocabulary
VLANS And Network Data Flow
DPI And HTTPS Inspection
Network Device Configurations
NAC And Alerting
Hands On: Implementing Network Monitoring Ntopng
Implementing Network Security – Key Points
IMPLEMENTING SECURITY IN THE SYSTEMS AND SOFTWARE DEVELOPMENT LIFECYCLE
What Is The Systems Development Life Cycle SDLC
Development Methodologies
What Are The SDLC Phases
Security Requirements Traceability Matrix SRTM
Common Software Development Approaches
Common Software Development Methods
What About Validation And Acceptance Testing
SDLC Review Questions
Secure Vs Insecure Direct Object References
Error Exception Handling Try…Catch Statements
What Is Privilege Escalation
Overflows And Canaries
Memory Leaks
Races And Exhaustion
What Is SQL Injection
What Is Session…
What Is A Cross-Site Scripting XSS Attack
Cross-Site Request Forgery XSRF/CSRF Attack
What About Clickjacking And Cookie Hijacking
What Is Security By…
Input Validation Fuzzing Application Sandboxing
WS-Security DAM And Software Assurance Tech
Implementing Security In The SDLC – Key Points
INTEGRATING ASSETS IN A SECURE ENTERPRISE ARCHITECTURE
Integrate Best Practices In Enterprise Security
Technical Deployment Models: What Is A Model
Technical Deployment Models: What Is Cloud
Cloud Security Services In The Enterprise
Secure Design: Vocabulary And Concepts
Secure Design: Vocabulary And Concepts Part 2
Secure Design: Review Questions
Data Security: Owners, Processors And Sovereignty
Data Security: Data Flow Security
Data Security: Data Remanence
Data Security: Provisioning And Deprovisioning
Data Security: Review Questions
Enterprise Applications: What Are They
Enterprise Applications: Directory Svcs, DNS
Enterprise Applications: Directory Svsc, DNS Pt.2
Enterprise Applications: Hands On With DNS RRs
DNSSEC, Zone Transfers And TSIGs
DNSSEC, Zone Transfers And TSIG Part 2
DNSSEC, Zone Transfers And TSIG Part 3
Hands On With DNSSEC
Enterprise Applications: Configuration Management
Enterprise Applications: Review Questions
Integrating Assets – Key Points
CONDUCTING SECURITY ASSESSMENTS
Security Assessments: Types
Security Assessments: Application Code Review
Going Deeper: Vulnerability Scanning
Going Deeper: Testing Software
Software Testing Types
Software Testing Types Part 2
Logs, Memory And Debugging
Social Engineering
OSINT, Self-Assessments And Teaming
Security Assessments – Review Questions
Vulnerability Scanner (Nikto)
Port Scanner (Zenmap)
Protocol Analyzer (Wireshark)
Network Enumerator (Zenmap)
Password Cracker (John The Ripper)
Using A Fuzzer In Kali Linux
HTTP Interceptor (Burp Suite)
Exploitation Framework (Social-Engineer Toolkit)
Log Analysis In Kali (Grep And Cut)
OpenSCAP
Reverse Engineering (Strace)
Conducting Security Assessments – Key Points
RESPONDING TO AND RECOVERING FROM INCIDENTS
Concepts And Vocabulary
Incident Response Facilitators
Incident Response Facilitators Part 2
E-Discovery
Incident Response Review Questions
What Is COOP
CSIRTs And Common Tools
Evidence Collection And Handling
Types Of Evidence
Five Rules Of Evidence 5 B’s
Principles Of Criminalistics
Investigation Process
Forensic Analysis Of Compromised Systems
What Is The Order Of Volatility
Conducting Forensic Analysis With Autopsy
Responding To Incidents – Key Points
Linux
- USING THE SHELL
Overview
Terminals And Shells
Terminals And Shells Part 2
Executing Commands
Executing Commands Part 2
Executing Commands Part 3
Getting Help
MOVING AROUND THE FILESYSTEM
Filesystem Hierarchy
Filesytem Commands
Filesystem Commands Part 2
Filesystem Permissions
Moving Files
WORKING WITH TEXT FILES
Editing Files With Vi
Editing Files With Vi Part 2
Finding Files
MANAGING RUNNING PROCESSES
Managing Processes
Managing Processes Part 2
WRITING SIMPLE SHELL SCRIPTS
Executing Scripts
Programming Constructs
Programming Constructs Part 2
- UNDERSTANDING SERVER ADMINISTRATION
Overview
Installing Linux As A Server
Installing Linux As A Server Part 2
Hardening A Linux Server
Configuring SSH
Configuring System Logging
Monitoring Performance
ADMINISTERING NETWORKING
Configure Networking
Advanced Networking
STARTING AND STOPPING SERVICES
SysV Init And Upstart
Systemd
CONFIGURING A DNS SERVER
Installing BIND
Configuring Zones And Records
Configuring Zones And Records Part 2
CONFIGURING A DHCP SERVER
Installing Dhcpd
CONFIGURING AN APACHE WEB SERVER
Installing Httpd
Installing Httpd Part 2
Configuring SSL
CONFIGURING A MARIADB DATABASE SERVER
Installing MariaDB
Installing MariaDB Part 2
Working With Data
Working With Data Part 2
CONFIGURING A SAMBA FILE SERVER
Installing Samba
Installing Samba Part 2
CONFIGURING AN NFS FILE SERVER
Installing NFS
CONFIGURING A FTP SERVER
Configuring An FTP Server
Configuring An SFTP Server
- LEARNING SYSTEM ADMINISTRATION
Overview
Graphical Administration Tools
The Root User Account
Administrative Commands
Administrative Commands Part 2
Configuring Hardware
Configuring Hardware Part 2
INSTALLING LINUX
Installing Ubuntu
Installing Ubuntu Part 2
Installing Ubuntu Part 3
Installing Fedora
Installing Fedora Part 2
Installing Fedora Part 3
Enterprise Installations
Dual Booting
Dual Booting Part 2
GETTING AND MANAGING SOFTWARE
Managing Software With Apt
Managing Software With YUM/DNF
MANAGING USER ACCOUNTS
Creating User Accounts
Understanding Group Accounts
Advanced Permissions
MANAGING DISKS AND FILESYSTEMS
Partitioning Disks
Formatting And Mounting Disks
Using LVM
- GETTING STARTED WITH LINUX
Getting Started With Linux
Linux System Structure
Working With The Command Line
Understanding Shells
Constructing Commands
Command Substitution And History
Command Paths
File System Heirarchy
File Specifics
Creating Files
Managing Files
Archiving And Compressing Files
Finding Files
Managing Users And Groups
Pipes And Redirection
Working With Permissions
Special Permissions
Processing Text
Intro To Debian
Intro To RPM Package Management
Configuring Name Resolution
Editing Text
Troubleshooting And Getting Help
- PERFORMING BASIC LINUX TASKS
Overview
Introduction To Linux
Linux Command Line
MANAGING USERS AND GROUPS
Super User Privileges
Managing Users
Managing Groups
MANAGING PERMISSIONS AND OWNERSHIP
Managing File Permissions
Advanced Permissions
MANAGING STORAGE
Partitioning Disks
Linux File System
Logical Volume Manager (LVM)
Filesystem Hierarchy Standard (FHS)
MANAGING FILES AND DIRECTORIES
Editing Files With Vi
Editing Files With Vi Part 2
Working With Files
Locating Files
Searching With Grep
Manipulating Text
MANAGING KERNEL MODULES
Managing Kernal Modules
MANAGING THE LINUX BOOT PROCESS
Managing The Linux Boot Process
MANAGING SYSTEM COMPONENTS
Graphical User Interfaces
Managing Services With Systemd
Managing Services With SysVinit
Troubleshooting Services
Troubleshooting Services Part 2
MANAGING DEVICES
Configuring Hardware
Supporting Printers
MANAGING NETWORKING
Understanding TCPIP
Configure Networking
Troubleshooting Network Connections
MANAGING PACKAGES AND SOFTWARE
Managing Software With Apt
Managing Software With Yum/DNF
Building From Source
SECURING LINUX SYSTEMS
Linux Security Best Practices
Linux Security Best Practices Part 2
Securing Apps With SELinux
Securing Apps With AppArmor
Filtering Traffic With Firewalld
Filtering Traffic With Iptables
Backup And Restore Data
WORKING WITH BASH SCRIPTS
Configuring Bash
Writing A Bash Script
AUTOMATING TASKS
Scheduling Tasks
Scheduling Tasks Part 2
Version Control With Git
INSTALLING LINUX
Installing CentOS
Installing CentOS Part 2
Installing Ubuntu
- LINUX FOR BEGINNERS
Overview
What Is Linux
Choosing A Distribution
Choosing A Desktop
Installing Software
- GETTING STARTED WITH THE CLI
Terminals And Shells
Terminals And Shells Part 2
Getting Help
BASIC SHELL COMMANDS
Navigating The Filesystem
Working With Files
Working With Files Part 2
ADVANCED SHELL COMMANDS
Managing Processes
Managing Storage
Finding Files
Other Useful Commands
SHELL ENVIRONMENTS
Environment Variables
Environment Variables Part 2
File Permissions
File Systems
INSTALLING SOFTWARE
Debian Package Management
Redhat Package Management
Installing From Source
EDITING FILES
Vi And Vim
Vi And Vim Part 2
GNU Nano
- KVM VIRTUAL MACHINES
Overview
Linux As A KVM Host
Linux As A KVM Host Part 2
Linux As A KVM Guest
AMAZON AWS EC2 INSTANCES
Creating An EC2 Instance
Creating An EC2 Instance Part 2
Configuring An EC2 Instance
MICROSOFT AZURE COMPUTE
Creating An Azure VM
Creating An Azure VM Part 2
Configuring An Azure VM
DOCKER CONTAINERS
Linux As A Docker Host
Linux As A Docker Container
Linux As A Docker Container Part 2
- MONITORING AND AUDITING SECURITY
Overview
Managing Logs With Syslog
Managing Logs With Journald
Auditing User Passwords
Auditing User Passwords Part 2
Auditing The Filesystem
Auditing SUID And SGID
Auditing Logins With Fail2ban
DATA SECURITY
LUKS Disk Encryption
Data Encryption With GPG
MD5 And SHA Checksums
Data Encryption With SSH
SECURING SERVICES
Securing Services With SELinux
Securing Services With SELinux Part 2
Chroot Jails
LXC Containers
SECURING NETWORKS
TCP Wrappers
Network Security With Iptables
Network Security With Firewalld
SECURITY TESTING
Verifying Firewall Configurations
Verifying Network Data Encryption
Verifying Network Data Encryption Part 2
- BASIC SCRIPT BUILDING
Overview
Basic Script Building
USING VARIABLES
Using Variables
PERFORMING MATH
Redirection
Performing Arithmetic
EXITING SCRIPTS
Conditional Statements
Conditional Statements Part 2
Conditional Statements Part 3
STRUCTURED COMMANDS
Loops
Loops Part 2
Loops Part 3
HANDLING USER INPUT
User Input Positional Parameters
User Input Positional Parameters Pt 2
User Input Options
User Input Options Part 2
User Input Read
PRESENTING DATA
Presenting Data File Descriptors
SCRIPT CONTROL
Script Control
Script Control Part 2
- FUNCTIONS AND LIBRARIES
Overview
Functions
SED AND AWK
Intro To Sed
Intro To Sed Part 2
Intro To Sed Part 3
Intro To Awk
REGEX
Regular Expressions
Regular Expressions Part 2
GUI SCRIPTING
Writing Graphical Scripts
Writing Graphical Scripts Pt2
ADVANCED SED
Advanced Sed: Multi-Line Commands
Advanced Sed: Multi-Line Commands Part 2
Advanced Sed: Hold Space For Negation
ADVANCED GAWK
Advanced Gawk: Variables
Advanced Gawk: Arrays
Advanced Gawk: Structured Commands
Advanced Gawk: Formatted Printing And Functions
- INTRODUCTION TO RHEL
Overview
Installing RHEL7
Using The RHEL7 Console
Software Updates
Software Updates Part 2
Deploying With Kickstart
Deploying With Kickstart Part 2
Systemd
Creating USB Install Media
NETWORKING
Network Configuration
Network Configuration Part 2
Network Time Protocol (NTP)
Network File System (NFS)
Samba And SMB
Samba And SMB Part 2
STORAGE
File System Hierarchy
Managing File Systems
Logical Volume Manager
File System Snapshots
System Storage Manager (SSM)
Choosing A File System
Migrating A File System
Working With XFS
SECURITY
LUKS Disk Encryption
Managing SELinux
Configuring Firewalld
Securing SSH
Security Updates
TROUBLESHOOTING
Automatic Bug Reporting Tool (ABRT)
SOS Reports
Monitoring System Performance
Monitoring System Logs
VIRTUALIZATION
Using QEMU And KVM
(ISC)²
- ACCESS CONTROLS
Control Access To Assets
Manage Identification And Authentication
Manage Identification And Authentication Pt.2
Manage Identification And Authentication Pt.3
Integrate Identity As A Third Party Service
Authorization Mechanisms
Authorization Mechanisms Part 2
Authorization Mechanisms Part 3
Authorization Mechanisms Part 4
The Identity And Access Provisioning Lifecycle
Access Control Attacks
Access Controls – Key Points
SECURITY OPERATIONS & ADMINISTRATION
The ISC2 Code Of Professional Ethics
Identify And Classify Assets
Asset Ownership And Privacy Protection
Establish Asset Handling Requirements
Secure Provisioning And Resource Protection
Databases And Data Warehouses
Databases And Data Warehouses Part 2
Foundational Security Operations Concepts
Determine Data Security Controls
Assessment, Test And Audit Strategies
Control Selection And System Requirments
Control Selection And System Requirements Part 2
Participate In Change Management
Implement Recovery Strategies
Implement Recovery Strategies Part 2
Implement Recovery Strategies Part 3
Implement Physical Security
Implement Physical Security Part 2
Personnel Safety And Security Concerns
Patch And Vulnerability Management
Security In The SDLC
Security In The SDLC Part 2
Security Controls In Development Environments
Security Operations, Administration – Key Points
RISK IDENTIFICATION, MONITORING AND ANALYSIS
Review Of Confidentiality, Integrity, Availability
Evaluate And Apply Security Governance Principles
Determine Compliance Requirements
Information Security In A Global Context
Risk Management Concepts
Risk Management Concepts Part 2
Risk Management Concepts Part 3
Threat Modeling Concepts
Risk In The Supply Chain
Assessment And Testing
Assessment And Testing Part 2
Assessment And Testing Part 3
Logging And Monitoring
Logging And Monitoring Part 2
Risk Identification, Monitoring, Analysis Key Pnts
INCIDENT RESPONSE AND RECOVERY
Supporting Forensic Investigations
Supporting Forensic Investigations Part 2
Conduct Incident Management
Business Continuity And Disaster Recovery
Business Continuity And Disaster Recovery Pt.2
Incident Response And Recovery – Key Points
CRYPTOGRAPHY
Cryptography… Just What Is It Anyway
Applied Cryptography
Applied Cryptography Part 2
Applied Cryptography Part 3
Applied Cryptography Part 4
Applied Cryptography Part 5
Applied Cryptography Part 6
Applied Cryptography Part 7
Applied Cryptography Part 8
Applied Cryptography Part 9
Cryptography – Key Points
NETWORK AND COMMUNICATIONS SECURITY
Design Principles In Network Architecture
Design Principles In Network Architecture Part 2
Design Principles In Network Architecture Part 3
Design Principles In Network Architecture Part 4
Design Principles In Network Architecture Part 5
Design Principles In Network Architecture Part 6
Design Principles In Network Architecture Part 7
Design Principles In Network Architecture Part 8
Design Principles In Network Architecture Part 9
Secure Network Components
Secure Network Components Part 2
Secure Network Components Part 3
Implement Secure Communication Channels
Implement Secure Communication Channels Pt.2
Implement Secure Communication Channels Pt.3
Implement Secure Communication Channels Pt.4
Implement Secure Communication Channels Pt.5
Network And Communication Security – Key Points
SYSTEMS AND APPLICATION SECURITY
Identify And Analyze Malicious Code
Identify And Analyze Malicious Code Part 2
Identify And Analyze Malicious Code Part 3
Endpoint Device Security
Endpoint Device Security Part 2
Cloud Computing
Operate And Secure Virtual Environments
Systems And Application Security – Key Points
- SECURITY AND RISK MANAGEMENT
Overview
Confidentiality, Integrity, Availability (CIA)
Confidentiality, Integrity, Availability (CIA) Pt2
Evaluate, Apply Security Governance Principles
Evaluate, Apply Security Goverance Principles Pt2
Determine Compliance Requirements
Determine Compliance Requirements Part 2
Determine Compliance Requirements Part 3
Understand Legal And Regulatory Issues
Understand Legal And Regulatory Issues Part 2
Understand, Adhere To And Promote Ethics
Policy, Standards, Procedures And Guidelines
Understand Business Continuity Requirements
Understand Business Continuity Requirements Part 2
Understand Business Continuity Requirements Part 3
Personnel, Security Policies And Procedures
Understand/Apply Risk Management Concepts
Understand/Apply Risk Management Concepts Part 2
Understand/Apply Risk Management Concepts Part 3
Understand/Apply Risk Management Concepts Part 4
Understand/Apply Risk Management Concepts Part 5
Understanding/Apply Threat Modeling Concepts
Apply Risk Management To The Supply Chain
Security Awareness/Education And Training
Security And Risk Management – Key Points
CIA Deep Dive
Organizational Roles And Responsibilities
Risk Terminology And Concepts
ASSET SECURITY
Identify And Classify Information And Assets
Determine And Maintain Information/Asset Ownership
Protect Privacy
Protect Privacy Part 2
Ensure Appropriate Asset Retention
Determine Data Security Controls
Determine Data Security Controls Part 2
Determine Data Security Controls Part 3
Establish Asset Handling Requirements
Asset Security – Key Points
SECURITY ARCHITECTURE AND ENGINEERING
Implement And Manage Engineering Processes
Fundamental Concepts Of Systems And Security
Fundamental Concepts Of Systems And Security Pt.2
Fundamental Concepts Of Systems And Security Pt.3
Fundamental Concepts Of Systems And Security Pt.4
Fundamental Concepts Of Systems And Security Pt.5
Controls Based On Security Requirements
Controls Based On Security Requirements Part 2
Vulnerabilities Of Security Architecture
Vulnerabilities Of Security Architecture Part 2
Vulnerabilities Of Security Architecture Part 3
Vulnerabilities Of Security Architectures Part 4
Vulnerabilities In Web-Based Systems
Vulnerabilities In Web-Based Systems Part 2
Vulnerabilities In Mobile Systems
Vulnerabilities In Embedded Devices
Apply Cryptography
Apply Cryptography Part 2
Apply Cryptography Part 3
Apply Cryptography Part 4
Apply Cryptography Part 5
Apply Cryptography Part 6
Apply Cryptography Part 7
Apply Cryptography Part 8
Apply Cryptography Part 9
Apply Cryptography Part 10
Apply Cryptography Part 11
Apply Cryptography Part 12
Apply Cryptography Part 13
Site/Facility Design And Security
Site/Facility Design And Security Part 2
Site/Facility Design And Security Part 3
Site/Facility Design And Security Part 4
Security Architecture And Engineering – Key Points
COMMUNICATION AND NETWORK SECURITY
Secure Design Principles In Networks
Secure Design Principles In Networks Part 2
Secure Design Principles In Networks Part 3
Secure Design Principles In Networks Part 4
Secure Design Principles In Networks Part 5
Secure Design Principles In Networks Part 6
Secure Design Principles In Networks Part 7
Secure Design Principles In Networks Part 8
Secure Design Principles In Networks Part 9
Secure Design Principles In Networks Part 10
Secure Design Principles In Networks Part 11
Secure Design Principles In Networks Part 12
Secure Network Components
Secure Network Components Part 2
Secure Network Components Part 3
Secure Network Components Part 4
Secure Network Components Part 5
Implement Secure Communication Channels
Implement Secure Communication Channels Part 2
Implement Secure Communication Channels Part 3
Implement Secure Communication Channels Part 4
Implement Secure Communication Channels Part 5
Implement Secure Communication Channels Part 6
Communication And Network Security – Key Points
IDENTITY AND ACCESS MANAGEMENT (IAM)
Control Physical And Logical Access To Assets
Control Physical And Logical Access To Assets Pt 2
Manage Identification And Authentication
Manage Identification And Authentication Part 2
Manage Identification And Authentication Part 3
Integrate Identity As A Third-Party Service
Implement/Manage Authorization Mechanisms
Implement/Manage Authorization Mechanisms Pt.2
Manage Identity And Access Provisioning Lifecycle
Access Control Attacks
Access Control Attacks Part 2
Identity And Access Management – Key Points
SECURITY ASSESSMENT AND TESTING
Assessment, Test And Audit
Assessment, Test And Audit Part 2
Conduct Security Control Testing
Conduct Security Control Testing Part 2
Conduct Security Control Testing Part 3
Collect Security Process Data
Security Assessment And Testing – Key Points
SECURITY OPERATIONS
Understand And Support Investigations
Conduct Logging And Monitoring Activities
Provisioning And Protecting Resources
Provisioning And Protecting Resources Part 2
Apply Foundational Security Operation Concepts
Conduct Incident Management
Detective And Preventative Measures
Detective And Preventative Measures Part 2
Patch And Vulnerability Management
Understand Change Management
Implement Recovery Strategies
Implement Recovery Strategies Part 2
Implement Recovery Strategies Part 3
Implement Recovery Strategies Part 4
Implement Recovery Strategies Part 5
Implement And Test BCDR
Implement And Test BCDR Part 2
Implement And Test BCDR Part 3
Implement And Manage Physical Security
Implement And Manage Physical Security Part 2
Personnel Safety And Security Concerns
Security Operations – Key Points
SOFTWARE DEVELOPMENT SECURITY
Security In The SDLC
Security In The SDLC Part 2
Security In The SDLC Part 3
Security In The SDLC Part 4
Security In The SDLC Part 5
Security In The SDLC Part 6
Security Controls In Dev Environments
Security Controls In Dev Environments Part 2
Security Controls In Dev Environments Part 3
Security Controls In Dev Environments Part 4
Security Controls In Dev Environments Part 5
Security Controls In Dev Environments Part 6
Security Controls In Dev Environments Part 7
Security Controls In Dev Environments Part 8
Security Controls In Dev Environments Part 9
Assess Effectiveness Of Software Security
Assess Security Impact Of Acquired Software
Secure Coding Guidelines And Standards
Databases And Data Warehouses
Databases And Data Warehouses Part 2
Types Of Storage
Knowledge-Based Systems
Software Development Security – Key Points
- SECURITY AND RISK MANAGEMENT
Overview
Security And Risk Management
Security And Risk Management Part 2
Security And Risk Management Part 3
Security And Risk Management Part 4
Security And Risk Management Part 5
Security And Risk Management Part 6
Security And Risk Management – Key Points
ASSET SECURITY
Asset Security
Asset Security Part 2
Asset Security – Key Points
SECURITY ARCHITECTURE AND ENGINEERING
Security Architecture And Engineering
Security Architecture And Engineering Part 2
Security Architecture And Engineering Part 3
Security Architecture And Engineering Part 4
Security Architecture And Engineering Part 5
Security Architecture And Engineering Part 6
Security Architecture And Engineering Part 7
Security Architecture And Engineering Part 8
Security Architecture And Engineering Part 9
Security Architecture And Engineering Part 10
Security Architecture And Engineering Part 11
Security Architecture And Engineering Part 12
Security Architecture And Engineering Part 13
Security Architecture And Engineering Part 14
Security Architecture And Engineering Part 15
Security Architecture And Engineering Part 16
Security Architecture And Engineering Part 17
Security Architecture, Engineering Key Points
COMMUNICATION AND NETWORK SECURITY
Communication And Network Security
Communication And Network Security Part 2
Communication And Network Security Part 3
Communication And Network Security Part 4
Communication And Network Security Part 5
Communication And Network Security Part 6
Communication And Network Security Part 7
Communication And Network Security Part 8
Communication And Network Security Part 9
Communication And Network Security – Key Points
IDENTITY AND ACCESS MANAGEMENT (IAM)
Identity And Access Management (IAM)
Identity And Access Management (IAM) Part 2
Identity And Access Management (IAM) Part 3
Identity And Access Management (IAM) Part 4
Identity And Access Management (IAM) Part 5
Identity And Access Management (IAM) – Key Points
SECURITY ASSESSMENT AND TESTING
Security Assessment And Testing
Security Assessment And Testing Part 2
Security Assessment And Testing Part 3
Security Assessment And Testing Part 4
Security Assessment And Testing – Key Points
SECURITY OPERATIONS
Security Operations
Security Operations Part 2
Security Operations Part 3
Security Operations Part 4
Security Operations Part 5
Security Operations Part 6
Security Operations Part 7
Security Operations Part 8
Security Operations Part 9
Security Operations Part 10
Security Operations Part 11
Security Operations Part 12
Security Operations Part 13
Security Operations – Key Points
SOFTWARE DEVELOPMENT SECURITY
Software Development Security
Software Development Security Part 2
Software Development Security Part 3
Software Development Security Part 4
Software Development Security Part 5
Software Development Security Part 6
Software Development Security Part 7
Software Development Security – Key Points
- ARCHITECTURAL CONCEPTS AND DESIGN REQUIREMENTS
Overview
Cloud Computing Concepts
Describe Cloud Reference Architecture
Describe Cloud Reference Architecture Part 2
Cloud Security Concepts
Cloud Security Concepts Part 2
Secure Cloud Design Principles
CLOUD DATA SECURITY
Cloud Data Security
Cloud Data Storage Architectures
Cloud Data Security Strategies
Cloud Data Security Strategies Part 2
Cloud Data Security Strategies Part 3
Cloud Data Discovery And Classification
Designing Appropriate Data Protection
Data Rights Mgmt Retention And Data Events
CLOUD PLATFORM AND INFRASTRUCTURE SECURITY
Cloud Infrastructure Components
Cloud Infrastructure Risks
Design And Plan Security Controls
Design And Plan Security Controls Part 2
Disaster, Recovery, And Business Continuity
Disaster, Recovery And Business Continuity Part 2
CLOUD APPLICATION SECURITY
Cloud Application Security And The SDLC
Identity And Access Management Solutions
Cloud Software Assurance And Validation
Cloud Software Assurance And Validation Part 2
OPERATIONS
Implement And Build Physical Infrastructure
Running Physical Infrastructure
Managing Physical Infrastructure
Ensure Compliance
Ensure Compliance Part 2
Planning Data Center Design
Risk Assessment
Collection And Preservation Of Digital Evidence
LEGAL AND COMPLIANCE
Legal Requirements And Privacy
Legal Requirements And Privacy Part 2
Cloud Audit Processes
Cloud Audit Processes Part 2
Risk Management And Outsourcing
EC Council
- INTRODUCTION
Overview
Intro To Ethical Hacking: Threats
Intro To Ethical Hacking: Threats Part 2
Intro To Ethical Hacking: Hacking Concepts
Intro To Ethical Hacking: Hacking Concepts Part 2
Intro To Ethical Hacking: Security Controls
Intro To Ethical Hacking: Security Controls Part 2
Intro To Ethical Hacking: Security Controls Part 3
Intro To Ethical Hacking: Security Controls Part 4
Intro To Ethical Hacking: Security Controls Part 5
Intro To Ethical Hacking: Pentesting
Intro To Ethical Hacking: Laws And Standards
INFORMATION GATHERING AND VULNERABILITY IDENTIFICATION
Footprinting
Footprinting Part 2
Footprinting Part 3
ATTACKS AND EXPLOITS
Host Discovery
Scanning With Nmap
Scanning With Nmap Part 2
ProxyChains
ENUMERATION
Enumeration
VULNERABILITY ANALYSIS
Vulnerability Analysis Concepts
Vulnerability Analysis Tools
SYSTEM HACKING
Password Attacks
Password Attacks Part 2
Password Attacks Part 3
Password Attacks Part 4
Password Attacks Part 5
Privilege Escalation
Privilege Escalation Part 2
Privilege Escalation Part 3
Covert Data Gathering
Hidden Files
Covering Tracks
MALWARE THREATS
Malware Threats Cehv10
Malware Threats Part 2
Malware Threats Part 3
SNIFFING
Network Sniffing
Network Sniffing Part 2
SOCIAL ENGINEERING
Social Engineering
Social Engineering Part 2
Social Engineering Part 3
DENIAL OF SERVICE
Denial Of Service
Denial Of Service Part 2
Denial Of Service Part 3
SESSION HIJACKING
Session Hijacking
Session Hijacking Part 2
Session Hijacking Part 3
EVADING IDS, FIREWALLS, AND HONEYPOTS
Evading IDS, Firewalls And Honeypots
Evading IDS, Firewall And Honeypots Part 2
Evading IDS, Firewall And Honeypots Part 3
Evading IDS, Firewall And Honeypots Part 4
Evading IDS, Firewall And Honeypots Part 5
HACKING WEB SERVERS
Hacking Web Servers
HACKING WEB APPLICATIONS
Common Web App Threats
Common Web App Threats Part 2
Common Web Apps Threats Part 3
Common Web App Threats Part 4
Practical Web App Hacking
Practical Web App Hacking Part 2
Practical Web App Hacking Part 3
SQL INJECTION
SQL Concepts
SQL Injection Types
Other SQLi And Tools
HACKING WIRELESS NETWORKS
Wireless Hacking Concepts
Wireless Hacking: Tools
Wireless Hacking: Tools Part 2
Wireless Hacking: Common Threats
Wireless Hacking: Common Threats Part 2
Wireless Hacking: Cracking WEP
Wireless Hacking: Cracking WPA/WPA2
HACKING MOBILE PLATFORMS
Mobile Hacking
IOT HACKING
IoT Concepts
IoT Concepts Part 2
IoT Attacks
IoT Attacks Part 2
IoT Attacks Part 3
CLOUD COMPUTING
Cloud Computing Concepts
Cloud Computing Concepts Part 2
Cloud Computing Attacks
Cloud Computing Attacks Part 2
CRYPTOGRAPHY
Cryptography Concepts
Cryptography Concepts Part 2
Cryptography Concepts Part 3
Cryptography Concepts Part 4
Cryptography Concepts Part 5
Cryptography Concepts Part 6
Cryptography Attacks
- COMPUTER FORENSICS IN TODAY’S WORLD
Overview
Computer Forensics In Todays World
Computer Forensics In Todays World Part 2
Computer Forensics In Todays World Part 3
Computer Forensics In Todays World Part 4
Computer Forensics In Todays World Part 5
COMPUTER FORENSICS INVESTIGATION PROCESS
The Investigation Process
The Investigation Process Part 2
The Investigation Process Part 3
The Investigation Process Part 4
The Investigation Process Part 5
The Investigation Process Part 6
The Investigation Process Part 7
Investigative Tools Demonstration
UNDERSTANDING HARD DISKS AND FILE SYSTEMS
Hard Disks And File Systems
Hard Disks And File Systems Part 2
Hard Disks And File Systems Part 3
Hard Disks And File Systems Part 4
Forensic File System Tools Demonstration
DATA ACQUISITION AND DUPLICATION
Data Acquisition And Duplication
Data Acquisition And Duplication Part 2
Data Acquisition And Duplication Part 3
Data Acquisition Tools Demonstration
DEFEATING ANTI-FORENSICS TECHNIQUES
Defeating Anti-Forensic Techniques
Defeating Anti-Forensic Techniques Part 2
Defeating Anti-Forensic Techniques Part 3
Defeating Anti-Forensic Techniques Part 4
Anti-Forensics Tools Demonstration
OPERATING SYSTEM FORENSICS
Operating System Forensics
Operating System Forensics Part 2
Operating System Forensics Part 3
Operating System Forensics Part 4
Operating System Forensics Part 5
Operating System Forensics Part 6
NETWORK FORENSICS
Network Forensics
Network Forensics Part 2
Network Forensics Part 3
Network Forensics Part 4
INVESTIGATING WEB ATTACKS
Investigating Web Attacks
Investigating Web Attacks Part 2
Investigating Web Attacks Part 3
Investigating Web Attacks Part 4
Investigating Web Attacks Part 5
Investigating Web Attacks Part 6
DATABASE FORENSICS
Database Forensics
Database Forensics Part 2
CLOUD FORENSICS
Cloud Forensics
Cloud Forensics Part 2
Cloud Forensics Part 3
Cloud Forensics Part 4
MALWARE FORENSICS
Malware Forensics
Malware Forensics Part 2
INVESTIGATING EMAIL CRIMES
Investigating Email Crimes
Investigating Email Crimes Part 2
Investigating Email Crimes Part 3
MOBILE FORENSICS
Mobile Forensics
Mobile Forensics Part 2
Mobile Forensics Part 3
INVESTIGATIVE REPORTS
Forensics Report Writing And Presentation
- INTRODUCTION TO INCIDENT RESPONSE AND HANDLING
Overview
Intro To Incident Response
Intro To Incident Response Part 2
Intro To Incident Response Part 3
Intro To Incident Response Part 4
RISK ASSESSMENT
Risk
Risk Part 2
Risk Part 3
Risk Part 4
INCIDENT RESPONSE AND HANDLING STEPS
Incident Response Steps
Incident Response Steps Part 2
Incident Response Steps Part 3
Incident Response Steps Part 4
CSIRT
CSIRT
CSIRT Part 2
CSIRT Part 3
HANDLING NETWORK SECURITY INCIDENTS
Network Security Incidents
Network Security Incidents Part 2
Network Security Incidents Part 3
HANDLING MALICIOUS CODE INCIDENTS
Malicious Code Incidents
HANDLING INSIDER THREATS
Insider Threats
Insider Threats Part 2
FORENSIC ANALYSIS AND INCIDENT RESPONSE
Forensic Analysis And Incident Response
Forensic Analysis And Incident Response Part 2
INCIDENT REPORTING
Incident Reporting
INCIDENT RECOVERY
Incident Recovery
SECURITY POLICIES AND LAWS
Security Policy And Law
Security Policy And Law Part 2
- INTRODUCTION AND HISTORY OF CRYPTOGRAPHY
Overview
History Of Cryptography
History Of Cryptography Part 2
History Of Cryptography Part 3
Crypto Definitions
Crypto Definitions Part 2
Crypto Definitions Part 3
SYMMETRIC CRYPTOGRAPHY & HASHES
Symmetric Cryptography And Hashes
Symmetric Cryptography And Hashes Part 2
Symmetric Cryptography And Hashes Part 3
Symmetric Cryptography And Hashes Part 4
Symmetric Cryptography And Hashes Part 5
Symmetric Cryptography And Hashes Part 6
Symmetric Cryptography And Hashes Part 7
NUMBER THEORY AND ASYMMETRIC CRYPTOGRAPHY
Asymmetric Cryptography
Asymmetric Cryptography Part 2
Asymmetric Cryptography Part 3
APPLICATIONS OF CRYPTOGRAPHY
Applications Of Cryptography
Applications Of Cryptography Part 2
Applications Of Cryptography Part 3
Applications Of Cryptography Part 4
Applications Of Cryptography Part 5
Applications Of Cryptography Part 6
Cryptanalysis
Cryptanalysis Part 2
Apple
- Overview
Installation Images
Building NetInstall Images
Building NetRestore Images
DEPLOYING IMAGES
Deploying Via USB
Deploying Via Network
MANAGING MAC COMPUTERS WITH APPLE REMOTE DESKTOP
Apple Remote Desktop
MANAGING OS X DEVICES WITH PROFILE MANAGER
Open Directory
Profile Manager
Profile Manager Part 2
MANAGING SOFTWARE UPDATES
Managing Updates
CACHING SOFTWARE DOWNLOADS
Caching Downloads
- DIRECTORY SERVICES
Overview
Directory Services
FILE SHARING
File Sharing
EMAIL, CONTACTS AND CALENDARS
Collaboration Software
SECURITY
Security Features
Security Features Part 2
Security Features Part 3
Security Features Part 4
PRINTING
Printing
MOVING AND BACKING UP CONTENT
Moving Content
Time Machine
RUNNING WINDOWS ON A MAC
Running Windows Applications
Boot Camp
Boot Camp Part 2
- INSTALLATION AND CONFIGURATION
Overview
Getting Prepared
Installing MacOS High Sierra
OS Recovery
Initial Configuration
Initial Configuration Part 2
USER ACCOUNTS
Managing User Accounts
Managing User Accounts Part 2
Multiple User Accounts
User Account Security
FILE SYSTEMS
File Storage
File Storage Part 2
Securing Data
Securing Data Part 2
File Permissions
File Permissions Part 2
File Permissions Part 3
DATA MANAGEMENT
Managing Files
Managing Files Part 2
Archives And Images
Time Machine
APPLICATIONS AND PROCESSES
Managing Applications
Application Data
Application Data Part 2
Application Support
Application Support Part 2
Application Support Part 3
NETWORK CONFIGURATION
Network Configuration
Network Configuration Part 2
Network Configuation Part 3
Advanced Network Configuration
NETWORK SERVICES
Sharing Resources
Sharing Resources Part 2
Using ICloud
SYSTEM MANAGEMENT
Peripheral Devices
Supporting Printers
System Troubleshooting
System Troubleshooting Part 2
System Troubleshooting Part 3
- CONFIGURING AND MONITORING OS X SERVER
Overview
Installing OS X Server
Installing OS X Server Part 2
Domain Name System
Remote Management
Certificates
Monitoring
OS X Maintenance
CONFIGURING ACCOUNTS
User Authentication
Open Directory
User Accounts
User Accounts Part 2
MANAGING DEVICES WITH CONFIGURATION PROFILES
Configuration Profiles
Configuration Profiles Part 2
Configuration Profiles Part 3
SHARING FILES
Sharing Files
IMPLEMENTING DEPLOYMENT SOLUTIONS
Caching Server
Software Update
Deployment With NetInstall
Deployment With NetRestore
Deploying An Image
PROVIDING NETWORK SERVICES
Time Machine
DHCP
Virtual Private Networks
Basic Web Server
Advanced Web Server
USING COLLABORATIVE SERVICES
Wiki Websites
Mail Server
Mail Server Part 2
Calendar Server
Contacts Service
Messages Service
- INSTALLATION AND CONFIGURATION
Getting Prepared
Installing MacOS Mojave
OS Recovery
OS Recovery Part 2
Initial Configuration
Initial Configuration Part 2
USER ACCOUNTS
Managing User Accounts
Managing User Accounts Part 2
Multiple User Accounts
User Account Security
FILE SYSTEMS
File Storage
File Storage Part 2
Securing Data
Controlling File Permissions
UNIX Style Permissions
Default File Permissions
DATA MANAGEMENT
Managing Files
Managing Files Part 2
Archives And Images
Time Machine
APPLICATIONS AND PROCESSES
Managing Applications
Application Data
Application Data Part 2
Application Support
Application Support Part 2
Application Support Part 3
NETWORK CONFIGURATION
Network Types And Addressing
Configuring Network Adapters
Configuring Wireless Networking
Network Locations
NETWORK SERVICES
Sharing Resources
Sharing Resources Part 2
Administering ICloud
SYSTEM MANAGEMENT
Peripheral Devices
Supporting Printers
Understanding The MacOS Boot Process
System Troubleshooting
- INTRODUCTION
Overview
What’s New In MacOS Server 5.6
Installing MacOS Server
Remote Management
Monitoring Performance
Managing Software With Brew
Managing Software With Brew Part 2
SERVICES THAT STAYED
Open Directory
Profile Manager
Profile Manager Part 2
Profile Manager Part 3
SERVICES THAT MOVED
File Server
Time Machine Server
Caching Server
SERVICES THAT ARE GONE
Replacing DNS With ISC-BIND
Replacing DNS With ISC-BIND Part 2
Replacing DHCP With ISC-DHCP
Replacing Websites With Apache
Replacing Websites With Apache Part 2
Replacing Websites With Apache Part 3
Replacing Websites With Apache Part 4
Replacing Mail Server
AWS
- CLOUD CONCEPTS
Overview
What Is Cloud Computing
Global Infrastructure And The AWS Advantage
Sign Up For AWS
SECURITY
IAM: Access Management In AWS
S3: Durable And Available Storage
S3: Create A Static Website
EC2: VMs In The Cloud
EC2: Create And Manage Instances
EC2: Use A Load Balancer
Lambda: Serverless Compute
Elastic Beanstalk And CloudFormation
Databases In AWS
Create An RDS Database
Route53: DNS With Options
CloudWatch And CloudTrail
TECHNOLOGY
Compliance And The Shared Responsibility Model
Protection Services
BILLING AND PRICING
Consolidated Billing And Organizations
- INTRODUCTION TO AWS
Overview
Introduction To AWS
Introduction To AWS Part 2
AMAZON S3 AND GLACIER STORAGE
Amazon S3 Basics
Amazon S3 Basics Part 2
Amazon S3 Advanced Features
Amazon S3 Advanced Features Part 2
Amazon Glacier
AMAZON EC2 AND EBS
Amazon EC2 Basics
Amazon EC2 Basics Part 2
Amazon EC2 Basics Part 3
Amazon EC2 Basics Part 4
AMAZON VIRTUAL PRIVATE CLOUD
Virtual Private Cloud
Virtual Private Cloud Part 2
ELB, CLOUDWATCH AND AUTO SCALING
ELB And Auto Scaling
Load Balancing And Auto Scaling
Load Balancing And Auto Scaling Part 2
Load Balancing And Auto Scaling Part 3
AWS IDENTITY AND ACCESS MANAGEMENT
Identity And Access Management
Identity And Access Management Part 2
DATABASES AND AWS
Amazon Relational Database Service
Amazon Relational Database Service Part 2
Amazon Redshift
Amazon Dynamodb
SQS, SWF, AND SNS
Amazon Simple Queue Service
Amazon Simple Workflow Service
Amazon Simple Notification Service
DNS AND AMAZON ROUTE 53
DNS And Route 53
AMAZON ELASTICACHE
Amazon ElastiCache
ADDITIONAL KEY SERVICES
Storage Services
Security Services
Analytics Services
DevOps Services
SECURITY ON AWS
Security On AWS
Account Security
Cloud Service Specific Security
Cloud Service Specific Security Part 2
Cloud Service Specific Security Part 3
AWS RISK AND COMPLIANCE
AWS Risk And Compliance
ARCHITECTURE BEST PRACTICES
Architecture Best Practices
- IDENTITY & ACCESS MANAGEMENT
AWS Security
IAM Components
IAM Authentication
IAM Groups And Roles
IAM Security Policies
IAM Security Policies Part 2
Additional Security Tools
VIRTUAL PRIVATE CLOUD
Managing VPCs
Managing VPCs Part 2
ELASTIC COMPUTE CLOUD
EC2 Disk Storage
EC2 Disk Storage Part 2
Monitoring EC2 Performance
EC2 Custom Metrics
HIGH AVAILABILITY
Supporting High Availability
Supporting High Availability Part 2
APPLICATION LOAD BALANCER
Application Load Balancers
Application Load Balancers Part 2
ROUTE 53
Supporting Route 53
Redundancy With Route 53
Redundancy With Route 53 Part 2
RELATIONAL DATABASE SERVICE
RDS Availability
RDS Performance
ORCHESTRATION
Automation And Orchestration
BACKUP AND RECOVERY
Service Backup And Recovery
Service Backup And Recovery Part 2
Service Backup And Recovery Part 3
Backup And Recovery Scenarios
Backup And Recovery Scenarios Part 2
BILLING AND COST MANAGEMENT
Managing AWS Costs
Managing AWS Costs Part 2
- IDENTITY AND ACCESS MANAGEMENT (IAM)
Overview
Security In AWS
Set Up Roles, Groups And Users
Set Up Roles, Groups And Users Part 2
Security Policies
Security Policies Part 2
ELASTIC COMPUTE CLOUD (EC2)
EC2 Fundamentals
Storage In EC2
EC2 Up And Running
Project: Simple Web Server
Set Up AWS CLI
Project: Simple Web Server Using The CLI
SIMPLE STORAGE SERVICE (S3)
S3 Fundamentals
Security In S3
Project: Static Website
Project: Static Website With CORS
Accessing S3 From EC2 With Roles
Developing For S3 And CloudFront
Project: Create A CloudFront Distribution
RELATIONAL DATABASE SERVICE (RDS)
RDS Fundamentals
RDS: Up And Running
RDS: Multi-AZ And Read Replicas
ElastiCache Fundamentals
AUTOMATION AND DEPLOYMENT
CloudFormation Fundamentals
Project: Simple Web Server With CloudFormation
Elastic Beanstalk Fundamentals
Deploying With Elastic Beanstalk CLI
SERVERLESS
What Is Serverless Computing
Use AWS Lambda
Use API Gateway
Step Functions And X-Ray
DYNAMODB
DynamoDB Fundamentals
DynamoDB: Indexes, Acceleration And Queries
ENCRYPTION
KMS Fundamentals
SCALING SOFTWARE
Simple Queue Service Fundamentals
Simple Notification Service Fundamentals
Kinesis Fundamentals
DEVELOPER SERVICES
Continuous Integration And Delivery
CodeCommit: Git And AWS
CodeBuild: Test, Build And Save
CodeDeploy Fundamentals
CodeDeploy Fundamentals Part 2
CodePipeline Fundamentals
AUTHENTICATION AND AUTHORIZATION
Web Identity Federation And Cognito
- APPLICATION LIFECYCLE MANAGEMENT
Overview
Continuous Integration And Delivery
Use CodeCommit
CodeBuild: Foudations
CodeBuild: Use The AWS CLI
CodeDeploy: Foundations
CodeDeploy: Work With Local Instances
CodePipeline: Foundations
CodePipeline: Actions And Transitions
CodeStar: Bring It All Together
AUTOMATION
Elastic Beanstalk: Foundations
Elastic Beanstalk: Environments And Deployments
Elastic Beanstalk: Work With Docker
Elastic Beanstalk: Multiple Containers
Elastic Beanstalk: Advanced Configuration
ECS Foundations
ECS: Use Tasks And Services
CloudFormation Foundations
CloudFormation: Deployments And Updates
CloudFormation: Use Nested Stacks
Managing Apps With OpsWorks
Managing Apps With OpsWorks Part 2
Managing Apps With OpsWorks Part 3
SERVERLESS DEVELOPMENT
Lambda Foundations
Lambda: Advanced Usage
Lambda: Advanced Usage Part 2
Step Functions Foundations
MONITORING AND LOGGING
Monitoring Performance With CloudWatch
Monitoring Logs With CloudWatch
CloudWatch Alarms
CloudWatch Events
CloudWatch And CloudTrail
COMPLIANCE
AWS Config
AWS Systems Manager
AWS Secrets Manager And Service Catalog
- COLLECTION
Overview
Kinesis Stream Essentials
Firehose Collection
Collect Data With Kinesis Agent
IoT Essentials
Rules And The Rule Engine
Collect Sensor Data
SQS Essentials
STORAGE
S3 Essentials
Permissions And Encryption
Storage Classes, Lifecycles, And Performance
DynamoDB Essentials
Read And Write Operations
DynamoDB Indexes
Global Tables And Conditional Writes
Streams
PROCESSING
EMR Essentials
Use Hue And Hive With EMR
Spark And EMR
SageMaker Essentials
Training With SageMaker Notebooks
AWS Lambda Essentials
Processing Data With Lambda
Data Pipeline Essentials
Database Migration Essentials
Glue Essentials
ANALYSIS
Elasticsearch Essentials
Elasticsearch And Kibana
Athena Essentials
Redshift Essentials
Loading And Unloading Data In Redshift
Kinesis Analytics Essentials
VISUALIZATION
QuickSight Essentials
JavaScript Visualization From S3
SECURITY
IAM Basics For Big Data
CloudTrail Essentials
Database And Storage Encryption
Agile
- WHAT IS AGILE?
Overview
What Is Agile?
The Agile Manifesto
The Agile Manifesto Part 2
The Agile Life Cycle
Agile Roles
AGILE METHODOLOGIES
Agile Methodologies: Scrum And XP
Agile Methodologies: Kanban And Lean
STARTING THE PROJECT
Vision And Scope
Vision And Scope Part 2
Identifying Stakeholders
Identifying Stakeholders Part 2 – Users
Building An Agile Team
Users Stories
User Stories Part 2
User Stories Part 3
PROGRESSING THE PROJECT
Iteration Planning
Risk Management
Planning Communication
Planning Iteration Capacity
Concluding Iterations
PROJECT RELEASE AND CLOSE-OUT
Additions And Impediments
3rd Party Interfaces
Delivering The Release
Project Close-Out
DIY
Test Prep
Sample Paper Review Agile Foundation
- AGILE ROLES – PRODUCT OWNER
Introduction
The Role Of The Product Owner
User Personas And Stories
User Personas And Stories Part 2
5 Levels Of Planning: Vision And Roadmap
5 Levels Of Planning: Release
5 Levels Of Planning: Iteration
5 Levels Of Planning: Iteration Part 2
Agile Metrics
Leadership Behaviours
- AGILE SCRUM MASTER
Overview
Overview Of The 2019 Syllabus Updates
Agile Way Of Thinking
The Agile Manifesto
The Agile Principles
Waterfall Or Agile
Agile Methodologies
Agile Methodologies Part 2
Agile Methodologies Part 3
Agile Methodologies Part 4
Agile Methodologies 2019 Update
The Scrum Team
Developing The Scrum Team
Common Team Problems: Resistance
Common Team Problems: Resistance Part 2
Common Team Problems: Interactions
Scrum Team Roles
Intro To Scrum Planning
Scrum Planning: User Stories
Scrum Planning: User Stories, The Backlog
Scrum Planning: Layers
Sprint Planning: Why Plan
Sprint Planning: Why Plan Part 2
Sprint Planning: Velocity, Capacity And Estimation
Sprint Planning: Estimation Continued
Sprint Planning: Return On Investment
Sprint Progress
Closing The Sprint
Adapting To Agile
Exam Preparation
Exam Preparation Part 2
- DEVOPS PROFESSIONAL
Introduction To DevOps Professional
The DevOps Professional Exam
What Is DevOps
DevOps Adoption
Methodologies: Lean
Methodologies: Continuous Delivery
Methodologies: Agile
Methodologies: Kata
The Three Ways Of DevOps
Flow
Feedback
Continual Learning And Experimentation
DevOps Transformation
DevOps Transformation Part 2
DevOps Transformation Part 3
DevOps Transformation Part 4
1st Way: Deployment Pipeline
1st Way: Deployment Pipeline Part 2
1st Way: Automated Testing
1st Way: Continuous Integration
1st Way: Low-Risk Releases
2nd Way: Telemetry
2nd Way: Telemetry Part 2
2nd Way: Deployment Feedback
2nd Way: Hypothesis Driven Development
2nd Way: Review And Co-Ordination
3rd Way: Continual Learning
3rd Way: Discoveries
Information Security
Change Management
Exam Overview
Exam Overview Part 2
Exam Overview Part 3
- AGILE TESTING
Overview
Intro To Agile
Intro To Agile Part 2
Agile Testing Quadrants
Development For Testing
Testing For Story-Telling
Responsibilities And Test Planning
Iteration Delivery
- LEAN AGILE PROJECT MANAGEMENT
Overview
Introduction
Session 1
Session 2
Session 3
Session 4
Session 5
Session 6
Session 7
Session 8
Session 9
- AGILESHIFT
Overview
Introduction To AgileSHIFT
Value And VUCA
TechSHIFT And Disrupters
The Delta
Enterprise Agility
Enterprise Agility Part 2
Why AgileSHIFT
The AgileSHIFT Framework
The AgileSHIFT Framework Part 2
The AgileSHIFT Framework Part 3
AgileSHIFT Principles
AgileSHIFT Principles Part 2
AgileSHIFT Principles Part 3
AgileSHIFT Practices
AgileSHIFT Practices Part 2
AgileSHIFT Roles
The AgileSHIFT Workflow
The AgileSHIFT Workflow Part 2
The AgileSHIFT Workflow Part 3
The AgileSHIFT Workflow Part 4
The AgileSHIFT Examination
The AgileSHIFT Examination Part 2
- DEVOPS FOUNDATION
Introduction To DevOps Foundation
The DevOps Foundation Exam
Origins Of DevOps
Origins Of DevOps Part 2
Origins Of DevOps Part 3
Definition And Justification For DevOps
Misconceptions Of DevOps
Lean
Agile
DevOps Principles
DevOps Principles Part 2
DevOps Key Practices: Inherent Challenges
DevOps Key Practices: Inherent Challenges Part 2
DevOps Key Practices: Working Efficiently
DevOps Key Practices: Working Efficiently Part 2
Applicability And Limitations Of DevOps
Evolving Architecture And Organizational Models
Sample Exam Part 1
Sample Exam Part 2
CertNexus
- SECURITY IN SOFTWARE
Overview
Prior Knowledge And Expectations
Gather Software Requirements
Assignment: Identity Requirments
Activity: Identify Requirements
Factors That Undermine Software Security
Software Vulnerabilities And Attack Phases
Attack Patterns
Assignment: Find Vulnerabilities
Activity: Find Vulnerabilities
Assignment: New Password Requirements
Activity: New Password Requirements
Assignment: Hashing Passwords
Activity: Hashing Passwords
Vulnerability Intelligence
Assignment: Vulnerability Search
Activity: Vulnerability Search
HANDLING VULNERABILITIES
Bugs In Software
External Libraries And Services
Handling Errors Securely
Human-Related Security
Security Requirements And Design
Security Through The Software Lifecycle
Assignment: Exploring Leftover Artifacts
Activity: Exploring Leftover Artifacts
DESIGNING FOR SECURITY
Principles Of Secure Design
Avoid Common Mistakes
Assignment: Common Security Design Flaws
Activity: Common Security Design Flaws
Understand Risk And Threats
Risk Response Strategies
Exploit Countermeasures
DEVELOPING SECURE CODE
Guidelines For Secure Coding
Buffer Overflows And Prevention
Race Conditions
Assignment Using Locks Remediate Race Condition
Activity Using Locks To Remediate Race Condition
OWASP Top Ten Platform Vulnerabilities
Web Application Vulnerabilities Deep Dive
Mobile Application Vulnerabilities Deep Dive
IoT Vulnerabilities Deep Dive
Desktop Vulnerabilities Deep Dive
Privacy Vulnerability Defects
IMPLEMENTING COMMON PROTECTIONS
Secure Session Management
Users, Protections And Passwords
Encryption And Data Protections
Error Handling And Protections
TESTING AND MAINTAINING SOFTWARE SECURITY
Testing Software For Security
Monitoring And Logging Of Production Applications
- THREATS AND ATTACKS
Overview
Threat Targets
Threat Actors
Threat Motives
Threat Intentions
Attack Phases
Attack Vectors
Technique Criteria
Impact Of Attacks
Footprinting
Network And Port Scanning
Vulnerability Scanning
Penetration Testing
Web App Scanning
Enumeration
GAINING ACCESS
Exploitation Frameworks
Client-Side Attacks
Server-Side Attacks
Mobile Threats
Web Attacks
Password Attack
Wireless Attacks
Social Engineering
Man-In-The-Middle
Malware
Out-Of-Band Attacks
Denial Of Service
POST-EXPLOITATION
Command And Control
Data Exfiltration
Pivoting
Lateral Movement
Persistence
Keylogging
Anti-Forensics
Covering Your Tracks
THREAT RESEARCH AND INCIDENT PREP
Threat Research And Incident Prep
DATA COLLECTION AND ANALYSIS
Network Data Collection And Analysis
Host Data Collection And Analysis
Anomaly Detection
Indicators Of Compromise
Log Analysis Tools
INCIDENT RESPONSE TECHNIQUES
Containment
Asset Discovery
Windows Incident Response Tools
Linux Incident Response Tools
Incident Response Process
Incident Response Preparation
Compliance And Standards
Frameworks And Best-Practices
Forensic Concepts
VULNERABILITY ASSESSMENTS
Common Vulnerable Areas
Vulnerability Assessments
Service Management
- SIAM FOUNDATION
Overview
Introduction To SIAM
Introduction To SIAM Part 2
SIAM Eco-System And Terminology
SIAM Practices
SIAM Practices – Process Forums
SIAM Drivers – Service Satisfaction
SIAM Drivers – Source Landscape
SIAM Drivers – Operational Efficiencies
SIAM Drivers – External And Commercial
The Business Case For SIAM
SIAM Implementation Roadmap
Service Integrators – External Service Integrator
Service Integrators – Internal Service Integrator
Service Integrators – Hybrid Service Integrator
Service Integrators – Lead Supplier
SIAM Practices
Roles And Responsibilities
Roles And Responsibilities Part 2
SIAM Processes – Introduction
SIAM Processes – Audit And Control And BRM
SIAM Processes – Change Mgmt. And Release Mgmt.
SIAM Processes – Contract Mgmt. And CSI
SIAM Processes – Event Mgmt. And Financial Mgmt.
SIAM Processes – Sec Mgmt. And Knowledge Mgmt.
SIAM Processes – Incident Mgmt.
SIAM Processes – Problem Mgmt.
SIAM Processes – SLM And Supplier Mgmt.
SIAM Processes – SLM And Supplier Mgmt. Part 2
SIAM Processes – Configuration Mgmt.
SIAM Processes – SPM And SCM
SIAM Processes – Project Mgmt And Toolset Mgmt
SIAM And Other Frameworks: ITIL
SIAM And Other Frameworks: ITIL Part 2
SIAM And Other Frameworks: ISO/IEC 20000
SIAM And Other Frameworks: Lean And COBIT
SIAM And Other Frameworks: DevOps And Projects
Cultural Considerations
Challenges And Risks
Challenges And Risks Part 2
Challenges And Risks Part 3
Examination Preparation
Exam Review
Exam Review Part 2
- VERISM FOUNDATION
Introduction To VeriSM
The VeriSM Qualification
Organisational Context
Organisational Context Part 2
Organisational Context Part 3
Organisational Governance
Digital Transformation
Service Culture
Organisational Structure
Service Management Challenges
Service Management Challenges Part 2
The VeriSM Model
The VeriSM Model Part 2
The Management Mesh
VeriSM Stages: Define
VeriSM Stages: Produce
VeriSM Stages: Provide
VeriSM Stages: Respond
Adapting The VeriSM Model
Progressive Management Practices: Agile
Progressive Management Practices: Agile Part 2
Progressive Management Practices: DevOps
Progressive Management Practices: SIAM
Progressive Management Practices: Lean
Progressive Management Practices: Shift Left
Progressive Management Practices: CX / UX
Progressive Practice: Continous Delivey
Innovative Technologies
Technologies: Cloud And Virtualisation
Technologies: Automating, Big Data And IoT
Technologies: Mobile Computing
Getting Started With VeriSM
Exam Review
Exam Review Part 2
- PROJECT MANAGEMENT VS SERVICE MANAGEMENT
Project Management VS Service Management
- ISO/IEC 20,000 FOUNDATION
Overview
The Foundation Exam
Concepts Of Service Management
Concepts Of ISO/IEC 20,000
What Is A Service Management System
SMS: Context Of The Organization
SMS: Leadership And Risk Management
SMS: 3rd Parties, Documentation, Resource Mgmt
Scope, Plan And Support The SMS
SMS: Performance Evaluation And Improvement
Service Design And Transition
Service Catalog, Service Asset, Configuration Mgmt
BRM, SLM, Supplier Management
Budgeting, Accounting, Demand, Capacity Mgmt
Change Mgmt, Release And Deployment
Service Request, Incident, Problem Mgmt
Availability, Continuity, Security Mgmt
August 2019 Update
Exam Preparation
Sample Paper
Sample Paper Part 2
- DEVOPS FOUNDATION
Introduction To DevOps Foundation
The DevOps Foundation Exam
Origins Of DevOps
Origins Of DevOps Part 2
Origins Of DevOps Part 3
Definition And Justification For DevOps
Misconceptions Of DevOps
Lean
Agile
DevOps Principles
DevOps Principles Part 2
DevOps Key Practices: Inherent Challenges
DevOps Key Practices: Inherent Challenges Part 2
DevOps Key Practices: Working Efficiently
DevOps Key Practices: Working Efficiently Part 2
Applicability And Limitations Of DevOps
Evolving Architecture And Organizational Models
Sample Exam Part 1
Sample Exam Part 2
- DEVOPS PROFESSIONAL
Introduction To DevOps Professional
The DevOps Professional Exam
What Is DevOps
DevOps Adoption
Methodologies: Lean
Methodologies: Continuous Delivery
Methodologies: Agile
Methodologies: Kata
The Three Ways Of DevOps
Flow
Feedback
Continual Learning And Experimentation
DevOps Transformation
DevOps Transformation Part 2
DevOps Transformation Part 3
DevOps Transformation Part 4
1st Way: Deployment Pipeline
1st Way: Deployment Pipeline Part 2
1st Way: Automated Testing
1st Way: Continuous Integration
1st Way: Low-Risk Releases
2nd Way: Telemetry
2nd Way: Telemetry Part 2
2nd Way: Deployment Feedback
2nd Way: Hypothesis Driven Development
2nd Way: Review And Co-Ordination
3rd Way: Continual Learning
3rd Way: Discoveries
Information Security
Change Management
Exam Overview
Exam Overview Part 2
Exam Overview Part 3
PMI®
- INTRO TO SERIES
Overview
INTRO TO PMI / PMP
What Is PMP
INTRO TO PROJECTS
What Is A Project
What Is A Project Part 2
INTRO TO PMI PROJECT GROUPS
PMBok Project Processes
PMBok Project Processes Part 2
PMBok Project Processes Part 3
PMBok Project Processes Part 4
PMBok Project Processes Part 5
THE PROJECT ENVIRONMENT
The Project Environment
The Project Environment Part 2
The Project Environment Part 3
PROJECT ROLES
The Project Manager
PROJECT PROCESSES: PROJECT INTEGRATION
Project Processes: Project Integration Management
Project Processes: Project Integration Mgmt Part 2
Integration Processes: Develop Project Charter
Integration Processes: Develop Project Plan
Integration Processes: Develop Project Plan Part 2
Integration Processes: Develop Project Plan Part 3
Integration Processes: Direct Project Work
Integration Processes: Manage Project Knowledge
Integration Processes: Control Project Work
Integration Processes: Integrated Change Control
Integration Processes: Close Project Or Phase
PROJECT PROCESSES: PROJECT SCOPE
Project Processes: Project Scope Management
Project Processes: Project Scope Management Part 2
Project Processes: Project Scope Management Part 3
Scope Processes: Plan Scope Management
Scope Processes: Collect Requirements
Scope Processes: Collect Requirements Part 2
Scope Processes: Collect Requirements Part 3
Scope Processes: Define Scope
Scope Processes: Create WBS
Scope Processes: Validate Scope
Scope Processes: Control Scope
PROJECT PROCESSES: PROJECT SCHEDULE
Project Processes: Project Schedule Management
Schedule Processes: Plan Schedule Management
Schedule Processes: Define Activities
Schedule Processes: Sequence Activities
Schedule Processes: Estimate Activity Duration
Schedule Processes: Estimate Activity Duration Pt2
Schedule Processes: Estimate Activity Duration Pt3
Schedule Processes: Develop Schedule
Schedule Processes: Control Schedule
PROJECT PROCESSES: PROJECT COST
Project Processes: Project Cost Management
Project Processes: Project Cost Management Part 2
Cost Processes: Plan Cost Management
Cost Processes: Estimate Costs
Cost Processes: Estimate Costs Part 2
Cost Processes: Determine Budget
Cost Processes: Control Costs
PROJECT PROCESSES: PROJECT QUALITY
Project Processes: Project Quality Management
Project Processes: Project Quality Management Pt.2
Project Processes: Project Quality Management Pt.3
Project Quality Mgmt: Plan Quality Management
Project Quality Mgmt: Manage Quality
Quality Mgmt Processes: Control Quality
PROJECT PROCESSES: PROJECT RESOURCES
Project Processes: Project Resource Management
Project Processes: Project Resource Mgmt Part 2
Project Resource Mgmt: Plan Resources
Resource Processes: Estimate Activity Resources
Resource Processes: Acquire Resources
Project Processes: Develop Team
Project Processes: Develop Team Part 2
Project Processes: Develop Team Part 3
Project Processes: Develop Team Part 4
Resource Processes: Manage Team
Resource Processes: Manage Team Part 2
Resource Processes: Control Resources
PROJECT PROCESSES: PROJECT COMMUNICATIONS
Project Processes: Communications Mgmt
Project Processes: Communications Mgmt Part 2
Communications Processes: Plan Comms Mgmt
Communications Processes: Plan Comms Mgmt Part 2
Communications Processes: Plan Comms Mgmt Part 3
Communications Processes: Manage Comms
Communication Processes: Monitor Comms.
PROJECT PROCESSES: PROJECT RISK
Project Processes: Project Risk Management
Project Processes: Project Risk Management Part 2
Risk Processes: Plan Risk Management
Risk Processes: Identify Risks
Risk Processes: Perform Qualitative Risk Analysis
Risk Processes: Perform Quantitative Risk Analysis
Risk Processes: Plan Risks Responses
Risk Processes: Implement Risk Responses
Risk Processes: Monitor Risk
PROJECT PROCESSES: PROCUREMENT MANAGEMENT
Project Processes: Project Procurement Mgmt
Project Processes: Project Procurement Mgmt Pt2
Procurement Processes: Plan Procurement Mgmt
Procurement Processes: Plan Procurement Mgmt 2
Procurement Processes: Conduct Procurements
Procurement Processes: Control Procurements
PROJECT PROCESSES: STAKEHOLDER MANAGEMENT
Project Processes: Project Stakeholder Mgmt
Stakeholder Processes: Identify Stakeholders
Stakeholder Processes: Identify Stakeholders Pt2
Stakeholder Processes: Stakeholder Engagement 2
Stakeholder Processes: Manage Stakeholders
Stakeholder Processes: Monitor Stakeholders
PMBOK REVIEW
The Project Management Body Of Knowledge
SAMPLE TEST QUESTIONS
Exam Preparation Pmp
Exam Preparation Part 2 Pmp
- ORGANIZATIONAL CHANGE MANAGEMENT
Overview
What Is Change?
Role And Activities
Change Categories
Corporate Culture
Strategic Change
Barriers To Change
Overcoming Challenges
Portfolio Change Mangement
Program Change Management
Program Change Management Part 2
Project Change Management
Performing The Change
Performing The Change Part 2
Vmware
- VSPHERE AND THE SOFTWARE-DEFINED DATA CENTER
Overview
Introduction To VSphere
Introduction To VSphere Part 2
Introduction To VSphere Part 3
Introduction To VSphere Part 4
Introduction To VSphere Part 5
Introduction To VSphere Part 6
CONFIGURE & ADMINISTER VSPHERE SECURITY
Role Based Access Control
Role Based Access Control Part 2
Role Based Access Control Part 3
Role Based Access Control Part 4
Role Based Access Control Part 5
Role Based Access Control Part 6
Secure ESXi And VCenter Server
Secure ESXi And VCenter Server Part 2
Secure ESXi And VCenter Server Part 3
Secure ESXi And VCenter Server Part 4
Secure ESXi And VCenter Server Part 5
Secure ESXi And VCenter Server Part 6
Configure And Enable SSO And Identity Sources
Configure And Enable SSO And Identity Sources Pt2
Configure And Enable SSO And Identity Sources Pt3
Configure And Enable SSO And Identity Sources Pt4
Configure And Enable SSO And Identity Sources Pt5
Configure And Enable SSO And Identity Sources Pt6
Configure And Enable SSO And Identity Sources Pt7
Secure VSphere Virtual Machines
Secure VSphere Virtual Machines Part 2
CONFIGURE AND ADMINISTER VSPHERE 6.X NETWORKING
Configure And Verify VSphere Networking
Configure And Verify VSphere Networking Part 2
Configure And Verify VSphere Networking Part 3
Configure And Verify VSphere Networking Part 4
Configure And Verify VSphere Networking Part 5
Configure And Verify VSphere Networking Part 6
Configure And Verify VSphere Networking Part 7
Configure And Verify VSphere Networking Part 8
Configure And Verify VSphere Networking Part 9
Configure And Verify VSphere Networking Part 10
Configure And Verify VSphere Networking Part 11
Configure And Verify VSphere Networking Part 12
Configure And Verify VSphere Networking Part 13
Configure And Verify VSphere Networking Part 14
Configure And Verify VSphere Networking Part 15
Configure Network I/O Control (NIOC)
CONFIGURE AND ADMINISTER VSPHERE 6.X STORAGE
VSphere Integration With Physical Storage
VSphere Integration With Physical Storage Part 2
VSphere Integration With Physical Storage Part 3
VSphere Integration With Physical Storage Part 4
VSphere Integration With Physical Storage Part 5
VSphere Integration With Physical Storage Part 6
VSphere Integration With Physical Storage Part 7
VSphere Integration With Physical Storage Part 8
VSphere Integration With Physical Storage Part 9
VSphere Integration With Physical Storage Part 10
Configure Software Defined Storage
Configure Software Defined Storage Part 2
Configure Software Defined Storage Part 3
Configure Software Defined Storage Part 4
Configure Software Defined Storage Part 5
Configure Software Defined Storage Part 6
Configure Software Defined Storage Part 7
Configure Storage Multipathing And Failover
Configure Storage Multipathing And Failover Pt2
Configure Storage Multipathing And Failover Pt3
VMFS And NFS Configurations And Upgrades
VMFS And NFS Configurations And Upgrades Pt2
VMFS And NFS Configurations And Upgrades Pt3
VMFS And NFS Configurations And Upgrades Pt4
Set Up And Configure Storage I/O Control
Set Up And Configure Storage I/O Control Pt.2
UPGRADE A VSPHERE DEPLOYMENT TO 6.X
ESXi And Virtual Machine Upgrades
ESXi And Virtual Machine Upgrades Part 2
ESXi And Virtual Machine Upgrades Part 3
ESXi And Virtual Machine Upgrades Part 4
ESXi And Virtual Machine Upgrades Part 5
ESXi And Virtual Machine Upgrades Part 6
Windows VCenter Server Upgrades
Windows VCenter Server Upgrades Part 2
VCenter Server Migration To VCSA
RESOURCE POOLS
Configure Multilevel Resource Pools
Configure Multilevel Resource Pools Part 2
Configure Multilevel Resource Pools Part 3
Configure DRS And Storage DRS Clusters
Configure DRS And Storage DRS Clusters Pt.2
Configure DRS And Storage DRS Clusters Pt.3
Configure DRS And Storage DRS Clusters Pt.4
Configure DRS And Storage DRS Clusters Pt.5
BACK UP AND RECOVER A VSPHERE DEPLOYMENT
Configure VCenter Appliance Backup And Restore
VCenter Data Protection
VCenter Data Protection Part 2
VCenter Data Protection Part 3
VCenter Data Protection Part 4
Configure VSphere Replication
Configure VSphere Replication Part 2
Configure VSphere Replication Part 3
Configure VSphere Replication Part 4
Configure VSphere Replication Part 5
Configure VSphere Replication Part 6
TROUBLESHOOT A VSPHERE DEPLOYMENT
Troubleshoot VCenter And ESXi
Troubleshoot VCenter And ESXi Part 2
Troubleshoot VCenter And ESXi Part 3
Troubleshoot VCenter And ESXi Part 4
Troubleshoot VCenter And ESXi Part 5
Troubleshooting Storage And Networking
Troubleshooting Storage And Networking Part 2
Troubleshoot Storage And Networking Part 3
Troubleshoot VSphere Upgrades And Migrations
Troubleshoot VSphere Upgrades And Migrations Pt.2
Troubleshoot Virtual Machines
Troubleshoot Virtual Machines Part 2
Troubleshoot HA, DRS, Fault Tolerance
Troubleshoot HA, DRS And Fault Tolerance Pt.2
Troubeshoot HA, DRS And Fault Tolerance Pt.3
DEPLOY AND CUSTOMIZE ESXI HOSTS
Configure Auto Deploy And Host Profiles
Configure Auto Deploy And Host Profiles Part 2
Configure Auto Deploy And Host Profiles Part 3
Configure Auto Deploy And Host Profiles Part 4
Configure Auto Deploy And Host Profiles Part 5
Configure Auto Deploy And Host Profiles Part 6
Configure Auto Deploy And Host Profiles Part 7
Configure Auto Deploy And Host Profiles Part 8
Configure Auto Deploy And Host Profiles Part 9
CONFIGURE & ADMINISTER VSPHERE & VCENTER AVAILABILITY SOLUTIONS
Configure VSphere HA Cluster Features
Configure VSphere HA Cluster Features Pt.2
Configure VSphere HA Cluster Features Pt.3
Configure VSphere HA Cluster Features Pt.4
Configure VSphere HA Cluster Features Pt.5
Configure VSphere HA Cluster Features Pt.6
Configure VSphere HA Cluster Features Pt.7
Configure VCenter Server Appliance HA
ADMINISTER AND MANAGE VSPHERE VIRTUAL MACHINES
Create And Manage VMs And Templates
Create And Manage VMs And Templates Part 2
Create And Manage VMs And Templates Part 3
Create And Manage VMs And Templates Part 4
Create And Manage A Content Library
Using VMware VCenter Converter
VSPHERE ESXI 6.7 HOST INSTALLATION
VSphere ESXi 6.7 Host Installation
VSphere ESXi 6.7 Host Installation Part 2
SPOTLIGHT ON VCENTER
Spotlight On VCenter
Spotlight On VCenter Part 2
Spotlight On VCenter Part 3
SPOTLIGHT ON SECURITY AND CERTIFICATES
Spotlight On Security And Certificates
SPOTLIGHT ON NFS WITH KERBEROS
Spotlight On NFS With Kerberos Authentication
SPOTLIGHT ON DATASTORE CLUSTERS
Spotlight On Datastore Clusters With SIOC
SPOTLIGHT ON VMOTION & STORAGE VMOTION
Spotlight On VMotion And Storage VMotion
Spotlight On VMotion And Storage VMotion Part 2
SPOTLIGHT ON VCENTER ALARMS
Spotlight On VCenter Alarms
SPOTLIGHT ON VIRTUAL MACHINES
Spotlight On Virtual Machines
Six Sigma
- INTRODUCTION TO LEAN SIX SIGMA
Overview
Introduction To LSS
LSS History
Waste And Defects
Waste And Defects Part 2
Project Management
THE PDCA PROCESS
Plan-Do-Check-Act
THE DMAIC PROCESS
Define Phase
Define Phase Part 2
Define Phase Part 3
Measure Phase
Measure Phase Part 2
Analyze Phase
Improvement Phase
Control Phase
IN CLOSING
Achieving Buy-In
Next Step
- LEAN SIX SIGMA GREEN BELT
Overview
Introduction
Process Improvement Basics
Process Improvement Basics Part 2
LSS Metric Basics
Core Concepts And Terms
Models Methodologies
Seven Tools Of Quality
Seven Tools Of Quality Part 2
Seven Tools Of Quality Part 3
Waste, Voices And CTQs
Waste, Voices And CTQs Part 2
Suppliers Inputs Process Outputs Customers
Important Graphs And Charts
DMAIC Model – Define Phase
DMAIC Model – Define Phase Part 2
DMAIC Model – Measure Phase
DMAIC Model – Analyze Phase
DMAIC Model – Improve Phase
DMAIC Model – Control Phase
DMAIC Model – Review
Automation
- USER ACCOUNT MANAGER
Overview
User Account Manager Main Menu
User Account Manager Main Menu Pt2
User Account Manager Add/Remove Users
User Account Manager Add/Remove Users Pt2
User Account Manager Add/Remove Users Pt3
User Account Manager Add/Remove Users Pt4
User Account Manager Default Shell
User Account Manager Default Shell Part 2
User Account Manager Password Reset
User Account Manager Account Lock
User Account Manager Account Lock Part 2
User Account Manager Account Lock Part 3
User Account Manager Change Username
User Account Manager Change Username Part 2
BACKUP UTILITY
Backup Utility
Backup Utility Part 2
- WINDOWS AUTOPILOT
Overview
Requirements
Scenarios And Capabilities
Administering Windows Autopilot
Administering Windows Autopilot Pt 2
Networking Skills
- DNS UTILITIES
Nslookup
Dig
Dnswalk And Dnsrecon
CONFIGURING HOST RECORDS
Host Records
SRV Records
CONFIGURING EMAIL SERVICES
Configuring MX Records
Configuring SPF Records
PUBLIC DOMAINS
Purchasing A Domain
Changing Name Servers
Transferring A Domain
CONFIGURING ZONES
Configuring DNSSEC With NSD
Configuring DNSSEC With NSD Part 2
ZONE REPLICATION
Installing NSD
Configuring Zones In NSD
Configuring Replication In NSD
Configuring Replication In NSD Part 2
MICROSOFT DNS SERVER
Installing Microsoft DNS
Configuring Zones In Microsoft DNS
Configuring Replication In Microsoft DNS
BIND DNS SERVER
Installing BIND
Configuring Zones And Records
Configuring Zones And Records Part 2
Configuring Replication
UNBOUND DNS SERVER
Installing Unbound
Configuring Zones And Records
Blocking Ads With Unbound
Using Unbound With BIND
Using Unbound With NSD
- CONFIGURE GNS3
What Is GNS3?
Installing GNS3
GNS3 Initial Setup
Launching Your First Router
Virtual Switches
Cabling Your Equipment
Connecting To Your Routers
Capturing Traffic In GNS3
Documenting Your Network
Saving Your Configuration
- HOME ROUTER CONFIGURATION
Setting Up A Home Router
Port Forwarding
- NETWORKING TROUBLESHOOTING
Troubleshooting With CMD
Troubleshooting With CMD Part 2
Setting IP Information
Setting IP Information Part 2
- NMAP
Installing Nmap
Nmap Basics
Nmap Basics Part 2
Host Discovery
Host Discovery Part 2
Host Discovery Part 3
Port States
Port Scanning
Port Scanning Part 2
Port Scanning Part 3
Advanced Port Scanning IP ID Idle Scan
Advanced Port Scanning FTP Bounce
IT Foundation Skills
- BUILDING A PC
Component Selection
Component Selection Part 2
PC Assembly
BIOS Configuration
BIOS Configuration Part 2
- CUSTOMER SERVICE SKILLS FOR TECHIES
Overview
Introduction
Communication Principles
Communication Principles Part 2
Communication Principles Part 3
Communication Principles Part 4
Communication Skills
Communication Skills Part 2
Emotional Intelligence
How To Disagree
Listening Skills
Stress Management
Electronic Communication
Incident Vs Problem
Service Desk Basics: Computing
Service Desk Basics: Computing Part 2
Service Desk Basics: Computing Part 3
Service Desk Basics: Data
Service Desk Basics: Data Part 2
Service Desk Basics: Data Part 3
Service Desk Basics: Computers
Service Desk Basics: Computers Part 2
Service Desk Basics: Networks
- IC3-I CHOOSE LIFE
Overview
Computing Basics
The System Unit
Input, Output And Storage
Input, Output And Storage Part 2
Operating System Basics
Introduction To Windows 7
Windows 7 Administration And Maintenance
Understanding Application Software
Introduction To Microsoft Office 2010
Introduction To Microsoft Office Part 2
Introduction To Microsoft Word 2010
Introduction To Microsoft Word Part 2
Introduction To Microsoft Excel 2010
Introduction To Microsoft Excel 2010 Part 2
Introduction To Microsoft Access
Introduction To Microsoft Access Part 2
Introduction To Microsoft Access Part 3
Introduction To Microsoft PowerPoint
Introduction To Microsoft PowerPoint Part 2
Network And Internet Basics
Online Communication
Web Basics
Network Internet Privacy And Security
Legal, Health, Environment And Ethical Issues
- IC3-I CHOOSE LIFE
Overview
Computing Basics
The System Unit
Input, Output And Storage
Input, Output And Storage Part 2
Operating System Basics
Introduction To Windows 7
Windows 7 Administration And Maintenance
Understanding Application Software
Introduction To Microsoft Office 2010
Introduction To Microsoft Office Part 2
Introduction To Microsoft Word 2010
Introduction To Microsoft Word Part 2
Introduction To Microsoft Excel 2010
Introduction To Microsoft Excel 2010 Part 2
Introduction To Microsoft Access
Introduction To Microsoft Access Part 2
Introduction To Microsoft Access Part 3
Introduction To Microsoft PowerPoint
Introduction To Microsoft PowerPoint Part 2
Network And Internet Basics
Online Communication
Web Basics
Network Internet Privacy And Security
Legal, Health, Environment And Ethical Issues
- Overview
Internet, Navigation And Web Browsing
Licensing
Email Clients
Calendaring And Social Media
Digital Principles And Ethics
Communications, Conferencing And Streaming
- PC MAINTENANCE
HDD Replacement And Installation
Post OS Installation And Configuration
Using Windows File History
Backing Up With Windows Backup And Restore
Restoring Windows Backup And Restore
Adobe
- ILLUSTRATOR CC 2017
Introduction To Illustrator
Design 101
Navigating In Illustrator
File New
Basic Selections
Basic Shapes And Formatting
Basic Shapes And Formatting Part 2
Basic Text
Swatches
Working With Multiple Paths
Freehand Drawing
Freehand Drawing Part 2
Artboards
Object Transformation
Images
Gradients
Text Effects
Pathfinder And Compound Path
Path Editing Tools
The Pen Tool
The Curvature Tool
Aligning Objects
Aligning Objects Part 2
Working With Effects
Graphic Styles
Working With Masks
Mesh And Recolor
Advanced Swatches
Pattern Swatches
Sharing Swatches
Blend Tool
Symbols
Advanced Text
Bullets And Numbering
Knife Eraser Sissors
Shaper And Shape Builder
Path Transformations
Path Transformations Part 2
Image Trace And Live Paint
Perpective Grid
Saving And Exporting
- START WITH SIMPLE
Read Me
Getting Started In Premiere Pro
Project Organization
Even More Project Organization
The Source Monitor
Our First Story
Navigating The Timeline
Simple Titles
Simple Export
ADD SOME FLAIR
Adding Transitions
Simple Trimming
Adding Effects
Working With Stills
Speed Effects
Color Correction
Even More Color Correction
Essential Sound Editing
Make It Pop
Mulitcamera Editing
EXTRAS AND APPS
360 Degree Video
Timelapse
Step Up Your Input And Output
Outside Help
MS Office Courses
- INTRODUCTION
Overview
Introduction To Access
What Is A Database
Database Terminology
Database Terminology Part 2
Getting Started In Access
Access Interface And Navigation
Planning And Database Design
Planning And Database Design Part 2
CREATING ACCESS TABLES
Creating Tables: Manual Data Entry
Creating Tables: Importing External Data
Creating Tables: Importing External Data Part 2
Creating Table Relationships
Creating Table Relationships Part 2
CREATING QUERIES FOR TESTING DESIGN
Creating Queries For Testing Desgin
Creating Queries For Testing Design Part 2
Creating Queries For Testing Design Part 3
Creating Queries For Testing Design Part 4
Creating Queries For Testing Design Part 5
CREATING BASIC FORMS
Creating Basic Forms
Creating Basic Forms Part 2
Creating Basic Forms Part 3
Creating Basic Forms Part 4
REPORTING DATA
Creating Basic Reports
Creating Basic Reports Part 2
Creating Basic Reports Part 3
Creating Basic Reports Part 4
Creating Basic Reports Part 5
- INTRODUCTION
Overview
Introduction To Excel
Excel Basics
Excel Interface
Navigate A Workbook
Select Cells
Insert Data
Fill Series And Flash Fill
Export And File Types
FORMAT WORKBOOKS
Modify A Worksheet
Format A Worksheet
Format A Worksheet Part 2
Number Formats: Introduction
Number Formats: Common Number Formats
Number Formats: Text, Special, Custom
Number Formats: Date And Time
Proof, Print And Page Layout
Proof, Print And Page Layout Part 2
Manage Sheets And Workbooks
- Introduction
Overview
Introduction to Excel
Excel Basics
Excel Interface
Navigate a Workbook
Select Cells
Insert Data
Cut, Copy, Paste
Fill Series
Fill Series: Custom Lists
Export and File Types
Format Workbooks
Modify a Worksheet
Format a Worksheet
Styles and Themes
Number Formats: Introduction
Number Formats: Common Number Formats
Number Formats: Text, Special, Custom
Number Formats: Date and Time
Proof, Print and Page Layout
Proof, Print and Page Layout Part 2
Manage Worksheets and Workbooks
- Analyze Data
Overview
Sort and Filter
Conditional Formatting
Outline and Subtotals
Tables
Data Tables
Consolidate Data
Scenarios
Goal Seek
Remove Duplicates
Advanced Filter
Graphical Elements
Image: Basics
Images: Format
Shapes: Add and Format
Shapes: Multiple Shapes and Icons
Smart Art
Create an Invitation
Collaboration and Security
Shared Workbooks
Track Changes
Data Validation
Workbook Security
Document Properties
Additional Topics
Customize Interface
- Introduction
Overview
Introduction to Excel
Excel Basics
Excel Interface
Navigate a Workbook
Select Cells
Insert Data
Cut, Copy, Paste
Fill Series
Fill Series: Custom Lists
Export and File Types
Format Workbooks
Modify a Worksheet
Format a Worksheet
Styles and Themes
Number Formats: Introduction
Number Formats: Common Number Formats
Number Formats: Text, Special, Custom
Number Formats: Date and Time
Proof, Print and Page Layout
Proof, Print and Page Layout Part 2
Manage Worksheets and Workbooks
- Introduction to Charts
Insert and Format Basic Charts
Create Charts from Noncontiguous Data
Create a Pie Chart
Sparklines and Timelines
Filled Map Charts
Pivot Tables and Pivot Charts
Create a Basic Pivot Table
Create a Basic Pivot Chart
- Essentials
Introduction to Excel Function
Basic Formulas
Basic Functions
Basic Functions Part 2
Functions in Mac
Keyboard Shortcuts for Functions
Advanced
Named Ranges
3D Cell Reference
Formula Auditing
Function Library
SUM
SUMIF
SUMIFS
COUNT, COUNTA, COUNTBLANK
COUNTIF, COUNTIFS
AVERAGE, AVERAGEA
AVERAGEIF, AVERAGEIFS
MIN, MAX, SMALL, LARGE
MINIFS, MAXIFS
RAND, RANDBETWEEN
TODAY, NOW
MONTH, DAY, YEAR, TEXT
CONCAT, TEXTJOIN
LEFT, RIGHT, MID
UPPER, LOWER, PROPER
TRIM, CLEAN
CHAR, CODE, UNICHAR, UNICODE
REPLACE, SUBSTITUTE
FIND, SEARCH
LEN
IF
AND, OR
NOT
MATCH
INDEX
VLOOKUP
HLOOKUP
LOOKUP
CHOOSE
- Relational Database Basics
Overview
History, Terms and Definitions
History, Terms and Definitions Part 2
Data Normalization
Data Normalization Part 2
Data Normalization Part 3
Designing the Database
Designing a Database
Designing a Database Part 2
Designing a Database Part 3
Creating Models
Creating Database Models
Creating Database Models Part 2
Finalizing the Model
Data Integrity
Entity Integrity
Referential Integrity
Referential Integrity Part 2
Domain Integrity
Domain Integrity Part 2
Domain Integrity Part 3
Domain Integrity Part 4
Query Basics
Getting Started with Queries
Getting Started with Queries Part 2
Getting Started with Queries Part 3
Querying Multiple Tables
Querying Multiple Tables Part 2
Querying Multiple Tables Part 3
- Introduction
Overview
Introduction to PowerPoint
PowerPoint Basics
PowerPoint Interface
Navigate a Presentation and Views
Create a Presentation
Add Content
Add Text
Slides from Outline and Reuse Slides
Format Text: Basics
Format Text: Bullets and Spacing
Images: Basics
Images: Insert
Images: Format
Images: Format Part 2
Shapes: Add and Format
Shapes: Multiple Shapes
Icons and 3D Models
Tables: Introduction
Tables: Create and Format
Charts: Introduction
Charts: Create
Charts: Format
Charts: Pie Charts
SmartArt
SmartArt: Organization Chart
Enhance a Presentation
Design Themes
Designer
Transitions
Animations
Photo Album
Prepare and Present
Proof
Prepare and Print
Present a Slide Show
- Rehearse and Record
Custom Shows
Zoom
Draw
File Properties and Interface
Advanced File Properties
Customize Interface
Additional Topics
Photo Slideshow with Sound
PowerPoint Best Practices
Advanced Content
Overview
Slide Master
Slide Master Part 2
Slide Master: Troubleshooting
Audio and Video: Introduction
Audio and Video
Audio and Video Part 2
Link and Embed External Content: Introduction
LInk and Embed External Content
Collaborate
Comment and Compare
OneDrive and PowerPoint
Collaborate: As Owner
Collaborate: As Recipient
- Introduction
Overview
Introduction to PowerPoint
PowerPoint Basics
PowerPoint Interface
Navigate a Presentation and Views
Create a Presentation
Add Content
Add Text
Slides from Outline and Reuse Slides
Format Text: Basics
Format Text: Bullets and Spacing
Images: Basics
Images: Insert
Images: Format
Images: Format Part 2
Shapes: Add and Format
Shapes: Multiple Shapes
Draw, Icons and 3D Models
Tables: Introduction and Create
Tables: Format
Charts: Introduction
Charts: Create
Charts: Format
Charts: Pie Charts
SmartArt
SmartArt: Organizational Chart
Enhance a Presentation
Design Themes
Designer
Transitions
Animations
Prepare and Present
Proof
Prepare and Print
Present a Slide Show
- Overview
Slide Master
Slide Master: Troubleshooting
Audio and Video
Audio and Video Part 2
OneDrive and PowerPoint
OneDrive and PowerPoint Part 2
Comments and Collaborate
Comments and Collaborate Part 2
Rehearse and Record
Custom Shows
Advanced File Properties
Customize Interface
PowerPoint Best Practices
- Introduction
Overview
Introduction to OneNote 2016
Understanding OneNote Files
Open and Close Notebooks
OneNote Interface and Notebook Navigation
Create a Notebook
Create Pages and Templates
Noteworth OneNote Options
Add Content
Text and Tables
Images
Copy from Web to Web Clipper
Draw Content
Quick Notes
Linked Notes
Links
Attachments and Printouts
Audio and Video
Organize and Manage
Tags
Search
Organize and Manage
History and Backups
Proof and Review
Print and Export
Collaboration and Security
Share Notebooks
OneNote with Outlook
OneNote with Outlook Part 2
OneNote with Skype for Business
Password Protect
OneNote on other Platforms
OneNote for Windows 10
OneNote Online
OneNote for Mac
OneNote for iPad
OneNote for iPhone
OneNote for Android
- Introduction
Overview
Introduction to OneNote
Getting Started with OneNote
OneNote Interface and Notebook Navigation
Create a Notebook
Troubleshooting OneNote
Add Content
Text and Tables
Images
Copy from Web and Web Clipper
Draw
Links
Attachments and Printouts
Audio and Video
Organize and Manage
Tags and Search
Organize and Manage
History, Proof and Print
Immersive Reader
Collaboration and Security
Share Notebooks
Password Protect
OneNote with Email and Meetings
- Introduction
Overview
Introduction to Outlook
Email Terminology
Setup Email Account
Outlook Interface
Email
Email Interface
Focused Inbox
Email Basics
Email Basics Part 2
Email Basics Part 3
Format Message Body
Format Message Body Part 2
Advanced Email Features
Advanced Email Features Part 2
Advanced Email Features Part 3
Signatures
Organize, Customize and Search
Organize, Customize and Search Part 2
Rules and Automation
Junk Mail
Setup Mailbox Archiving
Share and Manage Multiple Accounts
Contacts
Create and Manage Contacts
Share and Transfer Contacts
Calendar
Calendar Interface
Create and Manage Appointments
Create and Manage Meetings
Share and Transfer Calendars
Share and Transfer Calendars Part 2
Tasks and Notes
Tasks and Notes
Groups
Groups
- Introduction
Overview
Introduction to Outlook on the Web
Email Terminology
Setup Email Account
Outlook on the Web Interface
Mail
Mail Interface
Mail Basics
Mail Basics Part 2
Mail Basics Part 3
Format Message Body
Format Message Body Part 2
Format Message Body Part 3
Advanced Mail Features
Advanced Mail Features Part 2
Signatures
Organize, Customize and Search
Organize, Customize and Search Part 2
Junk Mail
Rules and Automation
Archive Messages
Share and Manage Multiple Mailboxes
People
People Interface
Create and Manage Contacts
Calendar
Calendar Interface
Create and Manage Appointments
Create and Manage Meetings
Share Calendars
Share Calendars Part 2
Tasks and Notes
Tasks and Notes
Groups
- Introduction
Overview
Introduction to Word
Word Basics
Word Interface
Document Views and Zoom
Navigate a Document
Select Text
Input Text and Special Characters
AutoCorrect Options
Cut, Copy and Paste
Find and Replace
Proof and Print
Text Formatting
Character Formatting
Paragraph Formatting
Format Painter
Lists
Tabs
Styles: Introduction
Styles: Apply
Style Sets and Themes
Page Layout
Keep Options, Breaks and Columns
Keep Options, Breaks and Columns Part 2
Margins, Headers and Footers
Margins, Headers and Footers Part 2
Orientation and Decoration
- Overview
Images Basics
Images: Format
Images: Format Part 2
Shapes: Add and Format
Multiple Shapes and Icons
Smart Art
Tables: Introduction
Tables: Create and Layout
Tables: Create and Layout Part 2
Tables: Format and Design
Charts
Charts Part 2
Graphical Text Objects
Automation
Templates
Quick Parts
Macros
Linked Objects
Mail Merge
Labels and Envelopes
- Overview
Bookmarks and Cross References
Table of Contents
Create Index
Citations and Bibliography
Footnotes and Endnotes
Captions and Table of Figures
Master Document
Collaborate
Track Changes
Compare and Combine Documents
Collaborate Online
Security and Document Properties
Document Security
Document Security Part 2
Document Security Part 3
Document Properties
Additional Topics
Forms
Customize Interface
- Overview
Introduction to Mail Merge
Data Sources: Existing List
Data Sources: Troubleshooting
Data Sources: Troubleshooting Part 2
Data Sources: Mail Contacts
Data Sources: New List
Letters
Labels: Mail Merge
Labels: Single and Full Page
Labels: Add Image
Envelopes
Envelopes: Add Image
Email
Filter, Sort, Find
Rules
Rules: If Then Else
Rules: Ask and Fill-in
- Introduction
Overview
Introduction to Word
Word Basics
Word Interface
Document Views and Zoom
Navigate a Document
Select Text
Input Text and Special Characters
Autocorrect Options
Cut Copy Paste
Find and Replace
Proof and Print
Text Formatting
Character Formatting
Paragraph Formatting
Format Painter
Lists
Tabs
Styles: Introduction
Styles: Apply
Styles: Apply Part 2
Style Sets and Themes
Page Layout
Keep Options, Breaks and Columns
Blank Page and Cover Page
Margins, Headers and Footers
Add and Format Page Numbers
Orientation and Decoration
- Overview
Images: Basic
Images: Add
Images: Format
Images: Format Part 2
Shapes: Add and Format
Shapes: Align, Arrange and Group
Smart Art
Tables: Introduction
Tables: Create and Layout
Tables: Create and Layout Part 2
Tables: Format and Design
Charts: Introduction
Charts: Create and Layout
Charts: Design and Format
Graphical Text Objects
Automation
Templates
Macros
Linked Objects
Mail Merge
Labels and Envelopes
- Overview
Bookmarks and Cross References
Table of Contents
Index
Citations and Bibliography
Footnotes and Endnotes
Captions and Table of Figures
Master Document
Master Document Part 2
CollaborateTrack Changes
Compare and Combine Documents
Collaborate Online
Security and Document Properties
Document Security
Document Properties and Accessibility
Additional Topics
Customize Interface
Forms
- Overview
Introduction to Mail Merge
Data Sources: Existing List
Data Sources: Existing List Part 2
Data Sources: Existing List Part 3
Data Sources: Mail Contacts
Data Sources: New List
Letters: Mail Merge
Labels: Mail Merge
Labels: Single and Full Page
Labels: Add Image
Envelopes
Envelopes: Add Image
Email
Filter, Sort, Find
Rules
Rules: If Then Else
Rules: Ask and Fill-in
- Initialize a Project
Create a New Project
Calendars
Custom Fields
Settings Options
Create a task-based schedule
Set Up Project Information
Creating Tasks
Task Relationships
Task Relationships Part 2
Creating a Schedule
Managing Multiple Projects
Manage Resources and Assignments
Resource Information
Resource Assignments
Team Planner
Model Project Costs
Model Material Resource Costs
Track and analyze a project
Setting Baselines
Update Progress
Baseline Variances
Resolve Schedule Issues
Display Critical Path
Communicate project information
Applying Custom Views
Sharing Project Data
Reports and Dashboards
Project Extensions
- Overview
Introduction to Microsoft Office Specialist
Prepare for an Exam
Register for an Exam
Take the Exam
Show Off Your Success
- Password Security
Social Engineering
Physical Security
Data Disposal
Safe Networks
Malicious Software
- IT Security Best Practices
- Introduction
Overview
Introduction to Skype for Business
Install Skype for Business
Sign-in and Interface
Setup and Troubleshoot Audio and Video Devices
Contacts
Add and Organize Contacts
Status and Options
Contact Cards and Privacy Relationships
Conversations
Instant Message: Basics
Manage Multiple Instant Messages
Manage Instant Message Conversations
Understand Audio Calls
Manage Skype Calls
Manage Phone Calls
Manage Phone Settings
Video Calls
Meetings
Introduction to Meetings
Schedule a Meeting
Manage Participants
Join a Meeting
Start an Impromptu Meeting
Record a Meeting
Collaborate
Share Your Desktop or Window
Use the Whiteboard
Share PowerPoint Files
Conduct a Poll
Conduct a Q and A Session
Co-Author Office Document
Collaborate with OneNote
Manage Content
Share a Video
Software Development
- Overview
What is a Function
Creating a Function
Functions without Arguments
Functions with a Single Positional Argument
Functions with a Single Keyword Argument
Functions w/ Multiple Positional Arguments
Functions w/ Multiple Keyword Arguments
Fuctions w/ Mixed Arguments
- Overview
Approaching a Problem
Find the Maximum: Planning
Find the Maximum: Coding
Reversing a String: Planning
Reversing a String: Coding
Detect Palindromes: Planning
Detect Palindromes: Coding
Creating a Title: Planning
Creating a Title: Coding
Caesar Cipher: Planning
Caesar Cipher: Coding
- Overview guessthenumber
Plan the Project
Set Up the Project
Take a Guess
Add User Instructions
Refactor to Functions
Limit the Guesses
Determine Win or Lose
- Hangman v1
Overview
Plan The Project
Set Up The Project
Take Guesses
Determine Correct Guesses
Add Presentation
Refactor to Functions
Refactor to Functions
Hangman v3
Add a Scoreboard
Determine Win or Lose
Print Banners
- Chat App with React and Firebase
Overview
Setting Up a React App
Building the Signup Component
Building the Login Component
Setting Up Firebase
Signing Up with Firebase
Logging In with Firebase
Adding Some Style
Adding Some Style Part 2
Building the Sidebar Component
Building the RoomList Component
Building the RoomList Component Part 2
Building the RoomList Component Part 3
Persisting the Login
Building the Chat Panel
Building the Chat Panel Part 2
Building the Chat Panel Part 3
Toggling the Startup and Login Components
Add a Room
Add a Room Part 2
Add a Room Part 3
Deploying to Firebase
- CSV
Overview
What is CSV
Explore CSV Files
Use csv Module
Use csv Module Part 2
Use the pandas Package
Use the tablib Package
JSON
What is JSON
Explore JSON Files
JSON: Use the json Module
JSON: Use the pandas Package
Use the simplejson and ujson Packages
JSON: Use the tablib Package
YAML
What is YAML
Explore YAML Files
Use the PyYAML Package
YAML: Use the tablib Package
XML and HTML
What is XML
Explore XML Files
What is HTML
Explore HTML Files
Use the xml Module
Use the lxml Package
Use the xmltodict Package
Use the BeautifulSoup Package
- Dive into the Python Standard Library
the glob Module
The itertools Module: Infinite Iterations
The itertools Module: Combinatorics
The itertools Module: Shortest Input
The collections Module: namedtuple
The collections Module: defaultdict
The collections Module: Counter
the functools Module: Iru_cache
The functools Module: total_ordering
The functools Module: partial
The functools Module: reduce
The json Module: Reading & Writing
The json Module: Function Encode & Decode
The json Module: Class Encode & Decode
The csv Module: CSV Reading & Writing
The csv Module: DictReader and DictWriter
The os.path Module
The socket Module: TCP Server
The socket Module: TCP Client
The socket Module: UDP Server
The socket Module: UDP Client
datetime strftime
datetime strptime
concurrent.futures ThreadPoolExecutor submit
concurrent.futures ProcessPoolExecutor submit
- Terminal
Overview
What is the Terminal?
Opening the Terminal
Navigating in the Terminal
Making Folders and Files
- HTML, CSS and Bootstrap
Overview
Introduction to HTML
CSS
CSS Part 2
Responsive Web Design
Building a Bootstrap Page
Glyphs and Forms
Font Awesome
- Overview
Introduction to the Canvas Element
Drawing Lines and Rectangles
Drawing Lines and Rectangles Part 2
Drawing Curves and Arcs
Drawing Curves and Arcs Part 2
Drawing Curves and Arcs Part 3
Creating Other Shapes
Creating Other Shapes Part 2
Drawing Styles and Colors
Drawing Styles and Colors Part 2
Drawing Text
Drawing Gradients
Drawing Gradients Part 2
Using Images
Using Images Part 2
Using Images: Grayscale Filter
Using Transformations
Using Transformations Part 2
Clipping and Composites
Clipping and Composites Part 2
More About Animations
More About Animations Part 2
Lets Build It: Particles Everwhere
Lets Build It: Particles Everywhere Part 2
Responding to Events
- Overview
Project Planning and Setup
Creating the Ball
Creating the Paddle
Creating the Human Player Paddle
Creating the Computer Player Paddle
Creating the Computer Player Paddle Part 2
Refactoring into a Game Object
Refactoring into a Game Object Part 2
Refactoring into a Game Object Part 3
Creating the Scoreboard
Detecting Collisions
Image Editor
Designing an Image Editor
Setting up the Interface
Accessing the Image
Building Image Manipulation Functions
Building Image Manipulation Functions Part 2
Saving the Image
AtmoAttack
Planning the Project
Creating a Basic Fighter
Creating a Basic Attacker
Creating the Pellets
Creating the Pellets Part 2
Cleaning Up and Refactoring
Creating a Swarm
Creating a Swarm Part 2
Adding Sprites
Adding Sprites Part 2
Adding Sounds
Adding Sounds Part 2
Ending the Game
DevPaint
Planning The Devpaint Project
Planning The Devpaint Project
Creating A Pencil Drawing
Creating a Pencil Drawing Pt2
Creating a Pencil Drawing Pt3
Adding Color Selections
Adding Size Choices
Saving the Image
- Overview
What is AngularJS
Our First Angular Application
Controllers and Scope
Controllers and Scope Part 2
Data Binding
Overview of Built-in Directives
Dynamic Styles and CSS
Rendering Lists
Handling Events
Filters
Filters Part 2
Forms
AJAX with AngularJS
AJAX with Angular Resource
Services and Factories
Services and Factories Part 2
Custom Directives
Custom Directives Part 2
Custom Components
Custom Components Part 2
Client Routing with Angular Router
Client Routing with Angular Router Part 2
Client Routing with Angular Router Part 3
Client Router with Angular UI Router
Client Router with Angular UI Router Part 2
- Fundamentals
Overview
Creating the Environment
Setting Up Ansible
Simple Commands Using Ansible
Installing Packages
Installing Packages Part 2
Managing Users
Managing Services
Running Commands
Hosts
Tasks
Variables
Variables Part 2
Handlers
Templating
Templating Part 2
Loops
Control Flow
Getting Started with Roles
Roles and Tasks
Roles and Handlers
Roles and Control Flow
Roles and Templating
Roles and Files
Requirements for Static Site Deployment
Setting Up NGINX
Templating the NGINX Configuration
Creating a Static Site Role
Planning the NFS Architecture
Setting up the NFS Server
Setting up the NFS Clients
Restructuring to Roles: Server
Restructuring to Roles: Clients
- Overview
What is Docker
Installing Docker
Installing Docker Part 2
Running Your First Docker Container
Managing Containers
Inspecting Docker Images and Containers
Docker and Data
Docker and Data Use Case
Building our First Docker Image
Building our First Docker Image Part 2
Storing Our Custom Docker Images
Storing Our Custom Docker Images Part 2
Building an Application with Docker
Building an Application with Docker Part 2
Multi-container Apps with Docker
Multi Container Apps with Docker Part 2
What is Docker Compose
Multi Container Apps with Docker Compose
What is Docker Machine
Using Docker Machine with Digital Ocean
What is Docker Swarm
Docker Swarm with Digital Ocean
Creating a Docker Swarm Application
Creating a Docker Swarm Application Part 2
- Overview
What is Git
Installing Git
Getting a Git Repository
Making Changes to a Git Repository
Oh No Fixing Mistake with Git
Connecting to a Remote Repository
Branching out with Git
Merging with Git
Remote and Branches
Simple GitHub Collaboration
- INTRO TO NODE.JS
Overview
Installing NodeJS
What Is NodeJS
Modules In NodeJS
Event Production And Consumption
Event Production And Consumption Part 2
Execution With Timers
Read And Write Files
Read And Write Files Part 2
External Processes
Streams
Streams Part 2
Node By Example: TCP Module
Node By Example: TCP Module Part 2
Node By Example: TCP Module Part 3
Node By Example: TCP Module Part 4
Node By Example: TCP Module Part 5
Node By Example: HTTP Simple Server
Node By Example: Static File Server
Node By Example: Server With Routes
Node By Example: Make HTTP Requests
Node By Example: Make HTTP Requests Part 2
Lets Build It: Twitter CLI
Lets Build It: Twitter CLI Part 2
Lets Build It: Twitter CLI Part 3
Lets Build It: Click Capture
Let’s Build It: Click Capture Part 2
Let’s Build It: Click Capture Part 3
- NUMPY
Overview
Scientific Python And Setup
Review Of Python Basics With Jupyter
Introducing NumPy Arrays
NumPy Array And Data Types
Graphing And Visualization
Indexing And Slicing Arrays
Copies And Views
Elementwise And Broadcasting Operations
Reduction Operations
Shape And Sort Operations
Data Types: Casting, Size, And Structure
Structured Arrays
Let’s Try It: Time Series Analysis
- PHP OVERVIEW AND GETTING STARTED
PHP Overview And Getting Started
Numbers, Strings And Operators
Conditionals
Arrays
Arrays Part 2
Loops
Functions
Classes And Objects
Dependency Management With Composer
Basic Error Handling
- INTRO TO REACT
Overview
The First Leap
Plunging Into The Build
Plunging Into The Build Part 2
Taking A Breath Of ES2015
Diving Into React
Powering Up With State
Streamlining With Properties
- REDUX
Overview
Why Redux
Principles
Lists Are Different
Wrapping Up
- INTRO TO RUBY ON RAILS
Overview
What Is Ruby On Rails?
Installing Ruby On Rails
Intro To Web Apps
Intro To Rails Views
Intro To Rails Models
Intro To Rails Models Part 2
Intro To REST
Intro To REST Part 2
Intro To Validations
Intro To Model Relationships
Adding A Comments Resource
Adding Static Assets
Adding Pictures
Authentication Using Devise
Authentication Using Devise Part 2
Intro To Rails Testing
Intro To Rails Testing Part 2
- INTRO TO VUE.JS
Overview
Our First Application
Data Binding And Dev Tools
Adding Methods
Handling Events
Handling Events Part 2
Computed Properties
Basic Directives And Binding
Let’s Build It: Caesar Cipher
Let’s Build It: Caesar Cipher Part 2
Handling Data Collections
Conditional Rendering
Reactive Styling
Filtering Data
Our First Component
Our First Component Part 2
Our First Component Part 3
Components With Props
Components With Custom Events
Components With Custom Events Part 2
Components With Content
Component Lifecycle Hooks
Let’s Build It: Star Wars Search
Let’s Build It: Star Wars Search Part 2
Let’s Build It: Star Wars Search Part 3
Let’s Build It: Star Wars Search Part 4
- INTRO TO WEB DEVELOPMENT
Overview
Web APIs For JavaScript
Web APIs For JavaScript Part 2
The Document Object Model
The Document Object Model Part 2
Working With Events
Data Storage In The Browser
Data Storage In The Browser Part 2
Lets Build It Counter
Lets Build It Counter Part 2
Lets Build It Timer
Lets Build It Timer Part 2
Lets Build It Timer Part 3
Lets Build It Hangman
Lets Build It Hangman Part 2
Lets Build It Hangman Part 3
Lets Build It Piano
Lets Build It Piano Part 2
Lets Build It Piano Part 3
- INTRO TO WEBPACK
Overview
Laying The First Lines
The Big Idea
A Big Word, Transpilation
Production Builds
Development Builds
Leaving With Style
- FUNDAMENTALS
Overview And Getting Started
Hooks And Filters
Shortcodes
Creating And Modifying Posts
The “Loop”
Custom Post Types
Taxonomies
Creating A Settings Page
Options And Transients
Settings Sections And Fields
Security Essentials
Widgets
Remote URLs
Coding Standards
Users
User Meta
Post Meta
Enqueue Scripts And Styles
Dashboard Widgets
WPDB
Customize The Login Page
WordPress And AJAX
WordPress Cron Jobs
Customizing The Admin Area
The Template Hierarchy
Child Themes
Themes: Header, Footer And Index
Using The Loop Inside Our Theme
Creating The Site’s Navigation
Creating Page Templates
Setting Up Our Widget Areas
Activation And Deactivation Functions
Internationalization
CREATING OUR FIRST PLUGIN
Creating Our First Plugin
Creating Our First Plugin Part 2
CREATING A WORDPRESS SITE
Creating A WordPress Site
Creating A WordPress Site Part 2
Creating A WordPress Site Part 3
Creating A WordPress Site Part 4
Creating A WordPress Site Part 5
Adding Custom Post Types
Creating Theme Options
Extending The Customizer
- PERFORM OPERATIONS USING DATA TYPES AND OPERATORS
Overview
Working With Primitive Data Types
Working With Multiple Assignment Statements
Converting Types In Python
Creating Lists
Modifying Lists
Sorting And Reversing Lists
Slicing Lists
Working With Operators
Determining Operator Precedence
Working With If Statements
Using Compound Conditional Expressions
Working With For Loops
Working With While Loops
Nesting For Loops
Reading Files
Copying Files
Merging Mails
Reading Console Inputs And Formatting Outputs
Reading Command Line Arguments
Defining Functions
Using Default Arguments
Using Keyword And Positional Arguments
Handling Exceptions
Using Math And Random Modules
Display Datetime Working Directory File Metadata
- FUNDAMENTALS
Overview
Writing Markdown
TEXT
Italicizing Text
Bolding Text
Striking Through Text
Adding An External Link
Creating Headings
Creating A Blockquote
Creating A Heading With Underline
Adding An Internal Link
LISTS
Creating Lists
IMAGES
Adding An Image
Creating An Image With A Link
TABLES
Creating A Table
CODE
Inlining Code
Creating A Code Block
ABOVE AND BEYOND
Creating A Task List
- NEW FEATURES IN ES6
Overview
Changes To Variables
Enhanced Object Literals
Classes Come To JavaScript
Classes Come To JavaScript Part 2
Changes To Functions
Changes To Strings
Changes To Strings Part 2
Changes To Arrays
Changes To Arrays Part 2
Destructing Data
Spread And Rest
Iterators And The For…Of Loop
Promises And Fetch
Promises And Fetch Part 2
Generators
Generators Part 2
Proxies
Sets And WeakSets
Maps And WeakMaps
- OBJECT ORIENTED JAVA
Installation And Setup Java
Language Basics
Control And Program Flow: If
Control And Program Flow: Else
Control And Program Flow: Switch
Java Primitive Types
Arrays And ArrayLists
Loops
Strings
Math Library
Static Methods
IO Scanner
IO Streams
JUnit Testing
Basic Guessing Game
Debugging Techniques In Eclipse
Handling Exceptions
Deploying And Publishing
Object-Oriented Concepts
Object-Oriented Implementation
Object-Oriented Implementation Part 2
Object-Oriented Inheritance And Hierarchy
Abstract Classes And Interfaces
Abstract Classes And Interfaces Part 2
Abstract Classes And Interfaces Part 3
Abstract Classes And Interfaces Part 4
2d Graphics And Sprites
2d Graphics And Sprites Part 2
Keyboard Controls With GLFW
Saving The Game
Java HTTP Server
Java Collections API
Security And Cryptography
- OBJECT ORIENTED PYTHON
Overview
Installation And Setup
What Is Object Oriented Programming
Creating Classes And Objects In Python
Extending Classes
Extending Classes Part 2
Lets Build It MonsterSlash V.1
Lets Build It MonsterSlash V.1 Part 2
MonsterSlash V.1 Game Refactor
MonsterSlash V.1 Actor Refactor
MonsterSlash V.2 Enemies Attack
MonsterSlash V.2 Enemies Attack Part 2
- FUNDAMENTALS
Overview
Setting Up The Environment
Exploring The REPL
Variables And Values
Expressions And Statements
BASIC DATA TYPES
Basic Data Types
Basic Data Types: Numbers
Basic Data Types: Strings
Basic Data Types: Booleans
COMPARISONS, CONDITIONS AND CONTROL
Compare Data
Logic Control
If Statements
If-Else Statements
If-Elif-Else Statements
COLLECTION TYPES
Lists
Lists Part 2
Tuples
Dictionaries
Dictionaries Part 2
Sets
ITERATION
What Is Interation
For Loops
While Loops
List Comprehensions
Dictionary Comprehensions
Iteration Helpers
- BASICS
Overview
Creating And Initializing An Instance
Representing An Instance: Str And Repr
Representing An Instance: Format
Representing An Instance: Bytes
Deleting An Instance
CONTAINERS
Objects As Iterables
Getting Items
Setting And Deleting Items
COMPARABLES
Obtaining The Boolean Representation
Equality And Inequality
Greater And Less
Hashing And Slots
NUMBERS
Adding
Subtracting
Multiplying
Dividing
Modulo And Powers
Bit Shifting Operations
Bitwise Logical Operations
Negative And Positive
Absolute Value And Inverse
Integers And Floats
Rounding
Floor And Ceiling
Truncation And Indexing
Complex Number
ATTRIBUTES
Getting Attributes
Setting And Deleting Attributes
Descriptors: Property Decorators
Descriptors: Creating A Custom Descriptor
FUNCTIONS
Making An Object Callable
CONTEXT MANAGERS
Clean Up With Context Managers
SERIALIZATION
Copying Objects
Pickling: Get And Set State
- PYTHON FOR SECURITY
Overview
Create A Socket Connection
Create A Port Scanner
Banner Reading From Open Ports
Brute Forcing An SSH Connection
Brute Forcing An SSH Connection Part 2
Packet Sniffing With Python
Packet Capture Output
Ethernet Frames From RAW Packets
IP Headers From Ethernet Frames
TCP Segments
UDP Segments
Creating A TCP Server
Forwarding Packet Sniffer
- PYTHON PROGRAMMING
Overview
Setting Up Python
Using Python For Simple Tasks
Decision Making In Python
Functions
Iterations
Strings And More Iteration
Lists
Dictionaries
Tuples
Manipulating Files
Standard Library Functions
Putting It All Together
- Overview
Open And Close A File
Read A File
Write A File
Use A Context Manager
Loop Through Multiple Files
Loop Through A File: Fileinput
Loop Through Multiple Files: Fileinput
- Overview
What Is RESTful API
Building A Simple Express Application
Our First Middleware
Our First Middleware Part 2
Building Our Routes
Building Our Routes Part 2
Data Modeling
Data And Routes
Data Persistence
Data Persistence Part 2
Adding Locations
Adding Locations Part 2
Refactor Models
- Overview
What Is The Standard Library
Access The Standard Library
Use The Os Module
Use The Os.Path Module
Use The Os.Path Module Part 2
Use The Datetime Module: Getting Started
Use The Datetime Module: Timedeltas And Arithmetic
Use The Datetime Module: Comparisons
Use The Datetime Module: Parsing And Timezones
Use The Math Module
Use The Sys Module: Interpreter Settings
Use The Sys Module: Runtime Environment
Use The Sys Module: Modules And Imports
Use The Random Module
- Overview
What Is Version Control
Set Up Git
Set Up Git: Windows
Our First Repository
Our First GitHub Repository
Connect Remote And Local Repos
Branch In A Repository
Branch In A Repository Part 2
Create A Pull Request
Create A Tagged Release
Collaborate With Collaborators
Collaborate With Collaborators Part 2
Our First Fork
Collaborate With Forks
Collaborate With Forks Part 2
Project: Python With Git
Keeping Things Clean: .Gitignore
- Overview
Setup And Introduction
Building The Proxy
Building The Proxy Part 2
Up And Going With Webpack
Building The App Component
Building The App Component Part 2
Building Our Weather Service
Building The Search Component
Building The Search Component Part 2
Current Weather Component
Hourly And Minutely Weather Component
Adding Google Location Search
Adding Google Location Search Part 2
Updating The Search Component
Geolocation Service
Geolocation Service Part 2
Adding Location Lookup To Proxy
Deploying Our Proxy On Heroku
Deploying Our Angular App On GitHub Pages
Adding Some Style
Scrollable Hourly Component
Minutely Component Chart
- Overview
Community Code: What Is That
Install Pip
Install System Packages
Virtual Environments: Create
Virtual Environment: Manage
Virtual Environment: Install Packages
Project: Resizing Images
Install Pipenv
Create Pipenv Environments
Manage Pipenv Environments
Use Pipenv Environments
Project: Image Links On A Page
Another One? Why Conda?
Install Conda
Install Conda: Windows
Create Conda Environments
Manage Conda Environments
Manage Conda Environments: Reproduce
Manage Conda Environments: Clone
Project: Analyze Population Data
Uninstall Conda
Uninstall Conda: Windows
Business Professional Courses
- Episode 1
Episode 2
Episode 3
Episode 4
Episode 5
Episode 6
Episode 7
- Low-Cost Resources For Small Business
Blockchain Basics
Cat Picture Resiliency
Entrepreneur’s Rollercoaster
How Not To Be A CEO
When Not To Join A Start-Up
Zero Knowledge Doesn’t Mean Zero Ethics
Business Paperwork
Advisors
Funding
Keeping Track Of Your Expenses
- Overview
The Technology Is Only Worth 5 Percent
Product Creation
Operational Status
Business Development
Sales Management
Exit Strategies
- Exploring Your Career
Creating Your Career Network
Planning Your Career Developme
- Introduction
Section One: The Right Mindset
Section Two: How To Be The Best In The World
Section Three: Tools Of The Trade
Section Four: More Key Sales Skills
- Introduction To The STREET Process
STREET Process Example
- Launching A Successful Team
Establishing Guidelines, Roles And Goals
Developing A Team And Its Culture
Building Trust And Commitment On Your Team
Team Communication And Collaboration
Motivating And Optimizing Team Performance
Managing Virtual Teams
- Overview
Introduction
Directness – Red Trait
Extroversion – Green Trait
Pace – Blue Trait
Structure – Yellow Trait
Create Your Profile Report
- NIST 800-171 Basics
HIPAA Basics
Compliance Project Scoping
Compliance Gap Analysis
Compliance Remediation And Negotiation
Compliance Audit/Assessment
- Introduction To Meeting Starters
How To Build And Sustain A High Performance Team
Key Characteristics Of A Highly Effective Leader
The Formula For Business Excellence
Moments Of Truth
- Participation Was Enough
Music
Instant Gratification
Helicopter Parents
Optimistic
Experiences Vs Possessions
Entrepreneurism Is Sexy
Personal And Work Life Intertwined
Extremely Tech Dependent
Give My Work Meaning And Value
Acknowledge My Strengths And Successes
Provide Mentorship And Training
Collaborative Work Environments
Let Me Have Fun
Provide Leadership Not Management
Encourage An Entrepreneurial Spirit
- Advanced Communications
The Essentials Of Accountability
Achieving Business Excellence
Leader Of The Future
How To Be A Trusted Advisor
The Fundamentals Of Negotiation
Conflict Resolution
Key Ideas For Career Development
Delegating Down Managing Up
- Overview
Self Management
Self Management Part 2
Interviewing
Interviewing Part 2
Interviewing Part 3
Lean Meetings
Lean Strategic Planning
Your First 45 Days
Your First 45 Days Part 2
Your First 45 Days Part 3
Lean Negotiations
Lean Negotiations Part 2
- Virtual Team Structure
Common Myths Of Virtual Teams
- Highly Effective Leaders
- Get Your Head In The Game
The Buck Stops Here
Can You Hear Me Now?
Got Freedom?
Show Me The Money
Business2
The Attraction Multiplier
And The Winner Is …
- Capitalism Isn’t A Dirty Word
The Value Crisis
Hitting The Trust Accelerator
Can I Please Talk To A Person
Change: I Can’t Keep Up
The Art Of Thinking Independently Together
Our Way Is Better Than My Way Or Your Way
Practice Makes Processes
Built To Last
The One Thing
Trusted by Aspiring IT Professionals, Corporations and
Government agencies for more than a Decade
Get unlimited online access learn anywhere, anytime using your computer or mobile device!